Unformatted text preview:

I The Role of Information Technology Data driven decision making lifts productivity 5 6 higher than trad l decision making based on experience and intuition data processing DP name for business technology in the 1970s included technology that supported an existing business and was primarily used to improve A Evolution from Data Processing to Business Intelligence the flow of financial information Data raw unanalyzed and unorganized facts figured Information processes and organized data that managers can use for decision making information systems IS technology that helps companies do business includes such tools as automated teller machines ATMs and voice mail 1980s information technology IT technology that helps companies change business by allowing them to use new methods business intelligence BI any of a variety of software applications that analyze an organization s raw data and take out useful insights from it analytics Changes trad l flow of information database comes to the individual helps businesspeople focus on what s important deciding how to react to problems opportunities B How Information Technology Changes Business IT broke time and location barriers II Types of Information cid 127 business process information all transaction data info gained through operations cid 127 physical world observations radio frequencies cameras wireless access GPS etc cid 127 biological data improved fingerprint technology retina scanners voice face recognition cid 127 public data electronic traces we leave when posting to the internet email IM cid 127 data that indicate personal preferences or intentions A Managing Information infoglut an overabundance of data Usefulness of management information depends on 1 Quality 2 Completeness 3 Timeliness 4 Relevance B Organizing E Mail and Electronic Files 1 Use your e mail program s organizing tools 2 Use consistent file names 3 Use online backup services 4 Use desktop search software C Storing and Mining Data data warehouse stores data on a single subject over a specific period data mining technique for looking for hidden patterns and previously unknown relationships among the data III The Heart of Knowledge Management The Internet intranet a companywide network closed to public access that uses Internet type technology extranet a semiprivate network that uses Internet technology and allows more than one company to access the same information or allows people on different servers to collaborate virtual private network VPN a private data network that creates secure connections or tunnels over regular Internet lines Gives users same capabilities as extranet at much lower cost by using shared public resources rather than private ones enterprise portal centralizes information and transactions and serves as an entry point to a variety of resources Challenge to the CIO is to integrate resources info reports etc so they appear seamless A Broadband Technology broadband technology technology that offers a continuous connection to the Internet that allows users to send and receive mammoth video voice and data files faster than ever before More capitalistic pay more use more Internet2 the private internet system that links gov t supercomputer centers and a select group of universities vBNS very high speed backbone network service it runs more than 22 000 times faster than today s public infrastructure and supports heavy duty applications B Social Media and Web 2 0 employee productivity may go down single disparaging remark can have devastating effects Web 2 0 the set of tools that allow people to build social and business connections share information and collaborate on projects online with user generated sets like blogs wikis social networking sites and other online communities and virtual worlds Web 3 0 a combination of technologies that adds intelligence and changes how people interact with the Web and vice versa consists of the semantic Web C Web 3 0 1 0 Static Web 2 0 Social Web 3 0 Personal Web mobile Web and immersive Internet semantic web powerful intelligent decision making applications mobile Web allows users to use the Web as they move from one device and location to another immersive Internet virtual worlds augmented reality and 3D environments network computing system client server computing computing systems that allow personal computers clients to obtain needed information from huge virtualization a process that allows networked computers to run multiple operating systems and programs through one central computer at the same time cloud computing a form of virtualization in which a company s data and applications are stored at offsite data centers that are accessed over the internet 1 private clouds wholly behind a firewall 2 public clouds run on remote computers 3 hybrid clouds private cloud for essential tasks but use a public cloud as needed shareware software that is copyrighted but distributed to potential customers free of charge public domain software freeware software that is free for the taking VI Effects of Information Technology on Management A Human Resource Issues HR managers need to recruit employees who know how to use the technology or train those who already work in the company nanobots nearly autonomous not in the office doing business in their own time staff IV The Enabling Technology Hardware A Mobile Devices wireless fidelity wi fi B Computer Networks databases in a central computer server C Virtualization and Cloud Computing Advantages cid 127 reduced software costs cid 127 improved security cid 127 capacity cid 127 equipment cid 127 access V Software telecommuting B Security Issues virus a piece of programming code inserted into other programming that usually lies dormant until triggered to cause some unexpected and for the victim usually undesirable event cyberterrorism terrorist hackers phishing takes personal info and uses it to commit fraud through inauthentic sites Critical Infrastructure Protection Board was created to decide a plan for improving the security of the U S critical infrastructure Critical Infrastructure Information Act of 2002 assured businesses that any info they provided the Department of Homeland Security will remain secret through an exemption from the Freedom of Information Act cookies pieces of information such as registration data or user preferences that the browser sends back to the server whenever you return to that website C Privacy Issues D Stability Issues


View Full Document

DREXEL BUSN 102 - The Role of Information Technology

Download The Role of Information Technology
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view The Role of Information Technology and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view The Role of Information Technology and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?