information technology for

107

Upload: others

Post on 05-Jun-2022

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: INFORMATION TECHNOLOGY FOR
Page 2: INFORMATION TECHNOLOGY FOR

INFORMATION TECHNOLOGY FOR

MANAGEMENT

Chief Editor

Dr. Ihtiram Raza Khan Dept. of Computer Science,

Jamia Hamdard University,

New Delhi.

Co-Editor

Adam A. R. Senior Technology Architect, Infosys Limited.

Kripa-Drishti Publications

Page 3: INFORMATION TECHNOLOGY FOR

Book Title: Information Technology For Management

Author’s: Dr. Rohini Jha, Dr. Shradha Shivani, Mr. Sunit Prasad, Mehtab

Alam, Dr. Ihtiram Raza Khan, Amit Phadikar and Prof. Dr. C. B. Senthil Kumar

1st Edition

ISBN: 978-81-947839-1-6

Published: Oct 2020

Publisher:

Kripa-Drishti Publications

A/ 503, Poorva Height, SNO 148/1A/1/1A, Sus Road,

Near Padmalayas, Pashan- 411021, Pune, Maharashtra, India.

Mob: +91-8007068686

Email: [email protected]

Web: https://www.kdpublications.in

Copyright KRIPA-DRISHTI PUBLICATIONS

All Rights Reserved. No part of this publication can be stored in any retrieval system or reproduced in any form

or by any means without the prior written permission of the publisher. Any person who does any unauthorized act

in relation to this publication may be liable to criminal prosecution and civil claims for damages. [The

responsibility for the facts stated, conclusions reached, etc., is entirely that of the author. The publisher is not

responsible for them, whatsoever.]

Page 4: INFORMATION TECHNOLOGY FOR

INDEX

1. Telecommuting: Challenges And View Points Of Leadership

Style .................................................................................... 1

2. Bridging The Digital Divide Through Digital India For Effective

E-Governance Leading To Financial Inclusion ............... 18

3. Business 4.0-A New Revolution ...................................... 41

4. Quality Access Control To Provide Security To Data Owners In

Cloud Computing ............................................................. 58

5. Mis In Business ................................................................ 92

Page 5: INFORMATION TECHNOLOGY FOR

Information Technology For Management https://www.kdpublications.in

ISBN: 978-81-947839-1-6

1

1. Telecommuting: Challenges And View Points Of

Leadership Style

Dr. Rohini Jha

BIT Mesra Ranchi.

Dr. Shradha Shivani

BIT Mesra Ranchi.

Abstract:

Recent trend within the modern organization is that they offer employees the

opportunity to work from home. A manager’s role is extremely crucial as,

alongside the resource allocation, his responsibility is to motivate his team

members. This role is challenging once they don't see their team members. The

view of management perspective focuses on the concept of management and

leadership. Management perspective is often facilitated by proper quantitative

and qualitative analytic technique which may measure business performance. The

concept of leadership and management is that the basis of management

perspective is to tune supervisors and managers to extend employee’s

performance. There’s a paradigm shift within the leadership style during this

digital age regarding the way leaders interact with their followers via information

and communication technology since there's a rise in the number of employees

performing from home. Telecommuting is an appointment where employees

work in the office far away from the office premise using a laptop, smart phones,

PDA and other devices. Lack of face to face interaction with colleagues,

subordinates and team members causes a challenge of effective communication.

Telecommuting is additionally related to negative effects like lack of sleep, loss

of private time. At the equivalent time there are advantages like increasing in

productivity, high morale rate, increased flexibility, reduced rate of attrition,

reduced office requirements and reduced percentage. E – Leadership has more

visual interaction with the virtual team. Success of leadership is often achieved

Page 6: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

2

by enhancing human skills and getting connected technologically. There’ll be

positive effects of virtual workers if they're taken care of properly through e-

leadership. This chapter highlights the challenges of telecommuting from the

manager’s perspective, as well as the employee’s perspective and possible

outcome expected from workers in telecommuting.

Keywords:

Telecommuting, virtual group, e-leadership, telework

Introduction

Virtual workplace, tele work, offsite work, flexible office is a number of the

terminologies for telecommuting which appears to be very challenging to

employees, mangers and human resource department concerning the way

employees feel about their organization. To gauge the workers satisfaction level

and what they expect from the organization is additionally a challenge when

there's a culture of telework. It's also important to understand how leadership

affects the outcomes of telecommuters. The chapter focuses on how leadership

influences the organizational commitment and job satisfaction of telecommuters.

A telework model is a means which highlights information technology and

logistical challenges associated with telecommuters. Research reveals about

employee's relationship during a traditional office.

Managers' motive is to stay employees satisfied and more productive, which is

applicable to balancing the emotions when employees perform from home. How

telecommuters relate to their organizations with their output is that the area of

research where a really good telework schedule must be designed (Thatcher &

Zhu, 2006). Primarily, the challenges of telework and the role of data Technology

is a point of consideration. The knowledge technology and logistical challenges

of telework are well understood and are primary considerations in designing a

Page 7: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

3

successful telework program. The chapter focuses on challenges of organization

when there's no face to face interaction with the workers and a leadership style

adopted within the tele work plan yet achieving employee’s satisfaction and

commitment

Digitalization And Business:

Technology is a buzzword in the present business scenario as there's tremendous

use of the Internet and extranet in business. Organization sees the Internet, cloud,

social media, Internet of things and AI as a requirement to move forward.

Business is using technology not only to chop cost but innovation and creating

market is often the best utilization of technology alongside improving operational

efficiency. Technologies are often used at best when an organization has a strong

culture to upgrade skills of employees and be reoriented towards problem solving

using data analytics and automation. Digital transformation reduces repetitive

work to the minimum cost and time spent on completing work. Digitization helps

provide more data and successively renders intelligence for better deciding.

Organization has got to act accordingly to use the automate business process by

using intelligence and prediction provided by the technology.

The largest component of capital expenditure in the majority of organizations is

the investment in Information and Communication Technology (ICT). The IT

managers are developing an effective decision-making model that improves the

decision-making processes.

The advent of ICT has changed the organizational design and employee capability

as well. There is a change in behavior and the capability requirement as the level

of business and market dynamics have reached a higher level. ICT has reshaped

the relationship between suppliers, customers and business partners.

Page 8: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

4

Leadership And Digitalization:

Key factors of human resource strategy will be defined by organizational culture,

management practices and several organization structures. Organizational

competence is further defined by conditions of consistency and coherence. The

paper aims to arrive at some guidelines for managers as how to form better

alignment of ICT investments with business requirements

Adoption of ICT depends on what extends the management realizes the

advantages of IT. The value related to the IT adoption is reduced with sound skills

of data gathering and increases the first implementation of IT (Martin and Matlay,

2003). Various studies reveal the impact of ICT on society and human

psychology. Nature of labor and interpersonal relationships are suffering from

technology also resulting in the change in society as elucidated by technological

revolution. Technology has appropriated the role of defining the society. There's

technology development within the domain of data and Communication

Technology. Digital age and digital revolution have identified this historic

development (Negroponte, 1995; McCann ,1997). Information is a crucial

measureable asset. The expansion of the Internet has paved the way for the thanks

to globalization creating a networked society and businesses. New business

models have reshaped the interior organization design and distribution of data as

employees capabilities. There is change in relationship with the business partners

and customers. The direct influence of ICT on work culture and alter in employee

behaviour are identified. The paper focuses on change in employee behaviour.

New technology has led to telecommuting and affected employee performance.

Decision making power has shifted to a lower level due to a new decision network

and new knowledge management techniques (Davenport and Prusak, 1998).

Organizational processes are often optimized through workflow management

tools and a collaborative approach will help in integration (van der Aalst and van

Hee, 1997). This has led to re-engineering of business process which focuses on

Page 9: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

5

change in work arrangement which is co-operative supported by a computer

which is additionally concerned with socially organized intended users ( Bannon,

1998).Information Technology has changed labour conditions, relationships and

regulations (Andriessen, 1999). The change in behaviour pattern of employees is

thanks to changing business and market conditions by the intervention of ICT.

ICT has impacted behaviour of employees because the customers are changed

and therefore the work arrangement is also. Customer relationship management

is going to be supported by customer-oriented behavior also as an internal

business process.

