40
11 INFORMATION TECHNOLOGY IN BUSINESS Other Teaching Tools 11.3 Video Notes 11.4 Brief Chapter Outline and Learning Goals 11.5 Lecture Outline and Lecture Notes 11.8 Career and Study Skills Notes 11.14 CAREER DEVELOPMENT: Make Good Career Planning Habits a Life Skill 11.14 STUDY SKILLS: Importance of Doing Your Own Work 11.15 Lecture Links 11.16 LECTURE LINK 11-1 Digital Data: We’re Losing It 11.16 LECTURE LINK 11-2 Why We Type This Way 11.18 LECTURE LINK 11-3 Web Shopping Safety 11.19 LECTURE LINK 11-4 Revising Moore’s Law 11. 20 LECTURE LINK 11-5 John Atanasoff’s Computer 11.21 LECTURE LINK 11-6 E-Mail Never Goes Away 11.22 LECTURE LINK 11-7 E-Mail Rules 11.24 LECTURE LINK 11-8 Password Overload 11.25 LECTURE LINK 11-9 Cyberthieves Are Winning 11.26 Bonus Internet Exercises 11.28 BONUS INTERNET EXERCISE 11-1 Online Education 11. 28 BONUS INTERNET EXERCISE 11-2 Spam Statistics 11.30 11.1 CHAPTER

WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

11

INFORMATION TECHNOLOGY IN BUSINESS

Other Teaching Tools 11.2

Video Notes 11.3

Brief Chapter Outline and Learning Goals 11.4

Lecture Outline and Lecture Notes 11.6

Career and Study Skills Notes 11.12

CAREER DEVELOPMENT: Make Good Career Planning Habits a Life Skill 11.12

STUDY SKILLS: Importance of Doing Your Own Work 11.13

Lecture Links 11.14

LECTURE LINK 11-1 Digital Data: We’re Losing It 11.14

LECTURE LINK 11-2 Why We Type This Way 11.15

LECTURE LINK 11-3 Web Shopping Safety 11.15

LECTURE LINK 11-4 Revising Moore’s Law 11.16

LECTURE LINK 11-5 John Atanasoff’s Computer 11.17

LECTURE LINK 11-6 E-Mail Never Goes Away 11.18

LECTURE LINK 11-7 E-Mail Rules 11.18

LECTURE LINK 11-8 Password Overload 11.19

LECTURE LINK 11-9 Cyberthieves Are Winning 11.20

Bonus Internet Exercises 11.21

BONUS INTERNET EXERCISE 11-1 Online Education 11.21

BONUS INTERNET EXERCISE 11-2 Spam Statistics 11.22

Bonus Cases 11.23

BONUS CASE 11-1 Rescuing Tulane 11.23

BONUS CASE 11-2 Denver Health Systems 11.25

BONUS CASE 11-3 Cell Phone Privacy 11.28

11.1

CH

APT

ER

Page 2: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

OTHER TEACHING TOOLS

For a description of each of these valuable teaching tools, please see the Preface in this manual.

Student Learning ToolsStudent Online Learning Center (OLC) www.mhhe.com/diasbusinessStudent Study GuideSpanish Translation Glossary (OLC)Spanish Translation Quizzes (OLC)

Instructor Teaching ToolsAnnotated Instructor’s Resource ManualIRCD (Instructor’s Resource Manual, Test Bank, PowerPoints, EZtest)Asset Map Online Learning Center (OLC) www.mhhe.com/diasbusinessPageOutPowerPoint Presentations (on IRCD and OLC)Test Bank Business Videos on DVD Enhanced Cartridge optionSpanish Translation Glossary (OLC)

11.2 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual

Page 3: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

VIDEO NOTES

Twenty videos are available, geared to individual chapter topics. The teaching notes for these videos are also included in the Video Notes section of this Instructor’s Resource Manual, beginning on page V.1.

VIDEO 11: “Digital Domain: Reality on Request”

Digital Domain is one of the world’s largest digital production studios, responsi-ble for providing the special effects for countless movies. This video shows how this company uses sophisticated operations management techniques, such as Gantt charts, PERT, CAD, and a computer tracking system to deliver a high quality, customized prod-uct in a timely fashion.

CHAPTER 11: Information Technology in Business 11.3

Page 4: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

BRIEF CHAPTER OUTLINE AND LEARNING GOALS

CHAPTER 11

Information Technology in Business

I. THE ROLE OF INFORMATION TECHNOLOGY IN BUSINESSLEARNING OBJECTIVE 1Explain information technology’s role in busi-ness.

A. Brief History of Information TechnologyB. Time and Place with Information TechnologyC. Information Technology and Independence of LocationD. e-Business and e-Commerce

II. MANAGING INFORMATIONLEARNING OBJECTIVE 2Understand how information is managed.

III. THE BACKBONE OF KNOWLEDGE: HARDWARE AND SOFTWARE

LEARNING OBJECTIVE 3Describe various types of software and hard-ware.

A. Hardware1. Wireless Information Appliances2. Intranets, Extranets, Firewalls, and VPNs3. Extranets4. VPNs

B. Software

IV. INFORMATION TECHNOLOGY CHALLENGESLEARNING OBJECTIVE 4Discuss challenges in information technology.

A. Hackers and VirusesB. Governmental SecurityC. Privacy

11.4 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual

Page 5: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

D. StabilityE. Reliability of Data

V. SUMMARY

CHAPTER 11: Information Technology in Business 11.5

Page 6: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

LECTURE OUTLINE AND LECTURE NOTES

CHAPTER OPENING PROFILEWinchuck River Store (Text pages 356-357)

After her divorce Karen Clark found she had few job skills. She had been out of the workforce for sixteen years, and her knowledge of technology was out of date. Clark began a small business selling rus-tic lodge and cabin décor on eBay from her home. The key to Clark’s success is her embrace of technol-ogy. Clark does not fear technology, but sees it as a tool for her business. Selling online allows her to con-trol her business operations and maintain control.

11.6 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual

Page 7: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

LECTURE OUTLINE LECTURE NOTES

I. THE ROLE OF INFORMATION TECHNOLOGY IN BUSINESS

LEARNING OBJECTIVE 1Explain information technology’s role in busi-ness. (Text pages 358-361)

A. Business constantly changes. 1. You can’t compete if you are using

outdated ways of operating. 2. A key to success is the ability to adapt

to change.B. Brief History of Information Technology 1. DATA PROCESSING (DP) is the name

for business technology in the 1970s; its primary purpose was to improve the flow of financial information.

a. DATA are raw, unanalyzed, and unorganized facts and figures.

b. INFORMATION is the processed and organized data that can be used for managerial decision mak-ing.

c. Data processing was used to sup-port an existing business through improving the flow of financial in-formation.

