0% found this document useful (0 votes)
15 views47 pages

ICT Grade 12 Unit 111112

This document discusses the ethical, legal, social, environmental, and health issues associated with information systems, emphasizing the importance of responsible use and awareness among users. It covers topics such as privacy, digital ownership, information security, and the social implications of technology, including cyberbullying and job displacement. Additionally, it highlights the environmental impact of technology and the need for sustainable practices in managing electronic waste.

Uploaded by

kiasatoru3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views47 pages

ICT Grade 12 Unit 111112

This document discusses the ethical, legal, social, environmental, and health issues associated with information systems, emphasizing the importance of responsible use and awareness among users. It covers topics such as privacy, digital ownership, information security, and the social implications of technology, including cyberbullying and job displacement. Additionally, it highlights the environmental impact of technology and the need for sustainable practices in managing electronic waste.

Uploaded by

kiasatoru3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 47

Unit 1.

Information Systems and Their Applications


1 . 1 . E T H I C A L , L E G A L , S O C I A L , E N V I R O N M E N TA L A N D H E A LT H I S S U E S I N T H E U S E O F
I N F O R M AT I O N S Y S T E M S . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1 . 1 . 1 E T H I C A L A N D L E G A L I S S U E S I N I N F O R M AT I O N S Y S T E M . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1 . 1 . 2 S O C I A L I S S U E S I N I N F O R M AT I O N S Y S T E M . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1 . 1 . 3 E N V I R O N M E N TA L I S S U E S C A U S E D B Y I N F O R M AT I O N S Y S T E M S . . . . . . . . . . . . . . . . . . . . . . 1 0
1 . 1 . 4 H E A LT H I S S U E S C A U S E D B Y I N F O R M AT I O N S Y S T E M S . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2
1 . 2 . I N T E L L E C T U A L P R O P E RT Y . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 4
1 . 3 . D I G I TA L I D E N T I T Y M A N A G E M E N T . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 7
1 . 4 . C O L L A B O R AT I O N T H R O U G H D I G I TA L T E C H N O L O G I E S . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 8
1 . 4 . 1 C O M P O N E N T S O F D I G I TA L C O L L A B O R AT I O N . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 9
1 . 5 . E N G A G I N G I N C I T I Z E N S H I P T H R O U G H D I G I TA L T E C H N O L O G I E S . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2
Learning Outcomes

At the end of this unit, students will be able to:


„ Explain ethical and legal issues in information systems
„ Explain environmental, health, and social issues in information system
„ Recognize the basics of intellectual property rights
„ Describe digital identity management
„ Appreciate the role of digital technologies in citizenship
Unit Overview
Information systems have had an impact far beyond the world of business.
New technologies create new situations that we have never dealt with before.
The introduction of new technology can have a profound effect on human behavior.
New technologies also give us capabilities that we did not have before,
Users should also be aware of the consequences and implications of information systems’ use and access on the
one hand and maintaining the rights of creators and innovators on the other.
This unit deals with
the fundamentals of ethical, legal, social, environmental and health issues,
intellectual property rights, digital identity management,
 and the role of digital technologies in citizens’ engagement.
1.1. Ethical, Legal, Social, Environmental and
Health Issues in the Use of Information Systems
The use of new technologies including information systems, has a
significant impact on human behavior and our daily activities including how we
live, work, and learn.
 Increased consequences have been emerging which needs all user’s awareness
about the use of information systems.
The knowledge and skills about raising issues and proper use of information
systems help students to become responsible members of society who can navigate a
knowledge based and technology-led economy.
Thissub unit will focus on the major issues in use of information systems.
1.1.1 Ethical and Legal Issues in Information System
Brainstorming 1.1

„ How could someone gain access to online banking account?


