32 books
Companies that implement effective technology solutions can gain a competitive advantage in today's environment. The proper use of technology can enhance a company's competitive position. Services industry is one of the key sectors where IT can be exploited to its maximum potential. Substantial portion of delivering services involves a lot of information sharing and customer interaction. Thus, the role of IT becomes paramount in facilitating a smooth flow of ...
A Decision Support System (DSS) can be defined as the combination of data, information and computer and non-computer-based tools and services working within a structured framework to improve the process and the outcome of decision-making. DSS offers flexibility, adaptability and a quick response to its users. The world is full of uncertainties in which business decisions are being taken every day, every hour and every minute. Decision-makers need access to lots ...
As the Internet has increasingly penetrated into all walks of human life, the use of web-related services has also increased by leaps and bounds. After the web, Peer-to-Peer (P2P) is the next big thing that has happened on the Internet, almost redefining the way computers are networked the way services are delivered, and the way users are connecting/communicating/collaborating with other users on the net. The initial super success of P2P-based file-sharing ...
Emerging technology can be defined as a “science-based innovation with the potential to create a new industry or transform an existing industryâ€. The convergence of the Internet, telecom, cable, satellite, computer, entertainment and information industry has created a digital revolution. This digital revolution has driven convergence within the IT and telecom industries and has radically redefined the landscape of these industries ...
To date, "Web Security" has been associated with debates over cryptographic technology, protocols and public policy, obscuring the wider challenges of building trusted Web applications. Since the Web aims at being an information space that reflects not just human knowledge but also human relationships, it will soon realize the full complexity of trust relationships among people, computers and organizations. This has led to a new breed of systems – ...
In this digital era, Information Technology (IT) has become a core element for businesses to make their operations more efficient, improve product quality, comply with statutory requirements, manage risk and security- in short, generate overall business value. As the dependence of organizations on IT had grown, the IT budgets have increased significantly. Thus, the management were required to optimize IT investment and extract maximum value out of every dollar ...
Regardless of industry, size and location, today’s agile and highly productive organizations require something, which is fundamentally different and that makes their operations streamlined, eliminates wastes and enables them to exceed their targets. Presently, business houses look at Knowledge Integration as the solution. Knowledge Integration is essentially a process of exchange, creation and morally appropriate application of knowledge within a complex system ...
A new field, cyber forensics, is in the process of extracting information and data from computer storage media accurately and reliably. However, this is not enough, because here the challenge lies in not just finding and collecting data, but preserving and presenting it in a manner that a judicial prospect will accept it. These are ways of combating cyber crime, which make it important for advances in the law enforcement, legal and forensic computing technical ...
IT is indispensable in smooth functioning of any organization today, irrespective of the industry it functions in. The quantum and quality of IT investment differ as to how the systems are used, the degree to which they align with the strategic goals of the organization and ultimately how much business value they deliver vis-Ã -vis the resources invested. Further, all IT systems employed are not of equal strategic importance. IT systems are categorized into ...
After blogs and RSS feeds, Wikis have opened new avenues of collaborative working both in the knowledge industry and in individual intellectual pursuits. A Wiki is a way of creating interlinked web or HTML pages by using simple mark-up language with a web browser. After the success of 'Wikipedia', an online public encyclopedia, Wikis have become very popular and are used in commercial organizations, research agencies and universities. This book brings to light ...
In the ever evolving field of information technology, every element of the software’s operational environment is in a state of constant flux: frequent changes in the hardware, operating system, cooperating software and client’s expectations are motivated by performance improvements, bug-fixes, security breaches and attempts to assemble synergistically ever more sophisticated software systems. With increasing applications of software, the complexity of the ...
Electronic negotiation is an interdisciplinary research area that combines the best of economics, information systems, computer science, communication theory, sociology and psychology. Today, negotiations are conducted via electronic media powered by sophisticated software applications. These support systems can support collaboration between decision-makers who are separated geographically and is an important part of an e-business today.
