SlideShare a Scribd company logo
1 of 15
GROUP MEMBERS :
NOR   AINI (MAS)
SITI NADIA (MAS)
YUHAN (THA)
PISEY (CAM)
REZZA (MAS)
MILA (VIE)
   Information, as we know it today, includes both electronic
    and physical information. The organizational structure must
    be capable of managing this information throughout the
    information lifecycle regardless of source or format for
    delivery through multiple channels that may include cell
    phones and web interfaces.

    Information management (IM) is also the collection and
    management of information from one or more sources and
    the distribution of that information to one or more audiences.
    This sometimes involves those who have a stake in, or a right
    to that information. Management means the organization of
    and control over the structure, processing and delivery of
    information.
Unmanaged content increases your
organization’s risks and costs .
The solution is an effective
enterprise content management
system (ECM).
 Handle both structured and unstructured
  content, integrating them into a single,
  centralized repository
 Share content across the enterprise,
  regardless of contribution( web browser, desk
  top application and so on.
 Manage content throughout its lifecycle,
  applying control and support to each phase
  from creation through distribution.
Information is stored in
different computers and
managed by different
information management
system .
We can use various well-established
solutions . They include data
warehousing, data integration,
application integration, integrated
content management and so on .
The data is semi-structure
 data and multimedia data.
Solution

There are commercial product for
automatically matching images, such as
fingerprints and faces ; matching audio,
including voice, music and sound and so
on .
There are a lot of books in library.
Do you think people can control them?
    Of course people can control the books, but
     how do they control them?
                    Solution
1.     By using a program which is called Virtua.
2.     We also need some machine such as self-check
       machine, security system, and web side.
My slide presentation

More Related Content

Similar to My slide presentation

What is Information System - Miechael 20190700004
What is Information System - Miechael 20190700004What is Information System - Miechael 20190700004
What is Information System - Miechael 20190700004MiechaelMaikel
 
informationmanagement-130518152950-phpapp01.pptx
informationmanagement-130518152950-phpapp01.pptxinformationmanagement-130518152950-phpapp01.pptx
informationmanagement-130518152950-phpapp01.pptxMarlonMagtibay2
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docxharrisonhoward80223
 
Information Technology Applications For A Team Of People
Information Technology Applications For A Team Of PeopleInformation Technology Applications For A Team Of People
Information Technology Applications For A Team Of PeopleStephanie Williams
 
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxRunning head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxcowinhelen
 
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILUREINFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILURELibcorpio
 
Week 1 Answer It is important to understand human beings and t.docx
Week 1 Answer  It is important to understand human beings and t.docxWeek 1 Answer  It is important to understand human beings and t.docx
Week 1 Answer It is important to understand human beings and t.docxjessiehampson
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxdaniahendric
 
Three dimensions of information systems
Three dimensions of information systemsThree dimensions of information systems
Three dimensions of information systemsSuleyman Ally
 
Management Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptxManagement Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptxSURBHI SAROHA
 
MIS Q & A for III B.Sc C & HA
MIS Q & A for III B.Sc C & HAMIS Q & A for III B.Sc C & HA
MIS Q & A for III B.Sc C & HAHepsijeba
 
Information System(IS).pptx
Information System(IS).pptxInformation System(IS).pptx
Information System(IS).pptxPoojaRai661885
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Alexander Decker
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Alexander Decker
 

Similar to My slide presentation (20)

HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 
Is202 ch 03
Is202 ch 03Is202 ch 03
Is202 ch 03
 
Cibm ch 02
Cibm ch 02Cibm ch 02
Cibm ch 02
 
What is Information System - Miechael 20190700004
What is Information System - Miechael 20190700004What is Information System - Miechael 20190700004
What is Information System - Miechael 20190700004
 
informationmanagement-130518152950-phpapp01.pptx
informationmanagement-130518152950-phpapp01.pptxinformationmanagement-130518152950-phpapp01.pptx
informationmanagement-130518152950-phpapp01.pptx
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docx
 
1 intryf kavita (2)
1 intryf kavita (2)1 intryf kavita (2)
1 intryf kavita (2)
 
Information Technology Applications For A Team Of People
Information Technology Applications For A Team Of PeopleInformation Technology Applications For A Team Of People
Information Technology Applications For A Team Of People
 
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxRunning head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
 
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILUREINFORMATION SYSTEM ‎SUCCESS AND FAILURE
INFORMATION SYSTEM ‎SUCCESS AND FAILURE
 
Information management
Information managementInformation management
Information management
 
Week 1 Answer It is important to understand human beings and t.docx
Week 1 Answer  It is important to understand human beings and t.docxWeek 1 Answer  It is important to understand human beings and t.docx
Week 1 Answer It is important to understand human beings and t.docx
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
 
Management Information Systems MGMT205
Management Information Systems MGMT205Management Information Systems MGMT205
Management Information Systems MGMT205
 
Three dimensions of information systems
Three dimensions of information systemsThree dimensions of information systems
Three dimensions of information systems
 
Management Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptxManagement Information System(UNIT 1).pptx
Management Information System(UNIT 1).pptx
 
MIS Q & A for III B.Sc C & HA
MIS Q & A for III B.Sc C & HAMIS Q & A for III B.Sc C & HA
MIS Q & A for III B.Sc C & HA
 
Information System(IS).pptx
Information System(IS).pptxInformation System(IS).pptx
Information System(IS).pptx
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...
 

My slide presentation

  • 1. GROUP MEMBERS : NOR AINI (MAS) SITI NADIA (MAS) YUHAN (THA) PISEY (CAM) REZZA (MAS) MILA (VIE)
  • 2. Information, as we know it today, includes both electronic and physical information. The organizational structure must be capable of managing this information throughout the information lifecycle regardless of source or format for delivery through multiple channels that may include cell phones and web interfaces.  Information management (IM) is also the collection and management of information from one or more sources and the distribution of that information to one or more audiences. This sometimes involves those who have a stake in, or a right to that information. Management means the organization of and control over the structure, processing and delivery of information.
  • 3.
  • 4. Unmanaged content increases your organization’s risks and costs .
  • 5. The solution is an effective enterprise content management system (ECM).
  • 6.  Handle both structured and unstructured content, integrating them into a single, centralized repository  Share content across the enterprise, regardless of contribution( web browser, desk top application and so on.  Manage content throughout its lifecycle, applying control and support to each phase from creation through distribution.
  • 7. Information is stored in different computers and managed by different information management system .
  • 8. We can use various well-established solutions . They include data warehousing, data integration, application integration, integrated content management and so on .
  • 9. The data is semi-structure data and multimedia data.
  • 10. Solution There are commercial product for automatically matching images, such as fingerprints and faces ; matching audio, including voice, music and sound and so on .
  • 11.
  • 12.
  • 13. There are a lot of books in library. Do you think people can control them?
  • 14. Of course people can control the books, but how do they control them? Solution 1. By using a program which is called Virtua. 2. We also need some machine such as self-check machine, security system, and web side.