1 / 34

Boundless Lecture Slides

Boundless Lecture Slides. Available on the Boundless Teaching Platform. Free to share, print, make copies and changes. Get yours at www.boundless.com. Using Boundless Presentations. Boundless Teaching Platform

nicolai
Download Presentation

Boundless Lecture Slides

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Boundless Lecture Slides Available on the Boundless Teaching Platform Free to share, print, make copies and changes. Get yours at www.boundless.com

  2. Using Boundless Presentations Boundless Teaching Platform Boundless empowers educators to engage their students with affordable, customizable textbooks and intuitive teaching tools. The free Boundless Teaching Platform gives educators the ability to customize textbooks in more than 20 subjects that align to hundreds of popular titles. Get started by using high quality Boundless books, or make switching to our platform easier by building from Boundless content pre-organized to match the assigned textbook. This platform gives educators the tools they need to assign readings and assessments, monitor student activity, and lead their classes with pre-made teaching resources. Get started now at: • The Appendix The appendix is for you to use to add depth and breadth to your lectures. You can simply drag and drop slides from the appendix into the main presentation to make for a richer lecture experience. http://boundless.com/teaching-platform • Free to edit, share, and copy Feel free to edit, share, and make as many copies of the Boundless presentations as you like. We encourage you to take these presentations and make them your own. If you have any questions or problems please email: educators@boundless.com Free to share, print, make copies and changes. Get yours at www.boundless.com

  3. About Boundless • Boundless is an innovative technology company making education more affordable and accessible for students everywhere. The company creates the world’s best open educational content in 20+ subjects that align to more than 1,000 popular college textbooks. Boundless integrates learning technology into all its premium books to help students study more efficiently at a fraction of the cost of traditional textbooks. The company also empowers educators to engage their students more effectively through customizable books and intuitive teaching tools as part of the Boundless Teaching Platform. More than 2 million learners access Boundless free and premium content each month across the company’s wide distribution platforms, including its website, iOS apps, Kindle books, and iBooks. To get started learning or teaching with Boundless, visit boundless.com. Free to share, print, make copies and changes. Get yours at www.boundless.com

  4. Information Technology Trends Managing Information Technology Decision Making E-Commerce Difficulties with New Technologies ] Managing Information Technology Free to share, print, make copies and changes. Get yours at www.boundless.com

  5. Managing Information Technology > Information Technology Trends Information Technology Trends • Hardware and Software Improvements • Consumerization of IT • Types of Networks Free to share, print, make copies and changes. Get yours at www.boundless.com www.boundless.com/business/textbooks/boundless-business-textbook/managing-information-technology-20/information-technology-trends-119/

  6. Managing Information Technology > Decision Making Decision Making • Expert Systems • Informed Decisions • Information and Risk Trade-Off • Information and Knowledge • Data and Information Free to share, print, make copies and changes. Get yours at www.boundless.com www.boundless.com/business/textbooks/boundless-business-textbook/managing-information-technology-20/decision-making-120/

  7. Managing Information Technology > E-Commerce E-Commerce • Selling to Businesses • Selling to Consumers Free to share, print, make copies and changes. Get yours at www.boundless.com www.boundless.com/business/textbooks/boundless-business-textbook/managing-information-technology-20/e-commerce-121/

  8. Managing Information Technology > Difficulties with New Technologies Difficulties with New Technologies • Forced Entry • Malware • E-Mail as an Entry Point Free to share, print, make copies and changes. Get yours at www.boundless.com www.boundless.com/business/textbooks/boundless-business-textbook/managing-information-technology-20/difficulties-with-new-technologies-122/

