SlideShare une entreprise Scribd logo
1  sur  40
Télécharger pour lire hors ligne
Information and ICT

 Higher Business Management
         2008-2009



                              1
Unit Outline
• What is information?   • Types of ICT
• Sources of             • Business Software
  Information            • Costs and Benefits of
• Types of Information     ICT
• Value of Information   • Effects of ICT
• Uses of Information    • Legislation
  in Business




                                                   2
Data and Information
Data:                    Information:


• collections of facts   • data that has been
  or quantities, which     processed into a
  have been                form that will
  assembled in some        assist in decision-
  formal manner            making and planning


                                                 3
Sources of Information

• Primary     • Internal



• Secondary   • External

                           4
Primary Information
• first-hand information gathered and
  processed for a particular purpose


• mainly collected by observation,
  interview, questionnaire etc



                                        5
Secondary Information
• second-hand information gathered for one
  purpose but reused for another


• mainly collected from reference books,
  business and government statistics, market
  research companies, competitors,
  newspapers, Internet


                                               6
Internal Information
• data and information that come from the
  organisation’s own records eg sales records


• only people within the organisation can use
  this information


• used for control purposes within the
  organisation
                                                7
External Information
• data and information that come from
  sources outwith the organisation


• used for decision-making and planning


• analysis of factors outwith the
  organisation’s control


                                          8
Primary Information
Advantages                   Disadvantages

•   Specific for purpose     • Market research costs
•   Information is private     are high
•   Up-to-date               • Research flawed eg
    Source can be verified     sample size
•
                             • Respondents may have
                               lied
                             • Time consuming
                             • Researcher bias
                                                       9
Secondary Information
Advantages          Disadvantages

• Inexpensive       •   May not be relevant
• Ease of access    •   May have author bias
• Wide variety of   •   May be out-of-date
  sources           •   Available to
                        competitors



                                               10
Internal Information
Advantages                Disadvantages

• Accurate information    • Costs of setting up a
  after the business is     recording system
  established             • New organisations
• Accurate records help     have no information
  achieve targets         • Regular updating
• Ease of access            required


                                                    11
External Information
Advantages                 Disadvantages

• Wide range of sources    • May contain bias
  available                • Can’t guarantee
• Relatively inexpensive     integrity
• Useful for strategic     • May be out-of-date
  decisions when used      • Available to
  with PESTEC                competitors
                           • Time consuming to
                             gather
                                                  12
Types of Information
Quantitative                Qualitative

                            • Descriptive
• Definable
                            • Value judgements
• Measured
                            • Opinions
• Expressed in figures
                            • Useful to analyse people’s
                              views
• Used for comparisons eg
  target monitoring
                            • What can be done to improve
                              a service?

                                                            13
Types of Information
Presentation

• Written – text eg reports, memos, letters


• Oral – verbal eg telephone calls, presentations, meetings


• Pictorial – pictures and photos


• Graphical – graphs/charts eg pie, line, bar


• Numerical – numbers eg tables, spreadsheets


                                                              14
Value of Information
              CccOAaaT
 Accurate                   Complete

              Objective


Appropriate                 Concise


               Timely

 Available                Cost-effective
                                           15
Uses of Information in
            Business
• helps to monitor and control


• assists in decision making


• measures performance


• identifies new business opportunities
                                          16
Types of ICT
Mainframe computer:
 expensive and powerful computers eg
 Ministry of Defence and NASA


Server computer:
 runs server applications, often under heavy
 workloads, unattended, for extended time

                                               17
Types of ICT
Personal Computers (PC):
  computers found in homes and offices –
  their power has increased significantly
  over recent years

Computer Network:
  PCs can communicate across networks
  (cabled or wireless in either a LAN or
  WAN)
                                            18
Local Area Network (LAN)
• computers within an organisation or
  within a local area


