Managing enterprises with advanced ICT
Appearance
Introduction
[edit | edit source]The purpose of this wikibook is to explain basic terms from the fields: informatics, information systems, system analysis, information technologies. Its primary learning objective is to prepare a student (a future manager) to assess, analyze, select, acquire, manage and maintain an information system for his/her company.
The target group of these selected chapters are students of management study programmes of business schools or applied science faculties.
Basic terms
[edit | edit source]- A manager who want to manage their company with the support of information technologies should be familiar with basic terms such as:
Software and business models
[edit | edit source]- A manager is often confronted which type of software to use. Which is better, proprietary or open-source?
- See more:
- Outsourcing IT-related services is often a good choice for a manager, especially if there is no IT department within the company.
- See more:
Types of information systems:
[edit | edit source]- Each part of a company requires different type of an information system. The most common types of information systems are:
Data & computing
[edit | edit source]- When it comes to acquiring a software and hardware, a manager should decide whether to build their own IT / data center or lease already established one:
IT strategy & processes
[edit | edit source]- A manager's primary responsibility is to establish a technology strategy for their organization:
- A modern company includes IT related activities and services such as Service desk, Incident management and similar. A set of good practices was developed and it can be reused also for your organization:
Business & requirements analysis
[edit | edit source]- Requirements gathering and analysis is one of the first steps of the company's digital transformation:
Business continuity and IT Security
[edit | edit source]- A manager's primary responsibility is to ensure the company's continuous delivery of products or services at pre-defined acceptable levels following a disruptive incident:
- Protecting computer systems from information disclosure, theft or damage: