Information Technology In A Business Environment PDF

Document Details

Uploaded by Deleted User

Tags

information technology business information systems data processing computer technology

Summary

This document explores information technology in a business context, focusing on the concepts of data, information, and systems. It details types of systems and the roles of information systems in improving business processes, and also explores computer technologies and their applications in various contexts.

Full Transcript

CHAPTER 1: INFORMATION Data TECHNOLOGY IN A BUSINESS - from the Latin word, ‘datum’, refer ENVIRONMENT to raw, unorganized and Business – person’s r...

CHAPTER 1: INFORMATION Data TECHNOLOGY IN A BUSINESS - from the Latin word, ‘datum’, refer ENVIRONMENT to raw, unorganized and Business – person’s regular occupation, unprocessed facts. profession, or trade - can be in a form of a number, alphabets, date, measurement, Information Technology and even statement. - comprises a wide range of Information hardware and software solutions. - defined as the study and - popularly described as refined, application of computers, restructured, and organized data. networks, and - A process is required to transform telecommunications. data into information. Modern Information System – The collection of data for whatever reason businesses are available online through should always have a clear purpose and social media or social network. plan for their use. A business organization’s main reason for collecting BUSINESSES THAT ARE POPULAR IN THE data is to monitor and improve INFORMATION STAGE performance. Call Center – in demand jobs all over the System – can be defined as a collection of world parts that interact, interconnect, and work Banking – online and mobile banking together to accomplish certain objectives. CHANGING ROLE OF IT IN BUSINESS Subsystem – is a part of the whole system that has its own area of immediate focus. 1. Productivity – technological tools and applications TYPES OF SYSTEMS: 2. Monitoring – ensure resources are 1. Natural Systems – these systems utilized efficiently are made by nature. CHAPTER 2: INTRODUCTION TO 2. Man-made Systems – these INFORMATION SYSTEMS systems are designed, developed, and implemented by human Information System (IS) beings. - used by people and business Computer System – takes inputs and organizations for the improvement processes them to create outputs. of processes and operations to make things simpler and easier. Input – the fundamental idea of a - it is a combined set of modules for computer system is that in every input, gathering, processing, and storing there is an expected output. Users are of data and for delivering of required to input data into a specific information and digital products. program/computer system using input - focuses on the development of devices such as keyboard, mouse, technological innovation. scanner, etc. - is a man-made system that Central Processing Unit (CPU) – collects, stores, retrieves, considered as the brain of a computer and processes, manages, the one responsible for controlling all disseminates, and analyzes activities and handling input/output information needed to facilitate a operations within a computer system. business organization. Output – is the result after data IT vs. IS – IT refers to any technological or processing. Output can be presented computer-based tool primarily used for using an output device (e.g., printers, supporting the needs of business monitors, and speakers.) organizations. IS collects, stores, retrieves, processes, manages, Storage Devices – help users keep data, disseminates, and analyzes information information, and instructions from needed to facilitate business specific programs. organizations’ operational functions and TWO TYPES OF STORAGE DEVICES: support management in making decisions. 1. Primary Storage Device – include random-access memory (RAM) and BASIC COMPONENTS OF COMPUTER- read-only memory (ROM). These BASED INFORMATION SYSTEMS are also called internal memories 1. Hardware – consists of the located inside the CPU. system’s physical devices. 2. Secondary Storage Device – are 2. Software – refers to the set of known as any alternative storage. It computer programs that control allows users to store data, the overall operation of computer information, files, and programs system. temporarily for future use. 3. Database – refers to a collection of Information Processing – refers to related files and records that are data processing functions that are stored in a special location for easy commonly related to internal access. operations and economic and 4. Networks – refers to a connection financial activities. of two or more computers established for the purpose of Data Maintenance – refers to a sharing various data. system’s functional activities such as 5. Procedures – these are the rules, adding, saving, deleting, updating, policies, and methods that retrieving, and editing data from the administer the operation of a master data. computer system. THREE LOGICAL COMPONENTS OF A 6. People – they are the most crucial BUSINESS PROCESS WITHIN THE component of IS, they are the SCOPE OF AN IS people who produce useful outputs. 1. Information Process – refers to a portion of an IS closely related to a OTHER COMPONENTS specified business process. 1. Telecommunications – refers to 2. Operation Process – refers to a the electronic transmission of man-made IS that consists of information within a specific people, policies, procedures, and distance. equipment whose main objective is 2. Internet – the largest type of to accomplish a certain goal of a network that allows users to share particular business organization. information worldwide. 