Business
Textbooks
Boundless Business
Business Textbooks Boundless Business
Business Textbooks
Business

Chapter 20

Managing Information Technology

Book Version 6
By Boundless
Boundless Business
Business
by Boundless
View the full table of contents
Section 1
Information Technology Trends
Thumbnail
Hardware and Software Improvements

To keep up with evolving consumer and market trends, both hardware and software components have seen drastic improvements.

Thumbnail
Consumerization of IT

Consumerization is the growing tendency for new IT to emerge first in the consumer market and then spread into business and government organizations.

Thumbnail
Types of Networks

Networks are often classified by their physical or organizational extent, their purpose, their usage, trust level, and access rights.

Section 2
Decision Making
Thumbnail
Expert Systems

An expert system consists of both an inference engine and a knowledge base and has decision-making abilities.

Thumbnail
Informed Decisions

Effectively transforming data into actionable information is the key to using information technology to improve decision making.

Thumbnail
Information and Risk Trade-Off

IT risk relates to the business risk associated with the use, ownership, operation, involvement, and adoption of IT within an enterprise.

Thumbnail
Information and Knowledge

Knowledge is acquired through the use of and access to information.

Thumbnail
Data and Information

Data consists of nothing but facts, which can be manipulated to make it useful; the analytical process turns the data into information.

Section 3
E-Commerce
Thumbnail
Selling to Businesses

B2B e-commerce is the type of e-commerce that deals with relationships between and among businesses.

Thumbnail
Selling to Consumers

B2C e-commerce involves customers gathering information and purchasing either physical or information goods over an electronic network.

Section 4
Difficulties with New Technologies
Thumbnail
Forced Entry

Cybercrimes are those committed via computer networks for such purposes as fraud, identity theft, and the hacking of sensitive information.

Thumbnail
Malware

Malware is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

Thumbnail
E-Mail as an Entry Point

Email represents a potential IT risk and entry point for hackers, and so IT teams must integrate appropriate safeguards.

You are in this book
Boundless Business by Boundless
Previous Chapter
Chapter 19
Financial Management
  • Introduction to Financial Management
  • Planning
  • Operating Funds
  • Short-Term Financing
  • Long-Term Financing
Current Chapter
Chapter 20
Managing Information Technology
  • Information Technology Trends
  • Decision Making
  • E-Commerce
  • Difficulties with New Technologies
Next Chapter
Chapter 21
The Functions of Money and Banking
  • Money as a Tool
  • Credit
  • American Banking
  • Trends in Banking
  • The Federal Reserve System
and 1 more sections...
Subjects
  • Accounting
  • Algebra
  • Art History
  • Biology
  • Business
  • Calculus
  • Chemistry
  • Communications
  • Economics
  • Finance
  • Management
  • Marketing
  • Microbiology
  • Physics
  • Physiology
  • Political Science
  • Psychology
  • Sociology
  • Statistics
  • U.S. History
  • World History
  • Writing

Except where noted, content and user contributions on this site are licensed under CC BY-SA 4.0 with attribution required.