chapter 16:managing information and technology. basic element of computer technology hardware:...
TRANSCRIPT
Chapter 16:Managing Information and Technology
Basic element of computer technology
Hardware: input, store, and organize data
System software: performs functions necessary to operate a computer.
Application Software: Helps user perform a task.
Networks
Internet: Network of networks WWW: only 25% of traffic
Broadband: 62% have access
Internet2: high-tech internet Education, research, and collaboration
Cloud computing
Internet based storage
Significant benefits Saves space on computer
Access anywhere
Businesses are using cloud now.
Data and Information
Critical for business decisions Current state of business, competitive environment, market trends
Data: facts and figures that are collected, lack context
Information: Processed data that is used in meaningful way. Accurate
Relevant
Timely
Understandable
Secure
Technology and Decision Making
Decision support system: Gives managers large amounts of data, converted to high quality data.
Business intelligence systems: discover subtle and complex relationships hidden in data.
Expert system: Helps managers make better decisions in areas that lack expertise Devise program to mimic managers approach
Asks a series of questions
E-Commerce
Marketing, buying, and selling products over a network.
B2C E-commerce- selling to a final customer Itunes, buy stocks
Large target market
Small transaction size
B2B E commerce- sell supplies, components, machinery or services to other busniness. Much larger volume of e-commerce.
Potentially large transaction
E-Commerce
Web 2.0- Interactive features, creates richer, more interesting experience for customers. Forged stronger relationships
Advertisement on Internet: Growing rapidly Important part of marketing strategy
Viral marketing- get customers to communicate a firm’s message.
E-marketplaces- buyers and sellers can communicate and conduct businesses.
Radio frequency identification- stores info on a microchip that can transmit the info when in range of a specia reader.
Challenges and Security
Malware- software that is distributed for malicious intent Spyware-tracks computer behavior
Computer Viruses- can erase data and destroy your computer
Worms- Can spread on its own.
Spam- unsolicited emails. Phishing- appear to come from legit banks, try to obtain personal
information
Pharming-Fake websites with intent to get personal information
Hackers- try to gain unauthorized access to the computer of others. Firewalls help prevent hackers by using hardware to create barriers.