Chapter
14
Using Technology to Manage
Information
Learning Objectives
1
Distinguish between data and information
and explain the role of management
information systems in business.
2
List the components and different types of
information systems.
3
Outline how computer hardware and
software are used to manage information.
5
6
7
4
Describe the networking and
telecommunications technology and types
of computer networks.
Discuss the security and ethical
issues involving computer
information systems.
Explain the steps that companies go
through in anticipating, planning for,
and recovering from information
system disasters.
Review current trends in information
systems.
Information Systems




Data– raw facts and figures
Information– knowledge gained from
processing data
Information system– organized method for
collecting, storing, and communicating
information on operations
Chief information officer– executive
responsible for directing information systems
and operations
Components of Information
Systems

Computer Hardware

Computer Software

Telecommunications and Computer Networks

Data Resource Management
Types of Information Systems

Operational Support Systems



Transaction Processing System
Process Control System
Management Support Systems



Management Information System (MIS)
Decision Support System (DSS)
Executive Support System (ESS)
Computer Hardware




The tangible elements of a computer system
The components that store and process data,
perform calculations
Input devices like the keyboard and mouse allow
users to enter data and commands.
Storage and processing components consist of
the hard drive and other storage components
like flash drives.
Types of Computers






Desktop (personal)
computers
Server
Mainframes
Supercomputers
Notebook computers
Handheld devices– PDAs
and smart phones
Computer Software

Programs, routines, and computer
languages that control a computer

Operating System



Windows Operating System
Mac Operating System
Application Software


Microsoft PowerPoint
Quicken
Computer Networks







The Internet
Local Area Networks (LAN)
Wide Area Networks (WAN)
Wireless Local Networks (Wi-Fi)
Intranets
Virtual Private Networks (VPN)
Voice over Internet Protocol (VoIP)
Security Issues


E-Crime
Computer Viruses



Worms
Trojan Horses
Spyware
Ethical Issues

Use of information systems by employees
and vendors:



Personal use
Privacy
Organizational use of information:



Employment records
Employee monitoring
Customer data
Disaster Recovery and Backup







Natural Disasters
Power Failures
Equipment Malfunctions
Software Glitches
Human Error
Terrorist Attacks
The most basic
precaution– backup.
90% of firms that
sustained a loss of
critical data went out of
business within two
years.
Information Systems Trends

The Distributed Workforce


Application Service
Providers


Employees who work in
virtual offices
A firm that provides
computers and application
support
On Demand, Cloud, and
Grid Computing

Renting software time
Descargar

Options for Organizing Small and Large Businesses