0% found this document useful (0 votes)
5 views

PBS Bit

pbs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

PBS Bit

pbs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

PROFESSIONALISM polished, and they dress appropriately for the properly.

ss appropriately for the properly. Wearing clothes that are There are many professional skills. These
situation. appropriate to work is necessary. skills depend on job position, education and
Meaning and Definition of Professionalism business field.
7. Responsibility and Dependability: Taking 10. Demeanour: Demeanour of a professional
Professionalism is the way and individual responsibility and fair in all work activities is should reflect confidence. He must be polite 1. Communication Skills: Successful
conduct himself at work to represent both important to professionalism. Responsible and well spoken when interacting with communication involves five components,
himself and his company in a positive way. It behaviour has an impact across all career and customers, superiors or co-workers. Verbal communication, non-verbal
includes standard behaviour that might be fields. communication, aural communication,
acquired by an organisation. PROFESSIONALISM IN BUSINESS written communication and Visual
QUALITIES OF A GOOD PROFESSIONAL communication. The ability to communicate
Definition Professional behaviour is necessary for the
1. Excellence: A good professional always long term success of a business. A effectively is very important for developing
According to Eric Monchnacz, strive for excellence and quality of care professional work place attitude and business relationship.
“Professionalism is someone’s inherent activities and continuously trying to improve appearance allow employees to take pride in
ability to do what is expected of them and 2. Decision Making Skills: Making right
knowledge and skills. their work and improve performance. decisions in business and work is one of the
deliver quality work because they are driven
to do so.” 2. Seeks Advice: A good professional not only 1. Establishes Proper Boundaries: best qualities of a real professional. Decision
seek advice from other professionals in his Professionalism in the business establishes making skill can be improved with seeing,
Characteristics of Professionalism field but also professionals from other fields. boundaries between what is considered learning, experience and practice.

1. Specialised Knowledge: Professionals make appropriate and what is not. 3. Problem Solving Skills: Problems and job
3. Good Communication: A professional
a deep personal commitment to develop and should have very good communicational 2. Encourages Personal Improvements: A are a part of any job. The ability to use
improve their skills. knowledge to find answers to pressing
PROFESSIONAL BUSINESS SKILLS 2. Competency: Professionals don’t make
skills. Communication skills mean the ability
to talk as well as listen.
business environment in which employees
dress and operate professionally is more problems and formulate workable solutions
is essential for business success.
excuses, but focus on finding solution. They helpful for business success.
4. Time Management: An individual is
are reliable and so keep their promises. considered a good professional if he is able to 3. Promote and Maintain Accountability: 4. Leadership Skills: Effective leadership skills
manage his time well. Companies that interact directly with clients are a combination of many abilities like
3. Honesty and Integrity: Professionals don’t ability to lead, to motivate, to inspire and to
compromise their values, and will do the are supposed to provide the best services and
5. Organisational Skill: A professional should present their company in the best possible create. Companies want employees who can
right thing, even during adverse situations. keep his work area neat and clean. His files, supervise and direct other workers.
Professionals can be trusted. manner.
papers, everything should be in proper place.
4. Establishes Respect: Professionalism in 5. Interpersonal Skills: Interpersonal skills are
4. Accountability: Professionals hold 6. Focus and Hard Work: A [professional people skills and include the ability to build
themselves accountable for their thoughts, business gives respect for authority, clients
should be very clear on the individual goals and co-workers. A professional behaviour and maintain relationships, develop rapport,
words, and actions-especially they have that he is expected to achieve as well as and use diplomacy.
made a mistake. Accountability means limits gossips and rumours.
group goals that he has to contribute to.
accepting mistakes or problems, and working 5. Minimises Conflicts: Workers who respect 6. Time Management Skills: Good time
for a solution. 7. Ethical Behaviour: A good professional each other’s and conduct themselves management skills help to control time and
tries to act ethically in all his work and in all professionally rarely have disagreement and life eventually life. With these qualities a
5. Self-Regulation: Professionals show respect his dealing with others. He feels responsible person can able to maintain balance between
for the people around them, no matter what disputes.
for knowing and observing the ethical norms his work, personal, and family life.
their role or situation. They exhibits high that are particular to his profession. 6. Increased Job Satisfaction: Professionalism
degree of emotional intelligence by eliminates stress to a great extent and that 7. Stress Management Skills: A good
considering the emotions and needs of 8. Teaches New Generation: A good helps employees to work in a healthy professional never allows stress to influence
others. professional teaches a younger member of atmosphere leading to enhanced his job and tasks. If there are problems to
the profession. He wants to pass his performance. control stress, there are many ways, tools,
6. Image: Professionals try to build good knowledge and professional experiences. techniques that help to manage stress.
image in the organisation. They dress PROFESSIONAL SKILSS
carefully, with well combed hair. They are 9. Appearance: A professional should dress 8. Work Ethic: Employees are expected to be
up in clean clothes, which have been ironed responsible and do the job maximum for they

that they are getting paid to do, which anything from a face to face conversation, a reactions. Verbal communication includes 6. Speak with Confidence: Speaking in a regarding the scope and coverage, and state 5. Use of Podium: Standing behind the
includes being punctual when arriving at text message exchange, or even personal both spoken and written communication. confident manner will help in building trust purpose clearly. podium is more formal, moving away
work, meeting deadlines, and making sure writing. and get the respect of audience. establishes a friendlier, closer relationship
that work is error free. 2. Body: The body contains the material with the audience.
Casual communication also includes 7. Develop Skills: A good communicator supportive to a presentation. It should
9. Flexibility: If one wants to be a good interaction with people who are not our PUBLIC SPEAKING continuously working hard on developing develop logically, emphasises the main 6. Length of Delivery: The length of
professional, he has to learn to how to be family or friends. A professional public speaker must be communication skill. There are many points, and keep supplementary or presentation might have decided in advance
more adaptable and to develop his ability to prepared to communicate with a particular techniques that we can learn to help improve background information in proper and hence it is good to limit the presentation
cope effectively with change. Professional and business communication it. perspective. within the time allowed. Allow 15-30minutes
involves interaction with those we work with, group of persons, thus preparing the speech
to fit the audience. A professionally delivered for questions and discussions.
IMPORTANT SOFT SKILLS FOR BUSINESS whether we have a close relationship with PROFESSIONAL PRESENTATION 3. Summary: A good summery is a brief
SUCCESS them or not. speech is well organised and thought out, replication of the purpose of a presentation 7. Eye Contact: Speaker has to look at all
convinces the listener know what you are Presenters not only need to have knowledge and a good restatement of main points. It segments of the audience by looking directly
Hard skill likes technical knowledge, Communication is about passing information talking about. of the topic being presented, but must also should include only the critical points that the at individuals without lingering too long on
education are important. But soft skills are from one person to another. This means that have a strong command of language and the audience want to remember. any one person.
also important. The term soft skill is used to both the sending and the receiving of DIGITAL COMMUNICATION ability to briefly organise and express their
indicate all the competencies that are not message are equally important. Verbal Digital communication is any exchange of thoughts. There are 3 primary skills in giving 4. Visual aids: Visual aids are very effective 8. Voice: A good speaking voice is natural and
directly connected to a specific task, they are communication therefore requires both a data that transmit the data in a digital presentation: verbal communication skills, communication tools and are essential in reflects the speaker personality and sincerity.
necessary in any position as they mainly refer speaker to transmit the message, and a form.eg: social networking, emailing, non-verbal communication skills, content and every presentation. It helps to increase the
to the relationship with other people listener to make sense of the message. organisation. probability of audience retention.eg: Power 9. Speak calmly: Speak calmly and with an
blogging etc. Electronic mail is quick and even, moderate speed. If using presentation
involved in the organisation. efficient and documents can be referred back point presentation.
Oral communication includes the ability to 1. Verbal Communication Skills: Presenters slides, try not to stand in front of them or
Hard skill indicates the specific capabilities to give and receive feedback, participate in later. with strong grammatical knowledge and a PRESENTATION TECHNIQUES block the audience view of them.
perform a particular job. meetings and verbally communicate with FACTORES OF EFFECTIVE VERBAL rich vocabulary are able to express their
others in a business context. Public speaking thoughts more logically and are generally 1. Gather Information: As a part of 10. Question and Answer Session: Answer
Soft skills are the personal attributes, COMMUNICATION SKILLS preparation, tell other people about the topic questions after the presentation to the best
is a crucial component of oral communication perceived to be more competent.
personality traits, inherent social cues and in business. Public speaking involves an oral 1. Wide Reading: Wide reading improves chosen, and ask them what they would want of speakers ability. If you not know the
communication abilities needed for success presentation where communication is to an vocabulary and helps to express ideas more 2. Non-verbal Communication Skills: Non to hear about the subject. On the basis of answer to a question, do not make up an
on the job. Soft skills characterises how a audience. It includes the ability to plan and clearly. It also eliminates weaknesses in verbal cues interpreted by the audience their response, further research can be made answer.
person interacts in his relationship with present ideas fluently and clearly, usually language skills. include facial expression, eyE contact with to gather information needed for
others. audience and body language. Non verbal presentation. DIFFERENT PRESENTATION POSTURES
within a definite period of time, and the
ability to vary the tone, pitch and pace of the 2. Preparation: Verbal communication will communication helps the audience to Posture is an important part of any
 Soft skills are much difficult to learn definitely improve with adequate understand the message and improves the 2. Write down Main Ideas: speaker has to
presentation, to get the desired response write down main ideas in outline format. It presentation. Speaker has to pay attention to
than hard skill preparation. It is always try to explain audience’s perception of the presenter.
from the audience. his postures.
 Hard skill can be easily taught to most something in different way. enables the speaker to remember the main
people with right training method There are4 types of communication between 3. Content: The ability to deliver content that pointed during presentation. 1. Standing Posture: when a speaker stand in
 Soft skills are difficult to learn and senders and receivers: writing, speaking, 3. Listen Carefully: Listening ore talking less is logically organised and flows logically i also a strong and steady position, with his feet
proves to be very effective to improve verbal an important component of oral 3. Develop Introduction and Conclusion: The
teach. listening and conducting meetings. about a shoulder width apart, it signals that
communication. The use of ‘signposts’, introduction must present the topic and
 The reason is that over a life time of communication. he feel in control. Keep the chest up and
VERBAL COMMUNICATION ’dialog markers’ to indicate the movement attract the audience, giving them reason to
work, habits and attitudes becomes stomach in.
4. Body Language: For clear, accurate, and between topics in the content contributes to listen to the speaker. In conclusion, he has to
deep-rooted
Any interaction that makes use of spoken thoughtful communication, one should make audience understanding. summarize the content and leave the rest to 2. Hands: When speaker is not actively
PROFESSIONALISM IN COMMUNICATION words is considered as verbal sure that his words, tone, facial expressions audience with something about which to engaging in gesturing, he can rest the hands
communication. Effective professional verbal and body language go with the conversation. Organisation of presentation think upon which to act. in one of the two places: The first option is to
The most important aspects of any communication includes the ability to speak
5. Think in Terms of Listeners Perspective: A good presentation should organise 4. Practice the Speech: Practice the speech rest the hands at his side with your fingers
relationship-personal, casual, or professional fluently, and to communicate in a manner
Good communication always think about following way aloud several times until speaker can slightly curled. The second option is to nest
is communication. appropriate for the occasion. An essential
listener’s perspective while communicating confidently and comfortably transmit his one hand with other.
component of effective verbal 1. Introduction: Introduction should tell the
Personal communication usually happens and plan responses accordingly. message.
communication is the ability to listen to audience exactly about topic, provide an idea
between family and friends and can be
comments from others and to observe their

