Transcript Slide 1
Bonus Chapter B
Using Technology to Manage Information
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Bonus Chapter B
LEARNING GOALS
1. Outline the changing role of business technology.
2. List the types of business information, identify the characteristics of useful information, and discuss how data are stored and mined.
3. Compare the scope of the Internet, intranets, extranets, and virtual private networks and explain how broadband technology enabled the evolution to Web 2.0 and 3.0. B-2
Bonus Chapter B
LEARNING GOALS
4. Review the computer hardware most frequently used in business.
5. Classify the types of computer software most frequently used in business.
6. Evaluate the human resource, security, privacy, and stability issues affected by information technology. B-3
Profile
CHRIS HUGHES
Facebook • Hughes attached to two of the biggest recent tech triumphs — Facebook and the social media arm of President Barack Obama ’ s campaign.
• Had an ability to detect the features that could develop Facebook as a brand.
• Launched Jumo to connect non profits and charities with prospective donors. B-4
Bonus Chapter B
NAME that COMPANY
This company used social media to build its business. Its customers design new products, name them, and enter them in the company ’ s database. Customers may even make YouTube commercials that are featured on the company ’ s video wall. If other customers buy the new product, the creator gets a small store credit. Name that company!
B-5
Evolution from Data Processing to Business Intelligence
LG1 TECHNOLOGY in the 1970s
•
Data Processing (DP) --
Name for business technology in the 1970s; primarily used to improve the flow of financial information.
•
Data
are the raw, unanalyzed and unorganized facts and figures.
•
Information
is processed and organized data that managers can use for decision-making.
B-6
Evolution from Data Processing to Business Intelligence
LG1 TECHNOLOGY in the 1980s
•
Information Systems (IS) --
Technology that helps a company do business (i.e. ATMs and voicemail).
• In the late 1980s, business technology became known as information technology.
•
Information Technology (IT) --
Technology that helps change business by allowing companies to use new methods.
B-7
Evolution from Data Processing to Business Intelligence
LG1 TECHNOLOGY in the EARLY 2000s
•
Business Intelligence (BI) --
Any variety of software applications that analyze an organization
’
s raw data and take useful insights from it.
• BI helps businesspeople focus on what ’ s important in the organization such as deciding how to react to problems and opportunities.
B-8
Evolution from Data Processing to Business Intelligence
LG1 FURTHER EVOLUTION
What ’ s in Store for BI 1. Advanced tools will be mainstream.
2. Mobile BI will be recharged.
3. Facebook will change how teams collaborate.
4. Economic recovery causes BI budget growth.
5. Upgrade fever!
Source: Information Week, January 31, 2011.
B-9
How Information Technology Changes Businesses
LG1 TECHNOLOGY BRINGS CHANGE
• IT allows a business to serve the customer whenever and wherever they want.
• As IT broke time and location barriers, it created new organizations and services that are independent of location.
B-10
Evolution from Data Processing to Business Intelligence
LG1 TOP U.S. CITIES by HIGH-TECH EMPLOYMENT City
New York Washington, D.C.
San Jose/Silicon Valley Boston Dallas-Fort Worth
# of People Employed by High-Tech Firms
310,000 295,000 225,000 190,000 175,000 B-11
Progress Assessment
PROGRESS ASSESSMENT
• How has the role of information technology changed since the days when it was known as data processing?
• How has information technology changed the way we do business?
B-12
Types of Information
LG2 KEY TYPES of BUSINESS INFORMATION AVAILABLE
• Business process information • Physical-world observations • Biological data • Public data • Data that indicate personal preferences or intentions B-13
Managing Information
LG2 FOUR CHARACTERISTICS that MAKE INFORMATION USEFUL
1. Quality 2. Completeness 3. Timeliness 4. Relevance B-14
Managing Information
LG2 TOP SITES to KEEP YOU CONNECTED
• Skype • Google Docs • Basecamp • SurveyMonkey Source: Entrepreneur, July 2010.
B-15
Organizing E-Mail and Electronic Files
LG2 EFFECTIVELY USING YOUR ELECTRONIC FILES
• Use your e-mail program’s organizing tools.
• Use consistent file names.
• Use online backup services.
• Use desktop search software.
B-16
Storing and Mining Data
LG2 HOW DO YOU ORGANIZE DATA GLUT?
• A
data warehouse
stores data on a single subject for a firm over a specific period.
•
Data mining
is a technique for looking for hidden patterns and unknown relationships in the data.
• Tools include Yahoo Pipes that can help companies mine the web to get correct data.
B-17
Progress Assessment
PROGRESS ASSESSMENT
• What types of information are available to businesses today?
• What are the four characteristics of information that make it useful?
• What is data mining and how do businesses use it?
B-18
The Road to Knowledge: The Internet
LG3 BEYOND the INTERNET
•
Intranet --
A companywide network closed to public access that uses Internet-type technology.
•
Extranet --
A semiprivate network that lets more than one company access the same information or allows people on different servers to collaborate.
•
Virtual Private Network (VPN) --
A private data network that creates secure connections, or tunnels, over regular Internet lines.
B-19
Broadband Technology
LG3 INCREASING INTERNET POWER
•
Broadband Technology --
Provides a continuous connection to the Internet that allows users to send and receive mammoth video, voice, and data files faster.
•
Internet2 –
Private Internet reserved for research purposes; runs more that 22,000 times faster than today
’
s public infrastructure.
B-20
Broadband Technology
LG3 BROADBAND CAPS
• As people use more bandwidth to stream media, ISPs have been placing caps on how much a customer can use.
• Average usage is well below caps.
