This document contains the answer to a question about the most important tools and technologies for safeguarding information resources. It defines safeguarding information as protecting children from abuse, harm, and enabling the best outcomes. It then lists two key tools: campus border firewalls, which prevent unauthorized access to private networks, and encryption, which securely encrypts data to meet legal obligations.
1. Muhammad Danish | www.knowledgedep.blogspot.com
1 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
MUHAMMAD DANISH
INFORMATION
MANAGEMENT SYSTEM
2ND ASSIGNMENT
BY: MUHAMMAD DANISH
ROLL # 119467
THIS ASSIGNMENT CONTAINS 10 COMPLETELY SOLVED QUESTION OF MIS AND IT’S
NOT CONTAIN IRRELEVANT ITEMS. IT IS PREPARED AFTER READ COMPLETELY.
2. Muhammad Danish | www.knowledgedep.blogspot.com
2 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 1- What are the main telecommunications, transmission media and
types of networks?
Answer:
TRANSMISSION MEDIA:
Transmission media is the material pathway that connects computers, different kinds of
devices and people on a network. It can be compared to a superhighway carrying lots of
information. Transmission media uses cables or electromagnetic signals to transmit data.
TELECOMMUNICATION MEDIA:
Overall though, a basic telecommunication system consists of three main parts that are
always present in some form or another: A transmitter that takes information and converts it to a
signal. A transmission medium, also called the "physical channel" that carries the signal.
TYPES OF NETWORKS:
There are several different types of computer networks. Computer networks can be
characterized by their size as well as their purpose. The size of a network can be expressed by
the geographic area they occupy and the number of computers that are part of the network.
Networks can cover anything from a handful of devices within a single room to millions of
devices spread across the entire globe.
Some of the different networks based on size are:
1. Personal Area Network:
A personal area network, or PAN, is a computer network organized around an
individual person within a single building. This could be inside a small office or residence. A
typical PAN would include one or more computers, telephones, peripheral devices, video
game consoles and other personal entertainment devices.
If multiple individuals use the same network within a residence, the network is
sometimes referred to as a home area network, or HAN. In a very typical setup, a residence
will have a single wired Internet connection connected to a modem. This modem then
provides both wired and wireless connections for multiple devices. The network is typically
managed from a single computer but can be accessed from any device.
This type of network provides great flexibility. For example, it allows you to:
Send a document to the printer in the office upstairs while you are sitting on the
couch with your laptop.
Upload a photo from your cell phone to your desktop computer.
3. Muhammad Danish | www.knowledgedep.blogspot.com
3 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Watch movies from an online streaming service to your TV.
If this sounds familiar to you, you likely have a PAN in your house without
having called it by its name.
2. Local Area Network:
A local area network, or LAN, consists of a computer network at a single site,
typically an individual office building. A LAN is very useful for sharing resources, such as
data storage and printers. LANs can be built with relatively inexpensive hardware, such as
hubs, network adapters and Ethernet cables.
The smallest LAN may only use two computers, while larger LANs can
accommodate thousands of computers. A LAN typically relies mostly on wired connections
for increased speed and security, but wireless connections can also be part of a LAN. High
speed and relatively low cost are the defining characteristics of LANs.
LANs are typically used for single sites where people need to share resources among
themselves but not with the rest of the outside world. Think of an office building where
everybody should be able to access files on a central server or be able to print a document to
one or more central printers. Those tasks should be easy for everybody working in the same
office, but you would not want somebody just walking outside to be able to send a document
to the printer from their cell phone! If a local area network, or LAN, is entirely wireless, it is
referred to as a wireless local area network, or WLAN.
3. Metropolitan Area Network:
A metropolitan area network, or MAN, consists of a computer network across an
entire city, college campus or small region. A MAN is larger than a LAN, which is typically
limited to a single building or site. Depending on the configuration, this type of network can
cover an area from several miles to tens of miles. A MAN is often used to connect several
LANs together to form a bigger network. When this type of network is specifically designed
for a college campus, it is sometimes referred to as a campus area network, or CAN.
4. Wide Area Network:
A wide area network, or WAN, occupies a very large area, such as an entire country
or the entire world. A WAN can contain multiple smaller networks, such as LANs or MANs.
The Internet is the best-known example of a public WAN.
4. Muhammad Danish | www.knowledgedep.blogspot.com
4 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 2- How does the Internet and Internet technology work, and how do
they support communication and e-business?
