View
214
Download
1
Category
Tags:
Preview:
Citation preview
© 2001 Business & Information Systems 2/e
3
Our Agenda Planning for Information Systems
and Technology Acquiring Information Technology Organizing Information Systems
Activities Controlling and Securing
Information Systems
© 2001 Business & Information Systems 2/e
4
Our Agenda (cont’d.) The Effects of Information
Technology on Employment Ethical Management of Information
Systems and Technology
5© 2001 Business & Information Systems 2/e
Learning Objectives Identify several factors that should
be considered in planning for information systems and technology.
Describe common sources for acquiring information technology.
Describe the traditional organizational structure of an information systems department.
6© 2001 Business & Information Systems 2/e
Learning Objectives (cont’d.) List the specialized personnel
needed for World Wide Web and electronic commerce support.
Identify methods used by organizations to control and secure their information systems.
7© 2001 Business & Information Systems 2/e
Learning Objectives (cont’d.) Describe different forms of
computer crime and ways of preventing them.
List several effects of information technology on employment.
© 2001 Business & Information Systems 2/e
8
Planning for Information Systems and Technology
Managing Information Systems
andTechnology
9© 2001 Business & Information Systems 2/e
Planning for Information Systems and Technology
The planning activity involves determining what should be done.
Planning for information systems and technology involves determining what systems will be developed and what technology will be used in the future.
10© 2001 Business & Information Systems 2/e
Planning for Information Systems and Technology (cont’d.)
The planning horizon can involve varying amounts of time. Operational planning – a few weeks to
a few months. Tactical planning – several months to
a few years Strategic planning – several years to a
decade or more
11© 2001 Business & Information Systems 2/e
Planning for Information Systems and Technology (cont’d.)
Planning involves evaluating risk. Risk is often related to three factors:
1. Size of the system development project.2. Familiarity of the business with
information technology used in the new system.
3. Amount of structure in the systems development process.
12© 2001 Business & Information Systems 2/e
Planning for Information Systems and Technology (cont’d.)
Planning what information systems should be developed and what technology should be used involves selecting an application portfolio.
An application portfolio is a description of what systems will be developed, and when, as well as an assessment of the risk associated with each system.
© 2001 Business & Information Systems 2/e
13
Acquiring Information Technology
Managing Information Systems
andTechnology
14© 2001 Business & Information Systems 2/e
Acquiring Information Technology Five categories of information
technology to be purchased: Hardware Software Networks Data management Personnel and training
15© 2001 Business & Information Systems 2/e
Hardware Computer hardware can be
purchased from a number of sources. They include: Computer manufacturers Distributors Retail stores Value added resellers
16© 2001 Business & Information Systems 2/e
Software Software can be developed from
scratch, purchased as a package, or purchased and then modified. Sources include: Developed or modified
In-house programmers Contract programmers
17© 2001 Business & Information Systems 2/e
Software (cont’d.) Purchased
Computer manufacturers Software companies Retail stores Value added resellers
18© 2001 Business & Information Systems 2/e
Networks Technology for networks can be
acquired from a number of sources. They include: Network companies Computer manufacturers Software companies Value added resellers Telecommunications companies Value added network companies
19© 2001 Business & Information Systems 2/e
Data Management Acquiring data management
technology first requires a decision about the basic approach to data management.
Sources include: Computer manufacturers Software companies Database software companies
20© 2001 Business & Information Systems 2/e
Personnel and Training Managers can select personnel
from inside the organization or hire from the outside.
Training departments with full-time instructors provide courses and other forms of training.
Computer Based Training (CBT) software is used to train users online.
© 2001 Business & Information Systems 2/e
21
Organizing Information Systems Activities
Managing Information Systems
andTechnology
22© 2001 Business & Information Systems 2/e
Organizing Information Systems Activities Centralized versus decentralized
management. Both management structures have
advantages. Centralized is more economical with no
duplication of personnel. Decentralized provides better response
to user needs due to their proximity.
23© 2001 Business & Information Systems 2/e
Organizing Information Systems Activities (cont’d.) In a centralized management
structure, decisions related to the information systems and technology are made by a single, centrally located group of managers.
24© 2001 Business & Information Systems 2/e
Organizing Information Systems Activities (cont’d.) In a decentralized management
structure, decisions related to the information systems and technology are made by managers working in local departments or groups.
