Chapter 14

advertisement

Lead Black Slide

Chapter 14

Managing Information Systems and

Technology

© 2001 Business & Information Systems 2/e 2

Our Agenda

Planning for Information Systems and

Technology

Acquiring Information Technology

Organizing Information Systems

Activities

Controlling and Securing Information

Systems

© 2001 Business & Information Systems 2/e 3

Our Agenda (cont’d.)

The Effects of Information Technology on Employment

Ethical Management of Information

Systems and Technology

© 2001 Business & Information Systems 2/e 4

Learning Objectives

Identify several factors that should be considered in planning for information systems and technology.

Describe common sources for acquiring information technology.

Describe the traditional organizational structure of an information systems department.

© 2001 Business & Information Systems 2/e 5

Learning Objectives (cont’d.)

List the specialized personnel needed for World Wide Web and electronic commerce support.

Identify methods used by organizations to control and secure their information systems.

© 2001 Business & Information Systems 2/e 6

Learning Objectives (cont’d.)

Describe different forms of computer crime and ways of preventing them.

List several effects of information technology on employment.

© 2001 Business & Information Systems 2/e 7

Planning for Information

Systems and Technology

Managing Information Systems and

Technology

© 2001 Business & Information Systems 2/e 8

Planning for Information

Systems and Technology

The planning activity involves determining what should be done.

Planning for information systems and technology involves determining what systems will be developed and what technology will be used in the future.

© 2001 Business & Information Systems 2/e 9

Planning for Information Systems and Technology (cont’d.)

The planning horizon can involve varying amounts of time.

Operational planning – a few weeks to a few months.

Tactical planning – several months to a few years

Strategic planning – several years to a decade or more

© 2001 Business & Information Systems 2/e 10

Planning for Information Systems and Technology (cont’d.)

Planning involves evaluating risk.

Risk is often related to three factors:

1.

Size of the system development project.

2.

Familiarity of the business with information technology used in the new system.

3.

Amount of structure in the systems development process.

© 2001 Business & Information Systems 2/e 11

Planning for Information Systems and Technology (cont’d.)

Planning what information systems should be developed and what technology should be used involves selecting an application portfolio .

An application portfolio is a description of what systems will be developed, and when, as well as an assessment of the risk associated with each system.

© 2001 Business & Information Systems 2/e 12

Acquiring Information

Technology

Managing Information Systems and

Technology

© 2001 Business & Information Systems 2/e 13

Acquiring Information

Technology

Five categories of information technology to be purchased:

Hardware

Software

Networks

Data management

Personnel and training

© 2001 Business & Information Systems 2/e 14

Hardware

Computer hardware can be purchased from a number of sources. They include:

Computer manufacturers

Distributors

Retail stores

Value added resellers

© 2001 Business & Information Systems 2/e 15

Software

Software can be developed from scratch, purchased as a package, or purchased and then modified. Sources include:

Developed or modified

In-house programmers

Contract programmers

© 2001 Business & Information Systems 2/e 16

Software (cont’d.)

Purchased

Computer manufacturers

Software companies

Retail stores

Value added resellers

© 2001 Business & Information Systems 2/e 17

Networks

Technology for networks can be acquired from a number of sources.

They include:

Network companies

Computer manufacturers

Software companies

Value added resellers

Telecommunications companies

Value added network companies

© 2001 Business & Information Systems 2/e 18

Data Management

Acquiring data management technology first requires a decision about the basic approach to data management.

Sources include:

Computer manufacturers

Software companies

Database software companies

© 2001 Business & Information Systems 2/e 19

Personnel and Training

Managers can select personnel from inside the organization or hire from the outside.

Training departments with full-time instructors provide courses and other forms of training.

Computer Based Training (CBT) software is used to train users online.

© 2001 Business & Information Systems 2/e 20

Organizing Information

Systems Activities

Managing Information Systems and

Technology

© 2001 Business & Information Systems 2/e 21

Organizing Information

Systems Activities

Centralized versus decentralized management.

Both management structures have advantages.

Centralized is more economical with no duplication of personnel.

Decentralized provides better response to user needs due to their proximity.

© 2001 Business & Information Systems 2/e 22

Organizing Information

Systems Activities (cont’d.)

In a centralized management structure, decisions related to the information systems and technology are made by a single, centrally located group of managers.

© 2001 Business & Information Systems 2/e 23

Organizing Information

Systems Activities (cont’d.)

In a decentralized management structure, decisions related to the information systems and technology are made by managers working in local departments or groups.

© 2001 Business & Information Systems 2/e 24

Information Systems

Organizational Structure

Department may be called Information

Systems (IS), Management Information

Systems (MIS), Information Technology

(IT), or something similar.