Answer:
INTERNET?
The Internet is a global wide area network that connects computer systems across the
world. It includes several high-bandwidth data lines that comprise the Internet "backbone."
These lines are connected to major Internet hubs that distribute data to other locations, such as
web servers and ISPs.
It’s also the world’s largest implementation of client/server computing and
internetworking, linking millions of individual networks all over the world. This global network
of networks began in the early 1970s as a U.S. Department of Defense network to link scientists
and university professors around the world.
INTERNET TECHNOLOGIES?
Internet refers to network of networks. In this network each computer is recognized by a
globally unique address known as IP address. A special computer DNS (Domain Name Server)
is used to give name to the IP Address so that user can locate a computer by a name.
HOW DO WORK INTERNET AND SUPPORT COMMUNICATION:
It depends on two models:
1. Clint / Server Model:
A client-server network is designed for end-users, called clients, to access resources such
as files, songs, video collections, or some other service from a central computer called a
server. A server's sole purpose is to do what its name implies - serve its clients! You may
have been using this configuration and not even have known it. Have you ever played Xbox
Live or used the PlayStation Network? Your Xbox One is the client, and when it logs into the
network, it contacts the Xbox Live servers to retrieve gaming resources like updates, video,
and game demos.
How to Work:
Imagine a customer sitting at a restaurant. He is waiting for the server to come by and take
his order. The same rules apply in a client-server network; the client, which can be a laptop,
desktop, a Smartphone, or pretty much any computerized device, can make a request from
the server.
5. Muhammad Danish | www.knowledgedep.blogspot.com
5 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
The client uses the network as a way to connect with and speak to the server. Just as the
customer speaks to his server, the client uses the network to send and receive
communications about its order, or request. The server will take the request and make sure
that the request is valid. If everything checks out okay, then the server will fetch the request
and serve the client.
The server can make a request from the client as well. It may want to check up on the status
of the client, or ask if it has received any security patches, or if it still needs resources from
the server. If not, the server will close the connection in order to free up network traffic.
Can you imagine a server standing next to a customer who just stares at the menu without
ordering anything? After 15 minutes, it would be a good idea for the server to leave and
check on other customers. In both cases, the server moves on to other clients as needed.
2. TCP/IP Model:
The Internet works by using a protocol called TCP/IP, or Transmission Control
Protocol/Internet Protocol. TCP/IP is the underlying communication language of the Internet.
In base terms, TCP/IP allows one computer to talk to another computer via the Internet
through compiling packets of data and sending them to right location.
For those who don’t know, a packet, sometimes more formally referred to as a
network packet, is a unit of data transmitted from one location to another. Much like the atom
is the smallest unit of a cell, a packet is the smallest unit of transmitted information over the
Internet.
E-BUSINESS:
E-Business (e-Business), or Electronic Business, is the administration of conducting
business via the Internet. This would include the buying and selling of goods and services, along
with providing technical or customer support through the Internet.
Example of functionality of electronic interchange of information in retail shop:
1. Buyer prepares the electronic order in its information system (IS).
2. Buyer is sending electronic order to the supplier and supplier is obtaining the order
directly into its information system.
3. Based on the electronic order, supplier is preparing the ordered goods and the
electronic bill of delivery and is sending this document to the buyer. Electronic bill of
delivery may contain the structure of the consignment and other data on delivered goods
(date of use, number of series and lots etc.)
4. Buyer is receiving all these details in its information system. At the take over and
acceptance of the goods he is confirming the electronic delivery bill and is sending to the
supplier the electronic certificate of receipt.
5. Supplier is issuing the electronic invoice based on the received electronic certificate of
receipt.
6. Muhammad Danish | www.knowledgedep.blogspot.com
6 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
6. Buyer is verifying the electronic invoice with the confirmed bill of delivery and is
sending he electronic order for payment to the bank.
7. Bank is sending electronic financial statements of performed transactions to both
partners, i.e. to the buyer and to the supplier.
7. Muhammad Danish | www.knowledgedep.blogspot.com
7 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 3- What are the principal technologies and standards for wireless
networking, communications, and Internet Access?
Answer:
PRINCIPAL TECHNOLOGIES:
Principal Technologies is a staffing agency in Oklahoma City specializing in IT,
Accounting and Engineering recruitment. Principal Technologies has job openings of all types,
including contract or temporary jobs, contract-to-hire and direct hire permanent jobs in
Oklahoma City and across the state.
