Using Technology to Manage Information BONUS CHAPTER B... List the types of business information, identify the characteristics of useful information, and discuss how data are stored and
Trang 1Using Technology to
Manage Information
BONUS CHAPTER B
Trang 2LEARNING OBJECTIVES
1 Outline the changing role of business
technology
2 List the types of business information, identify
the characteristics of useful information, and
discuss how data are stored and analyzed
3 Compare the scope of the Internet, intranets,
extranets, and virtual private networks and
Trang 3LEARNING OBJECTIVES
4 Explain virtual networking and discuss the
benefits and drawbacks for cloud computing
5 Evaluate the human resource, security, privacy,
and stability issues affected by information
technology
Trang 4JACK DORSEY
Dorsey spent his youth learning about technology from CB radios to computer programming.
way to link the real world with the virtual world.
Trang 5NAME that COMPANY
This company used social media to build its
business Its customers design new products,
name them, and enter them in the company’s
database Customers may even make YouTube commercials that are featured on the company’s video wall If other customers buy the new
product, the creator gets a small store credit
Name that company!
Trang 6TECHNOLOGY in the 1970s LO B-1
• Data Processing (DP) Name for business
technology in the 1970s; primarily used to improve the flow of financial information.
• Data are the raw, unanalyzed and unorganized
facts and figures
• Information is processed and organized data that
Trang 7TECHNOLOGY in the 1980s
• Information Systems (IS) Technology that helps
a company do business (i.e ATMs and voicemail).
known as information technology
• Information Technology (IT) Technology used
to store, retrieve, and send information effectively.
Trang 8TECHNOLOGY in the 1990s LO B-1
changed how we interact with one another
providing wireless communication systems
Trang 9TECHNOLOGY in the
EARLY 2000s
LO B-1
• Business Intelligence (BI)
The use of data analytic tools that
analyze an organization’s raw data
and derive useful insights from it.
on what’s important in the
organization such as deciding
how to react to problems and
opportunities
Trang 102 Mobile BI will be recharged.
3 Facebook will change how
teams collaborate
4 Economic recovery causes
BI budget growth
Trang 11• IT allows a business to serve the customer
whenever and wherever they want
TECHNOLOGY BRINGS CHANGE
Trang 12HOW TECHNOLOGY
CHANGES BUSINESS
LO B-1
Trang 13TOP U.S CITIES by
Trang 14TEST PREP
changed since the days when it was known as
data processing?
way we do business?
Trang 15KEY TYPES of BUSINESS
Trang 16FOUR CHARACTERISTICS that
MAKE INFORMATION USEFUL
Trang 17TOP SITES to KEEP YOU CONNECTED
Trang 18EFFECTIVELY USING YOUR
Trang 19BIG DATA and DATA ANALYTICS
organizing, storing, and analyzing large sets of data (“big data”) in order to identify patterns and other information that is most useful to the
business now and for making future decisions.
• Data mining is a technique for looking for hidden
Trang 20WHO BENEFITS from BIG DATA and DATA ANALYTICS?
LO B-2
Trang 21TEST PREP
businesses today?
that make it useful?
it?
Trang 22BEYOND the INTERNET LO B-3
• Intranet A companywide network closed to public
access that uses Internet-type technology.
• Extranet A semiprivate network that lets more
than one company access the same information or
allows people on different servers to collaborate.
• Virtual Private Network (VPN) A private data
Trang 23• Broadband Technology Provides a continuous connection to the Internet that allows users to send and receive mammoth video, voice, and data files
faster.
INCREASING INTERNET POWER
• Internet2 – Private
Internet reserved for
research purposes; runs
more that 22,000 times
faster than today’s public
infrastructure.
Trang 24BROADBAND CAPS LO B-3
bandwidth to stream
media, ISPs have been
placing caps on how much
a customer can use
Trang 25SOCIAL MEDIA
networking sites like Facebook and Twitter
successful businesses
customers create products and use their phones
to save their creations in the restaurant’s
database
Trang 26WEB 2.0 LO B-3
• Web 2.0 The set of
tools that allow people
to build social and
Trang 27AMERICANS and SOCIAL NETWORKS
Percentage of Americans with Profiles by Year
LO B-3
Trang 28AMERICANS and
SOCIAL NETWORKS
Number of Americans with Profiles by Age
LO B-3
Trang 29USING SOCIAL MEDIA to
REACH CUSTOMERS
LO B-3
Trang 30WEB 3.0 LO B-3
• Web 3.0 A combination of
technologies that adds
intelligence and changes how
people interact with the Web
and vice versa.
learns about you and your
interests and pushes
Trang 31COMPONENTS of WEB 3.0
1) Semantic Web
2) Mobile Web
3) Immersive Internet
Trang 32The INTELLIGENCE of APPs
What App Developers Don’t Tell You
LO B-4
1 We’re still learning
2 We track your every move
3 Some apps can cause
security headaches
4 You don’t need a lot of apps
Trang 33INTERNET of THINGS
are connected online now
enables ordinary objects to be connected to the Internet
secure, light, and control the climate of your
Trang 34TEST PREP
employees gather information?
Trang 35VIRTUAL NETWORKING and CLOUD COMPUTING
LO B-4
• Virtual Networking A process that allows
software-based networked computers to run multiple operating systems and programs, and share storage.
• Cloud Computing A form of virtualization which
stores a company’s data and applications at off-site
data centers accessed over the Internet.
Trang 36ADVANTAGES of CLOUD COMPUTING
Trang 37DISADVANTAGES of CLOUD COMPUTING
Photo Credit: Peter Baer
LO B-4
1) Security breaches
2) Stability
3) Control of Data
Trang 38TOP CLOUD APPLICATIONS LO B-4
Trang 39TEST PREP
employees manage information?
computing?
Trang 40CONTEMPORARY ISSUES in
TECHNOLOGY
LO B-6
recruit workers who are tech
savvy and can train others
telecommuting available to
almost all companies
Trang 41VIRUSES and PHISHING
• Virus A piece of programming
code inserted into other programming
that usually lies dormant until
triggered; then causes unexpected,
undesired events.
• Phishing attempts to trick victims
into giving important information to
a bogus website
Trang 42HOW to PROTECT YOURSELF
• Never provide or verify personal information.
• Never send sensitive personal information over
LAWS and the INTERNET
- Copyright
- Pornography
- Harassment
- Use of Internet for scams
• Cybercrimes cost the U.S billions each year.
Trang 44CYBERTERRORISM LO B-6
• Cyberterrorism is the idea
that terrorist hackers
could shut down:
- Entire communications
- Money supply
- Electricity
Trang 45PRIVACY ISSUES in
TECHNOLOGY
LO B-6
your permission
• Cookies Pieces of information, such as
registration data or user preferences, sent by a
website to a browser that the browser software is
supposed to save and send back to the server when
Trang 46TEST PREP
people work?
the growth of information technology?