Top Banner
Lead Black Slide Powered by DeSiaMore 1
47

Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Dec 27, 2015

Download

Documents

Kathleen West
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Lead Black Slide

Page 2: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 2

Chapter 14

Managing Information Systems

andTechnology

Page 3: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 3

Our Agenda Planning for Information Systems

and Technology Acquiring Information Technology Organizing Information Systems

Activities Controlling and Securing

Information Systems

Page 4: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 4

Our Agenda (cont’d.) The Effects of Information

Technology on Employment Ethical Management of Information

Systems and Technology

Page 5: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 5

Learning Objectives Identify several factors that should

be considered in planning for information systems and technology.

Describe common sources for acquiring information technology.

Describe the traditional organizational structure of an information systems department.

Page 6: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 6

Learning Objectives (cont’d.) List the specialized personnel

needed for World Wide Web and electronic commerce support.

Identify methods used by organizations to control and secure their information systems.

Page 7: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 7

Learning Objectives (cont’d.) Describe different forms of

computer crime and ways of preventing them.

List several effects of information technology on employment.

Page 8: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 8

Planning for Information Systems and Technology

Managing Information Systems

andTechnology

Page 9: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 9

Planning for Information Systems and Technology

The planning activity involves determining what should be done.

Planning for information systems and technology involves determining what systems will be developed and what technology will be used in the future.

Page 10: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 10

Planning for Information Systems and Technology (cont’d.)

The planning horizon can involve varying amounts of time. Operational planning – a few weeks to

a few months. Tactical planning – several months to a

few years Strategic planning – several years to a

decade or more

Page 11: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 11

Planning for Information Systems and Technology (cont’d.)

Planning involves evaluating risk. Risk is often related to three

factors:1. Size of the system development

project.2. Familiarity of the business with

information technology used in the new system.

3. Amount of structure in the systems development process.

Page 12: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 12

Planning for Information Systems and Technology (cont’d.)

Planning what information systems should be developed and what technology should be used involves selecting an application portfolio.

An application portfolio is a description of what systems will be developed, and when, as well as an assessment of the risk associated with each system.

Page 13: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 13

Acquiring Information Technology

Managing Information Systems

andTechnology

Page 14: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 14

Acquiring Information Technology Five categories of information

technology to be purchased: Hardware Software Networks Data management Personnel and training

Page 15: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 15

Hardware Computer hardware can be

purchased from a number of sources. They include: Computer manufacturers Distributors Retail stores Value added resellers

Page 16: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 16

Software Software can be developed from

scratch, purchased as a package, or purchased and then modified. Sources include: Developed or modified

In-house programmers Contract programmers

Page 17: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 17

Software (cont’d.) Purchased

Computer manufacturers Software companies Retail stores Value added resellers

Page 18: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 18

Networks Technology for networks can be

acquired from a number of sources. They include: Network companies Computer manufacturers Software companies Value added resellers Telecommunications companies Value added network companies

Page 19: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 19

Data Management Acquiring data management

technology first requires a decision about the basic approach to data management.

Sources include: Computer manufacturers Software companies Database software companies

Page 20: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 20

Personnel and Training Managers can select personnel

from inside the organization or hire from the outside.

Training departments with full-time instructors provide courses and other forms of training.

Computer Based Training (CBT) software is used to train users online.

Page 21: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 21

Organizing Information Systems Activities

Managing Information Systems

andTechnology

Page 22: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 22

Organizing Information Systems Activities Centralized versus decentralized

management. Both management structures have

advantages. Centralized is more economical with

no duplication of personnel. Decentralized provides better

response to user needs due to their proximity.

Page 23: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 23

Organizing Information Systems Activities (cont’d.) In a centralized management

structure, decisions related to the information systems and technology are made by a single, centrally located group of managers.

Page 24: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 24

Organizing Information Systems Activities (cont’d.) In a decentralized management

structure, decisions related to the information systems and technology are made by managers working in local departments or groups.