PRINCIPLE TECHNOLOGY:
Cellular networks are evolving toward
High-speed,
High-bandwidth,
Digital packet-switched transmission.
Broadband 3G networks are capable of transmitting data at speeds ranging from 144 Kbps to
more than 2 Mbps. 4G networks capable of transmission speeds that could reach 1 Gbps are
starting to be rolled out.
STANDARDS FOR WIRELESS NETWORK:
Major cellular standards include
1. Code Division Multiple Access (CDMA),
Code division multiple access (CDMA) is a channel access method used by
various radio communication technologies. CDMA is an example of multiple access,
where several transmitters can send information simultaneously over a single
communication channel.
2. Global System for Mobile Communications (GSM),
GSM (Global System for Mobile Communications, originally Group Special
Mobile) is a standard developed by the European Telecommunications Standards
Institute (ETSI) to describe the protocols for second-generation (2G) digital cellular
networks used by mobile phones, first deployed in Finland in July 1991.
Standards for wireless computer networks include:
8. Muhammad Danish | www.knowledgedep.blogspot.com
8 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Bluetooth (802.15) for small personal area networks (PANs), Bluetooth is a wireless
technology standard for exchanging data over short distances from fixed and mobile
devices, and building personal area networks
Wi-Fi (802.11) for local area networks (LANs), Wi-Fi is the name of a popular wireless
networking technology that uses radio waves to provide wireless high-speed Internet and
network connections. A common misconception is that the term Wi-Fi is short for
"wireless fidelity," however this is not the case. Wi-Fi is simply a trademarked phrase
that means IEEE 802.11x.
WiMax (802.16) for metropolitan area networks (MANs), WiMAX is a wireless
technology put forth by the WiMAX Forum that is one of the technologies that is being
used for 4G networks. It can be used in both point to point and the typical WAN type
configurations that are also used by 2G and 3G mobile network carriers. Its formal name
is IEEE standard 802.16.
9. Muhammad Danish | www.knowledgedep.blogspot.com
9 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 4- What is the business value of security and control?
Answer:
WHAT IS BUSINESS VALUE?
Business value is an informal term that includes all forms of value that determine the
health and well-being of the firm in the long run. Business value expands concept of value of the
firm beyond economic value (also known as economic profit, economic value added, and
shareholder value) to include other forms of value such as employee value, customer value,
supplier value, channel partner value, alliance partner value, managerial value, and societal
value. Many of these forms of value are not directly measured in monetary terms.
BUSINESS VALUE OF SECURITY AND CONTROL
Lack of sound security and control can cause firms relying on computer systems for their
core business functions to lose sales and productivity. Information assets, such as confidential
employee records, trade secrets, or business plans, lose much of their value if they are revealed
to outsiders or if they expose the firm to legal liability. New laws, such as HIPAA, the Sarbanes-
Oxley Act, and the Gramm-Leach-Bliley Act, require companies to practice stringent electronic
records management and adhere to strict standards for security, privacy, and control. Legal
actions requiring electronic evidence and computer forensics also require firms to pay more
attention to security and electronic records management.
Company systems often house confidential information about individuals' taxes, financial
assets, medical records, and job performance reviews. They may contain information on
corporate operations, trade secrets, new product development plans, and marketing strategies.
Inadequate security and control may also create serious legal liability.
Businesses must protect not only their own information assets but also those of
customers, employees, and business partners. Recent U.S. government regulations mandate the
protection of data from abuse, exposure, and unauthorized access, and include:
The Health Insurance Portability and Accountability Act (HIPAA) of 1996, which
requires members of the healthcare industry to retain patient information for six years and
ensure the confidentiality of those records
The Gramm-Leach-Bliley Act, which requires financial institutions to ensure the
security and confidentiality of customer data
The Sarbanes-Oxley Act, which imposes responsibility on companies and their
management to use internal controls to safeguard the accuracy and integrity of financial
information
Firms face new legal obligations for electronic records management and document retention as
well as for privacy protection. Electronic records management (ERM) consists of policies,
10. Muhammad Danish | www.knowledgedep.blogspot.com
10 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
procedures, and tools for managing the retention, destruction, and storage of electronic records.
