0% found this document useful (0 votes)
9 views20 pages

AIS 1 Reviewer MIDTERMS

The document discusses the role of Information Technology (IT) in business, emphasizing its necessity for operations, management, and customer interaction. It outlines various components of information systems, including data processing, storage, and the importance of decision support systems. Additionally, it highlights the evolution of IT in the digital age, the impact of emerging technologies, and career opportunities in the field.

Uploaded by

Scoopy Scoop
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views20 pages

AIS 1 Reviewer MIDTERMS

The document discusses the role of Information Technology (IT) in business, emphasizing its necessity for operations, management, and customer interaction. It outlines various components of information systems, including data processing, storage, and the importance of decision support systems. Additionally, it highlights the evolution of IT in the digital age, the impact of emerging technologies, and career opportunities in the field.

Uploaded by

Scoopy Scoop
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Modern Information and Technology

AIS 1 – Reviewer - IT is defined as the study and


application of computers, network
and telecommunications
Chapter 1 – Business and information - It can store, manipulate, retrieve,
Technology manage and send Information
- Used to support the business
activities
What is business? - Increase profit and improve service
 Exchange of products quality
 Production
 Distribution Additional:
 Sales of goods and services
 Movement to customers System analyst
- Analyze and input systems
- manages and enhances computer
Business and Information Technology systems directly for organizations
- They believe that business could or their clients.
not survive without the integration - One who receives Feedbacks
and use of information technology
(IT) IT Programmers
- Business rely on computers for: - Creates program
 Daily operations - Provide codes and structures
 Banking Systems
 Business Activities
- Now used by different  Administration
organizations  Production
 Government  Sales
 Non-government (NGO)  Management
 Local businesses  IT tools can be access by
 Small businesses customers, clients, staff, and
- Most popular is the banking system employees (MSteams)
 Paypal
 Gcash Modern Information Technology
 PayMaya - Businesses are available online
through social media or social
network
Business Oganizations as a System
- Added value to their clients and Queue Management System
customers. - To facilitate/Lessen waiting process
 Banks,
 medical institutions
 insurance company

Business on the information


Technology Era (The Digital Age)
- Should react to opportunities and
problems
 Lack of sustainability
- Internal and external factor
 Internal
 Employees
 External
 Government
 Laws
 Factor
 Customer’s Demand
Business that popular in the Digital Trends in Information Technology
Age Development
- Internet of Things
CALL CENTERS  No need for human
- In demand jobs all over the world Interactions
- Handles inbound and outbound  Alexa
calls - Development of Web Applications
- Technical support issues  Automatically edited and
- Customer complaint shared
- Account inquiries  Google Docs
- The Brainpower of Artificial
BANKING Intelligence
- Online Banking  ChatGPT
- Mobile Banking

The Changing Role of IT in Business

IT in Business
- Shifted Majority of their operations
- Traditional to Automated
- Helps to improve productivity
(technological tools and
application) and monitoring (real
time inventory management
Role of IT in other fields
- Education
- Communication
- Government
- Economy
- Health and Medicines
- Music and Arts and Sports
Educational Technologies
- Glogster
- Mentimeter
- Electronic Learning Organizer
- Constant Therapy

Learning Management system


- Canvas
- Blackboard
- MS Teams

Health
- Computerized axial tomography
- Magnetic resonance imaging
Career Opportunities
- Help desk technician
- Technical support analyst
- Business Intelligence Analyst
Chapter 2 - Introduction to
Information System
- An information system (IS) is a man
made system that collects, stores,
retrieves, processes, manages, For example, if company XYZ Corporation
disseminates, and analyzes wants to collect data to get feedback from
information its customers regarding its services and
performance, it must consider the
INFORMATION SYSTEM AND THEIR following:
CAPABILITIES  Indicators must be clearly defined
- Centralized focus on the to measure effective performance.
development of technological  Collected Data must be complete,
innovations relevant, reliable, and accurate.
 Collected data must be gathered
Information System on time.
- In Digital Age, an Information  Data must be convertible into
System (IS) is used by people and information that is needed.
business organizations  Data must be entered into the
- Information system is a combined computer system.
set of modules for gathering,  Information must be analyzable
processing, and storing of data. using appropriate technological
- Focuses on the development of tools and allow for proper
technological innovations interpretation

DATA VS. INFORMATION SYSTEM


- defined as a collection of parts that
Data interact, interconnect, and work
- From the Latin word “datum” together to accomplish certain
- Raw, unorganized, and objectives
unprocessed facts SUBSYSTEM
- Can be in a form of number, - is a part of a whole system that has
alphabets, date, measurement, and its own area of immediate focus.
even statement
TYPES OF SYSTEMS
Examples:
 A student’s class A. NATURAL SYSTEMS
attendance - these systems are made by nature.
 A car’s accident record
 The price of a meal at B. MAN-MADE SYSTEMS
McDonald’s - these systems are designed,
 A student’s exam score developed, and implemented by
human
INFORMATION
- Refined, structured, and organized Note: A COMPUTER SYSTEM TAKES
data. INPUTS AND PROCESSES THEM TO
- Transforms data into information CREATE OUTPUTS.

