Chapter 17 Managing Information in a Global World Learning Outcomes After reading this chapter, you should be able to: 1. Explain the strategic importance of information. 2. Describe the characteristics of useful information (i.e., its value and costs). 3. Explain the basics of capturing, processing, and protecting information. 4. Describe how companies can access and share information and knowledge. Copyright © 2015 by Nelson Education Ltd. 17-2 Managing Information THEN NOW 3 Copyright © 2015 by Nelson Education Ltd. 3 17-3 Moore’s Law Copyright © 2015 by Nelson Education Ltd. 17-4 4 Why Information Matters Raw Data 1 Information Copyright © 2015 by Nelson Education Ltd. 17-5 5 Strategic Importance of Information First-Mover Advantage 1.1 Copyright © 2015 by Nelson Education Ltd. 17-6 6 Using Information Technology to Sustain a Competitive Advantage 1.2 Copyright © 2015 by Nelson Education Ltd. 17-7 7 Characteristics and Costs of Useful Information accurate communication costs retrieval relevant storage processing 2 complete timely acquisition Copyright © 2015 by Nelson Education Ltd. 17-8 8 Capturing Information: Electronic Era • • • • 3.1 Bar codes RFID tags Electronic scanners Optical character recognition Copyright © 2015 by Nelson Education Ltd. 17-9 9 Class Activity: Capturing Information in the Electronic Era Beyond the Book • RFID: The Future Market with IBM • Watch this video, and discuss your thoughts on capturing this kind of information. Copyright © 2015 by Nelson Education Ltd. 10 17-10 Class Activity: QR Codes Beyond the Book • QR Code Set to Revolutionize • How many of you have used QR codes? How many have a smartphone? • In groups of four, pick a product or service you would like to introduce into the marketplace. • How would they begin to use QR codes throughout the supply chain from vendor to retailer to – capture, – process, and – protect the information gathered? Copyright © 2015 by Nelson Education Ltd. 17-11 11 Processing Information Data Mining 3.2 Supervised Unsupervised What if? Why? Copyright © 2015 by Nelson Education Ltd. 17-12 12 Protecting Information 3.3 Authentication Data encryption Authorization SSL Two-factor authentication VPN Biometrics EIS Virus Firewall Copyright © 2015 by Nelson Education Ltd. 17-13 13 Class Activity: Protecting Information Beyond the Book In groups of four, discuss the following questions: 1. How many of you have backed up your computer this week? This month? 2. Discuss the need to protect information from outside threats but also from random hardware failure (crashes). Share answers as a class. Copyright © 2015 by Nelson Education Ltd. 17-14 14 Class Activity: Sharing Information Beyond the Book 1. Why do you think companies would want to share information? 2. When do you think companies would want to share information? 3. With whom do you think companies would want to share information? Discuss answers as a class. Copyright © 2015 by Nelson Education Ltd. 17-15 15 Accessing and Sharing Information and Knowledge • Internal – EIS – Intranets – Corporate portal • External – EDI – Extranet • Knowledge – DSS – Expert system 4 Copyright © 2015 by Nelson Education Ltd. 17-16 16 Security Threats to Data and Data Networks Denial of Solution: Implement firewall, service, Web password control, server-side review, server attacks, threat monitoring, and bug fixes, and and corporate turn PCs off when not in use. network attacks Password cracking software and unauthorized access to PCs Solution: Close ports and firewalls, disable file and print sharing, and use strong passwords. Sources: “Top 10 Security Threats,” PC Magazine, April 10, 2007, 66; M. Sarrel, “Master End-User Security,” PC Magazine, May 2008, 101; K. Bannan, “Look Out: Watching You, Watching Me,” PC Magazine, July 2002, 99; A. Dragoon, “Fighting Phish, Fakes, and Frauds,” CIO, 1 September 2004, 33; B. Glass, “Are You Being Watched?” PC Magazine, 23 April 2002, 54. 4 Copyright © 2015 by Nelson Education Ltd. 17-17 17 Security Threats to Data and Data Networks Viruses, worms, Solution: Use antivirus software and Trojan horses, firewalls and control Internet and rootkits access. Spyware, adware, malicious scripts, and applets E-mail snooping Solution: Disable browser script support and use security, blocking, and spyware/adware software. Solution: Encrypt message, ensure strong password protection, and limit physical access to machines. Sources: “Top 10 Security Threats,” PC Magazine, April 10, 2007, 66; M. Sarrel, “Master End-User Security,” PC Magazine, May 2008, 101; K. Bannan, “Look Out: Watching You, Watching Me,” PC Magazine, July 2002, 99; A. Dragoon, “Fighting Phish, Fakes, and Frauds,” CIO, 1 September 2004, 33; B. Glass, “Are You Being Watched?” PC Magazine, 23 April 2002, 54. 4 Copyright © 2015 by Nelson Education Ltd. 17-18 18 Security Threats to Data and Data Networks Keystroke Solution: Use antivirus software to monitoring catch Trojan horses, control Internet access to transmission, and implement system monitoring and physical access control. Phishing Solution: Educate and warn users and customers about the dangers. Encourage both not to click on potentially fake URLs, which might take them to phishing websites. Instead, have them type your company’s URL into the Web browser. Sources: “Top 10 Security Threats,” PC Magazine, April 10, 2007, 66; M. Sarrel, “Master End-User Security,” PC Magazine, May 2008, 101; K. Bannan, “Look Out: Watching You, Watching Me,” PC Magazine, July 2002, 99; A. Dragoon, “Fighting Phish, Fakes, and Frauds,” CIO, 1 September 2004, 33; B. Glass, “Are You Being Watched?” PC Magazine, 23 April 2002, 54. 4 Copyright © 2015 by Nelson Education Ltd. 17-19 19 Security Threats to Data and Data Networks Spam Solution: Filter known spam sources and senders on e-mail servers and have users create further lists of approved and unapproved senders on their personal computers. Cookies Solution: Use cookie managers to control and edit cookies and use ad blockers. Sources: “Top 10 Security Threats,” PC Magazine, April 10, 2007, 66; M. Sarrel, “Master End-User Security,” PC Magazine, May 2008, 101; K. Bannan, “Look Out: Watching You, Watching Me,” PC Magazine, July 2002, 99; A. Dragoon, “Fighting Phish, Fakes, and Frauds,” CIO, 1 September 2004, 33; B. Glass, “Are You Being Watched?” PC Magazine, 23 April 2002, 54. 4 Copyright © 2015 by Nelson Education Ltd. 17-20 20