Security, control, and electronic records management have become essential for responding to
legal actions. Much of the evidence today for stock fraud, embezzlement, theft of company trade
secrets, computer crime, and many civil cases is in digital form. Legal cases today increasingly
rely on evidence represented as computer data stored on portable floppy disks, CDs, and
computer hard disk drives, as well as in e-mail, instant messages, and e-commerce transactions
over the Internet. E-mail is currently the most common type of electronic evidence.
An effective electronic document retention policy ensures that electronic documents, e-mail, and
other records are well organized, accessible, and neither retained too long nor discarded too
soon.
Computer forensics is the scientific collection; examination, authentication, preservation, and
analysis of data held on or retrieved from computer storage media in such a way that the
information can be used as evidence in a court of law. Electronic evidence can reside on
computer storage media in the form of computer files and as ambient data, which are not visible
to the average user.
11. Muhammad Danish | www.knowledgedep.blogspot.com
11 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 5- What are the most important tools and technologies for
safeguarding information resources?
Answer:
WHAT IS SAFEGUARDING INFORMATION?
Safeguarding is the action that is taken to promote the welfare of children and protect
them from harm. Safeguarding means: protecting children from abuse and maltreatment.
Preventing harm to children's health or development. Taking action to enable all children and
young people to have the best outcomes.
TOOLS:
HSU's information security infrastructure comprises the tools and equipment the campus
employs to protect University-owned computers and networks. This infrastructure is designed to
be as unobtrusive as possible while still maintaining a high degree of protection against malware,
hackers, and data breaches:
1. Campus border firewall:
A system designed to prevent unauthorized access to or from a private network.
Firewalls can be implemented in hardware, software, or a combination of both.
2. Encryption:
Encryption converts data into a secure form that can be safely moved around and
helps HSU meet its obligations under various data protection laws and policies. One of the
most effective ways to protect personally identifiable or other confidential information stored
on a computer is to encrypt it.
3. Network Access Control (NAC):
Designed to proactively prevent malware or hackers from gaining access to the
network. At HSU, this is tackled at two levels: the network perimeter, where the HSU
networks meet the Internet, and the individual system level.
4. Password management:
Every student, staff, and faculty member is provided with a unique HSU User Name
when they officially enter the university population. Each individual must also create (and
periodically change) their own secure password, which is used in combination with their
User Name to permit access to the relevant systems based on their university role.
5. Protected Information Discovery Tools:
12. Muhammad Danish | www.knowledgedep.blogspot.com
12 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Personally Identifiable Information (PII) is an umbrella term for information linked to
an individual's identity, such as Social Security Numbers, drivers' license data, and credit
card or bank account information and which can be used to facilitate identity theft. PII
Discovery Software is used to scan University-owned computers to assist in identifying such
data so the appropriate action can be taken to secure it.
6. Secure wireless:
Eudora is the secure wireless network used at HSU; it provides all the benefits of the
regular wireless service - anytime, anywhere access to the Internet - with additional security.
Staff, faculty, and graduate students can access more of the wired network, including
departmental file shares and wired printers, enabling them to work productively anywhere on
campus using personal or University-owned devices.
7. Virtual Private Network (VPN):
A secure communication channel that enables staff and faculty to access their office
computers from off campus via a secure web interface.
8. Virus protection tools:
Microsoft protection is installed and kept updated on all HSU-owned computers
automatically; any personally owned computer connecting to the HSU wired or wireless
networks must be protected by one of the HSU-recommended antivirus programs.
9. Vulnerability Scanning:
Vulnerability scans provide critical information to the Information Security Office
and management as part of the risk assessment process for campus systems.
TECHNOLOGY:
1. Third Party - Contract Language, Guidelines, Policies & More:
CSU policies provides for direction and support for managing third party relationship
and for granting access to various HSU resources and third party contract language.
2. Mobile Device Security:
Do's and don'ts to keep your mobile devices and the data stored on them secure
against hacking and other security issues.
3. Online Cloud Storage and Email.
Frequently Asked Questions and Answers relating to storing data in the cloud shares
and sending email and attachments securely.
13. Muhammad Danish | www.knowledgedep.blogspot.com
13 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
4. Information Security Training.
HSU provides Information Security Awareness online and on-campus training
materials designed to provide staff and faculty with the knowledge they need to secure
information resources.
5. Secure Disposal of Paper / Shredding and Electronic Media.
Any data storage medium - paper, computer, scanner, copier, hard drive, tablet,
Smartphone - should be treated as if it contained protected data and must be securely wiped
prior to transfer or disposal.
