Unformatted text preview:

Chapter 15 Using Technology to Manage Information Data Information and Information Systems data raw facts and figures that may may not be relevant to a business decision information knowledge gained from processing data information system organized method for collecting storing and communicating past present and projected information on internal operating and external intelligence chief information office CIO responsible for directing information systems in a large organization Components and Types of Information Systems computer based information systems systems rely on computer technology to store info electronically in an organized manner 4 components computer hardware computers smartphones PDAs computer software operating systems telecommunications networks encompass software hardware needed to provide data communication o o o o data resource management developing and maintaining an organization s databases Databases database centralized integrated collection of data resources one problem with databases is that they contribute to information overload another challenge with databases is keeping them safe one of the largest online databases is the US Census Bureau Types of Information Systems Operational Support Systems activities o Operational support systems info systems designed to produce a variety of info on an organization s o Transaction processing systems record and process data from business transactions o Process control systems monitor and control physical processes Management Support Systems o Management support systems info systems designed to provide support for effective decision making o Management information system designed to produce reports to managers o Decision support system gives direct support to businesspeople during a decision making process o Expert system computer program that imitates thinking thru complicated set of if then rules Computer Hardware and Software Types of Hardware hardware all tangible elements of a computer system o mouse keyboard DVD drive etc especially powerful mainframes called supercomputers can handle extremely rapid complex calculations server computer that supports network apps and allows for the sharing of software output devices and databases by all networked computers netbook newest types of notebook computer performs basic tasks hand held devices PDA smartphone Computer Software software all the programs routines and computer languages that control a computer and tell it how to operate application software program that performs the specific tasks that the user wants to carry out Computer Networks Local Area Networks Wide Area Networks Wireless Local Networks local area networks LANs computer networks that connect machines within limited areas wide area networks WANs tie larger geographical regions by using technology ex AT T WiFi wireless fidelity wireless networks connects various devices allows them to communicate thru radio waves intranet computer network that is similar to the internet but limits access to authorized users firewall intranet blocks outsiders without valid passwords from entering its network by incorporating both software and hardware Virtual Private Networks Virtual private networks VPNs use firewalls and programs that encapsulate data to make them more secure during transit Intranets VoIP voice over Internet protocol alternative to tradition telecommunication services provided by companies such VoIP as Verizon Security and Ethical Issues Affecting Information Systems E Crime common e crimes involve stealing or altering in several ways o employees may change data o employees may modify programs information system administrative try to prevent access to their systems by unauthorized users Computer Viruses Worms Trojan Horses Spyware viruses programs that secretly attach themselves to other programs hosts and change destroy data malware any malicious software program designed to infect computer systems worm small piece of software that exploits a security hole in a network to replicate itself trojan horse program that claims to do one thing but in reality does something else usually malicious spyware software that secretly gathers user info thru the user s internet without his knowledge usually advertising Disaster Recovery and Backup national disasters power failures equipment malfunctions software glitches human error terrorist attacks can disrupt even the most sophisticated computer info systems software glitches are no less serious disaster recovery planning deciding how to prevent system failures and continue operations if computer systems fail five important tasks regarding off site data storage o planning o backup schedule o data protected o selecting the right vendor o backup system should be tested Information System Trends managing an info system distributed workforce employees who no longer work in traditional offices but in virtual offices Application Service Provide outside supplier that provides both the computers and the application support for On demand utility computing firms rent the software time from application providers and pay only for their usage of the software Cloud computing uses powerful servers to store applications software and databases Grid computing consists of a network of smaller computer running special software software breaks down a large complex job into smaller tasks and then distributes them to networked computers6


View Full Document

UMD BMGT 110 - Chapter 15: Using Technology to Manage Information

Documents in this Course
Notes

Notes

3 pages

Chapter 3

Chapter 3

17 pages

Business

Business

10 pages

Chapter 3

Chapter 3

23 pages

Exam 1

Exam 1

9 pages

Final

Final

11 pages

CHAP. 1

CHAP. 1

89 pages

Chapter 1

Chapter 1

90 pages

People

People

2 pages

Ethics

Ethics

1 pages

Chapter 1

Chapter 1

92 pages

Chapter 1

Chapter 1

91 pages

Load more
Download Chapter 15: Using Technology to Manage Information
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Chapter 15: Using Technology to Manage Information and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Chapter 15: Using Technology to Manage Information and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?