Page 25: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 25

Information Systems Organizational Structure Department may be called

Information Systems (IS), Management Information Systems (MIS), Information Technology (IT), or something similar.

Headed by an information systems manager, sometimes called a Chief Information Officer (CIO).

Page 26: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 26

Information Systems Organizational Structure (cont’d.)

Traditional organization of an information systems department: Systems department Operations department Technical support department End-user support department WWW and electronic commerce

support

Page 27: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 27

Systems Department

Concerned with developing and maintaining information systems.

Staff includes: Systems analysts Programmers, sometimes called

application programmers Programmer/Analyst when a person

performs both functions

Page 28: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 28

Operations Department

Concerned with operating the computer and network equipment needed in information systems.

Staff includes: Computer operators Data entry operators

Page 29: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 29

Technical Support Department

Provides assistance in technical specialties to other areas.

Staff includes: Database administrator System programmers Network analysts Network administrators

Page 30: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 30

End-user Support Department

Helps users develop and use computer applications, mainly on personal computers.

Staff includes: Personal computer analysts Help desk operators Technical trainers

Page 31: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 31

WWW and Electronic Commerce Support

People involved in Web and e-commerce support are often part of the system development area in the information systems department.

Staff includes: Webmaster Web programmers Multimedia developers E-commerce project manager

Page 32: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 32

Controlling and Securing Information Systems

Managing Information Systems

andTechnology

Page 33: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 33

Controlling and Securing Information Systems Information system controls

Application controls – designed to ensure that the application processes all data correctly and produces the desired output.

Input controls Data validation Output controls Storage controls Processing controls

Page 34: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 34

Controlling and Securing Information Systems (cont’d.)

Hardware controls Error-checking hardware Parity bits Duplicate or redundant hardware RAID disk system – Redundant Array of

Inexpensive Disks Fault-tolerant computer systems Uninterruptible Power Supply – UPS

Page 35: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 35

Controlling and Securing Information Systems (cont’d.)

Failure recovery procedures Backup and recovery procedures Disaster recovery plan

Information system security Physical security Electronic security

Page 36: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 36

Controlling and Securing Information Systems (cont’d.) Preventing computer crime

requires special forms of security. Common computer crimes include: Theft of money Theft of data Theft and destruction of hardware Illegal copying of software Destruction of data and software

Page 37: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 37

The Effects of Information Technology on Employment

Managing Information Systems

andTechnology

Page 38: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 38

The Effects of Information Technology on Employment The effects of information

technology on employment include: Displaced employees Changing patterns of work Employee health

Page 39: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 39

Ethical Management of Information Systems and Technology

Managing Information Systems

andTechnology

Page 40: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 40

Ethical Management of Information Systems and Technology

Ethical issues include: Privacy – what information should

remain confidential Accuracy – is the information accurate Property – who owns the information Access – who needs to have access to

the information

Page 41: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 41

Managing Information Systems and Technology

Key Terms

Page 42: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 42

Key Terms Application Portfolio Application Programmer Chief Information Officer (CIO) Computer-Based Training (CBT) Computer Operator Data Entry Operator E-commerce Project Manager

Fault-Tolerant Computer System Hacker Help Desk Help Desk Operator Information Center Information Systems Manager Multimedia Developer

Page 43: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 43

Key Terms (cont’d.) Network Analyst (Administrator) Personal Computer Analyst Planning Horizon Programmer/Analyst Public Domain Software Shareware Site License

Software License Agreement Software Piracy System Programmer Technical Trainer UPS Value Added Reseller (VAR) Virus

Page 44: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 44

Key Terms (cont’d.) Webmaster Web Programmer

Page 45: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 45

Summary Planning for Information Systems

and Technology Acquiring Information Technology Organizing Information Systems

Activities Controlling and Securing

Information Systems

Page 46: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Powered by DeSiaMore 46

Summary (cont’d.) The Effects of Information

Technology on Employment Ethical Management of Information

Systems and Technology

Page 47: Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.

Final Black Slide