1 / 0

Lead Black Slide

Lead Black Slide. Chapter 14. Managing Information Systems and Technology. Our Agenda. Planning for Information Systems and Technology Acquiring Information Technology Organizing Information Systems Activities Controlling and Securing Information Systems. Our Agenda (cont’d.).

novia
Download Presentation

Lead Black Slide

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lead Black Slide Powered by DeSiaMore
  2. Chapter 14

    Managing Information Systems and Technology Powered by DeSiaMore
  3. Our Agenda Planning for Information Systems and Technology Acquiring Information Technology Organizing Information Systems Activities Controlling and Securing Information Systems Powered by DeSiaMore
  4. Our Agenda (cont’d.) The Effects of Information Technology on Employment Ethical Management of Information Systems and Technology Powered by DeSiaMore
  5. Learning Objectives Identify several factors that should be considered in planning for information systems and technology. Describe common sources for acquiring information technology. Describe the traditional organizational structure of an information systems department. Powered by DeSiaMore
  6. Learning Objectives (cont’d.) List the specialized personnel needed for World Wide Web and electronic commerce support. Identify methods used by organizations to control and secure their information systems. Powered by DeSiaMore
  7. Learning Objectives (cont’d.) Describe different forms of computer crime and ways of preventing them. List several effects of information technology on employment. Powered by DeSiaMore
  8. Planning for Information Systems and Technology

    Managing Information Systems and Technology Powered by DeSiaMore
  9. Planning for Information Systems and Technology The planning activity involves determining what should be done. Planning for information systems and technology involves determining what systems will be developed and what technology will be used in the future. Powered by DeSiaMore
  10. Planning for Information Systems and Technology (cont’d.) The planning horizon can involve varying amounts of time. Operational planning – a few weeks to a few months. Tactical planning – several months to a few years Strategic planning – several years to a decade or more Powered by DeSiaMore
  11. Planning for Information Systems and Technology (cont’d.) Planning involves evaluating risk. Risk is often related to three factors: Size of the system development project. Familiarity of the business with information technology used in the new system. Amount of structure in the systems development process. Powered by DeSiaMore
  12. Planning for Information Systems and Technology (cont’d.) Planning what information systems should be developed and what technology should be used involves selecting an application portfolio. An application portfolio is a description of what systems will be developed, and when, as well as an assessment of the risk associated with each system. Powered by DeSiaMore
  13. Acquiring Information Technology

    Managing Information Systems and Technology Powered by DeSiaMore
  14. Acquiring Information Technology Five categories of information technology to be purchased: Hardware Software Networks Data management Personnel and training Powered by DeSiaMore
  15. Hardware Computer hardware can be purchased from a number of sources. They include: Computer manufacturers Distributors Retail stores Value added resellers Powered by DeSiaMore
  16. Software Software can be developed from scratch, purchased as a package, or purchased and then modified. Sources include: Developed or modified In-house programmers Contract programmers Powered by DeSiaMore
  17. Software (cont’d.) Purchased Computer manufacturers Software companies Retail stores Value added resellers Powered by DeSiaMore
  18. Networks Technology for networks can be acquired from a number of sources. They include: Network companies Computer manufacturers Software companies Value added resellers Telecommunications companies Value added network companies Powered by DeSiaMore
  19. Data Management Acquiring data management technology first requires a decision about the basic approach to data management. Sources include: Computer manufacturers Software companies Database software companies Powered by DeSiaMore
  20. Personnel and Training Managers can select personnel from inside the organization or hire from the outside. Training departments with full-time instructors provide courses and other forms of training. Computer Based Training (CBT) software is used to train users online. Powered by DeSiaMore
  21. Organizing Information Systems Activities

