SlideShare una empresa de Scribd logo
1 de 51
The Role Of IT in Business Presented By : Durya Akbar Hina Saeed Safia Anjum Kamran Imram  M .Aftab Ali
All of the biggest technological inventions created by man - the airplane, the automobile, the computer - says little about his intelligence, but speaks volumes about his laziness.  ~Mark Kennedy
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is IT…?? Collection of technologies  Deal with processing, storing, and communicating information, Including all types of computer and communications systems as well as reprographics methodologies. 
What is IT…?? Study, design, development, implementation, support or management of computer-based information systems Includes software applications and computer hardware."
IT in different era’s Four basic periods ,[object Object],[object Object],[object Object],[object Object]
Pre mechanical Age
Mechanical Age
Electro Mechanical Age
 
 
Different technologies  in business now a days
TELECOMMUNICATION
 
ROBOTICS ,[object Object]
Designed to move material, parts, tools or specialized devices through programmed motions for the performance of tasks .
Spot and  electric arc welding  General purpose grippers .  Pick and place  operations Spray finishing operations  Assembly Manufacturing Materials transport
 
 
IT’s  application in  business
IT in accounting and finance ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],IT in production
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IT in HRM
IT in tracking market share we get day to day information of share market which is very important to do business because we have to be updated by the knowledge of share market to update our business.
Let’s Start With The Advantages
Connectivity
Cost Effective Marketing and Promotions :
Developing a Competitive Strategy
Better customer services
E-Commerce
Worldwide presence
Electronic shopping E-Shopping
Electronic banking Electronic banking
Search Engines for Business Research
ONLINE BOOKING
 
Abuses of IT
Computer Crimes ,[object Object],[object Object],[object Object],[object Object]
 
 
 
 
 
 
 
 
 
 
LACK OF PRIVACY
Wastage Of Time
 

Más contenido relacionado

La actualidad más candente

Mis impact of information technology on business
Mis impact of information technology on businessMis impact of information technology on business
Mis impact of information technology on business
Cyndhie DeLeon
 
The role of information technologies & information system in business
The role of information technologies & information system in businessThe role of information technologies & information system in business
The role of information technologies & information system in business
Kevin Philip Joseph
 

La actualidad más candente (20)

Mis impact of information technology on business
Mis impact of information technology on businessMis impact of information technology on business
Mis impact of information technology on business
 
Information Technology In Business
Information Technology In BusinessInformation Technology In Business
Information Technology In Business
 
Changes made by Information Technology (IT) in our Society
Changes made by Information Technology (IT) in our SocietyChanges made by Information Technology (IT) in our Society
Changes made by Information Technology (IT) in our Society
 
Information technology ppt
Information technology ppt Information technology ppt
Information technology ppt
 
Introduction to information technology
Introduction to information technologyIntroduction to information technology
Introduction to information technology
 
information technology
information technology information technology
information technology
 
Business intelligence ppt
Business intelligence pptBusiness intelligence ppt
Business intelligence ppt
 
The impact of information technology on society
The impact of information technology on societyThe impact of information technology on society
The impact of information technology on society
 
Business with Information Technology
Business with Information TechnologyBusiness with Information Technology
Business with Information Technology
 
Introduction of information technology to managers
Introduction of information technology to managersIntroduction of information technology to managers
Introduction of information technology to managers
 
Application of information technology in different areas
Application of information technology in different areasApplication of information technology in different areas
Application of information technology in different areas
 
The role of information technologies & information system in business
The role of information technologies & information system in businessThe role of information technologies & information system in business
The role of information technologies & information system in business
 
Chapter 2 : IT Components
Chapter 2 : IT ComponentsChapter 2 : IT Components
Chapter 2 : IT Components
 
Basics of information technology
Basics of information technologyBasics of information technology
Basics of information technology
 
Office Automation System (OAS)
Office Automation System (OAS)Office Automation System (OAS)
Office Automation System (OAS)
 
INTRODUCTION TO ECOMMERCE
INTRODUCTION TO ECOMMERCE   INTRODUCTION TO ECOMMERCE
INTRODUCTION TO ECOMMERCE
 
Gr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its ImportanceGr 1: History of Information Systems and its Importance
Gr 1: History of Information Systems and its Importance
 
Management information system
Management information systemManagement information system
Management information system
 