25© 2001 Business & Information Systems 2/e
Information Systems Organizational Structure Department may be called
Information Systems (IS), Management Information Systems (MIS), Information Technology (IT), or something similar.
Headed by an information systems manager, sometimes called a Chief Information Officer (CIO).
26© 2001 Business & Information Systems 2/e
Information Systems Organizational Structure (cont’d.)
Traditional organization of an information systems department: Systems department Operations department Technical support department End-user support department WWW and electronic commerce
support
27© 2001 Business & Information Systems 2/e
Systems Department
Concerned with developing and maintaining information systems.
Staff includes: Systems analysts Programmers, sometimes called
application programmers Programmer/Analyst when a person
performs both functions
28© 2001 Business & Information Systems 2/e
Operations Department
Concerned with operating the computer and network equipment needed in information systems.
Staff includes: Computer operators Data entry operators
29© 2001 Business & Information Systems 2/e
Technical Support Department
Provides assistance in technical specialties to other areas.
Staff includes: Database administrator System programmers Network analysts Network administrators
30© 2001 Business & Information Systems 2/e
End-user Support Department
Helps users develop and use computer applications, mainly on personal computers.
Staff includes: Personal computer analysts Help desk operators Technical trainers
31© 2001 Business & Information Systems 2/e
WWW and Electronic Commerce Support
People involved in Web and e-commerce support are often part of the system development area in the information systems department.
Staff includes: Webmaster Web programmers Multimedia developers E-commerce project manager
© 2001 Business & Information Systems 2/e
32
Controlling and Securing Information Systems
Managing Information Systems
andTechnology
33© 2001 Business & Information Systems 2/e
Controlling and Securing Information Systems Information system controls
Application controls – designed to ensure that the application processes all data correctly and produces the desired output.
Input controls Data validation Output controls Storage controls Processing controls
34© 2001 Business & Information Systems 2/e
Controlling and Securing Information Systems (cont’d.)
Hardware controls Error-checking hardware Parity bits Duplicate or redundant hardware RAID disk system – Redundant Array of
Inexpensive Disks Fault-tolerant computer systems Uninterruptible Power Supply – UPS
35© 2001 Business & Information Systems 2/e
Controlling and Securing Information Systems (cont’d.)
Failure recovery procedures Backup and recovery procedures Disaster recovery plan
Information system security Physical security Electronic security
36© 2001 Business & Information Systems 2/e
Controlling and Securing Information Systems (cont’d.) Preventing computer crime
requires special forms of security. Common computer crimes include: Theft of money Theft of data Theft and destruction of hardware Illegal copying of software Destruction of data and software
© 2001 Business & Information Systems 2/e
37
The Effects of Information Technology on Employment
Managing Information Systems
andTechnology
38© 2001 Business & Information Systems 2/e
The Effects of Information Technology on Employment The effects of information
technology on employment include: Displaced employees Changing patterns of work Employee health
© 2001 Business & Information Systems 2/e
39
Ethical Management of Information Systems and Technology
Managing Information Systems
andTechnology
40© 2001 Business & Information Systems 2/e
Ethical Management of Information Systems and Technology
Ethical issues include: Privacy – what information should
remain confidential Accuracy – is the information accurate Property – who owns the information Access – who needs to have access to
the information
42© 2001 Business & Information Systems 2/e
Key Terms Application Portfolio Application
Programmer Chief Information
Officer (CIO) Computer-Based
Training (CBT) Computer Operator Data Entry Operator E-commerce Project
Manager
Fault-Tolerant Computer System
Hacker Help Desk Help Desk Operator Information Center Information Systems
Manager Multimedia
Developer
43© 2001 Business & Information Systems 2/e
Key Terms (cont’d.) Network Analyst
(Administrator) Personal Computer
Analyst Planning Horizon Programmer/Analyst Public Domain
Software Shareware Site License
Software License Agreement
Software Piracy System Programmer Technical Trainer UPS Value Added Reseller
(VAR) Virus
© 2001 Business & Information Systems 2/e
45
Summary Planning for Information Systems
and Technology Acquiring Information Technology Organizing Information Systems
Activities Controlling and Securing
Information Systems
© 2001 Business & Information Systems 2/e
46
Summary (cont’d.) The Effects of Information
Technology on Employment Ethical Management of Information
Systems and Technology
Recommended