You are on page 1of 21

Global E-business and collaboration with the different networks

In order to operate, businesses must deal with many different pieces of information about suppliers, customers, employees, invoices and
payments, and of course, their products and services. They must organize work activities that use this information to operate efficiently
and enhance the overall performance of the firm. Information systems make it possible for firms to manage all their information, make
better decisions, and improve the execution of their business processes.
Business Process:
• Business processes refer to the manner in which work is organized, coordinated, and focused to produce a valuable product or
service.
• Business processes are the collection of activities required to produce a product or service. These activities are supported by flows
of material, information, and knowledge among the participants in business processes.
• Business processes also refer to the unique ways in which organizations coordinate work, information, and knowledge, and the
ways in which management chooses to coordinate work.
• The outcome of a well-designed business process is increased effectiveness (value for the customer) and increased efficiency (less
costs for the company).
• There are three types of business processes:
• Management Processes: The processes that govern the operation of a system. Typical management processes include
corporate governance and strategic management
• Operational Processes: The processes that constitute the core business and create the primary value stream. For example,
taking orders from customers, and opening an account in a bank branch.
• Supporting Processes: Theses processes support the core
processes. Examples include Health & Safety, accounting,
recruitment, call center, technical support.
• Many business processes are tied to a specific functional area, such as
sales and marketing, while others cross many different functional areas
and require coordination across departments.
• Every business can be seen as a collection of business processes, some
of which are part of larger encompassing processes.
Business Process and Information Systems: Other business processes
cross many different functional areas and require coordination across
departments

What Is Collaboration?

Let ‘s first determine exactly what the term collaboration means working with others to achieve shared and explicit goals.
• All members that involve in collaborative work environment focus on a particular task or mission.
• Collaboration and teamwork have grown in popularity over the last few years because new technology has made it much easier for
people to communicate and share information, files, and documents.
• Collaboration among employees, suppliers, and customers is becoming an important tool in increasing a company’s competitive
advantage.
• Social networking platforms like Facebook, Twitter, and Pinterest help improve a company’s social business to establish and improve
interactions with groups inside and outside the organization.
• Information sharing, innovation, and decision-making are enhanced through these technologies.

Tools and Technologies for Collaboration and Social Business: Many new systems for interacting with other employees, managers,
vendors, and customers have been developed. We probably use some of them without realizing how essential they ‘ve become in
creating an environment that supports a collaborative culture.

• E-mail and instant messaging: Billions of messages flow everyday between employees, managers, suppliers, and customers.
• Social networking: More than just a way to socialize among friends, these tools give corporations another way for users to share
ideas and collaborate with each other. According to Forrester Research survey of 1,217 business decision makers worldwide late
last year, 95% use social networks to some extent.
• Wikis: Wikis are a type of Web site that makes it easy for users to contribute and edit text content and graphics without any knowledge
of Web page development or programming techniques. The most well-known wiki is Wikipedia. It relies on volunteers, makes no
money, and accepts no advertising. Wikis are ideal tools for storing and sharing company knowledge and insights.
• Virtual worlds: Able to house online meetings, training sessions, and this type of tool is gaining popularity as a way to meet, interact,
and exchange ideas.
• Virtual Meeting Systems: With a virtual meeting system you can hold strategy sessions once or twice a week instead. You would feel
like all of your teammates are physically located in the same place if you use telepresence technology. You can share ideas and
documents in real-time. Best of all, you don’t have all the travel hassles and you can sleep in your own bed.
• Microsoft SharePoint: SharePoint is a browser-based collaboration and document management platform, combined with a powerful
search engine that is installed on corporate servers. SharePoint has a Web-based interface and close integration with everyday tools
such as Microsoft Office desktop software products. SharePoint software makes it possible for employees to share their Office
documents and collaborate on projects using Office documents as the foundation.
• Lotus Notes: Another Internet-based collaboration environment a team could use is IBM’s Lotus Notes. It provides all the basic
collaboration tools as Google Apps/Google Sites and SharePoint do but with a few added features.
• Google Apps and Google sites: One of the most widely used free online services for collaboration is Google Apps/Google Sites.
Google Sites allows users to quickly create online, group editable Web sites. Google Sites users can design and populate Web sites
in minutes and, without any advanced technical skills, post a variety of files including calendars, text, spreadsheets, and videos for
private, group, or public viewing and editing. Google Apps works with Google Sites and Compiled By: Krishna Bhandari
www.genuinenotes.com includes the typical desktop productivity office software tools (word processing, spreadsheets, presentation,
contact management, messaging, and mail).
Tools & Technologies: post-pandemic | pre-pandemic for the collaboration and social business.
The Covid-19 pandemic has led to an inevitable surge in the use of digital technologies due to the social
distancing norms and nationwide lockdowns. People and organizations all over the world have had to adjust to
new ways of work and life. We explore possible scenarios of the digital surge and the research issues that arise.
An increase in digitalization is leading firms and educational institutions to shift to work-from-home (WFH).
Blockchain technology will become important and will entail research on design and regulations. Gig workers
and the gig economy is likely to increase in scale, raising questions of work allocation, collaboration, motivation,
and aspects of work overload and presenteeism. Workplace monitoring and technostress issues will become
prominent with an increase in digital presence. Online fraud is likely to grow, along with research on managing
security. The regulation of the internet, a key resource, will be crucial post-pandemic.
Research may address the consequences and causes of the digital divide. Further, the issues of net neutrality
and zero-rating plans will merit scrutiny. A key research issue will also be the impact and consequences o f
internet shutdowns, frequently resorted to by countries. Digital money, too, assumes importance in crisis
situations and research will address their adoption, consequences, and mode. Aspects of surveillance and
privacy gain importance with increased digital usage.
With the spread of the pandemic, almost all regions have implemented lockdowns, shutting down activities that
require human gathering and interactions - including colleges, schools, malls, temples, offices, airports, and
railway stations. The lockdown has resulted in most people taking to the internet and internet-based services to
communicate, interact, and continue with their job responsibilities from home. Internet services have seen rises
in usage from 40 % to 100 %, compared to pre-lockdown levels. Video-conferencing services like Zoom have
seen a ten times increase in usage, and content delivery services like Akamai have seen a 30 % increase in
content usage.
The lockdowns across countries have entailed a rise in the use of information systems and networks, with
massive changes in usage patterns and usage behaviour. Employees are adjusting to new "normals” - with
meetings going completely online, office work shifting to the home, with new emerging patterns of work. These
changes have come across most organizations, whether in business, society, or government. The changes have
also come suddenly, with barely any time for organizations and people to plan for, prepare and implement new
setups and arrangements; they have had to adjust, try, experiment, and find ways that did not exist before.
Experts in most countries are wary of the possibility of the disease spread re-emerging, and that lockdown norms
may be relaxed carefully and slowly with social distancing at the core of the new normal.
It is in this context that we see the use of information systems to continue in the same vein for some time in the
foreseeable future as during the lockdown. We examine the possible scenarios in this surge in information
technology usage during and post the pandemic. Our estimation of these effects assumes that there was a
digital transformation already underway, before the pandemic set in, and it will take certain forms owing to the
impact of the lockdowns.
Increasing digitalization: As the use of video- and audio-conferencing tools increases significantly,
organizations will ramp up their technology infrastructure to account for the surge. This will lead to increased
investment in bandwidth expansion, network equipment, and software that leverages cloud services. With
employees becoming acclimatized to the idea of work-from-home (WFH), meeting and transacting online, firms
will shift to WFH as a norm rather than as an exception.
Education is another domain in which there a dramatic shift to the online mode of transacting. Since the
beginning of the lockdown, schools, colleges, and universities around the world have shifted their classes to
video conferencing platforms like Zoom and Google Meet.
Digital transformation technologies such as Cloud, Internet-of-Things (IoT), Blockchain (BC), Artificial
Intelligence (AI), and Machine Learning (ML), constitute a bulk of the of what is being adopted by organizations
as part of their transformation effort.
Blockchain (BC) technology presents an opportunity to create secure and trusted information control
mechanisms. As education and healthcare services witnesses a shift to the digital domain, BCs enable a way
to secure and authenticate certificates, health records, medical records, and prescriptions.
Explain Porter’s Competitive Forces Model in brief with the example.
Porter's Five Forces is a model that identifies and analyzes five competitive forces that shape every industry
and helps determine an industry's weaknesses and strengths. Five Forces analysis is frequently used to identify
an industry's structure to determine corporate strategy.
Porter's model can be applied to any segment of the economy to understand the level of competition within the
industry and enhance a company's long-term profitability. The Five Forces model is named after Harvard
Business School professor, Michael E. Porter.
Porter's 5 forces are: Competition in the industry, Potential of new entrants into the industry, Power of
suppliers, Power of customers, Threat of substitute products

Porter's Five Forces is a business analysis model that helps to explain why various industries are able to sustain
different levels of profitability.
• Competition in the Industry: The first of the Five Forces refers to the number of competitors and their ability
to undercut a company. The larger the number of competitors, along with the number of equivalent products
and services they offer, the lesser the power of a company.
Suppliers and buyers seek out a company's competition if they are able to offer a better deal or lower prices.
Conversely, when competitive rivalry is low, a company has greater power to charge higher prices and set
the terms of deals to achieve higher sales and profits. Example - Several large, established companies
already occupy the athletic apparel industry. They have big budgets and lots of resources to maintain their
share of the market. Argento's products are not yet patented, so these companies or others could potentially
copy them. Competitive rivalry for Argento is high.
• Potential of New Entrants Into an Industry: A company's power is also affected by the force of new entrants
into its market. The less time and money it costs for a competitor to enter a company's market and be an
effective competitor, the more an established company's position could be significantly weakened.
An industry with strong barriers to entry is ideal for existing companies within that industry since the company
would be able to charge higher prices and negotiate better terms. Example - Entering the athletic apparel
market requires a large investment for production, advertising and branding. However, existing large apparel
companies could decide to enter the athletic market. The threat of new entrants is medium to low.
• Power of Suppliers: The next factor in the Porter model addresses how easily suppliers can drive up the
cost of inputs. It is affected by the number of suppliers of key inputs of a good or service, how unique these
inputs are, and how much it would cost a company to switch to another supplier. The fewer suppliers to an
industry, the more a company would depend on a supplier.
As a result, the supplier has more power and can drive up input costs and push for other advantages in
trade. On the other hand, when there are many suppliers or low switching costs between rival suppliers, a
company can keep its input costs lower and enhance its profits. Example - The athletic apparel industry has
a large and varied supplier base. Further, Argento has many options because it manufactures its products
using different companies in multiple countries. The bargaining power of suppliers is low.
• Power of Customers: The ability that customers have to drive prices lower or their level of power is one of
the Five Forces. It is affected by how many buyers or customers a company has, how significant each
customer is, and how much it would cost a company to find new customers or markets for its output.
A smaller and more powerful client base means that each customer has more power to negotiate for lower
prices and better deals. A company that has many, smaller, independent customers will have an easier time
charging higher prices to increase profitability. Example - Argento's buyers include both end-users and
wholesale. Wholesale customers have enough bargaining power to substitute Argento's products with those
of lower-priced competitors. End-users, however, are loyal to Argento's brand. The collective bargaining
power of buyers is medium.
• Threat of Substitutes: The last of the Five Forces focuses on substitutes. Substitute goods or services that
can be used in place of a company's products or services pose a threat. Companies that produce goods or
services for which there are no close substitutes will have more power to increase prices and lock in
favorable terms. When close substitutes are available, customers will have the option to forgo buying a
company's product, and a company's power can be weakened. Example - While companies could copy
Argento's unpatented products, the demand for athletic wear high and continuing to grow. The threat of
substitute products is low.

Understanding Porter's Five Forces and how they apply to an industry, can enable a company to adjust its
business strategy to better use its resources to generate higher earnings for its investors.
Ethical, social and political issues raised by Information Systems
Information technology is introducing changes for which laws and rules of acceptable conduct have not yet been developed. Increasing
computing power, storage, and networking capabilities--including the Internet--expand the reach individual and organizational actions
and magnify their impacts. The ease and anonymity with which information is now communicated, copied, and manipulated in online
environments pose new challenges to the protection of privacy and intellectual property. The main ethical, social, and political issue
raised by information systems center around information rights and
obligations, property rights and obligations, accountability and control,
system quality, and quality of life.
• Ethical issues: Intellectual property rights, electronic monitoring of
employees and data utilization;
• Cultural issues: Assimilation of emerging technologies, developing trust,
power asymmetry, policy implementation, and social environments;
• Human interaction issues: recruitment and retainment of technical
personnel, motivation, leadership, social presence, and organizational
champions of information systems;
• Relationship issues: development partnerships, virtual teams, group
cohesiveness, collaboration, group facilitation, networking, and buyer-
supplier linkages;
• Security issues: misuse of data, virus/worm creation, Intranet abuse,
data protection, fraud with systems use, and standards and regulations.

Ethics In An Information Society: Ethical choices are decisions made by individuals who are responsible for the consequences of their
actions. Responsibility is a key element and means that you accept the potential costs, duties, and obligations for the decisions you
make. Accountability is a feature of systems and social institutions and means mechanisms are in place to determine who took
responsible action, and who is responsible. Liability is a feature of political systems in which a body of laws is in place that permits
individuals to recover the damages done to them by other actors, systems, or organizations. Due process is a related feature of law-
governed societies and is a process in which laws are known and understood, and there is an ability to appeal to higher authorities to
ensure that the laws are applied correctly.

The Moral Dimensions of Information Systems:


Information Rights: Privacy And Freedom In The Internet Age: Privacy is the claim of individuals to be left alone, free from surveillance
or interference from other individuals or organizations, including the state. Most American and European privacy law is based on a regime
called Fair Information Practices (FIP) first set forth in a report written in 1973 by a federal government advisory committee (U.S.
Department of Health, Education, and Welfare, 1973).
The European Directive on Data Protection: In Europe, privacy protection is much more stringent than in the United States. Unlike the
United States, European countries do not allow businesses to use personally identifiable information without consumers’ prior consent.
Informed consent can be defined as consent given with knowledge of all the facts needed to make a rational decision.
Working with the European Commission, the U.S. Department of Commerce developed a safe harbor framework for U.S. firms. A safe
harbor is a private self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation
but does not involve government regulation or enforcement.
Internet Challenges to Privacy: Internet technology has posed new challenges for the protection of individual privacy. Information sent
over this vast network of networks may pass through many different computer systems before it reaches its final destination. Each of
these systems is capable of monitoring, capturing, and storing communications that pass through it.
Trade Secrets: Any intellectual work product – a formula, device, pattern, or compilation of data-used for a business purpose can be
classified as a trade secret, provided it is not based on information in the public domain.
Copyright: Copyright is a statutory grant that protects creators of intellectual property from having their work copied by others for any
purpose during the life of the author plus an additional 70 years after the author’s death.
System Quality: Data Quality and System Errors: Three principle sources of poor system performance are (1) software bugs and errors
(2) hardware or facility failures caused by natural or other causes and (3) poor input data quality. The software industry has not yet
arrived at testing standards for producing software of acceptable but not perfect performance.

Quality of Life: Equity, Access, and Boundaries


Balancing Power: Center Versus Periphery: Lower level employees many be empowered to make minor decisions but the key policy
decisions may be as centralized as in the past.
Rapidity of Change: Reduced Response Time to Competition: Information systems have helped to create much more efficient national
and international market. The now-more-efficient global marketplace has reduced the normal social buffers that permitted businesses
many years to adjust to competiton. We stand the risk of developing a “just-in-time society” with “just-in-time jobs” and “just-in-time”
workplaces, families, and vacations.
Maintaining Boundaries: Family, Work, and Leisure: The danger to ubiquitous computing, telecommuting, nomad computing, and the “do
anything anywhere” computing environment is that it is actually coming true. The traditional boundaries that separate work from family
and just plain leisure have been weakened. The work umbrella now extends far beyond the eight-hour day.
Dependence and Vulnerability: Today our businesses, governments, schools, and private associations, such as churches are incredibly
dependent on information systems and are, therefore, highly vulnerable if these systems fail. The absence of standards and the criticality
of some system applications will probably call forth demands for national standards and perhaps regulatory oversight.
Computer Crime and Abuse: New technologies, including computers, create new opportunities for committing crimes by creating new
valuable items to steal, new way to steal them, and new ways to harm others. Computer crime is the commission illegal acts through the
use of a computer or against a computer system. Simply accessing a computer system without authorization or with intent to do harm,
even by accident, is now a federal crime. Computer abuse is the commission of acts involving a computer that may not illegal but that
are considered unethical. The popularity of the Internet and e-mail has turned one form of computer abuse – spamming – into a serious
problem for both individuals and businesses. Spam is junk e-mail sent by an organization or individual to a mass audience of Internet
users who have expressed no interest in the product or service being marketed.
What are the various current hardware and software platforms used in the business world?

Current trends in hardware and software include the increasing use of reduced instruction-set computing, movement to the UNIX
operating system, the development of large software libraries, microprocessor-based smart terminals that allow remote validation
of data, speech synthesis and recognition, application generators, now in fourth-generation languages, computer-aided software
engineering, object-oriented technologies, and artificial intelligence. The computer industry and its products continue to undergo
dynamic change. Software development continues to lag behind hardware, and its high cost is offsetting the savings provided by
hardware.
The future of hardware is quite shaky because of the troubles between software and hardware computer engineers and now that
software could not keep up with hardware, hardware may be declining as software will take over.

The main changes occurring in hardware are:


Mobile platform: A mobile platform is the operating system that controls a mobile device or information appliance similar in principle
to an operating system such as Windows, Mac OS, or Linux that controls a desktop computer or laptop. However, they are
currently somewhat simpler, and deal more with the wireless versions of broadband and local connectivity, mobile multimedia
formats, and different input methods.
Examples of devices running a mobile operating system are smartphones, personal digital assistants (PDAs), tablet computers
and information appliances or what are sometimes referred to as smart devices, which may also include embedded systems, or
other mobile devices and wireless devices.
More and more business computing is moving from PCs and desktop machines to mobile devices like cell phones and smart
phones. Data transmissions, Web surfing, e-mail and instant messaging, digital content displays, and data exchanges with internal
corporate systems are all available through a mobile digital platform. Netbooks, small low-cost lightweight subnotebooks that are
optimized for wireless communication and Internet access, are included.
Example is iPhone, strengths greatly outweigh its weaknesses, and you need to use it only for a short time to realize how old and
heavy most other smart phones feel. In most cases, the iPhone provides the real thing in terms of Web and Internet capabilities,
not watered-down phone versions.
The iPhone has already unleashed competition from other vendors that recognize the innovations and improvements that the
Apple phone has introduced. It was very good and it was getting close to replace the PC.

Grid computing: It involves connecting geographically remote computers into a single network capable of working in parallel on
business problems that require short-term access to large computational capacity. Meaning rather than purchase huge
mainframes or super computers, firms can chain together thousands of smaller desktop clients into a single computing grid.
Example thinks about how much time you don’t use your personal computer, in reality not a lot. Most computers in the world are
being idle and at night they are sleeping. What if you could combine all the idle time of hundreds or thousands of computers into
a continuous, connected computing capacity to capture, process, manage, store, and retrieve data? You wouldn’t have to
purchase enormous, super computers to realize this capability and capacity. You just have to turn on grid computing.