Information Technology And Its Importance
Information Technology And Its ImportanceInformation Technology And Its Importance
Information Technology And Its Importance
 
Use of Technology in business
Use of Technology in businessUse of Technology in business
Use of Technology in business
 

Destacado

Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1
adpafit
 
Role of technology in business communication 2
Role of technology in business communication 2Role of technology in business communication 2
Role of technology in business communication 2
mehwish88
 
Role of it in Marketing
Role of it in MarketingRole of it in Marketing
Role of it in Marketing
prahladgurjar
 

Destacado (12)

Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Environmental issues in international business
Environmental issues in international businessEnvironmental issues in international business
Environmental issues in international business
 
Impact of technology on international business
Impact of technology on international businessImpact of technology on international business
Impact of technology on international business
 
Role of technology in business communication 2
Role of technology in business communication 2Role of technology in business communication 2
Role of technology in business communication 2
 
Ethics in international business
Ethics in international businessEthics in international business
Ethics in international business
 
Market structure and pricing practices
Market structure and pricing practicesMarket structure and pricing practices
Market structure and pricing practices
 
Chapter 8 international industrial relations (iir)
Chapter  8  international industrial relations (iir)Chapter  8  international industrial relations (iir)
Chapter 8 international industrial relations (iir)
 
Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)Basic Concepts Of Information Technology (It)
Basic Concepts Of Information Technology (It)
 
Role of it in Marketing
Role of it in MarketingRole of it in Marketing
Role of it in Marketing
 
Issues in international business
Issues in international businessIssues in international business
Issues in international business
 
Uses of technology in business communication
Uses of technology in business communicationUses of technology in business communication
Uses of technology in business communication
 

Similar a Role of IT in Business

INFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptxINFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptx
SushmitaSah5
 
Information Technology
Information TechnologyInformation Technology
Information Technology
Divyank Jindal
 
Management Information Systems - MIS Lectures - Day 1 cio and mis - part 1
Management Information Systems - MIS Lectures - Day 1   cio and mis - part 1Management Information Systems - MIS Lectures - Day 1   cio and mis - part 1
Management Information Systems - MIS Lectures - Day 1 cio and mis - part 1
Foreign Trade University - Hanoi
 
Day 1 cio and mis - part 1
Day 1   cio and mis - part 1Day 1   cio and mis - part 1
Day 1 cio and mis - part 1
Foreign Trade University - Hanoi
 

Similar a Role of IT in Business (20)

E manufacturing
E manufacturingE manufacturing
E manufacturing
 
INFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptxINFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptx
 
Information technology
Information technologyInformation technology
Information technology
 
Company Secretary and Information technology
Company Secretary and Information technologyCompany Secretary and Information technology
Company Secretary and Information technology
 
Online %26 offline marketing
Online %26 offline marketingOnline %26 offline marketing
Online %26 offline marketing
 
IT_business.ppt
IT_business.pptIT_business.ppt
IT_business.ppt
 
Informati̇on technology 1
Informati̇on technology 1Informati̇on technology 1
Informati̇on technology 1
 
Managing the digital firm
Managing the digital firmManaging the digital firm
Managing the digital firm
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Information Technology of Metro (MCC)- TQM
Information Technology of Metro (MCC)-  TQMInformation Technology of Metro (MCC)-  TQM
Information Technology of Metro (MCC)- TQM
 
Day 1 cio and mis - part 1
Day 1   cio and mis - part 1Day 1   cio and mis - part 1
Day 1 cio and mis - part 1
 
Taking the Proactive Roles Through Smart Technologies
Taking the Proactive Roles Through Smart TechnologiesTaking the Proactive Roles Through Smart Technologies
Taking the Proactive Roles Through Smart Technologies
 
History and Introduction to Information and Communication Technology
History and Introduction to Information and Communication TechnologyHistory and Introduction to Information and Communication Technology
History and Introduction to Information and Communication Technology
 
Management Information Systems - MIS Lectures - Day 1 cio and mis - part 1
Management Information Systems - MIS Lectures - Day 1   cio and mis - part 1Management Information Systems - MIS Lectures - Day 1   cio and mis - part 1
Management Information Systems - MIS Lectures - Day 1 cio and mis - part 1
 
Day 1 cio and mis - part 1
Day 1   cio and mis - part 1Day 1   cio and mis - part 1
Day 1 cio and mis - part 1
 
