Lead Black Slide
Chapter 14
Managing Information Systems and
Technology
© 2001 Business & Information Systems 2/e 2
Our Agenda
Planning for Information Systems and
Technology
Acquiring Information Technology
Organizing Information Systems
Activities
Controlling and Securing Information
Systems
© 2001 Business & Information Systems 2/e 3
Our Agenda (cont’d.)
The Effects of Information Technology on Employment
Ethical Management of Information
Systems and Technology
© 2001 Business & Information Systems 2/e 4
Learning Objectives
Identify several factors that should be considered in planning for information systems and technology.
Describe common sources for acquiring information technology.
Describe the traditional organizational structure of an information systems department.
© 2001 Business & Information Systems 2/e 5
Learning Objectives (cont’d.)
List the specialized personnel needed for World Wide Web and electronic commerce support.
Identify methods used by organizations to control and secure their information systems.
© 2001 Business & Information Systems 2/e 6
Learning Objectives (cont’d.)
Describe different forms of computer crime and ways of preventing them.
List several effects of information technology on employment.
© 2001 Business & Information Systems 2/e 7
Planning for Information
Systems and Technology
Managing Information Systems and
Technology
© 2001 Business & Information Systems 2/e 8
Planning for Information
Systems and Technology
The planning activity involves determining what should be done.
Planning for information systems and technology involves determining what systems will be developed and what technology will be used in the future.
© 2001 Business & Information Systems 2/e 9
Planning for Information Systems and Technology (cont’d.)
The planning horizon can involve varying amounts of time.
Operational planning – a few weeks to a few months.
Tactical planning – several months to a few years
Strategic planning – several years to a decade or more
© 2001 Business & Information Systems 2/e 10
Planning for Information Systems and Technology (cont’d.)
Planning involves evaluating risk.
Risk is often related to three factors:
1.
Size of the system development project.
2.
Familiarity of the business with information technology used in the new system.
3.
Amount of structure in the systems development process.
© 2001 Business & Information Systems 2/e 11
Planning for Information Systems and Technology (cont’d.)
Planning what information systems should be developed and what technology should be used involves selecting an application portfolio .
An application portfolio is a description of what systems will be developed, and when, as well as an assessment of the risk associated with each system.
© 2001 Business & Information Systems 2/e 12
Acquiring Information
Technology
Managing Information Systems and
Technology
© 2001 Business & Information Systems 2/e 13
Acquiring Information
Technology
Five categories of information technology to be purchased:
Hardware
Software
Networks
Data management
Personnel and training
© 2001 Business & Information Systems 2/e 14
Hardware
Computer hardware can be purchased from a number of sources. They include:
Computer manufacturers
Distributors
Retail stores
Value added resellers
© 2001 Business & Information Systems 2/e 15
Software
Software can be developed from scratch, purchased as a package, or purchased and then modified. Sources include:
Developed or modified
In-house programmers
Contract programmers
© 2001 Business & Information Systems 2/e 16
Software (cont’d.)
Purchased
Computer manufacturers
Software companies
Retail stores
Value added resellers
© 2001 Business & Information Systems 2/e 17
Networks
Technology for networks can be acquired from a number of sources.
They include:
Network companies
Computer manufacturers
Software companies
Value added resellers
Telecommunications companies
Value added network companies
© 2001 Business & Information Systems 2/e 18
Data Management
Acquiring data management technology first requires a decision about the basic approach to data management.
Sources include:
Computer manufacturers
Software companies
Database software companies
© 2001 Business & Information Systems 2/e 19
Personnel and Training
Managers can select personnel from inside the organization or hire from the outside.
Training departments with full-time instructors provide courses and other forms of training.
Computer Based Training (CBT) software is used to train users online.
© 2001 Business & Information Systems 2/e 20
Organizing Information
Systems Activities
Managing Information Systems and
Technology
© 2001 Business & Information Systems 2/e 21
Organizing Information
Systems Activities
Centralized versus decentralized management.
Both management structures have advantages.
Centralized is more economical with no duplication of personnel.
Decentralized provides better response to user needs due to their proximity.
© 2001 Business & Information Systems 2/e 22
Organizing Information
Systems Activities (cont’d.)
In a centralized management structure, decisions related to the information systems and technology are made by a single, centrally located group of managers.
© 2001 Business & Information Systems 2/e 23
Organizing Information
Systems Activities (cont’d.)
In a decentralized management structure, decisions related to the information systems and technology are made by managers working in local departments or groups.
© 2001 Business & Information Systems 2/e 24
Information Systems
Organizational Structure
Department may be called Information
Systems (IS), Management Information
Systems (MIS), Information Technology
(IT), or something similar.