In the age of machine learning, robotics, blockchains, and Internet Of Things, the

conventional method of leading organization has become obsolete. Technology

has facilitated employees to figure from home and using video conferencing

applications to attend meeting, perform group work and demanding flexible hours

to figure. There’s a boom in technology which needs new strategies to remain

competitive. Organization focuses on certain steps for a fruitful beautiful

combination of human skill with enhance mechanical efficiency. There's a change

in temperament of employees and sudden pressure is felt in acquiring technology

and being digital. Researchers reveals that the majority of companies are unaware

of the emotions of employees when developing IT plans which are a blend of

intentions of the organization and foresightedness. Companies specialize in e-

readiness and organization structure which can support the future vision of

incorporating digitalization. Companies can face complaints from leaders and

managers and incremental improvement is suggested. Organizational

reengineering strategy should consider the mission, intentions, strategy and

therefore the role played by the corporate towards attaining future outlook. Proper

assessment of the existing state is of prime importance once the future goal is

about which is regarding the comparison of hierarchy from the legacy system

linked with the old structure. In real terms, informal social organization is entirely

Page 10: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

6

different from what appears on paper. Organization sometimes is bereft of what's

achieved through collaboration and innovation because they view operation as

one which is organizational chart oriented.

Psychological Effects Of Telecommuting On Employees:

Telecommuting could also be a work arrangement where employees work from

place apart from their conventional offices of organization and use electronic

media and devices to interact with fellow employees for various discussions and

meetings (Bailey & Kurland, 2002; Baruch, 2001; Feldman & Gainey, 1997).

Alternate arrangement of the workplace and fewer face to face interaction results

in psychological distance. Previous research reveals that home is the primary

location for telecommuting (Davis & Polonko, 2001; Hill, Miller, Weiner, &

Colihan, 1998. Some work which may be a component of a typical work place

like various office trips are excluded. Authors have revealed the conceptual

themes related to the psychological process and mechanisms leading to how

telecommuting effects employees (D. G. Allen, Renn, & Griffeth, 2003; Shamir

& Salomon, 1985). Employees have flexibility of choosing location, work

timings and means of labor (e.g., DuBrin, 1991; Standen et al., 1999). Some

autors find telecommuting the way to observe balance between work and family

(e.g., Duxbury, Higgins, & Neufeld, 1998; Raghuram & Wiesenfeld, 2004).

Minimum face to face interaction reduces effective communication between

members of the organization. (Daft & Lengel, 1986). Flexible time has an effect

on objective measures of productivity of employees but has little effect on self-

rating (Baltes et al., 1999)

The widely known benefit associated with telecommuting is Improved

productivity (McCloskey & Igbaria, 2003; Pinsonneault & Boisvert, 2001).

Employees find little interruption when they are involved in doing work from the

remote (Bailey & Kurland, 2002). One of the reasons for increased productivity

Page 11: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

7

is increased hours of labor reception because travelling time is saved (Apgar,

1998). Individuals can have customized conducive ambience in which they're

going to work effectively.

It is vital to style the telecommuting work style which offers a facility to attend

meetings and monitor employee’s performance at the same time once they work

away from the conventional organization office (Davenport & Pearlson, 1998;

Kurland & Cooper, 2002). Research reveals that employees view electronic

monitoring as unjust and also leads to negative conseques for organizations

(Alge, 2001; Ambrose & Adler, 2000). Pierce and Newstrom (1980) discussed

that certain things such as preparing each day, going to the office on time and

commuting to work causes stress. Employees can get longer for recreational,

sports and social activities which are the strain busters (Konradt et al., 2003).

Challenges Of Leadership In Telecommuting:

The dynamism of telecommuting has its own set of challenges for managers and

human resource department regarding employee’s satisfaction and the level of

commitment of employees towards the organization. Choosing the best

leadership style can diminish the negative aspects of telecommuting as the

conventional way of leadership is no more applicable at work from home

scenario.

Knowledge of employee’s relationship to their organization helps in designing a

successful telework program. This will help in identifying the best leadership

style and have a positive impact on job satisfaction and employee’s commitment.

Table 1 describes the dimensions identified by Feldman and Gainey (1997) for

designing telework.

Page 12: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

8

Table 1. Dimensions of Telework Arrangement (Feldman and Gainey 1997)

Dimensions Arrangement

1. ration 3. Full time or part time

1. Timings 2. Fixed hours or flexible schedule

2. Location 3. Home or satellite offices with other telecommuters.

4. Approach 4. Voluntary or organizationally initiated

The broader organizational context such as co- employees, relation with a

superior is vital along with the individual’s job. Job satisfaction is based on a high

level of interaction and fulfilling personal need is not the only factor (Ting, 1997).

There are other challenges of telecommuting like company culture, legal

consideration, infrastructure, employee isolation and communication

(Manochehri and Pinkerton 2003). These challenges impact employee’s response

and are influenced by the leadership style a manager adopts.

Confinement:

Telecommuters express their state of isolation from work environment as well as

social detachment (Crandall and Gao 2005). Online activities actually are

disrupting the interpersonal relationship which includes meetings, chats and

discussions. The leaders can perceive some problems and some problems are

actual which are invisible which is based on psychological dimensions.

Telecommuters sometimes are deprived of awards and recognition since they are

out of sight and out of mind; promotion opportunities are also compromised, and

they feel they are not treated in a fair manner since social learning is missing.

Components of organizational context include different types of groups,

technologies used, organizational culture and variation in demography (Porter

and McLaughlin 2006). Telecommuting also causes disruption of work-related

identity therefore, organization has to ensure individuals feel themselves part of

Page 13: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

9

the organization. Many telecommuters are confused about whether they may

receive an important announcement regarding team issues and promotions and

feel that superiors have a perception that if they can’t see you, they aren’t working

(Abdel-Wahab, 2007). Expectation of performance is machine oriented. How the

employees will accept the assignment voluntarily and follow the supervisor's

order is important as telework may change the employee’s perception with regard

to fairness as managers are not present to judge how accepted the task is in

organizations (Diekmann, Barsness, & Sondak, 2004). Physical and cultural

isolation creates social and psychological problems because there is no

interaction, they are treated differently as they are not on site, always anxious for

promotion and recognition. They employees feel less connected with the

organization and affect the commitment of employees to the organization

(Cooper & Kurland, 2002).

Employee Interaction:

Communication is restricted to sending messages and speech via electronic

media. Telecommuting has changed the social weave and work dynamism, and

there could also be distortion in messages (Robbins, 1989/1998). Transmission is

susceptible to the lack of spontaneous information sharing, messages may get

refined with ambiguity and actual value might decrease (O’Connell, 1988).

Marketers must use electronic media to succeed in target customers and develop

feedback mechanism to watch response. Kotler (1980/1997). Key output of

virtual work depends on trust, identification and communication satisfaction.

Therefore, proper channel selection is of prime importance (Timmerman & Scott,

2006).

Employees Belief And Outcomes: Organizational outcomes like job

performance, job satisfaction and turnover are hooked into employee beliefs,

attitude and behaviour which are documented on individual level factors (Kim,

Page 14: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

10

2005). Job satisfaction is a positive emotional state which is an outcome of one’s

job experience and is correlated to the level to which employee is motivated, job

involvement, organizational citizenship behaviour and psychological state (Kim,

2005). Job Descriptive Index was designed to measure satisfaction which focuses

on five sub dimensions: satisfaction with workers, supervision, coworkers, pay

and promotion (Kinicki, Schriesheim, McKee-Ryan, & Carson, 2002).

Telecommuters have a negative impact on job satisfaction (Cooper & Kurland,

2002). Job satisfaction is more when there's a moderate level of telework (Virick,

DaSilva, & Arrington, 2010). Sort of leadership is a precursor of jobs satisfaction,

and therefore the categories of job satisfaction are job characteristics, role states,

group and organizational characteristics and relationship with the leader Kinicki

et al. (2002).

Organisational commitment is related to developing alignment with

organizational goals and a robust desire to devote time at work on behalf of the

organization (Park, 2004). Satisfying jobs along with conducing environment

plays a really important role for workers to reciprocate in a committed manner to

the organization (Knudsen, Johnson, Martin, & Roman, 2003). Meyer and Allen

(1990) suggested that commitment is reflected in affective, normative and

continuance during which employees with strong affective commitment perform

at a better level. Organizational commitment is applicable to telecommuters due

to physical and cultural isolation from the organization.

Organizational commitment is related to developing alignment with

organizational goals and a robust desire to devote time at work on behalf of the

organization (Park, 2004). Satisfying jobs alongside conducing environment

plays a really important role for workers to reciprocate in committed manner to

the organization (Knudsen, Johnson, Martin, & Roman, 2003). Meyer and Allen

(1990) suggested that commitment is reflected in affective, normative and

continuance during which employees with strong affective commitment perform

Page 15: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

11

at a better level. Organizational commitment is applicable to telecommuters due

to physical and cultural isolation from the organization.

