Saturday, March 30, 2019

Risks and Benefits of Modern Technology

Risks and Benefits of Modern engineeringThe earnings and other(a) appear technologies take e trulywhere been a source of jockstrap to organisations in the modern time. It could be argued that having a form of modern engineering science is inevitable in the bid to remain combative. info Technology perseverance and media commentators assert that ancestryes stand to gain many hits from usage of the profit. in that respect is no doubt that the net has transformed the way presidencys operate at present, non only do these improve processes, financial benefits atomic number 18 in addition increased. opus successful examples of com pan offies exploitation the net digest been widely reported, few studies oblige seriously examined the have it offs bear on.However, thither is always a flip side of the f entirely upon in everything, as the lucre and the other emerging technologies have their benefits to organizations. There argon excessively the disadvantages. This paper get out seek to analyze twain sides in detail and put forward possible solutions substantiateed up by explore which leave alone slash the risk of digital employment.George (1988) delimitate Emerging Technology as science based innovations that have the potentiality to create a mod industry or transform an subsisting one. They include discontinuous technologies derived from radical innovations. Examples are bio therapeutics, high-temperature super conductors, MRI imaging, vestige screen kiosk and the meshing. The Touch Screen Kiosk is a stark naked java-enabled technology. Touch-screen kiosks go beyond the capabilities of a traditional time clock in that they are true information appliances. They provide a bridge among the organization and the buildforce, both capturing workforce information and extending organizational information back to the employee. A kiosk-based solution for time, attendance, and labour tracking also offers organizations a scratch for em powering employees with self- operate. With the touch of a finger, employees apprize view Internet-enabled applications that display their schedules, vacation balances, and bodily messages or allow time and labour info entry. Workforce charge poop now be a two way street. (Rizzo, 2001)The Internet started in the 80s and since then it has had a drastic jar on culture, job and contrast and collect to the speed, litheness, and effectiveness that it offers, it has become the means for accomplishing a exploitation amount of subscriber line between suppliers and large international companies. With this, the Internet has created new worry to developing countries and has hastened the distribution of recognizel contact throughout the world of furrow. It and so creates unprecedented opportunities for developing countries beca character it green goddess remove barriers thereby fostering practiced participation in the new world(prenominal) economy. Some organisations purpose the mesh for almost every part of their organization such(prenominal) as acquire and delivery of goods, stock control, manufacture arrangement, communications plans, sales programs, assistance departments and hold water programs. The change from traditional communication channels such as sales peck, peal and snail mail to the internet and e-mail happened quickly in virtually companies. However, this transition took place slowly in others. (McKenna and Bargh, 2000)Emerging Technologies have instigated a new transaction method that decrease costs, hastens the pace at which proceedings are carried out, and supply acces to new markets, new clients, and new business relationships of all kinds. Even with all these benefits that the internet has brought to the business world, there are understood a lot of risks involved such as fraudulent proceedings, scams and more. This re chase would explain all these risks and benefits in detail.The Internet has enabled business to go furthe rmost beyond previously set or imagined boundaries. Today, change is constant, its speed is accelerating, and its global impact is felt everywhere.While the Internet offers many potential benefits, there are a number of unresolved issues in conducting business on it. Despite recent advances, tribute measure remains the most fundamental appertain and the main reason why companies hold back from full use of the net (van Kirk, 1994 Baron, 1995).Iver (2003) explains that online business is an infinite term virtually(predicate) the different business effects that plan to assimilate the merchants with the consumers and suppliers using the Internet. The whole procedure of putting up a sack upsite, helping the potential customer steer through the site, wake them the accessible products, whirl cut rate and coupons and doing everything possible to persuade the potential customers and changing them into customers, comes under the process of e-business. He further went to discuss abou t Electonic commerce which is a compartment of e-business and is defined as online business that wad be accounted for in financial terms. For instance, paying for goods and products with credit card by the consumers or patroniseping and paying online are examples of electronic-commerce. E-commerce could be explained as the last word form of e-business which involves the payments of the products sold by the organisation.The use of the internet has several disadvantages when conducting business transactions. check to Iver (2003), the main disadvantage of online business is the poor growth rate in certain segment on account of goods. For example, the food sector has non profited in terms of expansion of sales and resulting profits generation due to some(prenominal) certain reasons corresponding food products beingness an unpreserved item. Customers hardly search for food products and items on the Internet because they rather go to the stores to purchase the essential product w hen it is needed.It is also very easy to go into the online business as almost everyone has a laptop and is connected to the internet. This gives room for fraudulent activities since there isnt proper security in place to monitor the number of deal that develop shopping websites.Trust is also a study issue in online business because any problems with your business website volition be straightway be obvious to the world and the customers typically have little loyalty. imputable to competition, once your website is unavailable, customers volition simply move on to one of your competitors. In addition, adept failure can also have a prodigious impact on a callers key trading partners. Sid (2007) also discussed about the disadvantages of online business based on internet operate and trust issues.Internet TechnologyAccording to Sid (2007), he discussed about the disadvantages of practising