• owned by one organisation only


• useful to share files and manage
  resources eg printing

                                        19
Wide Area Network (WAN)
• computers in remote locations are linked
  by telephone lines or satellite links


• there can be many owners/organisations
  linked to the system


• communication is the main use rather
  than data transfer
                                             20
The Internet
• a worldwide system of computer networks


• includes:
  –   Web pages (www) – ability to cross reference
  –   File transfer (ftp)
  –   Email facilities
  –   IRC (Internet Relay Chat) eg MSN


                                                     21
The Internet
• can be used to advertise products

• banking services - including e-commerce

• staff may use the Internet
  inappropriately – need company policies in
  place


                                               22
E-commerce
• products displayed on a website

• customers can order online and can pay
  electronically

• enables a worldwide market place

• internet-only businesses cut costs as they don’t
  have the burden of large premises and high
  numbers of sales staff
                                                     23
Electronic Mail
• fast and efficient method of communication


• can be sent to more than one person


• can attach files eg graphs, electronic forms etc


• messages can be prepared in advance


• can be printed if necessary


• can be forwarded onto others
                                                     24
Electronic Mail
Some problems:

• increase in unnecessary communications –
  important messages may get lost


• reduces interpersonal communications


• only of use if everyone is trained in using it and
  does use it
                                                       25
Video Conferencing
• enables people in different locations to have
  meetings without the need to travel


• saves travelling and accommodation costs as well
  as lost work time due to travel


• connections can be poor or disrupted


• the number of people who can effectively take
  part in a video conference is limited
                                                     26
Interactive DVD
• used for training exercises

• users make choices and see the
  consequences of their decision

• a common example is flight simulation



                                          27
Computer Aided Manufacture
           (CAM)
• involves robots and computer-controlled machines in production


• saves on labour costs


• produces consistent quality


• does not stop for rest breaks

  __________________________


• breakdowns can halt production


• expensive and time consuming to fix breakdowns
                                                                   28
EPOS
Electronic Point of Sale

• records all purchases made throughout the day

• used to predict demand and assist in the placing of orders

• linked with store cards provides customer profiling

• can use customer profiles to alter the marketing mix to
  suit individual geographical requirements


                                                               29
Business Software

•   Word Processing


•   Databases


•   Spreadsheets


•   Desk-Top Publishing


•   Computer-Aided-Design (CAD)


•   Personal Productivity Software


•   Presentation software

                                     30
Costs of ICT
Costs
•   price of hardware/software

•   staff training

•   loss of efficiency (until familiar)

•   errors/glitches

•   data loss or corruption

•   commercial espionage

•   Health and Safety                     31
Benefits of ICT
Benefits
•   increased speed of information handling and decision making


•   flexibility of integrated systems


•   increased productivity and administrative efficiency


•   enhanced reputation


•   competitive edge


•   reduction in staffing costs


•   relocation of administrative centres to cost effect locations


    facilitates home-working and tele-sales centres                 32
•
Gorfingly Good Deliveries
You have an unlimited budget! Please advise …        Work in
                                                    Groups of 3
  Gorfingly Good Deliveries wish to move into the
  technology era and invest in ICT

  They are a haulage firm providing services to other
  businesses up and down the country.

  They need ICT in order to manage customer lists, finance,
  win new contracts, communicate with drivers, schedule
  meetings for managers, prepare final accounts.

  In addition they have thought about opening another
  office in the North of Scotland.

                                                                  33
Effects of ICT on Employees
• greater productivity - fewer staff required


• remaining staff will require retraining


• older staff may feel under pressure being unable to cope


• relations with customers change


• staff do not have the same personal contact with each
  other


• staff may take advantage of homeworking
                                                             34
Effects of ICT on
            Organisations
• can lead to decentralised decision making

• additional departments may be created eg
  ecommerce

• redundancies and delayering may occur

• the span of control of managers may decrease



                                                 35
Data Protection Act 1998
•   obtain and process information fairly and lawfully


•   register the purposes for which they hold it


•   not disclose the information in any way that is different from those purposes