3. Holding like a Basket Ball: Gesturing as if 5. Report: A report is a document prepared 3. Legal Document: Written communication is EMAIL 1. Easy and Fast: Email is very fast and it is Sometimes, instead of email; a phone call or
you were holding a basket ball between your by an individual or a committee entrusted acceptable as a legal document. sent and received almost instantaneously face to face communication will be more
hands is an indicator of confidence and with the task of collecting information on a Email is the most widely used tool for irrespective of the location of the recipient. It productive.
control. given subject. It requires careful research, 4. Long Distance Communication: written business communication at the workplace. also enables quick responses to any issue that
collection of data, presentation of findings, communication is suitable for long distance Email is short for ‘Electronic mail’. may arise. 2. To Line: The To field is the default place to
4. Palms Up: This gesture indicates openness conclusions and recommendations. communication and repetitive standing write recipients email address. If we are
and honesty. orders. Advantages of Using Email 2. Easy Retrieval: All types of email services expecting someone to do something based
6. Minutes: Minutes are written record of 1. Fast Client Communication: Email is one of provide a search facility and it will take only on email, they should be in the To field.
5. Palms Down: This gesture is a sign of decisions taken at a meeting. Minutes may be 5. Easy Understanding: In written few seconds for tracking down a specific
strength, authority, assertiveness. communication the receiver gets the the fastest ways to communicate with an 3. Cc Line (Carbon copy): This can be useful to
written by hand or typed and pasted in a important message to a client or business message from the inbox.
minute book, or typed and filled in a minute opportunity of reading the message again covey the same exact message more than
6. Steeple the Hands: some speakers prefer and again till he properly understands it. associate that is located thousands of miles 3. Economical: Email is one of the cheapest one person. No action or response is
steeple their hands, which is when all the five file. away. ways of communication for business, both expected of individuals on the Cc. Both the
figure tips on one hand touch the five Four common errors which must avoid in 6. Suitable for Long Messages: Written internally and externally. In the case of big main recipient and Cc recipient can see all the
fingertips on the opposite hands. communication is suitable for lengthy 2. Availability and Portability: The
order to improving writing competency. convenience of email also easy to carry companies the overhead cost of maintain a addresses the message was sent to.
messages. dedicated server is relatively low.
7. Change the Position Frequently: Do not 1. Confusing Language: Confusing language important correspondence easily without 4. Bcc Line (Blind carbon copy): This feature is
maintain the same position throughout a means confusing words that can mislead the 7. Less Possibility of Distortions: In written taking heavy paper files and folders. 4. Marketing: Email id much useful for similar to CC except that in BC, recipients are
presentation. reader and cause communication breakdown communication the probability of distortion companies to efficiently and effectively invisible to the other recipients. When a
of content is very low because here the 3. Reduce Shipping and Mailing Costs: One of
WRITTEN COMMUNICATION or barrier between the writer and the reader. the benefits of email is that we can send as communicate information about their message is blind copied, neither the main
It is always remembered to write convey content is written. product and services, both existing customers recipient nor the Bcc recipient can see the
many messages, files, videos and
Written communication means the sending meaning in plain English. 8. Delegation of Authority presentations as we want without having to and potential ones. addresses in the Bcc field.
messages, orders or instructions in writing pay anything.
through letters, circulars, manuals, reports, 2. Verbosity: Verbosity means the use of too 9. Develops Confidence 5. Internal Communication: Email became the 5. Subject Line: Subject line should convey
office memos etc many words. The overuse of words interferes Disadvantages of Email primary means of internal communication the main point of our message o the idea that
with understanding. 10. Goodwill and Image Building among organisation right from the beginning we want to communicate. Subject line should
FORMS OF WRITTEN COMMUNICATION 1. Vulnerability to Loss: Email and important of its introduction. All the employees within a effectively summarize the message. Not use
3. Poor Sentence Structure: Try to keep the DISADVANTAGES OF WRITTEN information’s can be lost with a simple hard- company is expected to use emails for any more than 6 or 7 words in subject line and
1. Letters: Letters are most widely used form sentences short and compact to ensure that COMMUNICATION drive crash. There is also a chance of lose the formal communication. never use capital letters.
of written communication. They are mostly they are correct, logical and easy to read. valuable data if it is stored as email
for external communication. Word order is important for meaning. 1. Time Consuming: Composing a message in 6. Workgroups: Companies can further divide 6. Salutations: Always begin email with a
writing takes much time. Feedback process information on another server, if that site
goes down or out of business. internal communications by creating multiple formal salutation.eg:* dear Professor Shyam
3. MEMO: Memo is usually an informal 4. Information Overload: Information also is not instant. workgroups for separate departments. This
message between members of an overload means giving too much information, 2. Accessible to Others: An email can be helps in sending group emails such as * Hello, Ms. Raju
organisation and generally relates to daily hence, the reader becomes overwhelmed and 2. Expensive: It is expensive in terms of
money and time. intercepted by a hacker or go to an incorrect announcements for specific groups. * Hi, Lathika
work. Memo forms are usually small and confused. This may also cause frustration and mail address and wind up in someone else’s
used for brief messages. doubts on the writer’s credibility. 3. No Secrecy: Written communication inbox. Sensitive information and messages 7. Security If we don’t know the name of the person you
3. Notice: A notice is used when people in the ADVANTAGES OF WRITTEN cannot maintain strict secrecy which would are very accessible to hackers and even 8. Alternative Means of Physical Documents are addressing, or if the email addresses a
organisation have to be given the same COMMUNICATION have been possible is oral communication. unsuspecting recipients when using mail. diverse group you can use like this
information. It is common method of mass EMAIL ETIQUETTE
1. Permanent Record: Written 4. No Instant Feedback: Written 3. Difficult to Interpret Emotions: Email *To whom it may concern
communication within an organisation. communication has any scope for immediate recipients cannot see each other; the mails Email etiquette refers to the principles of
communication acts as a permanent record of * Dear members of the selection committee
4. Circular: A circular is a detailed document the organisation and can prove very useful clarification if not understood properly. do not have any voice inflection or emotion behaviour that one should use when writing
giving information, instructions or orders on for future reference. that can help with proper interpretation. This or answering email messages. It is known as * Hello, every one
5. Less Flexible: Being written in nature it is can and does cause misinterpretation of the code of conduct for email communication.
a specific matter. A circular has a number and less flexible and cannot be changed easily.
a date for reference, and is signed by the 2. Accuracy: Written communication is more emotion behind the email, leading to hurt 7. Content: It is always good idea to think
accurate and precise because it is open to feelings, anger and more emotions. 1. Identify the Relevance: Before composing about the content before actually writing the
authorized signatory of the issuing office. 6. Unsuitable for Illiterate People: Written email, it is better to decide whether email is
verification and its authenticity can be easily communication can become a hindrance message. Organise the thoughts in a logical
challenged. SIGNIFICANCE OF EMAIL I BUSINESS right medium for this communication.
rather than help for illiterate people.
sequence before writing down. The message 1. Be Concise and to the Point: Do not make 2. Do not use email to discuss confidential 5. System References: It should provide 6. Understand the user: It should be drafted 8. Less Impact on Environment: It is
should be clear and brief. Use paragraphs. email too long than actually needed. information information on the system facilities, how to in accordance with the requirement of the paperless, uses less power, avoid
use those facilities, list of error messages and end user. deforestations etc.
8. Tone: Emails at workplace must have a 2. Write in a Positive Tone: The tone should 3. Never respond if you are upset. how to recover from errors.
formal tone to them. Be polite, choose the be smooth enough to give comfort to the 7. Concise: It shall contain only relevant 9. Best Suitable for Part Time and Distance
words wisely, use proper punctuations and reader. 4. Don’t attach unnecessary files. 6. Market requirement Documents. information. Education: It is useful for those who don’t
avoid capitalizing all words. 5. Don’t Forget to Attach Document: If you access to formal education system.
3. Address All Questions or Concerns to Avoid 7. Release notes. 8. Consistent: maintain one style and format
9. Language: An email can be effective only Delays: An email reply must answer all plan to attach a document, do it as soon as throughout the document. 10. Variety of Resources: It can take variety
when the language used is grammatically questions. you refer to the document in the mail. TECHNICAL WRITING STANDSRDS of resources such as text, audio, video etc.
sound and is spelt correctly. If the reader
4. Write about Single Subject: A single subject 6. Never Use Sarcasm or Rude Jokes: Never Writing standards are the principles, rules, Module 2 E-Learning Disadvantages of E-Learning
cannot understand what you have written, use sarcasm or rude jokes as it a professional guidelines and norms to be followed while
there is hardly any chance of them taking any needs to be included in one mail. Once that is Meaning and Definition of E-Learning
done, a second message can send for other communication. writing technical document. 1. Technical Issue: Loss on connectivity,
action it. It is good practice to proofread failure of electronic equipment, power failure
emails twice over and use spell check. subject. 7. Do not write in CAPITALS. STANDARDS OF DOCUMENTATION E-Learning is the learning conducted through
electronic media. Electronic media consist etc may affect e-learning.
10. Writing a Complaint: When making a 5. Use Proper Spelling, Grammar & 8. Do not use abbreviations. 1. Clarity: The documents should be clearly radio, television, smart phones, internet etc
punctuations: Proper spelling, grammar and 2. Poor Assessment Capability: Most of the
complaint, should briefly state the history of conveys the intended message without online assessments are limited to questions
the problem to provide context of your punctuations give a good impression abut the 9. Do not overuse Replay to all. ambiguity. E-learning refers to situations where
company. individual learners access learning resources that are only objective in nature.
reader and explain the attempts made
TECHNICAL DOCUMENTATION 2. Avoid Jargons: avoid industry specific like database or course content online
previously to resolve the problem. 6. Read the Email Message Before Send it: It 3. Not Suitable for All Subjects: It may not be
Technical document refers to any document words that are difficult for other to through internet. suitable for practical based papers and
11. Attachments: When sending an is very important to read the email before understand.
sending as it can prevent it from spelling and that explains the use, functionality, creation, Advantages of E-learning problem papers.
attachment tells the respondent about the
grammar mistakes and thus, helps in sending or architecture of a product or process in 3. Simple language and proper care on
details of the attachment. Compress large 1. Convenience: It can be conducted in 4. Health Problems: Excessive use of
a more effective message> business. Professionals educated in this field grammar.
attachments and send attachments only different platforms, different forms and at computer, mobile phone, and internet may
are termed documentalist.
when they are absolutely necessary. 7. Provide all Supporting Information: This different times convenient to the user. create health issues such as eye strain, back
4. Indexing: Good table of content an
will help the recipient complete an action or TYPES OF TECHNICAL DOCUMENTS IN indexing helps the user to find there required pain, sleeping disorders etc.
12. Privacy: Confidential information can be 2. Any Time Accessibility: It is accessible 24
respond successfully. BUSINESS matter from the documents easily.
sent in a locked format like PDF, password hours in a day 7 days in a week as per the 5. Limited Scope of Interaction and Feedback:
protect it and encrypt it. Corporate mail 8. Keep Language Gender Neutral: Apart from 1. Description Document: The functional convenience of the user. Most of the online learning platforms lack
ATTRIBUTES OF GOOD DOCUMENTATION
should be used for work only. using him/her, we can also use neutral description document provides information deep interaction between the participants.
gender. on the systems requirements and the services Following are the principles of technical 3. Low Cost: The cost of e-learning is
13. Check and Review: Editing and proof offered. This document should offer a writing. comparatively low while compared to 6. Plagarism: Plagarism the practice of taking
reading must be done in all cases. Review and 9. Use Active Instead of Passive: Try to use detailed overview of the software. physical learning. or copying the work of others without
spell check the email one more time to make active voice of a verb wherever possible. 1. Quality Content: Content of the document permission or criterion. Online materials may
sure it is truly perfect. 2. Installation: It is meant for system must be complete and comprehensive. 4. Flexibility: E-learning is flexible in terms of contain illegally copied content.
10. Use Proper Structure and Layout: Use administrators. It should provide information time and place of learning.
14. Response Time: Each email should be short paragraphs and blank lines between 2. Stated Purpose: If the purpose of the item 7. Digital Divide: E-learning is in-accessible to
on how to install the system.
replied to within at least 24 hours and each paragraph. is provided a user can quickly start and 5. Anonymity: Learners can participate in the computer illiterate people.
preferably same working day. 3. Configuration: This document provides accessing what they need. learning process without disclosing his/ her
11. Avoid Using URGENT and IMPORTANT. information on how to configure the system identity. It is beneficial for shy students. 8. Feel of Isolation: Online learning is a solo
15. The Closing: Always sign off with the or the software for end use. 3. Accessibility: It should be attractive and act and the learner may feel a sense of
name of the sender ay the end of the 12. Check Your Mail Before You Leave Office. accessible. 6. Encourages Interactions: E-learning isolation.
message. If you don’t know the reader well, 4. User Manual: It should outline the normal facilitates increased student teacher
you must also consider including your title Don’ts functions of the system and should provide 4. Accuracy: It should provide correct and interactions. Principles for Successful E-Learning
and the organisation you belong to. instructions on how to get started and how to error free information.
1. Do not copy a message or attachment 7. Repeated Learning: Online lectures and
without permission. use the various applications. 5. Coherent: There must be logical Principle 1. Match to the Curriculum: It
recorded videos can be seen any number of
Dos and Don’ts association between parts of content. should be suitable to the curriculum and its
times.
objectives.