Headed by an information systems manager, sometimes called a Chief

Information Officer (CIO).

© 2001 Business & Information Systems 2/e 25

Information Systems

Organizational Structure (cont’d.)

Traditional organization of an information systems department:

Systems department

Operations department

Technical support department

End-user support department

WWW and electronic commerce support

© 2001 Business & Information Systems 2/e 26

Systems Department

Concerned with developing and maintaining information systems.

Staff includes:

Systems analysts

Programmers , sometimes called application programmers

Programmer/Analyst when a person performs both functions

© 2001 Business & Information Systems 2/e 27

Operations Department

Concerned with operating the computer and network equipment needed in information systems.

Staff includes:

Computer operators

Data entry operators

© 2001 Business & Information Systems 2/e 28

Technical Support Department

Provides assistance in technical specialties to other areas.

Staff includes:

Database administrator

System programmers

Network analysts

Network administrators

© 2001 Business & Information Systems 2/e 29

End-user Support Department

Helps users develop and use computer applications, mainly on personal computers.

Staff includes:

Personal computer analysts

Help desk operators

Technical trainers

© 2001 Business & Information Systems 2/e 30

WWW and Electronic Commerce

Support

People involved in Web and e-commerce support are often part of the system development area in the information systems department.

Staff includes:

Webmaster

Web programmers

Multimedia developers

E-commerce project manager

© 2001 Business & Information Systems 2/e 31

Controlling and Securing

Information Systems

Managing Information Systems and

Technology

© 2001 Business & Information Systems 2/e 32

Controlling and Securing

Information Systems

Information system controls

Application controls – designed to ensure that the application processes all data correctly and produces the desired output.

Input controls

Data validation

Output controls

Storage controls

Processing controls

© 2001 Business & Information Systems 2/e 33

Controlling and Securing

Information Systems (cont’d.)

Hardware controls

Error-checking hardware

Parity bits

Duplicate or redundant hardware

RAID disk system – Redundant Array of

Inexpensive Disks

Fault-tolerant computer systems

Uninterruptible Power Supply – UPS

© 2001 Business & Information Systems 2/e 34

Controlling and Securing

Information Systems (cont’d.)

Failure recovery procedures

Backup and recovery procedures

Disaster recovery plan

Information system security

Physical security

Electronic security

© 2001 Business & Information Systems 2/e 35

Controlling and Securing

Information Systems (cont’d.)

Preventing computer crime requires special forms of security. Common computer crimes include:

Theft of money

Theft of data

Theft and destruction of hardware

Illegal copying of software

Destruction of data and software

© 2001 Business & Information Systems 2/e 36

The Effects of Information

Technology on Employment

Managing Information Systems and

Technology

© 2001 Business & Information Systems 2/e 37

The Effects of Information

Technology on Employment

The effects of information technology on employment include:

Displaced employees

Changing patterns of work

Employee health

© 2001 Business & Information Systems 2/e 38

Ethical Management of

Information Systems and

Technology

Managing Information Systems and

Technology

© 2001 Business & Information Systems 2/e 39

Ethical Management of Information

Systems and Technology

Ethical issues include:

Privacy – what information should remain confidential

Accuracy – is the information accurate

Property – who owns the information

Access – who needs to have access to the information

© 2001 Business & Information Systems 2/e 40

Managing Information

Systems and Technology

Key Terms

© 2001 Business & Information Systems 2/e 41

Key Terms

Application Portfolio

Application Programmer

Chief Information

Officer (CIO)

Computer-Based

Training (CBT)

Computer Operator

Data Entry Operator

E-commerce Project

Manager

Fault-Tolerant Computer

System

Hacker

Help Desk

Help Desk Operator

Information Center

Information Systems

Manager

Multimedia Developer

© 2001 Business & Information Systems 2/e 42

Key Terms (cont’d.)

Network Analyst

(Administrator)

Personal Computer

Analyst

Planning Horizon

Programmer/Analyst

Public Domain Software

Shareware

Site License

Software License

Agreement

Software Piracy

System Programmer

Technical Trainer

UPS

Value Added Reseller

(VAR)

Virus

© 2001 Business & Information Systems 2/e 43

Key Terms (cont’d.)

Webmaster

Web Programmer

© 2001 Business & Information Systems 2/e 44

Summary

Planning for Information Systems and

Technology

Acquiring Information Technology

Organizing Information Systems

Activities

Controlling and Securing Information

Systems

© 2001 Business & Information Systems 2/e 45

Summary (cont’d.)

The Effects of Information Technology on Employment

Ethical Management of Information

Systems and Technology

© 2001 Business & Information Systems 2/e 46

Final Black Slide

Download