Top Banner
1 Chapter 17 Managing Information Designed & Prepared by B-books, Ltd. MGMT Chuck Williams
33

Chapter 17 Managing Information

Jan 03, 2016

Download

Documents

whitney-osborn

MGMT Chuck Williams. Chapter 17 Managing Information. Designed & Prepared by B-books, Ltd. Moore’s Law. Why Information Matters. After reading these sections, you should be able to:. explain the strategic importance of information. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter 17 Managing Information

1

Chapter 17Managing Information

Designed & Prepared byB-books, Ltd.

MGMT

Chuck Williams

Page 2: Chapter 17 Managing Information

2

Moore’s Law

Page 3: Chapter 17 Managing Information

3

Why Information Matters

After reading these sections, you should be able to:

1. explain the strategic importance of information.

2. describe the characteristics of useful information (i.e., its value and costs).

Page 4: Chapter 17 Managing Information

4

Data versus Information

• Raw data = facts + figures

• Information = useful data that influences choices

Page 5: Chapter 17 Managing Information

5

Strategic Importance of Information

First-MoverAdvantage

Sustaining aCompetitiveAdvantage

11

Page 6: Chapter 17 Managing Information

6

First-Mover Advantage

First-Mover Advantage

The strategic advantage that companies earn by being the first to use new information technology tolower costs or to differentiate a product.

1.11.1

Page 7: Chapter 17 Managing Information

7

Cable versus DSL

Cable companies have invested $90 billion over the last decade to create a first-mover advantage in delivering high-speed Internet.

Page 8: Chapter 17 Managing Information

8

Fast Facts on First Movers

First movers earn a 30% market share.

Later movers earn a 19% share.

Of market leaders, a whopping 70% were first movers.

ON AVERAGE:

Page 9: Chapter 17 Managing Information

9

Sustaining a Competitive Advantage

CompetitiveDisadvantage

CompetitiveDisadvantage

CompetitiveParity

CompetitiveParity

SustainedCompetitiveAdvantage

SustainedCompetitiveAdvantage

TemporaryCompetitiveAdvantage

TemporaryCompetitiveAdvantage

Is it difficultfor another firmto create or buy

the IT?

Is it difficultfor another firmto create or buy

the IT?

NO YES

Does the informationtechnology (IT)

createvalue?

Does the informationtechnology (IT)

createvalue?

NO YES

Is the IT differentacross

competing firms?

Is the IT differentacross

competing firms?

NO YES

1.21.2

Page 10: Chapter 17 Managing Information

10

• Accurate

• Verifiable

• Timely

• Organized

• Accessible

• Relevant

• Complete

Characteristics of Useful Information

22

Page 11: Chapter 17 Managing Information

11

Costs of Useful Information

• Acquisition• Processing• Storage• Retrieval• Communication Costs

22

Page 12: Chapter 17 Managing Information

12

Getting and Sharing Information

After reading these sections, you should be able to:

3. explain the basics of capturing, processing, and protecting information.

4. describe how companies can access and shareinformation and knowledge.

Page 13: Chapter 17 Managing Information

13

Capturing Information

ElectronicElectronicElectronicElectronic

ManualManualManualManual

Bar CodesBar Codes

Radio FrequencyIdentification Tags

Radio FrequencyIdentification Tags

Electronic ScannersElectronic Scanners

Optical Character Recognition

Optical Character Recognition3.13.1

Page 14: Chapter 17 Managing Information

14

Processing Information: Data Mining

SupervisedData Mining

SupervisedData Mining

Data Warehouse

Data Warehouse

UnsupervisedData Mining

UnsupervisedData Mining

DataClusters

DataClusters

SequencePatterns

SequencePatterns

PredictivePatterns

PredictivePatterns

AffinityPatterns

AffinityPatterns

3.23.2

Page 15: Chapter 17 Managing Information

15

Unsupervised Data Mining

DataClusters

DataClusters

SequencePatterns

SequencePatterns

PredictivePatterns

PredictivePatterns

AffinityPatterns

AffinityPatterns

Three or more database elementsoccur together

Three or more database elementsoccur together

One of the elements precedes the other

One of the elements precedes the other

Helps identify database elementsthat are different

Helps identify database elementsthat are different

Two or more database elementsoccur together significantly

Two or more database elementsoccur together significantly

3.23.2

Page 16: Chapter 17 Managing Information

16

Protecting Information

Authentication

Authorization

Two-factor authentication

Firewalls

Antivirus software

Data encryption

Virtual private networks

Secure Sockets Layer (SSL) encryption3.33.3

Page 17: Chapter 17 Managing Information

17

Protecting Information

Firewall - Security system consisting of hardware and/or software that prevents unauthorized intrusion

Page 18: Chapter 17 Managing Information

18

Protecting Information

• What is a biometric device?

Next

Authenticates person’s identity using personal characteristic Fingerprint, hand geometry, voice,

signature, and iris

Page 19: Chapter 17 Managing Information

19

Protecting Information

Next

• What is encryption?

Next

Safeguards against information theft Process of converting plaintext (readable data) into ciphertext

(unreadable characters) Encryption key (formula) often uses more than one method To read the data, the recipient must decrypt, or decipher, the data

Page 20: Chapter 17 Managing Information

20

Tips for Protecting Data

• Rule #1: Understand the real value of data (not just the value of the disk it’s on) and treat it accordingly.