  9. Appendix Free to share, print, make copies and changes. Get yours at www.boundless.com

  10. Managing Information Technology Key terms • adwareA software application that includes advertisements, which are displayed while the software is running. Developers use adware as a source of income and to keep the costs of the software down (usually making it free). Some adware programs can include spyware. • artificial intelligenceThe branch of computer science dealing with the reproduction or mimicking of human-level intelligence, self-awareness, knowledge, conscience, thought in computer programs. • cloudRegarded as an amorphous omnipresent space for processing and storage on the Internet; the focus of cloud computing. • CMOSComplementary metal–oxide–semiconductor (CMOS) is technology for constructing integrated circuits. CMOS technology is used in microprocessors, microncontrollers, static RAM and other digital logic circuits. • COSOCommittee of Sponsoring Organizations of the Treadway Commission (COSO) is a voluntary private-sector organization dedicated to providing thought leadership to executive management and governance entities on aspects of organizational governance, business ethics, internal control, enterprise risk management, fraud and financial reporting. • cost centerA division or project of an organization to which costs can be specifically allocated. • CPUThe main computer case containing the central components of a personal computer. • customer relationship managementCustomer relationship management (CRM) is a widely implemented model for managing a company's interactions with customers, clients and sales prospects. • databasea collection of information in a regular structure, usually, but not necessarily in a machine-readable format accessible by a computer • distributionThe process by which goods get to final consumers over a geographical market, including storing, selling, shipping, and advertising. • e-commerceCommercial activity conducted via the Internet. • EncryptionA method of scrambling and unscrambling information to protect it during digital transmission (in the context of email). Free to share, print, make copies and changes. Get yours at www.boundless.com

  11. Managing Information Technology • FirewallA gateway between the internet and a local network, allowing or denying access based upon protocols. • hackingUnauthorized attempts to bypass the security mechanisms of an information system or network. See also cracker. • hypervisorA software or firmware system that provides a virtual machine and allows it to operate directly on underlying hardware (instead of via emulation), but within specified constraints • identity theftThe deliberate assumption of another person's identity, usually to gain access to that person's finances or to frame a person for a crime. • knowledge baseA database designed to meet the complex storage and retrieval requirements of computerized knowledge management, especially in support of artificial intelligence or expert systems. • likelihoodThe probability of a specified outcome; the chance of something happening; probability; the state of being probable. • malwareSoftware which has been designed to operate in a malicious, undesirable manner. • metadataData that describes other data, serving as an informative label. • outsourcingThe transfer of a business function to an external service provider. • phishingThe act of sending email that falsely claims to be from a legitimate organization. This is usually combined with a threat or request for information. For example, it may claim that an account will close, a balance is due, or information is missing from an account. The email will ask the recipient to supply confidential information, such as bank account details, PINs or passwords; these details are then used by the owners of the website to conduct fraud. • primary datainformation collected by the investigator conducting the research • relational databaseA database consisting of separate tables, having explicitly defined relationships, and whose elements may be selectively combined as the results of queries. Free to share, print, make copies and changes. Get yours at www.boundless.com

  12. Managing Information Technology • secondary datainformation collected by someone other than the user of the data • serverA computer or a program which provides services to other programs or users, either in the same computer or over a computer network. • spywarePrograms that surreptitiously monitor and report the actions of a computer user. • statistical analysisThe process of examining data to draw conclusions or insights, and determine cause-and-effect patterns between events; for example determining the safety and efficacy of new drugs by drawing out a probability as to whether the fact that a patient got better (or worse) was due to the drug or some other (perhaps random) factor. • tabulationA table displaying data in compact form. Free to share, print, make copies and changes. Get yours at www.boundless.com

  13. Managing Information Technology The Internet changed the way the world produces and consumes information The Internet, represented in this photo, is an aggregation of the different computer networks spanning the globe. Free to share, print, make copies and changes. Get yours at www.boundless.com Wikipedia."Internet map 1024."CC BY 2.5http://en.wikipedia.org/wiki/File:Internet_map_1024.jpgView on Boundless.com

  14. Managing Information Technology Smartphones Make It Easier for Individuals to Make Informed Decisions. Technology enables fast access to vast quantities of information, which can lead to better decision-making. Free to share, print, make copies and changes. Get yours at www.boundless.com Flickr."Smart Mobile Phone Line-up | Flickr - Photo Sharing!."CC BYhttp://www.flickr.com/photos/athomeinscottsdale/5171125430/View on Boundless.com

  15. Managing Information Technology Cybercrime Cybercrime can be committed using computer viruses and other various programs that can track any information you enter into computer networks. Free to share, print, make copies and changes. Get yours at www.boundless.com Flickr."Credit Card Theft | Flickr - Photo Sharing!."CC BYhttp://www.flickr.com/photos/23905174@N00/1594411528/View on Boundless.com