Examples: INPUT
 Financial Statements - data that is entered into a system,
 Average exam scores in class device, or process

ADDITIONAL NOTE PROCESS


- The collection of data should - Refers to a series of actions, steps,
always have a clear purpose and or operations that are carried out in
plan for their use a specific order to achieve a
- In business, main reason for particular result or goal.
collecting data is to monitor and
improve performance OUTPUT
- In the context of computing,
"output" refers to the information
that is produced by a computer
after it has processed the input MANAGEMENT PROCESS
- main objective is to plan, manage,
and control the overall operations
of a business organization

STORAGE
- refers to a method and medium
used to save and retain data and
programs for future use.

2 Types of Storage

1. PRIMARY STORAGE
- temporary storage used for data
that is actively being processed by
the CPU.
2. SECONDARY STORAG
- used for long-term data retention.
CAPABILITIES OF AN INFORMATION
MASTER DATA SYSTEM
- are relatively permanent data that
are stored in the IS for a long time A. PROCESSING TRANSACTIONS
Example: QUICKLY AND PRECISELY
 customer master data - Each activity done over an IS is
 employee master data called a transaction.
 subject master data - Transaction processing - an IS
can record, store, delete, capture,
TWO TYPES OF UPDATES THAT CAN and update data easily
BE MADE IN THE MASTER DATA POINT OF SALE (POS)
- hardware merchants use to process
INFORMATION PROCESSING payments and complete customer
- data processing functions that are purchases
commonly related to internal
operations and economic and
financial activities
DATA MAINTENANCE
- system's functional activities such
as adding, saving, deleting,
updating, retrieving, and editing
data from the master data.
B. MANAGING LARGE-CAPABILITY
STORAGE AND FAST AND EASY
ACCESS STORAGE
THREE LOGICAL COMPONENTS OF A
BUSINESS PROCESS WITHIN THE C. EFFICIENTLY COMMUNICATING
SCOPE OF AN IS THROUGH A NETWORK
- networks could transmit data, such
INFORMATION PROCESS as text, audio, video, and
- consists of locating and capturing documents simultaneously
information, using software to
manipulate it into a desired form, D. EASING INFORMATION
and outputting the data OVERLOAD FOR USERS
- is must be designed to analyze
OPERATIONS PROCESS problems and support decision-
- consists of people, policies, making to reduce information
procedures, and equipment whose overload.
main objective is to accomplish a
certain goal of a particular business E. SUPPORTING DECISION-MAKING
organization.
- Decision Support System or Examples: printer, mouse, keyboard,
DSS - a computer program scanner
application used to improve a
company's decision-making SOFTWARE
capabilities. - It consists of the computer
programs that govern the operation
F. SERVING AS A COMPETITIVE of the computer.
WEAPON AGAINST Examples: word processor and
COMPETITORS multimedia software

G. UNITING AN ORGANIZATION
THROUGH THE COORDINATION
OF ITS BIG AND SMALL GROUPS

H. STRENGTHENING
ORGANIZATIONAL MEMORY
AND LEARNING AND
EXPLORING NEW THINGS

I. DETERMINING THE PROCESS OF


SEPARATING PRODUCTS AND
SERVICES

J. AUTOMATING BUSINESS
PROCESSES

COMPUTER-BASED INFORMATION DATABASES


SYSTEM - It refers to a collection of related
- An information system can be files and records that are stored in
manual (paper-based) a special location for easy access.
computerized. Examples: MS Access and Oracle

NETWORKS
- It refers to the connection of two or
more computers established for the
purpose of sharing various data.
Examples: Local Area Network (LAN),
Metropolitan Area Network (MAN), and
Wide Area Network (WAN)