Cloud computing: This is a model of computing where firms and individuals obtain computing power and software applications
over the Internet, rather than purchasing their own hardware and software. Data are stored on powerful servers in massive data
centres, and can be accessed by anyone with an Internet connection and standard Web browser. Cloud computing is an umbrella
term used to refer to Internet based development and services. The cloud is an image for the Internet. A number of characteristics
define cloud data, applications services and infrastructure:
Remotely hosted: Services or data are hosted on someone else’s infrastructure.
Everywhere: Services or data are available from anywhere.
The result is a utility computing model similar to traditional that of traditional utilities, like gas and electricity. You pay for what you
would like pays as you go or the more you use the more you pay.\

The main changes occurring in software are:


• More flexibility ; one of the major attributes of modern software is flexible meaning, now developed software are becoming
more easier to use .It does not really acquire tutorials or have to be thought before one can use a software on the market
these days. This is due to indicates and showing of genuineness in software making it meaningful for users to see and
use without haven to be explained before use.
For example early versions of Microsoft Office were that uneasy to use but with current versions of this Application
software (that is in 2007-2010), the organization is more simple therefore becoming more flexible because you can easily
manipulate around with it.
• It can be used for daily communication Examples of software are Microsoft Outlook Express, Yahoo Messenger, MSN
Messenger, etc. This software’s used for daily communication through digital mobile, grid computing and cloud computing
(internet).
• Software can be used for security purpose, security system if you know a lot about software you may break any security
system example code and you can even rob the bank in computer term is known as hacking. It can be used for hacking.
• Software Enables Multitasking: trend occurring in software’s these days includes multitasking supportiveness.
Multitasking refers to the ability of a system specifically CPU/COMPUTER SYSTEM to run more than one task
simultaneously. Software’s these days has the ability to support Multitasking. Typical example is, The Microsoft XP PACK
versions were able to support multitasking but not more effective as in Windows 7 which can carry more than 4 tasks at
a time. It could copy, delete, install at the same time which shows how software evolving these days are multitasking
supported.
How do cloud technologies help to access the data anywhere anytime moving and storage?

Cloud computing is a general term for anything that involves delivering hosted services over the internet. These
services are divided into three main categories or types of cloud computing: infrastructure as a service (IaaS),
platform as a service (PaaS) and software as a service (SaaS).
A cloud can be private or public. A public cloud sells services to anyone on the internet. A private cloud is a
proprietary network or a data center that supplies hosted services to a limited number of people, with certain
access and permissions settings. Private or public, the goal of cloud computing is to provide easy, scalable
access to computing resources and IT services. Cloud infrastructure involves the hardware and software
components required for proper implementation of a cloud computing model. Cloud computing can also be
thought of as utility computing or on-demand computing.

Characteristics and advantages of cloud computing


Cloud computing has been around for several decades now, and today's cloud computing infrastructure
demonstrates an array of characteristics that have brought meaningful benefits for businesses of all sizes. Some
of the main characteristics of cloud computing are the following:
• Self-service provisioning. End users can spin up compute resources for almost any type of workload on
demand. An end user can provision computing capabilities, such as server time and network storage,
eliminating the traditional need for IT administrators to provision and manage compute resources.
• Elasticity. Companies can freely scale up as computing needs increase and scale down again as
demands decrease. This eliminates the need for massive investments in local infrastructure, which might
or might not remain active.
• Pay per use. Compute resources are measured at a granular level, enabling users to pay only for the
resources and workloads they use.
• Workload resilience. CSPs often implement redundant resources to ensure resilient storage and to keep
users' important workloads running -- often across multiple global regions.
• Migration flexibility. Organizations can move certain workloads to or from the cloud -- or to different cloud
platforms -- as desired or automatically for better cost savings or to use new services as they emerge.
• Broad network access. A user can access cloud data or upload data to the cloud from anywhere with an
internet connection using any device.
• Multi-tenancy and resource pooling. Multi-tenancy lets numerous customers share the same physical
infrastructures or the same applications yet still retain privacy and security over their own data. With
resource pooling, cloud providers service numerous customers from the same physical resources. The
resource pools of the cloud providers should be large and flexible enough so they can service the
requirements of multiple customers.

These characteristics support a variety of important benefits for modern business, including the following:
• Cost management. Using cloud infrastructure can reduce capital costs, as organizations don't have to
spend massive amounts of money buying and maintaining equipment. This reduces their capital
expenditure costs -- as they don't have to invest in hardware, facilities, utilities or building large data
centers to accommodate their growing businesses. Additionally, companies don't need large IT teams
to handle cloud data center operations because they can rely on the expertise of their cloud providers'
teams. Cloud computing also cuts costs related to downtime. Since downtime rarely happens in cloud
computing, companies don't have to spend time and money to fix any issues that might be related to
downtime.
• Data and workload mobility. Storing information in the cloud means that users can access it from
anywhere with any device with just an internet connection. That means users don't have to carry
around USB drives, an external hard drive or multiple CDs to access their data. Users can access
corporate data via smartphones and other mobile devices, enabling remote employees to stay
up to date with co-workers and customers. End users can easily process, store, retrieve and
recover resources in the cloud. In addition, cloud vendors provide all the upgrades and updates
automatically, saving time and effort.
• Business continuity and disaster recovery (BCDR). All organizations worry about data loss. Storing data
in the cloud guarantees that users can always access their data even if their devices, e.g., laptops or
smartphones, are inoperable. With cloud-based services, organizations can quickly recover their data in
the event of emergencies, such as natural disasters or power outages. This benefits BCDR and helps
ensure that workloads and data are available even if the business suffers damage or disruption.
Explain the risk management of the data stores and different security measures to safeguard
from cyber threat.
Cybersecurity breaches have been on the rise, and it's expected that by 2023, they'll have grown to 15.4 million. While technological
advancements have made it easy for organizations to upgrade their security measures, malicious hackers are now using sophisticated
tools. This means that in addition to implementing strict cybersecurity policies, you also have to take proactive measures to reduce your
cybersecurity risks.

• Encrypt Your Data and Create Backups: Make sure all your sensitive data is encrypted. Saving your data in normal-text format only makes
it easy for hackers to access. Data encryption, on the other hand, limits data access to parties that have the encryption key. It also
ensures that even when unauthorized parties gain access to the data, they can't read it. Some data encryption software even lets
you know when other people try to alter or tamper with the information.
• You should also conduct regular backups for your important information. Sometimes cybersecurity breaches can result in data loss.
When this happens, and you don't have a reliable and secure backup, it could result in operational disruptions that could cause
your organization a lot of lost revenue. One of the most effective data backup strategies is the 3-2-1 rule. Based on this strategy,
you should have at least 3 copies of your data stored. 2 of them should be stored on different media, and one should be in an offsite
location.
• Conduct Regular Employee Training : One of the common ways malicious hackers gain access to your database is through phishing
emails sent to your employees. In fact, statistics show that over 3.4 billion phishing emails are sent globally. These emails contain
malicious malware in the form of links that give hackers access to user data, including login credentials. Phishing emails are often
hard to detect as they seem legitimate. For instance, a hacker may send an email impersonating leaders in the organization asking
for personal details. Without proper training, the employee may end up divulging this information. This is why it's vital that you
conduct cybersecurity awareness training. Let your employees know of the main forms of cybersecurity attacks and the best ways
to prevent them.
• Keep Your Systems and Software Updated: Software and system updates highly impact your cyber security and digital safety. This is
because they not only add new features but also fix bugs and help patch security flaws and vulnerabilities that can be exploited.
Malicious hackers write code that they use to exploit the vulnerabilities. Most of the time, this code is packaged in the form of
malware which can affect your entire system. So, make sure you use a patch management system to automatically manage all
updates and uphold information security.
• Use Strong Password: Here's an interesting fact; over 80% of organizational data breaches result from weak passwords. Hackers don't
need much to gain access to your systems. They only require a small gap, and they'll exploit it fully. Password cracking technology
has greatly advanced, and simple passwords don't cut it anymore. Instead, you need to use complex passwords and deploy multi-
factor authentication strategies to discourage cybercrime in your organization. You should also discourage password sharing among
employees so that even if one desktop is hacked, the rest remain secure.
• Assess and Monitor Your Vendors: Chances are that your cyber security is highly dependent on third-party vendors, which is why you can’t
afford to ignore vendor risk management. This will help you mitigate third-party risk instead of solely relying on incident response.
Your main focus should be on:
• Cybersecurity risk: onboard vendors using the right strategies and monitor them throughout your relationship.
• Legal, regulatory, and compliance risk: ascertain that the vendor will not impact your compliance with regulations, agreements,
and local legislation.
• Operational risk: if the vendor is a critical aspect of your organization, ensure that they won't disrupt your operations.
• Strategic risk: ensure the vendor will not impact your ability to meet your organizational objectives.
• Reduce Your Attack Surface: Your attack surfaces are the vulnerabilities or entry points that malicious hackers can use to access
sensitive data. They could be anything like IoT, software, web application systems, and even employees that are often susceptible
to social engineering attacks such as whaling and phishing.
• Pay Close Attention to Physical Security: Most organizational cyber risk management policies focus on the digital aspect of cyber risks and
entirely neglect their physical premises. Conduct a security assessment and determine whether your critical infrastructure is safe
from security breaches. You should also analyze your data protection policy and decide whether or not it has data disposal
strategies. Think of a scenario where your online systems are safe from cybercriminals, but you experience a breach because
someone broke into your offices and rummaged through your file cabinets. That would be tragic! There are even other instances
where janitors go through the garbage and obtain customer and employee personal information. If you have any restricted areas,
make sure they are protected using high-value systems. You should also use 2-factor authentication such as keycards
and biometrics. This way, even if the keycard is lost or stolen, no one will be able to access the area.
• Install Firewalls: Cyber security threats are becoming more sophisticated, and everyday hackers come up with new ways of accessing
data. So, you should defend your networks from cyber attacks by installing firewalls. A reliable system will effectively protect you
from brute attacks or prevent security incidents from causing irreversible damage.
In addition to this, firewalls monitor your network traffic to identify any suspicious activity that could compromise your data integrity.
They also prevent complex spyware from gaining access to your systems and promote data privacy.
• Create A Secure Cybersecurity Policy: Your organization's cybersecurity is highly influenced by the policies that you have in place. Do you
have guidelines for data breach prevention and detection? How often do your IT teams conduct risk assessments or penetration
testing? It all starts with your guidelines!