2. In the 1980s, business technology be-came known as information systems (IS).

a. INFORMATION SYSTEMS (IS) is the name for business technology in the 1980s.i. The role of technology

changed from supporting the business to doing business.

ii. It includes technology such as

POWERPOINT 11-1Chapter Title(Refers to text page 356)

POWERPOINT 11-2Learning Objectives(Refers to text page 357)

POWERPOINT 11-3The Role of Information Technology in Business(Refers to text pages 358-361)

TEXT REFERENCE Real World Business Apps(Box in text on page 359) Jose Diaz owns a banner and sign printing business and has seen his profits drop over the past two years. Diaz cre-ates all his designs by hand and does not use any technol-ogy. He fears that using a computer will have a nega-tive impact on his creativity, but also admits he does not know where to start.

LECTURE LINK 11-1Digital Data: We’re Losing ItSeventy-five percent of fed-eral government records is in electronic form, and no one is sure how much of it will be readable in as little as 10 years. (See complete lecture link on page 11.14 of this manual.)

CHAPTER 11: Information Technology in Business 11.7

Page 8: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

LECTURE OUTLINE LECTURE NOTES

II. MANAGING INFORMATIONLEARNING OBJECTIVE 2Understand how information is managed. (Text pages 364-366)

A. To find what we need, we often have to sift through mountains of information.

1. INFOGLUT is the phenomenon of in-formation overload in business.

2. There are ways to reduce infoglut. B. First, identify what is useful, depending on

four characteristics:1. Quality: The information must be accu-

rate and reliable.2. Completeness: There must be enough

data to make a decision, but not too much to confuse the issue.

3. Timeliness: a. Information must reach managers

quickly.b. E-mail, instant messaging, and

other technologies increase infor-mation timeliness.

4. Relevance: Managers must know the questions to ask to get the answers they need.

C. The proper management of information can be the core of a business (text exam-ple: Princess Cruises’ passenger data-base).

1. People need to get easy-to-use, orga-nized data when they need it, involving data storage.

2. A DATA WAREHOUSE is an elec-tronic storage place for data on a spe-cific subject (such as sales) over a pe-

POWERPOINT 11-5Managing Information (Refers to text pages 364-366)

TEXT REFERENCE Study Skills: The Importance of Doing Your Own Work (Box in text on page 365) An additional exercise and discussion is available on page 11.13 of this manual.

BONUS CASE 11-2Denver Health SystemsDenver Health hospital uses a system of networked com-puters and a treatment data-base to improve patient care. (See complete case, discus-sion questions, and suggested answers on page 11.25 of this manual.)

11.8 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual

Page 9: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

LECTURE OUTLINE LECTURE NOTES

III. THE BACKBONE OF KNOWLEDGE: HARDWARE AND SOFTWARE

LEARNING OBJECTIVE 3Describe various types of software and hard-ware. (Text pages 366-374)

A. Hardware1. What is powerful today in computer

hardware may be obsolete by the time this chapter is covered.

2. Hardware includes computers, pagers, cell phones, printers, scanners, fax machines, PDAs, iPods, and so forth.

a. A new development allows merg-ing of older technologies with new ones, such as networking comput-ers to a copy machine.

b. All-in-one devices such as Treos and iPhones combine a wireless phone, MP3 player, fax, and e-mail technologies.

c. Hardware is very useful—as long as it works.i. IBM is developing an ap-

proach called SMASH: sim-ple, many, and self-healing.

ii. They hope to build computers made from many small com-ponents that can monitor their own performance and solve problems.

3. Wireless information appliances a. Internet appliances, such as

PDAs, Blackberries, and smart phones, are designed to connect people to the Internet and to e-mail.

LECTURE LINK 11-4Revising Moore’s LawIn the mid-1970s Gordon Moore, former chairman of Intel Corporation, predicted that the capacity of computer chips would double every year or so. (See complete lec-ture link on page 11.16 of this manual.)

POWERPOINT 11-6The Backbone of Knowl-edge: Hardware and Soft-ware (Refers to text pages 366-369)

LECTURE LINK 11-5John Atanasoff’s ComputerDr. John V. Atanasoff built the first digital computer over half a century ago, but his contribution to computing was nearly lost to history. (See complete lecture link on page 11.17 of this manual.)

TEXT REFERENCE Thinking Critically: It May Change Everything, But It Doesn’t Cure All(Box in text on page 367) Low-tech methods—box cut-ters and brute force—helped the 9/11 hijackers bring down the World Trade Cen-ter. But it was access to in-formation that was the criti-

CHAPTER 11: Information Technology in Business 11.9

Page 10: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

LECTURE OUTLINE LECTURE NOTES

IV. INFORMATION TECHNOLOGY CHALLENGES

LEARNING OBJECTIVE 4Discuss challenges in information technology. (Text pages 374-379)

A. Technology can also create challenges. 1. In 2006 more than 9 million people ex-

perienced identity theft, raising secu-rity concerns.

2. Also of concern is the type of content available on the Internet—adult con-tent, harassment, and spam mes-sages.

3. As businesses and government at-tempt to track Internet usage, privacy is becoming a critical problem

4. Stability glitches can cost a business millions of dollars.

B. Hackers and Viruses 1. Computers are susceptible to hackers. 2. In 2007, hackers broke into computers

at TJX and stole millions of customer credit card numbers.

3. Computers today are interconnected, making security more difficult than in the days of mainframe computers.

4. VIRUSES are programming codes in-serted into other programming to cause unexpected events.

a. Viruses are spread by download-ing infected code over the Internet or by sharing an infected disk.

b. Some viruses are playful, but some can erase data or crash a hard drive.

c. Software programs such as Nor-

POWERPOINT 11-8Information Technology Challenges (Refers to text pages 374-375)

LECTURE LINK 11-8Password OverloadPasswords protect informa-tion, but too many passwords can lead to decreased secu-rity. (See complete lecture link on page 11.19 of this manual.)

TEXT FIGURE 11.5Protect Your Computer From Viruses (Box in text on page 376)

11.10 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual

Page 11: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

LECTURE OUTLINE LECTURE NOTES

V. SUMMARY

CHAPTER 11: Information Technology in Business 11.11

Page 12: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

CAREER AND STUDY SKILLS NOTES

CAREER DEVELOPMENT BOX:

Make Good Career Planning Habits a Life Skill (Text page 372)

Instructor’s Notes for Text Box Eleven:(Objectives to consider and implement to increase stu-dents’ knowledge, usage, and understanding of the concepts).

A successful interview, a well written résumé, and good etiquette habits are a real positive for any and all students. To refresh your career assessment and implementation, here is a reminder of what you will need to do to stay on course regarding establishing good career skills. Use the BORD method. Bal-ance, Organization, Routine and Discipline (BORD) will help you maintain the process no matter how your job, school, personal life or professional life might be going (sometimes some areas are going well, sometimes not). Using this method, you can look at the process the same way every time, and expect an outcome that meets your needs.

