SlideShare une entreprise Scribd logo
1  sur  11
Chapter 20
                 Information Management
                       Technology


© SB InstitutE
20.1



                 Learning Objectives
After reading this chapter, you should be able to:
  Explain the role of information as a management resource
  Describe six common information management technologies
  Identify the primary factors involved in the design of information
  systems
  State the ethical issues involved in information technologies



© SB InstitutE
20.2


         Interrelated Criteria for Valuing Information


                      Quality            Relevance




                     Quantity            Timeliness



© SB InstitutE

                                               Adapted from Figure 20.1
20.3


        Information Management Technologies
                 Internet

            Extranets
                                    Increased
            Intranets
                                   Information
   Decision Support                Management
       Systems                      Capability

     Expert Systems

    Group Decision
   Support Systems
© SB InstitutE
20.4


           Internet Access: 4 Primary Capabilities


                  Electronic Mail
                                    Telnet
                     (E-Mail)




                       File         World
                     Transfer       Wide
                     Protocol        Web

© SB InstitutE
20.5


                 Evolution in Information Needs

                                 Data (raw         Data
          Environment            facts and       analysis
                                  figures)




                  Externally
                   focused      Decisions       Useful
                 Internally    and actions   information
                  focused
© SB InstitutE

                                                    Adapted from Figure 20.2
20.6


           Information Requirements by Decision Level
                          Requirement
Information          At Operational     At Tactical   At Strategic
Characteristic       Level                 Level         Level

Scope                Narrow, well                       Broad
                     defined
Aggregation level    Detailed                           Composite



Time Horizon         Historical                         Future-
                                                        oriented


 © SB InstitutE

                                                      Adapted from Table 20.1
20.7


           Information Requirement by Decision Level (cont.)
                               Requirement
Information           At Operational    At Tactical      At Strategic
Characteristic        Level                Level          Level

  Currency            Recent                          Long term

  Frequency of use    Continuous                      Periodic


  Type                Quantitative                    Qualitative &
                                                      Quantitative



 © SB InstitutE

                                                      Adapted from Table 20.1
20.8


           Stages in Information Systems Development



           Preliminary
                         Conceptual   Detailed
            problem                               Implementation
                           design     design
            definition




                                                 Feedback



© SB InstitutE

                                                   Adapted from Figure 20.3
20.9


Building Blocks for Effective Implementation of Information
                          Systems
                         7. System backup



          4. Phased          5. Thorough    6. Training and
        implementation          testing     documentation




                               2. Top
             1. User                        3. Time and cost
                            management
          Information                           evaluation
                              support



© SB InstitutE

                                                Adapted from Figure 20.4
20.10


          Ten Commandments of Computer Ethics

      1. Thou shalt not use a computer to harm other people
      2. Thou shalt not interfere with other people's computer work
      3. Thou shalt not snoop around in other people's files
      4. Thou shalt not use a computer to steal
      5. Thou shalt not use a computer to bear false witness
      6. Thou shalt not copy or use proprietary software for which
         you have not paid
      7. Thou shalt not use other people's computer resources
         without authorization or proper compensation
      8. Thou shalt not use other people's intellectual output
      9. Thou shalt think about the social consequences of the
         program you are writing or the system you design
      10. Thou shalt use a computer in ways that show
         consideration and respect for your fellow humans



© SB InstitutE

                                                                      Adapted from Table 20.2

Contenu connexe

Similaire à Ch20

Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)
Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)
Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)Federico Cerutti
 
01 roland top storage trends_praha_02
01 roland top storage trends_praha_0201 roland top storage trends_praha_02
01 roland top storage trends_praha_02IDC_CEMA
 
CRASH Special Report - JEE
CRASH Special Report - JEECRASH Special Report - JEE
CRASH Special Report - JEECAST
 
Organizing Design-Driven Development Using Rational Requirements Composer
Organizing Design-Driven Development Using Rational Requirements ComposerOrganizing Design-Driven Development Using Rational Requirements Composer
Organizing Design-Driven Development Using Rational Requirements ComposerKurt Solarte
 
