150 likes | 250 Views
CHAPTER 13. Information Technology for Business. IT Basics. Information Technology (IT)
E N D
CHAPTER 13 Information Technology for Business Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall
IT Basics • Information Technology (IT) • The various appliances and devices for creating, storing, exchanging, and using (إنشاء وتخزين وتبادل واستخدام )information in diverse modes (وسائط متنوعة ), including visual images, voice, multimedia, and business data • E-commerce (Electronic commerce) • The use of the Internet and other electronic means for retailing (تجارة التجزئة ) and business-to-business transactions Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall
IT Impacts • Creating Portable Offices (إنشاء مكاتب المحمولة ) • Providing remote access to instant information • Enabling Better Service (تمكن خدمة أفضل ) • Coordinating remote deliveries • Creating Leaner, More Efficient Organizations • Allowing more work and customer satisfaction to be accomplished with fewer people • Enabling Increased Collaboration (التعاون ) • Using collaboration software and other IT communication devices Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall
IT Impacts (cont’d) • Enabling Global Exchange • Fostering collaboration on a worldwide scale • Improving Management Processes • Using enterprise resource planning (ERP) (تخطيط موارد المؤسسات ) to change the nature of the management process • Providing Flexibility for Customization (المرونة لتكييف ) • Creating new manufacturing capabilities that offer customers greater variety (mass customization) and faster delivery cycles Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall
IT Impacts (cont’d) • Providing New Business Opportunities • Creating entirely new businesses where none existed before (ex: ebay.com) • Improving the World and Our Lives • Advancing medical and diagnostic techniques (أساليب التشخيص ) Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall
IT Building Blocks: Business Resources • Internet • A gigantic (large) system of interconnected (المترابطة)computers of more than 100 million computers in over 100 countries • World Wide Web • A standardized code for accessing (الحصول على ) information and transmitting data over the Internet Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall
IT Building Blocks: Business Resources (cont’d) • Intranets • Private internal information networks accessible only by employees • Extranets • Allow outsiders limited access to internal information networks Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall
IT Building Blocks: Business Resources (cont’d) • Electronic Conferencing (المؤتمرات الإلكترونية ) • Allows groups of people to communicate simultaneously (at the same time) from various (different) locations via email, phone, or video • Data conferencing (people in different locations work on the same document at the same time) • Video conferencing • VSAT Satellite Communications • Satellite-based private network for voice, video, and data transmissions Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall
Networks: System Architecture • Computer Network • A group of two or more computers linked together by some form of cabling (fiber-optic, coaxial, or twisted wire) or by wireless technology to share data or resources such as a printer • Client-Server Network • Clients • The laptop or desktop computers through which users make requests for information or resources • Servers • The computers that provide the services shared by users Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall
Types of Networks • Wide Area Networks (WANs) • Computers linked over long distances • Local Area Networks (LANs) • Computers linked in a smaller area, such as all of a firm’s computers within a single building • Wireless Networks • Use airborne electronic signals to link computers and devices • BlackBerry system • Wi-Fi (Wireless Fidelity) • An access point that forms its own small network • Wireless LAN or WLAN • A wireless local area network • WiMax (Worldwide Interoperability for Microwave Access) Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall
Hardware and Software • Hardware • Physical components (المكونات المادية ) such as laptops, desktops, handheld computers, keyboards, monitors, system units, and printers • Software • System software: Programs that tell the computer how to function (وظيفة ) (what to do and how to do it) • Application (productivity) software • Groupware Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall
Information Systems: Harnessing the Competitive Power of IT • Data • Raw facts and figures • Information • The meaningful, useful interpretation (التفسير ) of data • Information System (IS) • A system that uses IT resources and enables managers to turn data into information for use in decision making • Information system managers operate the systems used for gathering, organizing, and distributing information (جمع وتنظيم وتوزيع المعلومات ) Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall
IT Risks and Threats • Hackers • Cybercriminals who gain unauthorized access (الدخول غير المصرح به ) to a computer or network, either to steal information, money, or property or to tamper with data • Identity Theft (سرقة الهوية ) • Stealing of personal information to get loans, credit cards, or other monetary benefits by impersonating the victim Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall
IT Risks and Threats (cont’d) • Intellectual Property Theft (سرقة الملكية الفكرية ) • Theft of a product of the mind—something produced by the intellect, with great expenditure of human effort—that has commercial value • Computer Viruses, Worms, and Trojan Horses • Malicious programs that, once installed, can shut down a computer system • Spyware • Software that transmits (ويحيل )stolen personal information • Spam • Widely broadcast, unsolicited e-mail Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall
IT Protection Measures • Preventing Unauthorized Access (ومنع الوصول غير المرخص ) • Firewalls • Security systems with special software or hardware devices designed to keep computers safe from hackers • Preventing Viruses • Anti-virus software Reference: Ebert & Griffin (2007). "Business Essentials" Pearson, Prentice Hall