Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.

Post on 13-Dec-2015

215 views 1 download

Transcript of Managing Operations Chapter 8 Information Systems Management In Practice 6E McNurlin & Sprague.

Managing Operations

Chapter 8

Information Systems Management In Practice 6E

McNurlin & Sprague

2

Introduction

3

What Are Operations?

Why Talk About Operations?

Solving Operational Problems

Operational Measures

The Importance of Good Management

4

What’s New in Operations?

1. Companies Have Cleaned Their Operational House

2. More Operations Managers are Managing Outward

3. Operations are Being Simplified

4. Certain Operations are Being Offloaded

5

What’s New in Operations?

1. Companies Have Cleaned Their Operational House

2. More Operations Managers are Managing Outward

3. Operations are Being Simplified

4. Certain Operations are Being Offloaded

6

What’s New in Operations?

1. Companies Have Cleaned Their Operational House

2. More Operations Managers are Managing Outward

3. Operations are Being Simplified

4. Certain Operations are Being Offloaded

7

What’s New in Operations?

1. Companies Have Cleaned Their Operational House

2. More Operations Managers are Managing Outward

3. Operations are Being Simplified

4. Certain Operations are Being Offloaded

8

Outsourcing IS Functions

9

Outsourcing IS Functions

10

Outsourcing IS Functions

Managing Outsourcing

CASE EXAMPLE: Eastman Kodak Company

CASE EXAMPLE: Honda Motor Company

11

Information SecurityViruses

Insider Abuse

Laptop Theft

System Penetration

Denial of Service

Unauthorized Access

Theft of Proprietary Info

Financial Fraud

Telecom Fraud

Sabotage

Telecom Eavesdropping

Active Wiretapping

12

Information Security

1. Cracking the password 2. Tricking someone 3. Network sniffing 4. Misusing administrative tools 5. Paying middlemen 6. Denial of service attacks7. Trojan horse programs 8. Viruses9. Spoofing

13

Security’s Five Pillars

1. Authentication

2. Identification

3. Privacy

4. Integrity

5. Nonrepudiation

14

Information SecurityAntivirus Software

Firewalls

Physical Security

Access Control

Intrusion Detection

Encrypted Files

Encrypted Login

Reuseable Passwords

Digital IDs

PCMCIA

Biometrics

15

Business Continuity

Safeguarding people during a disaster

Documenting business procedures

Giving employees the tools and space to handle personal issues

16

Business Continuity

Using Internal Resources

Using External Resources

CASE EXAMPLE: Household International

17

Conclusion

Managing Inward vs. Managing Outward

18

PART II Discussion Case

Managing Information Security on a Shoestring Budget