Principle 2. Inclusion: It must be able to 7. Learning Management System (LMS). 2. It can be accessible at any time 7. Assessment: Teachers are responsible for different times and locations. e.g.: learning 2. Growing number of smart phone users.
include all categories of learners including the making assessment. through YouTube recorded classes.
physically or mentally disabled. 8. Internet of Things (IOT). 3. It addresses individual learner’s 3. Improving penetration of internet.
differences. DIGITAL AGE LEARNER 3. Individual and Collaborative Learning:
Principle 3. Learner Engagement: Learners 9. Cloud Computing. Individual learning is self learning or 4. Digital India initiatives of the Government
should be motivated to engage the learning 4. Variety of resources can be combined. A digital age learner is someone who utilises individualised instructions by the teacher. of India.
10. Video Platforms. the digital technology for learning. All
process. 5. Useful for part time and distance Here there is no scope for interactions with 5. Increasing participation at the Government
learners utilising the online educational other learners.
Principle 4. Innovative Approaches: education. resources are called digital age learners. level.
Innovative technology, new online education Online Education 6. It is flexible. Collaborative learning is a situation in which 6. Availability of free online platforms.
tools etc is to be used in e-learning. two or more people learn or attempt to learn
Modes of Education 7. Cost of education is low. something together.
Principle 5. Effective Learning: The content Characteristics of Digital Age Learner
and methods of online education must be 1. Traditional Education (Conventional 8. Repeated learning process. 4. Linear and Non-Linear Learning: Linear
education): Education provided through 1. Busy with other works and employment.
suitable to the needs of the learners. learning is the directed, controlled and
lectures at regular classroom settings. 9. It is environment friendly education. 2. Learning from home and work programme centred approach. Learner has to Challenges of E-learning in India
Principles 6. Formative Assessment: Regular environment. complete a certain level of content before
assessment should be conducted along with 2. Online Education: It is the education Role of teacher in Online Education 1. Dominance of Government sector which
moving to the next one.
the teaching learning process. provided through internet. 3. Impatient: They want to get information stick on conventional learning.
1. Developer of Course Materials: One of the
fast with minimum effort. In non linear learning approach learners are
Principles 7. Summative Assessment: An 3. Hybrid Education: it is the education that most important responsibilities of the 2. Majority of the population is living in rural
provided with variety of options and they can
online test may be conducted at the end of combines face-to-face classroom instructions teacher is the design and development of 4. Digital natives, Digital literates and tech areas where there is no sufficient
choose their own path. There is no particular
the learning process to understand the level with online activities. course materials in electronic format. savvy: They have grown up with digital infrastructure for e-learning.
sequence of learning process.
of learner achievement. technologies.
Meaning and Definition 2. Guide and Motivator: Online teacher has 3. High digital divide: High gap between
E-Learning as a Service Industry
Principle 8. Coherence, Consistency, to play the role of a guide and should 5. Utilises different technologies to access digital literates and illiterates.
Online education simply means the education motivate the students to actively participate
Transparency: The pedagogy and its content knowledge: Using mobile devices, advanced E-Learning and online education can be
delivered and administered through internet. in the learning process. 4. Lack of communication facilities.
must be logical, consistent and clear. app and soft wares. considered as a service industry, because of
According to Khan Online education “as the 3. Tech Savvy: There must be proficient in the
the following reasons. 5. Slow internet connectivity
Principle 9. Ease of Use: Methods, and 6. Self motivated to learn.
delivery of instructions to a remote audience use of modern technology, especially
techniques used for e-learning must be easy
using the web as an intermediary.”  A specialised service is provided to the 6. High cost of technology
to use by the learner. computers, internet and learning platforms. 7. Active in social media. society through online education
Features of Online Education  E-learning market consists of a large Internet – A knowledge repository
Principle 10. Cost Efficient: The cost of 4. Effective Communication: Online APPROACHES IN ONLINE EDUCATION
communication is different that of traditional number of players working for profit.  Internet is a knowledge repository
technology solutions must be affordable to 1. It is the education delivered through
class room communication. Online teacher 1. Self Paced and Instructor-Led: In self paced  Most of the educational resources are (data base) that systematically stores
the learner. internet.
must be able to manage all online learning, the learners initiate and direct their directly or indirectly paid information and knowledge
Major Technologies Used In E-Learning 2. It is the use of information and communication Medias and techniques own learning process. It is the voluntary  Companies are investing huge funds  Internet resources can b easily tapped
communication technology in education. effectively. learning through online mode. for the development of e-learning by any person who has the skills to
1. Search Engines and Educational Search tools
Instructor led learning is the learning initiated use the internet.
Engines. 3. Focus shifted from teaching to learning. 5. Moderator and Facilitator: As that of  Many traditional courses and training  We can search any kind of information
traditional classroom, the teacher has to play and facilitated by a teacher or instructor.
programmes are replaced by online o the net.
2. Blogging and Vlogging. 4. Online education facilitates online as a moderator facilitating the interaction courses.
learning. 2. Synchronous And Asynchronous Learning:  Internet contains a good collection of
3. Mobile Devices with Wireless Connectivity. between learners. Synchronous learning occurs in real time with  Educational sector contributes to the e knowledge resources such as online
5. Online education is student centred. live interaction of all participants. e.g.: zoom, economics growth of the country. encyclopaedia, e-books and digital
4. Augmented Reality. 6. Co-Learner: Online teacher must be a
lifelong learner not only towards course Google meet. libraries.
6. It utilises variety of learning platforms. Key Factors Contributing to the Growth of
5. Screen Casting. content but also towards methods of online In Asynchronous learning, students learns E-Learning in India Knowledge resources on Internet
Importance of Online Education teaching. pre-recorded or pre written materials at
6. Artificial Intelligence. 1. Rising demand from various segments.  Electronic book (E-books )
1. It is convenient to the user.