Ict
IctIct
Ict
 
Doing Business in The Cloud
Doing Business in The CloudDoing Business in The Cloud
Doing Business in The Cloud
 
Doing Business in The Cloud
Doing Business in The CloudDoing Business in The Cloud
Doing Business in The Cloud
 
It
ItIt
It
 
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
 

Más de Islamia university bahawalpur

Más de Islamia university bahawalpur (6)

Effectiveness of performance appraisal
Effectiveness of performance appraisalEffectiveness of performance appraisal
Effectiveness of performance appraisal
 
Vision of lever brothers pakistan limited
Vision of lever brothers pakistan limitedVision of lever brothers pakistan limited
Vision of lever brothers pakistan limited
 
Contemporary recruitment and selection
Contemporary recruitment and selectionContemporary recruitment and selection
Contemporary recruitment and selection
 
Company is not managing good relationship with stakeholders
Company is not managing good relationship with stakeholdersCompany is not managing good relationship with stakeholders
Company is not managing good relationship with stakeholders
 
Diagramming Arguments
Diagramming ArgumentsDiagramming Arguments
Diagramming Arguments
 
Consumer Behavior Towards Mobile
Consumer Behavior Towards MobileConsumer Behavior Towards Mobile
Consumer Behavior Towards Mobile
 

Último

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Último (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 