  16. Managing Information Technology Consumerization Facts - Part 1 A survey was conducted in June 2011 in the U.S., Germany and Japan among IT personnel. It found that consumerization has reached a tipping point. Free to share, print, make copies and changes. Get yours at www.boundless.com Wikimedia."Consumerization Report - Chart 1."CC BY-SAhttp://commons.wikimedia.org/wiki/File:Consumerization_Report_-_Chart_1.jpgView on Boundless.com

  17. Managing Information Technology Consumerization Facts - Part 3 Lastly, the report found that new IT tools reduce security risks and management costs. Free to share, print, make copies and changes. Get yours at www.boundless.com Wikipedia."Consumerization Report - Chart 3."CC BY-SAhttp://en.wikipedia.org/wiki/File:Consumerization_Report_-_Chart_3.jpgView on Boundless.com

  18. Managing Information Technology The Waterfall Model A diagram laying out the steps of the waterfall model for software development. Free to share, print, make copies and changes. Get yours at www.boundless.com Wikipedia."Waterfall model."CC BY-SAhttp://en.wikipedia.org/wiki/File:Waterfall_model.pngView on Boundless.com

  19. Managing Information Technology Agile Software Development A poster outlining the principles of agile software development. Free to share, print, make copies and changes. Get yours at www.boundless.com Wikipedia."Agile Software Development methodology."CC BY-SAhttp://en.wikipedia.org/wiki/File:Agile_Software_Development_methodology.svgView on Boundless.com

  20. Managing Information Technology B2B E-Commerce E-commerce has become so prevalent in today's business world that multiple conferences are held each year -- like this one pictured in the UK. Free to share, print, make copies and changes. Get yours at www.boundless.com Flickr."E-commerce Away Day at Google UK | Flickr - Photo Sharing!."CC BYhttp://www.flickr.com/photos/kongur/7718324012/View on Boundless.com

  21. Managing Information Technology B2C E-Commerce B2C e-commerce makes up a smaller portion of the market share of e-commerce compared to B2B, and appears to be shrinking in comparison. Free to share, print, make copies and changes. Get yours at www.boundless.com Wikibooks."E-Commerce and E-Business/Concepts and Definitions."CC BY-SA 3.0http://en.wikibooks.org/wiki/E-Commerce_and_E-Business/Concepts_and_DefinitionsView on Boundless.com

  22. Managing Information Technology BEAST Trojan Horse Beast, a Windows-based backdoor Trojan horse Free to share, print, make copies and changes. Get yours at www.boundless.com Wikimedia."Beast RAT client."Public domainhttp://commons.wikimedia.org/wiki/File:Beast_RAT_client.jpgView on Boundless.com

  23. Managing Information Technology Information Presented in a Software Application Well-organized information improves knowledge and decision making. Free to share, print, make copies and changes. Get yours at www.boundless.com Flickr."Sustainability Reporting Starter Kit for Oracle Hyperion Financial Management | Flickr - Photo Sharing!."CC BYhttp://www.flickr.com/photos/oracle_images/6211955974/View on Boundless.com

  24. Managing Information Technology Changing Technology Has Improved The Way Data Is Organized. Computer systems make it easier to turn data into useful information. Free to share, print, make copies and changes. Get yours at www.boundless.com Flickr."The disruptive transitions in tech today: Mobile, social, cloud, consumerization, and big data | Flickr - Photo Sharing!."CC BY-SAhttp://www.flickr.com/photos/dionh/8023902654/View on Boundless.com

  25. Managing Information Technology Consumerization Facts - Part 2 The report also found that a strategic approach to consumerization starts with providing IT support to personal devices. Free to share, print, make copies and changes. Get yours at www.boundless.com Wikipedia."Consumerization Report - Chart 2."CC BY-SAhttp://en.wikipedia.org/wiki/File:Consumerization_Report_-_Chart_2.jpgView on Boundless.com

  26. Managing Information Technology Spiral Model A diagram laying out the steps in the spiral model of software development. Free to share, print, make copies and changes. Get yours at www.boundless.com Wikipedia."Spiral model (Boehm, 1988)."Public domainhttp://en.wikipedia.org/wiki/File:Spiral_model_(Boehm,_1988).svgView on Boundless.com