 Audio resources 4. Navigation: Reader can navigate to specific  Publishers make restrictions to use e- learning course, be sure that learners have 3. Video size must be low, compared for * News groups: Discussion forums on specific
 Video Resources page. books in libraries. the ability to adjust the volume or mute the mobile viewing. topics. Eg: Usenet
 Electronic journals  Chance of piracy- There is a chance to narration or music altogether.
5. Bookmark: Reader can use electronic 4. Add interactive elements: Asking questions * Question and Answer websites: Such as
 Online encyclopaedia share copyrighted books with others.
bookmarks to mark the area already read. 7. Choose Audio With The Right Tone, Jargon, or link for other actions. Quora and Yahoo answers.
 Online dictionary etc.  Subjects to internet threats.
And Pace: The audio used in e-learning
6. Tangibility: Physical e-book readers make should be suitable with the message to 5. Use appropriate colour combinations. Introduction to E-Content and Tools
1. Electronic Books (E-Books) 2. Audio Learning
e-books tangible. convey. 6. Use music and sound effects. All content and information in digital format
Electronic book is a book available in digital Any learning via listening to any material is
Advantages of E-Book 8. Enhance the Experience with Suitable is called e-content. It is the content created
form readable on electronic devices such as an audio method of learning. Audio is an 7. Support video with additional learning
Background Music. and delivered through electronic media.
computer, smart phone and e-readers. It is  E-books are delivered immediately electrical or other representation of sound. materials.
the electronic version of the traditional after purchase. There are no packing Audio is definitely powerful and it can do Types of E-Content
9. Create Fun and Creativity with Customized 8. Select appropriate video hosting platform.
printed book. Users can purchase an e-book and shipping expenses. several things in e-learning.
Songs. 1. Assembled E-Content: It is the already
on storage devices such as CD, but the most  It is accessible everywhere at any How to Use Audio in E-Learning 4. Electronic Journals published electronic resources collected and
popular method of getting an e-book is to time. 3. Video Resources
purchase a downloadable file of the e-book assembled from various resources.
 It is environment friendly. 1. Avoid Text Speech Redundancies: The It is a periodic publication in electronic
from internet. There are three ways to read Video is the electronic medium for recording
 No need of large physical space (It can audio included in e-learning course should format on the internet. It contains conceptual 2. Created E-Content: It is the e-content
e-books and displaying moving visuals with or without papers, research papers, review articles etc.
be stored in portable devices or not just simply narrate the text that is being developed by the teacher or learner as his
audio. Online and offline video resources can
cloud). shown on the screen. It is always a good idea own work.
1. Open and read e-books in electronic be best utilised for teaching and learning 5. Online Encyclopaedia
devices as other documents such as pdf files.  Easy retrieval –Stored e-book can be to highlight certain key concept on screen
purposes. Teachers can use pre-recorded Forms of E-Content
searched and retrieved easily. and use audio to elaborate upon the subject. It is a huge online database which contains
video classes or can interact with the learner
2. Read e-books in a physical e-book reader.  E-books are portable. information on all branches of knowledge
2. Use Audio with Visuals for More Complex through video conferencing tools.  E-Books
 E-books contain links for further accessible through internet. Eg: Wikipedia,
3. Install e-book reader software in your PC Subject Matter: If subject is more difficult to  E-Journals
information. Benefit of Using Video in E-Learning Encyclopaedia Britannica Online.
or mobile. understand, it is better to pair audio with  Videos
 E-books contain multimedia format (E-
images and graphics in order to provide 1. Learning becomes more interesting. 6. Online Dictionary  Audio clips
E-Book Reader books can contain not only text and
images, but also audio and even
learners with a more detailed understanding  Digital text
the concepts involved. 2. Keep the learners more engaged with It is online resources that lists the words of a  Digital images
An e-Book reader is a portable handheld video). learning process. language and give their meaning,  Graphics
electronic device specialised for reading  E-Books are printable if necessary. 3. Use High Quality Audio: Using high quality pronunciation, origin, usage etc. Eg: Google
digital books. It enables the readers to  E-books can be updated when new 3. Easy understanding and retention.  Animation
audio that is easy to understand, on topic, Dictionary, Viktionary.
bookmark pages, make notes, highlight editions are released. and concise is key to a successful e-learning  Power point presentations
passage, check dictionary, expand fonts and  Fonts can be resized to meet the course. 4. Larger amount of content can be presented 7. Web Portals  Quiz
save selected text. The e-book reader is requirements of different users. in limited time.
4. Assess Learners Knowledge Through A web portal is a web- based platform that Features / Advantages of E-Content
normally designed tom operate over long  Same device can be used to read
Creating an Audio Presentation: Learners are 5. Methods and procedures can be collects information from different sources
hours by consuming minimal power.eg: many books.  E-Content is learner friendly and
directed to develop and record audio demonstrated easily. and present in a uniform way. Eg: Yahoo,
Amazon Kindle, Kobo, Sony reader. learner centric.
Limitations of e-books presentations based up on what they have igoogle
Features of e-Book
6. Complicated concepts can be described  It can be best used by teachers.
learned throughout the e-learning course.
 Not convenient like printed books to
easily. 8. Other Knowledge resources on internet  E-content can include links to other
1. Digital Form: It is the electronic version of read. 5. Provide Audio Instructions for More resources.
7. Different learning styles can be
print books.  E-books can cause eye strain. Complicate Assignments: instructors can give * News Portals: BBC world news, NDTC etc.  As it is stored in cloud, It is permanent
accommodated.
 Reading e-books require power. provide an audio explanation of their and will not be lost.
2. Searchability: Reader can search for * Thesis Reservoirs: Shodganga, OATD etc
 Proper electronic devices such as e- expectations to guide learners through the 8. Encourage discussion.  E-Content can be accessed at
specific text in e books.
book readers are needed for steps they will need to take in order to * Information Websites: Provide variety of anywhere and anytime.
complete the assignments. How to Use Videos Effectively in E-Learning information.  E-Content can be searched on the net.
3. Referanceable: E-books text contains links comfortable reading.
for reference or additional reading.  E-book readers are costly. 1. Keep videos short and concise. E-Content Development
6. Allow Learners to Control the Audio Play * Blogs: Individual information WebPages.
Back and Volume: When integrate audio in e- 2. Video and sound quality must be good.
E-Content development is the process of internet.eg: National Digital Library of India, Limitations of MOOC  Open Boundary Course (OBC): 4. INFLIBNET (Information and Library Categorical Data
designing and creating electronic content. Universal Digital Library and Google Books. Formally enrolled students and Network): A platform for connecting all
Creation of E-Content requires knowledge  More chance of students drops out. outsiders study together. universities and colleges in India. Categorical data is data that has been placed
and skills in information technology and its Features or Advantages of Digital Libraries  Active feedback and discussion not  Small Private Online Course (SPOC): It into groups. An item cannot belong to more
application. possible due to large number of is an online course designed for a 5. Consortium for Educational than one group at a time.
 Variety of Digital Content: It offers participants. Communication (CEC): An inter University
contents including books, videos, specific small group of students. SPOC Continuous Data
Phases of E-Content Development  Students need to be self motivated to often charge tuition fees. centre set up by UGC to address the needs of
thesis and other educational higher education through television.
learn.  Massive Online Course (MOC): It is the Continuous data is numerical data measured
1. Analysis Phase: It involves the analysis of materials.
 E-Literacy is an essential requirement. online course available for anyone to on a continuous range or scale. In continuous
the current situation and the determination  No Physical Boundaries: no need to MODULE 3 BUSNESS DATA ANALYSIS
 Technical problems: Connectivity enrol. data, all values are possible with no gaps in
of objectives, target audience etc. visit library physically.
problem, power failure etc.  Wrapped MOOC: Students in an on- Computer between.
 Anytime Availability: Resources are
2. Design Phase: It is the planning stage of E-  No formal degree awarded after the campus course are asked to
available 24 hours x 7 days. Computer is an electronic device that accepts Business Data Analysis
Content preparation. course. participate in a MOOC hosted by other
 Multiple Accesses: Same resources
 Lack of certification or non- institution. data from the user, processes it, produces
3. Development Phase: In this stage, e- can be accesses by many users at the It is a practice by which a specific set of
conventional certificates. results, display them to the users, and stores
content is to be created by mixing text, audio, same time. techniques, competencies and procedures
MOOC Platforms in India the results for future usage.
video etc  Searchability: Many search options are applied to perform the continuous
are available to find appropriate 1. SWAYAM (Study Webs of Active Learning Data Analysis exploration, iteration, and investigation of
4. Testing Phase: Prepared e-content is to be resources. for Young Aspiring Minds): It is a MOOC past and current business data, for the
checked to ensure that it is free from spelling  Easy Retrieval of Information: launched by MHRD, Government of India Data analysis is the process of evaluating purpose of obtaining insights about a
mistakes and other errors. It should be tested Information can be retrieved easily in under Digital India initiative. Courses are data using analytical or statistical tools to business that can lead to improved decision
appropriate platform. suitable format with least effort and delivered through SWAYAM are available at discover useful information. making.
minimum rate. free of cost, but learners who want a
5. Implementation Phase: E-Content is to be Information
 Huge Space: Huge local and cloud MOOC Vs Other online Courses certificate has to pay exam fee and to attend
made available to the targeted people
space is available to store resources. an online test at a designated centre. When data is processed, it becomes Importance of Business Data Analytics
through appropriate platform. Other online Courses MOOC
 Low Cost of Maintenance: Cost of information. Information is the organized and
Students have to pay It is provided free of 2. NPTEL (National Programme on  A Methodology for Decision Making:
6. Evaluation Phase: Collect feedback from maintenance is low compared to processed form of data which is meaningful.
fees cost Technology Enhanced Learning): It is the Business analytics is a methodology or
learner and instructors to assess the physical libraries.
There are entry Usually no entry project initiated by seven IITs and Indian Forms of Data tool to make a sound commercial
effectiveness of e-content. It will be useful requirements requirements
MOOC Institute of Science. decision.
for the preparation of further materials.  Qualitative Data
Static content Dynamic content  Operational Efficiency: Facilities
E-Content Authorising Tools MOOC is the online course aimed at Content is largely Content is largely 3. mooKIT: It is an open source MOOC  Quantitative Data
management software developed by IIT better understanding of available
unlimited participation and open access proprietary and open and free to A) Categorical Data
Kanpur. data, which again affect operational
It is a software package which developers use through internet. It is a web based distance copyrighted access and share B) Continuous Data
efficiency of several departments.
to create e-content deliverable to end users. learning programme. It is a model for Offered by distance Offered by renowned 4. IITBombayX: It is an online platform Qualitative Data  Competitive Advantage: It is how the
It consists of all software used to create e- delivering learning content online to any education providers universities and developed by IIT Bombay to offer MOOC. information is utilised makes the
content such as MS power point, Screen person who wants to take the course. institutes Qualitative data is data that uses words and company competitive.
recorder, video editing software etc. There Admission and exit is Students can start Other initiatives of Government of India
Features or Advantages descriptions. Qualitative data can be  Valuable Information: Converts
are different e-content authorising tools such restricted and and stop the course towards e-learning and Online Education observed but is subjective and therefore available data into valuable
as SCROM, AICC, ADL, AASL, LTSC etc.  Designed and implemented by controlled at any time difficult to use for the purpose of making
1. Digital India: It is the programme launched information.
educators. Conventional degree No formal degree comparisons.
Online Libraries to transform India into a digitally empowered
 Large number of students can join. is awarded and awarded and no Types Data Analysis
society and knowledge. Quantitative Data
A digital library is a website that provides  All interested persons can participate. formal certificate is formal certificate is
given given 1. Descriptive Analysis: Descriptive analysis
success to e-book, e-journals and other  No tuition fees. 2. Education and Research Network (ERNET): Quantitative data is data that is expressed looks at past data and tells what happened. It
collected learning resources. It is a collection  Open access. Working for network connectivity in India. with numbers. Quantitative data is data describes or summarizes a business’s existing
of documents organised and stored in  Video lectures of top level professors. Emergent Forms of MOOC Type of Courses which can be put into categories, measured, data to get a picture of what has happened in
electronic format that is accessible through 3. EDUSAT: Satellite launched for education
 Video lectures are recorded and or ranked. the past or is happening currently. It is the
in India.
rewatchable.

simplest form of analytics and employs data 6. Communication: The results for the management to implement business 3. Python: Python is an object- oriented predictive results that were formerly 4. Better Decision Making: Accessibility to
aggregation and mining techniques. analysis are to be reported in a format as analytics. Although most organisations have scripting language which is easy to read, impossible. important data gives companies the power to
required by the users to support their adopted some form of business analytics, write, maintain and is free open source tool. make accurate decisions.
2. Diagnostics Analysis: Diagnostic data decisions and action. analytics is still an area viewed with doubt by 4. Neural Networks: Data scientists can now
analysis aims to determine why something many top-level executives. Therefore truest 4. Sas: sas is a programming environment and create “brains” which have the computing 5. More Effective Marketing: Data analytics
happened. Once descriptive analysis shows Components of Business Analytics must be built to effectively leverage data language for data manipulation and a leader power of thousands of human minds. Data also gives useful insights and we can use this
that something negative or positive analysis. in analytics. can be processed and sorted, patters can be information to adjust the targeting criteria
happened, diagnostic analysis can be done to 1. Date Aggregation: Before data can be identified along a historical timeline, and either manually or through automation, or
find out the reason. analysed, it must be collected, centralised, 2. Poor Collaboration: Lack of teamwork 5. Excel: Excel is basic, popular and widely future predictions are delivered with an use it to develop different messaging and
and cleaned to avoid duplication, and filtered among some departments can slow the used analytical tool almost in all industries. unprecedented level of accuracy. creative for different segments.
3. Predictive Analysis: Predictive analysis to remove inaccurate, incomplete, and evaluation and implementation of analytics- Excel becomes important when there is a
predicts what is likely to happen in the unusable data. driven initiatives. requirement of analytics on the client’s 5. The Internet of Things: IoT-driven devices 6. Plan for Future: With predictive analytics,
future. In this type of research, trends are internal data. number in the millions, delivering real-time allow businesses to plan for the future in
derived from past data which are then used 2. Data mining: In the search to reveal and 3. Lack of Commitment: Many analytics data to organisations worldwide and allowing ways that were previously impossible.
to form predictions about the future. identify previously identified unrecognised software packages provide solutions that are 6. RapidMiner: Rapidminer is a powerful intimate entry into the lives of consumers
Predictive analytics forecasts the possibility trends and patterns, models can be created easy o implement. However, cost of integrated data science platform developed around the globe. Disadvantages of Business Data Analysis
of future events using statistical models and by mining through vast amounts of data. implementation is high and return on by the same company that performs
Data mining employs several statistical predictive analysis and other advanced 6. Micro Segmentation: As data becomes 1. Lack of Alignment, availability, and trust:
machine learning techniques. investment is often not immediate. Although The analysis is shared with the top executives
techniques like classification, Regression, analytical models develop over time and analytics like data mining, text analytics, bigger, the ability to separate it into smaller
4. Prescriptive Analysis: Prescriptive data Clustering. machine learning and visual analytics without and smaller parts enables organisations to and thus the results are not easily
prediction will improve, dedication is communicated to the business users for
analysis combines the information found required during the initial days of an analytics any programming. accurately define their “ideal” customer and
from the above mentioned types of data 3. Association and Sequence identification: In create channel that lead them directly to the whom they provide the greatest value.
many cases, consumers perform similar initiative to become success. 7. KNIME: KNIME is leading open source,
analysis and forms a plan of action for the desired action. 2. Lack of Commitment: The business udders
organisation to face the issue or decision. actions at the same time or perform 4. Slow information Maturity: Business reporting, and integrated analytics tools that
predictable actions sequentially. allow you to analyse and model the data 7. Cloud Computing: Cloud computing, the do not see the promised results immediately;
This type of business analytics is capable of analytics implementations often fail due to they lose interest which results in loss of trust
not only suggesting all favourable outcomes lack or low quality of available data. through visual programming. process of using remote servers on the
4. Text Mining: Companies can also collect internet to store and manage data, provides a s a result of which the models fail.
according to a specific course of action and textual information from social media sites, 8. BIRT: BIRT is a basic open source analytics
outcomes. many of the benefits businesses demand. 3. Low Quality of Transactional Data:
blog comments, and call centre scripts to tool for reports, dashboards, and
extract meaningful relationship indicators. Business Data Analytics Tools visualizations, but requires working Implementation of the solutions provided by
Phases of Data Analysis the business analysts fail because the data is
knowledge of Java, scripts, and formatting.
1. Data Requirement Specification: 5. Forecasting: A forecast of future events or Business data analytics tools are types of not available, the data sources are too
Determination of the type of data required or behaviours based on historical data can be application software that retrieve data from Trends in Business Analytics complex or they are poorly constructed.
created by analysing processes that occur one or more business systems and combine it Advantages of Business Analytics
how the data is grouped. 1. Big Data: With an increasing emphasis on Business Data Analyst
during a specific period. in a repository, such as a data warehouse, to 1. Increase Efficiency: With the ability to
2. Data Collection: Process of gathering be reviewed and analysed. digitalisation in every aspect of life, datasets
6. Predictive Analysis: Companies can create, continue to expand at an extraordinary rate. gather a large amount of data at a fast rate Data analyst is a person who is responsible
information on targeted variables identified and present it in a visually appealing way, for data analysis in an organisation. A data
as data requirement. use and manage predictive scoring models, 1. R Programming: R programming is a This expansion is both advantage and a
positively addressing events such as language and software environment for disadvantage. companies can now formulate decision to analyst collects processes and performs
3. Data Processing: The data that is collected customer behaviour narrowed down to statistical analysis, graphics representation help achieve specified goals. statistical analysis on large dataset. They
must be processed or organised for analysis. customer age , Income etc. and reporting. 2. Artificial Intelligence: Artificial intelligence discover how data can be used to answer
become smarter and able to teach them, also 2. Insights through Data Visualisation: questions and solve problems.
This includes structuring the data as required Through visual presentation of data, relevant
for the relevant analysis tools. 7. Data Visualisation: Interactive graphics and 2. Tableau Public: Tableau Public is a free are being developed and launched in industry
other visual images are used to present the software that connects any data source be it verticals such as banking, insurance, retail and useful insights can be extracted in a Responsibilities Data Analyst
4. Data Cleaning: Process of preventing and output to management. corporate Data Warehouse, Microsoft excel and more. much clearer way.
1. Producing Reports: Writing a report is not
correcting errors. or web base data, and creates data 3. Keep Updated: Business analytics enables as simple. Those reports give management
Challenges Faced by Business Analytics visualisations, maps, dashboards etc. 3. Deep Learning: The next step from
5. Data Analysis: Analyze data to draw machine learning leverages the advantages of organisation to be dynamic at all times to insights about new trends on the horizon as
inferences and conclusions. 1. Executive Distrust: It is not practical to get vast computing power to manage enormous serve the needs of ever changing consumers. well as areas the company may need to
the consent of everyone in upper data sets, identifying patterns and delivering improve upon.

