You are on page 1of 13

Managing Technology and Information

Distinguish between data and information and explain the role of management information systems in business. List the components and different types of information systems. Outline how computer hardware and software are used to manage information. Describe the networking and telecommunications technology and types of computer networks.

Discuss the security and ethical issues involving computer information systems. Explain the steps that companies go through in anticipating, planning for, and recovering from information system disasters. Review current trends in information systems.

Data raw facts and figures

Information knowledge gained from processing data

Information System organized method for collecting, storing, and communicating information on operations

Chief Information Officer executive responsible for directing information systems and operations

Computer Hardware Computer Software

Telecommunications and Computer Networks


Data Resource Management

Operational Support Systems


Transaction Processing System Process Control System

Management Support Systems


Management Information System (MIS) Decision Support System (DSS) Executive Support System (ESS)

The tangible elements of a computer system


The components that store and process data, perform calculations Input devices like the keyboard and mouse allow users to enter data and commands. Storage and processing components consist of the hard drive and other storage components like flash drives.

Desktop (Personal) Computers Server Mainframes Supercomputers Notebook Computers Handheld Devices

Programs, routines, and computer languages that control a computer Operating System
Windows Operating System Mac Operating System

Application Software
Microsoft PowerPoint Quicken

THE INTERNET
Local Area Networks (LAN) Wide Area Networks (WAN) Wireless Local Networks Intranets

Virtual Private Networks (VPN)


Voice over Internet Protocol (VoIP)

E-Crime Computer Viruses


Worms Trojan Horses Spyware

Use of information systems by employees and vendors:


Personal Use Privacy

Organizational use of information:


Employment records Employee monitoring

Natural Disasters 90% of firms that Power Failures sustained a loss of critical data went Equipment Malfunctions out of business within two years. Software Glitches Human Error Terrorist Attacks The most basic precaution Backup.

The Distributed Workforce


Employees who work in virtual offices

Application Service Providers


A firm that provides computers and application support

On Demand, Cloud, and Grid Computing


Renting software time

You might also like