    Managing Information Systems and Technology Powered by DeSiaMore
  22. Organizing Information Systems Activities Centralized versus decentralized management. Both management structures have advantages. Centralized is more economical with no duplication of personnel. Decentralized provides better response to user needs due to their proximity. Powered by DeSiaMore
  23. Organizing Information Systems Activities (cont’d.) In a centralized management structure, decisions related to the information systems and technology are made by a single, centrally located group of managers. Powered by DeSiaMore
  24. Organizing Information Systems Activities (cont’d.) In a decentralized management structure, decisions related to the information systems and technology are made by managers working in local departments or groups. Powered by DeSiaMore
  25. Information Systems Organizational Structure Department may be called Information Systems (IS), Management Information Systems (MIS), Information Technology (IT), or something similar. Headed by an information systems manager, sometimes called a Chief Information Officer (CIO). Powered by DeSiaMore
  26. Information Systems Organizational Structure (cont’d.) Traditional organization of an information systems department: Systems department Operations department Technical support department End-user support department WWW and electronic commerce support Powered by DeSiaMore
  27. Systems Department Concerned with developing and maintaining information systems. Staff includes: Systems analysts Programmers, sometimes called application programmers Programmer/Analyst when a person performs both functions Powered by DeSiaMore
  28. Operations Department Concerned with operating the computer and network equipment needed in information systems. Staff includes: Computer operators Data entry operators Powered by DeSiaMore
  29. Technical Support Department Provides assistance in technical specialties to other areas. Staff includes: Database administrator System programmers Network analysts Network administrators Powered by DeSiaMore
  30. End-user Support Department Helps users develop and use computer applications, mainly on personal computers. Staff includes: Personal computer analysts Help desk operators Technical trainers Powered by DeSiaMore
  31. WWW and Electronic Commerce Support People involved in Web and e-commerce support are often part of the system development area in the information systems department. Staff includes: Webmaster Web programmers Multimedia developers E-commerce project manager Powered by DeSiaMore
  32. Controlling and Securing Information Systems

    Managing Information Systems and Technology Powered by DeSiaMore
  33. Controlling and Securing Information Systems Information system controls Application controls – designed to ensure that the application processes all data correctly and produces the desired output. Input controls Data validation Output controls Storage controls Processing controls Powered by DeSiaMore
  34. Controlling and Securing Information Systems (cont’d.) Hardware controls Error-checking hardware Parity bits Duplicate or redundant hardware RAID disk system – Redundant Array of Inexpensive Disks Fault-tolerant computer systems Uninterruptible Power Supply – UPS Powered by DeSiaMore
  35. Controlling and Securing Information Systems (cont’d.) Failure recovery procedures Backup and recovery procedures Disaster recovery plan Information system security Physical security Electronic security Powered by DeSiaMore
  36. Controlling and Securing Information Systems (cont’d.) Preventing computer crime requires special forms of security. Common computer crimes include: Theft of money Theft of data Theft and destruction of hardware Illegal copying of software Destruction of data and software Powered by DeSiaMore
  37. The Effects of Information Technology on Employment

    Managing Information Systems and Technology Powered by DeSiaMore
  38. The Effects of Information Technology on Employment The effects of information technology on employment include: Displaced employees Changing patterns of work Employee health Powered by DeSiaMore
  39. Ethical Management of Information Systems and Technology

    Managing Information Systems and Technology Powered by DeSiaMore
  40. Ethical Management of Information Systems and Technology Ethical issues include: Privacy – what information should remain confidential Accuracy – is the information accurate Property – who owns the information Access – who needs to have access to the information Powered by DeSiaMore
  41. Managing Information Systems and Technology

    Key Terms Powered by DeSiaMore
  42. Application Portfolio Application Programmer Chief Information Officer (CIO) Computer-Based Training (CBT) Computer Operator Data Entry Operator E-commerce Project Manager Fault-Tolerant Computer System Hacker Help Desk Help Desk Operator Information Center Information Systems Manager Multimedia Developer Key Terms Powered by DeSiaMore
  43. Network Analyst (Administrator) Personal Computer Analyst Planning Horizon Programmer/Analyst Public Domain Software Shareware Site License Software License Agreement Software Piracy System Programmer Technical Trainer UPS Value Added Reseller (VAR) Virus Key Terms (cont’d.) Powered by DeSiaMore
  44. Webmaster Web Programmer Key Terms (cont’d.) Powered by DeSiaMore
  45. Summary Planning for Information Systems and Technology Acquiring Information Technology Organizing Information Systems Activities Controlling and Securing Information Systems Powered by DeSiaMore
  46. Summary (cont’d.) The Effects of Information Technology on Employment Ethical Management of Information Systems and Technology Powered by DeSiaMore
  47. Final Black Slide Powered by DeSiaMore
More Related