2. Spotting Patterns: In order to produce a data warehouse and use querying languages databases to data collected by sensors and collecting data about existing customers and the right range. Validity refers to how the 2. Version: Version checks are performed
meaningful report, a data analyst first has to to finds and manage data. satellites. Eg: Government reports. then finding the potential new customers data is collected rather than the data itself. when the data are transformed through the
be able to see important patterns in the data. with similar attributes. use of metadata to ensure that the format of
At the base level, data is used to find trends 6. Data Mining and Cleaning: If data is not Data Collection How to Collect High Quality Data the original data has not been changed.
and insights that we can use to make neatly stored in a database, data analysts 3. Improved Relationships with Customers:
must use other tools to gather unstructured Primary Data: Primary data are first-hand The information about customer’s 1. Implement a Data Collection Plan: It is 3. Completeness Check: A completeness
recommendations to client. information collected by the surveyor. The essential to determine the kind of data that is
data. preference, interests, and needs can be used check ensures that the summaries are correct
3. Collaboration with others: The analyst is data so collected are pure and original and to provide them with content that appeals to needed to meet the goals and the methods to and that all values needed to create the
not a person working apart from the rest of 7. Advanced Microsoft Excel: Data Analysts collected for a specific purpose. them and even anticipates their needs. This collect and manage it. summery are recorded.
the company; it is his responsibility to should have a good knowledge on excel and can be help to build strong relationships with
understand advanced modelling and analytics Methods of Primary Data Collection 2. Set Data Quality Standards: Data quality 4. Conformity Check: A conformity check
collaborate across many other departments them. standards to set which involve which data to
in an organisation including marketers, techniques. 1. Personal Investigation makes sure, that during data analysis and
4. Easy to Use: High quality data is also much keep, which to get rid of and which to reporting, correlations are run between the
executives, and sales people. 8. Machine Learning: Data analysts with correct. Everyone involved in managing the
2. Collection via Investigators easy to use than poor-quality data. Quality value reported and previous values for the
4. Collecting data and setting up machine learning skills are incredibly data also increases company’s efficiency. data should agree on and understand these same number. Sudden changes can indicate
infrastructure: The most technical aspect of valuable, although machine learning is not 3. Questionnaire standards. basic change in the business, analysis errors,
an analyst’s job is collecting the data itself. expected skill of typical data analyst jobs. 5. Increased Profitability: High quality data or bad data.
4. Telephonic investigation can help design more effective marketing 3. Create a Plan for Data Collection: It is
Streamlining this data collection is key for Organisation and Source of Data desirable to create rules for correcting data.
data analysts. campaigns and increase sales. It also 5. Genealogy Check and Drill Down: A
Secondary Data: They are collected and These rules should define who is responsible
Data: Items about things, events, activities, decreases ad waste, making marketing genealogy check or drill down is a trace back
published already by some organisation or for correcting data and the methods; they
Skills Required For Data Analysts and transactions are recorded, classified, and campaigns more cost effective. to the data source through its various
individuals. should use to fix it.
stored but are not organised to convey any transformations.
1. Programming Language: Data analysts Components of Data Quality
specific meaning. Methods of secondary Data Collection 4. Plan for Data Integration and Distribution
should be proficient in one language and Missing Data or Incomplete Data
have working knowledge of a few more. 1. Official publication of Govt. 1. Accuracy: Accuracy refers to how well the across Departments: There should create a
Information: Data that have been organized data describes the real world conditions it plan for integrating and distributing data Missing data is defined as the data value that
2. Creative and Analytical Thinking: Curiosity in a manner that gives them meaning for the aims to describe. Information should be across the various departments with is no stored for a variable in the observation
2. Data published by Chamber of Commerce
and creativity are key attributes of good data recipients. Application processes data items accurate. organisation. of interest.
and trade association and boards.
analysts. It is important to have a strong base so that the results are meaningful for an
in statistical methods, but even more critical intended action or decision. Data Quality 2. Completeness: The data should be 5. Set Goals for Ongoing Data Collection: The Missing Data Present Various Problems
to think through problems with a creative complete in all respect. It should include all focus should be continuous improvement of
Knowledge: Knowledge can be the Data quality is the ability of data to serve an material facts which are necessary for data collection plan. 1. Reduces statistical power.
and analytical mind. application of data and information in intended purpose. Data quality is measured decision making. Information which is highly
making a decision. Knowledge consists of Data Integrity 2. The lost data can cause bias in the
3. Strong and Effective Communication: Data in terms of its accuracy, completeness, necessary to make decision should not be
data and or information organized and estimation of parameters.
analysts must clearly convey their findings consistency, and reliability and updating. In omitted.
processed to convey understanding, Data integrity is a broader concept that
whether it is to an audience of reader or a business data quality is the capability of data 3. It can reduce the representativeness of the
experience, accumulated learning, and 3. Consistency: When comparing a data item combines data quality, data governance, data
small team of executives making business to satisfy the requirements of a business samples.
expertise that are applicable to a current enterprise. Business data is said to be high or its counterpart across multiple data sets protection mechanisms. Data integrity is the
decisions. accuracy, completeness, reliability, and
problem or activity. quality, if it is best suited for taking and databases, it should be the same. The 4. It may complicate the analysis of the study.
4. Data Visualisation: Effective data absence of difference between multiple security of data throughout its lifecycle.
managerial decisions.
visualisation takes trial and error. A Source of Data versions of a single data item is referred to as Types of Missing Data
successful data analyst understands what Importance and Benefit of Data Quality consistency.
Internal Data: Internal data is a private data 1. Structurally Missing Data: Data is missing
types of graphs to use, how to scale that organisation owns controls and collects. because it does not exist. Example: The ages
1. More Informed Decision Making: Improved 4. Relevancy: Data gains value if it is relevant
visualisations, and know which charts to use Internal data can be primary or secondary. of children is missing because these people
data quality leads to better decision making to the decision making context. Providing Data Integrity Can Be Ensured By Addressing
depending on their audience. Eg: Accounting resources, Sales force reports have no children.
in an organisation. irrelevant data to the decision makers may the Following Five Issues
5. Data Warehousing: Some data analysts etc create the problem of information overload.
2. Better Customer Targeting: High quality 1. Uniformity: During data capture, 2. Missing Completely At Random (MCAR):
work on the back-end. They connect External Data: There are many sources of data enables to determine accurately the 5. Validity: Data is valid if it is in the right uniformity checks ensure that the data are Some data is missed but there is no
databases from multiple sources to create a external data. They range from commercial target audience. This can be done by format, of the correct type and falls within within specified limit. systematic difference between observed data
and missed data. So the analysis remains 6. Maximum Likelihood: Missing data is 3. Enable Organisational change: It is useful It is the data in organized form. It is the data 3. Cost Reduction: The initial cost of big data 7. No Short Run Benefits: Big data analysis is
unbiased due to the absence of missed data. estimated by using the parameters calculated to identify the formal and informal social that can be processed and stored in a fixed analysis is high, but it is useful to reduce the not useful in the short run. It is to be
Example: When we take a random sample, with the help of available data. networks within the organisation. Analysis of format. cost in the long run. employed in the long run to get the benefits.
some are selected and some are omitted. group relationships within these networks
7. Multiple Imputation: Missing data is can be used to improve business Unstructured Data 4. Support Decision Making: Big data analysis Data Scientist
3. Missing at Random (MAR): Some data is replaced by a set of possible values one after performance. provides relevant and updated information
missed, and there is systematic difference other and analysed separately. By combing It is the data that lacks specific form. It is very for decision making at various management Data scientists are analytical experts who
between the observed data and missed data. these analysis results, a single result is 4. Understanding Human behaviour: People difficult and analyse unstructured data. levels. utilise their skills in both technology and
The analysis may be biased due t the absence produced. communicate health data through social social science to find trends and manage data
Semi Structured Data 5. Improved Customer Service: Big data helps to solve complex problems in business. They
of missed data. Example: A randomly networks. It is useful for hospitals,
selected respondent fails to provide correct Social Networking Analysis government etc for designing health plans. It is the combination of structured and to understand the customer needs and wants are experts in big data analysis.
information because of ill-health. unstructured data. It is the partly structured and thereby to serve the customers better.
Social network is the social relationship 5. Identification of Criminal and Terrorist Role of Data Scientist in business and Society
among individuals, families, households, data. 6. Early Detection of Errors and Frauds: Big
4. Missing not at Random (MNAR): Data is Network: Through analysing the
communities etc. Internet based social media data analysis helps to mitigate losses by  Empower management to take sound
neither MCAR nor MAR. Data is missing communication between social networks, Four Dimensions of Big Data (4 V’s) decisions.
because of the reasons unknown to us. such as Facebook, WhatsApp etc. Social Government and law enforcement agencies quickly detecting the errors and frauds.
networking analysis is the practice of 1. Volume: Volume refers to the quantity of  Directing actions based on trends.
can identify criminal and terrorist networks.
Technique of Handling Missing Data gathering data from social media and data. Volume may be measured in terms of 7. Profitability and Growth of Business:  Search for new data sources and
analysing that data to make business 6. Improvement of Communication Flow: SNA Bytes. operational efficiency, smart decisions, better assess their accuracy.
1. List- Wise Deletion/ Case Deletion: Remove decisions. helps analyse and improve communication marketing strategies etc provided by big data  Challenging the staff to adopt best
all data of an observation that has on missing flow in every organisation. 2. Variety: Variety refers to diversified type of analysis naturally results in higher profit and practices.
value. It leads to the reduction in total Social Networking Analysis and Business data and source of data. It consists of growth of business.  Familiarize employees to use analytics
sample size. Example: Remove a respondent Analytics Big Data structures and, semi structured and system.
with one missing answer. Disadvantages of Big Data
unstructured data. It may be collected from  Recommend actions to improve
 Social network analysis is an integral Big data refers to the large volume of data internal, external,, direct, published and 1. High Cost of Implementation: The performance.
2. Pair- Wise Deletion: The value with missing part of business analytics. Social both structured and unstructured. It is in the unpublished sources.
data is only deleted from a specific form of text, audio, video etc. Big data refers implementation of a big data analysis system  Recruiting the right talent for the
network analysis is one of the main
observation. It is generally done when the to complex and large data sets that have to in the organisation is costly and complex. A organisation.
sources of data for business analytics. 3. Veracity: Veracity refers to the biases,
influence of one variable with another is  Social network analysis helps business be processed and analysed to uncover errors and abnormalities in data. Big data lot of It infrastructure is needed to  Testing the decisions.
analysed. Example: In correlation analysis, in discovering the patterns of valuable information that can benefits analysis employs cleaning and processing of implement the system.
Artificial Intelligence
remove the missing value of a particular interactions between people. businesses and organisations. data to avoid veracity. 2. Needs Technical Expertise: A lot of staff
question of that sample only.  This data utilized for determining with technical expertise is needed to collect Artificial intelligence is the ability of a
Big Data Analysis 4. Velocity: It refers to the speed with which machine or computer to perform those tasks
customer behaviour, understanding and analyse big data.
3. Mean Substitution: Te mean value of the data is generated from various sources. The which needs human intelligence. It is the
market trend, solving human resource It is the process of examining large amount of
other variables are taken in place of missing real time data helps business firm for taking 3. Storage Cost: The firm has to spend a lot of intelligence artificially created for machines.
problems etc. data to uncover information such as hidden
data. Example: If the age of one respondent timely decision. money to store data is secure manner.
is missed, the average age of other patterns, correlations, market trends etc for Intelligent Agent in Artificial Intelligence
Business and Other Applications of Social
respondents are taken as the age of missing managerial decisions. Big data analysis uses Advantages of Big Data 4. Mostly Unstructured: Majority of big data
Network Analysis (Uses and Benefits)
respondents. advanced analytic techniques for the analysis are unstructured in nature which needs An intelligent agent is a robot or programme
1. Analysis of Consumer behaviour: Social of big data. 1. Improved Business Processes and with artificial intelligence that can make
Productivity: Big data helps to improve the cleaning, organisation and processing.
4. Regression Analysis: It is the process of network analysis can be used to collect decisions or perform a service based on
replacing the missing value with the help of customer data such as customer profile, operational efficiency of the firm 5. Data Quality Issues: More information also experience, user inputs and available
regression analysis. Regression analysis helps customer behaviour, customer needs, continuously with minimum cost and effort. means more false and useless information. information.EG: GOOGLE Assistant.
to predict unknown values with the help of Customer preference etc. 2. Greater Innovation: Big data analysis helps The use of low quality data may yield
known values. Types of Big Data negative result. Feature of an Intelligent Agent
2. Solving Human Resource Problems: Social the business to introduce new technologies
5. Last Observation Carried Forward: Missing network analysis can be conducted to Structured Data and products. 6. Privacy and Security: It is very difficult to  Mobility.
value is replaced with last observed value. identify the problems of employee and to ensure the privacy and security and data used  Goal oriented
find solutions. in big data analysis. Data should keep free  Independent
from cyber attacks.  Intelligent