  27. Managing Information Technology Possible Business Risks This chart represents a list of the possible risks involved in running an organic business. Risks such as these affect sales, which in turn affect the amount of operating leverage a company should utilize. Free to share, print, make copies and changes. Get yours at www.boundless.com Wikimedia."Possible-risks."CC BY-SAhttp://commons.wikimedia.org/wiki/File:Possible-risks.pngView on Boundless.com

  28. Managing Information Technology Robots Are a Type of Expert System. Expert systems have decision-making abilities, just like their human counterparts. Free to share, print, make copies and changes. Get yours at www.boundless.com Flickr."Robot | Flickr - Photo Sharing!."CC BYhttp://www.flickr.com/photos/donabelandewen/7554298670/View on Boundless.com

  29. Managing Information Technology Encryption This shows a simple visual representation of how encryption works. Free to share, print, make copies and changes. Get yours at www.boundless.com Wikimedia."Public_key_encryption_keys.png."CC BY-SA 3.0https://upload.wikimedia.org/wikipedia/commons/b/bc/Public_key_encryption_keys.pngView on Boundless.com

  30. Managing Information Technology Email This image shows the transmission of an email from one device to another. Free to share, print, make copies and changes. Get yours at www.boundless.com Wikimedia."Email.svg."CC BY-SA 3.0https://upload.wikimedia.org/wikipedia/commons/7/72/Email.svgView on Boundless.com

  31. Managing Information Technology Attribution • Wikipedia."Encryption."CC BY-SA 3.0https://en.wikipedia.org/wiki/Encryption • Wikipedia."Personal firewall."CC BY-SA 3.0https://en.wikipedia.org/wiki/Personal_firewall • Wikipedia."Email spam."CC BY-SA 3.0https://en.wikipedia.org/wiki/Email_spam • Wikipedia."Security hacker."CC BY-SA 3.0https://en.wikipedia.org/wiki/Security_hacker • Wikipedia."Phishing."CC BY-SA 3.0https://en.wikipedia.org/wiki/Phishing • Wikipedia."Email hacking."CC BY-SA 3.0https://en.wikipedia.org/wiki/Email_hacking • Wiktionary."outsourcing."CC BY-SA 3.0http://en.wiktionary.org/wiki/outsourcing • Wiktionary."e-commerce."CC BY-SA 3.0http://en.wiktionary.org/wiki/e-commerce • Wikibooks."E-Commerce and E-Business/Concepts and Definitions."CC BY-SA 3.0http://en.wikibooks.org/wiki/E-Commerce_and_E-Business/Concepts_and_Definitions • Wiktionary."cost center."CC BY-SA 3.0http://en.wiktionary.org/wiki/cost_center • Wikipedia."Decision making."CC BY-SA 3.0http://en.wikipedia.org/wiki/Decision_making • Wikipedia."Knowledge base."CC BY-SA 3.0http://en.wikipedia.org/wiki/Knowledge_base • Wiktionary."statistical analysis."CC BY-SA 3.0http://en.wiktionary.org/wiki/statistical_analysis • Wiktionary."primary data."CC BY-SA 3.0http://en.wiktionary.org/wiki/primary_data • Wikipedia."secondary data."CC BY-SA 3.0http://en.wikipedia.org/wiki/secondary%20data • Wiktionary."tabulation."CC BY-SA 3.0http://en.wiktionary.org/wiki/tabulation • Wikipedia."Data (computing)."CC BY-SA 3.0http://en.wikipedia.org/wiki/Data_(computing) Free to share, print, make copies and changes. Get yours at www.boundless.com