PROCEDURES
- These are the rules, policies, and
methods that administer the
Computer-Based Information System operation of a computer system.
- A Computer-Based Information They are as significant as the
System (CBIS) is a single set of people using the system.
hardware, software, databases, - Good procedures can help
telecommunications, people, and companies take advantage of new
procedures that are configured to opportunities and avoid potential
collect, manipulate, store, and disasters.
process data into information.
PEOPLE
HARDWARE - They are the most crucial
- It consists of the system’s physical component of an IS. They are the
devices. people who work with an IS to
- produce useful outputs.
- - The people involved include:
- It consists of computer equipment  users of the system
used to perform input, processing,  IS personnel
storage, and output activities.
COMPUTER BASED IS COMPONENTS
TELECOMMUNICATIONS
- IS the electronic transmission of TRANSACTION PROCESSING SYSTEMS
signals for communications, which (TPS)
enables organizations to carry out
their processes and tasks through EXAMPLES:
computer networks.  PAYROLL SYSTEM
 ORDER PROCESSING SYSTEMS
 SYSTEM FOR PAYMENTS AND
FUND TRANSFERS
 ACCOUNTS PAYABLE AND
ACCOUNTS RECEIVABLE

INTERNET
- Is the world’s largest computer SABRE
network, consisting of thousands of
interconnected networks, all freely - The first online reservation system
exchanging information. revolutionized air travel and
WWW hastened globalization was
- World Wide Web developed by IBM for American
- It is accessible through the Airlines in the early 1960s. Sabre
Internet, and it consists of was designed to process up to
multimedia collections that are 83,000 daily transactions and ran
stored in a particular database of a on two IBM 7090 computers. Later
CBIS. iterations of Sabre, such as Airline
Control Program (ACP) and
OTHER TYPES OF INFORMATION Transaction Processing Facility
SYSTEMS (IS) (TPF), would be adopted by large
banks, credit card companies and
hotel chains. These days,
companies across every major
industry rely on modern TPS
software for processing business
transactions.

MANAGEMENT INFORMATION
SYSTEMS (MIS)
- A CBIS consisting of hardware and
software that supports business
transactions.
- Collects, analyzes, processes, and
reports data to assist in decision-
making
- Provides managers and executives
with constant access to data and
reports for evaluation and decision-
making.

- EXAMPLES:
 SALES MANAGEMENT - Utilizes technologies like computers
SYSTEMS and workstations, connected
 INVENTORY CONTROL through a LAN (Local Area
SYSTEMS Network), enabling information
 BUDGETING SYSTEMS sharing across management levels
 HUMAN RESOURCE - Coca-Cola uses an Executive
MANAGEMENT SYSTEMS Information System (EIS) to provide
its executives with real-time data
DECISION SUPPORT SYSTEMS (DSS) on sales, supply chain efficiency,
- Computer-based application that financial performance, consumer
helps companies identify and give behavior, and sustainability efforts.
solutions by making decisions on
how to solve problems. DEVELOPING INFORMATION SYSTEMS
- Delivers information to managers - Will discuss how the different
who make assessments about approaches involving how
specific scenarios that are not well- information system (IS) is
managed. developed and implemented by
whom and what

INFORMATION SYSTEM
- Information systems is an umbrella
term used to describe the various
networks, hardware, and software
that people and businesses use to
make sense of data and put it to
use. In addition to interpreting
data, information systems also
collect, process, and distribute it.
EXAMPLES:
 GROUP DISCUSSION SUPPORT SYSTEMS DEVELOPMENT
SYSTEMS - Consists of the procedures in
 COMPUTER-SUPPORTED building and upholding IS. It
COOPERATIVE WORK SYSTEMS includes the five main components
 LOGISTICS SYSTEMS of IS such as hardware, software,
 FINANCIAL PLANNING SYSTEMS data, procedures, and people. It
 SPREADSHEET MODELS has a combination of one’s
technical expertise with knowledge
AAIMS and management skill in business
- One of the first data-driven DSS
was built using an APL-based SYSTEM DEVELOPMENT LIFE CYCLE
software package called AAIMS, An (SDLC)
Analytical Information Management - Is one of the methodologies used in
System. It was developed from software development. The SDLC
1970-1974 by Richard Klaas and emphasizes that the system can be
Charles Weiss at American Airlines developed in a series of phases.
(cf. Alter, 1980). This simply means that each phase
must be completed first before
EXECUTIVE INFORMATION SYSTEMS another phase commences.
(EIS)
- Assists senior executives of
organizations in making decisions PHASES OF THE SYSTEM
by providing easy access to DEVELOPMENT LIFE CYCLE
valuable information necessary to
achieve organizational goals.
clients, stakeholders, managers,
and the like.

