0% found this document useful (0 votes)
10 views40 pages

Module-3

The document covers the fundamentals of Wi-Fi, types of wireless transmission media, and the importance of protecting wireless networks. It discusses cloud computing's advantages and security risks, mobile commerce, and the differences between supply chain management (SCM) and customer relationship management (CRM). Additionally, it explores social computing in business, its benefits and risks, and the concept of Web 2.0 and RSS.

Uploaded by

rockstar060101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views40 pages

Module-3

The document covers the fundamentals of Wi-Fi, types of wireless transmission media, and the importance of protecting wireless networks. It discusses cloud computing's advantages and security risks, mobile commerce, and the differences between supply chain management (SCM) and customer relationship management (CRM). Additionally, it explores social computing in business, its benefits and risks, and the concept of Web 2.0 and RSS.

Uploaded by

rockstar060101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

Computer Networks,

E-Business and E-Commerce


and Social Computing
Module-3
Fundamentals of Wi-Fi

● Wi-Fi networks use radio waves to transmit data between devices and a
wireless router. The wireless router is connected to the internet and acts as a
gateway for all of the devices on the network to access the internet.
● Wi-Fi networks operate on two different frequency bands: 2.4 GHz and 5
GHz. The 2.4 GHz band is slower but has better range than the 5 GHz band.
The 5 GHz band is faster but has a shorter range than the 2.4 GHz band.
● Most Wi-Fi devices support both frequency bands. The device will
automatically connect to the frequency band that provides the best
performance.
Types of wireless transmission media
How Can You Protect Your Wireless Network from Hackers?

● Use a strong password: Use a strong password for your Wi-Fi network
that is at least 12 characters long and includes a mix of upper and
lowercase letters, numbers, and symbols.
● Enable encryption: Enable encryption on your wireless router. This
will encrypt the data that is transmitted over the network, making it
more difficult for attackers to intercept.
● Disable SSID broadcasting: Disable SSID broadcasting to prevent
your network from being easily identified by attackers.
Contd..

● Keep firmware up to date: Install firmware updates for your wireless


router as soon as they are available. This will help to patch any known
security vulnerabilities.
● Use a firewall: A firewall can help to protect your network from
unauthorized access. Most wireless routers have a built-in firewall.
However, you may also want to consider installing a firewall on your
computer or other devices.
● Be careful about what networks you connect to: Only connect to
wireless networks that you trust. Avoid connecting to public Wifi
networks without a VPN.
Explain how businesses can use technology employed by short-range,
medium-range, and long-range networks, respectively.

● Short-range wireless networks simplify the task of connecting one


device to another, eliminating wires and enabling users to move
around while they use the devices. In general,short-range wireless
networks have a range of 100 feet or less. Short-range wireless
networks include Bluetooth, ultra-wideband, and near-field
communications.
● A business application of ultra-wideband is the PLUS Real-Time
Location System from Time Domain. Using PLUS, an organization
can locate multiple people and assets simultaneously.
Contd..
● Medium-range wireless networks include Wireless Fidelity (Wi-Fi) and mesh
networks.

● Wi-Fi provides fast and easy Internet or intranet broadband access from
public hotspots located at airports, hotels, Internet cafés, universities,
conference centers, offices, and homes. Mesh networks use multiple Wifi
access points to create a wide area network that can be quite large.
Contd..

● Wide-area wireless networks connect users to the Internet over


geographically dispersed territory.
● They include cellular telephones and wireless broadband.
● Cellular telephones provide two-way radio communications
over a cellular network of base stations with seamless handoffs.
● Wireless broadband (WiMAX) has a wireless access range of
up to 31 miles and a data-transfer rate of up to 75 Mbps.
WiMAX can provide long-distance broadband
● wireless access to rural areas and remote business locations.
Why Cloud Computing was developed?

● The traditional ways of providing IT infrastructure are used by both


small and large IT organizations.
● That means that any IT firm requires a server room, which is a basic
requirement of the industry.
● A database server, mail server, networking, firewalls, routers,
modem, switches, high net speed, and maintenance engineers should
all be present in the server room.
Contd..
● We’ll have to spend a lot of money to build such an IT infrastructure. Cloud
Computing was created to address all of these issues while also lowering the cost of
IT infrastructure.
● We have access to a shared pool of computer resources (servers, storage, programs,
and so on) in the cloud.
● All you have to do is ask for more resources when you need them. The cloud makes
provisioning resources quickly.
● When resources are no longer required, they can be released. You just pay for what
you use this way. All maintenance will be handled by your cloud provider.
List the advantages of Cloud Computing.

1. When needed, service is available 24*7.


2. In terms of data loss, security is important. (When critical data is lost, cloud computing provides
excellent security.) Because the data is saved in the system, it can be quickly accessible even if
your computer fails.).
3. Resource pooling
4. Services- pay- per use model
5. Shared Infrastructure
6. Cost Reduction
7. In the event of a disaster, it is highly advised that firms have an emergency backup plan in place.
Businesses can use cloud storage as a backup plan by storing a second copy of crucial files. These
files are kept in a remote place and can only be accessed via the internet.
Security Risks of Cloud Computing

○ Compliance: Using cloud services may be subject to legal compliance regulations, depending on the industry.
Organizations must make sure their cloud provider complies with these specifications and has access to the
required paperwork.
○ Data Loss: Data loss is the most common cloud security risk of cloud computing. It is also known as data
leakage. Data loss is the process in which data is deleted, corrupted, and unreadable by a user, software, or
application. In a cloud computing environment, data loss occurs when our sensitive data is in somebody else's
hands, one or more data elements can not be utilized by the data owner, the hard disk is not working properly,
and the software is not updated.
○ Data Breach: It is the process in which confidential data is viewed, accessed, or stolen by a third party
without any authorization, so the organization's data is hacked by hackers.
○ Account Hijacking: It is a serious security risk in cloud computing. It is the process in which individual
users' or organizations' cloud account (bank account, email account, and social media account) is stolen by
hackers. The hackers use the stolen account to perform unauthorized activities.
Contd..
○ Data Security and Privacy: The security of sensitive data is one of the main issues with cloud computing.
Access controls must be in place to restrict who can access the data, and organizations must make sure that
their data is encrypted both in transit and at rest.
○ Vendor Lock-In: Switching cloud providers can be expensive and complex, which might result in vendor
lock-in. When choosing a cloud provider, businesses should take this into account and make sure they have a
plan in place in case switching providers becomes essential.
○ DDoS: Cloud service companies are a prime target for distributed denial of service (DDoS) attacks, which can
cause downtime and data loss. Organizations should verify that the cloud provider has sufficient defenses
against DDoS assaults in place.
○ Identity and Access Management: The security of cloud computing environments depends on effective
identity and access management. To prevent unauthorized access to their data, organizations must make sure
that they have robust authentication and authorization mechanisms in place.
What is mobile commerce?

● Mobile commerce, also known as mobile ecommerce or


m-commerce, is the process of completing a transaction online
via a mobile device. M-commerce is a facet of ecommerce and
should be a priority to ensure you’re not falling behind your
competition.
● Any type of online transaction done via a smartphone or tablet is
considered a form of mobile commerce.
● The most popular type of mobile commerce is making a purchase
on a mobile device, but the term expands beyond that as well.
5 ways to increase mobile commerce sales

1. Ensure your website is mobile optimized


2. Shorten your checkout process
3. Create your own mobile app or PWA (Progressive
Web App)
4. Build an omnichannel customer experience
5. Focus on social commerce and chatbots
Provide a specific example of how each of the five major
m-commerce applications can benefit a business.

● Location-based services provide information specific to a location.


For example, a mobile user can (1) request the nearest business
or service, such as an ATM or restaurant; (2) receive alerts, such
as a warning of a traffic jam or an accident; and (3) find a friend.

● With location-based advertising, marketers can integrate the


current locations and preferences of mobile users. They can then
send user-specific advertising messages about nearby shops,
malls, and restaurants to wireless devices.
Contd..

● Mobile financial applications include banking, wireless payments


and micropayments, money transfers, wireless wallets, and
bill-payment services.

● The bottom line for mobile financial applications is to make it more


convenient for customers to transact business regardless of where
they are or what time it is.
Contd..

● Intrabusiness applications consist of m-commerce


applications that are used within organizations.

● Companies can use non voice mobile services to assist in


dispatch functions that is, to assign jobs to mobile
employees, along with detailed information about the job.
Contd..

● When it comes to accessing information, mobile portals and voice


portals are designed to aggregate and deliver content in a form
that will work within the limited space available on mobile devices.
These portals provide information anywhere and anytime to users.

● Telemetry is the wireless transmission and receipt of data gathered


from remote sensors. Company technicians can use telemetry to
identify maintenance problems in equipment. Car manufacturers
use telemetry applications for remote vehicle diagnosis and
preventive maintenance.
What’s The Difference Between Supply Chain
Management (SCM) and Customer Relationship
Management (CRM)

● CRM (short for Customer Relationship Management) systems


help you engage your customers with personalized relationships.
● They collect and analyze data such as contact information,
previous interactions, and completed purchases. Using this data,
you can get an insight into your customers’ tastes.
● This will help you to plan and execute marketing strategies that
they will find attractive.
Contd..

The main goal of a CRM system is to help you


manage your relationships with your customers,
regardless of whether they are individuals or
organizations.
SCM

● SCM (short for Supply Chain Management) systems help streamline your
supply chain processes. They do this by offering you functions such as
inventory management, product distribution and tracking, and supply and
demand forecasting.

● Like CRM, multiple departments in your organization can benefit from


SCM software. For example, customer service representatives can use the
tracking function to respond to customer queries about shipments.
Contd..

● The inventory management feature can help your manufacturing


department ensure you never run low on stocks. Even your accounting
department can use data from SCM systems to budget and forecast for
the future.

● The principal objective of SCM systems is to ensure a smooth flow of


production, right from raw materials to your customers’ homes.
Differences Between CRM and SCM
What Does Social Computing Mean?