Leadership:

Style of leadership changed with the arrival of the 2nd century due to

technological revolution and knowledge revolution which basically emphasized

the study of leaders’ traits (Wren, 1995). Trait and behavior study aren’t

important in the telecommuting context, but a number of the leadership practices

are relevant for managing virtual teams (Malhotra et al., 2007). The 2 viewpoints

of leadership are task oriented and relation oriented. Task oriented is towards

improving the standards and performing within the deadline. Relation oriented

leadership is towards achieving job satisfaction, employee comfort and

improving relations with the superior and colleagues. The contingency model

explains the leadership style for the organization structure which is predicated on

power, position and tasks. Researchers suggested that leaders give cognizance to

task and relation (Denhardt et al., 2002). Study also reveals that leaders are

effective in certain quiet situations which may be very applied in managing

virtual teams. Telecommuters have their own difficulties and wishes, so leaders

need to adopt their best thanks to monitoring teams which may be participative,

supporting and achievement oriented related to setting new goals and expecting

results by establishing standards. Kerr and Jermier (1978), demonstrated that

leader’s behavior is erratic in many situations. Research suggests that in virtual

environment the cognitive and psychological aspect of a leader plays a really

important role in virtual team management. Support, effective communication is

critical success factors for telework (Kowalski and Swanson 2005). Better

communication has the power to vary the attitude and behavior of others to realize

goals and requirements (Hackman & Johnson, 1991). Virtual team’s output

depends on the channel adopted, responsiveness and thoughtfulness of a

Page 16: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

12

pacesetter. The extent of trust a manager has for his subordinates features a

positive impact on telecommuters.

Conclusion:

Telecommunication offers several benefits to employees like flexible timings,

time which is spent in commuting is saved and the ability to look after family

simultaneously. From organisation perspective, it reduces infrastructure cost,

maintenance cost and gain more efficient employees (Madlock, 2012). The study

finds that communication between tele workers and manager is straightforward.

Building rapport with the team members in a virtual team is very important

because when trust is developed, an employee starts working for the organisation

with utmost dedication. The leader should talk about employees’ family,

background and problems they are facing in life. Always, if the leaders focus on

task and deadlines, then it will be difficult to manage telecommuters because this

article has identified the psychological dimension of work performance in which

job satisfaction is correlated to job output.

References:

1. Abdel-Wahab, A. (2007). Employee’s attitudes towards telecommuting: An

empirical investigation in the Egyptian Governorate of Dakahlia. Behavior &

Information Technology, 26, 367-375

2. Alge, B. J. (2001). Effects of computer surveillance on perceptions of privacy

and procedural justice. Journal of Applied Psychology, 86, 797– 804.

3. Allen, D. G., Renn, R. W., & Griffeth, R. W. (2003). The impact of

telecommuting design on social systems, self-regulation, and role boundaries.

In G. Ferris & J. Martochhio (Eds.), Research in personnel and human

resources management (pp. 125–163). Boston: JAI Press.

4. Ambrose, M. L., & Adler, G. S. (2000). Designing, implementing, and

utilizing computerized performance monitoring: Enhancing organizational

Page 17: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

13

justice. Research in Personnel and Human Resource Management,18, 187–

219.

5. Andriessen. J.H.E. (1999) 'Samenwerken op afstand en kwaliteit van arbeid'.

Gedrag & Ornanisatie. 12(6): 431-15.

6. Apgar, M. (1998). The alternative workplace: Changing where and how

people work. Harvard Business Review, 76(3), 121–136

7. Bailey, D. E., & Kurland, N. B. (2002). A review of telework research:

Findings, new directions and lessons for the study of modern work. Journal of

Organizational Behavior, 23, 383– 400

8. Baltes, B. B., Briggs, T. E., Huff, J. W., Wright, J. A., & Neuman, G. A.

(1999). Flexible and compressed workweek schedules: A meta-analysis of

their effects on work-related criteria. Journal of Applied Psychology, 84, 496

–513

9. Bannon, L. (1998) 'Computer Supported Collaborative Working: Challenging

Perspectives on Work and Technology', In Calliers. R.D. and Baei.s. W.R.

(eds) Information Technotogy and Organizational Transforniaiion.

Chichester: Wiley

10. Baruch, Y. (2001). The status of research on teleworking and an agenda for

future research. International Journal of Management Reviews, 3(2), 113–129

11. Cooper, C., & Kurland, N. (2002). Telecommuting, professional isolation, and

employee development in public and private organizations. Journal of

Organizational Behavior, 23, 511-532.

12. Crandall, W., & Gao, L. (2005). An update on telecommuting: Review and

prospects for emerging issues. S.A.M. Advanced Management Journal, 70,

30.

13. Daft, R. L., & Lengel, R. H. (1986). Organizational information requirements,

media richness and structural design. Management Science, 32, 554 –571

14. Davenport, T. H., & Pearlson, K. (1998). Two cheers for the virtual office.

Sloan Management Review, 39(4), 51– 65.

Page 18: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

14

15. Davenport, T.H. and Prusak, L. (1998) Working Knowledge. Boston, MA:

Harvard Business School Press.

16. Davis, D. D., & Polonko, K. A. (2001). Telework in the United States: 1538

GAJENDRAN AND HARRISON Telework America survey2001. Retrieved

from http://www.workingfro manywhere.org/telework/twa2001.htm

17. Denhardt, R., Denhardt, J., & Aristigueta, M. (2002). Managing human

behavior in public and nonprofit organizations. Thousand Oaks, CA: Sage

18. Diekmann, K., Barsness, Z., & Sondak, H. (2004). Uncertainty, fairness

perceptions, and job satisfaction: A field study. Social Justice Research, 17,

237.

19. DuBrin, A. J. (1991). Comparison of the job satisfaction and productivity of

telecommuters versus in-house employees: A research note on work in

progress. Psychological Reports, 68, 1223–1234

20. Duxbury, L., Higgins, C., & Neufeld, D. (1998). Telework and the balance

between work and family: Is telework part of the problem or part of the

solution? In M. Igbaria & M. Tan (Eds.), The virtual workplace (pp. 218 –

255). Hershey, PA: Idea Group

21. Feldman, D., & Gainey, T. (1997). Patterns of telecommuting and their

consequences: Framing the research agenda. Human Resource Management

Review, 7, 369-388.

22. Hackman, M., & Johnson, C. (1991). Leadership: A communication

perspective. Prospect Heights, IL: Waveland Press

23. Hill, J. E., Miller, B. C., Weiner, S. P., & Colihan, J. (1998). Influences of the

virtual office on aspects of work and work/life balance. Personnel Psychology,

51, 667– 683

24. Kerr, S., & Jermier, J. (1978). Substitutes for leadership: Their meaning and

measurement. Organizational Behavior and Human Performance, 22, 375-

403.

Page 19: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

15

25. Kim, S. (2005). Individual-level factors and organizational performance in

government organizations. Journal of Public Administration Research and

Theory, 15, 245-261

26. Kinicki, A., Schriesheim, C., McKee-Ryan, F., & Carson, K. (2002).

Assessing the construct validity of the job descriptive Index: A review and

meta-analysis. Journal of Applied Psychology, 87, 14-32

27. Knudsen, H., Johnson, J., Martin, J., & Roman, P. (2003). Downsizing

survival: The experience of work and organizational commitment.

Sociological Inquiry, 73, 265-283.

28. Konradt, U., Hertel, G., & Schmook, R. (2003). Quality of management by

objectives, task-related stressors, and non-task-related stressors as predictors

of stress and job satisfaction among teleworkers. European Journal of Work

and Organizational Psychology, 12(1), 61–79.

29. Kotler, P. (1997). Marketing management: Analysis, planning,

implementation and control (9th ed.). Upper Saddle River, NJ: Prentice Hall.

(Original work published 1980)

30. Kowalski, K., & Swanson, J. (2005). Critical success factors in developing

teleworking programs. Benchmarking, 12, 236-259

31. Kurland, N. B., & Cooper, C. D. (2002). Manager control and employee

isolation in telecommuting environments. Journal of High Technology

Management Research, 13, 107–126.

32. Madlock, P. E., (2012). The influence of supervisors’ leadership style on

telecommuters. Journal of Business Strategies, 29(1), 1-24.

33. Malhotra, A., Majchrzak, A., & Rosen, B. (2007). Leading virtual teams.

Academy of Management Perspectives, 21, 60-69

34. Manochehri, G., & Pinkerton, T. (2003). Managing telecommuters:

Opportunities and challenges. American Business Review, 21, 9-16

35. Martin, L.M. and Matlay, H. (2003), “Innovative use of the internet in

established small firms: the impact of knowledge management and

Page 20: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

16

organisational learning in accessing new opportunities”, Qualitative Market

Research: An International Journal, Vol. 6 No. 1, pp. 18-26.

36. McCloskey, D. W., & Igbaria, M. (2003). Does “out of sight” mean “out of

mind”? An empirical investigation of the career advancement prospects of

telecommuters. Information Resources Management Journal, 16(2), 19 –34.