TESTING
- The system test may require a
series of tests depending on the
scope and involvedness of the
requirements, including the six
main quality characteristics
(ISO/IEC 9126):
 Functionality
PLAN  Reliability
- Determining a business problem or  Usability
verifying if there are problems and  Efficiency
opportunities that might exist  Maintainability
- Investigating if the solution to be  Portability
given to the problem(s) is feasible
such that there would be an
improvement on the IS to be - The entire system must be
executed prepared for the congregation
- Obtaining a project management before proceeding to the
plan approval for implementation integration and testing stage,
meaning:
 All hardware and software
configurations must have
been constructed and
tested successfully
 All integration plans are
ready and prepared

ANALYSIS
- Functional requirements -
defines a system or its component
(e,g, aunthentication, error
handling and logging, backup and
recovery, etc.). IMPLEMENTATION
- Non-functional requirements - - The implementation or deployment
defines the quality attribute of a phase first installs the system in
software system (e.g. efficiency in the production environment and
use, intuitiveness, low perceived makes it ready for operation.
workload). - A canary release is when they
deploy the software to a small
DESIGN group of users first to catch any
- This phase aims to transform the problems before a full release.
system requirements that have The following has to be confirmed:
been identified during the previous  The fulfillment of all the functional
stages into a more detailed system and non-functional requirements
architecture that will be feasible,  The approval of business
full-bodied, and valuable to the necessities
organization.  An observation of all
authorizations, physical
DEVELOPMENT constraints, and service level
- Developers write code and build agreements
the app according to the finalized  The operations as mentioned and
requirements and specification discussed in the user manuals
documents.

Solutions in coding may be through


the following:
- The availability of technical MAINTENANCE
specifications - It is the phase where modifications
- Approved and signed-off blueprints are made to enhance performance,
of the system architecture by solutions to the problems or system
errors encountered are derived, OFFICE 365
security enhancements are - Offers major features that were
performed, and user requirements previously not available in the
are addressed. Microsoft office product line.
- Security enhancement is essential
- With the invention of Office 365,
to ensure that information and the
entire system are free from
business processes have
malware or malicious software. become easier and faster.

INFORMATION SYSTEM SECURITY MICROSOFT WORD


- Information security means - it is a word processing program
protecting information and ISs from that is designed for both
malicious software and Windows and Mac operating
unauthorized access, use, systems.
disclosure, modification, disruption, - It allows users to perform many
or destruction.
tasks, was launched in 1983 by
- Information security management
is the process of identifying the
the Microsoft Corporation. It is a
security controls to keep and word-processor program that
defend information assets. allows users to create, edit, and
format documents on various
platforms and devices.

MICROSOFT EXCEL
- it is a spreadsheet program that
includes features such as
calculation, macro programming
and graphic tools
- Microsoft Excel enables users to
format, organize and calculate
data in a spreadsheet. By
organizing data using software
like Excel, data analysts and
other users can make
information easier to view as
LESSON 3: EMERGING CONTRACT data is added or changed.
TECHNOLOGIES FOR BUSINESS
PROCESSES

OFFICE APPLICATION TOOLS MICROSOFT POWERPOINT


- Are among the most commonly - it is widely used by employees,
used application tools in a business staff and the top management
organization, these tools are in business organizations for
utilized by both small and large business presentations.
organizations and offices. - It allows users to create and
- Business organizations that use show slides with text, images,
these tools generally spend less and media. It is part of the
and are more versatile. It helps Office suite and can be used for
increase a company’s business, education, or informal
productivity. purposes.

MICROSOFT OFFICE MICROSOFT ONENOTE


- is a family of powerful office - It is a free-form information
applications that support gathering program that allows a
various business processes. user to collaborate with other
- It was first announced in 1988 users.
and has evolved over the years - Functions: Creating notes in
to include desktop, web, and both typewritten and
mobile versions handwritten forms, clipping and
adding audio commentaries
decision as quickly as possible
MICROSOFT OUTLOOK and this application also
- Many business organizations includes aggregation and query
use microsoft outlook as their filtering
default webmail service.
- It allows users to share OFFICE MOBILE
information in the form of - With the advent of technologies,
folders, forms and so on. it can now be accessed using
mobile phones through a
MICROSOFT PUBLISHER software called an application.
- It focuses on page layout rather - a unified Office mobile app for
than text composition. It is Android and iOS, which
widely used for designing combines Word, Excel, and
banners, invitations, PowerPoint into a single app and
advertisement, brochures etc. introduces new capabilities as
making quick notes, signing
MICROSOFT ACCESS PDFs, scanning QR codes, and
- Is used to create a database transferring files.
whose main purpose is to
organize, store, maintain and COMPUTING TECHNOLOGIES
manage data information for - defined as the process of
reporting and analysis. utilizing computer technology to
- Free of charge and can complete a certain task.
effectively manage info within Computer technologies involve
the organization. computer hardware, computer
software, data, and procedures
that would perform certain
tasks or functions

VOICE AND VIDEO TECHNOLOGY


- In an automated office, audio
and video technology is
popularly used in conducting
teleconferencing, computerized
teleconferencing, and
videoconferencing.

