Chapter 20
Managing Information Technology
By Boundless
![Thumbnail](../../../../../figures.boundless-cdn.com/16873/raw/re-development-methodology.jpg)
To keep up with evolving consumer and market trends, both hardware and software components have seen drastic improvements.
![Thumbnail](../../../../../figures.boundless-cdn.com/16868/square/umerization-report-chart-1.jpeg)
Consumerization is the growing tendency for new IT to emerge first in the consumer market and then spread into business and government organizations.
![Thumbnail](../../../../../figures.boundless-cdn.com/4857/square/internet-map-1024.jpeg)
Networks are often classified by their physical or organizational extent, their purpose, their usage, trust level, and access rights.
![Thumbnail](../../../../../figures.boundless-cdn.com/16411/square/7554298670-0a21f99b9d.jpeg)
An expert system consists of both an inference engine and a knowledge base and has decision-making abilities.
![Thumbnail](../../../../../figures.boundless-cdn.com/16414/square/5171125430-0f5d3b37db.jpeg)
Effectively transforming data into actionable information is the key to using information technology to improve decision making.
![Thumbnail](../../../../../figures.boundless-cdn.com/10806/square/possible-risks.jpg)
IT risk relates to the business risk associated with the use, ownership, operation, involvement, and adoption of IT within an enterprise.
![Thumbnail](../../../../../figures.boundless-cdn.com/16410/square/6211955974-4127330297.jpeg)
Knowledge is acquired through the use of and access to information.
![Thumbnail](../../../../../figures.boundless-cdn.com/16413/square/8023902654-dc4ce8ca8e.jpeg)
Data consists of nothing but facts, which can be manipulated to make it useful; the analytical process turns the data into information.
![Thumbnail](../../../../../figures.boundless-cdn.com/16426/square/1594411528-1512b1aad5.jpeg)
Cybercrimes are those committed via computer networks for such purposes as fraud, identity theft, and the hacking of sensitive information.
![Thumbnail](../../../../../figures.boundless-cdn.com/16386/square/beast-rat-client.jpeg)
Malware is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
![Thumbnail](../../../../../figures.boundless-cdn.com/34292/square/qgng3n3srqnt496czvvw.jpg)
Email represents a potential IT risk and entry point for hackers, and so IT teams must integrate appropriate safeguards.
- Introduction to Financial Management
- Planning
- Operating Funds
- Short-Term Financing
- Long-Term Financing