B-21
Social Media and Web 2.0
LG3 SOCIAL MEDIA
• Millions have developed online profiles on social networking sites like Facebook and Twitter .
• Social media is thought to be the future of successful businesses.
• Manhattan ’ s 4food relies on social media as customers create products and use their phones to save their creations in the restaurant ’ s database.
B-22
Social Media and Web 2.0
LG3 WEB 2.0
•
Web 2.0 --
The set of tools that allow people to build social and business connections, share information and collaborate on projects online.
• YouTube and Twitter are among the largest Web 2.0 companies.
B-23
Social Media and Web 2.0
LG3 AMERICANS and SOCIAL NETWORKS
Number of Americans with Profiles by Year Source: Investors Business Daily, June 17, 2011. B-24
Social Media and Web 2.0
LG3 AMERICANS and SOCIAL NETWORKS
Number of Americans with Profiles by Age Source: Investors Business Daily, June 17, 2011. B-25
Web 3.0
LG3 WEB 3.0
•
Web 3.0 --
A combination of technologies that adds intelligence and changes how people interact with the Web and vice versa.
• As you
pull
data, the system learns about you and your interests and
pushes
information you may like to you.
B-26
Web 3.0
LG3 COMPONENTS of WEB 3.0
1) Semantic Web 2) Mobile Web 3) Immersive Internet B-27
Progress Assessment
PROGRESS ASSESSMENT
• How do computer networks change the way employees gather information?
• What is an enterprise portal?
B-28
Mobile Devices
LG4 MOVING from a COMPUTER DOMINANT ENVIRONMENT
• We are moving to post-PC applications designed to connect users to the Internet. Devices include: Smart phones: iPhone Notebooks and in-dash computers in cars iPads and other tablets B-29
Mobile Devices
LG4 FASTEST-GROWING CELL PHONE ACTIVITIES
• Using downloaded applications • Accessing social networking sites • Accessing news • Listening to music • Using e-mail B-30
Mobile Devices
LG4 The INTELLIGENCE of APPs
What App Developers Don ’ t Tell You 1. We ’ re still learning.
2. We track your every move.
3. Some apps can cause security headaches.
4. You don ’ t need a lot of apps.
5. You can ’ t use many apps at work!
B-31
Computer Networks
LG4 COMPUTER NETWORKS
•
Network Computing System --
Computer systems that allow personal computers (clients) to obtain needed information from databases on a central computer (server).
• Networks can be expensive.
B-32
Virtualization and Cloud Computing
LG4 VIRTUALIZATION and CLOUD COMPUTING
•
Virtualization --
A process that allows networked computers to run multiple operating systems and programs through a central computer at the same time.
•
Cloud Computing --
A form of virtualization which stores a company
’
s data and applications at off-site data centers accessed over the Internet.
B-33
Virtualization and Cloud Computing
LG4 ADVANTAGES of CLOUD COMPUTING
1) Reduced software costs 2) Improved security 3) Capacity 4) Equipment 5) Access B-34
Virtualization and Cloud Computing
LG4 DISADVANTAGES of CLOUD COMPUTING
1) Security breaches 2) Stability 3) Control of Data Photo Courtesy of: Peter Baer B-35
Virtualization and Cloud Computing
LG4 CLOUDS in the OFFICE
Companies Using Cloud Computing Source: Investors Business Daily, June 3, 2011. B-36
Virtualization and Cloud Computing
LG4 TOP CLOUD APPLICATIONS
Source: Investors Business Daily, June 3, 2011. B-37
Software
LG5 SOFTWARE: TELLING the COMPUTER WHAT to DO
•
Shareware --
Is copyrighted, but is distributed free of charge with a request that users send a specific fee to the developer if they decide to use it.
•
Public Domain Software (Freeware) --
Software that is free for the taking.
• SharewareJunkies lists popular programs.
B-38
Progress Assessment
PROGRESS ASSESSMENT
• How do computer networks change the way employees gather information?
• What are the major types of computer software used in business?
B-39
Human Resource Issues
LG6 CONTEMPORARY ISSUES in TECHNOLOGY
• • HR managers need to recruit workers who are tech savvy and can train others.
• Technology makes telecommuting available to almost all companies.
Nanobots are mobile workers who are nearly autonomous. B-40
Security Issues
VIRUSES and PHISHING LG6
• •
Virus --
A piece of programming code inserted into other programming that usually lies dormant until triggered; then causes unexpected, undesired events.
Phishing
attempts to trick victims into giving important information to a bogus website.
B-41
Security Issues
LG6 HOW to PROTECT YOURSELF AGAINST PHISHING
•
Don
’
t
respond to emails requesting personal information.
• Keep your computer updated with anti-virus software.
•
Never
provide or verify personal information.
•
Never
send sensitive personal information over e-mail.
• Check your monthly statements.
Source: Entrepreneur, May 2010.
B-42
Security Issues
LG6 LAWS and the INTERNET
• Legal issues surrounding Internet use: Copyright Pornography Harassment Use of Internet for scams • Cybercrimes cost the U.S billions each year.
B-43
Security Issues
LG6 CYBERTERRORISM
•
Cyberterrorism
is the idea that terrorist hackers could shut down: Entire communications Money supply Electricity Transportation B-44
Privacy Issues
LG6 PRIVACY ISSUES in TECHNOLOGY
• E-mail can be snooped or information stolen.
• Personal information stored can be stolen.
• Site owners can share your information without your permission.
• Cookies can track your movement around the web.
B-45
Progress Assessment
PROGRESS ASSESSMENT
• How has information technology changed the way people work?
• What management issues have been affected by the growth of information technology?
B-46