When you BALANCE all your responsibilities in a series of priorities, you have a healthy ap-proach to accomplishing your goals and objectives. You stand a better chance of achieving a high level of success. However, being able to correctly balance all your responsibilities requires that you become ex-tremely ORGANIZED to assure that you stay on course. When you do this on a regular basis, it becomes a ROUTINE.

STUDENT EXERCISES:

Help students with the basic prioritizing skills. Have them discuss their own prioritizing practices and discuss the good habits as well as those that may need improvement.

11.12 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual

Page 13: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

STUDY SKILLS BOX:Importance of Doing Your Own Work (Text page 365)

Instructor’s Notes for Text Box Eleven:(Objectives to consider and implement to increase stu-dents’ knowledge, usage, and understanding of the concepts).

Previously, we discussed study partners. One of the dangers of spending considerable time with a study partner is that over time, you may find yourselves sharing homework and other work, which may lead you to becoming dependent on sharing work, rather than producing your own. Over time, you may be questioned on the validity of your own work, and if you are suspected of cheating or using another’s work, you can be suspended or expelled from school. Students who use others’ work will find that their own learning experience is diminished. While students can buy pre-written term papers over the Internet from a variety of sources, stating that you are “busy” or “tired” or “don’t have time” is no excuse for what you are doing: plagiarizing. Plagiarism is cheating. By plagiarizing, you jeopardize your education – many colleges and universities have honor codes whereby students can be expelled for plagiarizing an-other’s work. There is never a justification for plagiarism. Falling into the habit of plagiarizing or cheat-ing will do you no good in the long run. In your job, you can be fired for doing so. Your reputation, once ruined, is almost impossible to salvage. The purported “saving of time” is never worth a ruined reputa-tion, whether in school or on the job.

STUDENT EXERCISES:In this exercise, have students make two lists: 1) the reasons to cheat on their work, and 2) the po-

tential consequences if they rely on cheating. Include the implications of cheating in their future profes-sional lives, personal relationships, and other areas like competition in sports, games, etc. Have the stu-dents then notice how they feel when they thought cheating was going to be a helpful benefit and how much it complicates their lives both in the short- and long-term. If time allows, explain what plagiarism is and why it should be considered “character assassination” by one’s own hand. Discuss the fact that by plagiarizing, a student is showing a lack of respect to the learning culture of his school, and is doing him-self no favors for his future.

CHAPTER 11: Information Technology in Business 11.13

Page 14: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

LECTURE LINKS

LECTURE LINK 11-1

Digital Data: We’re Losing It

Parents today have many options to capture images of their offspring—35mm and digital cam-eras, videotape, etc. But by the time these children turn 30, sunlight may have faded most of their color childhood photos, and on the off chance that the tiny VHS-C videotapes featuring their many firsts sur-vive decades of heat and humidity, there probably won’t be a machine to play them back on.

Home videos and snapshots aren’t all that are at risk. Librarians and archivists warn we’re losing vast amounts of important scientific and historical material because of disintegration or obsolescence. Al-ready, up to 20% of the data collected on Jet Propulsion Laboratory computers during NASA’s 1976 Viking mission to Mars is gone. Also at risk are 4,000 reels of census data stored in a format so obscure that archivists doubt they’ll be able to recover it. Some 75% of federal government records are in elec-tronic form, and no one is sure how much of it will be readable in as little as 10 years. “The more techno-logically advanced we get, the more fragile we become,” says Abby Smith of the Council on Library and Information Resources.

For years, computer scientists said the ones and zeros of digital data would stick around forever. They were wrong. Tests by the National Media Lab, a Minnesota-based government and industry consor-tium, found that magnetic tapes might last only a decade, depending on storage conditions. The fate of floppy disks, videotape, and hard drives is just as bleak. Even the CD-ROM, once touted as indestructible, is proving vulnerable to stray magnetic fields, oxidation, humidity, and material decay. The fragility of electronic media isn’t the only problem. Much of the hardware and software configurations needed to tease intelligible information from preserved disks and tapes are disappearing in the name of progress. “Technology is moving too quickly,” says Charlie Mayn, who runs the Special Media Preservation lab at the National Archives.

He speaks from experience. In the 1980s, the Archives transferred some 200,000 documents and images onto optical disks, which are now in danger of becoming indecipherable because the system ar-chivists used is no longer on the market. “Any technology can go the way of eight-track and Betamax,” says Smith, whose own dissertation is trapped on an obsolete 5½-inch floppy. “Information doesn’t have much of a chance, unless you keep a museum of tape players and PCs around.” That may not be such a farfetched idea. Mayn’s temperature-controlled lab in the bowels of the National Archives houses many machines once used to record history.

Unfortunately, migration isn’t a perfect solution. “Sometimes not all the data makes the trip,” says Smith. Recently the Food and Drug Administration said that some pharmaceutical companies were finding errors as they transferred drug-testing data from one operating system to another. In some in-stances, the errors resulted in blood-pressure numbers that were randomly off by up to eight digits.

So what’s to be done? A good way to start is to separate the inconsequential from the historic, and to save in simple formats. Also, backup important data on another media, and don’t trust “permanent” storage media.i

11.14 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual

Page 15: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

LECTURE LINK 11-2

Why We Type This Way

The modern office is likely to be equipped with personal computers linked through local area net-works to each other, to the Internet, and to a host of specialized equipment, from laser printers to scanners to databases storing millions of customer records. Within this state-of-the-art system is an 18 th century bottleneck—the computer keyboard.

The computer keyboard is simply a transplanted typewriter keyboard, the same keyboard that has been used since the 1870s. The first practical modern typewriter was patented in 1868 by Christopher Sholes, who invented the device with partners S. W. Soule and G. Glidden.

When Sholes invented the first typewriter, keys were arranged alphabetically (vestiges of this ar-rangement can be seen on the second row of keys—D F G H J K L). Printing bars were mechanically pushed against the paper by the pressure on the keys. Typists soon became proficient enough to cause jams as they typed faster than the mechanical bars could move.

Typewriter manufacturers went back to the drawing board and designed a new keyboard to slow typists down to speeds within the limits of the crude mechanism. The resulting keyboard is referred to as “QWERTY,” named for the first six keys of the top row. Keys were placed awkwardly to force slower typing. The “A”, for instance, one of the most frequently used keys, was placed under a typist’s left-hand little finger, the weakest finger on the hand. “E” requires an awkward reach using the middle finger of the left hand. Results were encouraging—typing speeds declined.

