Sie sind auf Seite 1von 24

1

chapt
er
3

Information Technology for


Business
Business Essentials, 7th Edition
Ebert/Griffin

Instructor
Lecture
PowerPoint
2009 Pearson Education, Inc.

PowerPoint Presentation prepared by


Carol Vollmer Pope Alverno College

IT Basics
Information Technology (IT)
The various appliances and devices for
creating, storing, exchanging, and using
information in diverse modes, including
visual images, voice, multimedia, and
business data

E-commerce (Electronic Commerce)


The use of the Internet and other electronic
means for retailing and business-tobusiness transactions
2009 Pearson Education, Inc.

IT Impacts
Creating Portable Offices
Providing remote access to instant information

Enabling Better Service


Coordinating remote deliveries

Creating Leaner, More Efficient


Organizations
Allowing more work and customer satisfaction
to be accomplished with fewer people

Enabling Increased Collaboration


Using collaboration software and other IT
communication devices
2009 Pearson Education, Inc.

IT Impacts (contd)
Enabling Global Exchange
Fostering collaboration on a worldwide scale

Improving Management Processes


Using enterprise resource planning (ERP) to
change the nature of the management
process

Providing Flexibility for Customization


Creating new manufacturing capabilities
that offer customers greater variety (mass
customization) and faster delivery cycles
2009 Pearson Education, Inc.

IT Impacts (contd)
Providing New Business
Opportunities
Creating entirely new businesses where
none existed before

Improving the World and Our Lives


Advancing medical and diagnostic
techniques

2009 Pearson Education, Inc.

FIGURE 13.1 Networking for Mass


Customization

2009 Pearson Education, Inc.

IT Building Blocks: Business Resources


Internet
A gigantic system of more than 100
million interconnected computers in
more than 100 countries

World Wide Web


A standardized code for accessing
information and transmitting data over
the Internet

2009 Pearson Education, Inc.

IT Building Blocks: Business Resources


(contd)
Intranets
Private internal information networks
accessible only by employees

Extranets
Allow outsiders limited access to internal
information networks

2009 Pearson Education, Inc.

IT Building Blocks: Business Resources


(contd)
Electronic Conferencing
Allows groups of people to communicate
simultaneously from various locations
via email, phone, or video
Data conferencing
Video conferencing

VSAT Satellite Communications


Satellite-based private network for
voice, video, and data transmissions
2009 Pearson Education, Inc.

Networks: System
Architecture
Computer Network
A group of two or more computers linked
together by some form of cabling (fiber-optic,
coaxial, or twisted wire) or by wireless
technology to share data or resources such as a
printer

Client-Server Network
Clients
The laptop or desktop computers through which users
make requests for information or resources

Servers
The computers that provide the services shared by
users
2009 Pearson Education, Inc.

Types of Networks
Wide Area Networks (WANs)
Computers linked over long distances

Local Area Networks (LANs)


Computers linked in a smaller area,
such as all of a firms computers within
a single building

Wireless Networks
Use airborne electronic signals to link
computers and devices
Blackberry system
2009 Pearson Education, Inc.

FIGURE 13.2 Blackberry Wireless Internet


Architecture

2009 Pearson Education, Inc.

Types of Networks (contd)


Wi-Fi (Wireless Fidelity)
An access point that forms its own
small network

Wireless LAN or WLAN


A wireless local area network
WiMax (Worldwide Interoperability for
Microwave Access)

2009 Pearson Education, Inc.

Hardware and
Software
Hardware
Physical components such as laptops,
desktops, handheld computers,
keyboards, monitors, system units, and
printers

Software
System software
Application (productivity) software
Groupware
2009 Pearson Education, Inc.

Information Systems: Harnessing


the Competitive Power of IT
Data
Raw facts and figures

Information
The meaningful, useful interpretation of data

Information System (IS)


A system that uses IT resources and enables
managers to turn data into information for use
in decision-making
Information system managers operate the
systems used for gathering, organizing, and
distributing information
2009 Pearson Education, Inc.

Leveraging Information
Resources
Data Warehousing
The collection, storage, and retrieval of
data in electronic files

Data Mining
The application of electronic
technologies for searching, sifting, and
reorganizing pools of data to uncover
useful information

2009 Pearson Education, Inc.

Types of Information
Systems
Information Systems for Knowledge
Workers
Provide resources to create, store, use,
and transmit new knowledge for useful
applications

Information Systems for Managers


Management information systems (MIS)
Provide reports, schedules, plans, and budgets
that can then be used for making decisions

Decision support systems (DSS)


Interactive systems that create virtual business
models and test them with different data to
see how they respond
2009 Pearson Education, Inc.

IT Risks and Threats


Hackers
Cyber criminals who gain unauthorized access to
a computer or network, either to steal
information, money, or property or to tamper
with data
Wireless mooching
Denial of service (DOS) attacks

Identity Theft
Stealing of personal information to get loans,
credit cards, or other monetary benefits by
impersonating the victim
Phishing
Pharming
2009 Pearson Education, Inc.

IT Risks and Threats


(contd)

Intellectual Property Theft

Theft of a product of the mindsomething


produced by the intellect, with great expenditure
of human effortthat has commercial value

Computer Viruses, Worms, and Trojan Horses


Malicious programs that, once installed, can shut
down a computer system

Spyware
Software that transmits stolen personal
information

Spam
Widely broadcast, unsolicited e-mail
2009 Pearson Education, Inc.

IT Protection Measures
Preventing Unauthorized Access
Firewalls
Security systems with special software or
hardware devices designed to keep
computers safe from hackers

Components for filtering messages:


Security policy
Router

2009 Pearson Education, Inc.

IT Protection Measures
Preventing Identity Theft
Fair and Accurate Credit Transactions Act
of 2005

Preventing Viruses
Anti-virus software

2009 Pearson Education, Inc.

IT Protection Measures (contd)


Protecting Electronic Communications
Encryption software
Works by locking an e-mail message to a
unique code number (digital fingerprint) for
each computer so only that computer can
open and read the message

Avoiding Spam and Spyware


Anti-spyware software
CAN-SPAM Act of 2006

2009 Pearson Education, Inc.

Key Terms
anti-virus software
client-server network
computer network
computer-aided design (CAD)
data
data mining
data warehousing
decision support system (DSS)
e-commerce
electronic conferencing
encryption system
extranet
firewall
hacker

hardware
identity theft
information
information system
information systems managers
information technology (IT)
intellectual property
Internet
intranet
knowledge information system
local area network (LAN)
management information
system (MIS)
mass-customization

2009 Pearson Education, Inc.

Key Terms (contd)


software
spam
spyware
VSAT satellite
communications
wide area network (WAN)
Wi-Fi
wireless local area network
(wireless LAN or WLAN)
wireless wide area network
(WWAN)
World Wide Web
2009 Pearson Education, Inc.

Das könnte Ihnen auch gefallen