37. Meyer, J. P., & Allen, N. (1990). The measurement and antecedents of

affective, continuance and normative commitment to the organization. Journal

of Organizational Psychology, 63, 1-18

38. Negroponte. N. (1995) Being Digital. New York: Vintage Books

39. O’Connell, S. (1988). Human communication in the high-tech office. In G. M.

Goldhaber, & G. A. Barnett (Eds.), Handbook of organizational

communication (pp. 480-481). Westport, CT: Ablex Publishing

40. Park, J. (2004). Individual work environment (job characteristics) and work-

related attitudes in the telecommuting organization. Dissertation Abstracts,

151. (UMI No. ATT 3126002)

41. Pierce, J. L., & Newstrom, J. W. (1980). Toward a conceptual clarification

1540 GAJENDRAN AND HARRISON of employee responses to flexible

working hours: A work adjustment approach. Journal of Management, 6, 117–

134.

42. Pinsonneault, A., & Boisvert, M. (2001). The impacts of telecommuting on

organizations and individuals: A review of the literature. In N. J. Johnson

(Ed.), Telecommuting and virtual offices: Issues and opportunities (pp. 163–

185). Hershey, PA: Idea Group

43. Porter, L., & McLaughlin, G. (2006). Leadership and the organizational

context: Like the weather? Leadership Quarterly, 17, 559-576

44. Raghuram, S., & Wiesenfeld, B. (2004). Work-nonwork conflict and job stress

among virtual workers. Human Resource Management, 43, 259 –277.

Page 21: INFORMATION TECHNOLOGY FOR

Telecommuting: Challenges And View Points Of Leadership Style

17

45. Robbins, S. (1998). Organizational behavior: Concepts, controversies,

Applications (8th ed.). Upper Saddle River, NJ: Prentice Hall. (Original work

published 1989)

46. Shamir, B., & Salomon, I. (1985). Work-at-home and the quality of working

life. Academy of Management Review, 10, 455– 464

47. Standen, P., Daniels, K., & Lamond, D. (1999). The home as a workplace:

Work-family interaction and psychological well-being in telework. Journal of

Occupational Health Psychology, 4, 368 –381.

48. Thatcher, S. M. B., & Zhu, X. (2006). Changing identities in a changing

workplace: Identification, identity enactment, self-verification, and tele-

commuting. Academy of Management Review, 31,1076–1088.

49. Timmerman, E., & Scott, C. (2006). Virtually working: Communicative and

structural predictors of media use and key outcomes in virtual work teams.

Communication Monographs, 73, 108-136

50. Ting, Y. (1997). Determinants of job satisfaction of federal government

employees. Public Personnel Management, 26, 313-334

51. Van der Aalst. W. and Van Hec, K. (1997) Workflow Management.

Schoonhovcn: Academic Service.

52. Virick, M., DaSilva, N., & Arrington, K. (2010). Moderators of the curvilinear

relation between the extent of telecommuting and job and life satisfaction: The

role of performance outcome orientation and worker type. Human Relations,

63, 137-154

53. Wren, T. (1995). The leader’s companion. New York, NY: The Free Press.

Page 22: INFORMATION TECHNOLOGY FOR

Information Technology For Management https://www.kdpublications.in

ISBN: 978-81-947839-1-6

18

2. Bridging The Digital Divide Through Digital India

For Effective E-Governance Leading To Financial

Inclusion

Dr. Rohini Jha

Assistant Professor, Department of Management,

Birla Institute of Technology, Mesra, Ranchi.

Mr. Sunit Prasad

Research Scholar, Department of Management,

Birla Institute of Technology, Mesra, Ranchi, India.

Abstract:

E-governance is the rendering of government services and information to the

public using electronic means and is a new pattern over traditional approach. The

issue of illiteracy, poverty and unemployment in India still persist in spite of the

boom in the IT sector such as Internet blue chips, online shopping and nanosecond

email. The chapter is an endeavour to present a few facts about the digital divide

based on the global and the USA perspective. The chapter discusses the

infrastructural bottleneck that exists in India regarding the digital divide that

includes electricity, IT penetration, Internet industry and its enabling policy to

transform India as a knowledge society. India has made several attempts to

overcome the digital divide in the form of e-governance projects. The chapter

investigates the efforts to overcome the digital divide which will lead to financial

literacy and will result in financial inclusion. The chapter examines how after the

launch of the digital India program financial literacy has improved, which is a

critical component in financial inclusion. Much effort has been made towards

increasing the literacy rate through e-governance initiatives by providing digital

infrastructure in rural India.

Key Words: E-Governance, Digital Divide, Access, India, ICTs,

Infrastructure, Financial Inclusion

Page 23: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

19

Introduction:

The Information and communication Technology (ICT) is the basis of modern

civilization and has brought changes in the economic and social well-being of

human actions in almost all areas at a faster pace ((Nandi, 2002).ICT facilitates

communication uninterrupted by distance, volume, medium or time, therefore it

reduces the time (Fletcher et al, 2000). ICT has changed the way of doing

business. It can help in transforming the total number of non-bankers into bank

users through a user friendly and low-cost web based channel which will enhance

financial inclusion. The issue of transparency can be solved by ICT easily and

improves the development process of the system (Jesus, 2003). Access and

adoption of technology is very important and a deciding factor to avail the

benefits of technology. Adoption rate in developing countries is much lower than

in the developed world because millions of people in this world are deprived of

access to technology. There is a serious issue of the ‘Digital Divide’ between

those who have access to ICT and those who do not (United

nations,2006).Various research reveals that good governance is not possible

without ICT (Lawrence and Lee, 1999; Leizero, 2000; Pastor et al, 2004; Norris,

2001; Sumanjeet, 2006) .The paper highlights the importance of overcoming

digital divide in India by identifying the barriers of digital divide which will help

in good governance and how the Digital India programme will form a digitally

empowered society .The paper also outlines the status of financial inclusion in

India after the launch of Digital India. There is a digital divide between the rural

and urban India (Dasgupta et al, 2002; Nath, 2001; Singh, 2007; Mahajan, 2003;

Dutta, 2003).

The chapter is concentrated on India and tries to explore the macro aspect of the

digital divide in India. The chapter tries to explore the matter of digital divide

within India. Thus, within the context of this chapter, the digital divide essentially

means the tele-density, mobile and Internet divide between the agricultural and

Page 24: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

20

concrete areas. The most objective of the chapter is to review the matter of digital

divide within the Indian context and address the challenges in bridging the gap of

digital divide. It also makes an effort to spot the causes of the digital divide in

India. Furthermore, in the end, an attempt has been made to suggest the policies

to deal with the challenges of bridging the gap of digital divide in India. This

chapter has been divided into five sections. Section 1 deals with the concept of

the digital divide. Section 2 discusses this status of digital divide in India. In

section 3, an effort has been made to review the causes of the digital divide in

India. Section 4 tries to deal with the matter of the digital divide by suggesting

some policy options. Section 5 deals with the concluding remarks. The present

chapter is concentrated on India and tries to explore the macro aspect of the digital

divide in India. The chapter tries to explore the matter of digital divide within

India. Thus, within the context of this chapter, the digital divide essentially means

the tele-density, mobile and Internet divide between the agricultural and concrete

areas. The most objective of this chapter is to review the matter of digital divide

within the Indian context and address the challenges in bridging the gap of digital

divide. The study also makes an attempt to identify the causes of the digital divide

in India. Furthermore, in the end, an attempt has been made to suggest the policies

to deal with the challenges of bridging the gap of digital divide in India. This

chapter has been divided into five sections. Section 1 deals with the concept of

the digital divide. Section 2 discusses this status of digital divide in India. In

section 3, an effort has been made to review the causes of the digital divide in

India. Section 4 tries to deal with the matter of the digital divide by suggesting

some policy options. Section 5 deals with the concluding remarks.

E-Government Definitions:

E-government refers to the delivery of information using digital means to citizens

or business or other agencies in a timely manner and also empowering people

through access to information without bureaucracy. Government interacts with

Page 25: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

21

citizens in the form of obtaining information, filings or making payments using

the World Wide Web (Sharma & Gupta, 2003, Sharma, 2004, Sharma, 2006).

Table1 represents the definitions of the e-government of various sources.

Table 1: Definitions Of E-Government Of Various Sources

World Bank “E-Government refers to the use by government agencies of information

technologies (such as Wide Area Networks, the Internet, and mobile

computing) that have the ability to transform relations with citizens,

businesses, and other arms of government. These technologies can serve a

variety of different ends: better delivery of government services to citizens,

improved interactions with business and industry, citizen empowerment

through access to information, or more efficient government management.

The resulting benefits can be less corruption, increased transparency, greater

convenience, revenue growth, and/or cost reductions.”

United

Nations

“E-government is defined as utilizing the Internet and the world-wide-web

for delivering government information and services to citizens.”