Headed by an information systems manager, sometimes called a Chief
Information Officer (CIO).
© 2001 Business & Information Systems 2/e 25
Information Systems
Organizational Structure (cont’d.)
Traditional organization of an information systems department:
Systems department
Operations department
Technical support department
End-user support department
WWW and electronic commerce support
© 2001 Business & Information Systems 2/e 26
Systems Department
Concerned with developing and maintaining information systems.
Staff includes:
Systems analysts
Programmers , sometimes called application programmers
Programmer/Analyst when a person performs both functions
© 2001 Business & Information Systems 2/e 27
Operations Department
Concerned with operating the computer and network equipment needed in information systems.
Staff includes:
Computer operators
Data entry operators
© 2001 Business & Information Systems 2/e 28
Technical Support Department
Provides assistance in technical specialties to other areas.
Staff includes:
Database administrator
System programmers
Network analysts
Network administrators
© 2001 Business & Information Systems 2/e 29
End-user Support Department
Helps users develop and use computer applications, mainly on personal computers.
Staff includes:
Personal computer analysts
Help desk operators
Technical trainers
© 2001 Business & Information Systems 2/e 30
WWW and Electronic Commerce
Support
People involved in Web and e-commerce support are often part of the system development area in the information systems department.
Staff includes:
Webmaster
Web programmers
Multimedia developers
E-commerce project manager
© 2001 Business & Information Systems 2/e 31
Controlling and Securing
Information Systems
Managing Information Systems and
Technology
© 2001 Business & Information Systems 2/e 32
Controlling and Securing
Information Systems
Information system controls
Application controls – designed to ensure that the application processes all data correctly and produces the desired output.
Input controls
Data validation
Output controls
Storage controls
Processing controls
© 2001 Business & Information Systems 2/e 33
Controlling and Securing
Information Systems (cont’d.)
Hardware controls
Error-checking hardware
Parity bits
Duplicate or redundant hardware
RAID disk system – Redundant Array of
Inexpensive Disks
Fault-tolerant computer systems
Uninterruptible Power Supply – UPS
© 2001 Business & Information Systems 2/e 34
Controlling and Securing
Information Systems (cont’d.)
Failure recovery procedures
Backup and recovery procedures
Disaster recovery plan
Information system security
Physical security
Electronic security
© 2001 Business & Information Systems 2/e 35
Controlling and Securing
Information Systems (cont’d.)
Preventing computer crime requires special forms of security. Common computer crimes include:
Theft of money
Theft of data
Theft and destruction of hardware
Illegal copying of software
Destruction of data and software
© 2001 Business & Information Systems 2/e 36
The Effects of Information
Technology on Employment
Managing Information Systems and
Technology
© 2001 Business & Information Systems 2/e 37
The Effects of Information
Technology on Employment
The effects of information technology on employment include:
Displaced employees
Changing patterns of work
Employee health
© 2001 Business & Information Systems 2/e 38
Ethical Management of
Information Systems and
Technology
Managing Information Systems and
Technology
© 2001 Business & Information Systems 2/e 39
Ethical Management of Information
Systems and Technology
Ethical issues include:
Privacy – what information should remain confidential
Accuracy – is the information accurate
Property – who owns the information
Access – who needs to have access to the information
© 2001 Business & Information Systems 2/e 40
Managing Information
Systems and Technology
Key Terms
© 2001 Business & Information Systems 2/e 41
Key Terms
Application Portfolio
Application Programmer
Chief Information
Officer (CIO)
Computer-Based
Training (CBT)
Computer Operator
Data Entry Operator
E-commerce Project
Manager
Fault-Tolerant Computer
System
Hacker
Help Desk
Help Desk Operator
Information Center
Information Systems
Manager
Multimedia Developer
© 2001 Business & Information Systems 2/e 42
Key Terms (cont’d.)
Network Analyst
(Administrator)
Personal Computer
Analyst
Planning Horizon
Programmer/Analyst
Public Domain Software
Shareware
Site License
Software License
Agreement
Software Piracy
System Programmer
Technical Trainer
UPS
Value Added Reseller
(VAR)
Virus
© 2001 Business & Information Systems 2/e 43
Key Terms (cont’d.)
Webmaster
Web Programmer
© 2001 Business & Information Systems 2/e 44
Summary
Planning for Information Systems and
Technology
Acquiring Information Technology
Organizing Information Systems
Activities
Controlling and Securing Information
Systems
© 2001 Business & Information Systems 2/e 45
Summary (cont’d.)
The Effects of Information Technology on Employment
Ethical Management of Information
Systems and Technology
© 2001 Business & Information Systems 2/e 46
Final Black Slide