• Encrypt data.

• Track data that you send to someone else.

• Use a coding system to label the value of a disk or a memory stick.

Source: B. Worthen, “Workers Losing Computer Data May Lack Awareness of its Value,” The Wall Street Journal, 27 November 2007, B3.

Beyond the Book

Page 21: Chapter 17 Managing Information

21

Accessing and SharingInformation and Knowledge

Internal Accessand

Information Sharing

Internal Accessand

Information Sharing

External Accessand

Information Sharing

External Accessand

Information Sharing

Sharing ofKnowledge and

Expertise

Sharing ofKnowledge and

Expertise44

Page 22: Chapter 17 Managing Information

22

Executive Information System (EIS)

• Uses internal and external data

• Used to monitor and analyze organizational performance

• Must provide accurate, complete, relevant, andtimely information to managers

4.14.1

Page 23: Chapter 17 Managing Information

23

Intranets

• Private company networks

• Allow employees to access, share, and publish information

• A firewall permits only authorized internalaccess

4.14.1

Page 24: Chapter 17 Managing Information

24

Why Companies Use Intranets

• Inexpensive

• Increase efficiencies and reduce costs

• Intuitive and easy to use

• Work across all computer systems

• Can be built on top of existing network

• Work with software programs that convert to HTML

• Software is available at no cost or is less expensive

4.14.1

Page 25: Chapter 17 Managing Information

25

Corporate PortalsCorporate Portals

A hybrid of executive information systemsand intranets that allow managers andemployees to use a Web browser to gainaccess to customized company information and to complete specialized transactions.

4.14.1

Page 26: Chapter 17 Managing Information

26

External Access and Sharing

Electronic Data InterchangeElectronic Data Interchange

ExtranetsExtranets

Web ServicesWeb Services

InternetInternet

4.24.2

Page 27: Chapter 17 Managing Information

27

Benefits of External Access

and Sharing

Increased productivityIncreased productivity

Reduced data entry errorsReduced data entry errors

Improved customer serviceImproved customer service

Faster communicationsFaster communications

Reduced costsReduced costs

4.24.2

Page 28: Chapter 17 Managing Information

28

Electronic Data Interchange (EDI)

ElectronicData

Interchange

ElectronicData

Interchange

When two companies convert their purchase and ordering informationto a standardized format to enablethe direct electronic transmission of that information from one computer system to the other.

When two companies convert their purchase and ordering informationto a standardized format to enablethe direct electronic transmission of that information from one computer system to the other.

4.24.2

Page 29: Chapter 17 Managing Information

29

Extranet

ExtranetExtranet

Allows companies to exchange information and conduct transactions with outsiders by providing them direct, Web-based access to authorized parts of a company’s intranet or information system.

Allows companies to exchange information and conduct transactions with outsiders by providing them direct, Web-based access to authorized parts of a company’s intranet or information system.

4.24.2

Page 30: Chapter 17 Managing Information

30

Web Services

Web ServicesWeb Services

Using standardized protocols to describe data from one company in such a way that those data can automatically be read, understood, transcribed, and processed by different computer systems in another company.

Using standardized protocols to describe data from one company in such a way that those data can automatically be read, understood, transcribed, and processed by different computer systems in another company.

4.24.2

Page 31: Chapter 17 Managing Information

31

Sharing Knowledge and Expertise

DecisionSupport System

DecisionSupport System

Helps managers to understand specific kinds of problems and potential solutions, and to analyze the impact of different decision options using “what if” scenarios.

Helps managers to understand specific kinds of problems and potential solutions, and to analyze the impact of different decision options using “what if” scenarios.

Expert SystemExpert System

An information system that contains the specialized knowledge and decision rules used by experts so that nonexperts can draw on this knowledge base to make decisions.

An information system that contains the specialized knowledge and decision rules used by experts so that nonexperts can draw on this knowledge base to make decisions.

4.34.3

Page 32: Chapter 17 Managing Information

32

• What is an expert system?

Captures and stores knowledge of human Captures and stores knowledge of human experts and then imitates human experts and then imitates human reasoning and decision makingreasoning and decision making

Captures and stores knowledge of human Captures and stores knowledge of human experts and then imitates human experts and then imitates human reasoning and decision makingreasoning and decision making

Consists of two componentsConsists of two componentsConsists of two componentsConsists of two components

knowledge base—knowledge base—combined subject combined subject

knowledge and knowledge and experiences of experiences of human expertshuman experts

knowledge base—knowledge base—combined subject combined subject

knowledge and knowledge and experiences of experiences of human expertshuman experts

inference rules—set inference rules—set of logical judgments of logical judgments

applied to the applied to the knowledge baseknowledge base

inference rules—set inference rules—set of logical judgments of logical judgments

applied to the applied to the knowledge baseknowledge base

Sharing Knowledge and Expertise

Page 33: Chapter 17 Managing Information

33

• What is an example of an expert system?Step 1. A user selects his or her gender

Step 2. Select the location on the body where the problem is being experienced

Step 3. Select the type of pain.

Step 5. Review the possible diagnosis.

Step 4. Select other information about the problem.

Sharing Knowledge and Expertise