Core Banking Transformation: Solutions to Standardize Processes and Cut Costs
Core Banking Transformation: Solutions to Standardize Processes and Cut CostsCore Banking Transformation: Solutions to Standardize Processes and Cut Costs
Core Banking Transformation: Solutions to Standardize Processes and Cut CostsIBM Banking
 
Presentation Joost Visser / SIG - what can be green about software- Workshop ...
Presentation Joost Visser / SIG - what can be green about software- Workshop ...Presentation Joost Visser / SIG - what can be green about software- Workshop ...
Presentation Joost Visser / SIG - what can be green about software- Workshop ...Jaak Vlasveld
 
Software Measurement for Lean Application Management
Software Measurement for Lean Application ManagementSoftware Measurement for Lean Application Management
Software Measurement for Lean Application ManagementCAST
 
7 Steps to Pay Down the Interest on Your IT Technical Debt
7 Steps to Pay Down the Interest on Your IT Technical Debt7 Steps to Pay Down the Interest on Your IT Technical Debt
7 Steps to Pay Down the Interest on Your IT Technical DebtCAST
 
DAI Framework_CEII_2022.pptx
DAI Framework_CEII_2022.pptxDAI Framework_CEII_2022.pptx
DAI Framework_CEII_2022.pptxIakovosIoannou1
 
Requirements Engineering Maturity Measurement and Evaluation, A Case Study of...
Requirements Engineering Maturity Measurement and Evaluation, A Case Study of...Requirements Engineering Maturity Measurement and Evaluation, A Case Study of...
Requirements Engineering Maturity Measurement and Evaluation, A Case Study of...Bahana Wiradanti
 
CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...
CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...
CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...ServiceVirtualization.Com
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsIBM India Smarter Computing
 
ERA - Tracking Technical Debt
ERA - Tracking Technical DebtERA - Tracking Technical Debt
ERA - Tracking Technical DebtICSM 2011
 
Drupal Day 2011 - Il ruolo del OPen Source nel contesto del nuovo mondo dell’...
Drupal Day 2011 - Il ruolo del OPen Source nel contesto del nuovo mondo dell’...Drupal Day 2011 - Il ruolo del OPen Source nel contesto del nuovo mondo dell’...
Drupal Day 2011 - Il ruolo del OPen Source nel contesto del nuovo mondo dell’...DrupalDay
 
IBM Next Gen ALM 2012
IBM Next Gen ALM 2012IBM Next Gen ALM 2012
IBM Next Gen ALM 2012Kurt Solarte
 
Data Center Transformation Cisco's Virtualization & Cloud Journey
Data Center Transformation Cisco's Virtualization & Cloud JourneyData Center Transformation Cisco's Virtualization & Cloud Journey
Data Center Transformation Cisco's Virtualization & Cloud JourneyCisco Canada
 
Whitepaper : ESG Whitepaper: Backup and Recovery of Large Scale VMware Enviro...
Whitepaper : ESG Whitepaper: Backup and Recovery of Large Scale VMware Enviro...Whitepaper : ESG Whitepaper: Backup and Recovery of Large Scale VMware Enviro...
Whitepaper : ESG Whitepaper: Backup and Recovery of Large Scale VMware Enviro...EMC
 

Similaire à Ch20 (20)

Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)
Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)
Cerutti--Web Information Systems (postgrad seminar @ University of Brescia)
 
01 roland top storage trends_praha_02
01 roland top storage trends_praha_0201 roland top storage trends_praha_02
01 roland top storage trends_praha_02
 
CRASH Special Report - JEE
CRASH Special Report - JEECRASH Special Report - JEE
CRASH Special Report - JEE
 
Organizing Design-Driven Development Using Rational Requirements Composer
Organizing Design-Driven Development Using Rational Requirements ComposerOrganizing Design-Driven Development Using Rational Requirements Composer
Organizing Design-Driven Development Using Rational Requirements Composer
 
Core Banking Transformation: Solutions to Standardize Processes and Cut Costs
Core Banking Transformation: Solutions to Standardize Processes and Cut CostsCore Banking Transformation: Solutions to Standardize Processes and Cut Costs
Core Banking Transformation: Solutions to Standardize Processes and Cut Costs
 
Presentation Joost Visser / SIG - what can be green about software- Workshop ...
Presentation Joost Visser / SIG - what can be green about software- Workshop ...Presentation Joost Visser / SIG - what can be green about software- Workshop ...
Presentation Joost Visser / SIG - what can be green about software- Workshop ...
 