Today, mechanical keys have been replaced by electronic ones, but the keyboard arrangement has remained unchanged. While the arrangement of keys is familiar, it is far from efficient. In the 1930s, Washington State University Professor August Dvorak designed a better keyboard that groups the most frequently used letters on the home row and eliminates many awkward reaches. The Dvorak system is faster to learn, easier to type, less tiring, and less likely to cause errors than QWERTY. Using it increases typing speed by more than 20%. Yet the system never caught on—typists did not want to learn a new sys-tem when their typewriters all used QWERTY, and manufacturers did not want to produce Dvorak type-writers as long as typists used QWERTY.

LECTURE LINK 11-3

Web Shopping Safety

E-Commerce is exploding. Whether you’re ordering a book from Amazon.com or downloading a tune from iTunes, online shopping is easy and convenient. But this convenience comes with a price. You don’t get to examine an item closely, and entering your credit-card number on an unknown site can take some courage.

According to Lauren Weinstein, co-founder of People for Internet Responsibility, “With the In-ternet, you don’t know if that flashy website you’re looking at is a multinational organization or some kid in a garage somewhere.” Even official seals of approval from TRUSTe, VeriSign, and the Better Business Bureau are no guarantee that you’re dealing with a reputable company. Those symbols can easily be re-produced, and they may not connect you as they should to the official sites of the certifying organization.

Scammers aren’t the only problem. Many high-volume brick-and-mortar retailers that operate on-line impose different policies for Web purchases than they do for purchases in the physical store. For ex-ample, you have fewer protections shopping at Circuitcity.com than at a Circuit city store.

A few tips to make online shopping safer:

CHAPTER 11: Information Technology in Business 11.15

Page 16: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

1. Find the gotchas. A site’s “terms and conditions” detail the existing protections—for the re-tailer, that is. You might discover that you must abide by rules of a distant state, where you agree to go if you sue. At Target.com, the purchaser agrees to assume the risk of loss or damage to merchandise when the shipping firm picks it up, not after delivery. When Consumer Reports tested Internet shopping sites, nearly every one, including Amazon.com and Walmart.com, disclaimed “implied warranties,” unwritten assurances that products will work properly and last a reasonable amount of time.

2. Check return policies. Some sites charge restocking fees as high as 25%, and others don’t ac-cept returns of opened merchandise. Consumer Reports found some smaller sites that wouldn’t even take returns of some defective products. Also, if you return items that came with free shipping, you probably will have to pay the cost for the return postage. Some retailers deduct the original free shipping charges from your refund or charge you for shipping costs even if the product is defective.

3. Guard your privacy and security. Read a site’s privacy policy. Some sites sell your customer data, which means you’ll get tons of spam. One suggestion is to set up an e-mail account exclusively for buying online. Most ISPs will let you set up multiple accounts. If not, services such as Hotmail and Ya-hoo! offer free e-mail service. For security, make sure that you see a security icon (such as a closed pad-lock) when you open the Web page. This indicates a secure connection for transmitting financial data, but doesn’t guarantee that the site is legitimate.

4. Pay with the right plastic. When you pay by credit card, your liability for unauthorized pur-chase is capped at $50. Credit cards also let you dispute charges for items that arrive broken or not as or-dered. Debit cards may not cover fraudulent charges if you don’t act fast enough. Another suggestion is to investigate use of a “virtual” card number. Card issuers such as Citibank offer disposable numbers, which limit how much retailers can charge your account.

5. Don’t do business with a site if it doesn’t list the owner’s name, address, or phone number, or if it is full of spelling errors.

6. Use shopping-comparison sites such as Shopping.com and Bizrate.com for ratings and user feedback on Web retailers.ii

LECTURE LINK 11-4

Revising Moore’s Law

Sixty years after transistors were invented, the tiny on-off switches are starting to show their age. The devices have been shrunk so much that the day is approaching when it will be physically impossible to make them even smaller.

In the mid-1970s the chairman of Intel Corporation, Gordon E. Moore, predicted that the capacity of computer chips would double every year or so. This has since been called “Moore’s Law.” The mil-lion-dollar vacuum tube computers that awed people in the 1950s couldn’t keep up with a pocket calcula-tor today. In fact, a greeting card that plays “Happy Birthday” contains more computing power than ex-isted before 1950.

The transistor was invented by scientists William Shockley, John Bradeen, and Walter Brattain to amplify voices in telephones for a Bell Labs project, for which they later shared the Nobel Prize in physics. Transistors’ ever-decreasing size and low power consumption made them an ideal candidate to replace the bulky vacuum tubes then used to amplify electrical signals. Transistors eventually found their way into portable radios and other electronics devices and became the foundation of microprocessors, memory chips, and other semiconductor devices.

11.16 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual

Page 17: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

The pace of innovation gained further momentum after the invention of the integrated circuit in the late 1950s. The integrated circuit was invented by Texas Instruments’ Jack Kilby and future Intel co-founder Robert Noyce.

The number of transistors on microprocessors—the brains of computers—has leaped from just several thousand in the 1970s to nearly a billion today. Although Moore has qualified his capacity-dou-bling prediction in the last decade, he thinks the transistor is going to be around for a long time. “There have been ideas about how people are going to replace it,” he says, “but I don’t see anything coming along that would really replace the transistor.”

The density of transistors, however, is reaching the physical limits of the technology. Once chip makers can’t squeeze any more transistors into the same-sized slice of silicon, the dramatic performance gains and cost reductions could suddenly slow. One problem has been trying to prevent too much heat from escaping from thinner and thinner components. Chip companies are avidly looking for new materi-als and other ways to improve performance.

One solution has been pioneered by Intel and IBM. Their solution involves replacing the silicon dioxide used for more than 40 years as an insulator. Today, these silicon slivers have been shaved too thin, creating too much heat. The Intel/IBM solution is to replace the silicon with various metals in layers to create the “gate” that turns the transistor on and off. Other companies are looking for novel ways to prevent electricity leakage, improving efficiency. But no effective replacement is currently available. iii

LECTURE LINK 11-5

John Atanasoff’s Computer

Dr. John Vincent Atanasoff built the first digital computer over half a century ago, but his contri-bution to computing was nearly lost to history. Atanasoff worked on his machine during the 1930s at Iowa State University. After hours of work one night in 1937, he found that he was stumped by a basic problem of electronic design. In exhaustion, Atanasoff drove 170 miles over the state line to a roadhouse in Illinois. (“There wasn’t any place to get a drink in Iowa,” he recalls.) In the Illinois tavern, he saw things from a new perspective and solved some of the thorny problems that had plagued him. The com-puter would be a digital device, unlike the analog devices that were then in use. It would use vacuum tubes and have an on-off configuration. The computer would also have memory and be based on the base-two number system. Finally, it would have a “jogging” function to refresh the computer memory and prevent loss of information.