  32. Managing Information Technology • Wikipedia."Information systems."CC BY-SA 3.0http://en.wikipedia.org/wiki/Information_systems • Wikipedia."Data Processor."CC BY-SA 3.0http://en.wikipedia.org/wiki/Data_Processor • Wiktionary."likelihood."CC BY-SA 3.0http://en.wiktionary.org/wiki/likelihood • Wikipedia."IT risk management."CC BY-SA 3.0http://en.wikipedia.org/wiki/IT_risk_management • Wikipedia."Management information systems."CC BY-SA 3.0http://en.wikipedia.org/wiki/Management_information_systems • Wikipedia."Information and communications technology."CC BY-SA 3.0http://en.wikipedia.org/wiki/Information_and_communications_technology • Wikipedia."COSO."CC BY-SA 3.0http://en.wikipedia.org/wiki/COSO • Wiktionary."artificial intelligence."CC BY-SA 3.0http://en.wiktionary.org/wiki/artificial_intelligence • Wiktionary."knowledge base."CC BY-SA 3.0http://en.wiktionary.org/wiki/knowledge_base • Wikipedia."Expert systems."CC BY-SA 3.0http://en.wikipedia.org/wiki/Expert_systems • Wikipedia."Applications of artificial intelligence."CC BY-SA 3.0http://en.wikipedia.org/wiki/Applications_of_artificial_intelligence • Wikipedia."Knowledge-based systems."CC BY-SA 3.0http://en.wikipedia.org/wiki/Knowledge-based_systems • Wiktionary."relational database."CC BY-SA 3.0http://en.wiktionary.org/wiki/relational_database • Wikipedia."database."CC BY-SA 3.0http://en.wikipedia.org/wiki/database • Wiktionary."metadata."CC BY-SA 3.0http://en.wiktionary.org/wiki/metadata • Wikipedia."Information science."CC BY-SA 3.0http://en.wikipedia.org/wiki/Information_science • Wikipedia."Knowledge engineering."CC BY-SA 3.0http://en.wikipedia.org/wiki/Knowledge_engineering • Wikipedia."Computer information system."CC BY-SA 3.0http://en.wikipedia.org/wiki/Computer_information_system • Wiktionary."distribution."CC BY-SA 3.0http://en.wiktionary.org/wiki/distribution Free to share, print, make copies and changes. Get yours at www.boundless.com

  33. Managing Information Technology • Wikibooks."E-Commerce and E-Business/Concepts and Definitions."CC BY-SA 3.0http://en.wikibooks.org/wiki/E-Commerce_and_E-Business/Concepts_and_Definitions • Wiktionary."identity theft."CC BY-SA 3.0http://en.wiktionary.org/wiki/identity_theft • Wiktionary."phishing."CC BY-SA 3.0http://en.wiktionary.org/wiki/phishing • Wiktionary."hacking."CC BY-SA 3.0http://en.wiktionary.org/wiki/hacking • Wikipedia."Computer crime."CC BY-SA 3.0http://en.wikipedia.org/wiki/Computer_crime • Wikipedia."Identity theft."CC BY-SA 3.0http://en.wikipedia.org/wiki/Identity_theft • Wiktionary."adware."CC BY-SA 3.0http://en.wiktionary.org/wiki/adware • Wiktionary."spyware."CC BY-SA 3.0http://en.wiktionary.org/wiki/spyware • Wiktionary."malware."CC BY-SA 3.0http://en.wiktionary.org/wiki/malware • Wikipedia."Malware."CC BY-SA 3.0http://en.wikipedia.org/wiki/Malware • Boundless Learning."Boundless."CC BY-SA 3.0http://www.boundless.com//business/definition/cmos • Wiktionary."CPU."CC BY-SA 3.0http://en.wiktionary.org/wiki/CPU • Wikipedia."History of computing hardware."CC BY-SA 3.0http://en.wikipedia.org/wiki/History_of_computing_hardware • Wikipedia."Content-addressable memory."CC BY-SA 3.0http://en.wikipedia.org/wiki/Content-addressable_memory • Wikipedia."Software development process."CC BY-SA 3.0http://en.wikipedia.org/wiki/Software_development_process • Wiktionary."server."CC BY-SA 3.0http://en.wiktionary.org/wiki/server • Wikipedia."customer relationship management."CC BY-SA 3.0http://en.wikipedia.org/wiki/customer%20relationship%20management • Wiktionary."cloud."CC BY-SA 3.0http://en.wiktionary.org/wiki/cloud • Wikipedia."Consumerization."CC BY-SA 3.0http://en.wikipedia.org/wiki/Consumerization Free to share, print, make copies and changes. Get yours at www.boundless.com

  34. Managing Information Technology • Wiktionary."hypervisor."CC BY-SA 3.0http://en.wiktionary.org/wiki/hypervisor • Wikipedia."Computer network."CC BY-SA 3.0http://en.wikipedia.org/wiki/Computer_network Free to share, print, make copies and changes. Get yours at www.boundless.com

More Related