„ What would be the consequences of such access?
Ethics is all about the principles of making right or wrong decisions. According to Britannica
dictionary, ethics defined as, the discipline concerned with what is morally good and bad
and morally right and wrong. Ethical principles needs to be respected and if not might result in legal
consequences for those cases who are against the applied laws.
The role of ethics in information systems has become more crucial as a result of technology .
 Questions related to ethics and legality are essential in many industries.
Many professionals including medical and education
professionals, government officials, and business
people have legal and ethical oversight to control how
their professions function.
Information systems, by contrast, lack standard that align with
ethical concerns in the current frequently changing and dynamic
technological ecosystem.
The ethical and legal issues include privacy, security, information
gathering and digital ownership related concerns.
The following are some ethical and legal issues confronting the current
digital world.
1.Privacy:
In today’s digitized environment, information privacy relates to personal data stored on the
computer system, has become a prime concern for everybody.
Most people have their data spread throughout the digital systems, and private information should
be accessed using personal passwords.
 However, personal accounts such as email, social media, and private bank accounts, can be
accessed by unauthorized sources which create both ethical and legal concerns.
It is morally wrong and unethical to view an individual’s private information in
anyways which may also end up being a legal issue.
All practices and attempts in organizations to check their employee’s computer
habits also need to be implemented without incurring any damage to individual
privacy.
2.Digital Ownership
It is ability to access and/or use and protect data, information, and knowledge about ourselves or things we
own.
The expansion of digital mediums has allowed information to flow more freely than before which
makes content easily copied and pasted online.
This makes digital ownership hard to control in the digital world.
It is unethical to use somebody else’s digital works without getting permission from the owner first since
it ignores the right of the creator.
Creators has right to allow or deny the use of the contents.
This permission can promote sharing of knowledge and information, credits the source and protect the
consumer from false information.
Users resources use should consider such concerns to promote proper use and dissemination of information,
and to protect themselves from legal consequences that arises from violating intellectual property ownership
rights.
3. Information Gathering:
Many information system applications collect users’ data and
credentials as part of their operations.
Such information gathering trends can lead to many ethical and legal
issues depending on the purpose and level of information gathering
approaches.
The measure has opened a debate about what and why information can
be gathered.
This issue raises a question of consent which protect individuals against
attempts to steal information.
Users need to understand and examine the intention of any information-gathering
request by any service providers or third-party applications while they use the services.
Such requests need special attention if those organizations, systems, or applications
request personal information and credentials.
This protects against any illegal and fraudulent information stealing attempts.
4. Information Security and Liability:
 Growing amounts of personal and fi nancial information are
being transferred and stored online as organizations and
businesses
 Depend more and more on electronic data and computer
networks to carry out their daily operations.
 If and when a breach in information security happen this
might expose organizations and businesses to potential
security liability.
 Such attempts might lead to identity theft, which happens
when the personal details of innocent people to be
harvested by a third party so that they can be used for
malicious purposes.
• The increasing use of online tools and platforms such as blogs
and instant messaging is another source of potential liability.
• Accepted procedures and rules are needed to provide
conditions to increase the reliability of information systems.
• Users also need to report any security breach incidents that
happened on their systems and tools to the concerned
department/unit or expert in their organizations or the
concerned government body promptly.
a. 1.2. Social Issues in Information System
• The expansion of accessible information system technologies has led to several Significant changes in how
society functions.
• The majority of these changes have improvements to society.
• Those social advantages including access to technology which fills the digital divide gaps within the global
citizens,
• Use of advanced technologies like artificial intelligence and augmented reality in public which changes how
peoples act and react , and
• Widespread use of digital platforms , social medias and computer games for business and entertainment
activities .
other less uplifting social problems have been directly caused by technical advancements of the technologies.

• Hence, it is crucial to examine and assess the impacts they have to take actions to better understand and
mitigate their negative impacts while maximizing the benefits.
• The following are some negative social issues to consider while using technological services and Internet-
based application.
Negative social issues:
1. Socializations Gaps
2. Cyber Bullying
3. Social Media and Gaming Addiction
4. Plagiarism
5. Cybercrime
6. Job Opportunities and Challenges
1. Socializations Gaps
◦ Socializing within a family unit has always been important, as it strengthens the
bonds among family members or friends and ensures cohesion within the group.
◦ However, with more and more households owning several computers and
numerous portable devices granting access to information and entertainment,
◦ some argue that this is leading to a lack of family socialization and natural
interactions in the present moment.
◦ Communication breakdown among families.
◦ It is also become common to see friends who are out in a cafe and still staring at a
touchscreen rather than talking to one another.
◦ Increase your digital well-being by allowing technology to improve your life and
not become a distraction from your life and others.
2.Cyber Bullying