•   only hold information that is adequate, relevant and not excessive for the purposes
    they require


•   only hold accurate information and keep it up-to-date where necessary


•   not hold the information for longer than necessary


•   give individuals copies of the information held about themselves if they request it –
    amending/erasing as necessary


•   keep information safe
                                                                                            36
Computer Misuse Act 1990
• accessing computer material without permission e.g. looking
  at someone else's files

• accessing computer material without permission with
  intent to commit further criminal offences e.g. hacking
  into the bank's computer and increasing the amount in your
  account

• altering computer material without permission e.g. writing a
  virus to destroy someone else's data

• writing a virus or deliberately spreading one is illegal.  


                                                                 37
Copyright, Designs and Patents Act
                   1988
•   It gives the creators of literary, dramatic, musical and artistic
    works the right to control the ways in which their material may be
    used.

•   The rights cover: broadcast and public performance, copying,
    adapting, issuing, renting and lending copies to the public. In many
    cases, the creator will also have the right to be identified as the
    author and to object to distortions of his work.

•   Copyright arises when an individual or organisation creates a work, and
    applies to a work if it is regarded as original, and exhibits a degree
    of labour, skill or judgement.

•   If a work is produced as part of employment then normally the work
    belongs to the person/company who hired the individual.

•   Only the owner, or his exclusive licensee can bring proceedings in the
    courts against an infringement.                                           38
Freedom of Information (Scotland)
             Act 2002
• The Freedom of Information Act came into
  force on January 1st 2005.


• It gives you the right to ask any public body for
  all the information they have on any subject you
  choose. 


• Unless there’s a good reason, they have to give it
  you within a month. You can also ask for all the
  personal information they hold on you.

                                                       39
Congratulations
       You have completed

   Information and ICT

               in

Higher Business Management

                             40

Contenu connexe

Tendances

Applied business tools and technology
Applied business tools and technologyApplied business tools and technology
Applied business tools and technologyEmilAclon
 
A Case of Fusion Middleware (IlOUG Tech Days, July 2013)
A Case of Fusion Middleware  (IlOUG Tech Days, July 2013)A Case of Fusion Middleware  (IlOUG Tech Days, July 2013)
A Case of Fusion Middleware (IlOUG Tech Days, July 2013)Lucas Jellema
 
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Precisely
 
Jorge Torres -IT Director
Jorge Torres -IT DirectorJorge Torres -IT Director
Jorge Torres -IT DirectorJorge Torres
 

Tendances (7)

Applied business tools and technology
Applied business tools and technologyApplied business tools and technology
Applied business tools and technology
 
A Case of Fusion Middleware (IlOUG Tech Days, July 2013)
A Case of Fusion Middleware  (IlOUG Tech Days, July 2013)A Case of Fusion Middleware  (IlOUG Tech Days, July 2013)
A Case of Fusion Middleware (IlOUG Tech Days, July 2013)
 
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
 
Jorge Torres -IT Director
Jorge Torres -IT DirectorJorge Torres -IT Director
Jorge Torres -IT Director
 
bizhub_c360_c280_c220
bizhub_c360_c280_c220bizhub_c360_c280_c220
bizhub_c360_c280_c220
 
Silibus MIS
Silibus MISSilibus MIS
Silibus MIS
 
Protecting Data on Laptops
Protecting Data on LaptopsProtecting Data on Laptops
Protecting Data on Laptops
 

En vedette

Ict plan types and their development
Ict plan types and their developmentIct plan types and their development
Ict plan types and their developmentEric Kluijfhout
 
Free Ict Resources 26 March 2009
Free Ict Resources   26 March 2009Free Ict Resources   26 March 2009
Free Ict Resources 26 March 2009juko101
 
ICT resources for teachers of g&t
ICT resources for teachers of g&tICT resources for teachers of g&t
ICT resources for teachers of g&tJo Mcleay
 
