140 likes | 253 Views
14. Chapter. Using Technology to Manage Information. 1. 2. 3. 4. 5. 6. 7. Learning Objectives. Distinguish between data and information and explain the role of management information systems in business. List the components and different types of information systems.
E N D
14 Chapter Using Technology to Manage Information
1 2 3 4 5 6 7 Learning Objectives Distinguish between data and information and explain the role of management information systems in business. List the components and different types of information systems. Outline how computer hardware and software are used to manage information. Describe the networking and telecommunications technology and types of computer networks. Discuss the security and ethical issues involving computer information systems. Explain the steps that companies go through in anticipating, planning for, and recovering from information system disasters. Review current trends in information systems.
Data– raw facts and figures Information–knowledge gained from processing data Information system– organized method for collecting, storing, and communicating information on operations Chief information officer– executive responsible for directing information systems and operations Information Systems
Computer Hardware Computer Software Telecommunications and Computer Networks Data Resource Management Components of Information Systems
Operational Support Systems Transaction Processing System Process Control System Management Support Systems Management Information System (MIS) Decision Support System (DSS) Executive Support System (ESS) Types of Information Systems
The tangible elements of a computer system The components that store and process data, perform calculations Input devices like the keyboard and mouse allow users to enter data and commands. Storage and processing components consist of the hard drive and other storage components like flash drives. Computer Hardware
Desktop (personal) computers Server Mainframes Supercomputers Notebook computers Handheld devices– PDAs and smart phones Types of Computers
Programs, routines, and computer languages that control a computer Operating System Windows Operating System Mac Operating System Application Software Microsoft PowerPoint Quicken Computer Software
The Internet Local Area Networks (LAN) Wide Area Networks (WAN) Wireless Local Networks (Wi-Fi) Intranets Virtual Private Networks (VPN) Voice over Internet Protocol (VoIP) Computer Networks
E-Crime Computer Viruses Worms Trojan Horses Spyware Security Issues
Use of information systems by employees and vendors: Personal use Privacy Organizational use of information: Employment records Employee monitoring Customer data Ethical Issues
Natural Disasters Power Failures Equipment Malfunctions Software Glitches Human Error Terrorist Attacks The most basic precaution– backup. Disaster Recovery and Backup 90% of firms that sustained a loss of critical data went out of business within two years.
The Distributed Workforce Employees who work in virtual offices Application Service Providers A firm that provides computers and application support On Demand, Cloud, and Grid Computing Renting software time Information Systems Trends