 It is a practice of sending, posting, or disseminating unfavorable, hurtful, or malicious content


about someone else online.
It can also involve disclosing sensitive or private information about another individual in a way
that causes embarrassment or humiliation.
Cyberbullying can happen online through social media, forums, or gaming where users can
interact with, or exchange content with others.
3. Social Media and Gaming
Addiction
social media and gaming addiction is a behavioral addiction that is characterized as
being overly concerned about social media and computer games, driven by an
uncontrollable urge to log on to or use social media, and devoting so much time and
effort to social media that it impairs other important life areas.
Researches on social networking addiction and Internet gaming disorders finds that
intensive online activity can negatively impact young people’s mental health.
Students need to be curious and mindful about their use of social media and video
games to live a safe and healthy life.
Such practices have direct links and impacts on their family relationships, learning
performance, future life goals, and mental health.
4.Plagiarism
Plagiarism is presenting work or ideas from another source as your own, with
or without consent of the original author, by incorporating it into your work
without full acknowledgement.
The act of plagiarism has grown to be a significant issue because students can
easily copy and paste entire passages of material from Internet resources
without giving credit to the author .
Plagiarism in the workplace and in academia can destroy an author’s credibility
and have significant consequences, such as dismissal from school or job loss.
Students need to produce original works, use books and Internet resources as
references and sources of insight, and give appropriate credit to authors when
they refer to their works in any way.
5. Cybercrime
Computers have contributed positively to the development of both individual actions and
large-scale global movements.
The other side of the coin is organized cybercrime which is use of a computer as an
instrument to further illegal ends, such as committing fraud, stealing identities, or violating
privacy and intellectual property rights as stated in Britannica dictionary.
Cybercrime, especially through the Internet, has grown in importance as the computer has
become central to education, commerce, entertainment, and government.
INSA officials Ethiopia is also experiencing different cyber-attacks which shows increasing
trend from time to time that needs a serious attention and a collaborative effort from all
citizens and professionals.
students need to prepare themselves for the 21st-century patriotism mission to protect
personal, organizational and national digital resources by being mindful system
users to protect against crime and terrorism attempts to ensure the country’s digital sovereignty.
6. Job Opportunities and
Challenges
 Automation and emerging technologies like artificial intelligent
machines, help to automate routine tasks which lead to
improved quality of service.
 such expansion of automated systems leads to loss of jobs
because some types of jobs like cashiers, data entry clerks, and
factory workers can be managed by automated systems.
 The type of skills that people need to acquire is constantly
changing and people with low educational backgrounds are
most at risk since the future job market needs more skilled
professionals.
1.3 Environmental issues
caused by Information Systems
Negative effect on Environment
Technologies consume lots of resources and power which creates additional impacts on our
environmental ecosystem.
Sometimes people can get so excited about using a new technology, they overlook the negative
impact on the environment.
Using technologies smartly and responsibly is essential in order not to create problems while
utilizing the advantages.
Because electronic devices contain hazardous materials that are unsafe for the environment.
Most electronic devices ,Information Systems and their Applications contain non-
biodegradable materials, heavy metals, and toxic materials like cadmium, lead, and mercury
which can leak into the ground, where they can contaminate the water we drink, the plants we
eat, and the animals that live around the area.
So we are responsible to protect the environment while we use and dispose of any information
system components.
Advanced electronic waste (e - waste) management techniques shall be applied to minimize
the damage (See Figure 1.11).
 e-waste management refers to a systematic procedure for gathering e-waste, recovering and
recycling material in a safe manner, and disposing of e-waste in a way that minimizes negative
environmental effects.
Negative impact of information systems on the environment have also led to the development
of new environmentally friendly technology solutions aiming to help solve some of the biggest
environmental concerns that we face as a society through a shift towards a more sustainable,
low-carbon economy.
Green or clean technologies which refers to environmentally friendly technology, which
monitor, and or reduce the negative impact of technology on the environment.
Eg. Solar Panel, Electric Vehicles. smart meters, natural gas, wind Turbines etc.
Positive impact on
environment
Technological solutions also allow electronic systems and paperless communication like email
and online portals and applications to reduce cutting down of trees for paper for a better
environmental protection and management .
information systems allow us to have a worldwide virtual laboratory
so, that experts from all fields can share their research, experiences, and ideas to come up with better,
and smarter solutions.
Not only does this allow people who are far away from one other to work together, but it also
reduces the negative carbon emissions impacts that people would normally cause from traveling
to meet with one another.
1.4. Health Issues caused by
IS
Health information systems are essential for the rapid
generation of high-quality data that will be used to inform
all relevant stakeholders for program planning,
review, and monitoring as well as generally ensuring and
enhancing the quality of all components of the health
system.
Advanteges of Health Issue