With his assistant, Clifford Berry, Atanasoff finally built his machine—the “ABC” (Atanasoff Berry Calculator). Atanasoff signed over his rights to the invention to the Iowa State College Research Foundation in exchange for a $5,330 grant, assuming that the college would patent the invention. World War II intervened, however, and no one followed up. Later, personnel in charge apparently did not realize the significance of the device, and no patent was ever obtained.

Meanwhile, Drs. John Mauchly and J. Presper Eckert of the Moore School of Electrical Engineer-ing at University of Pennsylvania were working on a computing machine for the U.S. Army. ENIAC, the machine they developed, was completed in 1946 and has been widely referred to as the first modern com-puter. They applied for and received two patents, one for ENIAC and one for the “jogging” memory func-tion they used. Mauchly and Eckert assigned their patents to the Sperry Rand Corporation, for which they later went to work. Sperry collected royalties from other computer companies for all computers using the technology developed in ENIAC, which, over the years, has been estimated to total over $1 billion.

It was not until 1967 that another computer company, Control Data Corporation, found an ob-scure reference to Atanasoff’s machine. CDC, along with several other companies, sued and won release from the royalties, largely on the basis of Dr. Atanasoff’s testimony. The court ruled that the patents had

CHAPTER 11: Information Technology in Business 11.17

Page 18: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

wrongly been issued and that the original theory was Dr. Atanasoff’s. However, neither Iowa State nor Atanasoff has received any financial reward from the decision.

LECTURE LINK 11-6

E-Mail Never Goes Away

When it comes to the Internet, nothing is ever really forgotten and everything leaves a trail. This can be good or bad for business. These data trails can be used by companies to discover who has been stealing their trade secrets—or to bust you if you are the thief. They can show who is working and who is goofing off. They can tell vendors who their online customers are and allow them to make better deci-sions and more money. This information is extraordinarily valuable, and there are laws that require com-panies to produce it, and do it right now.

In the pre-Enron, pre-WorldCom, pre-Tyco days, the legal rules for retaining communication records said only that a company had to be consistent. A company couldn’t, for example, keep all e-mails except those having to do with a hostile takeover or a case under litigation. If the company’s policy was to erase all old e-mails once a year or once a month, that was okay, as long as the policy was in writing and was strictly followed. Enron, for example, wiped its e-mail slate clean every 72 hours, which is hardly a sur-prise.

Today the rules have changed. Public and many private companies have to keep a copy of written communication of every type (letters, e-mails, even Internet instant messages) for up to seven years. These copies have to be kept in a form that allows their authenticity to be verified, whatever that means. Not only that, but companies must keep a second copy of every message in a different location in case of fire or natural disaster. The second copies must be on nonerasable storage media, such as optical disks. And if the SEC asks you to provide a copy of any given document or every given document, you have un-til close of business today to do it.

If the organization is a health care organization, an insurance company, or even a human re-sources department, the rules are even stricter. If a client asks for a list of every person or organization who has shared his or her medical records, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires that the organization provide that list - on the spot.

Companies that aren’t public, don’t engage in health care, or have no human resources depart-ment aren’t off the hook, because these requirements are becoming the accepted standards for all compa-nies. If companies still dump e-mail every 72 hours and end up in court, they are effectively guilty as charged. Currently penalties for noncompliance are mild, but will get stronger in the future, right up to sending people to jail. New SEC regulations, for example, hold the CEO personally responsible for record retention, meaning he or she, not some nerd in the computer room, will be doing time. Then there are the civil penalties that will come from the inevitable lawsuits.

Every hospital and clinic in America is vulnerable, because they are all in violation. Most compa-nies don’t have the technology to comply with laws already on the books, much less the even stricter ones likely to follow. Faced with the huge costs of complying with the SEC regulations, many companies might be tempted to just take the fine—except for that little part about the CEO going to jail. iv

LECTURE LINK 11-7

E-Mail Rules

The most-used Internet application by volume is e-mail. Although e-mail has become a necessary part of our modern lives, it is often misused.

11.18 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual

Page 19: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

In your early education, you were taught how to write a letter. You probably learned how to write business and casual headings and salutations, state your purpose, make a request, ask for a response, and wrap it up with “Sincerely yours.”

But an e-mail is not a letter, and the days of graceful formal communication are fading away. Short is in, “yours truly” is out. Some guidelines:

Keep It Short. Short e-mails get attention. If you receive an e-mail that’s several pages long, you have to make some decisions. Do I have time to handle this now? Is it important enough to come back to? If the answer is “no,” that e-mail won’t be read, no matter how carefully written. Supporting material can be sent as an attachment, but give the reader a clear, concise message in the e-mail body.

Keep It in Context. Our inboxes are flooded with dozens of legitimate messages each day, not to mention the mountains of spam that may or may not get through spam filters. When you send a message to someone you don’t usually communicate with, include some mention of your identity. “I met you at the conference last week” or “Jim suggested I contact you regarding this issue.” If you are responding to an earlier message, include the previous thread. Nothing is as confusing as an e-mail saying, “What do you mean?” or “Not really” when you have no idea what you’re supposed to understand.

Give It a Subject. The subject line is there for a reason. It tells your recipients what you want to communicate. Some very important e-mails get overlooked with blank subject lines or topics like “Impor-tant” or “RE: RE: RE: RE: RE:” If the topic changes, change the subject line. Remember that on the re-cipients’ screens, your subject competes with a large number of others for their attention.

Keep the Thread. Some e-mail users routinely trim everything out of the body of the e-mail ex-cept their replies. Don’t do this. For example, if you are responding to a request for an opinion, don’t just say “I agree” and cut out the thread. Let your reader browse through the background for your response. A slightly longer e-mail isn’t going to bog down the server—the thousands of spam messages are doing that just fine.

Make Your Requests Clear. You should set your requests apart from the rest of the message by trimming them down to one sentence or series of bullet points. Close-ended questions (yes or no) are more readily answered. Open-ended questions can get long and involved, and reduce the likelihood that you’ll get a reply.

Don’t Be Afraid of Deadlines. If you need the information by Friday, let the reader know. Then if they see that they can’t meet the timetable, they can let you know in time for you to find another source. If you’ve requested something that has not been delivered, it is acceptable to send a cordially-worded re-minder. But just one. Daily reminders suggest to recipients that they’re being bossed around. They may be too busy, away on vacation, or actually working on your last request.

Remember to Say “Thank You.” Not only is it polite, but it also lets the sender know you’ve received the message and gives the subject closure. Remember, you’ll probably need their good will at some time in the future.

LECTURE LINK 11-8

Password Overload

Using a password can protect information and improve security. Using multiple passwords, para-doxically, can make data less secure.