Global

Business

Dialogue on

Electronic

Commerce

“Electronic government (hereafter e-Government) refers to a situation in

which administrative, legislative and judicial agencies (including both

central and local governments) digitize their internal and external operations

and utilize networked systems efficiently to realize better quality in the

provision of public services.”

Gartner

Group

“The continuous optimization of service delivery, constituency

participation, and governance by transforming internal and external

relationships through technology, the Internet and new media.”

The use of ICT in governance facilitates greater participation of citizen in

government and the internet is used by politicians and political parties. Therefore,

some authors believe that e-government is a subset of e-governance ((Howard,

2001 and Bannister and Walsh, 2002). There is considerable confusion in

explaining e-governance and e-government. When the focus is on stakeholders

Page 26: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

22

outside the organisation, it is e-government whereas e-governance focuses on

administration within the organisation concerned with the utilization of

technology and other resources of the organization.

A broader concept of e-governance deals with all relationship and networks

concerning the usage and application of ICT and e-government. It is a procedural

approach of basic and standard procedure of administration (Sheridan and Riley,

2006). For e- government assessment, the United Nations’ Division for Public

Economics and Public Administration has developed a few indices followed by

UN member countries. Several parameters and indicators are considered which

is summarized in Table 2

Table 2: Parameters And Indicators Developed By United Nations’

Division For Public Economics And Public Administration For E-

Governance Assessment.

Parameters Indicators

1. Web Presence measures

2. Telecommunications infrastructure (capacity of country’s

ICT)

3. Human Capital measures

1.Stages of government

websites

2. a. Internet hosts per 10,000

people

b. Nation’s population online

c. Number of PC Penetration

d. Telephone lines

e. Mobile phones

f. Television per 1000 people

3. a. Human Development

Index

b. Information access Index

c. Urban and Rural

population ratio

Page 27: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

23

Table 3: Provides The Indices For The Top 10 Countries With The Denmark

(0.9150) Being The World Leader Followed By Australia (0.9053) And Republic

Of Korea At 3rd Global Position (0.9010).

Table3: United Nations E-Government Survey 2018

E-Government Development Index Top

10 Countries

E-Participation Index Top 11

Countries

Country Index Country Index

Denmark 0.9150 Republic of Korea 1.0000

Australia 0.9053 Denmark 1.0000

Republic of Korea 0.9010 Finland 1.0000

United Kingdom 0.8999 Netherlands 0.9888

Sweden 0.8882 Japan 0.9831

Finland 0.8815 New Zealand 0.9831

Singapore 0.8812 Australia 0.9831

New Zealand 0.8806 Spain 0.9831

France 0.8790 United Kingdom 0.9831

Japan 0.8783 United States of

America

0.9831

(Source: The UN Global E-Government Readiness Report 2018 “From E-

Government to E-inclusion”)

E-Governance: World View And India’s Status.

The United Nations e-Government Survey 2018 finds that citizens are taking

advantage of more advanced e-service delivery, better access to information,

more efficient government management and improved interactions with

governments, primarily as a result of increasing use by the general public sector

of data and technology. Most countries have published an incredible amount of

Page 28: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

24

data online, many goings beyond basic websites to supply national portals that

function as a serious start line for users to attach to government services in several

ministries. At an equivalent time, many developing countries got to devote

additional energy to transactional services also because the electronic means of

engaging citizens publicly is a means of consultation and decision-making. A

number of the countries registered a drop in their country ranking vis-à-vis the

UN e-Government survey conducted in the year 2018. A drop in a country’s

ranking may be a reminder of the necessity to devote greater resources to

improving online services and expanding access to telecommunication

infrastructure.

High-income countries enjoy the highest rankings within the e-Government

development index in 2018 as in previous years. Among the highest five countries

within the 2018 United Nations e-Government Survey, Denmark received the

very best score, followed by Australia, Republic of Korea, the UK and Sweden.

The bulk of positions within the top 20 rankings belong to high-income countries,

which isn't surprising since they need the financial resources to develop and

rollout advanced e-Government initiatives, also to create a favourable

environment for citizen engagement and empowerment. Developed countries

have a definite advantage in achieving higher rankings within the survey

(comprising of 95 multiple choice questions), as nearly two-thirds of the load of

the e-Government development index (an index received from the survey

questionnaire) is allocated to the telecommunication infrastructure and human

capital components, which both require long-term investment. For emerging and

developing countries, the challenge is to take a position altogether in three

dimensions – online services, telecommunication infrastructure and education -

to narrow the present digital gap. In other words, having an excellent website does

little in e-service provision if the bulk of individuals within the country cannot

read or write, nor if they need no access to the web.

Page 29: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

25

Some developing countries have begun to catch up with higher-income countries

despite these challenges. Bahrain for example, has made significant strides in the

two years since the previous survey, moving up in the rankings to 13th place in

2010 from 42nd place in 2008. UN report 2018 reveals Bahrain is ranked fifth in

Asia and 26th internationally in e-government development efforts. Bahrain’s

recent emphasis on citizen engagement and the electronic provision of

government services has propelled the country into the top 15 in e-Government

development, somewhat closer to Singapore which is among the global leaders

in the provision of electronic and mobile public services. Mobile technology will

become an affordable tool to fill in the digital gap between the developed and

developing countries, given the rapid price decline of mobile products. Emerging

and least-developed countries have already demonstrated that they are capable of

narrowing the digital gap by investing in websites and Web portals and by

applying tools such as tele-centres, kiosks, community centres and other similar

outlets to increase access to the Internet. They are adopting the use of mobile

technology at a fast rate, which will trigger the need to develop more mobile e-

Government services. The private sector in these countries has an opportunity to

work with the government to create and distribute mobile services. The 2018

survey recorded an increase in the use of mobile technology for communication

from Governments to Citizens (G2C), whether it is simple SMS, alert notification

or a full-fledged mobile service.

The 2018 survey found that some countries are increasingly active in seeking

customer satisfaction through online polls, blogs, surveys and other means. This

means that a growing number of nations have recognized the importance of

citizen feedback via the Internet and are taking advantage of social networking

tools to make better websites and Web portals. Emerging and developing

countries have yet to fill the digital gap. The developing countries that have

channeled more investment to telecommunications infrastructure, education and

Page 30: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

26

online services could compete with developed countries and in some cases, even

score higher. Mexico experienced the foremost significant drop in global

rankings. It fell by 27 positions from the 2008 Survey to the 2018 Survey and is

currently ranked 64th globally. The degeneration of Mexico’s e-Government is

especially attributed to the much lower score for online services. Among all the

national portals of the developing countries, India has the very best ranking portal

with the very best online services score. It's the foremost e-services and tools for

citizen engagement. A number of the developing countries who improved their

rankings are Iraq, Oman, Saudi Arabia and Turkey, while a couple of them who

dropped significantly in their rankings are Azerbaijan, Jordan, Kuwait, Lebanon

and Syria. India has improved by seventeen positions from its ranking of 113rd

in the 2008 survey to 96th in the 2018 survey. It's vastly improved its online

services however the transactional services offered as a part of NeGP still must

be further implemented and improved.

Notable climbers within the online services provision to citizens are Bahrain,

Chile, Colombia, Singapore and, therefore, the UK, which have joined the

world’s top performers in online service development. Only a couple of countries

are ready to offer many transactional services online at this point. However,

countries with the very best scores offer a good range of integrated transactional

e-services that cater to several segments of society. They need comprehensive

back office integration systems and secure networks on which these e-services

operate, giving citizens security and confidence. The US, the Republic of Korea

and Canada are the highest three countries in terms of transactional opportunities.

The developing countries are well-represented within the top 10 with four

countries: Bahrain, Chile, Colombia and Israel. Least developed countries don't

have any real e-services, nor are they providing citizens with transactional

opportunities. The overwhelming majority of the sites surveyed primarily contain

e-information and therefore the beginning stages of citizen engagement with polls

Page 31: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

27

and feedback forms. The highest two positions among the fewest developed

countries within the online service assessment visited Bangladesh and Angola.

Action Plans In India:

There is transparency in the governance process by the changed government

using electronic means. E-governance has made the government citizen centric

by facilitating easy government services and allowing greater public access of

information which is a new way of public administration to promote more

efficient and cost-effective government. Governance is a wider term which covers

the states Institutional management, decision-making processes, implementation

capacity and the relationship between government officials and the public e-

governance is caused by the use of ICT by the government. Therefore, e-

government can be viewed as a subset of e-governance and focuses largely on

improving administrative efficiency and reducing administrative corruption

(Bhatnagar, S., 2004).

