1 / 17

課前補充資料 Information Technologies: Concepts & Management

系統分析與設計. 課前補充資料 Information Technologies: Concepts & Management. Data, Information & Knowledge. One of the primary goals of Information Systems is to economically process data into information or knowledge.

kyle
Download Presentation

課前補充資料 Information Technologies: Concepts & Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 系統分析與設計 課前補充資料 Information Technologies: Concepts & Management

  2. Data, Information & Knowledge One of the primary goals of Information Systems is to economically process data into information or knowledge. Dataitems refer to an elementary description of things, events, activities, and transactions that are recorded, classified, and stored, but not organized to convey any specific meaning. Informationis data that have been organized so that they have meaning and value to the recipient. Knowledgeconsists of data or information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise.

  3. Classifications of Information Systems Information Systems can be classified according to; • Organizational Structure • Functional Area • Support Provided • System Architecture • Activity Supported

  4. Classification by Organizational Structure • Departmental information systems.Frequently, an organization uses several application programsin one functional area or department. • Enterprise information systems (EIS).While a departmental IS is usually related to a functional area, the collection of all departmental applications when combined with other functions’ applications comprises the enterprisewide information system. • Interorganizational systems.Some information systems connect several organizations.

  5. Classification by Functional Area The major functional information systems are the following: • The accounting information system • The finance information system • The manufacturing (operations/production) information system • The marketing information system • The human resources management information system

  6. Classification by Support Provided The major types of systems under this classification are: • Transaction processing system (TPS) • Management information system (MIS) • Office automation system (OAS) • Decision support system (DSS) • Enterprise information system (EIS) • Group support system (GSS) • Knowledge management system (KMS) • Intelligent support system

  7. Early 1950s 1960s Late 1960s Early 1970s Transaction processing system (TPS) Management information systems (MISs) Office automation system (OAS) Decision support system (DSS) Evolution of Support Systems

  8. Evolution of Support Systems (cont.) Early 1980s Executive information systems Enterprise information systems (EISs) Group support systems (GSSs) Mid- 1980s Expert systems (ES) Knowledge management systems (KMS) 1990s Artificial neural networks (ANNs)

  9. Interrelated Support Systems

  10. Classification by System Architecture Information systems can be classified according to three types of architecture: • A mainframe-based system. • A standalone personal computer (PC). • A distributed or a networked computing system (several variations exist).

  11. Classification by the Activity Supported • Another important way to classify information systems is by the nature of the activity they support.Such support can be: • Operational • Day-to-day operations of an organization • Managerial • Middle-management activities such as short-term planning, organizing, and control • Strategic • Decisions that significantly change the manner in which business is being done

  12. New Strategic Systems • Electronic commerce (EC) has become a new way of conducting business in the last decade or so. • In this new model, business transactions take place via telecommunications networks, primarily the Internet. • e-Commerce provides organizations with innovative and strategic advantages, such as; • Increased market share • Better ability to negotiate with suppliers • Better ability to prevent competitors from entering into their territory

  13. Information Systems & People

  14. Information Infrastructure There are five major components of the infrastructure: • Computer hardware • Development software • Networks and communication facilities (including the Internet and intranets) • Databases • Information management personnel

  15. TPS MIS DSS 勞保業務、就業保險、職災保護 工資墊償、農保業務、福利津貼 勞保局 外勞業務、就業服務、技能檢定 職業訓練 職訓局 勞工安全、分析檢驗、勞工衛生 勞動醫學、勞動衛生展示 安全衛生研究所 全省就業服務中心資料 提供資料查詢 中部辦公室 勞委會資訊基礎建設 (Information Infrastructure) (專線) 網 路 (資訊中心管理人員) (SUN) 人 員 硬 體 (Oracle 8.0.4) 資 料 庫 軟 體 (SUN Solaris, NT server4.0, FTP server, Openpath Datax, Oracle ODBC Driven)

  16. Managerial Issues • The transition to networked computing. Converting the IT in organizations to networked computing may be a complicated process. • Legacy systems. Whether and when to move from the legacy systems to a client/server enterprisewide architecture is an important issue. • The role of the ISD.The role of the ISD can be extremely important, yet top management frequently mistreats it.

  17. Managerial Issues(cont.) • How much infrastructure? Justifying information system applications is not an easy job due to the intangible benefits and rapid changes in technologies. • The role of end users. End users play an important role in IT development and management. The end users know best what their information needs are and to what degree they are fulfilled. • Ethical Issues. IS systems may invade the privacy of the users or create advantages to certain individuals at the expense of others.

More Related