Software Measurement for Lean Application Management
Software Measurement for Lean Application ManagementSoftware Measurement for Lean Application Management
Software Measurement for Lean Application Management
 
7 Steps to Pay Down the Interest on Your IT Technical Debt
7 Steps to Pay Down the Interest on Your IT Technical Debt7 Steps to Pay Down the Interest on Your IT Technical Debt
7 Steps to Pay Down the Interest on Your IT Technical Debt
 
Gwea Framework 1.2 Ea Forum 30 June 09
Gwea Framework 1.2 Ea Forum 30 June 09Gwea Framework 1.2 Ea Forum 30 June 09
Gwea Framework 1.2 Ea Forum 30 June 09
 
DAI Framework_CEII_2022.pptx
DAI Framework_CEII_2022.pptxDAI Framework_CEII_2022.pptx
DAI Framework_CEII_2022.pptx
 
Requirements Engineering Maturity Measurement and Evaluation, A Case Study of...
Requirements Engineering Maturity Measurement and Evaluation, A Case Study of...Requirements Engineering Maturity Measurement and Evaluation, A Case Study of...
Requirements Engineering Maturity Measurement and Evaluation, A Case Study of...
 
CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...
CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...
CA John Michelsen - Oracle OpenWorld 2012 - "ServiceVirtualization Reality is...
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring Options
 
ERA - Tracking Technical Debt
ERA - Tracking Technical DebtERA - Tracking Technical Debt
ERA - Tracking Technical Debt
 
Cisco
CiscoCisco
Cisco
 
The Technical Debt Management Cycle
The Technical Debt Management CycleThe Technical Debt Management Cycle
The Technical Debt Management Cycle
 
Drupal Day 2011 - Il ruolo del OPen Source nel contesto del nuovo mondo dell’...
Drupal Day 2011 - Il ruolo del OPen Source nel contesto del nuovo mondo dell’...Drupal Day 2011 - Il ruolo del OPen Source nel contesto del nuovo mondo dell’...
Drupal Day 2011 - Il ruolo del OPen Source nel contesto del nuovo mondo dell’...
 
IBM Next Gen ALM 2012
IBM Next Gen ALM 2012IBM Next Gen ALM 2012
IBM Next Gen ALM 2012
 
Data Center Transformation Cisco's Virtualization & Cloud Journey
Data Center Transformation Cisco's Virtualization & Cloud JourneyData Center Transformation Cisco's Virtualization & Cloud Journey
Data Center Transformation Cisco's Virtualization & Cloud Journey
 
Whitepaper : ESG Whitepaper: Backup and Recovery of Large Scale VMware Enviro...
Whitepaper : ESG Whitepaper: Backup and Recovery of Large Scale VMware Enviro...Whitepaper : ESG Whitepaper: Backup and Recovery of Large Scale VMware Enviro...
Whitepaper : ESG Whitepaper: Backup and Recovery of Large Scale VMware Enviro...
 

Plus de Dr. C.V. Suresh Babu (20)

Data analytics with R
Data analytics with RData analytics with R
Data analytics with R
 
Association rules
Association rulesAssociation rules
Association rules
 
Clustering
ClusteringClustering
Clustering
 
Classification
ClassificationClassification
Classification
 
Blue property assumptions.
Blue property assumptions.Blue property assumptions.
Blue property assumptions.
 
