1 / 27

Management Information Systems

Management Information Systems. Chapter 1. IS in the Life of Business Professionals. This Could Happen to You. Marketing Director needs an information system Lack of knowledge will impede progress Uncertainty will cause delays Ignorance about technology leaves her at a disadvantage.

Download Presentation

Management Information Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Management Information Systems Chapter 1 IS in the Life of Business Professionals

  2. This Could Happen to You • Marketing Director needs an information system • Lack of knowledge will impede progress • Uncertainty will cause delays • Ignorance about technology leaves her at a disadvantage

  3. Study Questions • Q1. What is an information system? • Q2. What is MIS? • Q3. How does IS differ from IT? • Q4. How do successful business people use IS? • Q5. What new opportunities for IS are developing today? • Q6. How can you create a strong password? • Q7. What is this class about?

  4. Q1. What Is an Information System? • Group of components that interact to produce information • Five fundamental components of computer-based information systems: • Computer hardware • Software • Data • Procedures • People

  5. Components of Computer-Based Information System

  6. Q2. MIS • Management information systems • Development and use of information systems that help businesses achieve goals and objectives • Key elements: • Development and use • Information systems • Business goals and objectives

  7. Development and Use • You need to: • Take an active role in order to insure that system will meet your needs • Understand how they are constructed • Consider the user’s needs during development • Learn how to employ the system • Take into account ancillary functions • Security • Backup

  8. Achieving Business Goals • MIS aids businesses in achieving objectives • Businesses themselves don’t do anything • People within the business act • MIS empowers users to reach goals • Exist to assist business people • Need to be developed for right reason

  9. Ask Questions • What will system do for you? • What is the purpose? • What will using it enable us to do? • What goal can we accomplish through its use? • Will it aid us in reaching our objectives?

  10. Q3. IT • Information technology • Methods • Inventions • Standards • Products • Raw technology • Hardware • Software • Data components

  11. How Does IT Differ from IS? • IT alone will not help an organization achieve goals • IT must be embedded into an IS to help accomplish objectives • Technology must be combined with people and procedure components • IS will make IT useful

  12. Q4. Business Uses of IS • E-mail • Accessing Web pages • Instant messages • Blogs

  13. Gaining a Competitive Advantage • Think about IT and IS when you consider opportunities and problems • Create innovative applications using emerging technology • Do not need to be a technology developer

  14. Q5. New Opportunities • Free data storage and free data transmission • Getty Images sells electronic pictures over the Internet. • Variable cost of production is zero • Revenue goes straight to bottom line • Media Partners produces automated online training and testing systems. • Variable cost of producing program essentially zero • Revenue goes straight to bottom line

  15. 資訊系統能創造什麼新的契機 (1) 資訊系統商機 ─ Getty Images 提供數位影像

  16. 資訊系統能創造什麼新的契機 (2) • 圖1-2 資訊系統商機 ─ Google 以 16 億 2 千萬美元買下 YouTube

  17. Moore’s Law • “The number of transistors per square inch on an integrated chip doubles every 18 months.” • The speed of a computer chip doubles every 18 months • Price/performance ratio of computers has fallen dramatically • Computers are smaller • Computers are less expensive

  18. 電腦的價格∕功能比持續下滑

  19. Q6. Security is Vital • Security is important in information systems • Passwords are necessary • Should be a strong password • Protect password from others • Practice proper etiquette

  20. 高強度密碼 • 微軟定義高強度密碼(Strong Password)應具有下列特徵: • 長度最少 7 個字 • 不含帳戶名稱、真實姓名或公司名稱 • 不論用的是哪種語言,不含字典裡有的「全字」 • 與以前用過的密碼不同 • 包含大小寫字體、數字和特殊字元(例如 ~ ! @; # $ % ^ & * ( ) _ + - = { } | [ ] \ : ” ’ < > ? , . /)

  21. 密碼成規 • 高強度密碼設定後就要好好保護 • 所謂合宜的密碼成規(Password Etiquette)就是說要如何正確處理以及對待這組密碼,是專業的一種態度行為: • 絕對不要寫下自己的密碼 • 不要和別人共用密碼 • 不要問別人的密碼是什麼 • 不要把你的密碼告訴別人

  22. Q7. This Class • Focus is on : • Learning to use tools to accomplish a business purpose • Understanding both business and technology • Relating business to technology • Using technology to gain a competitive advantage

  23. Applying IS to Help the Marketing Director (1) • Look for innovative applications of emerging technology • Work can be guided by the five components: • Computer • Software • Data • Procedures • People

  24. Applying IS to Help the Marketing Director (2) • Technology will continue to develop • Need to consider how technology can be used in other systems to accomplish goals • Stop unauthorized access • Disseminate news • Security

  25. Ethics Guide (1) • You overhear a conversation between a real estate agent and the couple competing with you to purchase a condo • Should you listen? • Should you use the information you hear? • You receive the same information through an e-mail accidentally sent to your inbox • Should you read the e-mail? • Should you use the information to your advantage?

  26. Ethics Guide (2) • You sell computer software. A customer mistakenly sends you an internal e-mail that contains the maximum amount they can pay • Do you read the e-mail? • Do you use the information?

  27. Ethics Guide (3) • A friend inadvertently e-mails you personal medical data. You read the e-mail and learn embarrassing information about the friend • How do you respond when the friend asks if you read the e-mail? • You are a network administrator with unrestricted access to mailing lists. You insert your e-mail address into several lists and receive confidential information. One e-mail shows that your best friend’s department is going to be eliminated • Do you warn him?

More Related