Sie sind auf Seite 1von 30

Managing Information

And Technology
Exploring Business

Chapter 11
© 2007 Prentice-Hall, Inc. 11-1
Chapter Objectives
Exploring Business

1. Define IS and identify the tasks of the


IS manager
2. Explain how IS managers capture,
store, and analyze data
3. Discuss ways IS can be designed
4. Describe information systems for
networked computers
5. Explain how 4 networking
technologies communicate
6. Identify/discuss challenges of
e-commerce
11-2
© 2007 Prentice-Hall, Inc.
Data/Information
Exploring Business

“…data—unprocessed facts.”

“…information—data that have been


processed, or turned into some useful
form.”

11-3
© 2007 Prentice-Hall, Inc.
Information Systems
Exploring Business

Information System
Chief Information Officer
Chief Technology Officer
Information Managers
• Determine information needs
• Collect data
• Convert data into information
• Direct information
11-4
© 2007 Prentice-Hall, Inc.
Information Needs
Exploring Business

Top Managers
• Planning
• Setting Objectives
• Strategic Decisions
Middle Managers
• Allocate Resources
• Oversee Activities
First-Line Managers
• Supervise Employees
• Oversee Daily Operations
• Coordinate Activities
11-5
© 2007 Prentice-Hall, Inc.
Information Needs/Flows
Exploring Business

11-6
© 2007 Prentice-Hall, Inc.
Need To
Share Information
Exploring Business

Integrated IT

Enterprise
Systems

11-7
© 2007 Prentice-Hall, Inc.
ERP System
Exploring Business

11-8
© 2007 Prentice-Hall, Inc.
Data/Databases
Exploring Business

 Databases
 Data Warehouse
 Data Mining
• Customer Behavior
• Customer Relationship
Management
11-9
© 2007 Prentice-Hall, Inc.
Data Mining Process
Exploring Business

11-10
© 2007 Prentice-Hall, Inc.
Types Of
Information Systems
Exploring Business

Operations Decision
Support Support
• Transaction Executive
Processing
Information
• Process
Control Artificial
• Design & Intelligence
Production • Expert
Management • Face-
Support Recognition
11-11
© 2007 Prentice-Hall, Inc.
TPS
Exploring Business

11-12
© 2007 Prentice-Hall, Inc.
Design And
Production Systems
Exploring Business

 Computer-Aided Design
Computer-Aided
Manufacturing
Computer-Integrated
Manufacturing
Flexible Manufacturing
11-13
© 2007 Prentice-Hall, Inc.
DSS
Exploring Business

11-14
© 2007 Prentice-Hall, Inc.
Computer Networks
Exploring Business

✚ Applications Software
✚ Local-Area Network
✚ Wide-Area Network

11-15
© 2007 Prentice-Hall, Inc.
LAN
Exploring Business

11-16
© 2007 Prentice-Hall, Inc.
Data
Communication
Networks
Exploring Business

“…transmit digital data…from one


computer to another using a variety of
wired and wireless communication
channels.”
Internet
❈ Internet Service Providers
• World Wide Web/Browsers
•Intranets
❈ Extranets

11-17
© 2007 Prentice-Hall, Inc.
Technology Of The Web
Exploring Business

Web Pages
Web Sites
Webmaster
Home Page
Uniform Resource
Locator
Web Server
Search Engine
11-18
© 2007 Prentice-Hall, Inc.
Intranets/Extranets
Exploring Business

Intranet – “…a private network using…


technologies…available only to
employees....”
Firewall – Controls access to an
Intranet with software
Extranet – “…intranet…partially
available to certain parties outside the
organization.”
11-19
© 2007 Prentice-Hall, Inc.
Extranet
Exploring Business

11-20
© 2007 Prentice-Hall, Inc.
E-Commerce
Exploring Business

“…conducting business
over the Internet...”

11-21
© 2007 Prentice-Hall, Inc.
Business Uses
Of The Internet
Exploring Business

Presenting Information
Selling Products
Distributing Digital
Products
Acquiring Goods/Services
Virtual Company
11-22
© 2007 Prentice-Hall, Inc.
EDI
Exploring Business

11-23
© 2007 Prentice-Hall, Inc.
Security Issues In
Electronic Communication
Exploring Business

Data Security
Malicious
Programs
Spoofing
Revenue Theft
Risks to Customers
11-24
© 2007 Prentice-Hall, Inc.
Malicious Programs
Exploring Business

Viruses

Worms

Trojan Horses
11-25
© 2007 Prentice-Hall, Inc.
Types Of Revenue Theft
Exploring Business

Denial of Service

Piracy – Firewalls

11-26
© 2007 Prentice-Hall, Inc.
Risks To Customers
Exploring Business

Credit-Card Theft

Password Theft

Invasion of Privacy
11-27
© 2007 Prentice-Hall, Inc.
Cookies
Exploring Business

11-28
© 2007 Prentice-Hall, Inc.
Shoring Up Security
And Building Trust
Exploring Business

Encryption – “…process of encoding


data so that only individuals (or
computers) armed with a secret code
(or key) can decode it.”
Certificate Authority – “…a third party…
verifies the identity of the responding
computer and sends you a digital
certificate stating that it trusts the
site.”
11-29
© 2007 Prentice-Hall, Inc.
Careers In
Information
Management
Exploring Business

Chief Information
Officer

Chief Technology

Officer
11-30
© 2007 Prentice-Hall, Inc.

Das könnte Ihnen auch gefallen