Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Chapter 17 Managing Information Management 4th Edition Chuck Williams Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved Prepared by Deborah Baker Texas Christian University 1 What Would You Do? Mayor’s Office, London, England. London’s traffic problems are the worst in Europe— horse-drawn carriages in 1903 moved faster than traffic today! The roads are antiquated and always congested. A “Congestion Zone” fee has been created, and now a technological process must be designed to collect fees. How do you process data into useful information to assess and collect the appropriate fees? Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 2 Moore’s Law Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 3 Why Information Matters After reading these sections, you should be able to: 1. 2. explain the strategic importance of information. describe the characteristics of useful information (i.e., its value and costs). Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 4 Data versus Information Raw data = facts + figures Information = useful data that influences choices Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 5 Strategic Importance of Information First-Mover Advantage Sustaining a Competitive Advantage 1 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 6 First-Mover Advantage First-Mover Advantage The strategic advantage that companies earn by being the first to use new information technology to lower costs or to differentiate a product 1.1 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 7 AOL User Interface Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 8 MSN Interface Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 9 Sustaining a Competitive Advantage NO Does the information technology (IT) create YES value? Competitive Disadvantage NO Is the IT different across competing YES firms? Competitive Parity NO 1.2 Is it difficult for another firm to create or buy the IT? Temporary Competitive Advantage Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved YES Sustained Competitive Advantage Adapted from Exhibit 17.2 10 Characteristics of Useful Information Accurate Complete Relevant Timely 2 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 11 Costs of Useful Information Acquisition Processing Storage Retrieval Communication Costs 2 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 12 Doing the Right Thing Recycling Computer Equipment •An estimated 250 million computers will be discarded over the next five years •Computers and monitors contain hazardous materials, so tossing them in the trash is illegal 2 •Recycle appropriately, or donate old computers to individuals or charitable organizations Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 13 Getting and Sharing Information After reading these sections, you should be able to: 3. 4. explain the basics of capturing, processing, and protecting information. describe how companies can share and access information and knowledge. Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 14 Capturing Information Manual Bar Codes Electronic Radio Frequency Identification Tags Electronic Scanners 3.1 Optical Character Recognition Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 15 RFID Technology Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 16 Processing Information: Data Mining Supervised Data Mining Data Warehouse Unsupervised Data Mining Affinity Patterns Sequence Patterns Predictive Patterns Data Clusters 3.2 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 17 Unsupervised Data Mining Affinity Patterns Two or more database elements occur together significantly Sequence Patterns One of the elements precedes the other Predictive Patterns Helps identify database elements that are different Data Clusters Three or more database elements occur together 3.2 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 18 Protecting Information Authentication Authorization Two-Factor Authentication Firewalls Antivirus software Data encryption Virtual private networks Secure Sockets Layer (SSL) Encryption 3.3 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 19 Doing the Right Thing Password Dos and Don’ts 1. 2. 3. 4. 5. 6. 7. 8. Don’t use any public information Don’t use complete words Use eight or more characters; include unique characters Use longer, unique passwords Consider passphrases Don’t write your password Change it every six weeks Don’t reuse old passwords 3.2 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 20 Accessing and Sharing Information and Knowledge Internal Access and Information Sharing External Access and Information Sharing Sharing of Knowledge and Expertise 4 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 21 Executive Information System (EIS) Uses internal and external data Must provide accurate, complete, relevant, and timely information to managers Used to monitor and analyze organizational performance 4.1 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 22 Characteristics of Best-Selling EIS 4.1 Ease of Use Few commands to learn Important views saved 3-D charts Geographic dimensions Analysis of Information Sales tracking Easy-to-understand displays Time periods Identification of Problems and Exceptions Compare to standards Trigger exceptions Drill down Detect & alert newspaper Detect & alert robots Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved Adapted from Exhibit 17.4 23 Intranets Private company networks A firewall permits only authorized internal access Allow employees to access, share, and publish information 4.1 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 24 Why Companies Use Intranets Inexpensive Increase efficiencies and reduce costs Intuitive and easy to use Work across all computer systems Can be built on top of existing network Work with software programs that convert to HTML Software is available at no cost or is less expensive 4.1 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved Adapted from Exhibit 17.5 25 Corporate Portals Corporate Portals A hybrid of executive information systems and intranets that allow managers and employees to use a Web browser to gain access to customized company information and to complete specialized transactions 4.1 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 26 External Access and Sharing Electronic Data Interchange Extranets Web Services Internet 4.2 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 27 Benefits of External Access and Sharing Reduced costs Increased productivity Reduced data entry errors Improved customer service Faster communications 4.2 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 28 Electronic Data Interchange (EDI) Electronic Data Interchange When two companies convert their purchase and ordering information to a standardized format to enable the direct electronic transmission of that information from one computer system to the other. 4.2 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 29 Web Services Web Services Using standardized protocols to describe data from one company in such a way that those data can automatically be read, understood, transcribed, and processed by different computer systems in another company 4.2 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 30 Extranet Extranet Allows companies to exchange information and conduct transactions with outsiders by providing them direct, Web-based access to authorized parts of a company’s intranet or information system 4.2 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 31 Sharing Knowledge and Expertise Decision Support System Helps managers to understand specific kinds of problems and potential solutions, and to analyze the impact of different decision options using “what if” scenarios Expert System An information system that contains the specialized knowledge and decision rules used by experts so that nonexperts can draw on this knowledge base to make decisions 4.3 Chapter 17 Copyright ©2007 by South-Western, a division of Thomson Learning. All rights reserved 32