14. Muhammad Danish | www.knowledgedep.blogspot.com
14 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 6- How do supply chain management systems coordinate planning,
production, and logistics with suppliers?
Answer:
SUPPLY MANAGEMENT
A broad term describing the various acts of identifying, acquiring and managing the
products and/or resources needed to run a business or other organization. These include physical
goods as well as information, services and any other resources needed.
SUPPLY AND CHAIN MANAGEMENT:
Supply chain management (SCM) is the oversight of materials, information, and finances
as they move in a process from supplier to manufacturer to wholesaler to retailer to consumer.
Supply chain management involves coordinating and integrating these flows both within and
among companies. It is said that the ultimate goal of any effective supply chain management
system is to reduce inventory (with the assumption that products are available when needed). As
a solution for successful supply chain management, sophisticated software systems with Web
interfaces are competing with Web-based application service providers (ASP) who promise to
provide part or all of the SCM service for companies who rent their service.
HOW DO SUPPLY CHAIN MANAGEMENT SYSTEMS COORDINATE PLANNING,
PRODUCTION, AND LOGISTICS WITH SUPPLIERS?
1. Adapt Supply Chain to Customer's Needs:
Both business people and supply chain professionals are trained to focus on the
customer's needs. In order to understand customer better, we divide customers into a different
group and we call it "segmentation". The most primitive way to segment customer is ABC
analysis that groups customer based on the sales volume or profitability. Segmentation can
also be done by product, industry and trade channel.
2. Customize Logistics Network:
When you segment a customer based on the service needs, you may have to tailor the
different logistics networks to serve different segment. However, this principle doesn't hold
true for all situations.
For example, if you were a contract manufacturer in China, you might already have
different logistics networks for different customers. Each customer in US or EU might
already control the source of raw materials, ask you to provide dedicated production lines,
nominate 3pl companies and air/sea carriers. So, logistics network design is a kind of
initiative driven mainly by customer.
15. Muhammad Danish | www.knowledgedep.blogspot.com
15 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
3. Align Demand Planning Across Supply Chain:
Supply chain practitioners are taught to share the demand data with trading partners
so nobody has to keep the unnecessary stock. In general, this principle holds true. But in the
reality, only Walmart is actively sharing the demand data to trading partners.
There is a very interesting paper "Top-Down Versus Bottom-Up Demand Forecasts:
The Value of Shared Point-of-Sale Data in the Retail Supply Chain" by Williams and Waller
2011, the result of research found that,
-If you make the demand forecast based on SKU/Customer level, using your own
historical order data is more accurate than using the POS data you get from retailers
If you make the demand forecast based on SKU/Store level, using the POS data you get
from retailers is more accurate than using your own historical order data
The implication is that the absence of demand sharing is not necessary bad. But when
you got the demand data from trading partners, you MUST use it the right way.
4. Differentiate Products Close to Customer:
Dell keeps components and assemble them only after customer places the order in
order to increase the product variety. This principle is still true, but, there is another principle
that you should consider.
"Standardization" is in the opposite polarity of "Differentiation". For example, some
cosmetics manufacturers formulate products and choose a packaging and labeling that
complies with the regulations of multiple countries in Asia. So they only make one SKU that
can be sold in 15 countries instead of 1 SKU/Country. By standardizing product
appropriately, they can drive the cost down drastically due to the economy of scale. So
standardization is something that you should also consider.
5. Outsource Strategically:
This is the principle that stands the test of time. In short, don't ever outsource your
core competency.
6. Develop IT that Support Multi-Level Decision Making:
If you search Google for the term "critical success factor erp", you'll find lots of
information about how to implement ERP successfully. My opinion is that an IT project
shouldn't be done in the isolation; business process reengineering is something that you have
to do before implementing an IT project. This will equip you with the full understanding
about process deficiencies then you can determine what kind of technology that you really
need.
16. Muhammad Danish | www.knowledgedep.blogspot.com
16 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
7. Adopt Both Service and Financial Metrics:
Anderson et al suggested that the activity based costing (ABC) be implemented so
you can determine customer's profitability. However, there is the interesting twist about the
ABC concept.
In 1987, Robert Kaplan and W Bruns defined the activity based costing concept in his
book "Accounting and Management: A Field Study Perspective". However, in 2003 Robert
Kaplan said that it's difficult to maintain an ABC costing model to reflect the changes in
activities, processes, products and customers. Then, he introduced the refined concept called
"Time Driven Activity Based Costing".
