2. What is IT?
Information Technology includes all tools that capture, store, process,
exchange, and use information.
Field of IT includes:
computer hardware
Software
Networks
Databases
IT infrastructure – an organization’s defined set of IT hardware, software
and network
IT support organization – the staff people who will plan, implement,
operate and support IT
*organizations IT infrastructure must be integrated with employees and
procedures to build and support IS
3. Function of IT
Decision Support System (DSS)
- employs models and analytic tools to help users gain insights
into data, draw conclusions from the data and make recommendations
- can provide ‘what if’ analysis
Example: buyer might use DSS to analyze supplier bids and select the
least expensive provider for raw materials
E-learning systems
- encompass a number of computer enhanced learning
techniques, including computer-based simulation, multimedia CD-ROMs,
web based learning materials, hypermedia, podcats and Webcasts
Example: Whirpools ‘Virtual University’
4. Network IT
Web conferencing
- uses IT to conduct meetings or presentations in which
participants are connected via Internet
Screen sharing- the most basic form of web conference – each
participant sees whatever is on the presenter’s screen, be it a
spreadsheet, legal document, artwork, blueprint, or MRI image
Types of Web Conferencing
1. Web Casting – audio and video information is broadcast from the
presenter to participants
2. Webinar – a live internet presentation that supports interactive
communications between presenter and the audience
Example: Cerner’s corp. (sales, mktg. & technology workers)
5. Network IT
3. Wiki – Hawaiian for fast
- a website that allows users to edit and change its content
easily and rapidly
- enables individual members of a workgroup or project team
to collaborate on a document, spreadsheet, or software application
without having to send the materials back and forth.
Example: Creative team of MWW Group (public relations mktg.)
4. Electronic corporate directories
- used in a large organizations to find the right person with
whom to collaborate on an issue or opportunity
Example: IBM’s Blue Pages
6. Network IT
IBM’s Blue page
*consists of three components
Database of information about employees’ skills, knowledge areas, &
experience
search engine and
collaboration features that connect employees and facilitate the
sharing of information
7. Enterprise IT
Transaction Processing System (TPS)
- captures data for company transactions and other key events and
updates the firm’s records, which are maintained in electronic files or
databases.
Example: Organizations order processing (order entry, shipment
planning, shipment execution, inventory control and accounts
receivable)
Enterprise Resource Planning (ERP)
- group of computer programs with a common database that a firm uses
to plan, manage and control its routine business operations
- shared database
8. Enterprise IT
Interorganizational Information Systems
- support the flow of data among organizations to achieve shared
goals
*Electronic Data Interchange (EDI)
-one type of Interorganizational Information Systems
-Supports the direct, computer-to-computer transfer of information in
the form of predefined electronic documents
- dictate which data is required for each type of document and which
data is optional
9. The roles of managers Vis-a-Vis IT
Three critical responsibilities of managers
1. Identifying Appropriate IT Opportunities
- the most important consideration is what organizations are getting out
of their investment in IT, not how much they are investing in IT
2. Smoothing the way for its successful introduction and adoption
- Managers must be able to overcome the ‘resistance’ so the new IT
system is accepted and used throughout the organization
10. The roles of managers Vis-a-Vis IT
Reason to resist change Explanation
Parochial self interests Some people are more concerned with
the change on themselves than with how
it might improve the organization
Misunderstanding Some people have misconceptions or
lack information about change
Low tolerance to change Some people require security and
stability in their work
Different assessments of the situation Some people disagree about the reasons
for the change or do not support the
process
Four reasons people resist change
11. ThephasesandstagesoftheChangemanagementContinuum
Model
Phase Goal Stage Description
Inform Make people aware of the
change and why it is
occurring
Contact Person first becomes aware that
change is to take place
Awareness Person has basic knowledge of the
phase
Understanding Person comprehends nature and intent
of change and how he/she will be
affected
Educate People recognize impact of
change on them and their
way of working
Positive perception Persons develop positive dispositions
toward the change
Adoption Change has demonstrated a positive
impact on the organization
Institutionalism Change is durable and has been
formally incorporated into routine
operating procedures of organization
Commit The change is fully accepted
and has become part of
everyday life
Internalization People are highly committed to change
because it matches their interests,
goals, and values
12. The roles of managers Vis-a-Vis IT
Key Factors of IT acceptance and usage
Factor Definition
Performance Belief that using the system will
help job performance
Effort expectancy Degree of ease associated with the
use of the system
Social influence Degree of belief that important
company officials want employee
to use the system
Facilitating Conditions Belief that an organizational and
technical infrastructure exists to
support the system
13. The roles of managers Vis-a-Vis IT
3. Mitigating its associated risks
IT RISKS EXAMPLE
Inability to continue operations due to a
natural disaster or accident
Fire destroys IT resources at corporate headquarters
Inability to continue operations due to a
deliberate attack on IT assets
Hackers carry out denial-of-service attack on organization’s
website
Compromise of confidential data about
organizational plans, products o services
Senior executive loses laptop containing critical data
Compromise of personal, private data
about employee or customers
Hackers access and download customer data, including account
numbers
Violation of legally mandated procedures
for controlling IT assets
IT system controls are inadequate to meet specific SOX
guidelines for maintaining the integrity of financial data
Violation of the organization’s defined
procedures and or accounting practices
IT system controls are circumvented by granting access to
inappropriate people to adjust finished product inventory
accounts
Loss of physical IT assets Theft of computers from corporate training facility
Inappropriate use of IT resources that
places firm in a compromising position
Employees use corporate email to disseminate sexually explicit
material; firm is subjected to a sexual harassment lawsuit
Inappropriate use of IT resources that
reduces worker productivity
Employees waste time at work visiting websites that are not
related to their work