Chapter 14 - Info Poster

advertisement
Lead Black Slide
Powered by DeSiaMore
1
Chapter 14
Managing Information Systems
and
Technology
Powered by DeSiaMore
2
Our Agenda




Planning for Information Systems and
Technology
Acquiring Information Technology
Organizing Information Systems
Activities
Controlling and Securing Information
Systems
Powered by DeSiaMore
3
Our Agenda (cont’d.)


The Effects of Information Technology
on Employment
Ethical Management of Information
Systems and Technology
Powered by DeSiaMore
4
Learning Objectives



Identify several factors that should be
considered in planning for information
systems and technology.
Describe common sources for acquiring
information technology.
Describe the traditional organizational
structure of an information systems
department.
Powered by DeSiaMore
5
Learning Objectives (cont’d.)


List the specialized personnel needed
for World Wide Web and electronic
commerce support.
Identify methods used by organizations
to control and secure their information
systems.
Powered by DeSiaMore
6
Learning Objectives (cont’d.)


Describe different forms of computer
crime and ways of preventing them.
List several effects of information
technology on employment.
Powered by DeSiaMore
7
Planning for Information
Systems and Technology
Managing Information Systems
and
Technology
Powered by DeSiaMore
8
Planning for Information
Systems and Technology


The planning activity involves
determining what should be done.
Planning for information systems and
technology involves determining what
systems will be developed and what
technology will be used in the future.
Powered by DeSiaMore
9
Planning for Information Systems
and Technology (cont’d.)

The planning horizon can involve varying
amounts of time.



Operational planning – a few weeks to a
few months.
Tactical planning – several months to a few
years
Strategic planning – several years to a
decade or more
Powered by DeSiaMore
10
Planning for Information Systems
and Technology (cont’d.)


Planning involves evaluating risk.
Risk is often related to three factors:
1. Size of the system development project.
2. Familiarity of the business with information
technology used in the new system.
3. Amount of structure in the systems
development process.
Powered by DeSiaMore
11
Planning for Information Systems
and Technology (cont’d.)


Planning what information systems
should be developed and what
technology should be used involves
selecting an application portfolio.
An application portfolio is a description of
what systems will be developed, and
when, as well as an assessment of the
risk associated with each system.
Powered by DeSiaMore
12
Acquiring Information
Technology
Managing Information Systems
and
Technology
Powered by DeSiaMore
13
Acquiring Information
Technology

Five categories of information
technology to be purchased:





Hardware
Software
Networks
Data management
Personnel and training
Powered by DeSiaMore
14
Hardware

Computer hardware can be purchased
from a number of sources. They
include:




Computer manufacturers
Distributors
Retail stores
Value added resellers
Powered by DeSiaMore
15
Software

Software can be developed from
scratch, purchased as a package, or
purchased and then modified. Sources
include:

Developed or modified


Powered by DeSiaMore
In-house programmers
Contract programmers
16
Software (cont’d.)

Purchased




Powered by DeSiaMore
Computer manufacturers
Software companies
Retail stores
Value added resellers
17
Networks

Technology for networks can be
acquired from a number of sources.
They include:






Network companies
Computer manufacturers
Software companies
Value added resellers
Telecommunications companies
Value added network companies
Powered by DeSiaMore
18
Data Management


Acquiring data management technology
first requires a decision about the basic
approach to data management.
Sources include:



Computer manufacturers
Software companies
Database software companies
Powered by DeSiaMore
19
Personnel and Training



Managers can select personnel from
inside the organization or hire from the
outside.
Training departments with full-time
instructors provide courses and other
forms of training.
Computer Based Training (CBT)
software is used to train users online.
Powered by DeSiaMore
20
Organizing Information
Systems Activities
Managing Information Systems
and
Technology
Powered by DeSiaMore
21
Organizing Information
Systems Activities


Centralized versus decentralized
management.
Both management structures have
advantages.


Centralized is more economical with no
duplication of personnel.
Decentralized provides better response to
user needs due to their proximity.
Powered by DeSiaMore
22
Organizing Information
Systems Activities (cont’d.)

In a centralized management structure,
decisions related to the information
systems and technology are made by a
single, centrally located group of
managers.
Powered by DeSiaMore
23
Organizing Information
Systems Activities (cont’d.)