Today, the Internet has evolved into a dynamic information warehouse, housing variety of data in diverse data formats. Each data element on the web has a meaning and context attached to it that defines its semantics. The users on Internet need the searched data to be compiled at a faster pace also taking into consideration the relevance of the data. Today, the most advanced search engines facilitate retrieving data from the web on the basis of matching and ...
A new field, cyber forensics, is in the process of extracting information and data from computer storage media accurately and reliably. However, this is not enough, because here the challenge lies in not just finding and collecting data, but preserving and presenting it in a manner that a judicial prospect will accept it. These are ways of combating cyber crime, which make it important for advances in the law enforcement, legal and forensic computing technical ...
For years, computer virus has affected the productive use of computers, often challenging the user and the anti-virus software vendor from preventing or recovering from viral-attacks. Virus attack, hacking, stealing password, browser hijack, spam, and malware are very common major impediments for activities on the Internet. Growing technical sophistication and ingenuity of the masquerader have given birth to another computer malady that has become quite ...
Today, IT complements global businesses to so that it redefines business approaches, economic models and functional frameworks. Consequently, businesses are embracing IT as a strategic tool for competitive advantage. This requires building IT infrastructure by carefully addressing a company’s business goal and complementing its entire organizational strategy. This book outlines the strategic importance of IT, highlights the changing role of CIOs and IT managers ...
The growing ubiquity and pervasiveness of the web in day-to-day life of humans is having a profound impact on the way people socialize, network, communicate and collaborate on the web. Accelerated by the increasing activities on the Internet, coupled with path breaking innovation in web technologies, the web is transforming itself from being a sedate online publishing medium to a dynamic platform for collaboration. The emergence and wide acceptance of the new ...
Growing business complexities and information needs have prompted extensive use of complex software applications in almost every organizational function. These complex applications, from payroll to supply chain integration and customer relationship management, and running on heterogeneous technology infrastructure have exhausted the limits of traditional software architecture. Further, a shift in business orientation, i.e., from product to service calls for a ...
In this digital era, telecommunications and networking technologies are instrumental in enabling people and businesses across the globe to interconnect and transact, shrinking the physical world into a global digital village. However, even after a decade of active proliferation, this connectivity is still eluding the geographically remote and economically backward areas depriving the people there from participating in the digital revolution. Such disconnections ...
Software programs have become the most crucial building blocks of today’s ICT infrastructure. Starting from Operating System to Database Management, Data Communication and myriad software tools run an information system. Software can be developed as proprietary business by an organization or an individual and distributed at cost, or Free/Openly, by the Open Source community of voluntary contributors.
The Internet has shrunk the world into a global village. It has not only evolved as a preferred medium for communication and information sharing, but also as a medium for entertainment and economic activities, building communities and transacting at professional and personal levels, contributing to the global and local economic development. With nearly one fifth of the world’s population being connected to the Internet conducting millions of transactions every ...
How to manage storage of information in business without its affecting operational efficiency, how to extract value from information without increasing the storage cost, and how to strike a balance between storage cost and information value from the time the data is generated till it is retired are the three basic challenges that gave birth to data storage management or Information Lifecycle Management (ILM).
Information Technology (IT) has transformed the way the banks do business. Banks are leveraging on technology not only to cut cost but also to reduce the transaction time and improve overall efficiency. No bank, – no matter, the location or scale – can ignore technology. It has become inevitable for survival of any bank. Apparently, the application of IT in banks has transformed the traditional banking industry, from being a highly protected governmental ...
Over the last few decades, Credit scoring has emerged as an effective tool, which facilitates lenders in assessing the creditworthiness of customers and determining the future risk of sanctioning credit based on their past record. Banks and financial institutions have been using credit scores in their credit-deciding process. Of late, the scope of credit scoring has expanded widely and is now increasingly used by telecom companies, utility service providers, ...