Go through your existing policies and identify any loopholes they may have. Some of the guidelines you should have in place include;
• Disaster recovery: If a breach occurs, a disaster recovery plan ensures that your employee and IT teams know the next course of
action. It's aimed at reducing the amount of time that you are offline, thereby ensuring that your operations resume as soon as
possible.
• Access control/management: this policy highlights the parties that can access sensitive information, reducing the risk of
unauthorized access. Data mishandling has both financial and legal consequences, so make sure your access management policy
specifies which stakeholders are allowed access to what and under which circumstances they can share this information.
• Security testing: the policy should state the frequency of your cybersecurity tests. This allows you to uncover vulnerabilities before
it’s too late. Some of the security tests that you should conduct include; vulnerability scanning, security posture assessment,
penetration testing, ethical hacking, cybersecurity assessments, etc.
• Incident response plan: this is documentation of the steps and procedures that should be implemented in case of a breach. It also
highlights the responsibility of key information security players and reduces your organization's response time.
“This is the digital world”. Justify the statement and what are the different digital technologies
help in the current business development.

Digital world means connected by the help of digital devices, media or we can say digital marketing services that are available to everyone
at any time. It is the world full of ideas, opinions, learning and opportunities. Only because of the Internet has made it possible for all of
us to connect whenever we consider it necessary. There are many methods in which we take the benefit of the digital world, because of
the digital world people run worldwide online business, it has enhanced communication. Technology has also enhanced teaching and
learning. . We need to look at our daily lives or those of our who are very near to us (family and colleagues).
Internet has revolutionized the communication systems and put our world on fast track. The old days are gone where travelling far or
communicating with the people that not living near to us was not even a concept and the work place was near to the living area. Now,
due to the advances in technology, we have entered a world where we can work for a company that isn’t even based in our country,
where we can complete the tasks the are assigned to us by just being online, by these advances any one can do what he want to do e.g.
where everyone can be a film star, release a hit single or be a comedian reaching out to a global audience, and much more. This is just
the beginning , there are many more that lies in the digital world that the previous generation couldn’t even think about. Digital technology
has effects all around the globe.

Let us get into details of a few important determinants of the digital world:

Engagement: Now more than ever, technology has been important in helping us stay engaged with friends and family. Analogue
engagement refers to physical engagement such as talking to someone face to face. This has not been possible during the pandemic,
leading to an increase in digital engagement, which refers to virtual methods of engagement such as online messaging, phone calls and
video calls. Digital engagement lacks aspects such as proximity, body language, facial expressions, and tone of voice which prevents a
personal connection being established unlike analogue engagement. However, despite the lack of some of these aspects, without these
virtual methods, people would not have been able to communicate with their loved ones due to lockdown restrictions.

Data Security: The Internet of Things (IOT) describes the network of physical objects that are embedded with sensors, software, and
other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. Digital home
assistants (such as an Amazon echo) are internet-connected devices designed to make life easier for the user. These devices can carry
out tasks via voice control such as turning lights on or off, playing music or telling you the weather. This can have a positive impact on
users as it helps with everyday tasks. However, many people have concerns about these devices violating their privacy. These digital
assistants can record our conversations as well as our location via our smartphones, and they can use this data for machine learning to
improve themselves over time. Concerns about data security are valid concerns because these devices can be vulnerable to technical
failure, and can also be hacked remotely.

Online behaviour and freedom of speech: Freedom of speech is part of the Human Rights Act, which states that people have the
right to hold an opinion and they have the freedom to express these opinions. The internet provides a good platform for people to
express their opinions as well as educate others on important topics. For example in 2020, social media was used to support the Black
Lives Matter campaign and to raise awareness about how minority groups are treated. Without the internet, the world would not have
been made aware of the unjust treatment that led to George Floyd’s death, and justice would not have been served. Although racism is
still alive in the world today, the internet and the freedom to express your opinion has allowed users to educate themselves on the
subject, which is the first step to fighting it. However sometimes it can be difficult to find the balance between freedom to express and
freedom from abuse. Although freedom of speech is important, cyber bullying is not acceptable and the anonymity of the internet
provides an easy way for hate speech to take place.

These eight technologies have the greatest impact on business and society
• Digital assistants: Digital assistants are various types of software that are capable of performing rule-based work processes and
communicating with people through writing and speech. The digital assistants are represented by technologies such as the Robotics
Process Automation (RPA), chatbots and voice assistants.
• Internet of things: The Internet of Things (IoT) comprises objects, often electronics and sensors, that are identifiable and can
communicate with each other and exchange data via the Internet and cloud solutions. Third parties are also part of this network
from time to time, and can offer insights and services to users. IoT objects could be anything from a sensor that monitors a pump
at a manufacturing facility to the smartphone you use to unlock your car or house.
• Artificial intelligence (AI): AI (artificial intelligence) is a broad term that refers to a computer program’s or computer’s ability to appear
intelligent. AI usually has the ability to capture data about its environment and can learn or adapt in order to achieve a given goal.
In order to build an AI system that adds value, large volumes of data and an algorithm are used that are suitable for what the system
is intended to achieve. After consuming the data, the system can make decisions based on the knowledge it has built up.
• Virtual & augmented reality: Virtual reality (VR) is a technology that allows the user to interact in a computer-simulated recreation
of a real environment. Augmented reality (AR) is a fusion of VR where reality and a computer-simulated environment are merged,
which we have seen for example with Pokemon Go or with lenses in Snapchat. In industrial environments, AR is used in a similar
way to present drawings or status information for equipment that you are filming or looking at through glasses or a tablet/iPad.
• Blockchain: A blockchain is a distributed transactional database in which all the parties are always in possession of the same
information about the transactions. It is not possible to change information in the database unless the majority of participants agree
that the change complies with the rules defined for a transaction to be approved. A blockchain therefore makes it possible to carry
out transactions securely between multiple parties without the need for the transaction to be verified by a third party (such as a
bank). Blockchains establish trust between the parties in a network who will be interacting.
• 3D printing: 3D printing is a digitally-operated manufacturing technology in which physical objects are printed by a 3D printer based
on the specification of a digital 3D model. The manufacturing process is additive, which means that an object is produced layer by
layer rather than milling or turning a larger object down to the desired shape.
• Drones: A drone is an unmanned aircraft that can fly (or dive) autonomously using software or be remotely controlled by people.
For example, drones can be used for searching, surveillance and transportation.
• Robotics and automation: Automation of physical work duties is a growing trend within several sectors. This means that physical
robots and machines are increasingly taking over work duties previously carried out by human employees.
Artificial Intelligence plays a vital role in the different decision making process among the
Customer. Discuss the ways in which the AI is used.

The uncompromising competition of the business world forces 83% of companies to rely on the power of Artificial
Intelligence solutions. Artificial Intelligence (AI) includes not only the automation of many recurring processes
but goes further – it influences decision making.
By eliminating human errors and analyzing vast amounts of various data quickly and constantly, AI equips
businesses with a full range of information and provides structured solutions to arising issues.

Businesses tend to choose solutions empowered with big data, Artificial Intelligence, or Machine Learning more
and more often. Such solutions can aggregate data from various areas of the company’s operations, such as
finance, accounting, customer service, and more.
Professionals use this data to save costs, build growth strategies, streamline inner business processes, and
enhance decision making initiatives. Combined with the flexibility of cloud computing, AI facilitates management,
problem-solving, and strategic development.

So, when is it worth implementing technologies based on Artificial Intelligence? The answer is simple: when you
want specific processes in the company to be faster and more efficient and let qualified employees engage in
more creative tasks.

5 applications of AI in decision making


1. Decisions in business operations: Machine Learning algorithms come to the rescue in areas built on a
constant flow of heterogeneous data, whether it is several financial reports, payrolls, procurement, the
analysis of employee productivity, or predicting further churn rates. In short, AI takes over routine
administrative tasks and changes the whole way of working. It gives employees and executives more space
for making faster and relevant decisions.
2. Complex problem-solving: The potential of AI in decision making is robust, but you can solve multilayer and
complex problems, too. For this, you must remember that AI solutions depend on the data you have and the
step-by-step process orchestration.
3. Strategic changes: AI allows better planning of production, managing all restrictions, reducing shortcomings
in operations, and improving manufacturing. It also helps to anticipate and adequately plan product
customization, enhance postponement processes, and maintain efficiency with high levels of customer
satisfaction.
4. Customer-related decisions: AI can be valuable for customer service management, personalized customer
communication, evaluation of customer behavior, predicting consumer trends and patterns.
5. Performance assessment: Firstly, it relates to people’s performance evaluation and afterward decisions. The
employee performance review process is moving from every 6 or 12 months to ongoing. Despite this, the
integrity of the employee evaluation process can be undermined by human error and potential biases. AI is
capable of minimizing human errors and making employee performance data more transparent.