PricewaterhouseCoopers, a consulting firm, conducted a study for the British Department of Trade and Industry to estimate the cost of security breaches from computer viruses, spyware, hacker at-tacks, and equipment theft. They found that these breaches cost British industry $18 billion in 2005.

CHAPTER 11: Information Technology in Business 11.19

Page 20: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

One concern for security is the increasing number of user IDs/passwords that employees must deal with. The study found that employees have to remember three different user IDs/passwords on aver-age. Two percent had to recall ten different IDs.

The more IDs and passwords that users have to remember, the more likely the business is to have unauthorized access. The human memory is not programmed to remember this many numbers, letters, and combinations. Users are more likely to choose passwords that are personally memorable—pet names, birthdays, hometowns—terms that are easier for hackers to guess.v

LECTURE LINK 11-9

Cyberthieves Are Winning

The loss or theft of personal data such as credit card and Social Security numbers soared to un-precedented levels in 2007. That trend isn’t expected to turn around anytime soon as hackers stay a step ahead of security and laptops disappear with sensitive information. And while companies, government agencies, schools, and other institutions are spending more to protect ever-increasing volumes of data with more sophisticated firewalls and encryption, the investment often is too little too late.

Linda Foley founded the San Diego-based Identity Theft Resource Center after becoming an identity theft victim herself. Foley’s group, which tracks security and data breaches, found a nearly four-fold increase from 2006 to 2007.

Another group, Attrition.org, estimates more than 162 million records were compromised in 2007, both in the U.S. and overseas. (Identity Theft Resource tracks only U.S. transactions.) Attrition.org estimated that 94 million records were exposed in a theft of credit card data at TJX Cos., the owner of dis-count stores including T.J. Maxx and Marshalls. The TJX breach accounts for more than half the security lapses reported by both tracking companies.

The TJX breach is believed to have started when hackers intercepted wireless transfers of cus-tomer information at two Marshalls stores in Miami—an entry point that led the hackers to eventually break into TJX’s central databases. TJX has said that before the breach, which was revealed in January 2007, it invested “millions of dollars on computer security, and believes our security was comparable to many major retailers.” With wireless data transmission more common, hackers increasingly are targeting this conduit as a major vulnerability.

Attrition.org and the Identity Theft Resource Center are the only groups, government included, maintaining databases on breaches and trends each year. They have been keeping track for only a handful of years, and methods of learning about breaches are still evolving.

Both groups say that many breaches may be missing from their lists, because they largely count incidents reported in news media that they consider credible. Media coverage has risen in part because of the growing number of states requiring businesses and institutions to publicly disclose data losses. Thirty-seven states, plus Washington D.C., now have such requirements. vi

11.20 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual

Page 21: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

BONUS INTERNET EXERCISESVII

BONUS INTERNET EXERCISE 11-1

Online Education

The Massachusetts Institute of Technology is one of several elite schools that are now putting their course materials online. The MIT initiative, called OpenCourseWare, makes virtually all the school’s courses available online for free.

Go to the M.I.T. OpenCourseWare website (http://ocw.mit.edu). Choose one of the classes avail-able, open the course’s web page, and research the course.

1. Go to the course syllabus and summarize the course description.

2. What are the requirements for the course?

3. What text is used for the course? Also list any suggested readings.

4. Do you think you would learn as much through an online course as you would through a live lec-ture course? Why or why not?

CHAPTER 11: Information Technology in Business 11.21

Page 22: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

BONUS INTERNET EXERCISE 11-2

Spam Statistics

A growing problem with electronic communication over the Internet is spam, unwanted e-mail messages. The percentage of spam for most consumers is over 75%. In late 2007 the Internet security firm Postini found that 87% of e-mail messages were spam.

Go to Postini’s website (www.Postini.com) and find the statistics in the online resource center. (Sometimes the web address for a location changes. You might need to search to find the exact location mentioned.)

1. How many e-mail messages were processed in the last 24 hours? What percentage of these mes-sages was spam?

2. How do spammers get your e-mail addresses?

3. Postini’s resource center also tracks the number of messages that contain viruses, malicious worms, and Trojan horses. In the last 24 hours, what percentage of e-mail messages were virus infected?

4. Do you think that spam is a real problem for organizations? Why or why not? Will spam change American business reliance on e-mail communication in the future?

11.22 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual

Page 23: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

BONUS CASES

BONUS CASE 11-1

Rescuing Tulane

Hurricane Katrina swept through New Orleans in August 2005, flooding 80% of the city and two-thirds of the Tulane campus. School president Scott Cowen rode out the storm on an air mattress in the weight room of the school’s Rec Center and woke up to see water surging across the campus. Cowen’s escape from his flooded campus required, in order, a commandeered boat, a hot-wired golf car, a “bor-rowed” dump truck, and a helicopter donated by a rich alum. He and his executive team, along with their families and pets, set up shop in a Houston hotel to begin the task of planning Tulane’s comeback.

Most crises that beset an organization affect only one part. A trucking strike may delay one com-ponent of a product, but there should be alternative distribution methods available. Katrina was an assault on all fronts at once. Tulane had no functioning IT infrastructure, no way to communicate with its 12,500 students and 6,000 employees, no way to even assess the damage. Some of the staff had no homes, clothes, or news of relatives.

Cowen put in place a triage system. There were a million things to consider, but Cowen started the daily meeting by focusing on the top five things that really needed doing that day. The first order of business was to retrieve the school’s IT files from the 14th floor of a downtown New Orleans building with massive flooding, no working elevators, and chaotic surroundings. A group of Tulane employees, es-corted by police officers, spent hours lugging the disks down dark stairways.

The school’s first priority was to figure out how to pay staffers and faculty, many of whom had been displaced and needed the money right away. “If we didn’t make payroll, everyone would have thought we were gone,” said Cowen.

Finding the missing employees was the next step, and for that, Cowen reached out to alumnus David Filo, cofounder of Yahoo!, for help. Filo donated manpower and web-hosting resources and cre-ated a makeshift website to locate and communicate with displaced workers.

To reopen classes, the school had to figure out how to attract students to a ruined city. To meet the housing shortage, Cowen leased an Israeli-based cruise ship to use as a dorm. Realizing that profes-sors wouldn’t come back if they didn’t have schools for their own kids, Cowen budgeted $1.5 million to charter a local school for the children of Tulane faculty.

Gradually, crisis management segued into strategic planning. The school would have to focus its resources on its core mission and reduce commitments to other areas. In November, the school laid off 243 full-time staffers, including tenured faculty. Virtually every area was affected, including the fund-raising department and the medical school, whose faculty and staff were cut by 30%.