Government of India has launched a number of initiatives during the year 2003-

2007.National e-governance Action plan for implementation was approved by the

government of India. The plan provided inspiration and provides impetus for the

future growth of e-governance within the country. In this plan the standard of

speed and implementation of procurement procedures for IT services to the

citizens through a single window was incorporated. To utilize the complete

potential of personal sector investment efforts were made to market and develop

public private partnerships to utilize the complete potential of personal sector

investments and the endeavour towards connectivity was extended up to the block

level within the states. Alongside the action plan adoption of data Technology

Act, 2000 by the Government of India to supply legal framework to facilitate

electronic transaction was introduced, establishment of National Taskforce of

data Technology and software Development in May 1998, development of centre

Page 32: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

28

of e-governance to disseminate the simplest practices within the area of e-

governance to be used by the central and government act as a nodal centre to

supply general information on e-governance. Therefore, to form e-government a

reality in India, NeGP plan was launched in 2006 with a vision to form

government services available to all or any citizens.

Digital India:

Digital India program was set in motion by the honourable Prime Minister, Mr.

Narendra Modi on 2nd July 2015 aiming towards Universal digital literacy,

delivering government services digitally and development of secure digital

infrastructure. All the developing countries are feeling the challenge to prove

them globally. So, getting connected globally and upgrading yourself with the

latest technology is of prime importance. Though opportunities for growth of

India have been created by visionaries of India, they found that citizen

participation is important in meeting the challenges the country is facing

regarding digital divide, skill divide and financial inclusion. Digital literacy is the

ability to understand and use the information in multiple formats from a wide

range when it is presented on computers. Digital literacy involves the knowledge

skill and attitude to effectively navigate, critically evaluate create or adapt

information using a range of digital technologies (Seattle, G., 2014).

The digital India program has been envisioned by the ministry of communications

and IT, ministry of rural development, ministry of human resource development,

ministry of health et al. to vary India into a digitally empowered society and

knowledge economy. Digital India program has facilitated Preparing India for

knowledge domain transformation and delivering good governance to citizens by

coordinated and synchronized engagements and taking the nation forward

digitally and economically.

Page 33: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

29

Digital India aims at a universal digital literacy. All digital resources are

universally accessible, all government documents/certificates to be available on

the cloud. Availability of digital resources/services in the local language.

Collaborative digital platforms for participative governance.

Digital India has improved the job opportunities at its launch and has made a hit

of the more than 4 lakh crore investment. With the largest number of IT

professionals and very large MSME (Micro, small and Medium) sector, still India

has the highest import category of electronic goods because it has not developed

its capabilities to manufacture in this sector. The aim of making the net zero

import will be accomplished by Make in India and Digital India programme to

step up manufacturing and increasing domestic demand Digital India (Ministry

of Electronics & Information Technology, Government of India, 2016)

The roadblocks in the way of its success are digital illiteracy, poor infrastructure,

low internet speed, connecting 250000 villages gram panchayat through National

Optical Fibre, lack of coordination among various department, issues related to

taxation, digital gap between urban and rural India and fear of cyber-crime and

breach of privacy is the determinant in the adoption of digital technologies. High-

speed internet in India is at the 105th position in the world in average internet

speed. Digital India program had the objective of connecting rural areas with

high speed internet network and improving digital literacy.

Digital India program has benefitted India in making all government services

available to people of the country through common service delivery points and

enabling inclusive growth through easy access to education, healthcare and

government services to all citizens of the country. Also ensures transparency

because data is available online and accessible to citizens. It can also boost GDP

growth. World Bank report presents that 10% increase in mobile and broadband

penetration increases per capita GDP by 0.81% and 1.31% respectively in

Page 34: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

30

developing countries. Table 4 depicts the challenges being faced in the Digital

India program

Table 4: Challenges Of Digital India

• Creating Awareness

• Connectivity with each and every village

• Delayed infrastructure development

• 80 Lacs hotspots to reach global level

• Poor private participation

• Non-availability of digital services in local languages

• Fear of cyber crime

Status Of Financial Inclusion In India:

Financial inclusion in India has been under continuous growth since

independence. The efforts of the government of India are tremendous to reach the

unbanked population of the country which lies around 21% of the world’s and

67% of south Asia’s unbanked population (Patel, 2016). Major steps taken to

enhance inclusion are Pradhan Mantri Jan Dhan Yojana (2014), Pradhan Mantri

Jeevan Jyoti Beema Yojana, Pradhan Mantri Suraksha Bima Yojana, Atal

Pension Yojana and Digital India program (2015) for digitalized access. Financial

inclusion is defined as “the process of ensuring access to financial services and

timely and adequate credit where needed by vulnerable groups such as weaker

sections and low-income groups at an affordable cost”, by Dr. C. Rangarajan

(Prasad and Jha, 2018). India has come up with a much-diversified banking

sector. Overall performance of the banking sector has witnessed a credit boom.

The credit-GDP was 35.5% in 2000, and after almost a decade in the year 2013,

it has increased by 15.5% (Barua et al. 2016). India has achieved developed

Page 35: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

31

financial structure which is summarized in Table 5 but is not successful in

accomplishing the needs of the unbanked population.

Bank Type Name Number of

Branches

Commercial

Banks

Public sector banks

(26)

Private sector banks

(20)

Foreign banks (43)

Regional rural banks

(64)

Local area banks (4)

State bank of India

Associate banks

Nationalized banks

Other public sector

banks

old private sector banks

New private sector

banks

Branch mode of

presence

Limited area of

operation

Limited area of

operation

14,699

5,482

52,480

1

6,047

9,522

332

Cooperative

Banks

Urban co-operative

banks

Rural cooperatives

Multi state urban

cooperative banks

Single state urban

cooperative banks

Short term

State cooperative banks

District central

cooperative banks

Primary agriculture

cooperative societies

Long term

State cooperative

agriculture and rural

development banks

Primary cooperative

agriculture and rural

development banks

43

1,563

92,834

31

371

92,432

717

20

697

Microfinance

Institutions

There are 52 MFIs

that have either

received or applied

for registration from

Arohan, Bandhan, BSS,

Cashpor, Disha, Equitas,

ESAF, GramaVidiyal

10,553

Page 36: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

32

Bank Type Name Number of

Branches

the Reserve Bank of

India as of June

2015. They

constitute over 90%

of total micro

finance industry

business in the

country.

(Source: Barua et al. 2016)

Proximity, convenience and security acts as major limitations in the path of full

financial access (Patel, 2016) which could be easily overcome by the

digitalization programs. The nine pillars of digital India program (Figure 1) have

helped in achieving the targets of IT based banking services across the nation.

Table 6: Highlights Of Telecom Subscription Data As On

31st October 2016

Particulars Wireless Wireline Total (Wireless+

Wireline)

Total Telephone Subscribers (Million) 1,078.42 24.52 1.102.94

Net addition in October 2016 (Million) 28.68 0.02 28.7

Monthly growth rate 2.73% 0.10% 2.67%

Urban Telephone Subscribers (Million) 621.77 20.61 642.37

Page 37: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

33

Particulars Wireless Wireline Total (Wireless+

Wireline)

Net addition in October 2016 (Million) 17.96 0.03 18

Monthly growth rate 2.97% 0.17% 2.88%

Rural Telephone Subscribers (Million) 456.66 3.91 460.57

Net addition in October 2016 (Million) 10.72 -0.01 10.71

Monthly growth rate 2.40% -0.26% 2.38%

Overall Tele-density 84.34 1.92 86.25

Urban Tele-density 155.35 5.15 160.5

Rural Tele-density 51.98 0.45 52.43

Share of urban subscribers 57.66% 84.04% 58.24%

Share of rural subscribers 42.34% 15.96% 41.76%

Broadband subscribers (Million) 200.49 17.93 218.42

(Jhamb, A. and Aggrawal, S. 2018)

Various digitalization platforms will eradicate the issues related to non-

maintenance of Non-frill accounts. Under PMJDY and MGNREGA scheme

government has opened zero balance NFAs to enhance rural financial inclusion

but most of the accounts remain dormant due to insufficient usage knowledge

related to the account and high operational transaction cost charged by banks.

Both the issues can be resolved by digitizing the banking services.

Digital India Program: Steps Towards Success:

Rural unbanked population prefer using post offices for keeping their funds.

Through digital India program over 12,000 branches are connected digitally and

very soon it will operate cashless (Luvy, 2018).

Cashless transactions of various e-governance projects have increased

tremendously in just 1 year by 3.42 billion (3.53 billion in 2014 and 6.95 billion

in 2015) (Luvy, 2018).

Page 38: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

34

Barriers Of Digital Divide And Initiatives In India:

There is a huge impact on economic, political, social and cultural lives by PCs

and the Internet (Castells 2001). It is not only important to realize the change

brought by the technology but also the means of diffusion of technology (OECD

2000, 2001; NTIA 1999, 2000, 2002). There is difference in access across the

population. The term “digital divide” also to refer to the inequality of access to

digital resources and services (Paul 2002). Digital divide is also interpreted as a

gap between those who have physical access to technology, and the skills and

resources also required to use it.