BENEFITS OF MICROSOFT ACCESS


TELECONFERENCING
REDUCE REDUNDANCY AND - Used by companies to conduct
INCONSISTENCIES meetings with multiple people
- maintaining one database from different geographical
results in less duplication of locations. With the help of
data and inconsistent values digital technology, participants
INCREASE PRODUCTIVITY can exchange ideas, have
- It is easier for a user to change fruitful discussions, and
or edit values in a database. communicate freely with each
SECURE DATABASES other using a computer system.
- This application protects - The system allows two-way
databases files through voice and text messaging, even
encryption and passwords. video interaction with people
MAKE BETTER DECISIONS over wide distances in real time
- Reports are easier when done in
Ms Access, users can make BENEFITS OF TELECONFERENCING
• Save time - Applications that are used by
• Conserve energy business organizations,
• Avoid travel risks individuals, or groups of
individuals for the purpose of
networking and sharing of
COMPUTERIZED information, videos, photos,
TELECONFERENCING graphics, and others.
- can also be referred to as
computer teleconferencing.  Platform as Home a Service
- has a huge database that (PaaS)
contains large amounts of text - This provides a complete, fully
messages. These text messages managed cloud hosted platform
can be in the form of a letter or —hardware, software,
conference entry entered by development tools and
any member of the conference. infrastructure—via internet
connection for customers who
VIDEOCONFERENCING want to develop their own
- Conferencing that requires applications.
people to participate from
various locations and time TYPES OF PaaS
zones transmitting audio and
video data to achieve their Social Application Platform
purpose - Platform that provides third
parties with full access and
CLOUD COMPUTING gives the opportunity to access
- Refers to the use of technology and write functionalities that are
that uses the Internet and available for all users
remote servers to maintain data Business Application Platform
and applications - Higher technical complexities
that lead to transaction-based
SERVICE MODEL OF CLOUD business applications
COMPUTING Computing Platform
- Computing Platform Service
 Software as Home a Service that provides processors,
(SaaS) storage, and bandwidth
- This is a cloud computing model Web Application Platform
where applications are hosted - An application that provides API
on the cloud and accessed via and other functionalities to
web browsers, mobile apps, or developers to build web
thin clients. applications that leverage their
mapping or calendar.

TYPES OF SaaS

Business Utility SaaS  Infrastructure as a Service


- Application used by business (IaaS)
organizations, individuals, or - This provides on-demand access
groups of individuals to manage to cloud-hosted compute,
and collect data, streamline network and storage resources
collaborative processes, and on a pay as-you-go basis.
provide organized analysis
Classifications of the Cloud
Social Networking SaaS Deployment Model
PRIVATE CLOUD  Connectivity
- This type of deployment model  Personalization
refers to the cloud infrastructure  Social Engagement
that is used and operated by  Marketing
only one organization.
COMMUNITY CLOUD
- This type of deployment model GREEN COMPUTING
refers to the cloud infrastructure - Green IT
that is shared by many business - Study of designing, engineering,
organizations and support manufacturing, using, and
certain communities that share disposing of computing devices
the same sentiments and in a way that reduces
concerns. environmental impact
- Reduce, reuse, recycle in
PUBLIC CLOUD computer systems
- This type of deployment model
refers to the cloud infrastructure Green IT practices
that is made available to a large  Environmentally sustainable
industry group or to the public. production practices
It is normally owned by a  Energy-efficient computing
business organization that sells devices or computers
cloud service.  Improving disposal procedures
HYBRID CLOUD  Improving recycling procedures
- This type of deployment model
refers to the cloud infrastructure STAGES OF GREEN COMPUTING
that is combined with two or Design Strategy
more clouds (private, - Contact core of green designing
community, or public) that are is the engineering of energy-
bound by standardized Contact efficient computers and digital
or proprietary technology. devices that are
environmentally friendly
MOBILE COMPUTING Manufacture
- Term used to describe various - waste materials during the
devices that allows users to production stage of computers
transmit data from one remote and other systems are minimize
location to another. Use
- Strategy Contact refers to the
 Increase in productivity eco-friendly and cost-efficient
 Improvement in flexibility utilization of computers or other
 Better cost control peripheral devices
 Better communication Disposal
- appropriate discarding of used
- Secure networks, data, and computing devices
devices

