{"id":11267,"date":"2018-05-29T23:32:03","date_gmt":"2018-05-29T23:32:03","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/?post_type=chapter&#038;p=11267"},"modified":"2024-05-07T16:57:35","modified_gmt":"2024-05-07T16:57:35","slug":"putting-it-together-information-technology-and-business","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/chapter\/putting-it-together-information-technology-and-business\/","title":{"raw":"Putting It Together: Using Technology to Manage Business Information","rendered":"Putting It Together: Using Technology to Manage Business Information"},"content":{"raw":"<h2>Summary<\/h2>\r\nIn this module you learned about\u00a0the roles of data and information technology in business operations. Following is a summary of the key points we covered.\r\n<h3>Data vs. Information<\/h3>\r\nTechnology has made it easy for businesses to gather facts about their customers and business operations. However, data are\u00a0just facts and figures in their raw form. It's not until the data are\u00a0processed\u2014i.e., converted into information\u2014that businesses can use them to improve their operations.\r\n<h3>Managing Data<\/h3>\r\nBeing able to collect data is central to most businesses; however, all that data needs to be stored somewhere so\u00a0users can retrieve it and use it. The creation of databases\u2014virtual warehouses where data is stored\u2014allows businesses to take the first step in managing and using data. Since the creation\u00a0of \"cloud computing,\" businesses have been able to\u00a0store their data offsite but still access it from anywhere in the world. Businesses mine data\u00a0in order to find valuable patterns and answers to questions.\r\n<h3>Information in Networks<\/h3>\r\nIn order to make the greatest\u00a0use of data, it must be shared. In business this means that data collected by marketing needs to be shared with other departments\u2014finance, production, research, and development\u2014via networks. Again, this is where businesses must make decisions about the best way to share data: through internal networks (LANS), wide-area networks, (WANS) or the cloud. Each has\u00a0its own set of advantages and disadvantages.\r\n<h3>Ethical and Social Issues<\/h3>\r\nWho owns your information? This question is at the heart of many of the ethical and social issues that arise when businesses collect data. The debate about how best to balance the benefits of information technology with the costs to personal privacy has led to a new field of study called technoethics.\r\n<h3>Information Security and Cybersecurity<\/h3>\r\nWith big data comes big responsibility. This responsibility is about keeping customer and employee data safe from the threat of cyber criminals and illicit users. Large data security breaches have become more prevalent in recent years,\u00a0and businesses are constantly working to find better and more effective ways to protect their\u00a0data.\r\n<h2>Synthesis<\/h2>\r\n<img class=\"alignright wp-image-3926\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images-archive-read-only\/wp-content\/uploads\/sites\/750\/2015\/06\/23083100\/woman-506322_1280.jpg\" alt=\"decorative image\" width=\"351\" height=\"248\" \/>\r\n\r\nEach of us can be represented by\u00a0hundreds of data points about\u00a0our daily activities, our likes and dislikes, shopping habits, income, zip code, mobile phone use, age, gender, marital status, and so on\u2014the list is nearly\u00a0endless. \u00a0We are\u00a0in many respects\u00a0the sum of the data collected about us. How businesses use that information will continue to evolve as technology changes. It's clear, though, that collecting, storing,\u00a0managing, and using our\u00a0data are\u00a0vital components of virtually all business operations. The issues associated with the use of data and information technology are evolving just as quickly. Society now finds itself torn between the benefits that data can provide and the toll it takes on individual privacy. Most\u00a0people believe\u00a0that the organizations\u00a0collecting our data\u00a0have a responsibility to protect it against\u00a0unauthorized access and use. Regardless of whether you pursue a career in business or not,\u00a0the topics you learned about in this module will apply to you as\u00a0a citizen, an employee, and an individual. As technology and data collection methods become\u00a0ever\u00a0more sophisticated and complex, the burden is on all of us\u2014consumers and businesses alike\u2014to devise effective\u00a0ways of managing and controlling them.","rendered":"<h2>Summary<\/h2>\n<p>In this module you learned about\u00a0the roles of data and information technology in business operations. Following is a summary of the key points we covered.<\/p>\n<h3>Data vs. Information<\/h3>\n<p>Technology has made it easy for businesses to gather facts about their customers and business operations. However, data are\u00a0just facts and figures in their raw form. It&#8217;s not until the data are\u00a0processed\u2014i.e., converted into information\u2014that businesses can use them to improve their operations.<\/p>\n<h3>Managing Data<\/h3>\n<p>Being able to collect data is central to most businesses; however, all that data needs to be stored somewhere so\u00a0users can retrieve it and use it. The creation of databases\u2014virtual warehouses where data is stored\u2014allows businesses to take the first step in managing and using data. Since the creation\u00a0of &#8220;cloud computing,&#8221; businesses have been able to\u00a0store their data offsite but still access it from anywhere in the world. Businesses mine data\u00a0in order to find valuable patterns and answers to questions.