Saturday, May 10, 2014

Case Study: Effect of ICT on business



Day by day, the ICT role in our life becomes more and more important. It is because of the accuracy and the efficiency that the usage of it leads to. The ICT had affected us in many aspects of our lives; one of them is on business jobs.
Over the years, ICT has proven to be a key determinant in business development, not only making it reach to a wider audience through media campaigns, but also improving efficiency in productivity. Software for financial management, networking of computers within offices and gadgets such as smartphones and laptops for working outside the office are more appreciated in business circles.

The Information Communication Technology (ICT) has made it easier to communicate efficiently and effectively by the use of networking and mailing system. E-marketing has also made it easier for businesses to reach their clients and thus it has enhanced productivity in various business industries.

The business companies can now send an e-mail with just a click, rather than sending an actual mail to the destination, and without spending a lot of time in it.
It is also a time consuming, and the work can not only be done at home, but in any other place as well. Conference can also be held anywhere, with just a PC, PC camera, microphone, speakers & internet; you can hold a video conference!
In business, ICT is used in various sectors, like: making pricing lists, storing information on documents, selling and purchasing items online, advertising in many different and attractive ways, making presentations, doing various difficult calculations, setting ideas, getting more information from many different sources, creating websites as well as starting business itself thorough the help of ICT.


The usage of ICT made it a lot easier for the marketing and businesses, people can know more about a specific institution, product, and business through ICT.



                                                                                                                        

The Digital Divide & Information Literacy

Q1) Define digital divide.
A term used to describe the discrepancy between people who have access to and the resources to use new information and communication tools, such as the Internet, and people who do not have the resources and access to the technology. It also describes the discrepancy between those who have the skills, knowledge and abilities to use the technologies and those who do not.

Q2) Identify the main effects of digital divide on society.
-Not being able to access or use such technology can make a person become an outcast of society in today’s life.
 -Poor countries don’t benefit because they cannot afford the costs. 
  -Older generations face great difficulties connecting with the younger ones, an age group gap is created.

Q3)Explain a real case study on bridging the digital divide gap.
In this century, people should learn how to use the internet and the technology, therefore many work institutions are giving free courses to their employers, so they can know more about the technology and ways to use them, as well as the importance of ICT in today’s life. Teaching the employers the ICT skills make it easier for them to do their work efficiently and also it tries to bridge the digital divide gap between them and other workers in other companies.


Tuesday, February 25, 2014

Online services, Health & Safety

s

If a person uses a computer for a very long time, there’ll be many health issues that affect him/her:
A} Back & Neck Ache:
People who suffer from this issue are probably due to the bad sitting posture.
To avoid this, the person should use an adjustable chair & set it properly. The keyboard should be lower than the elbow, while the monitor should be at the eye level.
Taking regular breaks might also help.


B} Eye-Strain:
After using computer for a long time, the person might feel pain in the eyes. The eye-strain can cause headaches too.
To avoid this, the person should look away from the monitor at regular intervals, and take regular breaks. The usage of anti-glare filter on the monitor cuts down the reflection that can tire the eyes.

C} Repetitive Strain Injuries {RSI}:
Typing and using the mouse for a long time are the common causes of RSI that causes:

1- Carpal tunnel syndrome: cause pain in the forearm and wrist.

   2- Cubital tunnel syndrome: affects the elbows.
   To avoid this, use a wrist-rest to support the wrists while typing. Taking regular breaks helps too.


2- Identify the main safety issues.

Working on a computer for a very long time can cause many safety issues like:
A} Fire. It might happen when a computer over heats. A fire extinguisher is always good to be kept nearby and exits should be kept clear for any danger.

B} Tripping over wires. Those tripping can cause some injuries to the person, it could be avoided by covering up the wires or keeping it in a place where no one passes by.

C} Danger caused by the falling of heavy equipments. The falling of any heavy computer device can lead to many serious injuries. This could avoided by providing a stable place to keep on it the equipments and also by being careful.





Data Security & Legal Issues


1-          What is data protection act?
The data protection act controls how the personal information is used by organizations, governments or companies. It’s passed by the British government in 1998. It sets rules for people who use or store any data about other people giving rights to the people who had their data’s collected.


2-         Who is the Information Commissioner?
The person who has overall responsibility to enforce the data protection act in his respected country.

3-         Who is the data controller?
The person (or people) who determines the purposes for which and the manner in which any personal data are, or are to be, processed.

4-         Who is the data subject?
The individual who is the subject of personal data.


5-         Who are the data users?
The person who can access, use and process data.

6-         What’s personal data?
It means the data which is related to a living individual and can be identified through out those data or from other information which is in the possession of the data controller.


Q} Find & list all 8 points of the DPA.
The personal data should be:

1-          Processed fairly & lawfully.
2-         Obtained for specified and lawful purposes.
3-         Adequate, relevant and not excessive.
4-         Accurate and up to date.
5-         Not kept any longer than necessary.
6-         Processed in accordance with the “data subject’s” rights.
7-         Securely kept.
8-         Not transferred to any other country without adequate protection.



Sunday, February 23, 2014

Online Services, Security & Privacy of Data.

Identify the main data security aspects in below categories:

Need to protect confidentiality of data, Shop security, online banking and online shopping.






Online Services

1-Define online services.
It’s a business that provides its customers with many services that can be done over the internet. It allows the subscribers to communicate with each other using e-mails or by any other communicating form. Subscribers can get unlimited updated information. These services might be free or paid.



2-Describe the effects of them on society.
Online services made the life easier; less time is consumed as the person can do whatever s/he wants over the internet. Less money is spent too, as it is cheaper. Health problems can be caused due to the wrong sitting positions.


Online Shopping
1-Define online shopping.
Online shopping is a form of electronic commerce, where the costumer can buy goods directly from the seller over the internet using a network.

2-Identify the pros and cons for both businesses and costumers.
*Pros:
-Convenient
-Saves time
-There is wide range of the choices.
-Comparing of the prices can be done.
-Available all the time.
*Cons:
-Expensive (due to the shipping costs)
-Costumer has to wait so s/ he can get the product.
-Products can be damaged.
-Sometimes goods are not delivered.
-Risky (some websites are not safe).




3-Describe the online shopping process.
1-    Choose a  TRUSTED website that you want to order from (remember that HTTPS must be shown as it’s safe)
2-    Open the website and choose the things that you would like, (choose the perfect size, color..Etc).
3-    Add your stuff to the basket and proceed to checkout.
4-    Enter the billing information (remember: the website that you use should be safe!)
5-    After you’ve done these steps, wait for your goods and products to arrive!

4-Identify the security issues.
Unauthorized access can be a threat, fake or broken products can be sold, getting wrong prices, theft can occur during the process.