Then Cowen announced the school’s Renewal Plan. Tulane would more narrowly focus on the undergraduate school, which Cowen believed to be the school’s main strength. Entry into many doctoral programs was suspended. Tulane pledged to focus its efforts in “areas where it has attained, or has the po-tential to achieve, world-class excellence … and suspend admission to those programs that do not meet these criteria.” Cowen presented the plan to Tulane’s board of trustees, asking them to approve or reject the plan as a whole. It passed unanimously.

In January, 2006, the campus reopened. Cowen greeted returning students to campus accompa-nied by the Liberty Brass Band. His bold strategic plan seems to have worked. Almost 92% of undergrad-uates returned for the spring 2006 semester.viii

CHAPTER 11: Information Technology in Business 11.23

Page 24: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

DISCUSSION QUESTIONS FOR BONUS CASE 11-1

1. From the disaster, Tulane has now identified a new way of doing business. What happened in this evaluation process that changed the course of how the school currently functions?

2. How is crisis management similar to strategic management? How is it different?

3. How was communication technology used to begin the process of contacting its students and em-ployees?

4. How was Cowen able to think of the needs of others during this tumultuous series of events? What does that say about his leadership skills?

ANSWERS TO DISCUSSION QUESTIONS FOR BONUS CASE 11-1

1. From the disaster, Tulane has now identified a new way of doing business. What happened in this evaluation process that changed the course of how the school currently functions?

Cowen was able to look at his total operation for what it is and how each part contributes to the core business mission and vision. As he made this evaluation, Cowen was then better able to place the greatest emphasis on the school’s core mission and to let go of the other components that he did not think were essential to the college under these new conditions.

2. How is crisis management similar to strategic management? How is it different?

Crisis management is an intensive version of strategic planning in that the timelines and potential outcomes are far greater and impactful in the short term. It relies on a keen sense of how decision making has to be more exact in the process. Normal strategic planning has a greater set of circumstances to con-sider and allows for more adjusting from the long term planning as way to keep on course.

3. How was communication technology used to begin the process of contacting its students and em-ployees?

The first order of business was to contact students and employees. Retrieval of IT files was the first order of business to begin the rebuilding process. Communication with the Tulane family was reestablished in this manner.

4. How was Cowen able to think of the needs of others during this tumultuous series of events? What does that say about his leadership skills?

Cowen was in touch with how disasters affect individuals who have fewer resources. He took that into consideration as he made thoughtful choices regarding how he would redevelop his school in this short period of decision making. Cowen exhibited tremendous leadership skills as he pulled the necessary resources together to keep his staff and students connected. He understood how much the staff needed students to return to school and how much the students needed to be reconnected to the staff through their experiences at Tulane University.

11.24 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual

Page 25: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

BONUS CASE 11-2

Denver Health Systems

If you ever have the misfortune to suffer a health crisis known as diabetic ketoacidosis, a critical state of severe high blood sugar, Denver Health hospital is one of the best places in the country to get care. But it’s not the doctors who will prove so invaluable, it’s the networked computers sitting in each room. The computers know every prescription and treatment a diabetic patient has received at the hospital or one of its clinics, and can tell the doctor or nurse precisely how to treat the disease—the blood tests, in-sulin, and balance of electrolytes the patient desperately needs. The hospital recently studied the effec-tiveness of such standardized, computer-aided treatment, and concluded that the length of patient stays had been reduced by 35%.

Denver Health offers a prime example of how technology can heal America’s ailing health-care system. The community health-care network, with a 500-bed hospital and nine family-health centers in Denver’s lower-income neighborhoods, doesn’t turn anyone away. More than 40% of its patients don’t have insurance and can’t pay for their care, which costs the institution almost $300 million annually. The hospital has responded to that challenge over the last decade by embracing efficiency-improving, high-tech systems, like electronic medical records and billing systems. Since 1997 it has spent $259 million (out of a $420 million annual operating budget) on IT, putting a computer in each office and treatment room, so doctors and nurses can see a patient’s lifetime medical history and get quick access to medical references. Such widespread computerized care places Denver Health on the front lines of America’s drive to drag health care into the high-tech age.

Like many public-health institutions in the 1990s, Denver Health was on rocky financial footing. Longtime Denver Health physician Patricia Gabow took over as CEO in 1992, and though she describes herself as computer illiterate, she recognized that a prescription of high technology might be just what the doctor ordered. The hospital instituted a billing system that automatically checked state records to see if a patient had Medicaid or private insurance, which instantly saved millions annually. It also began scanning paper medical records and making them available on hospital computers.

Inspired by early success, the hospital got more ambitious. In 1999 it was one of the first hospi-tals to buy, from German technology company Siemens, a system called Lifetime Clinical Records, which provides online access to all the details of a patient’s checkups and treatment in the Denver Health sys-tem. Three years later the hospital began cautiously rolling out Computerized Physician Order Entry (CPOE), which put computers in each treatment room and turned them into the nexus of patient care. In-stead of scribbling illegibly onto a notepad, doctors typed prescriptions and treatment orders directly into the computer. For ailments like diabetic ketoacidosis, they also created standard protocols so nurses or residents could treat patients quickly and efficiently.

Other health-care institutions have rejected or postponed such changes, often because doctors don’t have the time to invest in learning the new technology. Denver Health overcame bureaucratic obsta-cles by appointing a high-ranking doctor or nurse as “clinician champion” in each department, in charge of introducing the system. The hospital also moved slowly. It introduced CPOE to the intensive-care unit and worked to perfect the system there for 18 months before moving it to surgery and, more recently, to the rest of the hospital and its clinics.

DISCUSSION QUESTIONS FOR BONUS CASE 11-2

1. Do you think that a computerized treatment system such as the one at Denver Health would limit a physician’s ability to diagnose and treat each patient as an individual? Why or why not?

CHAPTER 11: Information Technology in Business 11.25

Page 26: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

2. What dangers do you see in using a system such as CPOE from a patient’s point of view?

3. What specific advantages do you see in using networked computers (CPOE) in hospitals?

4. What issues could you foresee arising from physician resistance to computerized systems like CPOE?

ANSWERS TO DISCUSSION QUESTIONS FOR BONUS CASE 11-2

1. Do you think that a computerized treatment system such as the one at Denver Health would limit a physician’s ability to diagnose and treat each patient as an individual? Why or why not?

Probably not. The system would improve efficiency in obtaining patient information and would have no effect on a physician’s diagnostic skills, other than giving the doctor needed information quickly, which could only improve outcomes.

2. What dangers do you see in using a system such as CPOE from a patient’s point of view?

Confidentiality would have to be a priority. How secure is the interconnected network? Can oth-ers access confidential patient information? Other than this, there would be little danger to patients. The computerized system would only aid in communication of vital information. The danger would be in not implementing the system, slowing the response times for critical-need patients.

