Chapter 17 Managing Information - PowerPoint PPT Presentation

1 / 31
About This Presentation
Title:

Chapter 17 Managing Information

Description:

Getting and Sharing Information. After reading these sections, you should be able to: ... Sharing Knowledge and Expertise. Decision. Support. System ... – PowerPoint PPT presentation

Number of Views:45
Avg rating:3.0/5.0
Slides: 32
Provided by: debor125
Category:

less

Transcript and Presenter's Notes

Title: Chapter 17 Managing Information


1
Chapter 17Managing Information
Designed Prepared byB-books, Ltd.
2
Moores Law
3
Why Information Matters
After reading these sections, you should be able
to
  • explain the strategic importance of information.
  • describe the characteristics of useful
    information (i.e., its value and costs).

4
Data versus Information
  • Raw data facts figures
  • Information useful data that influences choices

5
Biz Flix Lorenzos Oil
Beyond the Book
Take Two Video Click
Do the scientists present data or information
during the symposium?
6
Strategic Importance of Information
1
7
First-Mover Advantage
1.1
8
Cable versus DSL
Cable companies have invested 90 billion over
the last decade to create a first-mover advantage
in delivering high-speed Internet.
9
Fast Facts on First Movers
ON AVERAGE
First movers earn a 30 market share. Later
movers earn a 19 share. Of market leaders, a
whopping 44 were first movers.
10
Sustaining a Competitive Advantage
1.2
11
Characteristics of Useful Information
  • Accurate
  • Complete
  • Relevant
  • Timely

2
12
Costs of Useful Information
  • Acquisition
  • Processing
  • Storage
  • Retrieval
  • Communication Costs

2
13
Getting and Sharing Information
After reading these sections, you should be able
to
  • explain the basics of capturing, processing, and
    protecting information.
  • describe how companies can access and
    shareinformation and knowledge.

14
Capturing Information
3.1
15
10 Uses for RFID
  • tracking computer equipment
  • security access for employees
  • EZpass on toll roads
  • instant credit card payments
  • cell phone SIM cards
  • shipping labels
  • preventing shrinkage
  • tracking files
  • collecting data on meeting participants
  • customer loyalty cards (instead of a stamp)
  • Source 10 Business Uses for RFID, Inc.,
    available online at http//technology.inc.com/mult
    imedia/slideshows/content/10-business-uses-for-rfi
    d.html/

16
Processing Information Data Mining
3.2
17
Unsupervised Data Mining
3.2
18
Protecting Information
  • Authentication
  • Authorization
  • Two-factor authentication
  • Firewalls
  • Antivirus software
  • Data encryption
  • Virtual private networks
  • Secure Sockets Layer (SSL) encryption

3.3
19
Tips for Protecting Data
Beyond the Book
  • Rule 1 Understand the real value of data (not
    just the value of the disk its on) and treat it
    accordingly.
  • Encrypt data.
  • Track data that you send to someone else.
  • Use a coding system to label the value of a disk
    or a memory stick.
  • Source B. Worthen, Workers Losing Computer Data
    May Lack Awareness of its Value, The Wall Street
    Journal, 27 November 2007, B3.

20
Accessing and SharingInformation and Knowledge
4
21
Executive Information System (EIS)
  • Uses internal and external data
  • Used to monitor and analyze organizational
    performance
  • Must provide accurate, complete, relevant,
    andtimely information to managers

4.1
22
Characteristics of Best-Selling EIS
Ease of Use
  • Few commands to learn
  • Important views saved
  • 3-D charts
  • Geographic dimensions

Analysis of Information
  • Sales tracking
  • Easy-to-understand displays
  • Time periods
  • Compare to standards
  • Trigger exceptions
  • Drill down
  • Detect alert newspaper
  • Detect alert robots

Identification ofProblems and Exceptions
4.1
23
Intranets
  • Private company networks
  • Allow employees to access, share, and publish
    information
  • A firewall permits only authorized
    internalaccess

4.1
24
Why Companies Use Intranets
  • Inexpensive
  • Increase efficiencies and reduce costs
  • Intuitive and easy to use
  • Work across all computer systems
  • Can be built on top of existing network
  • Work with software programs that convert to HTML
  • Software is available at no cost or is less
    expensive

4.1
25
Corporate Portals
4.1
26
External Access and Sharing
4.2
27
Benefits of External Access and Sharing
4.2
28
Electronic Data Interchange (EDI)
4.2
29
Web Services
Web Services
Using standardized protocols to describe data
from one company in such a way that those data
can automatically be read, understood,
transcribed, and processed by different computer
systems in another company.
4.2
30
Extranet
Extranet
Allows companies to exchange information and
conduct transactions with outsiders by providing
them direct, Web-based access to authorized parts
of a companys intranet or information system.
4.2
31
Sharing Knowledge and Expertise
4.3
Write a Comment
User Comments (0)
About PowerShow.com