The use of information systems and access to mobile device


in healthcare can make :-
easier to offer care,
improve care delivery,
 empower patients through personalized messaging, and
collect real-time data to optimize resources and decision-
making
Challenges of Health Issue

Some of the challenges include,


sleeping disorders and lack of productivity,
 loss of attention and stress.
computer related health problems that needs a serious attention by all users.
Include:-
musculoskeletal problems on our body such as our back, neck, chest, arms,
shoulders and feet,
Vision Problems and eye strains, Headaches, Obesity due to long hour of sitting
etc..
Intellectual Property
Intellectual property rights refers to a range of intangible rights of ownership of
an asset such as a software program or designed information system.
Intellectual property rights provides different methods for protecting these
rights of ownership based on their type.
Ethiopian Intellectual Property Proclamation, No. 320/2003 “Intellectual
property” means a legal right over a creative work of the human intellect and
includes patent, trademark, registration certificate and copyright”.
There are four types of intellectual property rights that are relevant to the
software and information system industry.
These are :-trade secrets , patents, copyrights, and trademarks.
Trade secrets
“Trade secrets are Intellectual Property rights on confidential
information which may be sold or licensed.
The unauthorized acquisition, use or disclosure of such secret
information in a manner contrary to honest commercial practices by
others is regarded as an unfair practice and a violation of the trade
secret protection”.
Examples of trade secrets include customer lists, source code, recipes for
certain food items and beverages including Pepsi, Coca- Cola, and Sprite),
software processes, and more.
Patent:
“A patent is an exclusive right granted for an invention.
Generally speaking, a patent provides the patent owner with the right to
decide how - or whether - the invention can be used by others.
In exchange for this right, the patent owner makes technical information
about the invention publicly available in the published patent document’’.
When a property owner holds a patent, others are prevented, under law, from offering for
sale and making or using the product.
Examples of patented products include software programs like Airbnb, Amazon, other
inventions including the light bulb, telephones.
The software has to meet certain standards to get a patent. These standards come from the
responsible authority in each country.
Copyrights
>> Copyrights and patents are not the same although people are
often confused.
A copyright is a type of intellectual property protection that
protects original works of authorship, which might include literary works,
music, art, and more.
Nowadays, copyrights also protect computer software and architecture.
Copyright protections are automatic; once you create something, it is yours.
However if your rights under copyright protections are infringed,, can accountable by law since
when it is registerd.
 Graphical User Interfaces (GUIs) can also be registered for copyright.
Trademarks
Trademarks:“A trademark is a sign capable of distinguishing the goods or services of one
enterprise from those of other enterprises”.
Eg.Meta’,‘RIDE’ and ‘Microsoft’ symbol–

patents and copyrights can expire, trademark rights come from the use of the trademark, which
can be held indefinitely.
Like copyright, registration of a trademark is not required, but registering can offer additional
advantages.
1.3. Digital Identity Management
A digital identity is a collection of information about a person that exists online”.
 This data can be used to create a digital image of a person when it is collected.
Such information can be used by businesses to identify their clients.
A digital identity is all of information about an individual, organization, or electronic device that exists online.
Digital identity management presents both significant opportunities and associated risks.
Digital identification can be verified in a variety of ways, including through:-
 database checks,
 document and identity verification,
 biometric verification, and
 identity verification.