 Multi Tasking  Reduce Cost: Intelligent agents  Accountability: A company should use 5. Employment and Productivity: Use of 4. Lack of ICT skills and support: People in Types of Digital Natives
reduce e-commerce costs and make analytics with accountability. computers has created new job opportunities many areas do not have proper skills about
Intelligent Agents n E-Commerce web-shopping more transparent.  Data Protection: A company should an increased productivity. At the same time modern technology. 1. Avoiders: They were born in digital world;
 Building Relationships: Agents help implement appropriate safeguards to the introduction of IT in many social some young people do not feel likeness for
1. Identification: The identification stage of 5. Attitudinal Factors: Many people thought digital technologies.
business organisations in electronic protect the security of information applications has substantially reduced some
buying behaviour characterizes the buyer that new technologies are harmful to young
environment to gain intelligence on that it uses in analytics. types of job opportunities. 2. Minimalists: They use technology
becoming aware of particular unmet need by generation.
inspiring through product information. the market to create relationships  Due care: A company should assess minimally and when they perceive it
with every customer. 6. The Quality of Life: computerised business
Agents can play a significant role for those whether its use of analytics involves 6. Age: Young people feel more comfortable necessary.
systems increases productivity and provide
purchases that are repetitive. sensitive areas and, if so, accompany with ICT whereas older generation are less
Limitations of Intelligent Agents better quality goods and services at lower 3. Enthusiastic Participants: Most of the
it with reasonable safeguards interested in it.
costs. The standard of living of the people digital natives are enthusiastic participants.
2. Brokering: There are two types of  Stealing Data and Illegal Access: Web proportionate to the risk.
increased and now people get more leisure 7. Family Structure: Family with educated They enjoy technology and gadgets.
brokering namely product brokering and agents may try to get access to Module 4 Socio Cyber Informatics time for enjoyment. At the same time it is children have computers than families
merchant brokering. In product brokering databases they are not permitted to seen that some job done with the help of without children. Cyber Space
once a buyer has recognised a requirement to access or for which there is an access Social and Ethical Issues of IT computers are repetitive and routine and it
make a purchase the buyer has to determine charge. It refers to the virtual computer world, and
forces people to work like a machine. 8. Motivation: Some people may not see any
what to buy through a critical evaluation of 1. Privacy and freedom: Privacy s the right of
 Free Use of Resources: Agents always good reason to use it. more specifically, an electronic medium that
available product information. individuals to be left alone, free from 7. Security of Information: Computer also is used to facilitate online communication.
steal the resources from remote
hosts. surveillance or interference from other makes threat on the security of data. Effect of Digital divide Cyber space typically involves a large
3. Negotiation: In this stage of buying individuals or organisations. Unfortunately,
behaviour, price and other terms of  Unauthorised Programme Execution: Computer users have concern over their computer network made up of many
in many organisations employees are kept information kept in many data bases. It can  Economic inequality: Those who have worldwide computer sub networks that
transactions are settled between merchants This also known as Trojan horse.
under surveillance. IT aggravated this make available to or can be damaged by ICT access can collect valuable employ TCP/IP protocol to aid in
and buyers. Agents can be masquerade and then
execute programmes that are problem and threatens individual’s privacy. unauthorised persons. economic information and achieve communication and data exchange activities.
4. Payment and Delivery: This stage can economic progress.
eventually harmful to the remote 2. Internet and privacy: Internet brings new
either indicate the end of the negotiation hosts.
8. Health Problems: Many health problems  Effect on Education: Students who Opportunities in IT Industry
challenges to the protection of privacy of are also coming up with the extensive use of have internet access can acquire more
stage or cause to place another order.  Data Stripping or Alteration: individuals. Information sent over the  Infrastructure Outsourcing:
computers. knowledge, more skills, and do more
Technically it is possible to strip web network may pass through many computer infrastructure outsourcing is one of
5. Product service and Evaluation: This post courses online.
purchase stage contains of product service,
agents of their data. systems before it reaches to the recipient’s Digital Divide
 Economic Growth: Use of ICT increase the biggest revenue generating service
 Deceitful Agent Behaviour: Agents can computer. Each of these computer systems is lines in the domestic market.
customer service, and an evaluation of the The digital divide refers to the difference productivity and companies using this
satisfaction of the total buying experience
mislead other agents or hosts about capable of monitoring, capturing, and storing can complete better.  Hardware Support: The market for
their intent and can lie about between people who have easy access to the
this information. hardware support will be driven by
and decision.
transactions. internet and those who do not. It further  Social Mobility: ICT pay an important
role in learning, professional work and rising demand for IT systems and an
3. Accountability, Liability and Control: refers to the gap between people with
Advantage of Intelligent Agents of Buyers increasing trend to outsource the
Ethical and Legal Consideration in Business Accountability, liability and control raise effective access to digital and information career development.
maintenance of IT systems with the
 Easy Shopping: Intelligent agent can Analytics certain ethical issues. Here it is necessary to technology and those with very limited or no  Democracy: People who are in great
objective of reducing costs.
do shopping for a buyer, taking down find answers as to the responsibility, liability access at all. touch of ICT can make better decisions
 Comply with Legal Requirement: A  IT Consulting: It is a field of activity
specifications and returning the and accountability of software companies relating to democracy.
company should comply with legal Factors contribute to digital divide focuses on advising organisations on
recommendations of purchase which regarding the consequences of the use of how best to use IT achieving their
requirements in its use of analytics. Digital Natives
meets those specifications. their software. 1. Gender: females have less access to
 Cultural and Social Norms: A company business objectives.
 Identification of Stores and Brands: internet than males. It describes the generation of people who  Business Process Outsourcing: BPO
should assess, beyond legal 4. System Quality related issues: Many
Intelligent agents can be sent by grew up in the era of information technology, enables the service providers to
requirements, whether its use of software companies are marketing their 2. Physical Disability: People having visually
buyers to identify stores, brands, including computers and internet. Digital deliver the service at lower cost.
analytics reflects cultural and social software products without conducting strict and physical disability cannot use the
product category etc. natives are generally born after 1980s and  Infrastructure and Network
norms about acceptable activities. quality control tests to make it totally bug
 Make Comparisons: The above maximum utility of ICT. they are comfortable in the digital age.
 Interest of Stakeholders: A company free. Such non standard software may create integration Service: Demand for
capabilities enable the buyers to make infrastructure and network
should assess the impact of its use of server damages to information system of an 3. Physical Assess: Lack of telecommunication
comparisons even before visiting a integration services would primarily
analytics on the trust in the company organization. infrastructure create digital divide.
particular seller’s site.
held by a wide range of stake holders.