3. Management Process – refers to a 3. World Wide Web – it is accessible man-made IS that consists of through internet, and it consists of people, policies, procedures, and multimedia collections that are equipment whose main objective is stored in a particular database of to plan, manage, and control the CBIs. overall operations of a business organization. OTHER TYPES OF IS 1. Transaction Processing Systems CHAPTER 3: EMERGING (TPS) – also known as a real-time TECHNOLOGIES FOR BUSINESS processing system. It is an IS for all PROCESSES types of business transactions. It Office Application Tools – are among the captures, stores, classifies, most commonly used application tools in maintains, updates, and retrieves business organizations. transaction data for record keeping and inputting data to other types of Microsoft Office – is a family of powerful CBIs. office applications that support various 2. Management Information business processes. Systems (MIS) – it consists of Microsoft Word – it is a word processing hardware and software program that is designed for both Mac and applications that support all the Windows operating systems. organization’s business transactions. Microsoft Excel – it is a spreadsheet 3. Decision Support System (DSS) – program that includes features such as a computer-based application that calculation, macroprogramming, and helps companies identify and give graphic tools. solutions by making decisions on Microsoft PowerPoint – it is a how to solve problems including presentation program available in both issues on raw data, documents, Windows and Mac operating systems. employee and company profiling, etc. Microsoft OneNote – it is a free form 4. Executive Information System information gathering program that allows (EIS) – is a specialized DSS that a user to collaborate with other OneNote assists senior executives of users. organizations in making decisions. Microsoft Outlook – it allows users to System Development Life Cycle (SDLC) share information in the form of folders, – is one of the methodologies used in forms, and so on. software development. Microsoft Publisher – specifically SDLC is composed of multiple phases: designed for entry-level desktop publishing. It focuses on page layout 1. Planning rather than text composition. 2. Analysis 3. Design Microsoft Access – used to create a 4. Development database whose main purpose is to 5. Testing organize, store, maintain, and manage 6. Implementation data and information for reporting and 7. Maintenance analysis. Information Security – means protecting Computing – is defined as the process of information from malicious software and utilizing computer technology to complete unauthorized access, use, disclosure, a certain task. modification, disruption, and destruction. Computer Technology – involve Information Security Management – is computer hardware, computer software, the process of identifying the security data, and procedures that would perform controls to keep and defend information certain tasks or functions. assets. CURRENT COMPUTER TECHNOLOGIES b. Social Networking SaaS – applications that are used by 1. Voice and Video Technology – is business organizations, popularly used in conducting individuals, or group of teleconferencing, computerized individuals for the purpose of teleconferencing, and networking and sharing of videoconferencing. information, videos, photos, Teleconferencing – used by graphics, and others. companies to conduct 2. Platform as a Service (PaaS) – meetings with multiple refers to the ability to deploy people from different applications to the cloud geographical locations. infrastructure. Computerized Teleconferencing – the TYPES OF PaaS system can be used by a. Social Application people from various Platform – refers to a geographical areas. platform that provides Videoconferencing – third parties with full requires people to access and gives the participate from various opportunity to access locations and time zones and write functionalities transmitting audio and that are available for all video data to achieve their users. purpose and objectives. b. Business Application Cloud – refers to the internet. Platform – refers to higher technical Cloud computing – in business complexities that lead to perspective, this allows a business transaction based organization’s data and information to be business applications. stored and accesses virtually. c. Computing Platform – CLOUD COMPUTING SERVICE MODELS refers to a service that THAT CAN BE USED BY BUSINESS provides processors, ORGANIZATIONS: storage, and bandwidth. d. Web Application 1. Software as a Service (SaaS) – Platform – refers to an refers to the ability to use application that applications running on the cloud provides API and other infrastructure made available by a functionalities to service provider. developers to build web applications that TYPES OF SaaS: leverage their mapping a. Business Utility SaaS – are or calendar. applications that are used by 3. Infrastructure as a Service (IaaS) business organizations, – refers to the ability to provide individuals, or group of processing, networks, storage, and individuals to manage and other primary resources related to collect data, standing computing. This type of service collaborative processes, and model offers customers the ability provide organized analysis. to deploy and run essential or arbitrary software. CLASSIFICATION OF THE CLOUD interpret, learn, and use data to make DEPLOYMENT MODEL decisions. 1. Private Cloud – type of deployment a. Robotics – are common model that refers to the cloud technologies being used to help infrastructure that is used and or replace human workers to operated by only one organization. increase efficiency, 2. Community Cloud - type of productivity, and quality. deployment model that refers to b. Speech Recognition – the cloud infrastructure that is customers can use their voice shared by many business to make transactions. organizations and supports certain c. Cybersecurity protection communities that share the same against threats – used in bank sentiments and concerns. systems among others to 3. Public Cloud - type of deployment ensure secure transactions model that refers to the cloud online. infrastructure that is made Machine Learning – it is the field that available to a large focuses on program development that industry/group/general public. allows computers to learn automatically 4. Hybrid Cloud - type of deployment without human assistance and model that refers to the cloud intervention. infrastructure that is combined with two or more clouds that are Business Intelligence – refers to the bound by standardized or processes, technologies, and tools proprietary technology. required to convert data into information, information to knowledge, and knowledge Mobile Computing – accessing, sharing into plans that derive profitable business and managing data using mobile devices actions. from anywhere. BUSINESS INTELLIGENCE Green Computing – using computers and APPLICATIONS IN AN technology in a way that is good for the ORGANIZATION/ENTERPRISE environment. 