17. Muhammad Danish | www.knowledgedep.blogspot.com
17 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 7- How do customer relationship management systems help firms
achieve customer intimacy?
Answer:
MANAGEMENT SYSTEM?
A management system is the framework of policies, processes and procedures used by an
organization to ensure that it can fulfill all the tasks required to achieve its objectives
Management Systems are systematic frameworks designed to manage an organization's
policies, procedures and processes and promote continual improvement within.
HOW DO CUSTOMER RELATIONSHIP MANAGEMENT SYSTEMS HELP FIRMS
ACHIEVE CUSTOMER INTIMACY?
1. Increasing Customer Touch points:
In the digital marketing age, there are new ways to reach your customers every day.
The more opportunities to interact with customers, the better. Here are several examples of
traditional and digital touch points that will help to grow customer intimacy:
Sale papers
Customer service
Call centers
Direct mail
Emails
Apps
Blogs and content
Search engine queries
Websites
Blogs
Events
Sponsors
Mobile messaging
SMS
Store or Facility appearance
Packaging
Employees
2. Customer Service Management:
Service is the key to earning customer loyalty. Consistent and quality service, quick
response times, and open channels of communication result in better customer experiences
and potential increases in sales exceeding 300%. When customers know they’re important, it
shows.
18. Muhammad Danish | www.knowledgedep.blogspot.com
18 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
3. Social Networking:
Bring that personal touch to your platform by linking your business to Face book,
Twitter, Instagram, LinkedIn, and other social media platforms. Customers can directly
respond to events and promotions, share your brand with their contacts, and generate
excitement in others about your products and services.
4. Data Integration:
As customers engage with products and services, companies can gather data to better
serve their needs. Surveys, email campaigns, and cross-promotional social events can help
fine-tune customer targeting and segmentation. The more focused a campaign becomes, the
more customers will feel connected to the brand.
5. Management Solutions and Leadership:
Your CMO has a prime spot as a leader in driving customer intimacy initiatives.
Working with strategic consultants allows for team-building across an organization. With
clearly defined roles and objectives, it’s easier to serve customers and delegate
responsibilities.
6. Rewarding Employees:
Forget the old top-down approach to marketing strategies. Highly engaged
employees at any level that are excited about your products and services should be
rewarded. Enthusiasm strategies like spiff programs, incentive programs, and bonuses not
only motivate employees, but it gets them more involved with decision making and product
familiarity. Customer intimacy revolves around employee knowledge at every touch point.
7. Customer segmentation:
In CRM, segmentation is used to categorize customers, according to some similarity,
such as industry, job or some other characteristics, into similar groups. Although these
characteristics, can be one or more attributes. It can be defined as a subdividing the
customers based on already known good discriminator.
8. Improve customer knowledge:
Firms can make and improve products and services through the information from
tracking (e.g. via website tracking) customer behaviour to customer tastes and needs. CRM
could contribute to a competitive advantage in improving firm's ability of customer
information collecting to customize products and services according to customer needs.
19. Muhammad Danish | www.knowledgedep.blogspot.com
19 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 8- What are the unique features of e-commerce, digital markets, and
digital goods?
Answer:
E-COMMERCE:
The buying and selling of products and services by businesses and consumers through an
electronic medium, without using any paper documents. E-commerce is widely considered the
buying and selling of products over the internet, but any transaction that is completed solely
through electronic measures can be considered e-commerce. E-commerce is subdivided into
three categories: business to business or B2B (Cisco), business to consumer or B2C (Amazon),
and consumer to consumer or C2C (eBay) also called electronic commerce.
Electronic commerce (ecommerce) is a type of business model, or segment of a larger
business model, that enables a firm or individual to conduct business over an electronic network,
typically the internet. Electronic commerce operates in all four of the major market segments:
business to business, business to consumer, consumer to consumer and consumer to business. It
can be thought of as a more advanced form of mail-order purchasing through a catalog. Almost
any product or service can be offered via ecommerce, from books and music to financial services
and plane tickets.
Digital market:
The marketing of products or services using digital channels to reach consumers. The key
objective is to promote brands through various forms of digital media. Digital marketing extends
beyond internet marketing to include channels that do not require the use of the internet.
