Chapter 17 Managing Information in a Global World

advertisement
Chapter 17
Managing Information in a
Global World
Learning Outcomes
After reading this chapter, you should be
able to:
1. Explain the strategic importance of
information.
2. Describe the characteristics of useful
information (i.e., its value and costs).
3. Explain the basics of capturing, processing,
and protecting information.
4. Describe how companies can access and
share information and knowledge.
Copyright © 2015 by Nelson Education Ltd.
17-2
Managing Information
THEN
NOW
3
Copyright © 2015 by Nelson Education Ltd.
3
17-3
Moore’s Law
Copyright © 2015 by Nelson Education Ltd.
17-4
4
Why Information Matters
Raw Data
1
Information
Copyright © 2015 by Nelson Education Ltd.
17-5
5
Strategic Importance of Information
First-Mover Advantage
1.1
Copyright © 2015 by Nelson Education Ltd.
17-6
6
Using Information Technology
to Sustain a Competitive Advantage
1.2
Copyright © 2015 by Nelson Education Ltd.
17-7
7
Characteristics and Costs of
Useful Information
accurate
communication
costs
retrieval
relevant
storage
processing
2
complete
timely
acquisition
Copyright © 2015 by Nelson Education Ltd.
17-8
8
Capturing Information:
Electronic Era
•
•
•
•
3.1
Bar codes
RFID tags
Electronic scanners
Optical character
recognition
Copyright © 2015 by Nelson Education Ltd.
17-9
9
Class Activity:
Capturing Information in the Electronic Era
Beyond the Book
• RFID: The Future Market with IBM
• Watch this video, and discuss your
thoughts on capturing this kind of
information.
Copyright © 2015 by Nelson Education Ltd.
10
17-10
Class Activity: QR Codes
Beyond the Book
• QR Code Set to Revolutionize
• How many of you have used QR codes? How many
have a smartphone?
• In groups of four, pick a product or service you would
like to introduce into the marketplace.
• How would they begin to use QR codes throughout the
supply chain from vendor to retailer to
– capture,
– process, and
– protect
the information gathered?
Copyright © 2015 by Nelson Education Ltd.
17-11
11
Processing Information
Data Mining
3.2
Supervised
Unsupervised
What if?
Why?
Copyright © 2015 by Nelson Education Ltd.
17-12
12
Protecting Information
3.3
Authentication
Data
encryption
Authorization
SSL
Two-factor
authentication
VPN
Biometrics
EIS
Virus
Firewall
Copyright © 2015 by Nelson Education Ltd.
17-13
13
Class Activity:
Protecting Information
Beyond the Book
In groups of four, discuss the following
questions:
1. How many of you have backed up your
computer this week? This month?
2. Discuss the need to protect information
from outside threats but also from random
hardware failure (crashes).
Share answers as a class.
Copyright © 2015 by Nelson Education Ltd.
17-14
14
Class Activity:
Sharing Information
Beyond the Book
1. Why do you think companies would want
to share information?
2. When do you think companies would
want to share information?
3. With whom do you think companies
would want to share information?
Discuss answers as a class.
Copyright © 2015 by Nelson Education Ltd.
17-15
15
Accessing and Sharing
Information and Knowledge
• Internal
– EIS
– Intranets
– Corporate portal
• External
– EDI
– Extranet
• Knowledge
– DSS
– Expert system
4
Copyright © 2015 by Nelson Education Ltd.
17-16
16
Security Threats to Data and Data Networks
Denial of
Solution: Implement firewall,
service, Web
password control, server-side review,
server attacks,
threat monitoring, and bug fixes, and
and corporate
turn PCs off when not in use.
network attacks
Password
cracking
software and
unauthorized
access to PCs
Solution: Close ports and firewalls,
disable file and print sharing, and use
strong passwords.
Sources: “Top 10 Security Threats,” PC Magazine, April 10, 2007, 66; M. Sarrel, “Master End-User Security,” PC Magazine, May 2008, 101; K.
Bannan, “Look Out: Watching You, Watching Me,” PC Magazine, July 2002, 99; A. Dragoon, “Fighting Phish, Fakes, and Frauds,” CIO, 1 September
2004, 33; B. Glass, “Are You Being Watched?” PC Magazine, 23 April 2002, 54.
4
Copyright © 2015 by Nelson Education Ltd.
17-17
17
Security Threats to Data and Data Networks
Viruses, worms, Solution: Use antivirus software and
Trojan horses,
firewalls and control Internet
and rootkits
access.
Spyware,
adware,
malicious
scripts, and
applets
E-mail snooping
Solution: Disable browser script
support and use security, blocking,
and spyware/adware software.
Solution: Encrypt message, ensure
strong password protection, and
limit physical access to machines.
Sources: “Top 10 Security Threats,” PC Magazine, April 10, 2007, 66; M. Sarrel, “Master End-User Security,” PC Magazine, May 2008, 101; K.
Bannan, “Look Out: Watching You, Watching Me,” PC Magazine, July 2002, 99; A. Dragoon, “Fighting Phish, Fakes, and Frauds,” CIO,
1 September 2004, 33; B. Glass, “Are You Being Watched?” PC Magazine, 23 April 2002, 54.
4
Copyright © 2015 by Nelson Education Ltd.
17-18
18
Security Threats to Data and Data Networks
Keystroke
Solution: Use antivirus software to
monitoring catch Trojan horses, control Internet
access to transmission, and implement
system monitoring and physical access
control.
Phishing
Solution: Educate and warn users and
customers about the dangers.
Encourage both not to click on
potentially fake URLs, which might take
them to phishing websites. Instead,
have them type your company’s URL
into the Web browser.
Sources: “Top 10 Security Threats,” PC Magazine, April 10, 2007, 66; M. Sarrel, “Master End-User Security,” PC Magazine,
May 2008, 101; K. Bannan, “Look Out: Watching You, Watching Me,” PC Magazine, July 2002, 99; A. Dragoon, “Fighting
Phish, Fakes, and Frauds,” CIO, 1 September 2004, 33; B. Glass, “Are You Being Watched?” PC Magazine, 23 April 2002,
54.
4
Copyright © 2015 by Nelson Education Ltd.
17-19
19
Security Threats to Data and Data Networks
Spam
Solution: Filter known spam sources and
senders on e-mail servers and have users
create further lists of approved and
unapproved senders on their personal
computers.
Cookies
Solution: Use cookie managers to control
and edit cookies and use ad blockers.
Sources: “Top 10 Security Threats,” PC Magazine, April 10, 2007, 66; M. Sarrel, “Master End-User Security,” PC Magazine, May 2008, 101; K.
Bannan, “Look Out: Watching You, Watching Me,” PC Magazine, July 2002, 99; A. Dragoon, “Fighting Phish, Fakes, and Frauds,” CIO, 1 September
2004, 33; B. Glass, “Are You Being Watched?” PC Magazine, 23 April 2002, 54.
4
Copyright © 2015 by Nelson Education Ltd.
17-20
20
Download