There is an ongoing effort at a national level to enhance citizens’ digital identity management practices. Eg. The
Ethiopian National ID project
1.4. Collaboration Through Digital Technologies

Digital collaboration means working with other individuals or teams


and getting things done using digital devices and technology.
It can include different tools, apps, software, procedures and processes.
Digital collaboration uses technology to improve workplace
collaboration, communication, document management, content
management, and information flow across the organization which in turn
leads to improved employee productivity and efficiency.
Internet and Internet-based applications is an important part of digital
collaboration as they helps employees collaborate in real-time, even
beyond time zones and geographical boundaries.
Components of Digital Collaboration

1.People: People are at the heart of collaboration.


Proper arrangement and communications is required while working on similar projects and assignments
to remove unnecessary work or duplication of efforts in collaborative working environments.
2.Collaborative tools: There are many tools and systems available that foster collaboration, but
not every solution will be a good fit due to its features, prices, usage polices and ease of use.
Digital Collaboration tools includes many types including the following with their examples:
A. Communication tools: include options for integrated messaging, co-working services,
Privacy and access settings, Conference calling, Video chats with screen sharing etc.
◦ o Examples- Microsoft Teams, Skype, Google Meet, Zoom, Cisco Webex, Slack, Microsoft Yammer, and more

B. Documentation and file sharing tools: includes features like Support for different file
types, Comments, and notes attached to files, track changes and versioning, editing permissions and
access control, folder sharing , and more.
◦ o Examples- Google Drive, Google Docs, Dropbox, MS SharePoint, Media Fire, and more.
C. Project Management tools: It has underlying project and task management capabilities at their core. o
Examples- Trello, Asena, ClickUp, and more.
D. Data Visualization tools: These tools should support a range of visual styles, be easy and quick to use, and
be able to handle a significant amount of data.
o Examples- Google Charts, Tableau, Power BI, Grafana, Chartist, Fusion Charts, Data wrapper, Infogram
and more.
E. Notetaking tools: These tools help to quickly capture and organize your notes, ideas, web page content and
more.
o Examples- Evernote, Microsoft OneNote and Google Keep and more.
3. Device: Devices are also key players.
Devices such as smartphones, tablets, and laptops are often an afterthought, but they are important components of
digital collaboration.
They are the physical media we use to connect.
1.5. Engaging in Citizenship through Digital Technologies

Digital citizenship refers to the responsible use of technology by anyone who uses computers, the
Internet, and digital devices to engage with society on any level.
It require the ability to engage positively, critically, and competently in the digital environment to
practice forms of social participation that are respectful of human rights and dignity through
responsible use of technology.
Good digital citizenship teaches peoples how to use digital tools to communicate with one another,
empathize with one another, and build long-lasting connections.
poor digital citizenship includes things like online bullying, careless social media use, and a
general ignorance of Internet safety.
Digital citizenship should do’s include:
 Using technology to make their community better.
 Engaging respectfully online with people who have different beliefs.
 Using technology to make their voice heard by public leaders and the global community.
 Determining the validity of online sources of information.
◦Unit 2
Emerging Technology
Emerging Technology is a term that is commonly used to describe
a new technology, but it can also refer to the evolution of existing technology.
It is widely used to describe technologies that are in development or will be
available within the next five to ten years.
 It is usually reserved for technologies that are creating or are expected to create
significant social or economic effects.
Emerging technologies are including data science, artificial intelligence (AI),
virtual reality, and augmented reality (grade 11)
Other additional selected emerging technologies including Bigdata, cloud
computing, fog computing, and internet of things (IoT).
2.1. Introduction to Bigdata

The amount of data generated is increasing in different dimensions including data sizes.
Bigdata refers to a collection of data sources that are so massive and complex that they become challenging to
process using typical data processing software or readily available database management tools.
Bigdata generated due to the rise of computers, the Internet, and technology capable of capturing information from
the real and physical world, and converting it to digital data
sources of Bigdata includes:-
 Business firms producing transactional data such as point-of-sale software, endpoint devices within IoT ecosystems and
marketing firms,
 Social media posts from existing and prospective customers,
 multiple additional sources like smartphone locational data,
 surveys that directly ask customers for information are also some of the sources of Bigdata.

