Transcript Slide 1

Bonus Chapter B

Using Technology to Manage Information

McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.

Bonus Chapter B

LEARNING GOALS

1. Outline the changing role of business technology.

2. List the types of business information, identify the characteristics of useful information, and discuss how data are stored and mined.

3. Compare the scope of the Internet, intranets, extranets, and virtual private networks and explain how broadband technology enabled the evolution to Web 2.0 and 3.0. B-2

Bonus Chapter B

LEARNING GOALS

4. Review the computer hardware most frequently used in business.

5. Classify the types of computer software most frequently used in business.

6. Evaluate the human resource, security, privacy, and stability issues affected by information technology. B-3

Profile

CHRIS HUGHES

Facebook • Hughes attached to two of the biggest recent tech triumphs — Facebook and the social media arm of President Barack Obama ’ s campaign.

• Had an ability to detect the features that could develop Facebook as a brand.

• Launched Jumo to connect non profits and charities with prospective donors. B-4

Bonus Chapter B

NAME that COMPANY

This company used social media to build its business. Its customers design new products, name them, and enter them in the company ’ s database. Customers may even make YouTube commercials that are featured on the company ’ s video wall. If other customers buy the new product, the creator gets a small store credit. Name that company!

B-5

Evolution from Data Processing to Business Intelligence

LG1 TECHNOLOGY in the 1970s

Data Processing (DP) --

Name for business technology in the 1970s; primarily used to improve the flow of financial information.

Data

are the raw, unanalyzed and unorganized facts and figures.

Information

is processed and organized data that managers can use for decision-making.

B-6

Evolution from Data Processing to Business Intelligence

LG1 TECHNOLOGY in the 1980s

Information Systems (IS) --

Technology that helps a company do business (i.e. ATMs and voicemail).

• In the late 1980s, business technology became known as information technology.

Information Technology (IT) --

Technology that helps change business by allowing companies to use new methods.

B-7

Evolution from Data Processing to Business Intelligence

LG1 TECHNOLOGY in the EARLY 2000s

Business Intelligence (BI) --

Any variety of software applications that analyze an organization

s raw data and take useful insights from it.

• BI helps businesspeople focus on what ’ s important in the organization such as deciding how to react to problems and opportunities.

B-8

Evolution from Data Processing to Business Intelligence

LG1 FURTHER EVOLUTION

What ’ s in Store for BI 1. Advanced tools will be mainstream.

2. Mobile BI will be recharged.

3. Facebook will change how teams collaborate.

4. Economic recovery causes BI budget growth.

5. Upgrade fever!

Source: Information Week, January 31, 2011.

B-9

How Information Technology Changes Businesses

LG1 TECHNOLOGY BRINGS CHANGE

• IT allows a business to serve the customer whenever and wherever they want.

• As IT broke time and location barriers, it created new organizations and services that are independent of location.

B-10

Evolution from Data Processing to Business Intelligence

LG1 TOP U.S. CITIES by HIGH-TECH EMPLOYMENT City

New York Washington, D.C.

San Jose/Silicon Valley Boston Dallas-Fort Worth

# of People Employed by High-Tech Firms

310,000 295,000 225,000 190,000 175,000 B-11

Progress Assessment

PROGRESS ASSESSMENT

• How has the role of information technology changed since the days when it was known as data processing?

• How has information technology changed the way we do business?

B-12

Types of Information

LG2 KEY TYPES of BUSINESS INFORMATION AVAILABLE

• Business process information • Physical-world observations • Biological data • Public data • Data that indicate personal preferences or intentions B-13

Managing Information

LG2 FOUR CHARACTERISTICS that MAKE INFORMATION USEFUL

1. Quality 2. Completeness 3. Timeliness 4. Relevance B-14

Managing Information

LG2 TOP SITES to KEEP YOU CONNECTED

• Skype • Google Docs • Basecamp • SurveyMonkey Source: Entrepreneur, July 2010.

B-15

Organizing E-Mail and Electronic Files

LG2 EFFECTIVELY USING YOUR ELECTRONIC FILES

• Use your e-mail program’s organizing tools.

• Use consistent file names.

• Use online backup services.

• Use desktop search software.

B-16

Storing and Mining Data

LG2 HOW DO YOU ORGANIZE DATA GLUT?

• A

data warehouse

stores data on a single subject for a firm over a specific period.

Data mining

is a technique for looking for hidden patterns and unknown relationships in the data.

• Tools include Yahoo Pipes that can help companies mine the web to get correct data.

B-17

Progress Assessment

PROGRESS ASSESSMENT

• What types of information are available to businesses today?

• What are the four characteristics of information that make it useful?

• What is data mining and how do businesses use it?

B-18

The Road to Knowledge: The Internet

LG3 BEYOND the INTERNET

Intranet --

A companywide network closed to public access that uses Internet-type technology.

Extranet --

A semiprivate network that lets more than one company access the same information or allows people on different servers to collaborate.

Virtual Private Network (VPN) --

A private data network that creates secure connections, or tunnels, over regular Internet lines.

B-19

Broadband Technology

LG3 INCREASING INTERNET POWER

Broadband Technology --

Provides a continuous connection to the Internet that allows users to send and receive mammoth video, voice, and data files faster.

Internet2 –

Private Internet reserved for research purposes; runs more that 22,000 times faster than today

s public infrastructure.

B-20

Broadband Technology

LG3 BROADBAND CAPS

• As people use more bandwidth to stream media, ISPs have been placing caps on how much a customer can use.

• Average usage is well below caps.