Artificial Intelligence adds to decision making a lot. It makes the process clearer, faster, and more data-driven.
Empowered with AI, you can make small decisions on the go, solve complex problems, initiate strategic
changes, evaluate risks, and assess your entire business performance.
What are the different stages in the decision making process in the organization?

Decision making is the process of making choices by identifying a decision, gathering information, and assessing
alternative resolutions.

Using a step-by-step decision-making process can help you make more deliberate, thoughtful decisions by
organizing relevant information and defining alternatives. This approach increases the chances that you will
choose the most satisfying alternative possible.

1. Identify the decision: To make a decision, you must first identify the problem you need to solve or the question
you need to answer. Clearly define your decision. If you misidentify the problem to solve, or if the problem you’ve
chosen is too broad, you’ll knock the decision train off the track before it even leaves the station.
If you need to achieve a specific goal from your decision, make it measurable and timely.

2. Gather relevant information: Once you have identified your decision, it’s time to gather the information relevant
to that choice. Do an internal assessment, seeing where your organization has succeeded and failed in areas
related to your decision. Also, seek information from external sources, including studies, market research, and,
in some cases, evaluation from paid consultants.

3. Identify the alternatives: With relevant information now at your fingertips, identify possible solutions to your
problem. There is usually more than one option to consider when trying to meet a goal. For example, if your
company is trying to gain more engagement on social media, your alternatives could include paid social
advertisements, a change in your organic social media strategy, or a combination of the two.

4. Weigh the evidence: Once you have identified multiple alternatives, weigh the evidence for or against said
alternatives. See what companies have done in the past to succeed in these areas, and take a good look at
your organization’s own wins and losses. Identify potential pitfalls for each of your alternatives, and weigh those
against the possible rewards.

5. Choose among alternatives: Here is the part of the decision-making process where you actually make the
decision. Hopefully, you’ve identified and clarified what decision needs to be made, gathered all relevant
information, and developed and considered the potential paths to take. You should be prepared to choose.

6. Take action: Once you’ve made your decision, act on it! Develop a plan to make your decision tangible and
achievable. Develop a project plan related to your decision, and then assign tasks to your team.

7. Review your decision: After a predetermined amount of time—which you defined in step one of the decision-
making process—take an honest look back at your decision. Did you solve the problem? Did you answer the
question? Did you meet your goals?
Discuss the various tools and technologies used for digital transformation of the Software
consultancy firm.

When digital transformation is discussed, technology is usually not far behind. Whether it’s Internet of Things (IoT),
cloud, or artificial intelligence (just to name a few), tech is changing how organizations around the world are doing
business. While there’s no question that technology goes hand-in-hand with digital transformation, there are other
essential considerations that must come first in a digital transformation strategy. These include identifying value-
driven business outcomes and developing a culture of change and collaboration.

8 Technology Tools for Digital Transformation


1. Mobile: Over the past two decades, mobile has irreversibly changed the world we live in. From increased
connectivity to powerful technology at-hand, mobile’s influence permeates our daily lives. In manufacturing
and industrial companies, there are myriad opportunities presented by mobile technologies – especially with
the coming capabilities of 5G. It’s no surprise that 81 percent of manufacturing CEOs see mobile as
strategically important.
Mobile, in many ways, is a foundational tool that enables other game-changing technologies. For example,
shop floor workers are using smartphones to view machine data points in augmented reality (AR), field service
technicians can get interactive, real-time guidance from experts at headquarters through AR to repair an
industrial asset, engineers are using their phones to review CAD designs on-the-fly, and global sales teams
are creating quotes for custom products leveraging up-to-date pricing and delivery dates.
2. Cloud: The manufacturing industry, especially discrete and process-oriented companies, have been
hesitant to adopt the cloud. There are diverse reasons for this hesitation from integration challenges with
legacy systems to security concerns to ensuring business continuity.
However, those concerns are fading with new advancements in the cloud technology and implementation.
A study earlier this year found that the manufacturing industry was on track to outpace the average adoption
of hybrid cloud by 2020. Leveraging the cloud is key component to most digital transformation initiatives as it
enables greater flexibility and agility across an organization, as well as faster scalability in many instances.
2. IoT: For manufacturers, Internet of Things technology is bringing unprecedented visibility into both products
and operations. By the end of this year (2019), 75 percent of large manufacturers will update their operations
with IoT and analytics-based situational awareness. These enterprise businesses are using industrial IoT
technology to gain a better understanding of their operations, from both a global and factory perspective. With
greater insights and analytics from IoT, manufacturers are achieving key digital transformation objectives,
such as increased efficiency, flexibility to respond more quickly to market and customer demands, and
innovation across their products and services.
3. Digital Twin: As one of Gartner’s Top 10 Strategic Technologies for 2019, digital twins have a key role to play
in digital transformation. Digital twins are digital models that virtually represent their physical counterparts.
They can represent products, processes, or tasks and can be leveraged to understand – and even predict –
the physical counterpart.
4. With digital twins, organizations have a clear visualization of their products or operations. (For a primer on
digital twins in the industrial enterprise, read our whitepaper.) As digital twins increase in fidelity, they can be
tailored to different roles and applications within an organization. Digital twins are made more powerful (and
impactful) with the increasing adoption of IoT, augmented reality, and digital thread through integration of
product lifecycle and design/engineering CAD data.
5. Robotics: According to 451 Research, one in four manufacturers are implementing smart robotics today,
and that will increase to one in three over the next two years. The use of robotics is expanding beyond
repetitive tasks to more analytics-based activities powered by complementary technologies like IoT, sensors,
and artificial intelligence. In terms of digital transformation, robotics has a key role to play in driving operational
efficiency and freeing up humans for higher-level tasks.
5. Artificial Intelligence & Machine Learning: Artificial intelligence (AI) is a burgeoning market: Within
manufacturing alone it’s expected to grow 17-fold over the next five years to roughly $17 billion in annual
global investment, according to Research and Markets.
6. Augmented Reality: AR enables more seamless connections between the physical, digital, and human worlds.
7. Jim Heppelmann, President and CEO of PTC, described augmented reality in this way: “AR is IoT for people.”
When frontline workers wear Microsoft HoloLens, they’re able to connect to their physical surroundings and
leverage all the power of data and analytics in the cloud. This enables them to have real-time information in
a highly visual format to complete a task.
8. Additive Manufacturing: Additive manufacturing (sometimes called 3D printing) is the process of building an
object one thin layer at a time. According to McKinsey, the additive manufacturing market will grow to $20
billion by next year, and skyrocket to $250 billion by 2025.

As industrial enterprises look for efficiencies, additive manufacturing has impacts across the value chain, not
just manufacturing. For example, if customers – or field operations – have the ability to “print” replacement
parts for a machine, this provides more efficient, seamless customer service, decreases downtime, and
lowers service costs. Creating the digital thread as a single source of truth enables this additive manufacturing
use case and unifies value chain functions.
Explain in detail the virtual world is augmented in the business world rather the manual world.

Slowly but steadily, the related technologies of Augmented Reality (AR) and Virtual Reality (VR) are moving
from the lab to the commercial space. They have started capturing the imagination of the general public and the
corporate world. Like any other emerging technology their perceived benefits are checkmated by legal,
technological and economic hurdles.
Virtual Reality: Refers to interactive simulated computer generated experience where in a user is cut off from
the real world and is immersed in the digital world mostly composed of artificial sounds and sights. At current
state of technologies, it requires a Head Mounted Display (HMD) and content changes with movement of eyes
as well as the body and the user can interact with the virtual world.
Augmented Reality: It appeared after Virtual Reality and here the real world is augmented by the digital world.
The user can observe his or her surroundings. It can be experienced using smartphones and tablets, besides
the HMDs. Due to users’ inhibitions to be completely cut off from the real world, it can generate more use cases
than Virtual Reality.
Mixed Reality: The term is of recent use and refers to an enhanced version of Augmented Reality. Mixed reality
augments the real world with virtual objects that aim to look as if they are really placed within the real world. It
carries more intelligence as it locks the position of digital objects in relation to the real objects. In future, it may
overshadow its other two cousins.

Benefits
Games: Many people associate AR/VR with gaming and that remains its important application. One popular
application of Augmented reality was demonstrated in the game Pokeman Go in 2016 where players targeted
to search for virtual creatures on their smartphones.
Training: Training of all types is the most important potential use of AR/VR. It could be high end training of
aircrafts, military and space environments; industrial training of manufacturing processes and equipments or
school and college level training. While former can reduce costs, interactive and immersive trainings can make
school and college curriculum more interesting
Tours: Travel industry can help the tourists to take virtual tours of the places they want to visit later. Google
StreetView is an example of an application which can help in this. Real Estate industry is using such tours to
provide immersive view of properties using Virtual Reality.
Retail experience: The experience of online shopping can be improved by AR/VR as users can view or even
try the product under the context it will be used say a piece of furniture inside their room. This is being used by
many companies including Swedish retail giant, IKEA. This can reduce marketing costs as well as returns.
AR/VR can also be used for more engaging and immersive advertisements and marketing campaigns.

Challenges
However there are multiple challenges to surmount before any of the Realty technologies are adapted on a large
scale.
HMDs: Currently, all Reality technologies suffer from form factor. All VR and some AR use cases need HMD
which are bulky and may need to be connected by wires to computers or gaming consoles. For example VR
HMDs e.g. HTC Vive, PlayStation VR and Oculus Rift need to be connected to a machine while standalone
ones e.g. Google Carboard exists but have smaller market share.
Networks: Faster Wireless communication is another requirement for AR/VR acceptance. The required speeds
is in Gbits/sec and cannot be provided by 4G networks, so deployment of 5G networks will be a key enabler.
Even in 5G the required speeds will be achieved at frequencies of few tens of GHzs.
Artificial Intelligence: Augmented Reality needs virtual world and the physical world match precisely and
change in real time according to user movement. Advanced image and video processing technologies based
on deep learning are needed to dynamically and accurately recognize walls, floors, tables and other objects.