Identifying useful data sources is the start of the Bigdata collection process.
2.1.1 Characteristics of Bigdata
The most common characteristics of Bigdata are characterized by 5V, namely
Volume, Variety, Velocity, Veracity, and Value
1. Variety:
Variety of Bigdata refers to the nature of data i.e whether it is structured,
unstructured, and semi-structured data.
In the past, data could only be collected from spreadsheets and database.
Today, data comes in an array of forms such as emails, PDFs, photos,
videos, audio, social media posts, and others.
2. Velocity:
Velocity refers to the speed at which data is being created in real- time .
3. Volume:
Volume indicates huge ‘volumes’ of data that are being generated daily from
various sources, like social media platforms, business processes, machines,
networks, human interactions, and others.
4. Value:
Value is the other major issue that we need to concentrate on.
It is not just the amount of data that we store or process.
 It is the amount of valuable, reliable, and trustworthy data that needs to be
stored, processed, and analyzed to find insights.
5. Veracity :
Veracity means the degree of reliability that the data has to offer.
Bigdata focuses to find an alternatives way to filter the huge unstructured data to
use in business developments.
Benefits of Bigdata

Bigdata projects help us to cure disease and prevent cancer, maximize crop yields, explore distant planets, predict and respond to
natural and man-made disasters, prevent crimes, and more.
Bigdata has many advantages :-

1.Customer acquisition and retention: Consumer data can help the marketing efforts of companies, to increase
customer satisfaction.
◦ For example, personalization engines for Amazon, Netflix, and Spotify can provide improved customer experiences and create
customer loyalty.

2.Targeted advertisements (Ads): Personalization data from sources such as past purchases, interaction patterns, and
product page viewing histories can help generate compelling targeted advertising campaigns for users both on the individual level and
on a larger scale.
3. Product development: it allows you to update existing products/services while innovating new ones..
4. Price optimization: This minimizes the manual work and reduces the possibility of any man-made errors.
5. Risk management: Bigdata analytics can identify new risks from data patterns for effective risk management strategies.
6. Improved decision-making: Insights of business users that are extracted from relevant data can help organizations make
quicker and better decisions.
Application of Bigdata
There are some examples of sectors in which Bigdata can contribute by generating value:
Healthcare - In the healthcare industry, Healthcare analysts use Bigdata to inform health
prevention, intervention, and management using a variety of data analytic technologies and
approaches.
These efforts can improve the patient experience, care efficiency, and quality, and reduce
healthcare costs
Bigdata and AI powered fitness devices, telemedicine, and remote monitoring are all helping to
improve lives.
Education - Bigdata can also be utilized to improve education by providing students with a
balanced learning plan.
Students may also be offered mixed learning, which combines offline and online learning
possibilities
Bigdata can improve student experience, academic programming, more effective evidence-based
decision-making, and a strategic reaction to shifting global trends
Banking and Agriculture
Banking - Bigdata solutions can detect fraudulent behaviours in real-time, such as
credit/debit card usage, inspection track archiving, and more.
 Bigdata analysis also helps banks in their compliance verification, auditing, and reporting
processes.
it simplifies the processes while lowering overhead costs.
Agriculture - Smart farming and precision agriculture practices help farmers to save costs
and open new business opportunities.
Granular information on rainfall patterns, water cycles, fertilizer needs, and other topics is
made available to farmers through big data.
Can Use this information to make wise choices about when to harvest and what crops to grow
for maximum profit
Manufacturing and Retail
Manufacturing –
 In the manufacturing sector, Bigdata helps create a transparent infrastructure,
predicting uncertainties and incompetence that can affect the business adversely.
Retail –
Bigdata has changed the way traditional retail industry works.
 Over the years, retailers have collected a vast amount of data from local
demographic surveys, Point of Sale (PoS), scanners, customer cards, and store
inventory.
Can use this data to create personalized customer experiences, boost sales, increase
revenue, and deliver improved customer service.
Transportation
Transportation - Both companies and government-run transportation
corporations employ
Bigdata technologies to optimize route planning, control traffic, manage road
congestion, and improve services in countries all over the world.
We also use Bigdata in other industries, such as media and
entertainment, energy and utilities, government-related activities, and
others

You might also like