3. What specific advantages do you see in using networked computers (CPOE) in hospitals?

i

? Source: Arlyn Tobias Gajilan, “History: We’re Losing It,” Newsweek, July 12, 1999; Fred Moore, “Digital Data’s Future—You Ain’t Seen Nothin’ Yet!” Computer Technology Review, October 1, 2000; and Charles Arthur, “The End of History;” The Independent, June 30, 2003.

ii Source: “Web Shopping: 4 Ways to Protect Yourself,” Consumer Reports, May 2006; “One in Four Credit Reports Contain Serious Mistakes,” The Associated Press, The Clarion-Ledger, June 20, 2004; “Prevent Identity Theft by Avoiding These Seven Common Mistakes,” TechRepublic.com, May 17, 2007; “CR Investigates: The End of Pri-vacy?” Consumer Reports, June 2006; “CR Investigates: Your Privacy for Sale,” Consumer Reports, June 2006; and Identity Theft Center, www.idtheftcenter.org, February 14, 2007.

iii Source: Joran Robertson, “Chip-Shrinking May Be Nearing Its Limits,” Yahoo News/Associated Press, December 15, 2007.

iv Source: Robert X. Cringely, “What’s Next: Data Disasters,” Inc. Magazine, November 2003, page 47.

v Source: “Password Overload Hurts Security, Survey Finds,” Reuters/ZDnet.com, April 25, 2006.

vi Sources: Mark Jewell, “Computer Breaches Hit All-Time High in 2007,” The Atlanta Journal-Constitution, De-cember 31, 2007; and Byron Acohido, “Cyberthieves Stole 1.3 Million Names,” USA Today, August 24, 2007.

vii The Internet is a dynamic, changing information source. Web links noted in this manual were checked at the time of publication, but content may change over time. Please review the website before recommending it to your stu-dents.

viii Sources: Jennifer Reingold, “The Storm After the Storm,” Fast Company, April 2006; Shannon Mortland, “Tu-lane Leader Looks to Regroup after Katrina,” Crain’s Cleveland Business, September 19, 2005; Tommy Santora, “Interview with Scott Cowen, President of Tulane,” New Orleans CityBusiness, January 9, 2006.

11.26 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual

Page 27: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

The first advantage would be speed of obtaining data. Others could include improved efficiency of communication. The infamous illegibility of physician handwriting would cease to be an issue. In-creased productivity of health care professionals would save money as well as patient lives.

4. What issues could you foresee arising from physician resistance to computerized systems like CPOE?

Some physicians see their profession as being “hands on” and personal with their patients. They may feel that new technology removes the human factor. Also some are used to technology being handled by technicians and staff and may feel that using technology would be beneath their professional status.

CHAPTER 11: Information Technology in Business 11.27

Page 28: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

BONUS CASE 11-3

Cell Phone Privacy

In his unsuccessful 2004 campaign for President, General Wesley Clark campaigned as a strong supporter of national security. But he soon discovered a breach in his personal security. A resourceful blogger, hoping to call attention to the black market in phone records, purchased the records of 100 cell phone calls that Clark had made, no questions asked. The query cost $89.95.

Clark is not the only one who has had their private phone calls revealed. To test one of the online services, Locatecell.com, the FBI paid the company $160 to buy the records for an agent’s cell phone. They received the list within three hours.

The tiny cell phone has become a mainstream tool. About 65% of the U.S. population owns at least one cell phone. But few safeguards are in place to protect customers’ information. Online cell phone information sites can obtain information about who your physician is, whether you are seeing a psychia-trist, how often you are calling that special “friend,” and what companies you do business with. Such records could also be used by divorce attorneys and by criminals, such as stalkers or abusive spouses.

Data brokers who sell cell phone records probably get them using one of three techniques. They might have someone inside the cell phone carrier who sells the data. The brokers also use “pretexting,” in which the data broker or investigator pretends to be the cell phone account holder and persuades the car-rier’s employees to release the information. Finally, brokers can try to get access to consumer accounts online. Telephone companies are now encouraging their customers to manage their accounts over the In-ternet. The companies will typically set up the online service in advance, waiting to be activated by the user. If the data broker can figure out how to activate online accounts in the name of a real customer be-fore that customer does, the call records are there for the taking.

The latest of these wireless phones have Internet access, digital cameras, and precision satellite location tracking. This leads to another area of concern—the use of the location tracking feature to watch a user’s movements. One technology allows rental-car companies to track their cars with GPS. Another application lets a manager track how workers use company-issued cell phones. Privacy advocates worry about the overall ability to gather vast databases tracking the movements of virtually every wireless phone user, even over long periods. Law enforcement agencies view this as a potential treasure trove. The poten-tial for individuals to abuse the tracking technology is also real. In a recent case, a man was arrested for stalking after using a GPS/cellular system planted under the hood of his ex-girlfriend’s car. ix

DISCUSSION QUESTIONS FOR BONUS CASE 11-3

1. Should cell phone data brokers be able to sell users’ records? Why or why not?

2. Does this practice violate your privacy? Explain.

3. Are the data brokers’ actions legal? Ethical? Why?

ix Sources: Lauren Weinstein, “Tiny Cell Phone or Big Brother?” Associate Press, cited by wirednews.com, January 6, 2003; Jonathan Krim, “Online Data Gets Personal: Cell Phone Records for Sale, The Washington Post, July 8, 2005; Bob Sullivan, “Can We Stop The Sale Of Cell Phone Records?” January 17, 2006, MSNBC.com; Frank Main, “Your Phone Records Are For Sale,” Suntimes.com, January 5, 2006; Kristina Dell, “The Spy in Your Pocket,” Time, March 27, 2006; Paul Carrier, “State to Ban Sale of Phone Records,” Portland Press Herald, April 1, 2006; and Tom Sowa, “Measure Protects Phone Records: Bill Makes Web Sale of Cell Data a Crime,” The Spokesman-Re-view, February 7, 2006.

11.28 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual

Page 29: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

ANSWERS TO DISCUSSION QUESTIONS FOR BONUS CASE 11-3

1. Should cell phone data brokers be able to sell users’ records? Why or why not?

Most cell phone users will shout “No.” However, the legal foundation is less clear.

2. Does this practice violate your privacy? Explain.

Probably. What price would students be willing to pay to protect privacy?

3. Are the data brokers’ actions legal? Ethical? Why?

Legal, technically. Ethically, probably not. How do students define “ethical” in this situation?

CHAPTER 11: Information Technology in Business 11.29

Page 30: WHAT IS MANAGEMENTnovella.mhhe.com/olc2/dl/572538/dias1_im_ch11_FINAL1.doc · Web viewUsing it increases typing speed by more than 20%. Yet the system never caught on—typists did

ENDNOTES

11.30 INTRODUCTION TO BUSINESS: Instructor’s Resource Manual