<\/p>\n<h3>Information in Networks<\/h3>\n<p>In order to make the greatest\u00a0use of data, it must be shared. In business this means that data collected by marketing needs to be shared with other departments\u2014finance, production, research, and development\u2014via networks. Again, this is where businesses must make decisions about the best way to share data: through internal networks (LANS), wide-area networks, (WANS) or the cloud. Each has\u00a0its own set of advantages and disadvantages.<\/p>\n<h3>Ethical and Social Issues<\/h3>\n<p>Who owns your information? This question is at the heart of many of the ethical and social issues that arise when businesses collect data. The debate about how best to balance the benefits of information technology with the costs to personal privacy has led to a new field of study called technoethics.<\/p>\n<h3>Information Security and Cybersecurity<\/h3>\n<p>With big data comes big responsibility. This responsibility is about keeping customer and employee data safe from the threat of cyber criminals and illicit users. Large data security breaches have become more prevalent in recent years,\u00a0and businesses are constantly working to find better and more effective ways to protect their\u00a0data.<\/p>\n<h2>Synthesis<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-3926\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images-archive-read-only\/wp-content\/uploads\/sites\/750\/2015\/06\/23083100\/woman-506322_1280.jpg\" alt=\"decorative image\" width=\"351\" height=\"248\" \/><\/p>\n<p>Each of us can be represented by\u00a0hundreds of data points about\u00a0our daily activities, our likes and dislikes, shopping habits, income, zip code, mobile phone use, age, gender, marital status, and so on\u2014the list is nearly\u00a0endless. \u00a0We are\u00a0in many respects\u00a0the sum of the data collected about us. How businesses use that information will continue to evolve as technology changes. It&#8217;s clear, though, that collecting, storing,\u00a0managing, and using our\u00a0data are\u00a0vital components of virtually all business operations. The issues associated with the use of data and information technology are evolving just as quickly. Society now finds itself torn between the benefits that data can provide and the toll it takes on individual privacy. Most\u00a0people believe\u00a0that the organizations\u00a0collecting our data\u00a0have a responsibility to protect it against\u00a0unauthorized access and use. Regardless of whether you pursue a career in business or not,\u00a0the topics you learned about in this module will apply to you as\u00a0a citizen, an employee, and an individual. As technology and data collection methods become\u00a0ever\u00a0more sophisticated and complex, the burden is on all of us\u2014consumers and businesses alike\u2014to devise effective\u00a0ways of managing and controlling them.<\/p>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-11267\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Original<\/div><ul class=\"citation-list\"><li>Putting It Together: Using Technology to Manage Business Information. <strong>Authored by<\/strong>: Linda Williams. <strong>Provided by<\/strong>: Lumen Learning. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY: Attribution<\/a><\/em><\/li><\/ul><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Shared previously<\/div><ul class=\"citation-list\"><li>Artificial Intelligence. <strong>Authored by<\/strong>: geralt. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/pixabay.com\/en\/woman-artificial-intelligence-506322\/\">https:\/\/pixabay.com\/en\/woman-artificial-intelligence-506322\/<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/about\/cc0\">CC0: No Rights Reserved<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section>","protected":false},"author":163,"menu_order":18,"template":"","meta":{"_candela_citation":"[{\"type\":\"cc\",\"description\":\"Artificial Intelligence\",\"author\":\"geralt\",\"organization\":\"\",\"url\":\"https:\/\/pixabay.com\/en\/woman-artificial-intelligence-506322\/\",\"project\":\"\",\"license\":\"cc0\",\"license_terms\":\"\"},{\"type\":\"original\",\"description\":\"Putting It Together: Using Technology to Manage Business Information\",\"author\":\"Linda Williams\",\"organization\":\"Lumen Learning\",\"url\":\"\",\"project\":\"\",\"license\":\"cc-by\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"5e61ca43-0bb9-4744-9002-7d0e171aada6","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-11267","chapter","type-chapter","status-publish","hentry"],"part":11240,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/users\/163"}],"version-history":[{"count":8,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11267\/revisions"}],"predecessor-version":[{"id":15540,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11267\/revisions\/15540"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/parts\/11240"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11267\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/media?parent=11267"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapter-type?post=11267"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/contributor?post=11267"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/license?post=11267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}