13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information...

Post on 03-Jan-2016

277 views 3 download

Tags:

Transcript of 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information...

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-1

Chapter 13Information Technology

for Business

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-2

Learning ObjectivesAfter reading this chapter, you should be able to:

Discuss the impacts information technology has had on the business world.

Identify the IT resources businesses have at their disposal and how these resources are used.

Describe the role of information systems, the different types of information systems, and how businesses use such systems.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-3

Learning ObjectivesAfter reading this chapter, you should be able to:

Identify the threats and risks information technology poses on businesses.

Describe the ways in which businesses protect themselves from the threats and risks information technology poses.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-4

IT Impacts

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-5

Creating Portable Offices: Providing Remote Access to Instant Information

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-6

Enabling Better Service by Coordinating Remote Deliveries

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-7

Creating Leaner, More Efficient Organizations

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-8

Enabling Increased Collaboration

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-9

Enabling Global Exchange

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-10

Improving Management Processes

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-11

Providing Flexibility for Customization

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-12

Providing New Business Opportunities

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-13

Improving the World and Our Lives

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-14

IT Building Blocks: Business Resources

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-15

The Internet and Other Communication Resources

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-16

Networks: System Architecture

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-17

Hardware and Software

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-18

Information Systems:Harnessing the Competitive

Power of IT

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-19

Leveraging Information Resources:Data Warehousing and Data Mining

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-20

Types of Information Systems

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-21

IT Risks and Threats

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-22

Hackers

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-23

Identity Theft

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-24

Intellectual Property Theft

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-25

Computer Viruses, Worms, and Trojan Horses

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-26

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-27

Spam

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-28

IT Protection Measures

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-29

Preventing Unauthorized Access: Firewalls

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-30

Preventing Identity Theft

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-31

Preventing Infectious Intrusions: Anti-Virus Software

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-32

Protecting Electronic Communications: Encryption Software

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-33

Avoiding Spam and Spyware

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-34

Ethical Concerns in IT

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-35

Summary of Learning Objectives

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-36