Welcome to Guest !
 
       IUP Publications
              (Since 1994)
Home About IUP Journals Books Archives Publication Ethics
     
  Subscriber Services   |   Feedback   |   Subscription Form
 
 
Login:
- - - - - - - - - - - - - - - - - -- - - - - - - - - - - -
-
   
 
Management
E-Business
January' 07
View Demo
Regular Features
  • Viewpoint
  • E-Products
  • E-Roundup
  • Regulatory News
  • Interview
  • Debate
  • Case Study
  • Bookshelf
  • Book Review
Articles
   
Price(INR)
Buy
Information Security in a Business Intelligence Environment
Phishing : A Perilous Threat for Internet Security
Data Mining : Revealing Patterns or Privacy
     
Select/Remove All    

Information Security in a Business Intelligence Environment

- - B Sujatha

Business Intelligence (BI) systems provide deep insights into the business processes, financial information, customers and products, and render tremendous value to users. This sort of information, while being a priceless asset to the enterprise, could also pose a significant security risk. Making BI systems secure is a crucial step in protecting the valuable information that these systems seek to analyze. Enterprises need to incorporate the security aspect in their BI tools in the design stage itself and also lay down a well-framed security policy.

Article Price : Rs.50

Improving IT Risk Management

- - Greg Hughes

Improving IT risk management should be on the agenda of nearly every senior executive of a large corporation. Those executives, who are aware of their IT risks, understand the tools to manage these risks, and build the institutional capability to control them are in a fundamentally better position to improve the return on investments in information systems.

Phishing : A Perilous Threat for Internet Security

- - Ravi Kumar Jain Banda

Phishing scams are being ranked as one of the most prominent threats on the Internet and are causing losses to the tune of billions of dollars to both the companies and customers, eventually deterring people to transact online. Phishing has to be dealt with appropriatelytechnically, legally and sociallyin order to maintain the credibility of the Internet as a viable and safe platform to transact. The article explains the common techniques used in phishing attacks and suggests a few ways to overcome them.

Article Price : Rs.50

The Future of IT in Large Corporations

Large corporations are becoming increasingly frustrated with the long deployment cycles, high costs, complicated upgrade processes and IT infrastructure demanded by traditional software applications. Many are realizing that the future of IT is moving away from data center, system and infrastructure management and more toward business process improvement. This article demonstrates how large corporations such as Iomega, MasterCard, BT and Xerox are experiencing significantly reduced Total Cost of Ownership (TCO) and increased Return on Investment (ROI) with their software applications by adopting Software as a Service (SaaS) solutions and focusing more on business process improvement than IT infrastructure maintenance.

Data Mining : Revealing Patterns or Privacy

- - Sridhar Vaithianathan

The emergence of data mining as a technique to find the implicit patterns or useful knowledge from large pool of data has received much attention and focus among researchers. But data mining or knowledge discovery in databases not only reveals hidden pattern or nuggets of knowledge but also invades privacy of an individual. Before the issues of privacy in data mining gathers momentum, it should be addressed at the earliest.

Article Price : Rs.50

Achieving Operational Excellence in Mobile Telecom

Mobile telecom operators in the Western markets face several operational challenges. The article suggests that the operators can benefit from the expertise and support of a skilled IT vendor. Operators can leverage the vendors' extensive industry experience and their unique perspective on the specific process issues and technology implications affecting them. This would enable them to successfully implement technologies that meet requirements and optimize operations.

"Microsoft is a `21st Century Consumer Electronics Firm".

- - Steve Ballmer

In its core software business, Microsoft, whose revenues is now more than $44 bn, is launching an all-new operating system, Vista, by early 2007 for retail markets and also a new version of its profitable office suite, Office 2007. In the interview, Steve Ballmer, the CEO of Microsoft Corporation, discusses how the company has changed in the recent years under his leadership, the challenges it faces as it transforms into a `multi-core' technology company and the future of the company in a Web2.0 environment.

Grameen Bank's Village Phone Initiative

- - Vivek Gupta and Indu P

The case discusses the Village Phone project from Grameen Phone. Grameen Phone, in association with Grameen Bank and Grameen Telecom had established a unique business proposition for the rural consumers in Bangladesh. Grameen Phone explored the villages where mobile services could be provided. In association with the local branch of Grameen Bank, it also encouraged and educated credit worthy members to become Village Phone Operators (VPOs). The VPOs were given unsecured loans from Grameen Bank to purchase and operate mobile phones. The VPOs collected revenues from the users, who used the phone for making and receiving calls. The case gives a detailed overview on the Village Phone project and examines the benefits reaped by the project's stakeholders.

Ethical Hacking : An Introduction

In the early days of computing, `Hacking' was a respectful word referring to computer wizards. But the meaning of this word changed from a complementary description to a derogatory term as several computer wiz-kids started using their skills for illegitimate purposes. Recently, hacking assumed a better connotation in security parlance, in the name of `Ethical Hacking'. Ethical hacking emerged as a mainstream corporate security practice with its roots in the military operations.

Search
 

  www
  IUP

Search
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Click here to upload your Article

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Automated Teller Machines (ATMs): The Changing Face of Banking in India

Bank Management
Information and communication technology has changed the way in which banks provide services to its customers. These days the customers are able to perform their routine banking transactions without even entering the bank premises. ATM is one such development in recent years, which provides remote banking services all over the world, including India. This paper analyzes the development of this self-service banking in India based on the secondary data.

The Information and Communication Technology (ICT) is playing a very important role in the progress and advancement in almost all walks of life. The deregulated environment has provided an opportunity to restructure the means and methods of delivery of services in many areas, including the banking sector. The ICT has been a focused issue in the past two decades in Indian banking. In fact, ICTs are enabling the banks to change the way in which they are functioning. Improved customer service has become very important for the very survival and growth of banking sector in the reforms era. The technological advancements, deregulations, and intense competition due to the entry of private sector and foreign banks have altered the face of banking from one of mere intermediation to one of provider of quick, efficient and customer-friendly services. With the introduction and adoption of ICT in the banking sector, the customers are fast moving away from the traditional branch banking system to the convenient and comfort of virtual banking. The most important virtual banking services are phone banking, mobile banking, Internet banking and ATM banking. These electronic channels have enhanced the delivery of banking services accurately and efficiently to the customers. The ATMs are an important part of a bank’s alternative channel to reach the customers, to showcase products and services and to create brand awareness. This is reflected in the increase in the number of ATMs all over the world. ATM is one of the most widely used remote banking services all over the world, including India. This paper analyzes the growth of ATMs of different bank groups in India.
International Scenario

If ATMs are largely available over geographically dispersed areas, the benefit from using an ATM will increase as customers will be able to access their bank accounts from any geographic location. This would imply that the value of an ATM network increases with the number of available ATM locations, and the value of a bank network to a customer will be determined in part by the final network size of the banking system. The statistical information on the growth of branches and ATM network in select countries.

Indian Scenario

The financial services industry in India has witnessed a phenomenal growth, diversification and specialization since the initiation of financial sector reforms in 1991. Greater customer orientation is the only way to retain customer loyalty and withstand competition in the liberalized world. In a market-driven strategy of development, customer preference is of paramount importance in any economy. Gone are the days when customers used to come to the doorsteps of banks. Now the banks are required to chase the customers; only those banks which are customercentric and extremely focused on the needs of their clients can succeed in their business today.

more...

 
View Previous Issues
E-Business