ICT integration in Teacher Education: Using Open Educational Resources
ICT integration in Teacher Education: Using Open Educational ResourcesICT integration in Teacher Education: Using Open Educational Resources
ICT integration in Teacher Education: Using Open Educational ResourcesCEMCA
 
Ict based resources
Ict based resourcesIct based resources
Ict based resourcesHansoff
 
ICT TOOLS FOR EDUCATION
ICT TOOLS FOR EDUCATIONICT TOOLS FOR EDUCATION
ICT TOOLS FOR EDUCATIONJOEMAR COZ
 
Top 10 I C T Tools 4 Education
Top 10  I C T  Tools 4  EducationTop 10  I C T  Tools 4  Education
Top 10 I C T Tools 4 EducationDr.Kumuda Gururao
 
Ict tools
Ict toolsIct tools
Ict toolsYESVITA
 
ICT in Education ppt
ICT in Education pptICT in Education ppt
ICT in Education pptHamid Zaib
 

En vedette (14)

Ict plan types and their development
Ict plan types and their developmentIct plan types and their development
Ict plan types and their development
 
Free Ict Resources 26 March 2009
Free Ict Resources   26 March 2009Free Ict Resources   26 March 2009
Free Ict Resources 26 March 2009
 
ICT resources for teachers of g&t
ICT resources for teachers of g&tICT resources for teachers of g&t
ICT resources for teachers of g&t
 
ICT integration in Teacher Education: Using Open Educational Resources
ICT integration in Teacher Education: Using Open Educational ResourcesICT integration in Teacher Education: Using Open Educational Resources
ICT integration in Teacher Education: Using Open Educational Resources
 
Ict based resources
Ict based resourcesIct based resources
Ict based resources
 
ICT tools
ICT toolsICT tools
ICT tools
 
Leenuppt1
Leenuppt1Leenuppt1
Leenuppt1
 
ICT TOOLS FOR EDUCATION
ICT TOOLS FOR EDUCATIONICT TOOLS FOR EDUCATION
ICT TOOLS FOR EDUCATION
 
Top 10 I C T Tools 4 Education
Top 10  I C T  Tools 4  EducationTop 10  I C T  Tools 4  Education
Top 10 I C T Tools 4 Education
 
Tools Of ICT
Tools Of ICTTools Of ICT
Tools Of ICT
 
Ict tools
Ict toolsIct tools
Ict tools
 
ICT in Education ppt
ICT in Education pptICT in Education ppt
ICT in Education ppt
 
Ict ppt
Ict pptIct ppt
Ict ppt
 
Integration of ICT in Teaching and Learning
Integration  of  ICT in Teaching and LearningIntegration  of  ICT in Teaching and Learning
Integration of ICT in Teaching and Learning
 

Similaire à HBM Info IT CMD

Valuing the data asset
Valuing the data assetValuing the data asset
Valuing the data assetBala Iyer
 
Monetizing data - An Evening with Eight of Chicago's Data Product Management...
Monetizing data  - An Evening with Eight of Chicago's Data Product Management...Monetizing data  - An Evening with Eight of Chicago's Data Product Management...
Monetizing data - An Evening with Eight of Chicago's Data Product Management...Randy Horton
 
A Multi-Faceted Approach to CRM at United
A Multi-Faceted Approach to CRM at UnitedA Multi-Faceted Approach to CRM at United
A Multi-Faceted Approach to CRM at UnitedVivastream
 
Distributed data processing
Distributed data processingDistributed data processing
Distributed data processingAyisha Kowsar
 
A future history of content management
A future history of content managementA future history of content management
A future history of content managementJohn Mancini
 
Tk09 Master Data Management Cloud Based Services En
Tk09 Master Data Management Cloud Based Services EnTk09 Master Data Management Cloud Based Services En
Tk09 Master Data Management Cloud Based Services EnValtech
 
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced AnalyticsADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced AnalyticsDATAVERSITY
 
Lecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahd
Lecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahdLecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahd
Lecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahdAhmedLakhwera
 
understanding networked infrastructure
understanding networked infrastructureunderstanding networked infrastructure
understanding networked infrastructureMohammad Salman
 
Meeting the Demands of an On-Demand World
Meeting the Demands of an On-Demand WorldMeeting the Demands of an On-Demand World
Meeting the Demands of an On-Demand WorldHostway|HOSTING
 
Healthcare Business Intelligence for Power Users
Healthcare Business Intelligence for Power UsersHealthcare Business Intelligence for Power Users
Healthcare Business Intelligence for Power UsersPerficient, Inc.
 
[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx
[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx
[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptxDataScienceConferenc1
 
Digital Asset Management and Archival Preservation
Digital Asset Management and Archival PreservationDigital Asset Management and Archival Preservation
Digital Asset Management and Archival PreservationLAC Group
 

Similaire à HBM Info IT CMD (20)

Valuing the data asset
Valuing the data assetValuing the data asset
Valuing the data asset
 
Information systems in global business today
Information systems in global business todayInformation systems in global business today
Information systems in global business today
 
Monetizing data - An Evening with Eight of Chicago's Data Product Management...
Monetizing data  - An Evening with Eight of Chicago's Data Product Management...Monetizing data  - An Evening with Eight of Chicago's Data Product Management...
Monetizing data - An Evening with Eight of Chicago's Data Product Management...
 
Information system
Information systemInformation system
Information system
 
A Multi-Faceted Approach to CRM at United
A Multi-Faceted Approach to CRM at UnitedA Multi-Faceted Approach to CRM at United
A Multi-Faceted Approach to CRM at United
 
Distributed data processing
Distributed data processingDistributed data processing
Distributed data processing
 
A future history of content management
A future history of content managementA future history of content management
A future history of content management
 
Tk09 Master Data Management Cloud Based Services En
Tk09 Master Data Management Cloud Based Services EnTk09 Master Data Management Cloud Based Services En
Tk09 Master Data Management Cloud Based Services En
 
Crm initiatives at 3 m
Crm initiatives at 3 mCrm initiatives at 3 m
Crm initiatives at 3 m
 
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced AnalyticsADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
ADV Slides: What Happened of Note in 1H 2020 in Enterprise Advanced Analytics
 
Lecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahd
Lecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahdLecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahd
Lecture 1 [MIS] .pptx Data flow djnsdjnasjkdjahd
 
understanding networked infrastructure
understanding networked infrastructureunderstanding networked infrastructure
understanding networked infrastructure
 
Meeting the Demands of an On-Demand World
Meeting the Demands of an On-Demand WorldMeeting the Demands of an On-Demand World
Meeting the Demands of an On-Demand World
 
Healthcare Business Intelligence for Power Users
Healthcare Business Intelligence for Power UsersHealthcare Business Intelligence for Power Users
Healthcare Business Intelligence for Power Users
 
Chap3
Chap3Chap3
Chap3
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
3-ch02.ppt
3-ch02.ppt3-ch02.ppt
3-ch02.ppt
 
[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx
[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx
[DSC Europe 23] Ivan Dundovic - How To Treat Your Data As A Product.pptx
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Digital Asset Management and Archival Preservation
Digital Asset Management and Archival PreservationDigital Asset Management and Archival Preservation
Digital Asset Management and Archival Preservation
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