In a decentralized management
structure, decisions related to the
information systems and technology are
made by managers working in local
departments or groups.
Powered by DeSiaMore
24
Information Systems
Organizational Structure


Department may be called Information
Systems (IS), Management Information
Systems (MIS), Information Technology
(IT), or something similar.
Headed by an information systems
manager, sometimes called a Chief
Information Officer (CIO).
Powered by DeSiaMore
25
Information Systems
Organizational Structure (cont’d.)

Traditional organization of an
information systems department:





Systems department
Operations department
Technical support department
End-user support department
WWW and electronic commerce support
Powered by DeSiaMore
26
Systems Department


Concerned with developing and
maintaining information systems.
Staff includes:



Systems analysts
Programmers, sometimes called application
programmers
Programmer/Analyst when a person
performs both functions
Powered by DeSiaMore
27
Operations Department


Concerned with operating the computer
and network equipment needed in
information systems.
Staff includes:


Computer operators
Data entry operators
Powered by DeSiaMore
28
Technical Support Department


Provides assistance in technical
specialties to other areas.
Staff includes:




Database administrator
System programmers
Network analysts
Network administrators
Powered by DeSiaMore
29
End-user Support Department


Helps users develop and use computer
applications, mainly on personal
computers.
Staff includes:



Personal computer analysts
Help desk operators
Technical trainers
Powered by DeSiaMore
30
WWW and Electronic Commerce
Support


People involved in Web and e-commerce
support are often part of the system
development area in the information
systems department.
Staff includes:




Webmaster
Web programmers
Multimedia developers
E-commerce project manager
Powered by DeSiaMore
31
Controlling and Securing
Information Systems
Managing Information Systems
and
Technology
Powered by DeSiaMore
32
Controlling and Securing
Information Systems

Information system controls

Application controls – designed to ensure
that the application processes all data
correctly and produces the desired output.





Powered by DeSiaMore
Input controls
Data validation
Output controls
Storage controls
Processing controls
33
Controlling and Securing
Information Systems (cont’d.)

Hardware controls






Powered by DeSiaMore
Error-checking hardware
Parity bits
Duplicate or redundant hardware
RAID disk system – Redundant Array of
Inexpensive Disks
Fault-tolerant computer systems
Uninterruptible Power Supply – UPS
34
Controlling and Securing
Information Systems (cont’d.)

Failure recovery procedures



Backup and recovery procedures
Disaster recovery plan
Information system security


Powered by DeSiaMore
Physical security
Electronic security
35
Controlling and Securing
Information Systems (cont’d.)

Preventing computer crime requires
special forms of security. Common
computer crimes include:





Theft of money
Theft of data
Theft and destruction of hardware
Illegal copying of software
Destruction of data and software
Powered by DeSiaMore
36
The Effects of Information
Technology on Employment
Managing Information Systems
and
Technology
Powered by DeSiaMore
37
The Effects of Information
Technology on Employment

The effects of information technology
on employment include:



Displaced employees
Changing patterns of work
Employee health
Powered by DeSiaMore
38
Ethical Management of
Information Systems and
Technology
Managing Information Systems
and
Technology
Powered by DeSiaMore
39
Ethical Management of Information
Systems and Technology

Ethical issues include:




Privacy – what information should remain
confidential
Accuracy – is the information accurate
Property – who owns the information
Access – who needs to have access to the
information
Powered by DeSiaMore
40
Managing Information
Systems and Technology
Key Terms
Powered by DeSiaMore
41
Key Terms







Application Portfolio
Application Programmer
Chief Information
Officer (CIO)
Computer-Based
Training (CBT)
Computer Operator
Data Entry Operator
E-commerce Project
Manager
Powered by DeSiaMore







Fault-Tolerant
Computer System
Hacker
Help Desk
Help Desk Operator
Information Center
Information Systems
Manager
Multimedia Developer
42
Key Terms (cont’d.)







Network Analyst
(Administrator)
Personal Computer
Analyst
Planning Horizon
Programmer/Analyst
Public Domain Software
Shareware
Site License
Powered by DeSiaMore







Software License
Agreement
Software Piracy
System Programmer
Technical Trainer
UPS
Value Added Reseller
(VAR)
Virus
43
Key Terms (cont’d.)


Webmaster
Web Programmer
Powered by DeSiaMore
44
Summary




Planning for Information Systems and
Technology
Acquiring Information Technology
Organizing Information Systems
Activities
Controlling and Securing Information
Systems
Powered by DeSiaMore
45
Summary (cont’d.)


The Effects of Information Technology
on Employment
Ethical Management of Information
Systems and Technology
Powered by DeSiaMore
46
Final Black Slide
Powered by DeSiaMore
47
Download