1 / 15

CHAPTER 13

CHAPTER 13. Information Technology for Business. IT Basics. Information Technology (IT)

dannon
Télécharger la présentation

CHAPTER 13

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CHAPTER 13 Information Technology for Business Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

  2. IT Basics • Information Technology (IT) • The various appliances and devices for creating, storing, exchanging, and using (إنشاء وتخزين وتبادل واستخدام )information in diverse modes (وسائط متنوعة ), including visual images, voice, multimedia, and business data • E-commerce (Electronic commerce) • The use of the Internet and other electronic means for retailing (تجارة التجزئة ) and business-to-business transactions Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

  3. IT Impacts • Creating Portable Offices (إنشاء مكاتب المحمولة ) • Providing remote access to instant information • Enabling Better Service (تمكن خدمة أفضل ) • Coordinating remote deliveries • Creating Leaner, More Efficient Organizations • Allowing more work and customer satisfaction to be accomplished with fewer people • Enabling Increased Collaboration (التعاون ) • Using collaboration software and other IT communication devices Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

  4. IT Impacts (cont’d) • Enabling Global Exchange • Fostering collaboration on a worldwide scale • Improving Management Processes • Using enterprise resource planning (ERP) (تخطيط موارد المؤسسات ) to change the nature of the management process • Providing Flexibility for Customization (المرونة لتكييف ) • Creating new manufacturing capabilities that offer customers greater variety (mass customization) and faster delivery cycles Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

  5. IT Impacts (cont’d) • Providing New Business Opportunities • Creating entirely new businesses where none existed before (ex: ebay.com) • Improving the World and Our Lives • Advancing medical and diagnostic techniques (أساليب التشخيص ) Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

  6. IT Building Blocks: Business Resources • Internet • A gigantic (large) system of interconnected (المترابطة)computers of more than 100 million computers in over 100 countries • World Wide Web • A standardized code for accessing (الحصول على ) information and transmitting data over the Internet Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

  7. IT Building Blocks: Business Resources (cont’d) • Intranets • Private internal information networks accessible only by employees • Extranets • Allow outsiders limited access to internal information networks Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

  8. IT Building Blocks: Business Resources (cont’d) • Electronic Conferencing (المؤتمرات الإلكترونية ) • Allows groups of people to communicate simultaneously (at the same time) from various (different) locations via email, phone, or video • Data conferencing (people in different locations work on the same document at the same time) • Video conferencing • VSAT Satellite Communications • Satellite-based private network for voice, video, and data transmissions Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

  9. Networks: System Architecture • Computer Network • A group of two or more computers linked together by some form of cabling (fiber-optic, coaxial, or twisted wire) or by wireless technology to share data or resources such as a printer • Client-Server Network • Clients • The laptop or desktop computers through which users make requests for information or resources • Servers • The computers that provide the services shared by users Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

  10. Types of Networks • Wide Area Networks (WANs) • Computers linked over long distances • Local Area Networks (LANs) • Computers linked in a smaller area, such as all of a firm’s computers within a single building • Wireless Networks • Use airborne electronic signals to link computers and devices • BlackBerry system • Wi-Fi (Wireless Fidelity) • An access point that forms its own small network • Wireless LAN or WLAN • A wireless local area network • WiMax (Worldwide Interoperability for Microwave Access) Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

  11. Hardware and Software • Hardware • Physical components (المكونات المادية ) such as laptops, desktops, handheld computers, keyboards, monitors, system units, and printers • Software • System software: Programs that tell the computer how to function (وظيفة ) (what to do and how to do it) • Application (productivity) software • Groupware Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

  12. Information Systems: Harnessing the Competitive Power of IT • Data • Raw facts and figures • Information • The meaningful, useful interpretation (التفسير ) of data • Information System (IS) • A system that uses IT resources and enables managers to turn data into information for use in decision making • Information system managers operate the systems used for gathering, organizing, and distributing information (جمع وتنظيم وتوزيع المعلومات ) Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

  13. IT Risks and Threats • Hackers • Cybercriminals who gain unauthorized access (الدخول غير المصرح به ) to a computer or network, either to steal information, money, or property or to tamper with data • Identity Theft (سرقة الهوية ) • Stealing of personal information to get loans, credit cards, or other monetary benefits by impersonating the victim Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

  14. IT Risks and Threats (cont’d) • Intellectual Property Theft (سرقة الملكية الفكرية ) • Theft of a product of the mind—something produced by the intellect, with great expenditure of human effort—that has commercial value • Computer Viruses, Worms, and Trojan Horses • Malicious programs that, once installed, can shut down a computer system • Spyware • Software that transmits (ويحيل )stolen personal information • Spam • Widely broadcast, unsolicited e-mail Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

  15. IT Protection Measures • Preventing Unauthorized Access (ومنع الوصول غير المرخص ) • Firewalls • Security systems with special software or hardware devices designed to keep computers safe from hackers • Preventing Viruses • Anti-virus software Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall

More Related