online business. The first point is that the website of the business must keep functioning at all times this is the alike to a physical store staying open. If an Internet business goes offline due to technical issues, it can cost them profit therefore, its essential to either have the technical skills or have someone in the follow that possesses the technical skills to keep the company functional at all times.TrustSid (2007) also explained about the behaviour of people shopping online. In many peoples minds, purchasing products over the Internet is still non as safe as purchasing products in stores. Since people can non see the someone on the other end of the computer, they might have issues purchasing products. This is also dependent upon the products and the sector. Lacking consumers trust can significantly impact sales and overall success.According to Lewis (2002), internal network protection will be a big issue for the organizations that wish to offer their run to Internet-using customers around the world. Hackers and other internet criminals can infiltrate co mpany files and contaminate them with a virus, which is then sent to other computers to infect them. If the networks are not secured such people could also start important information about the company. Newly publicized weaknesses in the basic structure of the Internet repoint that the worldwide computer network may need a long redesign before it can be safely apply as a commercial medium. Lewis (2002) further went to explain about how jades can comfortably get access to different companies and can cover their traces without any study concerns. They like to trade data illegally and grass data to the hacker community. Calling-card numbers from long distance telephone service providers, cellular service activation codes, stolen credit-card numbers, security-penetrating algorithms and pirated software codes are among the data most frequently traded on the Internet. Hackers might also bombard a company with thousands of mail messages using automatic remailer tools. The posting of messages can knock out communications at a critical time in a competitive authority and even firewalls cannot protect a company well against these fires.Jerkins (1995) explained about Information security which is based on three foundationsData integrityA company must be sure that its data have not been changed.Confidentiality of dataCompanies have to be able to keep to themselves what they do not want others to know, such as their customer database, credit card numbers, etceteraAuthenticityCompanies need to be sure that messages they receive from the Net are from the people they claim to be.If any of these factors can be infiltrated by hackers, the company is no longer secure.Another risk is the increasing number of information brokers who use online communications to match buyers and sellers. Criminals always seem to always have an edge over law enforcement agencies.An online Internet organization also faces other challenge risks. Cafasso (1996) explains the case of staff m embers that always download big(p) material from the internet and go further to show them around in the work surround. This can create a hostile working environment and employees that view the adult material might feel sexually harassed within the company and could press charges. The company will have to ensure that employees cannot download such media files or other offensive materials from the Internet. It will have to develop morose guidelines to protect its own interests and the uncontrolled surfing habits of its employees.To do business on the Internet successfully, companies will have to ensure that the customer is indeed the person he or she claims to be. Verification and confirmation, written with an e-mail system, will work well enough for the time being. The advantages of using the internet or emerging technologies were explained by Iver in 2003.Worldwide PresenceAccording to Iver, 2003, this is the major benefit of transacting dealings online. An organization using e-bu siness can have a countrywide or a global presence. For example, IBM was one of the first firms to start practicing e-business to service customers and work in partnership with business associates all over the globe. dingle Inc. also had a prosperous business selling computers all over the US, through the telephone and the Internet till 2007. Amazon.com is also an accomplishment storey that assists customers buy globally from third parties. Hence, global presence is guaranteed if organizations reorganize their business by using the Internet.Cost Effective trade and PromotionsThe use of the web to advertise products ensures global reach at a small price. ad techniques like pay per click advertising guarantees that the promoter only pays for the advertisements that are really watched. Affiliate marketing, where customers are directed to a business penetration because of the efforts of the affiliate who in turn receive compensation for their efforts have-to doe withing with succe ss, have emerged on account of e-business. Associated marketing has assisted both the business and the associates. Organizations making use of e-business have handled to use cost effective online advertising strategies to their advantage. development a Competitive StrategyOrganizations need to have a competitive strategy over their rivals because without an effective strategy, it will be difficult to let the advantage and make proceeds. The strategy, that the organization can chase, can be a price strategy or a differentiation strategy. For instance, till the grade 2007, Dell Inc. was selling PCs only through the Internet and the phone. It took up a differentiation strategy by selling its PCs through the internet and personalizing its laptops to meet up with the requirements of the customers and it really helped their profits. Thus, engaging business online resulted in Dell Inc. being able to acquire a large sector of the market by making use of the differentiation strategy.Better Customer ServiceIver (2002) explained that doing business online has produced an improvement in customer service. Occasionally, when going through a website, the customer is always met by a pop-up chat window. Readily available customer service may assist in encouraging the customer to know more about the product or service. Furthermore, the products can be pay for online and can be shipped to the customers home. Internet services allow for asynchronous fundamental interaction and provide convenience for the client. The Web also makes access to people in remote areas feasible. This assistance, says Snow (2001), is able to bridge distances and help overcome a wide assortment of isolation economic, physical, emotional, geographical.Doing business on the Internet will become even more essential in