Role of IT in Business

Notas del editor

  1. Our group is going to be presented that what is IT? brief history that what technologies gradually came into being. Uses of IT in business its different advantages and disadvantages r abuses.
  2. Stands for information technology . It refers to anything related to computing technology, such as networking, hardware, software, the Internet, or the people that work with these technologies. Many companies now have IT departments for managing the computers, networks, and other technical areas of their businesses. IT jobs include computer programming, network administration, computer engineering, Web development, technical support, and many other related occupations. Since we live in the "information age," information technology has become a part of our everyday lives. That means the term "IT," already highly overused, is here to stay. It refers to anything related to computing technology, such as networking, hardware, software, the Internet, or the people that work with these technologies. Many companies now have IT departments for managing the computers, networks, and other technical areas of their businesses. IT jobs include computer programming, network administration, computer engineering, Web development, technical support, and many other related occupations. Since we live in the "information age," information technology has become a part of our everyday lives. That means the term "IT," already highly overused, is here to stay.
  3. Four basic periods Characterized by a principal technology used to solve the  input, processing, output and
  4. One of the very first information processors. abacus a technology of pre mechanical era from 3000 B.C. - 1450 A.D.
  5. Mechanical age technologies Pascaline One of the first mechanical computing machines Analytical engines Difference engine
  6. The Electromechanical Age: 1840 - 1940. The discovery of ways to harness electricity was the key advance made during this period. Knowledge and information could now be converted into electrical impulses. The Beginnings of Telecommunication. discovery that electrical waves travel through space Voltaic Battery. Telegraph. . Telephone and Radio.
  7. Punch cards technology
  8. Electronic age The First High-Speed, General-Purpose Computer  Using Vacuum Tubes for calculation Stored-Program Computer(s) Computer for Commercial Use Digital Computing. MS Windows  Graphical User Interfaces
  9. Telecommunication  is the  transmission  of messages over significant distances for the purpose of  communication . In earlier times, telecommunications involved the use of  visual  signals, such as smoke ,  semaphore telegraphs ,  signal flags , and  optical   heliographs , or audio messages via  coded drumbeats , lung-blown  horns , or sent by  loud whistles , for example. In the modern age of  electricity  and  electronics , telecommunications has typically involved the use of electric means such as the  telegraph , the  telephone , and the  teletype , the use of  microwave communications , the use of  fiber optics  and their associated electronics, and/or the use of the Internet . The first breakthrough into modern electrical telecommunications came with the development of the telegraph during the 1830s and 1840s. The use of these  electrical  means of communications exploded into use on all of the  continents  of the world during the 19th century, and these also connected the continents via  cables on the floors of the ocean . These three systems of communications all required the use of  conducting metal  wires. A revolution in  wireless telecommunications  began in the first decade of the  20th Century , with Guglielmo Marconi  winning the  Nobel Prize in Physics  in 1909 for his pioneering developments in wireless radio   communications . Other early inventors and developers in the field of electrical and electronic telecommunications included  Samuel F.B. Morse  and  Joseph Henry  of the  United States ,  Alexander Graham Bell  of  Canada ,  Lee de Forest  of the U.S., who invented the  amplifying   vacuum tube  called the  triode ,  Edwin Armstrong  of the U.S.,  John Logie Baird  of  England , and  Nikola Tesla  whose most important inventions were created in the United States. Telecommunications play an important role in the world economy and the worldwide telecommunication industry's revenue was estimated to be $3.85 trillion in 2008. [1]  The service revenue of the global telecommunications industry was estimated to be $1.7 trillion in 2008, and is expected to touch $2.7 trillion by 2013. [1]
  10. PDAs For many years businesses and government organizations have relied upon rugged PDAs also known as  enterprise digital assistants  (EDAs) for mobile data applications. Typical applications include supply chain management in warehouses, package delivery, route accounting, medical treatment and record keeping in hospitals, facilities maintenance and management, parking enforcement, access control and security, capital asset maintenance, meter reading by utilities, and "wireless waitress" applications in restaurants and hospitality venues. A common feature of EDAs are the integration of Data Capture devices like Bar Code,  RFID  and Smart Card Readers.
  11. Robotics is the engineering science and technology of robots, and their design, manufacture, application, and structural disposition. Robotics is related to electronics, mechanics, and software.
  12. Today's robotics systems operate by way of hydraulic, pneumatic, and electrical power. Electric motors have become progressively smaller, with high power-to-weight ratios, enabling them to become the dominant means by which robots are powered.
  13. Uses PICK AND PLACE OPERATIONS Industrial robots also perform what are referred to as pick and place operations. Among the most common of these operations is loading and unloading pallets, used across a broad range of industries. ASSEMBLY Assembly is one of the most demanding operations for industrial robots. Robotic assembly has come to be used in the production of a wide range of goods, including circuit boards, electronic components and equipment, household appliances, and automotive subassemblies. SPRAY FINISHING OPERATIONS Industrial robots are widely used in spray finishing operations, particularly in the automobile industry. One of the reasons these operations are cost-effective is that they minimize the need for environmental control to protect workers from fumes. Non-industrial applications for robots in security, commercial cleaning, food service, and health care are also on the rise.
  14. Bar code reader A  barcode reader  (or  barcode scanner ) is an electronic device for reading printed  barcodes . Like a  flatbed scanner , it consists of a light source, a lens and a light sensor translating optical impulses into electrical ones. Additionally, nearly all barcode readers contain  decoder  circuitry analyzing the barcode's image data provided by the sensor and sending the barcode's content to the scanner's output port
  15. Atm An  automated teller machine  ( ATM ) or  automatic banking machine  ( ABM ) is a computerised telecommunications device that provides the clients of a financial institution with access tofinancial transactions in a public space without the need for a cashier, human clerk or bank teller. On most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smart card with a chip, that contains a unique card number and some security information such as an expiration date or CVVC (CVV). Authentication is provided by the customer entering a personal identification number (PIN).