1. Analytics – refers to a program that STAGES OF GREEN COMPUTING: builds quantitative processes for 1. Design organizations to arrive at the most 2. Manufacture favorable decisions and perform 3. Use business knowledge discovery. 4. Disposal 2. Enterprise Reporting – program that builds infrastructure Grid Computing – it is a distributed specifically for strategic reporting architecture that uses a group of to support the strategic computes to combine resources and work management of a business. together to perform a task that would 3. Measurement – program that rather be difficult for a single machine. creates performance metrics and Internet of Things (IoT) – refers to a performs benchmarking that aid network of physical devices connected to business leaders in determining the internet that can collect, share, and how to progress toward certain exchange data. business goals. 4. Collaboration Platform – program Artificial Intelligence – is the ability of a that initiates and obtains inputs certain machine to use algorithms to from various areas to work and collaborate with each other by data Intranet – creates connections inside an sharing/electronic data knowledge. organization. 5. Knowledge Management – STUDY OF EVANS AND WURSTER program that makes a business ENTITLED STRATEGIES AND THE NEW data-driven. ECONOMICS OF INFORMATION (1997) 1. Reach – potential number of local CHAPTER 4: E-BUSINESS, E- and international customers of a COMMERCE, & M-COMMERCE business organization that can World Wide Web (WWW) – provides interact with each other through unrestricted access to and publishing of the use of internet. information, over the internet using web 2. Richness – information that browsers. business organizations can share to their consumers. E-business – any online-run business. 3. Affiliation – effectiveness of the Computer Networks – the connection linkages between business between computers to share information organizations. and resources. Electronic Commerce (E-Commerce) – DIFFERENT TYPES OF COMPUTER refers to commercial transactions NETWORKS executed online using internet. 1. Personal Area Network (PAN) – FEATURES OF E-COMMERCE used to allow communication Ubiquity – means that the marketable between devices close to each transaction is accessible anytime, other. anywhere. 2. Local Area Network (LAN) – one of the most commonly used Global Reach and Security – allows a computer networks that cover a company to get customers anywhere on small area such as a house, room, the world. or building. Universal Standards – refers to a website 3. Campus Area Network (CAN) – that can be operated on a standard specifically used for academic platform which follows identified methods institutions where LANs are and a system. interconnected in a limited geographical area. Richness – volume of the content of the 4. Metropolitan Area Network website and the way it is used by (MAN) – within the area if a town or consumers. city where it connects two or more Interactivity – refers to the relationship LANs or CANs. between consumer and an e-commerce 5. Wide Area Network (WAN) – used website. within regional or national. 6. International Network (Internet) – Information Density – amount of largest computer network that products that can fit on a computer allows users to access without screem. restrictions. E-COMMERCE SECURITY SYSTEM: Internet – creates connections between 1. Auditability computers around the world. 2. Authenticity Extranet – creates connections beyond an 3. Availability organization. 4. Confidentiality 5. Encryption 6. Integrity commerce platforms from problems such 7. Non-reputation as identity theft. Mobile Commerce (M-Commerce) – use LAWS AND LEGAL REQUIREMENTS of wireless handheld devices, such as Republic Act 8792 (Electronic mobile phones, to conduct business- Commerce Act of 2000) – covers the related transactions online. mandates of the Philippine government in M-COMMERCE FORCES terms of executing online transaction locally or internationally. 1. Fourth (4th) and Third (3rd) Generation Technologies Republic Act 10173 (Data Privacy Act of 2. Wireless Application Protocol 2012) – prohibits the communication and (WAP) – a technical standard used sharing of written, electronic, and for the transfer of information to recorded information by an individual to specific wireless devices. another. 3. iMode Access Platforms – THREE MAIN INDIVIDUALS introduced by the Japanese. It displays content using HTML. 1. Data Subject – individual whose 4. Personalized Services personal information is being processed. Taxes – these are mandatory contributions 2. Personal Information Controller – charged on individual or corporation by controls, holds and processes government entity. information and instructs another Trademarks – is a distinguishing word, entity to do things on their behalf. phrase, symbol, and design that identifies 3. Personal Information Processor – the uniqueness of a product or service. juridical person qualified to take action under the act. Patent – property right granted by the US Patent and Trademark office to an Consumer Protection Regulation- invention for its public disclosure for a Transactions Through E-Commerce – limited period of time. provides protection to consumers when buying and selling products and services Copyright – protect works of authorship, through the use of e-commerce. such as writings, music and works of art, that has been tangibly expressed. Tax Guidelines for E-Commerce, Transactions in the Philippines – the Shipping Restrictions – e.g., airbags, main purpose of this circular is to remind animals, perishable goods, hazardous individuals and business organizations to materials handle sales and taxes properly when Inventory – certain rules and prohibitions conducting online transactions. that align with lease, deed or zoning codes when it comes to stock inventory for businesses. Business Restrictions – limits the kind of activities that the operator of a facility can undertake. Business Permits and Licenses – needed in business to operate legally. Payment Card Industry (PCI) Compliance – serves as a protection for online businesses, especially SaaS and e-

Use Quizgecko on...
Browser
Browser