GRID COMPUTING
Risks of Mobile Computing - Grid computing has emerged as
 Connectivity Issues the next useful stage in
 Security Issues and Concerns distributed computing. It offers
a high degree of resource
Advantages of Mobile Computing sharing and proper collaboration
on a scale that would exceed Smart transportation
even the power of the World - it relies on data sent between
Wide Web (WWW) and the vehicles and different
currently available distributed transportation infrastructures
computing.
IOT IN BUSINESS
GRID COMPUTING IN MAJOR
BUSINESS AREAS Equipment maintenance
 Higher education prognostics
 Financial services - with IoT applications, equipment
 Life sciences maintenance is easier to
 Government services perform because these
 Engineering services applications can predict future
 Collaborative games failure or detect equipment
issues.

INTERNET OF THINGS (IOT) Shelf and warehouse management


- smart shelving is achieved with
Contact IoT Can Change the World of the use of weight and pressure-
Business sensitive shelves integrated
with RFID and barcode scanning
- a network of physical devices of goods.
that are connected, embedded,
or equipped with sensors, Warehouse automation and
electronics, and other transfer robotics
mechanisms that enable them - robotic devices integrated with
to connect, communicate, and IoT technology and self-
exchange data and resources organizing pallets do more than
whether through wired or just assemble orders and
wireless networks facilitate organization; they also
allow employees to focus on
Common IoT Applications their tasks of handling
customers
Smart home devices
- these are devices or Smart store
applications installed in modern - these stores improve customer
homes that can often be shopping experience, manage
remotely controlled by the and monitor store traffic, meet
owner using a mobile app customer demands accurately,
Wearable Technology and improve customer service.
- these are electronic devices
that can be worn as accessories, Data Analytics
implanted on a user’s body, or - through IoT applications used in
embedded in clothing smart shopping, customer
IoT Healthcare Devices shopping behavior can be
- these are medical devices that analyzed and predicted through
are made more capable through data collection and information
their connectivity. These devices interpretation.
gather patient data and receive
inputs from medical
practitioners.

Connected cars
- These are vehicles with access
to the Internet of the cloud.
ARTIFICIAL INTELLIGENCE
- AI has significantly transformed ENTERPRISE REPORTING
society since its inception. - It refers to a program that
- Originated in 1943 with Warren builds infrastructure specifically
McCulloch and Walter Pitts, for strategic reporting to
drawing from physiology and support the strategic
neuron functions management of a business. It
- AI enables machines to use may involve executive
algorithms for interpreting, information systems, online
learning, and making decisions analytical processing (OLAP),
based on data. and data visualization
- It allows for analyzing vast MEASUREMENT
amounts of information - It refers to a program that
creates performance metrics
ARTIFICIAL INTELLIGENCE KEY and performs benchmarking
APPLICATIONS IN BUSINESS that aids business leaders in
 Robotics determining how to progress
 Speech Recognition toward certain business goals.
 Cybersecurity COLLABORATION PLATFORM
- It refers to a program that
initiates and obtains inputs from
MACHINE LEARNING various areas (both from inside
- allows computers to learn and outside the business) to
automatically without human work and collaborate with each
assistance and intervention. other by data sharing or
electronic data interchange
BUSINESS APPLICATION
- involves processes, KNOWLEDGE MANAGEMENT
technologies, and tools that - It refers to a program that
transform data into actionable makes a business data-driven.
insights for profitable business
actions

KEY COMPONENTS
Data Warehousing LESSON 4: E-COMMERCE, E-
- Collecting and storing data. BUSINESS AND M-COMMERCE
Business Analytics
- Analyzing data to inform
decisions THE INTERNET
Knowledge Management - International Network
- Converting information into - Is a large network used by
strategic plans business organizations to
establish E-Business and E-
BI Applications in Organizations commerce websites

WORLD WIDE WEB


ANALYTICS - Provides unrestricted access to
- It refers to a program that and publishing of information
builds quantitative processes for over the internet using web
organizations or businesses to browsers
arrive at the most favorable
decisions and perform business E-BUSINESS
knowledge discovery. - Refers to any online-run
business. It is also used as a
technique used by business
organizations to be more
productive and profitable
through the use of IT - Network of business
(Information Technology) organizations that has a limited
scope, giving access only to
trusted entities

COMPUTER NETWORKS

PERSONAL AREA NETWORK (PAN)