HBM Info IT CMD

  • 1. Information and ICT Higher Business Management 2008-2009 1
  • 2. Unit Outline • What is information? • Types of ICT • Sources of • Business Software Information • Costs and Benefits of • Types of Information ICT • Value of Information • Effects of ICT • Uses of Information • Legislation in Business 2
  • 3. Data and Information Data: Information: • collections of facts • data that has been or quantities, which processed into a have been form that will assembled in some assist in decision- formal manner making and planning 3
  • 4. Sources of Information • Primary • Internal • Secondary • External 4
  • 5. Primary Information • first-hand information gathered and processed for a particular purpose • mainly collected by observation, interview, questionnaire etc 5
  • 6. Secondary Information • second-hand information gathered for one purpose but reused for another • mainly collected from reference books, business and government statistics, market research companies, competitors, newspapers, Internet 6
  • 7. Internal Information • data and information that come from the organisation’s own records eg sales records • only people within the organisation can use this information • used for control purposes within the organisation 7
  • 8. External Information • data and information that come from sources outwith the organisation • used for decision-making and planning • analysis of factors outwith the organisation’s control 8
  • 9. Primary Information Advantages Disadvantages • Specific for purpose • Market research costs • Information is private are high • Up-to-date • Research flawed eg Source can be verified sample size • • Respondents may have lied • Time consuming • Researcher bias 9
  • 10. Secondary Information Advantages Disadvantages • Inexpensive • May not be relevant • Ease of access • May have author bias • Wide variety of • May be out-of-date sources • Available to competitors 10
  • 11. Internal Information Advantages Disadvantages • Accurate information • Costs of setting up a after the business is recording system established • New organisations • Accurate records help have no information achieve targets • Regular updating • Ease of access required 11
  • 12. External Information Advantages Disadvantages • Wide range of sources • May contain bias available • Can’t guarantee • Relatively inexpensive integrity • Useful for strategic • May be out-of-date decisions when used • Available to with PESTEC competitors • Time consuming to gather 12
  • 13. Types of Information Quantitative Qualitative • Descriptive • Definable • Value judgements • Measured • Opinions • Expressed in figures • Useful to analyse people’s views • Used for comparisons eg target monitoring • What can be done to improve a service? 13
  • 14. Types of Information Presentation • Written – text eg reports, memos, letters • Oral – verbal eg telephone calls, presentations, meetings • Pictorial – pictures and photos • Graphical – graphs/charts eg pie, line, bar • Numerical – numbers eg tables, spreadsheets 14
  • 15. Value of Information CccOAaaT Accurate Complete Objective Appropriate Concise Timely Available Cost-effective 15
  • 16. Uses of Information in Business • helps to monitor and control • assists in decision making • measures performance • identifies new business opportunities 16
  • 17. Types of ICT Mainframe computer: expensive and powerful computers eg Ministry of Defence and NASA Server computer: runs server applications, often under heavy workloads, unattended, for extended time 17
  • 18. Types of ICT Personal Computers (PC): computers found in homes and offices – their power has increased significantly over recent years Computer Network: PCs can communicate across networks (cabled or wireless in either a LAN or WAN) 18
  • 19. Local Area Network (LAN) • computers within an organisation or within a local area • owned by one organisation only • useful to share files and manage resources eg printing 19
  • 20. Wide Area Network (WAN) • computers in remote locations are linked by telephone lines or satellite links • there can be many owners/organisations linked to the system • communication is the main use rather than data transfer 20
  • 21. The Internet • a worldwide system of computer networks • includes: – Web pages (www) – ability to cross reference – File transfer (ftp) – Email facilities – IRC (Internet Relay Chat) eg MSN 21
  • 22. The Internet • can be used to advertise products • banking services - including e-commerce • staff may use the Internet inappropriately – need company policies in place 22
  • 23. E-commerce • products displayed on a website • customers can order online and can pay electronically • enables a worldwide market place • internet-only businesses cut costs as they don’t have the burden of large premises and high numbers of sales staff 23
  • 24. Electronic Mail • fast and efficient method of communication • can be sent to more than one person • can attach files eg graphs, electronic forms etc • messages can be prepared in advance • can be printed if necessary • can be forwarded onto others 24
  • 25. Electronic Mail Some problems: • increase in unnecessary communications – important messages may get lost • reduces interpersonal communications • only of use if everyone is trained in using it and does use it 25
