You are on page 1of 12

Business Communication

(2nd Class)
Global Village
• Born in 1911 ,in Canada Marshall McLuhan was the first to propound the
concept of Global Village in 1960.(The Gutenberg Galaxy)

• A phenomenon of the world’s culture shrinking and expanding at the


same time due to pervasive technological advances that allow for
instantaneous sharing of culture. (Cultural Globalisation)
• McLuhan's concept was based on the idea that culture would move
toward greater personal interaction, after leaving behind early eras of
humanity, focused on the spoken and written word.
• McLuhan's belief was that the world was entering a fourth ''age'' he called
the electronic age
IMPORTANCE OF TECHNOLOGY IN BUSINESS

• Technology driven transformation: Technology to redefine


services at lower costs. Eg. Paperless transactions, voice
communication, data transfer.

• Technology has found applications in:


Back office operations, data mgmt and analysis, services and
support.
TECNOLOGICAL TOOLS
• BOOK READER: Text to Audio document. Scans books and other documents , then applies character
recognition and text to speech software to play it back.

• CRM 2.0: Previously one dimensional tool, now much more interactive. Tools such as social networking
sites, blogs , community forums, provide inputs of all stakeholders ( inputs in design, research,
procurement, delivery)

• CLOUD COMPUTING: Shared infrastructure.

• SOCIAL MEDIA NETWORKING

• 24 X 7 CALL CENTRES

• WEB-BASED TECHNOLOGY: Enquiry and Order forms.

• ONLINE MARKETING

• VIDEO CONFERENCING.
Information Technology.

Application of technology to solve business or


organizational problems on a broad scale
Primary Pillars of IT

IT governance: Policies and processes that ensure IT


systems are effectively run and in alignment with the
organization’s needs.
IT operations: Daily work of an IT department. This
includes providing tech support, network maintenance,
security testing and device management duties.
Hardware and infrastructure: This focus area refers
to all the physical components of IT infrastructure. This pillar of
IT includes the setup and maintenance of equipment like routers,
servers, phone systems and individual devices like laptops.
The perfect IT
The perfect IT department is the one you aren’t even aware of.
(Andrey Prokopchuk, head of IT at Belitsoft)

This means that they are able to automate and create processes for many
of their daily tasks, so that the business continues to run smoothly. The
ideal IT department is also aligned with the business’s goals and
transparent in its processes in a way that the rest of the business can
understand and provide input on.
Importance of IT

Data overload: Businesses need to process huge amounts of data.


This requires large amounts of processing power, sophisticated
software and human analytical skills.
Mobile and wireless usages: More employers are offering remote
work options that require smartphones, tablets and laptops with
wireless hotspots and roaming ability.
Cloud services: Most businesses no longer operate their own “server
farms” to store massive amounts of data. Many businesses now work
with cloud services—third-party hosting platforms that maintain that
data.
Bandwidth for video hosting: Videoconferencing solutions have
become more and more popular, so more network bandwidth is
needed to support them sufficiently.
It and Privacy
• Social Media :

• Bigdata : Data mining


Covid Data?
IT as a tool to solve privacy concerns

•Design Methods:In this approach privacy has been a proactive step


rather than aftermath. This approach has made privacy as a
centered stage in all phases from initial design to final product.
•Privacy enhancing Technologies:
e.g. communication-anonymizing tool
•Cryptography: Homomorphic encryption plays an important role in
cloud computing companies providing a secure atmosphere for
privacy and data.
Contd.
• Identity Management:It is a means of authenticating and authorizing
individuals or groups to have access to their accounts or systems in an
organization through network. It plays critical role in any organization or
individual by protecting assets and information from unauthorized users
or attackers. (maintains hierarchy in access )
IT law in India
Cyber law encompasses laws relating to:
• Cyber crimes
• Electronic and digital signatures
• Intellectual property
• Data protection and privacy
The Information and Technology Act,(2000) explicitly provides the legal framework for the electronic
governance by giving identification to the electronic records and digital signatures, it also expressly defines
penalties for culprits after commitment of the cyber crime. It statutorily had also established a Cyber
Appellate Tribunal to resolve the disputes especially related to Cyber Crimes and Online Frauds .
• An amendment to the IT act was introduced in 2008 in two sections which address Data Protection aspects
to an extent, and also which gives rise to certain key considerations for the sector.
The sections under consideration are:
• Section 43A: Compensation for failure to protect data
• Section 72A: Punishment for disclosure of information in breach of lawful
contract

You might also like