Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-1
Chapter 13Information Technology
for Business
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-2
Learning ObjectivesAfter reading this chapter, you should be able to:
Discuss the impacts information technology has had on the business world.
Identify the IT resources businesses have at their disposal and how these resources are used.
Describe the role of information systems, the different types of information systems, and how businesses use such systems.
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-3
Learning ObjectivesAfter reading this chapter, you should be able to:
Identify the threats and risks information technology poses on businesses.
Describe the ways in which businesses protect themselves from the threats and risks information technology poses.
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-4
IT Impacts
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-5
Creating Portable Offices: Providing Remote Access to Instant Information
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-6
Enabling Better Service by Coordinating Remote Deliveries
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-7
Creating Leaner, More Efficient Organizations
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-8
Enabling Increased Collaboration
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-9
Enabling Global Exchange
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-10
Improving Management Processes
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-11
Providing Flexibility for Customization
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-12
Providing New Business Opportunities
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-13
Improving the World and Our Lives
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-14
IT Building Blocks: Business Resources
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-15
The Internet and Other Communication Resources
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-16
Networks: System Architecture
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-17
Hardware and Software
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-18
Information Systems:Harnessing the Competitive
Power of IT
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-19
Leveraging Information Resources:Data Warehousing and Data Mining
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-20
Types of Information Systems
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-21
IT Risks and Threats
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-22
Hackers
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-23
Identity Theft
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-24
Intellectual Property Theft
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-25
Computer Viruses, Worms, and Trojan Horses
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-26
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-27
Spam
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-28
IT Protection Measures
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-29
Preventing Unauthorized Access: Firewalls
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-30
Preventing Identity Theft
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-31
Preventing Infectious Intrusions: Anti-Virus Software
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-32
Protecting Electronic Communications: Encryption Software
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-33
Avoiding Spam and Spyware
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-34
Ethical Concerns in IT
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-35
Summary of Learning Objectives
Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall 13-36
Top Related