  16. Using the web to market products guarantees worldwide reach at a nominal price. Advertising techniques like  pay per click advertising  ensure that the advertiser only pays for the advertisements that are actually viewed. Affiliate marketing, where customers are directed to a business portal because of the efforts of the affiliate who in turn receive a compensation for their efforts meeting with success, has emerged on account of e-business.  Affiliate marketing  has helped both the business and the affiliates. Firms engaging in e-business have managed to use cost effective online advertising strategies to their advantage.
  17. Firms need to have a competitive strategy in order to ensure a competitive advantage. Without an effective strategy, they will find it impossible to maintain the advantage and earn profits. The strategy, that the firms can pursue, can be a be a cost strategy or a differentiation strategy. For instance, till the year 2007, Dell Inc. was selling computers only via the Internet and the phone. It adopted a differentiation strategy by selling its computers online and customizing its laptops to suit the requirements of the clients. Thus, e-business resulted in Dell Inc. managing to capture a vast segment of the market using the differentiation strategy.
  18. E-Business has resulted in improved  customer service . Many a times, on visiting a website, the customer is greeted by a pop-up chat window. Readily available customer service may help in encouraging the customer to know more about the product or service. Moreover, payments can be made online, products can be shipped to the customer without the customer having to leave the house. 
  19. This is the biggest advantage of conducting business online. A firm engaging in e-business can have a nationwide or a worldwide presence. IBM was one of the first companies to use the term e-business to refer to servicing customers and collaborating with business partners from all over the world. Dell Inc. too had a flourishing business selling PCs throughout the US, only via telephone and the Internet till the year 2007. Amazon.com is another success story that helps people buy internationally from third parties. Hence, worldwide presence is ensured if companies rethink their business in terms of the Internet. 
  20. There are man y opportunities right on the Internet to find the right IT in business help. If sales companies are doing business on the Internet there is the opportunity to find good Contact Management Systems (CMS) and Search Engine Optimization (SEO) software. The CMS software provides sales force managers with all of the tools necessary to monitor the status of the potential sales that are being worked by the members of the sales team.  SEO software is the IT in business solution to propel a business website to high rankings on major Internet search engines like Google, Yahoo, and MSN. This brings targeted visitors to the website and leads to more contacts and more sales. Businesses that fail to get visitors to their website on a regular and continuing basis are usually not going to succeed.  The IT in business solutions are available and affordable for businesses both large and small. It is important to do some research to find the right company with a good reputation and that provides the services needed. Once that is done, any business can make the necessary moves to get a step ahead of the competition. Joe Thorpe is a Professional Entrepreneur.
  21. Abuses disadvantages and misuse of information technology. The big problem about technology misuses can be summarized in two words: culture and education. Some people aren't sufficiently cultured to use technology properly as a tool because they use it as an easy way solution or as a fashionable trends. Also, these people do not have education to use it correctly. Because of hundreds of services that technology offers, there are many techniques to harm persons and waste time. People use their time to harm others even though they know that it is not good. For example, people manufactures weapons to destroy others instead of improving themselves.
  22. Computer Crimes including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.
  23. Computer Crimes Software Software theft can be defined as the unauthorized use or illegal copying of computer software. This can take many forms such as commercial counterfeiting, deliberate and unauthorized copying by dealers, unlicensed copying and use by "end users" and plagiarism by competitors. Theft of hardware has increased from warehouses and manufacturing facilities due to the growing demand for high-tech products such as microprocessors, computer memory, microcomputers/PCs, Laptop/notebook, palmtop, hard disk drivers and cellular phone that are valuable, compact and easy to transport Credit fraud The internet allows many different types of invasions into personal information, and use of information with little consequences. Through the internet stolen credit cards are easily utilized without any check into if the user is the true owner of the card
  24. Basically this means that you passed of a stolen check with the signature forged. You are asserting that the check is valid and is yours to use, when in reality it is not. Identity theft is a form of fraud in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.
  25. A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves.. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
  26. Work place crime information overload Workplace crimes :the technological advances in the workplace have put the employer at risk of being robbed of time, energy and resources – all in the name of productivity! Information Overload Although many of the increased technology has greatly improved how we do business it has also caused excess stress, strain and burnout for the average worker. When you are overloaded with anything, in this case information you tend to forget tasks, fail to prioritize therefore your tasks will be completed with less care and detail. This information overload is causing many workplace illnesses and health problems.
  27. Physical conversation work place crime Physical Conversation Email and fax have dramatically increased the speed and frequency of communication in the workplace. Email allows you to communicate without actually having a physical conversation. Email also allows you to send and share documents over long distances. Fax and scanning machines are also pieces of technology that have vastly improved the communication process. Many professionals also carry tools like cell phones, blackberries and laptop computers. Essentially an employee can be reached at all times of day. This 24/7 attitude has become somewhat of a standard in the corporate world especially once you reach the higher ranks in an organization. The separation from home and work becomes blurred
  28. Lack of job security Lack of job security Industry experts believe that the internet has made job security a big issue as since technology keeps on changing with each day. This means that one has to be in a constant learning mode, if he or she wishes for their job to be secure.
  29. Harmful for health
  30. Lost Time How long do you have to wait for that program to load and run? Did you have to spend time, energy and money (ie, yours or your employers) in software training, upgrading or problem solving? How much time are you spending awaiting some technical support? Did you count the volume of junk e-mail and spam in your in-box? How much time did you devote to reading or deleting these? Did you have to sort out disk storage issues or re-organize your computer desktop today? Then, system maintenance interruptions – how much time did you lose waiting for the problem to be fixed and for the system to be returned to operation? Oh, just 10 minutes yesterday and another half hour today. Well, it all adds up !