  • 26. Video Conferencing • enables people in different locations to have meetings without the need to travel • saves travelling and accommodation costs as well as lost work time due to travel • connections can be poor or disrupted • the number of people who can effectively take part in a video conference is limited 26
  • 27. Interactive DVD • used for training exercises • users make choices and see the consequences of their decision • a common example is flight simulation 27
  • 28. Computer Aided Manufacture (CAM) • involves robots and computer-controlled machines in production • saves on labour costs • produces consistent quality • does not stop for rest breaks __________________________ • breakdowns can halt production • expensive and time consuming to fix breakdowns 28
  • 29. EPOS Electronic Point of Sale • records all purchases made throughout the day • used to predict demand and assist in the placing of orders • linked with store cards provides customer profiling • can use customer profiles to alter the marketing mix to suit individual geographical requirements 29
  • 30. Business Software • Word Processing • Databases • Spreadsheets • Desk-Top Publishing • Computer-Aided-Design (CAD) • Personal Productivity Software • Presentation software 30
  • 31. Costs of ICT Costs • price of hardware/software • staff training • loss of efficiency (until familiar) • errors/glitches • data loss or corruption • commercial espionage • Health and Safety 31
  • 32. Benefits of ICT Benefits • increased speed of information handling and decision making • flexibility of integrated systems • increased productivity and administrative efficiency • enhanced reputation • competitive edge • reduction in staffing costs • relocation of administrative centres to cost effect locations facilitates home-working and tele-sales centres 32 •
  • 33. Gorfingly Good Deliveries You have an unlimited budget! Please advise … Work in Groups of 3 Gorfingly Good Deliveries wish to move into the technology era and invest in ICT They are a haulage firm providing services to other businesses up and down the country. They need ICT in order to manage customer lists, finance, win new contracts, communicate with drivers, schedule meetings for managers, prepare final accounts. In addition they have thought about opening another office in the North of Scotland. 33
  • 34. Effects of ICT on Employees • greater productivity - fewer staff required • remaining staff will require retraining • older staff may feel under pressure being unable to cope • relations with customers change • staff do not have the same personal contact with each other • staff may take advantage of homeworking 34
  • 35. Effects of ICT on Organisations • can lead to decentralised decision making • additional departments may be created eg ecommerce • redundancies and delayering may occur • the span of control of managers may decrease 35
  • 36. Data Protection Act 1998 • obtain and process information fairly and lawfully • register the purposes for which they hold it • not disclose the information in any way that is different from those purposes • only hold information that is adequate, relevant and not excessive for the purposes they require • only hold accurate information and keep it up-to-date where necessary • not hold the information for longer than necessary • give individuals copies of the information held about themselves if they request it – amending/erasing as necessary • keep information safe 36
  • 37. Computer Misuse Act 1990 • accessing computer material without permission e.g. looking at someone else's files • accessing computer material without permission with intent to commit further criminal offences e.g. hacking into the bank's computer and increasing the amount in your account • altering computer material without permission e.g. writing a virus to destroy someone else's data • writing a virus or deliberately spreading one is illegal.   37
  • 38. Copyright, Designs and Patents Act 1988 • It gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used. • The rights cover: broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public. In many cases, the creator will also have the right to be identified as the author and to object to distortions of his work. • Copyright arises when an individual or organisation creates a work, and applies to a work if it is regarded as original, and exhibits a degree of labour, skill or judgement. • If a work is produced as part of employment then normally the work belongs to the person/company who hired the individual. • Only the owner, or his exclusive licensee can bring proceedings in the courts against an infringement. 38
  • 39. Freedom of Information (Scotland) Act 2002 • The Freedom of Information Act came into force on January 1st 2005. • It gives you the right to ask any public body for all the information they have on any subject you choose.  • Unless there’s a good reason, they have to give it you within a month. You can also ask for all the personal information they hold on you. 39
  • 40. Congratulations You have completed Information and ICT in Higher Business Management 40