the future. More organizations will have the right to use to the Internet and, with the price of communication decrease more customers will come to the Internet as well. The Internet offe rs extraordinary possibilities and could, in the long run, surpass conventional distribution channels. It is very impartial to get connected to the Internet and people can browse and shop on the Internet 24 hours a day, if they want to. The Internet offers an surpassing way to get in touch with the customers on a matched basis. Better emerging technologies will help organizations to represent themselves better and sell more products. So for people to keep enjoying the benefits on the Internet, it is important that the security issues must be addressed.Security on the Internet is a very vital issue, and some good solutions are beginning to form. Organizations that use the internet often need to protect themselves in three major areas data integrity, confidentiality of data and authenticity. It becomes more and more key to avoid hackers from stealing or tampering with data stored in organisations systems. This can be done by pose firewalls or routers. When data travels on the Net , it is normally intended to be read only by sender and recipient, which can be ensured with encryption systems. Finally, an organization wants to be sure that the parties it is communicating with are really who they claim to be. Authenticity can be obtained with digital signatures. Doing business online involves some risks, like any other business transaction. But if attention is devoted to installing secure procedures, it is no more risky than other business practices.Since security is essential in online business because of all the risk involved, one of the major organizations that provide such security for banks and other large organizations that deal with online business is Panda Security. It is one of the major leading IT security providers and an antifraud service for doing business online to guard against identity theft through malware attacks targeting banks that operate online, platforms for payment and electronic-commerce. This procedure advises companies when there is a targeted attack and provides the gears to spot and obstruct affected users which reduce any possibility of online fraud. This solution allows banks and organizations providing online services to ensure that customers initiating businesses on their websites are not contaminated by any malevolent code that affects the service. They can see the security status of their customers and efficiently supervise the danger involved in online business. This radically reduces the possibility of fraudulent actions.The benefits that this service offers organizations include decrement of online fraudPanda Security for Internet Transactions provides tools and information to persevere fraudulent activity. Organizations are instantly notified whenever there is a new malware attack targeting their customers, and delivered the information needed to respond in time. Organizations will see how the malware operates and how they can protect themselves. They can prevent infected customers from accessing the ir website, reducing the effects of online fraud. underwrite and management of threats to online transactionsThis is the only service on the market offering information about the security status of clients. This can be used by an organization to create risk profiles, meaning the service can be configured to restrict the permission to carry out transactions to those clients that meet pre-determined security requirements.Expanding business thanks to improved securityUsers inadequacy of confidence in online security is one of the prime reasons for their reticence to use Web services. This tool reduces online fraud and allows companies to offer clients a secure environment for online transactionsFor the business community, the Internet is a new limit, offering unrivaled prospects for development and growth. Organizations can provide their services throughout the world, with the variety of services multiplying daily. It is also obvious that the advantages of using the internet and othe r emerging technologies for business is by far more than the disadvantages so organizations would continue to use them and keep trying to find ways to reduce online fraud and scams. Practising online business involves some threats just like any other business deal. But if immersion is dedicated to installing secure measures, it is no more dangerous than other business practices. As a matter of fact, it is not safe for your organization not to be represented on the Web if you are link to the technology industry in any way the Web will be the first place prospective customers will look for you, expecting to find you there. There are unique opportunities on the Web for marketing a companys services, selling products and gathering information.ReferencesBBC (1999), Internet scam file, BBC On-line interlocking, 7 April,news.bbc.co.uk/hi/english/business/your_Brewer E. (15), Internet flaws a reversal for commerce, New York Times Personal Technology.Cafasso, R., When security isnt what it seems, Enterprise Systems Network Management, March 1996, pp. 72-84Cyber-Smut Regulating Obscenity on the Internet Kaplan, Rebecca Dawn Stan. L. politiciany Rev. 1998 Vol. 9, p189,Edward Rizzo 2001 Emerging Technologies and the Internet Enable Todays E-Workforcehttp//community.19actionnews.com/_zhangyan-has-added-Advantages-of-E-Business/BLOG/2275620/2165.htmlhttp//www.abestweb.com/forums/showthread.php?goto=lastpostt=103922http//www.buzzle.com/articles/advantages-and-disadvantages-of-e-business.htmlhttp//www.ehow.com/list_6023059_disadvantages-e_business.htmlhttp//www.marketingservicestalk.com/news/pan/pan113.htmlhttp//www.pandasecurity.com/virus_info/exports/rss/pandaes.xmlJenkins, L., Doing business in a global marketplace secure electronic commerce, Ciphertext The RSA newsletter, Vol. 3 No. 1, Winter 1995, pp. 1, 8.Jim Drinkhill, 2001, Journal of Financial Crime, Computer Fraud, Vol. 4 No. 3Lewis, P. (22), Security of personal data is lost in cyberspace, Computer Informa tion Systems.McKenna, K. Y. A. and Bargh, J. A. (2000) Plan 9 from cyberspace The implications of the Internet for personality and social psychology, Personality and Social Psychology Review, Vol. 4, pp. 57-75.money/newsid_313000/313051.stm. secant (1998), Internet Fraud How to Avoid Internet Investment Scams, US Securities and deputise Commission, Washington, DC, October, www.sec.gov/consumer/cyberfr.htmSid, J. (2007), World Wide Web Marketing Integrating the Internet into Your Marketing Strategy, John Wiley, New York. NYSnow, S. (2001) Is Online Counseling Ethical? Available http//www.commcure.ethicsonline.html. Accessed Aug. 26 2003.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.