There are barriers to the digital divide in the Indian context like low literacy rates,

education system and language. The literacy rate has improved by 9.2% as per

Population census of India 2011 (India Online 2011). Literacy rate in 2001 was

65.38% and increased to 74.04% in 2011. There is a increase in literacy rate but

when compared to the urban and rural area the difference between the literacy

rates seems to be the major stumbling block in the digital divide.

In India 216 mother tongues are clubbed into 114 languages (Mallikarjun, B

2004). The inseparable barrier to Information Technology is the Indians not

speaking English because basic knowledge of English is required to operate the

widely accepted operating system (Keniston, 2002). The step towards

diminishing the digital divide is the introduction of technological aspect content

right from school level but in India the number of children pursuing secondary

education gets reduced to those who take up an undergraduate course (Yajnik,

2005). Right from the 1st standard, information technology is introduced in the

syllabus.

Since there is a difference in literacy rate between the urban and rural India, the

Government of India had already taken steps to harness IT in the agriculture like

KISAN Call centers set up by the ministry of agriculture on January 21,2004

Page 39: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

35

which extend help to the farmers community across the country. The agriculture

graduate expert can be contacted by farmers through phone calls and the queries

are also recorded on holidays and responded by post. This is a step to bridge the

gap between the information resource and the user. Lifelines India, a mobile

phone-based information services where farmers retrieve a recorded reply is

another initiative which has proved very effective in educating rural users to use

technology to ask for advice and learn to move towards the improvement of their

community. Gyandoot is a rural Information network which caters to the

everyday needs of the masses. It is the first project in the Dhar District of Madhya

Pradesh which has the highest percentage of tribes and forest.

Conclusion:

Information and Communication Technology requires multipronged approach to

bridge the digital divide as it cannot be a secluded component. Better IT

infrastructure which facilitates the digital literacy among the masses will diminish

the gap. There is an improvement in quality, effectiveness and efficiency with e-

governance as several measures taken by the Government of India have improved

the literacy rate in several districts and villages where people are very poor.

All government departments have come up with websites with information and

are interfaces for the citizens. India’s partial success with e-governance is due to

lack of Internet infrastructure, high cost of access, lack of awareness and low

digital literacy concluding mass financial exclusion. Building institutional

capacity and implementing a sound e-governance policy will help to get a better

hold of e-governance. Digitized banking platform is the only way to include

people across the country due to its low-cost operability and accessibility.

Financial inclusion through digitized platforms will be a great success if the

Digital India program makes its way to reach the target.

Page 40: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

36

India is a developing nation and Digital India is a platform for the growth of

people digitally. In order to beat the objectives of e-governance and acclaim

success it is important to adopt preventive measures regarding privacy and

security of information to promote more inclusive growth otherwise the results

of success will not be overwhelming. Lessons can be learned from the world

leaders in e-governance, like Australia, which is focusing on standardization of

data, interoperability in e-governance and offering more services for effective e-

delivery. Digital India has given form to better connectivity and with a vision to

transform India into a digitally empowered society has offered a mere

technological opportunity. Digital India aims to make the best future for every

citizen though it is facing many barriers. Today the urban and semi-urban lifestyle

has virtually changed the lifestyles. In the rural areas various successful e-

governance initiatives, new IT infrastructure and new projects for rural

development give hope to lessen the digital divide. Many technologies are

developed for the literate class, but the technologies had to be availed by the

masses provided they are digital literate. It is a real challenge to connect a million

rural populace to the knowledge economics is a task ahead.

Policies are also coming up to establish safe and secured digitized platforms.

Proper cyber law infrastructure will boost citizen confidence by the protection of

data in electronic documents, digital signatures and minimizing cyber-crime.

Cyber literacy is expected from policy makers and bureaucrats. There are over

forty countries which provide the right to access state held information. It is

recognized that politics will be affected by the Internet which keeps people

informed and helps in making choices based on a variety of information.

Page 41: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

37

References:

1. Bannister, F. and Walsh, N. (2002) The virtual public servant: Ireland's public

services broker. Information Polity: The International Journal of Government

& Democracy in the Information Age, 7 (2/3) pp115

2. Barua, A., Kathuria, R. and Malik, N. (2016). The Status of Financial

Inclusion, Regulation and Education in India.

https://www.adb.org/sites/default/files/publication/183034/adbi-wp568.pdf

(accessed 29 Jun 2019).

3. Bhatnagar Subhash (2004), e-government from vision to implementation, sage

publications, New Delhi.

4. Castells, Manuel 2001 The Internet Galaxy; Reflections on the Internet,

Business and Society, Oxford: Oxford University Press.

5. Dasgupta, S.; Lall, S. and Wheeler, D. (2002) Policy Reform, Economic

Growth, and the Digital India, Policy Review Working Paper of the World

Bank, No.WPS-2567, Washington, DC.

6. Dutta, Subrat. (2003) “Impact of Information Communication Technology on

Society.” Yojana, Vol. 47, No.2, p 24. Fletcher

7. Fletcher, Ameila; Simon, Gaysford and Adele (2000) “OFT Study on E-

Commerce and Competition”, accessed on http://www.out-law.com/page-954

8. Howard, M. (2001) E-Government across the globe: How will "e" change

government? Government Finance Review, vol. 17, Issue 4, pp. 6-9. 8

9. India Online. 2011. Literacy rate in India. Retrieved 19 October 2018, from

http://www.indiaonlinepages.com/population/literacy-rate-in-india.html

10. Jeusus, M., Frias (2003) “The Importance of ICTs for Developing Countries”,

Interdisciplinary Science Review, Vol. 28, No. 1, pp 10-14.

11. Jhamb, A. and Aggrawal, S. (2018). Digitalized Financial Inclusion: A Cause

of Development in India.

Page 42: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

38

https://www.omicsonline.org/open access/digitalized-financial-inclusion-a-

cause-of-development-in-india-2151-6219-1000338-98459.html (accessed 29

Jun 2019).

12. Keniston, Kenneth 2002. The Four Digital Divides. Retrieved 19 October

2018, fromhttp://web.mit.edu/people/kken/PAPERS/Intro_Sage.html

13. Lawerence, Steve and Lee, Giles (1999) “Accessibility of Information on the

Web”, Nature, Vol. 400, pp 107-109. Leizerov.

14. Leizerov, Sagi (2000) “Privacy Advocacy Groups Versus Intel: a Case Study

of How Social Movements are Tactically Using the Internet to Fight

Corruptions”, Social Science Computer Review, Vol. 18, pp 461-483.

15. Luvy (2018). Impact of Digital India by 2019.International Journal of

Scientific and Engineering Research, 9(4), 1285-1288.

16. Mahajan, Subrat. (2003) “Impact of Digital Divide on Developing Countries

with Special Reference to India.” SERALS Journal of Information

Management. Vol. 40, No. 4, pp 328–329. Mark

17. Mallikarjun, B. 2004. Indian Multilingualism, Language Policy and the digital

divide. Retrieved 19 November 2018, from http://www.languageinindia.com/

april2004/kathmandupaper1.html

18. Ministry of Electronics & Information Technology, Government of India.

(2016, December 20). digitalIndia.gov.in. Retrieved from

www.digitalindia.gov.in/content/about-programe

19. Nandi, B. (2002) Role of Telecommunications in Developing Countries in the

21st Century, 14th Biannual Conference, International Telecommunication

Society: Seoul.

20. Nath, V. (2001) “Employment and governance through ICTs: Women’s

Perspectives”, The International Journal of Information and Library Review,

Vol. 33, pp 317339

21. Norris, P (2001) The Digital Divide” Civic Engagement, Information Poverty

and Internet Worldwide, Cambridge University Press: Cambridge.

Page 43: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

39

22. NTIA 2000 US Department of Commerce. Falling Through the Net: Towards

Digital Inclusion. http://www.ntia.doc.gov/: US Department of Commerce.

23. NTIA 2002 US Department of Commerce. A Nation Online.

http://www.ntia.doc.gov/: US Department of Commerce.

24. NTIA. 1999. Falling Through the Net III: Defining the Digital Divide.

Washington, DC: US Dep. Commerce

25. OECD 2000 The Digital Divide: Diffusion and Use of ITs. Paris: OECD

DSTI/ICCP/IE.

26. OECD 2001 Understanding the Digital Divide. Paris: OECD.

27. Pastor, Satorras; Romualdo and Alessandro, Vespignani (2004) Evolution and

Structure of the Internet: A Statistical Physics Approach, Cambridge

University Press: Cambridge.