Predictions
As per Gartner Hype cycle, both Augmented Reality and Virtual Reality will reach “Plateau of Productivity” in the
next 10 years implying mass adoption will take off. As per one of IDC’s report, worldwide spending on AR/VR
products and services will experience five-year compound annual growth rate (CAGR) of 98.8% during the 2017-
2021 forecast period. According Goldman Sachs’ base case scenario, AR/VR market will touch $80 billion in
2025 from less than $10 billion in 2017. The numbers vary based of what is included in the data i.e. hardware,
software or services but all forecasts point to exponential growth rates.
Business intelligence and database

Business Intelligence (BI) systems are used to improve an enterprise's decision making by combining tools for gathering,
storing, accessing, and analyzing business data. While traditional features for querying, reporting, and analytics have long
been the core focus of these tools, BI has evolved in recent years to become comprehensive, enterprise-wide platforms,
and newer trends, such as self-service BI, have helped to continue interest in this technology. BI is a combination of the
tools and systems involved in an enterprise's strategic planning that aid in its analysis.
While applicable to organizations of any size, business intelligence solutions are most relevant to industries with large
numbers of customers, high levels of competition (with the resultant need for differentiation), and large volumes of data.
Common business intelligence functions include, but are not limited to, the following:
• Analyzing sales trends.
• Tracking customer buying habits.
• Managing finances.
• Evaluating sales and marketing campaign effectiveness.
• Predicting market demand.
• Analyzing vendor relationships.
• Assessing staffing needs and performance.

Market Leaders: As with other aspects of the technology industry, the business intelligence market has long been segmented
into two major parts: standalone solutions and products that are part of larger, enterprise suites. However, that is changing
as enterprise vendors acquire the standalone ones. In the past couple of years, SAP acquired Business Objects, IBM
acquired Cognos, and Oracle acquired Hyperion.
• IBM Cognos: Cognos, around since the 1970s, entered the BI market in the 1990s. In late 2005, Cognos re-
architected its BI product and released Cognos 8 BI. The product includes reporting, analysis, scorecarding,
dashboards, business event management, data integration, and a strong searching feature. Cognos acquired
Applix, a well known vendor of performance analytics, in October 2007.
• Information Builders: Information Builders' BI product is called WebFOCUS. It uses Ajax technology, which
combines asynchronous JavaScript and XML. The latest release, WebFOCUS 8, was introduced in April 2010. It
fully integrates a Performance Management Framework (PMF) interface; includes a new BI Portal for developers to
build and deploy dashboard solutions; allows users to create portable BI applications; offers an Activity Monitor for
business activity monitoring (BAM) and the CEP Enable capability for complex event processing; and includes two
new advanced analytic components, Visual Discovery 8 for visual analytics and RStat 1.2 for predictive analytics.
The product will be generally available in the fourth quarter of 2010.
• Microsoft: Microsoft's BI product line comprises SQL Server 2008 R2 for data storage and management
(encompassing data mining, data warehousing, data quality, and ad-hoc analysis); SharePoint Server 2010 for
information delivery (encompassing dashboards, collaboration/search, managed reporting, visualization, and
scorecards); and Excel, along with SQL Server, for query, reporting, and analysis (encompassing ad-hoc analysis,
production reporting, and OLAP analysis). Microsoft released SharePoint Server 2010 and Office 2010 on May 12,
2010; however, both products were involved in a large beta program. By the time of the products' release, 8.6 million
people were already using Office 2010 and related products, and more than 1,000 partners were already building
solutions for the products.
• Oracle: Oracle's BI focus is based on its Business Intelligence Suite. This product line comprises Oracle BI Suite
Enterprise Edition Plus, Oracle BI Standard Edition One, and Oracle BI Oracle Publisher (formerly XML Publisher),
an enterprise reporting solution for authoring, managing, and delivering highly formatted documents. The Oracle BI
product line integrates the Oracle database with Fusion middleware and analytics software and also includes
analytics software originally from Siebel Systems, another Oracle acquisition. The product family works with both
Oracle and non-Oracle environments. Oracle took another step in the direction of BI supremacy with the acquisition
in March 2007 of Hyperion System 9 BI+. This product, originally called Hyperion Essbase (derived from Extended
SpreadSheet database), was developed by Arbor Software, which Hyperion acquired in 1998. Oracle has now
renamed it Oracle Essbase. The product includes reporting capabilities, dashboards, and an analysis feature that
also can be used in Microsoft Excel. Additionally, it combines its BI functionality with financial applications, making
it more of a Business Process Management (BPM) system than "just" BI.
• SAP: Business Objects was acquired by SAP in a "friendly takeover" completed in 2008. At its completion, SAP
announced the release of nine packages, combining solutions from both companies in various groupings that are
being sold by the sales departments of both companies as well. The packages fall into three categories: performance
optimization applications, including Financial Performance Management (FPM) and Governance, Risk, and
Compliance (GRC); business intelligence platform packages that include Visualization and Reporting, Enterprise
Query, Reporting, and Analysis, Data Integration and Data Quality Management, and Master Data Services; and
packages geared to small and midsized companies, including SAP Business All-in-One with BusinessObjects Edge
Standard, Crystal Reports Server, and BusinessObjects Edge Series, which now includes integration for SAP
Solutions. According to Gartner, the combination of SAP and Business Objects formed the largest installed base in
the market, with an estimated 46,000 customers. SAP has integrated PilotWorks with its own applications.
Additionally, the company continues to market another BI product line. SAP's Business Intelligence software
package is a component of the company's NetWeaver platform, which also includes an enterprise portal, tools for
integrating SAP software with barcode readers and Bluetooth devices, and data management software, as well as
tools for custom application development. The Business Intelligence component offers a full line of extraction,
analysis, and reporting tools with the capability to publish information to an intranet portal or mobile device.
Normalization in database

Normalization is the process of organizing data in a database. This includes creating tables and establishing
relationships between those tables according to rules designed both to protect the data and to make the
database more flexible by eliminating redundancy and inconsistent dependency.

Redundant data wastes disk space and creates maintenance problems. If data that exists in more than one
place must be changed, the data must be changed in exactly the same way in all locations. A customer address
change is much easier to implement if that data is stored only in the Customers table and nowhere else in the
database.

What is an "inconsistent dependency"? While it is intuitive for a user to look in the Customers table for the
address of a particular customer, it may not make sense to look there for the salary of the employee who calls
on that customer. The employee's salary is related to, or dependent on, the employee and thus should be
moved to the Employees table. Inconsistent dependencies can make data difficult to access because the path
to find the data may be missing or broken.

There are a few rules for database normalization. Each rule is called a "normal form." If the first rule is
observed, the database is said to be in "first normal form." If the first three rules are observed, the database is
considered to be in "third normal form." Although other levels of normalization are possible, third normal form
is considered the highest level necessary for most applications.

As with many formal rules and specifications, real world scenarios do not always allow for perfect compliance.
In general, normalization requires additional tables and some customers find this cumbersome. If you decide
to violate one of the first three rules of normalization, make sure that your application anticipates any problems
that could occur, such as redundant data and inconsistent dependencies.

First normal form:


• Eliminate repeating groups in individual tables.
• Create a separate table for each set of related data.
• Identify each set of related data with a primary key.
• Do not use multiple fields in a single table to store similar data. For example, to track an inventory item
that may come from two possible sources, an inventory record may contain fields for Vendor Code 1
and Vendor Code 2.

Second normal form


• Create separate tables for sets of values that apply to multiple records.
• Relate these tables with a foreign key.
Records should not depend on anything other than a table's primary key (a compound key, if necessary). For
example, consider a customer's address in an accounting system. The address is needed by the Customers
table, but also by the Orders, Shipping, Invoices, Accounts Receivable, and Collections tables. Instead of
storing the customer's address as a separate entry in each of these tables, store it in one place, either in the
Customers table or in a separate Addresses table.

Third normal form


• Eliminate fields that do not depend on the key.
Values in a record that are not part of that record's key do not belong in the table. In general, anytime the
contents of a group of fields may apply to more than a single record in the table, consider placing those fields
in a separate table.

Normalization example:
Data warehouse and data mart

A Data Warehouse collects and manages data from varied sources to provide meaningful business insights.
It is a collection of data which is separate from the operational systems and supports the decision making of the company.
In Data Warehouse data is stored from a historical perspective.
The data in the warehouse is extracted from multiple functional units. It is checked, cleansed and then integrated with
Data warehouse system. Data warehouse used a very fast computer system having large storage capacity. This tool can
answer any complex queries relating data.

A data mart is a simple form of a Data Warehouse. It is focused on a single subject. Data Mart draws data from only a
few sources. These sources may be central Data warehouse, internal operational systems, or external data sources.

A Data Mart is an index and extraction system. It is an important subset of a data warehouse. It is subject-oriented, and
it is designed to meet the needs of a specific group of users. When compared Data Mart vs Data Warehouse, Data marts
are fast and easy to use, as they make use of small amounts of data.

Differences between Data Warehouse and Data Mart


Here is the main difference between Data Mart and Data Warehouse:
Parameter Data Warehouse Data Mart
A Data Warehouse is a large repository of A data mart is an only subtype of a Data
Definition data collected from different organizations or Warehouse. It is designed to meet the need of a
departments within a corporation. certain user group.

Usage It helps to take a strategic decision. It helps to take tactical decisions for the business.

The main objective of Data Warehouse is to


provide an integrated environment and A data mart mostly used in a business division at
Objective
coherent picture of the business at a point in the department level.
time.
The designing process of Data Warehouse is
Designing The designing process of Data Mart is easy.
quite difficult.
May or may not use in a dimensional model. It is built focused on a dimensional model using a
However, it can feed dimensional models. start schema.
Data warehousing includes large area of the
Data marts are easy to use, design and implement
Data Handling corporation which is why it takes a long time
as it can only handle small amounts of data.
to process it.
Data warehousing is broadly focused all the
Data Mart is subject-oriented, and it is used at a
Focus departments. It is possible that it can even
department level.
represent the entire company.
The data stored inside the Data Warehouse
Data Marts are built for particular user groups.
Data type are always detailed when compared with data
Therefore, data short and limited.
mart.
The main objective of Data Warehouse is to
provide an integrated environment and Mostly hold only one subject area- for example,
Subject-area
coherent picture of the business at a point in Sales figure.
time.
Dimensional modeling and star schema design
Designed to store enterprise-wide decision
Data storing employed for optimizing the performance of access
data, not just marketing data.
layer.
Time variance and non-volatile design are Mostly includes consolidation data structures to
Data type
strictly enforced. meet subject area’s query and reporting needs.
Transaction data regardless of grain fed directly
Data value Read-Only from the end-users standpoint.
from the Data Warehouse.
Data mart contains data, of a specific department
Data warehousing is more helpful as it can of a company. There are maybe separate data
Scope
bring information from any department. marts for sales, finance, marketing, etc. Has limited
usage
In Data Warehouse Data comes from many
Source In Data Mart data comes from very few sources.
sources.
The size of the Data Warehouse may range
Size The Size of Data Mart is less than 100 GB.
from 100 GB to 1 TB+.
The implementation process of Data
Implementation The implementation process of Data Mart is
Warehouse can be extended from months to
time restricted to few months.
years.
OLTP in data warehouse

OLTP (Online Transactional Processing) is a type of data processing that executes transaction-focused tasks. It involves
inserting, deleting, or updating small quantities of database data. It is often used for financial transactions, order entry,
retail sales and CRM.

While these databases have scaled significantly, they still present many limitations. They perform small but numerous
transactions that can result in large data sets. However, pulling insights from these data sets requires accumulating,
synthesizing, and then analyzing the large volume of data. OLTP was built to collect voluminous data transactions but not
necessarily to analyze that data in the aggregate.

One of the drivers behind the data warehouse was to provide a better way to gain actionable intelligence from large
quantities of small, fractured data sets. The data warehouse stores a copy of the data residing in OLTP databases, along
with larger sets of Internet and cloud-born data, allowing query access to comprehensive enterprise data from one
location, no matter how large or small the set.

For example: POS (point of sale) system of any supermarket is a OLTP System.

Every industry in today’s world use OLTP system to record their transactional data. The main concern of OLTP systems
is to enter, store and retrieve the data. They covers all day to day operations such as purchasing, manufacturing, payroll,
accounting, etc.of an organization.

Some other examples of OLTP systems include order entry, retail sales, and financial transaction systems.
Advantages of an OLTP System:
• OLTP Systems are user friendly and can be used by anyone having basic understanding
• It allows its user to perform operations like read, write and delete data quickly.
• It responds to its user actions immediately as it can process query very quickly.
• This systems are original source of the data.
• It helps to administrate and run fundamental business tasks
• It helps in widening customer base of an organization by simplifying individual processes

The main characteristics of an online transaction processing system are the following:
• ACID compliance: OLTP systems must ensure that the entire transaction is recorded correctly. A transaction is
usually an execution of a program that may require the execution of multiple steps or operations. It may be complete
when all parties involved acknowledge the transaction, or when the product/service is delivered, or when a certain
number of updates are made to the specific tables in the database. A transaction is recorded correctly only if all
the steps involved are executed and recorded. If there is any error in any one of the steps, the entire transaction
must be aborted and all the steps must be deleted from the system. Thus OLTP systems must comply with atomic,
consistent, isolated, and durable (ACID) properties to ensure the accuracy of the data in the system.
o Atomic: Atomicity controls guarantee that all the steps in a transaction are completed successfully as
a group. That is, if any steps between the transactions fail, all other steps must also fail or be reverted.
o Consistent: The transaction preserves the internal consistency of the database. If you execute the
transaction all by itself on a database that’s initially consistent, then when the transaction finishes
executing the database is again consistent.
o Isolated: The transaction executes as if it were running alone, with no other transactions. That is, the
effect of running a set of transactions is the same as running them one at a time. This behavior is
called serializability and is usually implemented by locking the specific rows in the table.
o Durable: The transaction’s results will not be lost in a failure.
• Concurrency: OLTP systems can have enormously large user populations, with many users trying to access the
same data at the same time. The system must ensure that all these users trying to read or write into the system
can do so concurrently. Concurrency controls guarantee that two users accessing the same data in the database
system at the same time will not be able to change that data, or that one user has to wait until the other user has
finished processing before changing that piece of data.
• Scale: OLTP systems must be able to scale up and down instantly to manage the transaction volume in real time
and execute transactions concurrently, irrespective of the number of users trying to access the system.
• Availability: An OLTP system must be always available and always ready to accept transactions. Loss of a
transaction can lead to loss of revenue or may have legal implications. Because transactions can be executed from
anywhere in the world and at any time, the system must be available 24/7.
• High throughput and short response time: OLTP systems require nanosecond or even shorter response times
to keep enterprise users productive and to meet the growing expectations of customers.
• Reliability: OLTP systems typically read and manipulate highly selective, small amounts of data. It is paramount
that at any given point of time the data in the database is reliable and trustworthy for the users and applications
accessing that data.
• Security: Because these systems store highly sensitive customer transaction data, data security is critical. Any
breach can be very costly for the company.
• Recoverability: OLTP systems must have the ability to recover in case of any hardware or software failure.
Types of information system and their differences

An information system is a group of data sets that ensures that business operates smoothly, embracing
change, and helping companies achieve their goal. The dictionary defines an information system as a
computer system or set of components for collecting, creating, storing, processing and distributing
information. The information system is incomplete without the support of information technology (IT)
systems.

Types Of Information Systems?


1. Knowledge Work System: There are different knowledge management systems that an organization
implements to ensure a continuous flow of new and updated knowledge into the company and its processes. A
knowledge work system (KWS) is one of the knowledge management systems that ease the integration of new
information or knowledge into the business process.
Furthermore, KWS also offers support and resources to various knowledge creation techniques, artificial
intelligence applications, and group collaboration systems for knowledge sharing, among others. It also uses
graphics, visuals, etc., to disseminate new information. Below are some of the applications that work on the core
fundamentals of KWS.
• Designers often use computer-aided design systems (CAD) to automate their design process.
• Financial workstations are used to analyze huge amounts of financial data with the help of new technologies.
• Virtual reality systems are found in the scientific, education, and business fields for using graphics and
different systems to present data.
2. Management Information System: The management information system provides aid to managers by
automating different processes that were initially done manually. Business activities like business performance
tracking and analysis, making business decisions, making a business plan, and defining workflow. It also
provides feedback to the managers by analyzing the roles and responsibilities.
A management information system is considered a significant application that helps managers immensely. Here
are some of the advantages of the information system:
• It enhances the efficiency and productivity of the company
• It provides a clear picture of the organization’s performance
• It adds value to the existing products, introduces innovation and improves product development
• It assists in communication and planning for business processes
• It helps the organization provide a competitive advantage
3. Decision Support System
A decision support system is an information system that analyses business data and other information related
to the enterprise to offer automation in decision-making or problem-solving. A manager uses it in times of
adversities arising during the operation of the business. Generally, the decision support system is used to
collect information regarding revenue, sales figures or inventory. It is used across different industries, and the
decision support system is a popular information system.
4. Office Automation System
An office automation system is an information system that automates different administrative processes like
documenting, recording data, and office transactions, among others. The office automation system is divided
into managerial and clerical activities. Here are some of the business activities that are done under this type of
information system:
• Email
• Voice mail
• Word processing
5. Transaction Processing System
The transaction processing system automates the transaction collection, modification, and retrieval process.
The peculiar characteristic of this type of information system is that it increases the performance, reliability and
consistency of business transactions. It helps businesses perform daily operations smoothly without hassle.
Once you are well-versed with different types of information systems, understanding the application of these
systems becomes easy to comprehend. Therefore, in the last part of the article, we will look into applying
information systems.
6. Executive Support System
An Executive Support System or ESS helps top-level executives to plan and control workflow and make
business decisions. It is very similar to Management Information System or MIS.
Here are some of the unique characteristics of ESS:
• It provides great telecommunication, better computing capabilities, and effective display options to
executives.
• It enables them with information through static reports, graphs, and textual information on demand.
• It helps monitor performances, track competitors’ strategies, and forecast future trends, among others.
Information Security, vulnerabilities, firewall, authentication

Information Security is not only about securing information from unauthorized access. Information Security
is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification,
inspection, recording or destruction of information. Information can be physical or electronic one. Information
can be anything like Your details or we can say your profile on social media, your data in mobile phone, your
biometrics etc. Thus Information Security spans so many research areas like Cryptography, Mobile
Computing, Cyber Forensics, Online Social Media etc.

The ever-expanding digital footprint of modern organizations continually exposes software vulnerabilities
and presents threat actors with an expanding attack surface. The larger the target, the harder it is to miss.

