Professional Documents
Culture Documents
Sharlean Mayne-Lawson
SPECIFIC OBJECTIVES
In both cases, the ‘e’ stands for "electronic networks" and describes
the application of electronic network technology - including Internet
and electronic data.
E- Commerce involves new business models and the potential to gain new
revenue or lose some existing revenue to new competitors.
It includes:
Electronic data
Email
Electronic fund transfer
Digital libraries
interchange (EDI) – to improve and change business processes
DISTINGUISH BETWEEN E-COMMERCE AND E-BUSINESS
More efficient business operations namely document templates and the digital
filing system
Instant communication and the sharing of information through emails and video
conferencing
The use of software to collect and interpret data
speed and time is saved in the use of information for many things
easier storage
Automation
Customer relationship management software records customers information: buying
history, follow up on complaints
IDENTIFY WAYS IN WHICH ICT CAN BE USED TO IMPROVE
EFFICIENCY OF BUSINESS OPERATIONS
Security
Privacy
Intellectual property infringement
Impact on humans
Distraction
CONSEQUENCES OF UNETHICAL USE OF ICT
SECURITY
Cyber crime can take many forms. These are:
Unauthorized access to data- malicious computer hackers cam gain
unauthorized access to data. When sensitive client/business information is
obtain, this is stolen, exploited and sold for money
Stealing credit card numbers and banking fraud- to engage in online banking,
diverting funds and purchase items with stolen information
CONSEQUENCES OF UNETHICAL USE OF ICT
SECURITY
Skimming- the card is used at an ATM or point of sale location and the data is
captured. The cardholders’ funds are then used
Phishing attacks- Links and emails are clicked leading to harmful websites.
Personal and financial data is then obtained. The device can also be infected with
virus
Privacy
The major consequences are:
Customers’ information are made public and often mis-used
PRIVACY
Privacy may be affected in the following ways:
COOKIES-Commercial websites use cookies to collect persons information and
use that information to recommend products/offers to customers. Users can
agree to continue browsing or not
Impact on humans
increases unemployment as It reduces the need for many types of labour
Creation of jobs: example network managers, web designers, system analysts, etc
Training of persons and keeping them up to date on the net ICT changes and
developments
Working from home- Many business offer this option example, during COVID
CONSEQUENCES OF UNETHICAL USE OF ICT
Fake news and cyber bullying on many occasions are spreading with the use of
ICT
Health issues through the prolonged use of the computer (neck, back and
shoulder pains, headache, eyestrain) which can lead to loss in productivity
Distraction- Employees are able to access thee internet for personal use at any
time. Iy can be a distraction to employees in working hours which can lead to
loss in productivity
Accidents can occur – example, use of the cellphones while driving
Employees may receive verbal and written warnings and be eventually
dismissed if they frequently mis0use computers and other ICT devices during
work
Technology has enabled businesses to track their inventory, optimize their
logistics, and improve the efficiency of their supply chains, leading to reduced
costs and improved customer satisfaction.
Companies like Airbnb and Uber have leveraged technology to create new
business models that challenge established players in these industries. These
disruptive business models have not only created new opportunities for
businesses but also changed the way customers consume products and services.
However, with the rise of technology and innovation, international businesses also face
several challenges. One of the most significant challenges is the threat of cybercrime. As
businesses become more dependent on digital technologies, they become more vulnerable
to cyber-attacks.
These attacks can lead to data breaches, financial losses, and damage to a business's
reputation. Therefore, businesses need to invest in cybersecurity to protect their data and
systems from cyber threats.
Another challenge that businesses face is the need to adapt to changing regulations and
policies across different countries. International business involves complying with
different legal and regulatory frameworks in various countries, which can be complex and
time-consuming. Companies must ensure that they comply with local laws and regulations
to avoid legal and financial penalties