Module 17: Cheat Sheet

Download a pdf of this page here.

Download the Spanish version here.

Essential Concepts

Information Technology in Business

Information technology (IT) is essential for businesses to manage and process information, playing a crucial role in daily operations and strategic decision-making in the knowledge-based economy. Technology has significantly transformed business through mobile solutions, cloud computing, extreme customer segmentation, increased connectivity, and social media, compelling businesses to embrace and adapt to these changes or face the risk of obsolescence.

Business intelligence (BI) is a technology-driven process that analyzes data from both internal and external sources to provide useful information for decision-making, helping businesses gain a competitive advantage, identify market trends, and create new strategic opportunities.

How Businesses Use Information

Technology has made it easy for businesses to gather facts about their customers and business operations. However, data are just facts and figures in their raw form. It’s not until the data are processed—i.e., converted into information—that businesses can use them to improve their operations.

Businesses collect data in five broad categories: business process data, physical-world observations, biological data, public data, and personal data. Each offers valuable insights for improving efficiency, tracking physical objects, utilizing biometric information, leveraging publicly available data, and understanding individual preferences. However, the collection of these types of data also raises debates on privacy and data rights.

Being able to collect data is central to most businesses; however, all that data needs to be stored somewhere so users can retrieve it and use it. The creation of databases—virtual warehouses where data is stored—allows businesses to take the first step in managing and using data. Since the creation of “cloud computing,” businesses have been able to store their data offsite but still access it from anywhere in the world. Businesses mine data in order to find valuable patterns and answers to questions.

Managing Information

In order to make the greatest use of data, it must be shared. In business, this means that data collected by marketing needs to be shared with other departments—finance, production, research, and development—or external partners and customers, via networks. Again, this is where businesses must make decisions about the best way to share data: through intranets, extranets, or the cloud. Each has its own set of advantages and disadvantages.

A virtual private network (VPN) extends a private network over a public network, allowing users to securely send and receive data as if they were directly connected to the private network, providing functionality, security, and management benefits while utilizing the Internet’s flexibility.

Issues in Information Technology

With big data comes big responsibility. This responsibility is about keeping customer and employee data safe from the threat of cyber criminals and illicit users. Large data security breaches have become more prevalent in recent years, and businesses are constantly working to find better and more effective ways to protect their data.

The widespread collection and consolidation of personal information in electronic databases raise significant privacy concerns, as both corporations and governments have access to detailed profiles of individuals, leading to potential surveillance and misuse of data, while privacy advocates strive to protect consumer rights and restrict the sale of personal information.

Artificial Intelligence (AI) is transforming businesses by enabling machines to learn, reason, and make independent decisions, impacting sectors like customer service and supply chain management. Augmented analytics combines human intuition with advanced algorithms to automate data analysis, uncovering insights and enhancing decision-making based on big data. Ethical hacking, or penetration testing, plays a crucial role in cybersecurity by identifying vulnerabilities and protecting sensitive information from unauthorized access. Additionally, digital forensics allows for the investigation and tracking of digital evidence, safeguarding corporate data and identifying potential threats.

Career Connection: Following Up

After a job interview, there are three ways to follow up: send a thank-you note to each interviewer within a day, mentioning something specific from the interview to reinforce your interest; send a follow-up note if the decision date has passed, expressing continued interest and asking if they need additional information; and if you were not offered the job but felt the interview went well, send a feedback note to inquire about constructive feedback for future reference. Additionally, if the organization is one you admire, communicate your continued interest and ask to be considered for future opportunities.

Glossary

artificial intelligence (AI)

the simulation of human intelligence in machines, enabling them to learn, reason, and make decisions independently

augmented analytics

use of AI and advanced algorithms to automate data preparation, exploration, and analysis

business intelligence (BI)

a technology-driven process for analyzing data and presenting useful information to help executives, managers and other end users make informed business decisions

cloud computing

performing computer tasks using services provided over the Internet

data

any character, text, word, number

data mining

the identification of patterns and knowledge from large amounts of data

data warehousing

collecting and storing data from multiple internal and external sources that will be later used in analysis

digital forensics

the process of collecting, analyzing, and preserving electronic evidence to investigate and uncover information related to cybercrimes or other digital incidents

ethical hacking

also known as penetration testing, happens when organizations give permission to professionals to hack into systems to identify vulnerabilities in computer systems, networks, and applications to prevent unauthorized access and protect sensitive information by using the same methods as criminals

enterprise resource planning systems (ERP)

technology that tracks business resources and how they are used

extranet

when outside parties are provided access to a subset of the information accessible from an organization’s intranet, the intranet becomes an extranet

information

data formatted in a manner that allows it to be utilized by human beings in some significant way

information technology (IT)

includes the equipment and techniques used to manage and process information

intranet

a private network accessible only to an organization’s staff

point of sale systems (POS)

technology that tracks purchases by scanning barcodes and uses that data for inventory management, loyalty programs, supplier records, bookkeeping, issuing of purchase orders, quotations and stock transfers, sales reporting and in some cases networking to distribution centers

virtual private network (VPN)

extends a private network (intranet) across a public network (Internet), and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network