Vulnerability Management Best Practices


o Conduct Real-Time Surface Discovery: Unmanaged assets like endpoints, mobile devices, IoT devices,
and Software-as-a-Service (SaaS) applications are a significant risk to organizations. Research by
DoControl identified that up to 40% of SaaS data access is unmanaged. As such, for an organization
to identify its entire attack surface, it is paramount to start with being able to locate all its assets, to
begin with. Simply speaking, you can’t protect what you don’t know exists. To aid this effort, modern
vulnerability management solutions combine asset discovery capabilities by leveraging managed
assets as beacons to discover unmanaged assets in an environment.
o Use Continuous Vulnerability Assessment: With the sheer volume of vulnerabilities, the traditional
approach of bringing in a 3rd-party consultant for a periodic risk assessment has become obsolete.
Today, technology can be leveraged to perform continuous and real-time vulnerability detection and
analysis. Modern vulnerability management solutions do that by leveraging cloud processing power
and Artificial Intelligence (AI) to simulate often what traditional periodic and manual risk assessments
would do in real-time. These solutions start with continuously scanning all assets based on vendor and
industry best practices like CIS benchmarks. Essentially, the solution is validating the current state
against configuration baselines and best practices.
o Leverage Security Posture Management: Naturally, after identifying the risk and exposure to
vulnerabilities, the next step is determining how an organization can reduce the exposed risk. In this
case, organizations are essentially looking to understand how they can remediate the issue.
o Adopt Automatic Work Prioritization: While the previous step is focused on automatically identifying the
remediation requirements, the step of automatic work prioritization helps provide the bigger picture.
o Use firewalls: Firewalls, especially Next Generation Firewalls, focus on blocking malware and
application-layer attacks. Along with an integrated intrusion prevention system (IPS), these Next
Generation Firewalls are able to react quickly and seamlessly to detect and combat attacks across the
whole network. Firewalls can act on previously set policies to better protect your network and can carry
out quick assessments to detect invasive or suspicious activity, such as malware, and shut it down.
• Authentication: Authentication is used by a server when the server needs to know exactly who is
accessing their information or site. Authentication is used by a client when the client needs to know
that the server is system it claims to be. In authentication, the user or computer has to prove its identity
to the server or client. Usually, authentication by a server entails the use of a user name and password.
Other ways to authenticate can be through cards, retina scans, voice recognition, and fingerprints.

Managing risk is an ongoing task, and its success will come down to how well risks are assessed, plans are
communicated, and roles are upheld. Identifying the critical people, processes, and technology to help
address the steps above will create a solid foundation for a risk management strategy and program in your
organization, which can be developed further over time.
MCQ

Which is NOT a part of behavioral approach and technical approach? Technology Design

The performance of a system is optimized when both the technology and the Sociotechnical Approach
organization mutually adjust to one another until a satisfactory fit is obtained.
_____________ for middle management help with monitoring, controlling, Transaction Processing System
decision-making, and administrative activities.
______________ use to integrate business processes in manufacturing and
production, finance and accounting, sales and marketing, and human Management Information System
resources into a single software system.
___________ which are company websites that are accessible to authorized
vendors and suppliers and are often used to coordinate the movement of E-Business
supplies to the firm’s production apparatus.
The information of MIS comes from the boot _______ source. internal and external

Management information system usually NOT serves managers interested in Day-to-day


_______ results.
_______ is an important factor of a management information system. System

information technology is the combination of computer science and ______ Telecommunications

__________ is capable of taking decisions on its own. AI

_________ is the part of e-business that deals with the buying and selling of E-Commerce
goods and services over the Internet.
Publish and rapidly access knowledge; discuss opinions and experiences? Blogs and Wikis

Real-time information streams, status updates, and announcements from Feeds and Notifications
designated individuals and groups.
____________ system provide information to coordinate all of the business
processes that deal with customers in sales, marketing, and service to Customer Relationship Management
optimize revenue, customer satisfaction, and customer retention.
___________ focuses on task or mission accomplishment and usually takes Collaboration
place in a business or other organization and between businesses.
Which of the following factor has helped spur the popularity of collaborative emergence of cloud networks
software for conferencing and workgroup support?
Yahoo's Exchange platform added
Point out the wrong statement: features to compete with Notes

Which of the following software enables real-time or near-real-time Collaborative


communication?
Which of the following is a central element of social networking site? All of the mentioned

Which of the following is not a social networking site? None of the mentioned

Information technology plays a critical role in helping organizations: perceive environmental change.

routines for producing goods and


All organizations become very efficient over time because individuals in the
firm develop: services.

The set of fundamental assumptions about what products the organization


should produce, how and where it should produce them, and for whom they Organisational Culture
should be produced is
In the early years, the information systems group was composed mostly of: Programmers

entity that grows larger because it can


conduct marketplace transactions
The transaction cost theory states that the organization is a(n): internally more cheaply than it can with
external firms in the marketplace

system that uses networks to link


people, assets, and ideas to create and
distribute products and services without
being limited to traditional organizational
boundaries or physical locations.
A virtual organization is a(n):
Knowledge and competence
In post-industrial societies, authority increasingly relied on:
where managers initiate activities,
handle disturbances, allocate resources,
and negotiate conflict.
According to the Mintzberg model of management, decisional roles are:
system of formal functions that include
planning, organizing, coordinating,
deciding, and controlling.
In the classical model of management, the firm is a(n):
system of management based on the
observation of what managers actually
do in their jobs.
The behavioral model focuses on the organization as a(n):

The principles and standards that guide our behavior toward other people are Ethics
called:

The situation in which one accepts the potential costs, duties, and obligations responsibility
for the decisions one makes is called:
The statement that if an action is not right for everyone to take it is not right the Categorical Imperative
for anyone to take is an expression of:
What records information about you during a Web surfing session such as
what Web sites you visited, how long you were there, what ads you looked at, Cookie
and what you purchased?
The statement that everything is owned by someone else, and that the the Ethical "no free lunch" rule
creator wants compensation for his work is an expression of:

Nanotechnology uses individual atoms and molecules to create computer 10,000 times thinner than a human hair
chips and other devices that are:
Windows
The operating system that dominates the client marketplace is:

Older transaction processing systems created for mainframe computers that Legacy systems
continue to be used to avoid the high cost of replacement are known as:
Java was created by a community of
several hundred thousand programmers
around the world
Which of the following statements about Java is not true?

The connecting of geographically


remote computers into a single network
to create a virtual supercomputer
Grid computing is best described as:
Generalized categories of data on which we store and maintain information in entity
a database is called a(n):
entity-relationship diagram
You use a ________ to clarify table relationships in a relational database.
data definition language
A DBMS capability that specifies the structure of its database content is
Which of the following helps develop knowledge about competitors and Business intelligence
change decision-making behavior?

data quality audit


Analysis of data quality often begins with a(n):

The TCP/IP layer that is responsible for providing the communication and Transport layer
packet services is the:
Train
Which of the following is not a local area network (LAN) topology?
What tells the browser software exactly where to look for the information URL (Uniform Resource Locator)
being requested?
RFID systems transmit radio signals
Which of the following statements about radio frequency identification (RFID) over long distances
is not true?
The method of slicing digital messages into parcels, sending them along
different communication paths, and then reassembling them after they arrive Packet switching
at their destination is called:
__________ are methods, policies, and organizational procedures that
ensure the safety of the organization's assets, the accuracy and reliability of Controls
its records, and operational adherence to management standards.
______________ involves redirecting a web link to an address different from
the intended one, with the site masquerading as the intended destination. Spoofing

____________ involves setting up fake websites or sending email messages


that look like those of legitimate businesses to ask users for confidential Phishing
personal data.
Information systems controls are both manual and automated and consist of Software Control
general and application controls. Which is NOT a part of General Controls?

____________________ prevents, detects, and removes malware, including Anti-Malware Software


computer viruses, computer worms, Trojan horses, spyware, and adware.
Translating
Social marketing means all things social: EXCEPT
_______________ meaning that it is available just about everywhere all the Ubiquity
time.
___________ refers to the ability of consumers to discover the actual costs Cost transparency
merchants pay for products.
Question 4 options:

The removal of organizations or business process layers responsible for Disintermediation


intermediary steps in a value chain is called ________________.
Advertising
Netflix, Amazon, Hotstar is an example of ___________ revenue model.
Websites send visitors to other websites in return for a referral fee or
percentage of the revenue from any resulting sales. This is known as Affiliate revenue model
_________________.
Effective, targeted marketing tool with interactive and rich media potential as
well as Sales Oriented. Which is the correct Marketing Format for this Email
description?
______________ enables the computer-to-computer exchange between two
organizations of standard transactions such as invoices, bills of lading, Electronic Data Interchange (EDI)
shipment schedules, or purchase orders.
A stream of photos and events in the past that create a personal history for
users, one that can be shared with friends. Which is the correct Social Social sign-on
Commerce feature for this description?
_______________ typically consist of a large firm using a secure website to
link to its suppliers and other key business partners
Private Industrial Networks

Geoscience
Which is NOT a Location-based services?
Website
Which is not a platform for Social Media
Social Media platform
Identify appropriate social platforms and content for products and services
Display Ads
As of 2018, which Online ad spending by format has the maximum revenue
All the above
On-demand business example is?
______________ is thought to be the collective and individual experience of Wisdom
applying knowledge to the solution of problems.
_______________ involves identifying and exploring various solutions to the Intelligence
problem.
Do data values fall within defined ranges? Is an Information quality dimension Integrity
of ____________?
________________use statistical analysis, data mining techniques, historical
data, and assumptions about future conditions to predict future trends and Predictive Analytics
behavior patterns
Systems design, systems analysis, ,
conversion, testing, programming, and
The systems development process take place in sequential order. Select the production and maintenance
correct sequence.

You might also like