IT industries new opportunities and new threat.pptx

ManojkumarAyyappan 47 views 15 slides Jul 23, 2024
Slide 1
Slide 1 of 15
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15

About This Presentation

IT industries new opportunities


Slide Content

IT INDUSTRIES NEW OPPORTUNITIES AND NEW THREAT

OPPORTUNITIES INFORMATION SYSTEMS TO SUPPORT BUSINESS TRANSACTION PROCESSING SYSTEM MANAGEMENT INFORMATION SYSTEM ACCOUNTING AND FINANCE SYSTEMS MARKETING AND SALES SYSTEMS CUSTOMER RELATIONSHIP MANAGEMENT SYSTEMS TELEMARKETING INTERORGANIZATIONAL INFORMATION SYSTEM QUALITY MANAGEMENT GEOGRAPHIC INFORMATION SYSTEM GLOBALIZATION COMMUNICATION ARTIFICIAL INTELLIGENCE AND INTELLIGENT SYSTEM BRIDGING THE CULTURAL GAPS

TRANSACTION PROCESSING SYSTEM (TPS) TPS deals with the repetitive processes of organisations such as order fulfilment and payroll The objectives of TPS are to increase the efficiency and effectiveness of the core business process,to reduce corporate cost, and to increase customer service

MANAGEMENT INFORMATION SYSTEM (MIS) The major role of MIS is to provide information to managers in the functional areas Information from purchase of raw material to hiring of employees, to paying of bills,sale of products comes into MIS mainly from TPS

CUSTOMER RELATIONSHIP MANAGEMENT (CRM) Facilitate help desk activities through intelligent agents for answering FAQs Monitoring customer order through intranet using workflow monitoring software Chat rooms for customers discussion

TELEMARKETING This is a process that uses telecommunication and information systems to execute a marketing program In telemarketing major activities such as advertising and reaching customers, order processing, customer service, sales support and account management are supported by IT

INTERORGANIZATIONAL INFORMATION SYSTEM (IOS) It is used in efficient processing of transaction IOSs utilises value added network for telecommunication which is a private third party network that can be tailored to specific business need The most prominent IOS are global systems, electronic data interchange, electronic fund transfer etc.

QUALITY MANAGEMET IT can be used to develop new products or processes or to improve existing products and proesses Relevance of IT to an organization depends upon the information intensity of processes and the information content of the products.

GEOGRAPHIC INFORMATION SYSTEMS (GIS) GIS provides methods to integrate and analyse digital map based spatial information With digital map it is possible to capture, store, analyze, manage, and present data that are linked to location

COMMUNICATION Emails are much faster and easier Technological advancements like Voice over Internet Protocol (VoIP) allow people to hold conferences across countries. Surgery with the help of surgeons residing in some other country through communication

ARTIFICIAL INTELLIGENCE AND INTELLIGENT SYSTEM Weather forecasting Employee training Automated machines in large scale idustries Various functions in spaceship Crime fighting through electronic imaging etc.

THREATS UNEMPLOYMENT PRIVACY LACK OF JOB SECURITY DOMINANT CULTURE SUPPLY CHAIN FRAUD CYBER CRIME

CYBER ETHICS - DOs USE THE INTERNET TO COMMUNICATE AND INTERACT WITH OTHER PEOPLE USE THE INTERNET FOR RESEARCH AND INFORMATION SHOP, BANK AND PAY BILLS ONLINE USE THE INTERNET TO EXPAND YOUR SOCIAL AND BUSINESS NETWORKS

CYBER ETHICS – DON’Ts DON’T BE A CYBER BULLY DON’T ENCOURAGE CYBER BULLIES DON’T USE DOWNLOAD OR SHARE COPYRIGHTED INFORMATION AS YOUR OWN DON’T SHARE PERSONAL INFORMATION TOO EASILY DON’T LIE

CYBER CRIMES HACKING CHILD PORNOGRAPHY CYBER STALKING DENIAL OF SERVICE ATTACK VIRUS DISSEMINATION SOFTWARE PIRACY CREDIT CARD FRAUD AND SALAMI ATTACK NET EXTORTION PHISHING DATA DIDDLING FINANCIAL CRIMES E MAIL BOMBING INTELLECTUAL PROPERTY CRIME CYBER DEFAMATION WEB JACKING
Tags