Introduction to regression
Introduction to regressionIntroduction to regression
Introduction to regression
 
DART
DARTDART
DART
 
Mycin
MycinMycin
Mycin
 
Expert systems
Expert systemsExpert systems
Expert systems
 
Dempster shafer theory
Dempster shafer theoryDempster shafer theory
Dempster shafer theory
 
Bayes network
Bayes networkBayes network
Bayes network
 
Bayes' theorem
Bayes' theoremBayes' theorem
Bayes' theorem
 
Knowledge based agents
Knowledge based agentsKnowledge based agents
Knowledge based agents
 
Rule based system
Rule based systemRule based system
Rule based system
 
Formal Logic in AI
Formal Logic in AIFormal Logic in AI
Formal Logic in AI
 
Production based system
Production based systemProduction based system
Production based system
 
Game playing in AI
Game playing in AIGame playing in AI
Game playing in AI
 
Diagnosis test of diabetics and hypertension by AI
Diagnosis test of diabetics and hypertension by AIDiagnosis test of diabetics and hypertension by AI
Diagnosis test of diabetics and hypertension by AI
 
A study on “impact of artificial intelligence in covid19 diagnosis”
A study on “impact of artificial intelligence in covid19 diagnosis”A study on “impact of artificial intelligence in covid19 diagnosis”
A study on “impact of artificial intelligence in covid19 diagnosis”
 
A study on “impact of artificial intelligence in covid19 diagnosis”
A study on “impact of artificial intelligence in covid19 diagnosis”A study on “impact of artificial intelligence in covid19 diagnosis”
A study on “impact of artificial intelligence in covid19 diagnosis”
 

Ch20

  • 1. Chapter 20 Information Management Technology © SB InstitutE
  • 2. 20.1 Learning Objectives After reading this chapter, you should be able to: Explain the role of information as a management resource Describe six common information management technologies Identify the primary factors involved in the design of information systems State the ethical issues involved in information technologies © SB InstitutE
  • 3. 20.2 Interrelated Criteria for Valuing Information Quality Relevance Quantity Timeliness © SB InstitutE Adapted from Figure 20.1
  • 4. 20.3 Information Management Technologies Internet Extranets Increased Intranets Information Decision Support Management Systems Capability Expert Systems Group Decision Support Systems © SB InstitutE
  • 5. 20.4 Internet Access: 4 Primary Capabilities Electronic Mail Telnet (E-Mail) File World Transfer Wide Protocol Web © SB InstitutE
  • 6. 20.5 Evolution in Information Needs Data (raw Data Environment facts and analysis figures) Externally focused Decisions Useful Internally and actions information focused © SB InstitutE Adapted from Figure 20.2
  • 7. 20.6 Information Requirements by Decision Level Requirement Information At Operational At Tactical At Strategic Characteristic Level Level Level Scope Narrow, well Broad defined Aggregation level Detailed Composite Time Horizon Historical Future- oriented © SB InstitutE Adapted from Table 20.1
  • 8. 20.7 Information Requirement by Decision Level (cont.) Requirement Information At Operational At Tactical At Strategic Characteristic Level Level Level Currency Recent Long term Frequency of use Continuous Periodic Type Quantitative Qualitative & Quantitative © SB InstitutE Adapted from Table 20.1
  • 9. 20.8 Stages in Information Systems Development Preliminary Conceptual Detailed problem Implementation design design definition Feedback © SB InstitutE Adapted from Figure 20.3
  • 10. 20.9 Building Blocks for Effective Implementation of Information Systems 7. System backup 4. Phased 5. Thorough 6. Training and implementation testing documentation 2. Top 1. User 3. Time and cost management Information evaluation support © SB InstitutE Adapted from Figure 20.4
  • 11. 20.10 Ten Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people 2. Thou shalt not interfere with other people's computer work 3. Thou shalt not snoop around in other people's files 4. Thou shalt not use a computer to steal 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid 7. Thou shalt not use other people's computer resources without authorization or proper compensation 8. Thou shalt not use other people's intellectual output 9. Thou shalt think about the social consequences of the program you are writing or the system you design 10. Thou shalt use a computer in ways that show consideration and respect for your fellow humans © SB InstitutE Adapted from Table 20.2