be driven by a need for synergies in IT criticized because it usually includes code the intent to harm the network amounts from every account over a period of their political bias, fundamentalism
systems. that tracks a user’s personal information and system and its operation. time. etc.
 Application and Software related passes it on to third parties, without the  Email Hacking: Getting unauthorised Protection from virus  Professional hackers or crackers:
services: The market for commercial user’s knowledge. access on email account. 7. Internet Time theft: It refers to the theft in These people are motivated by the
 Antivirus programmes a manner where the unauthorised person
application and custom application  Ethical Hacking: Finding weakness in a  Acquisition of software from reliable
attraction of money.
services would be driven by the 5. SPYWARE: Spyware is a type of malware uses internet hours paid by another person. 
computer or network systems for sources Discontented Employees: This group
growth in demand for application (malicious software) installed on computers testing purpose and finally getting The authorised person gets access to another include those people who have been
that collects information about users without  Testing new application in single person’s ISP user ID and password.
software. them fixed. either sacked by their employee or are
their knowledge. The presence of spyware is computer
 Password Hacking: Process of dissatisfied with their employer
IT Industry Threats typically hidden from the user and can be  System Updates Cyber ethics
recovering secret password from the
difficult to detect.  Email precaution IT Act 2000
1. Identity theft: Identity theft is the crime of data that are stores or transmitted by Cyber ethics is a code of behaviour for using
 Safe browsing
a computer system. the internet. It is the acceptable behaviour on
obtaining the personal or financial 6. MALWARE: Malware, short for malicious  It Bill was passed by Indian parliament
information of another person for the sole software, is software used or created by 2. Worms: A virus that duplicates itself and the internet is very much the same as
Remedies against hacking on May 17, 2000
purpose of assuming that person’s name or acceptable behaviour in everyday life.
hackers to disrupt computer operation, sends itself as an email attachment or as part  The IT Act came into effect on 17
identity to make transactions or purchases. gather sensitive information or gain access to  Checking system security: The security of a network message is known as a worm.
Cyber Crimes October 2000.
private computer systems. Malware includes of system can be checked with mock Unlike a virus, it is self contained and does  The main objective of the Act is to
2. SPAM: Spamming is the use of messaging computer viruses, worms, Trojan horses, not need to be part of another programme to It means the Criminal activity where a
security breaking software. Such provide legal recognition for
systems to send an unsolicited message spyware, and adware. software’s are developed by ethical propagate itself. It is often designed to computer or network is the source, tool, transactions carried out by means of
(Spam), especially advertising, as well as exploit computers file transmission target, or place of a crime.
hackers. electronic data interchange and other
sending messages repeatedly on the same 7. Internet Hoax: Internet hoax are stories capabilities.
 Use Firewall: The firewall act like a means of electronic communication
site. While most widely recognised form of that spread throughout the internet, often Types of cyber crimes
gate keeper that examines each user’s and storage of information to
spam is email spam. through mail, forums, and blogs or showing 3. Logic Bomb and Time Bomb: A logic bomb
identification before allowing them to is a piece of code intentionally inserted into a  Hacking facilitate electronic filing of
images that are untrue or alterations of the
Methods to avoid spam enter to the organisations internal software system that will set off a malicious  Phishing documents with the government
truth. It is created to try a person in believing
networks. function when specified conditions are met.  Cyber stalking agencies.
something that is not true. The hoax contain
 Black lists  Data Encryption: Encryption is the  It also provides legal provisions
virus will harm to the computer. It wastes our  SPAM
 Filtering systems process of coding of messages to 4. Web Jacking: In these kinds of offences the relating to piracy, defamation,
time by reading it and manipulates us.  Software Piracy
 Legal approaches prevent unauthorised access or hacker gains access and control over the web advertising, taxation etc.
 Cyber Pornography
 Separate email account 8. Hacking: A hacker is a person who gains understanding of data being site of another. He may even change the
 Install a firewall transmitted. information on the site. This may be done for Cyber Criminals Information Technology (amendment) Act
unauthorised access to a computer network
 Caution when filling out online forms. fulfilling political objectives or for money. 2008
for profit, criminal mischief or personal
9. Trojan Horse: It is unauthorised Cyber criminals are individuals or teams of
pleasure. Hackers put their mischievous Government had introduced the IT
3. COOKIES: A cookie is also known s HTTP programme which gain control over another’s 5. Email Bombing: An email bomb is a form of people who use technology to commit
programs in the network and consequently it (amendment) Bill, 2006 in Lok Sabha on
cookie, web cookie, or browser cookie is system by representing itself as an authorised internet abuse which is perpetrated through malicious activities on digital systems or
starts to perform some hidden functions 15 of December 2006. Both the houses of
usually a small piece of data sent from a programme. This programme seems to be the sending of massive volumes of email to a networks with the intention of stealing
which may cause serious damage to the Parliament passed the bill on 23
website and stored in a user’s web browser information stored in the computer systems.
useful, but does something harmful to the specific email address with the goal of sensitive company information or personal
while a user is browsing a website. Cookies computer system without our knowledge like overflowing the mailbox and overwhelming December 2008. Subsequently the IT
data and generating profit.
were designed to be a reliable mechanism for a game or screen saver. Anti Trojan scanners the mail server hosting the address, making it (amendment) Act, 2008 received the
Types of Hackers
websites to remember the state of the are available to protect data and systems. into some form of denial of service attack.  Children and adolescent between the ascent of president on 5 Feb 2009 and
website or activity the user had taken in the  Website hacking: Hacking a website ages of 6-18 years: The main reason was notified in the Gazette of India.
past. means taking unauthorised control Computer Threats 6. Salami Attack: A salami attack is when for this type of criminal behaviour
small attacks add up to one major attack that Cyber Addictions
over a web server and its associated pattern among children is mostly due
4. ADWARE: Adware, or advertising-support 1. Computer Viruses: A programme or can go undetected due to the nature of this
software such as database and other to curiosity to know and explore the It means overuse of computer and
software, is any software package which programming code that duplicates itself and type of cyber crime. It is also known as salami
interfaces. things. internet to such extent that everyday life
infects the computer is termed as virus. They
automatically renders advertisements. These  Network Hacking: Gathering slicing. The attacker uses an online database  Organised Hackers: These kinds of of an individual collapses. It leads to
advertisements can be in the form of a pop- can be transmitted as attachments to an to seize the information of customers that is
information about a network by using hackers are mostly organised together complete breakdown of social
up. The object of the adware is to generate email note or in a downloaded file, or be bank/ credit card details deducting very little
tools like telnet, ping, netsat etc with to full fill certain objective such as relationships, work, sleep routine and
revenue for its author. Adware has been present on a diskette or CD.
thinking capability.
Problem Associated with cyber Addiction real life. It is always better to keep aside little  Tiredness and illness * Substantial public spending on health care the manufacturing process is an important environment without fear of reprisal from
time for spouse and other family members.  Low mood and energy way to reduce waste generation. their employer, are the most effective
 Skipping meals  Decrease in brain performance
* Investments on complex and expensive environmental protection.
 Losing Sleep 4. Encourage other interests and social
 Difficult to concentrate
environment remediation technologies. 2. Production process modification:
 Rearrange daily routine activities: Parents can divert the interest of
 Increased blood pressure
Improvement in the operation and * Collect fee from manufactured/ consumers
* Loss/waste of resources that can be
 Neglecting studies and responsibilities their children to other hobbies and activities. maintenance in of process equipment can for the disposal of toxic material.
recycled for re-use.
 Adversely affect performance and Solution to information overload result in significant waste reduction.
5. Monitor computer use and set clear limits: Employee training is the key element of any * Should subsidies recycling and disposal
relations * Opportunities for recycling industries and
It is always advisable to place the computer  Filtering: Focusing attention only on waste reduction programme. industries
 Financial problems employment lost.
in a common area of the house where any the most useful and essential
 Physical problems family member can keep an eye on children’s 3. Volume Reduction: Volume reduction * Encourage and facilitate organized recycling
information and purposefully ignore * Ozone depletion has led to unpredictable
online activity, and limit time for online includes those techniques that remove the systems
Risk Factors for Internet Addictions other sources. weather condition.
activity.  Multitasking: Performing two or more hazardous portion of a waste from non- * Need for an e-waste policy and legislation.
 Anxiety: One may use the internet to job functions at the same time. Basel Convention hazardous portion. These techniques are
divert himself from his worries and Information Overload usually helps to reduce the volume. 3. Responsibilities of the citizen
 Escaping: Eliminating disturbances. Base convention, is an international treaty
fears. Information overload is a phenomenon of  Prioritising: Determining most
 Depression: Use of internet can be an that was designed to reduce the movements 4. Recovery and Reuse: This technique could * Donating used electronic to schools, NGO’s
having so much information that creates the important tasks first of hazardous waste between nations and eliminate waste disposal cost, reduce raw etc.
escape from feelings of depression, problem to decide what information is  Delegating: Determining which task
but it further contributes isolation. specifically to prevent transfer of hazardous material cost and provide income from a
important or unimportant rather than can be given employees. waste from developed to less developed saleable waste. * Follow rules and regulations of govt.
 Other addictions: Many internet helping people to solve problems and make  Refusing: Determining which task has
addicts suffer from other addictions, countries. * Dispose properly.
decisions. to can be left undone. 5. Sustainable product design: Minimization
mainly to drugs, alcohol, gambling and  To involve experts in designing of hazardous wastes should be made at
sex etc. Causes of Information Overload E-Waste Green Computing
communication tools. product design stage itself. Effort should be
 Lack of Social Support: Replaces real  To engage and stimulate a group of made to design a product with fewer It is “ the study and practice of designing,
life relations.  People: Personal traits such as Unwanted, obsolete or unusable electronic
interested parties. amounts of hazardous materials. manufacturing, using and disposing of
experience, skills, age etc cause products such as computers, computer
 Teenagers: They feel that internet is a  To motivate selective partners among computers, servers and associated
information overload. peripherals, televisions DVD players etc are Management of E-waste
world and feel more comfort than real various stakeholders to bring added subsystems,- such as monitors, printers,
life.  Technology: Technology not only commonly referred to as electronic waste.
creates information but also gives These wastes are disposed of by uncontrolled value to making progress in the short- 1. Responsibilities of the Govt. storage devices, and networking and
access to vast amount of it. burning and burying is causing environmental term. communication systems- efficiently and
Managing Internet Addiction
 Organisation: A successful problems.  To disseminates and make * Should provide adequate system of laws. effectively with minimal or no impact on the
1. Identify any underlying reasons that need organisation must be dynamic. information easily accessible through environment.”
* Government should set up set up
treatment: There is a need to treat  Processes and tasks: The more Impact of E-waste the internet.
regulatory agencies in each district. Benefits of Green Computing
psychological disorders like depression or complex a process or task, the greater  To undertake periodic review of
anxiety because such disorders may 1. Environmental impact
the information load and more time activities in relation to the agreed * Must encourage research into waste  Environmental sustainability
accelerate cyber addictions. required completing it. * Air pollution especially when it is burnt. indicators. management.  Better resources utilisation
 Information attributes: uncertainty of  To collaborate with existing institution  Cost saving
2. Increase your coping skills: People may * Waste management problem of non- * Should enforce strict regulations against
information, diversity of information, and programmes to promote better  Improved social corporate image
spend lot of time on the internet for biodegradable equipment dumping e-waste in the country by outsiders.
ambiguity, complexity and use of cleaner technology.
managing various feelings. Building to
information quality leads to Green Computing Practices
manage skills in these areas will help a * Increased amount of waste and air Management of E-Waste * Uncontrolled dumping should be phased
information overload. out.
person to avoid stresses and strains of daily pollution  Buy “Energy star” labelled monitors,
life without resorting to compulsive internet 1. Inventory Management: Inventory desktops, laptops and printers.
Health Issues * Toxicity and radioactive nature of e-waste management procedure for waste reduction * Provide recycling services.
use.  Put laptops in “ sleep” mode when not
Information overload cause to the human, soil and animals. must ensure that only the needed quantity of
2. Responsibilities and role of Industries. in use
3. Strengthen the relationships: Excessive use a material is ordered. This will require the
* Waste management disposal problem  Even better, turn OFF computers and
of internet for social interaction can be  Stress and tension establishment of a strict inventory tracking * Well trained workers, who are fully other equipment when not in use.
reduced by building strong relationship in  Longer working hours 2. Economic Impact system. Proper control over materials use in protected by the law to seek advice and take
 Decrease in social life action to protect their health and the

