13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information...

36
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business

Transcript of 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information...

Page 1: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-1

Chapter 13Information Technology

for Business

Page 2: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-2

Learning ObjectivesAfter reading this chapter, you should be able to:

Discuss the impacts information technology has had on the business world.

Identify the IT resources businesses have at their disposal and how these resources are used.

Describe the role of information systems, the different types of information systems, and how businesses use such systems.

Page 3: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-3

Learning ObjectivesAfter reading this chapter, you should be able to:

Identify the threats and risks information technology poses on businesses.

Describe the ways in which businesses protect themselves from the threats and risks information technology poses.

Page 4: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-4

IT Impacts

Page 5: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-5

Creating Portable Offices: Providing Remote Access to Instant Information

Page 6: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-6

Enabling Better Service by Coordinating Remote Deliveries

Page 7: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-7

Creating Leaner, More Efficient Organizations

Page 8: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-8

Enabling Increased Collaboration

Page 9: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-9

Enabling Global Exchange

Page 10: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-10

Improving Management Processes

Page 11: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-11

Providing Flexibility for Customization

Page 12: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-12

Providing New Business Opportunities

Page 13: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-13

Improving the World and Our Lives

Page 14: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-14

IT Building Blocks: Business Resources

Page 15: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-15

The Internet and Other Communication Resources

Page 16: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-16

Networks: System Architecture

Page 17: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-17

Hardware and Software

Page 18: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-18

Information Systems:Harnessing the Competitive

Power of IT

Page 19: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-19

Leveraging Information Resources:Data Warehousing and Data Mining

Page 20: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-20

Types of Information Systems

Page 21: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-21

IT Risks and Threats

Page 22: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-22

Hackers

Page 23: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-23

Identity Theft

Page 24: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-24

Intellectual Property Theft

Page 25: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-25

Computer Viruses, Worms, and Trojan Horses

Page 26: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-26

Page 27: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-27

Spam

Page 28: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-28

IT Protection Measures

Page 29: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-29

Preventing Unauthorized Access: Firewalls

Page 30: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-30

Preventing Identity Theft

Page 31: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-31

Preventing Infectious Intrusions: Anti-Virus Software

Page 32: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-32

Protecting Electronic Communications: Encryption Software

Page 33: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-33

Avoiding Spam and Spyware

Page 34: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-34

Ethical Concerns in IT

Page 35: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-35

Summary of Learning Objectives

Page 36: 13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.

Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-36