- COMPUTER NETWORK THAT
ALLOWS COMMUNICATION INTERNET
BETWEEN DEVISES CLOSE TO - Largest network
EACH OTHER - This connection is offered and
managed by service providers
LOCAL AREA NETWORK (LAN)
- ONE OF THE MOST COMMONLY E-BUSINESS OPPORTUNITIES
USED COMPUTER NETWORKS
- COVERS A SMALL AREA SUCH REACH
AS A HOUSE, ROOM, OR - Refers to the potential number
BUILDING of customers that a business
organization can interact with
CAMPUS AREA NETWORK (CAN) through the internet
- COMPUTER NETWORK THAT IS - Is also the number of categories
SPECIFICALLY USED FOR and products that can be
ACADEMIC INSTITUTIONS covered in a consumer interface
such as catalogues, websites,
METROPOLITAN AREA NETWORK etc.
(MAN) RICHNESS
- COMPUTER NETWORK THAT IS - The information that business
USED FOR A TOWN OR A CITY organizations can share to their
consumers
WIDE AREA NETWORK (WAN) - Business organizations should
- COMPUTER NETWORK THAT IS maintain the accuracy,
USED FOR A REGIONAL OR reliability, and security of the
NATIONAL AREAS information about their products
to prevent issues in the future
INTERNATIONAL NETWORK
(Internet) AFFILIATION
- CONSIDERED AS THE LARGEST - It refers to the effectiveness of
COMPUTER NETWORK THAT the linkages between business
ALLOWS USERS TO ACCESS organizations
WITHOUT RESTRICTIONS - More linkages means more
influence and reach
3 NETWORKS FOR E-BUSINESS - Better customer relationships
through online customer service
INTRANET
- The internal network of a E-COMMERCE FUNDAMENTALS
business organization which
only authorized users can ELECTRONIC COMMERCE
access the network - It refers to commercial
- It uses web browsers and file transactions executed online
transfer applications which are using the Internet.
under the supervision of the - uses the World Wide Web
business organization (WWW) for its transactions.

EXTRANET BUY-SIDE AND SELL SIDE E-


COMMERCE
- FOCUSES ON SUPPLIER goods, business operations, or
- FOCUSES ON THE CONSUMERS reselling of products
BUSINESS-TO-CONSUMER (B2C)
- type of commercial transaction
in which businesses sell
products or services directly to
consumers.

4 TYPES OF ONLINE PRESENCE


 Transactional and E-Commerce
Websites
 Portal or Media Websites CONSUMER-TO-CONSUMER (C2C)
 Brand Building Websites - C2C is used similarly as the
 Service-Oriented Websites classified advertising section of
a local newspaper or an auction
FEATURES OF E-COMMERCE page. It is a convenient way for
consumers to buy and sell
UBIQUITY goods without physically going
- The marketable transaction is to a store.
accessible at any time,
anywhere in the world. BUSINESS-TO-GOVERNMENT (B2G)
UNIVERSAL STANDARD - B2G is a business model that
- A website that can be operated refers to a business that sells
on a standard platform which products, services, or
follows identified methods and information to governments
systems. and/or government agencies.
INTERACTIVITY
- The relationship between a GOVERNMENT-TO-BUSINESS
consumer and an e commerce - This model refers to
website government agencies that
GLOBAL REACH AND SECURITY provide services or information
- Global Reach is the maximum to a business organization.
number of possible consumers a
business can reach. Security is GOVERNMENT-TO-CITIZEN
essential when working globally. - This model is being used by the
RICHNESS government to approach and
- The volume of the content of communicate with citizens in
the website and the way it is general.
used by consumers
INFORMATION DENSITY E-COMMERCE SECURITY SYSTEMS
- The amount of products that
can fit on a computer screen.
There is no given standard for AUDITABILITY
an e-commerce website’s - data should be documented in
information density such a way that it can be
audited for the real
BUSINESS MODEL OF E- requirements.
COMMERCE AVAILABILITY
- it is a requirement that
BUSINESS-TO-BUSINESS (B2B) information must be available
- a marketing type of business anytime and anywhere, and it
wherein businesses provide must be bound by a time limit.
products or services to other AUTHENTICITY
businesses for the production of - there should be procedures to
authenticate a user before
giving him/her access to the - This is another form of mobile
required information. access that was introduced by
CONFIDENTIALITY the Japanese.
- information should be kept and - displays content using HTML.
not be accessible by an 3. Wireless Application
unauthorized user. It should not Protocol (WAP)
be interrupted during the - this is a technical standard used
transmission. for the transfer of information to
specific wireless devices, such
as mobile phones.
4. Personalized Services
- Mobile phone users have
increased tremendously over
the past years. Consumers can
ENCRYPTION gain access to wireless service
- information must be secured whenever there is an available
through the encryption and network.
decryption of an authorized
user.
INTEGRITY ADVANTAGES AND
- information must not be DISADVANTAGES OF
modified during its transmission M-COMMERCE
over a network. Honesty and
strong moral principles must be ADVANTAGES
applied  CONVENIENT FOR BUSY
NON-REPUTATION CUSTOMER
- there should be assurance that  EASY INTEGRATE MARKETING
someone cannot rebuff on AND SALES
something. It is to certify that a  INTEGRATES WELL WITH
person involved in the contract TRADITION RETAIL
or in communication cannot  DIRECT COMMUNICATION
refute the authenticity of their DISADVANTAGES
signature on a document  REQUIRES TECHNOLOGICAL
LITERACY
M-COMMERCE  FRAUD AND SECURITY
- also known as m commerce, CONCERNS
refers to the use of wireless  COMPETITORS ALSO USING M
handheld devices, such as COMMERCE
mobile phones, to conduct  NEEDS TO BE RESPONSIVE AND
business-related transactions EASY TO USE
online.