 E-cycle used computer equipment.  Accountability: It means availability of government and the business sectors.G2B 6. Vidya Vahini: It provides opportunity for customers adverse the product. The activities like
Find a recycler in your area. government to the people. An applications actively motivate e-transactions schools, teachers and students all across the Cost Comparatively Huge cost advertising, events, customer incentive
accountable government will be a initiatives such as e-procurement and the nation, to express and share their creative less cost schemes, marketing are all included in the
E-Governance responsible govt. development of an electronic market place and academic potential via internet. Its Coverage Online Mostly in promotion of the product.
It is the use of ICT (Information and  Improved Efficiency: Reduced paper for government purchases. mission is to spread education, uniform coverage will printed or on
based work, improved public service. quality of education across India to develop Features of Digital marketing
Communication Technology) at all levels of always be there
radio or
4. G2E (Government to Employees): Govt. is their creativity and problem solving skills.
government in order to provide services to television  Branding: Digital marketing provides
Disadvantages of E-Governance the biggest employer and like any
citizens, interactions with business Audience Teenagers and Illiterate great opportunity to build a brand
organisation, it has to interact with its 7. DRISHTEE: It provides information and
enterprises and communication and  Lack of equality in access to the businessman customers image on the web due to their scope,
employees on a regular basis. The purpose of access to education and health services,
exchange of information between different internet: Computer literacy of users are easy to prefer presence and constant updates.
this interaction is to serve employees and market related info and private info
agencies. and difficulty to access ICT is an reach through traditional  Completeness: The possibilities to
offer some online services such as applying exchanges and transactions. They also
important drawback. digital marketing disseminate information through links
online for an annual leave, checking balance provide benefits like access to education and
Stages of E-Governance marketing
 Lack of Trust and cyber crime: Attack of leave etc. health info. offer consumers the chance to
from hackers, level of security, leads Tracking Easy to track Needs more approach the organisation in a wider
1. Computerization: Computers were customer time and
to lack of trust. E-Governance Initiatives in India 8. Akshaya: These centres initially provide e- and customised way.
installed in large number of govt. Offices. behaviour effort to
 Costly infrastructure: Govt. Depts. literacy to one member from every  Functionality: It offers simple and user
A large no. Of initiatives have been household. know how
2. Networking: In this phase, some units of a need to install advanced servers and friendly platforms for all in order to
undertaken by both central and state customer
few government organisations got connected security systems constitute costly improve user experience and allow for
through networking leading to sharing of governments to promote e governance in the 9. CONCERT: Country wide network of behaviour
investment. their activities.
country. computerized enhanced reservation and on products
information and flow of data between  High surveillance: It means lack of  Interactivity: Organisation can build
ticketing developed by CRIS is a total Definition Through Through
different govt. departments. privacy. People is forced to share their 1. FRIENDS: Fast, Reliable, Instant, Efficient, long term relationships with their
networking solution to Indian railways wireless paper, print,
information electronically there is a Network for the Disbursement of Services in audiences, internet offers the
3. Websites: Setting up of websites by govt passenger reservation system. medias, radio etc
possibility that govt or outside parties part of the Kerala IT mission. FRIENDS possibility of having a conversation
departments. internet etc and therefore of generating a positive
could use this information against counters handle 1000 types of payments that Module 5 Digital Marketing
4. On-line interactivity: E-governance will be public interest. citizens can make like: utility payments for experience on brand.
effective only through opening up of direct  False sense of Transparency and electricity and water, revenue taxes etc. Meaning
Digital Marketing 4Ps  Visual communication: Digital
communication channels between accountability: Information can be marketing offers marketers different
2. Bhoomi: The department of revenue in Digital marketing simply refers to achieving
government departments and the citizens added or removed from the website 1. Product: Product determines the service or image and video based tools.
marketing objectives through applying digital
and civil society organisations. at any time. Karnataka state has computerised 20 million item which is up for selling for the buyers. A  Relevant advertising: Easy
records of land ownership of 6.7million technologies such as website, e-mail as well
product can either be a physical item or a segmentation and customisation of
Types of E-Governance farmers in the state. as other digital media such as wireless or
Benefits of E-Governance service. advertising in internet maximise the
mobile and media for delivering digital
output.
 Access to information and equally 1. G2G (Government to Government):G2G e- 3. e-Seva (electronic seva): e-seva centres television such as cable and satellite. 2. Price: Price explains the value of the  Measuring output: online platforms
services for citizen’s public service to governance refers to the online offer 118 different services like payment of product. The buyer pays a price to the seller
communications between government Difference between Digital marketing and rank first in the availability of follow
citizen’s right from birth to death. utility bills/ taxes, registration of death/ in exchange for the product or service used.
organisations, departments, and the agencies Traditional marketing up options and possibility to assess
 Time Saving: E-governance helps in birth, railway reservation etc. Normally, the price or the value of the the output.
quick communication and easy with the help of huge database. product depends on a variety of internal
4. CARD: Computer-aided administration of Basis Digital Traditional
transfer of information. marketing marketing external factors. Digital marketing channels
2. G2C (Government to Citizens): G2C registration department. It is initiated to
 Cost reduction: paper based interface is created between the government Interactivity Facilitated two Less
meet objectives to demystify the registration 3. Place: Place indicate distribution pipeline 1. Search engine optimization: It is the
communication needs lots of and citizens that enable the system to way interactivity
process, bring speed, efficiency, consistency of sale for the product. Place implies- making process of optimizing the structure,
stationary, other materials which provide a wide range of government services communication
and reliability, sustainability improve the the product available easily to potential design, and content of website so the
involve heavy expenditure.ICT makes to citizens. The primary goal of e-governance between
citizen interface etc. buyers. The success of the product majorly search engines can index them accurately
cheap communication. is to serve the citizen and facilitate their companies and
 Transparency: All information of govt depends on the right placement of the and position sites in the top results.
interaction with government. 5. Gyandoot: It is a low cost, self sustainable customer
would be made available on the product.
and community owned rural intranet system Immediacy It can get into Takes more 2. Social media marketing: It is the use of
internet. 3. G2B (Government to Business): G2B those carters to the specific needs of village the customers time to 4. Promotion: Usually, promotion involves social media platforms to connect with
includes various services exchanged between communities in the district. simultaneously reach any activity or action taken in order to sell or

your audience to build your brand, 2. Smarter Chat. services. The third-party publishers are Interstitial ads are full-screen placements networks of infected computers. Email opportunity to get each part of the
increases sales, and drive website traffic. affiliates, and the commission fee between standard interactions in the user security case study. business completely computerized or
3. Augmented and Virtual Reality incentivizes them to find ways to promote experience of a site, app, or game. For automated.
3. Online paid advertising: Company need Marketing. the company. example, navigation between two articles Advantages of online advertising
to pay each time a user clicks on Ad. on a news media website or the transition
4. Live Videos-More stories. 7. Email Marketing.
Need for digital marketing between levels of a hyper-casual game can 6. Quick & Convenient Delivery
1. Global Reach
5. Engagement based email marketing. Digital Marketing Models warrant one of these ads.
1. Provides equal opportunity for every The internet allows marketers to associate Internet marketing is incrementally
business. 6. Content personalisation. 1. Business-to-Business (B2B) 4. Unicast Advertisement with people around the world at the same convenient as it adds easy accessibility.
time. They can highlight their brand’s With digital advertising, a marketer
2. Wider reach. 7. Rich lead profiling. 2. Business-to-Consumer (B2C) A Unicast advertisement is an Internet doesn’t need to hold up weeks to see a
advertisement that consists of a video offerings beyond their local area and reach
Types of Digital Marketing out to their target audience. noticeable boost in their business. With a
3. Digital customers. 3. Customer-to-Customer (C2C) played like a TV commercial, usually in a paid digital marketing effort, they can see
pop-up or pop-under advertisement.
4. Increases brand reputation. 1. Content Marketing: It is a long term 4. Business-to-Government (B2G) real-time results that empower them to
strategy that focuses on building a strong 2. Attract Targeted Audience adjust their marketing campaign to
5. Pop-Up Advertisement
5. Increase revenue. relationship with your target audience by 5. Business-to-Employee (B2E) accomplish results.
giving them high-quality content that is When a person visits a website containing One of the key points of digital marketing
6. Cost effective form of marketing. very relevant to them on a consistent Online Advertising
a pop-Up ad, as a separate window pops is the capacity to take care of a huge
Advantages of Digital Marketing basis. Online advertising can be defined as every up and the advertisement will be displayed number of clients, and yet reach the 7. Maintain an After Sales Relationship
form of commercial content, available in the window. intended audience.
1. Interactive. 2. Search Engine Optimisation: it means In digital marketing, a marketer can easily
the process of improving your site to through the internet and designed by a access email addresses of both the
6. Advertorials
2. Anytime, Anywhere. increase its visibility when people search company, in order to inform consumers of consumers & the prospective candidates.
for products or services related to your goods or service. An advertorial is a form of advertisement 3. Better Brand Engagement & Optimization They may begin follow-up marketing to
3. Global Reach. business in Google, Bing, and other search in a newspaper, magazine or a website prospects using auto-responding email.
Types of Online Advertising Digital marketing does not have
engines. The better visibility your pages which involves giving information about This way, they can establish an effective
4. Reduced Cost. restrictions in terms of opening hours.
have in search results, the more likely you 1. Banner advertising the product in the form of an article. ... after-sales relationship with their existing
Advertorials are paid content. They are Since provincial & universal time variety
5. Measurability. are to garner attention and attract clients.
Banner advertising refers to the use of a used by marketers to educate prospective does not influence the accessibility or
prospective and existing customers to
6. Real-time result. rectangular graphic display that stretches consumers about the features of a reachability of your digital marketing
your business.
across the top, bottom, or sides of a product. campaigns. Weakness of Online Advertisement
7. Product information. 3. Search Engine Marketing: It is the website or online media property.
process of gaining website traffic by 7. E- Zines
8. Meet Information.  Customers Ignore Ads
purchasing ads on search engines. It 2. Floating advertisement 4. Cost-Effective & Time Efficient
A magazine distributed to users via email
Disadvantages of Digital Marketing refers to a form of digital marketing that
Floating advertisement is a type of or the Web. it may be an electronic To host a successful digital marketing Consumers are so used to seeing advertising
aims at increasing the visibility of a
1. Dependence of internet. Internet advertisement used by a number counterpart to a print subscription or be campaign, brands require less capital than on television, hearing radio commercials and
website in search engines by using paid
of different companies and seen on the only publishing method. No matter traditional marketing on TV, Radio and flipping through advertisements in
methods.
2. Clutttering. various websites throughout the Internet. whether it is free or paid, e-zines require OOH. They may begin with blogs, web- magazines, they've developed an aversion to
4. Social Media Marketing: They are somewhat similar to a pop up users to sign in as members. based social ads and email advertising at all forms of advertising. This is also the case
3. Suitable for specific categories of negligent costs. with online advertising, where consumers can
advertisement, but typically offer a more
goods. 5. Pay-Per–Click Advertising: It is a model 8. Spam E-mail avoid clicking banner advertisements, bypass
unique viewing experience and may
of advertising where marketers pay a fee include animation, sound, and other ads in online videos they watch and close
4. Negative Approach. Spam email is unsolicited and unwanted
every time people click on an ad. aspects that make for a more eye-catching 5. Measurable pop-up advertisements as soon as they come
junk email sent out in bulk to an
5. Harm image. advertisement. indiscriminate recipient list. Typically, up on their screens.
6. Affiliate Marketing: It is an advertising Free analytics dashboards like Google
model in which a company compensates spam is sent for commercial purposes. It
Trends in Digital Marketing 3. Interstitials
can be sent in massive volume by firms,
Analytics help marketers measure the  Technical Viewing Problems
third-party publishers to generate traffic success or failure of their digital marketing
1. Voice search. or leads to the company’s products and campaigns. Digital marketing offers the
Website downtime, lags in website or video
loading and browser complications can
reduce the number of times consumers see
online advertisements and how well they see
them. When technical issues occur,
companies lose the opportunity to broadcast
advertisements for their products and
services and may lose potential sales.

 Expensive Ad Prices

Pricing for advertising online can range from


inexpensive. Online advertising through pay-
per-click campaigns and social media sites
can also wreak havoc on a company's
marketing budget, potentially yielding little to
no return on investment.

 Consumers Get Distracted

When customers visit a website, they


typically have a goal in mind, whether it's to
catch up on the latest celebrity gossip, read
the news, chat with friends, download music
or shop for a specific item.

 Too Many Options

The Internet offers a wide range of websites


on which companies can place
advertisements. This can be overwhelming,
especially for small business owners. With so
many options, it's difficult to narrow down
the choices to the websites that will attract
the most potential customers and sales.

Search-engine advertising

Search-engine advertising (SEA) is a branch of


online marketing. Advertisements in the form
of a text or images are posted on search
engines such as Google or Bing. These ads
then appear prominently in the SERPs. This
method belongs to the main source of income
for search engine providers.

You might also like