Essential Standard 2.00 UNDERSTAND THE NATURE OF BUSINESS. 1
Objective 2.04 UNDERSTAND APPLICATIONS AND ISSUES OF TECHNOLOGY. 2
Topics Businesses use of technology Concerns of using technology 3
Businesses use of technology 4
5 Applications of Technology by Businesses What are computer networks? ◦Computer networks are computers linked in a school or business so users can share hardware, software, and data. ◦Computer networks consists of computers linked so users can share hardware, software, and data. Examples of computer networks: ◦Internet - Public network used most often for: ◦ ing - Accessing the World Wide Web (WWW) ◦Intranet - Private network, primarily used to share information
Applications of Technology by Businesses continued What is artificial intelligence (AI)? ◦It is software that enables computers to reason learn and make decisions. ◦Example: voice recognition software Why is Computer-aided design (CAD) used? ◦Creates product styles and designs, i.e. cars, electronics How do expert systems help people? ◦Expert systems are computer programs that help people solve technical problems including medical services, financial planning, and legal matters. ◦Example: Automotive parts electronic catalogue 6
Applications of Technology by Businesses continued What is involved in E-commerce? ◦E-commerce is conducting business transactions using the Internet or other technology. Most common activities of E-Commerce: ◦Providing product information ◦Promoting a company ◦Selling online ◦Conducting market research ◦Making payments ◦Obtaining parts and supplies ◦Tracking shipments 7
Applications of Technology by Businesses continued Four basic models for E-commerce: ◦B2C: Business-to-Consumer ◦Example: Lands’ End.com selling swimwear to expecting mothers ◦B2B: Business-to-Business ◦Example: Staples.com ships office supplies to local hospitals ◦C2B: Consumer-to-Business ◦Example: Customers completing on-line surveys in order to provide feedback to Dunkin’ Donuts ◦C2C: Consumer-to-Consumer ◦Example: Customer buying electronics from other customers through eBay.com 8
9 Applications of Technology by Businesses continued What is a Management Information System (MIS)? ◦MIS is an ordered system for processing and reporting information in an organization. Four main components of a MIS: ◦Gathering data ◦Analyzing data ◦Storing data ◦Reporting results
Applications of Technology by Businesses continued Categories of information obtained from MIS: ◦Financial - Information for budgets and financial reports and statements ◦Production and inventory - Information for production summaries and supplies ◦Marketing and sales - Information to determine customer needs, economic conditions, and competitors action ◦Human resources - Information about employees’ salaries, benefits and evaluations 10
Applications of Technology by Businesses continued What is involved in robotics activities? ◦It involves mechanical devices programmed to do routine tasks, such as those seen on an assembly line in factories. What activities happen during telecommuting? ◦Workers use computers off-site to do a job, saving travel time and costs. 11
Concerns of using technology 12
13 Concerns of Using Technology Employment Trends What are some employment trends in the workplace? ◦Shift in duties and skills needed in the workplace. ◦Companies have to retrain displaced workers. What is computer literacy? ◦The ability to enter, store, process, and retrieve information. ◦Computer literacy is vital. It is the ability to enter, store, process, and retrieve information
14 Concerns of Using Technology continued Computer Crimes ◦What is a computer virus? ◦A computer virus is a hidden program code in a system that can do damage to software or stored data. ◦How many people have encountered a computer virus? ◦Tell how the virus was removed?
15 Concerns of Using Technology continued Computer Crimes continued ◦What is a white-collar crime? ◦White-collar crime is an illegal act carried out by office or professional workers while at work including stealing money, information, or computer time through improper use of computer systems. ◦How many people have access to software that has been copied to a CD by a personal contact? ◦Did that person commit an act of piracy? ◦Piracy is stealing or illegally copying software packages or information.
16 Concerns of Using Technology continued Health Concerns What are some possible health concerns for employees? Eye strain muscle tension carpal tunnel syndrome
Concerns of Using Technology continued Privacy Concerns ◦What are some concerns with privacy? ◦Dishonest people have access to customer records. ◦Companies have changed which employees, as well as other people, that may have access to customer and employee records. ◦What is identity theft? ◦Identity theft is thieves obtaining information online about a person. 17
Use the scenario about Barkley Corporation in the Make Academic Connections - Math on page 288 in Intro to Business, 6e, Thomson South-Western textbook, and then answer these questions. Calculate the possible cost difference between sending pieces of and electronic mail. What will most likely cause the corporation to change mail service? How could the cost of upgrading to the new system impact the corporation’s decision? How could market research about the possible receptiveness of electronic mail impact the corporation’s decision? 18