Digital Goods:
In electronic commerce, digital goods are a general phrase used to describe any goods
that are stored, delivered and used in its electronic format. Digital goods are shipped
electronically to the consumer through email or download from the Internet.
SEVEN UNIQUE FEATURES OF E-COMMERCE:
There are some features of E-commerce, which express the importance of
electronic commerce:
1. Ubiquity:
The traditional business market is a physical place, access to treatment by means of
document circulation. For example, clothes and shoes are usually directed to encourage
customers to go somewhere to buy. E-commerce is ubiquitous meaning that it can be
20. Muhammad Danish | www.knowledgedep.blogspot.com
20 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
everywhere. E-commerce is the worlds reduce cognitive energy required to complete the
task.
2. Global Reach-:
E-commerce allows business transactions on the cross country bound can be more
convenient and more effective as compared with the traditional commerce. On the e-
commerce businesses potential market scale is roughly equivalent to the network the size of
the world's population.
3. Universal Standards:
E-commerce technologies is an unusual feature, is the technical standard of the
Internet, so to carry out the technical standard of e-commerce is shared by all countries
around the world standard. Standard can greatly affect the market entry cost and considering
the cost of the goods on the market. The standard can make technology business existing
become more easily, which can reduce the cost, technique of indirect costs in addition can set
the electronic commerce website 10$ / month.
4. Richness:
Advertising and branding are an important part of commerce. E-commerce can
deliver video, audio, animation, billboards, signs and etc. However, it's about as rich as
television technology.
5. Interactivity-
Twentieth Century electronic commerce business technology is called interactive, so
they allow for two-way communication between businesses and consumers.
6. Information Density-
The density of information the Internet has greatly improved, as long as the total
amount and all markets, consumers and businesses quality information. The electronic
commerce technology, reduce the information collection, storage, communication and
processing cost. At the same time, accuracy and timeliness of the information technology
increases greatly, information is more useful, more important than ever.
7. Personalization:
E-commerce technology allows for personalization. Business can be adjusted for a
name, a person's interests and past purchase message objects and marketing message to a
specific individual. The technology also allows for custom. Merchants can change the
product or service based on user preferences, or previous behavior.
21. Muhammad Danish | www.knowledgedep.blogspot.com
21 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 9- What is the role of m-commerce in business, and what are the most
important m-commerce applications?
Answer:
MEANT BY M COMMERCE:
M-commerce (mobile commerce) is the buying and selling of goods and services through
wireless handheld devices such as cellular telephone and personal digital assistants (PDAs).
Known as next-generation e-commerce, m-commerce enables users to access the Internet
without needing to find a place to plug in.
M-commerce is especially well-suited for location-based applications, such as finding
local hotels and restaurants, monitoring local traffic and weather, and providing personalized
location-based marketing. Mobile phones and handhelds are being used for mobile bill payment,
banking, securities trading; transportation schedule updates, and downloads of digital content,
such as;
Music,
Games,
Video clips.
Documents
Assignments
Articles
Lectures
Movies
Wallpapers
M-commerce requires wireless portals and special digital payment systems that can
handle micropayments. The GPS capabilities of smart phones make possible geoadvertising,
geosocial, and geoinformation services.
IMPORTANCE OF M-COMMERCE IN BUSINESS
1. Boosting retail activity:
In the context of economic difficulties, ecommerce solution with smart phones and
software applications plays an important role in retail market, creating close relationship
between consumers, retailers and brand merchandise through features, to get the success in
both earning high profit and providing great mobile shopping experience. As a result,
Investments in mobile platforms for B2C transactions are defined as strategic investment
direction in the future, as indicated in the proportion of investment in mobile platforms
accounted for 68% of the investing in research and new technology platforms.
22. Muhammad Danish | www.knowledgedep.blogspot.com
22 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
2. Convenience of electronic payment services on mobile:
19% of people surveyed knew about the payment services on mobile, 10% expressed
interest to learn and to use mobile payment services. By applying necessary plug-in,
payment can be transferred easier and more secure than ever. Due to the fast development,
this type of commerce also supports almost all popular payment method for customers to pay
bills electronically, purchase prepaid cards as mobile phone cards to solve transactions
complex.
3. Sales of digital content on mobile devices:
Besides retail, digital content is a rich resource that firms can use with mobile
commerce.
By strengthening the convenience function of mobile devices, sellers can sell the content and
buyers can use anytime they want. Users pay directly for each digital content or registered
user to use the service online digital content. It can't be denied that Mobile Commerce is the
very rapidly growing field in today's scenario because of unique characteristics and the
outstanding advantages of M-Commerce. There are all kind of treads such as business-to-
consumer, business-to- business and consumer-to-consumer in M-commerce.
4. Convenience:
With just a few clicks on mobile devices, customers can already do
shopping, banking, download media files...and more than that. M-commerce also benefits
retailers by many of their outstanding features compared with responsive website and mobile
site.
5. Flexible Accessibility:
User can be accessible via mobile devices and at the same time be accessible
online too through logging on to various mobile messengers and other networking platforms.
On the other hand, the user may also choose not to be accessible by shutting down
his mobile device, which at times can be a good thing.
6. Easy Connectivity:
As long as the network signal is available, mobile devices can connect and do
commerce transactions not only mobile to mobile but also mobile to other devices. No need
for modem or WI-FI connectivity set up.
7. Personalization:
Each mobile device is usually dedicated to a specific user so that it is personal. Users
can do whatever they want with their handheld devices: modify the wallpaper, change view
settings or modify contact information as you send emails or e-payments.
23. Muhammad Danish | www.knowledgedep.blogspot.com
23 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
8. Time Efficient:
Doing M-Commerce transactions do not require the users to plug anything like
personal computer or wait for the laptop to load.
24. Muhammad Danish | www.knowledgedep.blogspot.com
24 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Q: 10- What are the business benefits of using intelligent techniques for
knowledge management?
Answer:
BUSINESS:
A business (also known as an enterprise, a company or a firm) is an organizational entity
involved in the provision of goods and services to consumers.
KNOWLEDGE MANAGEMENT:
Knowledge management (KM) is the process of creating, sharing, using and managing
the knowledge and information of an organization. It refers to a multi-disciplinary approach to
achieving organizational objectives by making the best use of knowledge.
THE BUSINESS BENEFITS OF USING INTELLIGENT TECHNIQUES FOR
KNOWLEDGE MANAGEMENT
Business benefit can be defined as an outcome of an action or decision that contributes
towards meeting business objectives. There are some benefits of using Intelligent Techniques are
following:
1. Supply of Goods and Services:
Business provides goods and services to the society. Business produces different
products, which are sold or supplied to the society. The creator created and creates things, but
processing, the individuals or business does reprocessing and preservation and ultimately
new utility is created. So business provides goods and services to the society.
2. Harnessing Capital and other Resources in Production:
Business collects the drifts of savings from different individuals, especially through
banks and financial institutions and employs those in productive activities and, thus,
harnesses capital in economic activities to utilize natural resources in utility creation or value
addition, and consequently, helps production, employment and resource utilization.
3. Self-employment and Provision of Employment:
Business provides employment to the businessman. Further, in the production,
distribution and services of business a large number of individuals are employed by the
business organization and income generation occurs for them and others.
4. Preservation of Natural Resources:
25. Muhammad Danish | www.knowledgedep.blogspot.com
25 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH
Business creates new utility to the natural resources by preservation and value
addition. Different new products are created by business operation, without which a lot of
natural resources would have been wasted.
5. Research, Development and Innovation:
Business continuously makes research on alternative uses of resources, develops new
products and methods, and makes new innovations.
6. Income Generation:
Business generates income for the individuals. Business Utilizes factors of production
like land, labor, capital and organization; and generate incomes like wage, rent, interest and
profit to the factor-owners.
7. Interesting Natural Income:
Business preserves natural resources, and creates new utility. Consequently, national
income (NI), per capita income (PCI), gross domestic products (GDP), etc, increase.
8. Contribution to Social Development:
Business contributes to the social development also. Business growth increases
national income, which contributes to social development. Profitable corporations provide a
lot of money as corporate taxes in the hand of the government, which the government uses in
the development activities of the country. Besides, modern corporate business contributes a
lot for Corporate Social Responsibility (CSR), which ultimately enhances social welfare.
9. Contribution in the Development of Education, science and Technology:
Business contributes toward the development of education, innovates new technology
and applies theory (s) of science for better production and human welfare.
10. Development of International Relations:
Business imports necessary commodities and exports new or surplus products to
foreign countries. In this way, a foreign relation develops.
26. Muhammad Danish | www.knowledgedep.blogspot.com
26 INFROMATION MANAGEMENT SYSTEM | MUHAMMAD DANISH