chapter 14: information technology
DESCRIPTION
14th editionTRANSCRIPT
![Page 1: Chapter 14: Information Technology](https://reader036.vdocuments.mx/reader036/viewer/2022081414/54b5cfdb4a79595d338b4584/html5/thumbnails/1.jpg)
Using Technology to Manage Information
Chapter
14
![Page 2: Chapter 14: Information Technology](https://reader036.vdocuments.mx/reader036/viewer/2022081414/54b5cfdb4a79595d338b4584/html5/thumbnails/2.jpg)
Distinguish between data and information and explain the role of management information systems in business.
List the components and different types of information systems.
Outline how computer hardware and software are used to manage information.
Describe the networking and telecommunications technology and types of computer networks.
1
Learning Objectives
Discuss the security and ethical issues involving computer information systems.
Explain the steps that companies go through in anticipating, planning for, and recovering from information system disasters.
Review current trends in information systems.
2
3
4
5
6
7
![Page 3: Chapter 14: Information Technology](https://reader036.vdocuments.mx/reader036/viewer/2022081414/54b5cfdb4a79595d338b4584/html5/thumbnails/3.jpg)
Data– raw facts and figures Information– knowledge gained from processing data
Information system– organized method for collecting, storing, and communicating information on operations
Chief information officer– executive responsible for directing information systems and operations
Information Systems
![Page 4: Chapter 14: Information Technology](https://reader036.vdocuments.mx/reader036/viewer/2022081414/54b5cfdb4a79595d338b4584/html5/thumbnails/4.jpg)
Computer Hardware
Computer Software
Telecommunications and Computer Networks
Data Resource Management
Components of Information Systems
![Page 5: Chapter 14: Information Technology](https://reader036.vdocuments.mx/reader036/viewer/2022081414/54b5cfdb4a79595d338b4584/html5/thumbnails/5.jpg)
Operational Support Systems Transaction Processing System Process Control System
Management Support Systems Management Information System (MIS) Decision Support System (DSS) Executive Support System (ESS)
Types of Information Systems
![Page 6: Chapter 14: Information Technology](https://reader036.vdocuments.mx/reader036/viewer/2022081414/54b5cfdb4a79595d338b4584/html5/thumbnails/6.jpg)
The tangible elements of a computer system
The components that store and process data, perform calculations
Input devices like the keyboard and mouse allow users to enter data and commands.
Storage and processing components consist of the hard drive and other storage components like flash drives.
Computer Hardware
![Page 7: Chapter 14: Information Technology](https://reader036.vdocuments.mx/reader036/viewer/2022081414/54b5cfdb4a79595d338b4584/html5/thumbnails/7.jpg)
Desktop (personal) computers
Server Mainframes Supercomputers Notebook computers Handheld devices– PDAs and smart phones
Types of Computers
![Page 8: Chapter 14: Information Technology](https://reader036.vdocuments.mx/reader036/viewer/2022081414/54b5cfdb4a79595d338b4584/html5/thumbnails/8.jpg)
Programs, routines, and computer languages that control a computer
Operating System Windows Operating System Mac Operating System
Application Software Microsoft PowerPoint Quicken
Computer Software
![Page 9: Chapter 14: Information Technology](https://reader036.vdocuments.mx/reader036/viewer/2022081414/54b5cfdb4a79595d338b4584/html5/thumbnails/9.jpg)
The Internet Local Area Networks (LAN) Wide Area Networks (WAN) Wireless Local Networks (Wi-Fi)
Intranets Virtual Private Networks (VPN) Voice over Internet Protocol (VoIP)
Computer Networks
![Page 10: Chapter 14: Information Technology](https://reader036.vdocuments.mx/reader036/viewer/2022081414/54b5cfdb4a79595d338b4584/html5/thumbnails/10.jpg)
E-Crime Computer Viruses
Worms Trojan Horses Spyware
Security Issues
![Page 11: Chapter 14: Information Technology](https://reader036.vdocuments.mx/reader036/viewer/2022081414/54b5cfdb4a79595d338b4584/html5/thumbnails/11.jpg)
Use of information systems by employees and vendors: Personal use Privacy
Organizational use of information: Employment records Employee monitoring Customer data
Ethical Issues
![Page 12: Chapter 14: Information Technology](https://reader036.vdocuments.mx/reader036/viewer/2022081414/54b5cfdb4a79595d338b4584/html5/thumbnails/12.jpg)
Natural Disasters Power Failures Equipment Malfunctions
Software Glitches Human Error Terrorist Attacks The most basic precaution– backup.
Disaster Recovery and Backup
90% of firms that
sustained a loss of
critical data went
out of business
within two years.
90% of firms that
sustained a loss of
critical data went
out of business
within two years.
![Page 13: Chapter 14: Information Technology](https://reader036.vdocuments.mx/reader036/viewer/2022081414/54b5cfdb4a79595d338b4584/html5/thumbnails/13.jpg)
The Distributed Workforce Employees who work in virtual offices
Application Service Providers A firm that provides computers and application support
On Demand, Cloud, and Grid Computing Renting software time
Information Systems Trends
![Page 14: Chapter 14: Information Technology](https://reader036.vdocuments.mx/reader036/viewer/2022081414/54b5cfdb4a79595d338b4584/html5/thumbnails/14.jpg)