Transcript Lecture

Managing Information Technology
1-1
Information
● What information do businesses keep and use?
● What information have you been exposed to
today?
1-2
INFORMATION
● An organizational resource and tool
– e.g. McDonalds, Walmart, Target
– Can you name others?
● A resource that must be managed carefully
● Associated costs for production, distribution,
security, storage, and retrieval
1-3
INFORMATION
● Global explosion
● Global accessibility
– Internet
– Private networks
● Often considered “intellectual property”
● Managed by information systems
● Often considered a strategic differentiator
– Facebook
– Google
– Apple
– Target
1-4
Information Technology
● Resources used to manage information
– Computers, networks, phones, fax, etc.
● Often distinction between IT and systems
development (IS)
1-5
Useful Information
● Accurate
– How accurate do you need it?
– What’s the cost of an error?
● Timely
– Out of date may mean not accurate
● Complete
– Do you see the total picture?
● Relevant
– Companies often collect lots of data that is
not relevant
1-6
Need to Control Information
● Get more data than can process
– Used data mining
● Need to control it
– Check data entering the system
 “Garbage in, garbage out.”
– Check data in work flows
– Check data leaving the organization
1-7
Information Users
●
●
●
●
First level managers
Middle managers
Executive management
Knowledge workers
– Text distinguishes functional areas vs.
knowledge workers
– Others do not make this distinction
1-8
Information Systems
● Transaction Processing Systems (TPS)
● Office Automation Systems (OAS)
– Work flows, MS Office
● Management Information Systems (MIS)
– Provide reports, schedules, budgets
● Decision Support Systems (DSS)
– Analyze problems. How much to make, order, enter new
markets …
● Enterprise Resource Planning Systems (ERP)
– Large, integrated systems for orders, inventory,
accounting, payroll, …
● Executive Support Systems (ESS)
– High level analysis
● Expert Systems and AI
– E.g. loan approval, medical diagnosis
1-9
Internet
●
●
●
●
Internet and intranet
Need to have outside access
Need to protect corporate information
Security
– Firewalls
– Separate networks
– Mail filters
– Backups
– Technology-People-Policy tradeoff
1-10
The Threat Tree
Threat
Unintentional
Natural
¨
¨
¨
¨
¨
¨
fires
floods
earthquakes
hurricanes
extreme heat
extreme cold
¨
¨
¨
¨
¨
¨
software bugs
system overloads
hardware failures
poorly trained administrators
errors and accidents
uniformed, unmotivated
incompetent custodians
Outsider
Insider
¨
¨
¨
1-11
Intentional
disgruntled employee
former employee
contract employee
hacker - spy
fraud
organized crime
competitor
Managing Information Systems
● Determine needs (requirements)
– Hardware (incl. performance)
– Software
– Networking
– Staff
● Integrate
● Document & Train
● Test
● Evaluate and monitor
– Needs change
1-12