B-21

Social Media and Web 2.0

LG3 SOCIAL MEDIA

• Millions have developed online profiles on social networking sites like Facebook and Twitter .

• Social media is thought to be the future of successful businesses.

• Manhattan ’ s 4food relies on social media as customers create products and use their phones to save their creations in the restaurant ’ s database.

B-22

Social Media and Web 2.0

LG3 WEB 2.0

Web 2.0 --

The set of tools that allow people to build social and business connections, share information and collaborate on projects online.

• YouTube and Twitter are among the largest Web 2.0 companies.

B-23

Social Media and Web 2.0

LG3 AMERICANS and SOCIAL NETWORKS

Number of Americans with Profiles by Year Source: Investors Business Daily, June 17, 2011. B-24

Social Media and Web 2.0

LG3 AMERICANS and SOCIAL NETWORKS

Number of Americans with Profiles by Age Source: Investors Business Daily, June 17, 2011. B-25

Web 3.0

LG3 WEB 3.0

Web 3.0 --

A combination of technologies that adds intelligence and changes how people interact with the Web and vice versa.

• As you

pull

data, the system learns about you and your interests and

pushes

information you may like to you.

B-26

Web 3.0

LG3 COMPONENTS of WEB 3.0

1) Semantic Web 2) Mobile Web 3) Immersive Internet B-27

Progress Assessment

PROGRESS ASSESSMENT

• How do computer networks change the way employees gather information?

• What is an enterprise portal?

B-28

Mobile Devices

LG4 MOVING from a COMPUTER DOMINANT ENVIRONMENT

• We are moving to post-PC applications designed to connect users to the Internet. Devices include: Smart phones: iPhone Notebooks and in-dash computers in cars iPads and other tablets B-29

Mobile Devices

LG4 FASTEST-GROWING CELL PHONE ACTIVITIES

• Using downloaded applications • Accessing social networking sites • Accessing news • Listening to music • Using e-mail B-30

Mobile Devices

LG4 The INTELLIGENCE of APPs

What App Developers Don ’ t Tell You 1. We ’ re still learning.

2. We track your every move.

3. Some apps can cause security headaches.

4. You don ’ t need a lot of apps.

5. You can ’ t use many apps at work!

B-31

Computer Networks

LG4 COMPUTER NETWORKS

Network Computing System --

Computer systems that allow personal computers (clients) to obtain needed information from databases on a central computer (server).

• Networks can be expensive.

B-32

Virtualization and Cloud Computing

LG4 VIRTUALIZATION and CLOUD COMPUTING

Virtualization --

A process that allows networked computers to run multiple operating systems and programs through a central computer at the same time.

Cloud Computing --

A form of virtualization which stores a company

s data and applications at off-site data centers accessed over the Internet.

B-33

Virtualization and Cloud Computing

LG4 ADVANTAGES of CLOUD COMPUTING

1) Reduced software costs 2) Improved security 3) Capacity 4) Equipment 5) Access B-34

Virtualization and Cloud Computing

LG4 DISADVANTAGES of CLOUD COMPUTING

1) Security breaches 2) Stability 3) Control of Data Photo Courtesy of: Peter Baer B-35

Virtualization and Cloud Computing

LG4 CLOUDS in the OFFICE

Companies Using Cloud Computing Source: Investors Business Daily, June 3, 2011. B-36

Virtualization and Cloud Computing

LG4 TOP CLOUD APPLICATIONS

Source: Investors Business Daily, June 3, 2011. B-37

Software

LG5 SOFTWARE: TELLING the COMPUTER WHAT to DO

Shareware --

Is copyrighted, but is distributed free of charge with a request that users send a specific fee to the developer if they decide to use it.

Public Domain Software (Freeware) --

Software that is free for the taking.

• SharewareJunkies lists popular programs.

B-38

Progress Assessment

PROGRESS ASSESSMENT

• How do computer networks change the way employees gather information?

• What are the major types of computer software used in business?

B-39

Human Resource Issues

LG6 CONTEMPORARY ISSUES in TECHNOLOGY

• • HR managers need to recruit workers who are tech savvy and can train others.

• Technology makes telecommuting available to almost all companies.

Nanobots are mobile workers who are nearly autonomous. B-40

Security Issues

VIRUSES and PHISHING LG6

• •

Virus --

A piece of programming code inserted into other programming that usually lies dormant until triggered; then causes unexpected, undesired events.

Phishing

attempts to trick victims into giving important information to a bogus website.

B-41

Security Issues

LG6 HOW to PROTECT YOURSELF AGAINST PHISHING

Don

t

respond to emails requesting personal information.

• Keep your computer updated with anti-virus software.

Never

provide or verify personal information.

Never

send sensitive personal information over e-mail.

• Check your monthly statements.

Source: Entrepreneur, May 2010.

B-42

Security Issues

LG6 LAWS and the INTERNET

• Legal issues surrounding Internet use: Copyright Pornography Harassment Use of Internet for scams • Cybercrimes cost the U.S billions each year.

B-43

Security Issues

LG6 CYBERTERRORISM

Cyberterrorism

is the idea that terrorist hackers could shut down: Entire communications Money supply Electricity Transportation B-44

Privacy Issues

LG6 PRIVACY ISSUES in TECHNOLOGY

• E-mail can be snooped or information stolen.

• Personal information stored can be stolen.

• Site owners can share your information without your permission.

• Cookies can track your movement around the web.

B-45

Progress Assessment

PROGRESS ASSESSMENT

• How has information technology changed the way people work?

• What management issues have been affected by the growth of information technology?

B-46