Social computing is interactive and collaborative behavior between computer users.


Personal computing is an individual user activity in that one user generally commands
computing. In social computing, the Internet allows users to interact through many
mediums, including:

● Social media sites


● Blogs
● Microblogs
● Multiplayer games
● Wikis
● Instant messaging
● Open-source development
Social Computing in Business

● Social computing in business, or social commerce, refers to the


delivery of electronic commerce activities and transactions through
social computing.
● Social commerce also supports social interactions and user
contributions, allowing customers to participate actively in the
marketing and selling of products and services in online marketplaces
and communities.
Social Computing in Business

With social commerce, individuals can collaborate online, obtain advice from trusted
individuals, and find and purchase goods and services. Below we list a few examples of
social commerce:

● Disney allows people to book tickets on Facebook without leaving the social
network.
● PepsiCo gives a live notification when its customers are close to physical stores
(grocery, restaurants, gas stations) that sell Pepsi products. The company then uses
Foursquare to send them coupons and discount information.
● Mountain Dew attracts video game lovers and sports enthusiasts via Dewmocracy
contests. The company also encourages the most dedicated community members to
contribute ideas on company products.
Benefits to Customers

● Better and faster vendor responses to complaints, because customers


can air their complaints in public (on Twitter, Facebook, and
YouTube)
● Customers can assist other customers (e.g., in online forums)
● Customers’ expectations can be met more fully and quickly
● Customers can easily search, link, chat, and buy while staying on a
social network’s page
Benefits to Businesses

● Can test new products and ideas quickly and inexpensively


● Learn a lot about their customers
● Identify problems quickly and alleviate customer anger
● Learn about customers’ experiences via rapid feedback
● Increase sales when customers discuss products positively on social
networking site
● Create better marketing campaigns and brand awareness
Risks of social computing include the following:

● Information security concerns


● Invasion of privacy
● Violation of intellectual property and copyright
● Employees’ reluctance to participate
● Data leakage of personal information or corporate strategic
information
● Poor or biased quality of users’ generated content
● Cyberbullying/cyberstalking and employee harassment
Web 2.0
● According to Tim O’Reilly, a noted blogger, Web 2.0 is a loose
collection of information technologies and applications, plus the Web
sites that use them. These Websites enrich the user experience by
encouraging user participation, social interaction, and collaboration.
● Unlike Web 1.0 sites, Web 2.0 sites are not so much online places to
visit as Web locations that facilitate information sharing, user- centered
design, and collaboration.
● Web 2.0 sites often harness collective intelligence (e.g., wikis); deliver
functionality as services, rather than packaged software (e.g., Web
services); and feature remixable applications and data (e.g., mashups).
Contd..
● Most Web 2.0 applications have rich, user-friendly interfaces based on AJAX.

● AJAX is a Web development technique that enables users to reload portions


of Web pages with fresh data instead of having to reload the entire Web page.

● This process speeds up response time and increases user satisfaction.


Really Simple Syndication (RSS)

● Really Simple Syndication (RSS) is a Web 2.0 feature that allows you
to receive the information you want (customized information), when
you want it, without having to surf thousands of Web sites.
● RSS allows anyone to syndicate (publish) his or her blog, or any other
content, to anyone who has an interest in subscribing to it.
● When changes to the content are made, subscribers receive a
notification of the changes and an idea of what the new content
contains.
● Subscribers can then click on a link that will take them to the full text
of the new content.
Contd..

● For example, CNN.com provides RSS feeds for each of its main
topic areas, such as world news, sports news, technology news,
and entertainment news.
● NBC uses RSS feeds to allow viewers to download the most
current version of shows such as Meet the Press and NBC Nightly
News.
● You can find thousands of Web sites that offer RSS feeds at
Syndic8 (www.syndic8.com) and NewsIsFree
(www.newsisfree.com).
Describe the benefits and risks of social commerce to
companies.
● Social commerce refers to the delivery of electronic commerce
activities and transactions through social computing.
● Benefits of social commerce to customers include the following:
better and faster vendors’ response to complaints; customers
can assist other customers; customers’ expectations can be
met more fully and quickly; customers can easily search, link,
chat, and buy while staying in the social network’s page.
Contd..

Benefits of social commerce to vendors include the following:


○ can test new products and ideas quickly and inexpensively;
○ learn much about their customers;
○ identify problems quickly and alleviate anger;
○ learn from customers’ experiences with rapid feedback;
○ increase sales when customers discuss products positively on social
networking site; create better marketing campaigns and brand
awareness;
○ use low-cost user-generated content, for example, in marketing
campaigns; get free advertising through viral marketing; identify
influential brand advocates and reward them.
Contd..

Risks of social computing include:


● information security concerns;
● invasion of privacy;
● violation of intellectual property and copyright;
● employees’ reluctance to participate;
● data leakage of personal information or corporate strategic
information; poor or biased quality of users’ generated
content;
● cyberbullying/cyberstalking and employee harassment.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy