Title: Using Technology to Manage Information
1Using Technology to Manage Information
14
Chapter
2Learning Objectives
Distinguish between data and information and
explain the role of management information
systems in business. List the components and
different types of information systems. Outline
how computer hardware and software are used to
manage information. Describe the networking and
telecommunications technology and types of
computer networks.
Discuss the security and ethical issues involving
computer information systems. Explain the steps
that companies go through in anticipating,
planning for, and recovering from information
system disasters. Review current trends in
information systems.
3Information Systems
- Data raw facts and figures
- Information knowledge gained from processing
data - Information system organized method for
collecting, storing, and communicating
information on operations - Chief information officer executive responsible
for directing information systems and operations
4Components of Information Systems
- Computer Hardware
- Computer Software
- Telecommunications and Computer Networks
- Data Resource Management
5Types of Information Systems
- Operational Support Systems
- Transaction Processing System
- Process Control System
- Management Support Systems
- Management Information System (MIS)
- Decision Support System (DSS)
- Executive Support System (ESS)
6Computer Hardware
- The tangible elements of a computer system
- The components that store and process data,
perform calculations - Input devices like the keyboard and mouse allow
users to enter data and commands. - Storage and processing components consist of the
hard drive and other storage components like
flash drives.
7Types of Computers
- Desktop (personal) computers
- Server
- Mainframes
- Supercomputers
- Notebook computers
- Handheld devices PDAs and smart phones
8Computer Software
- Programs, routines, and computer languages that
control a computer - Operating System
- Windows Operating System
- Mac Operating System
- Application Software
- Microsoft PowerPoint
- Quicken
9Computer Networks
- The Internet
- Local Area Networks (LAN)
- Wide Area Networks (WAN)
- Wireless Local Networks (Wi-Fi)
- Intranets
- Virtual Private Networks (VPN)
- Voice over Internet Protocol (VoIP)
10Security Issues
- E-Crime
- Computer Viruses
- Worms
- Trojan Horses
- Spyware
11Ethical Issues
- Use of information systems by employees and
vendors - Personal use
- Privacy
- Organizational use of information
- Employment records
- Employee monitoring
- Customer data
12Disaster Recovery and Backup
- Natural Disasters
- Power Failures
- Equipment Malfunctions
- Software Glitches
- Human Error
- Terrorist Attacks
- The most basic precaution backup.
90 of firms that sustained a loss of critical
data went out of business within two years.
13Information Systems Trends
- The Distributed Workforce
- Employees who work in virtual offices
- Application Service Providers
- A firm that provides computers and application
support - On Demand, Cloud, and Grid Computing
- Renting software time
14