BENEFITS OF MOBILE DIFFERENCES BETWEEN E-


TECHNOLOGY BUSINESS AND E COMMERCE
 UBIQUITY
 SECURITY
 REACHABILITY
 CONVENIENCE
 PRIVACY
 AVAILABILITY

M-COMMERCE FORCES

1. Fourth (4th) and Third (3rd)


Generation Technologies
2. iMode Access Platforms
works of art, that have been
DIFFERENCES BETWEEN E- tangibly expressed.
COMMERCE AND M COMMERCE
SHIPPING RESTRICTIONS
- SHIPPING COMPANIES HAVE
DIFFERENT RESTRICTIONS ON
PRODUCTS OR GOODS.
- Research will help identify which
shipping companies could best
serve a business.

INVENTORY
- THERE ARE CERTAIN RULES AND
PROHIBITIONS THAT ALIGN
WITH LEASE, DEED, OR ZONING
CODES WHEN IT COMES TO
STOCK INVENTORY FOR
BUSINESSES
GUIDLINES AND LAWS GOVERNING
E-COMMERCE BUSINESS RESTRICTIONS
- The insurance depends on the
TAXES location and nature of a
(EVERY STATE AND/OR COUNTRY HAS business
DIFFERENT RULES AND LAWS
REGARDING TAXES.) PAYMENT CARD INDUSTRY (PCI)
- Conducting research and COMPLIANCE
understanding your target - SERVES AS PROTECTION FOR
market are necessary to avoid ONLINE BUSINESSES,
problems about taxation ESPECIALLY SOFTWARE-AS-A-
TRADEMARKS, PATENTS, AND SERVICE (SAAS) E COMMERCE
COPYRIGHTS PLATFORMS, FROM PROBLEMS
SUCH AS DATA THEFT
TRADEMARK
- It is a distinguishing word, Being PCI compliant also means
phrase, symbol, and/or design having to avoid the storage of oral and
that identifies the uniqueness of written information regarding
a product or service of one purchases. For example, keeping the
party from the others. card number of a customer recorded
on a phone call is prohibited
PATENTS
- Is an exclusive right granted for LAWS AND LEGAL REQUIREMENTS
an invention, processes, or IN THE COUNTRY CONCERNING
scientific creations. CUSTOMER SECURITY

COPYRIGHT  REPUBLIC ACT 8792 -


- It protects works of authorship, ELECTRONIC COMMERCE ACT
such as writings, music, and OF 2000
 REPUBLIC ACT 10173 - DATA
PRIVACY ACT OF 2012
 CONSUMER PROTECTION
REGULATION
 TAX GUIDELINES FOR E-
COMMERCE TRANSACTIONS
IN THE PHILIPPINES

REAL-WORLD EXAMPLES OF E-
COMMERCE AND M-COMMERCE

AMAZON
- It is an American e-commerce
website that gives users an
opportunity to buy products
online worldwide
EBAY
- It is an American e-commerce
website that provides various
services to consumers such as
auction, online payment, and
online shopping
ALIBABA
- It is a well-known Chinese
company that is now part of the
global market of e-commerce. It
specializes in retail, the
Internet, and technology
MOBILE VOUCHERS
- a prepaid debit card loaded with
a particular amount of money,
and it is used in place of cash or
a bank debit card to make
payment for goods and
services. Voucher come in two
forms- a physical plastic card
and an Ecode.

ETORO
- It is a platform that can be used
to invest in stocks or trading

You might also like