28. Patel, A. (2016). Financial Inclusion: Harnessing Poor Families’ Potential for

Development. FHB Business Review, 6(1), 15-22.

29. Paul, J. 2002. Narrowing the digital divide: initiatives undertaken by the

Association of South-East Asian Nations (ASEAN). Program: electronic

library and information systems 36(1): 13-22.

30. Prasad, S. and Jha, R. (2018). Financial Inclusion and Financial Education are

Complementary for the growth of MSMEs: An Indian Case. Conference

Paper: International Conference on Financial Inclusion and Inclusive Growth

(24-25 November, 2018), Ranchi University, Ranchi, Jharkhand.

31. Seattle Goodwill (2014). Technology Access, Usage, & Digital Literacy:

Issues & Strategies. Retrieved from

http://www.seattlegoodwill.org/system/assets/general/JTE/Digital%20Litera

cy/TechAcce ss-UsageDL-IssuesStrat-2014.pdf.

32. Sharma, R. (2017). Digital Infrastructure in India.

https://main.trai.gov.in/sites/default/files/presentations_&_cv/Day-

3_25Aug2017/Session2_Digital%20world/Digital%20Infra_Rajesh%20Shar

ma.pdf (accessed 29 Jun 2019).

Page 44: INFORMATION TECHNOLOGY FOR

Bridging The Digital Divide Through Digital India For Effective E-Governance Leading To Financial Inclusion

40

33. Sharma, S. K. (2006) An E-Government Services Framework, Encyclopedia

of Commerce, E-Government and Mobile Commerce, Mehdi Khosrow-Pour,

Information Resources Management Association, Idea Group Reference,

USA, pp. 373-378. 2006.

34. Sharma, S. K. and Gupta, J. N. D. (2003) Building Blocks of an E-government

– A Framework, Journal of Electronic Commerce in Organizations, (1:4),

2003, pp. 34-48

35. Sharma, S.K. (2004) Assessing E-government Implementations, Electronic

Government Journal, 1(2), 2004, pp. 198-212

36. Sheridan, W., and Riley, T.B. (2006) Commonwealth Centre for e-

Governance, e-Gov Monitor, Monday, 3 July 2006

37. Singh, Neena (2007) “Bridging the Digital Divide in India: Challenges and

Opportunities”, World Libraries, Vol. 17, No. 1.

38. Sumanjeet (2006) “E-Governance: An Overview in the Indian Context”,

Indian Journal of Political Science, Vol. 67, No. 4.

39. UN Global E-government Readiness Report. From E-government to E-

inclusion, UNPAN/2005/14, United Nations publication, United Nations,

2018.

40. United Nations (2006) Encyclopedia Britannica, accessed on

http:search.eb.com/eb/article-250455.

41. Yajnik, Nilay M. 2005. E-learning and the digital divide. In National Seminar

in eLearning and e-Learning Technologies (ELELTECH INDIA-2005)

August 08-09, 2005 Retrieved October 2018, from

http://elearn.cdac.in/eSikshak/ eleltechIndia05/papers.htm

Page 45: INFORMATION TECHNOLOGY FOR

Information Technology For Management https://www.kdpublications.in

ISBN: 978-81-947839-1-6

41

3. Business 4.0-A New Revolution

Mehtab Alam and Dr. Ihtiram Raza Khan

Jamia Hamdard, New Delhi.

Abstract:

As a new business is established or founded, it exercises a carefully crafted

business model which describes a number of internal business processes, work

architecture, production ways, profit maximization techniques, fraud detection

and many other techniques. The core of the business model depends on

determining the way in which the business delivers value to the customers,

attracts customers to buy the services, and then converting it into profits. The

intent of profit or loss reflects the assumption of the management about the

requirements and needs of the customers. The key reason for any business to excel

and flourish is to pin point how to fulfil the needs and demands of the consumers.

In this paper, we will discuss about the latest business model, Business 4.0 in

depth and look at its future prospective.

Keywords:

Business 4.0, business model

1. Introduction:

The vast and fast developments in the global economy has completely altered the

relationship between the customers and the suppliers. The advancement in the

field of communication and computing technology and the easy availability of

tech devices has led to the introduction of the latest business model, namely,

Business 4.0. Business are becoming more and more customer centric [1], with

on demand supply and distribution facilities, by anticipating the customers need,

collecting feedback from customers, giving the facility to test the item before

Page 46: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

42

purchasing, providing better customer service etc. Such developments require

modification in the traditional business model.

These new conditions have tempted the businesses to not only address customer

needs and demands, but to provide new and improved products and services to

them [2]. Without a robust business model, developers, pioneers will fail to

deliver value or profit from their innovation and technologies. A good business

model illuminates the logic and delivers data, facts and other evidences that

portray how the business is creating and delivering value for money to the

customers. It defines the revenue, cost and profit models of the business [3].

Figure 1 illustrates the elements of a business model that needs to be determined

or carved upon before establishing a business. The prime step for any business

model is to select technologies and features that the management need to embed

in the product or service. Next step is to determine the benefits the customer will

get on using the product. Next step for the management is to identify the market

segments that is to be target for the product sale. Further, the management needs

to check and enlist all the available income streams. Next the management needs

to design and implement mechanisms to capture value in the market and with the

consumers.

Figure1: Different Elements Of A Business Model.

Page 47: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

43

2. Traditional Business Model:

Business models illustrate how a business creates and delivers value to the

customer and then transform all the payments into profits [4] [5]. It also embodies

the organisational and financial architecture of the business [6]. It is a required

feature of retail where the consumers have a choice, bears a transaction cost, and

there is heterogeneity amid consumers and the producers, and there is a

competition between different producers of service providers. Technological

innovations are the most important factors for necessitating business models and

its updating. It helps in bringing new discoveries to the market and in quenching

the needs of the customers. New or updated business models can themselves

imitate a new innovation. In this section we discuss a few traditional business

models.

2.1 A Few Traditional Types Of Business Models:

We will discuss a few standard business models now. Business owners can

structure their business model to include some required or beneficial features of

one or more models in their final business model to reap more benefits in their

business.

2.1.1 Manufacturer:

Manufacturer business model makes use of raw materials to create a product they

wish to sell. The business model may involve the assembly of pre manufactured

parts of a machine or a new product, such as automobile manufacturing. A

business can directly sell the final products directly to the consumers. This is

called business-to-consumers model. Another method can be deploying some

other business to do the sales work. This is known as business-to-business model.

Bulk manufacturing business sell their products to retailers, which further sell the

products to the consumers [7].

Page 48: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

44

2.1.2 Distributor:

A distributor is a business model which purchases the product directly from the

manufacturing company. The distributors then would resale the products directly

to the end users or to a retailor. They can be thought of as a middle point between

the manufacturer and the end users. This business model has the challenge of

setting the price that will give profit to them and at the same time be lucrative to

the users. They have to set effective promotion strategies for strong sales since

the competition can be aggressive in some businesses [8].

2.1.3 Retailer:

A retailer business model purchases the products from a distributor. It further

sells the products directly to the end users. Grocery stores, clothing stores,

departmental stores are a few examples of retailers. These models can deploy

independent shops operated by single entity or nationwide chains. They can also

deploy their business as an online business. Online retail model can be in a

standalone online model or an online model selling from a physical location.

Retailers also face competition from other retailers that offer similar products [9].

2.1.4 Franchise:

A franchise business model can combine any of the above stated models. These

models are setup to provide sales or production for a unique service or product.

Franchisee is the sole selector of the business model who owns the franchise. The

owner can reap a number of benefits from a franchise since most of the business

process and rules are already set in place. At the same time this means that the

model is less flexible [10].

Page 49: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

45

2.2 Need For A Better Model:

With the widespread acceptance of technology, Internet of things, connected

devices, cloud computing, automation and the vision of smart cities, smart

healthcare, smart security systems and many other smart paradigms, it is now

time to make the business industry smarter. The demise of a popular but

unsustainable business model now seems inevitable [11]. Significant

transformations in the way the products and services are being produced is the

next step in the business model. All of this will be possible with the help of above-

mentioned technologies and digitization.

3. Business 4.0:

Business 4.0 is a concept of leadership framework, which will help end users and

customers leverage digital technologies like computers and handheld devices to

address their growth and transformation agendas. It will provide an integrated and

holistic framework to help the customers address their issues and concerns and

focus on their growth in an agile manner. Digital opportunity is a global

phenomenon as these new technologies are becoming more and more acceptable

on the business enterprise table [12].

3.1 Business Behaviour:

Business 4.0 is a term introduced and coined by TCS. It is a framework of how

business work or behave that will optimize and make use of the digital technology

to gain advantage in creating customer value. As per TCS, there are four different

business behaviours of the leaders of the digital era that will help fabricate the

digital technologies [12] [13].

Page 50: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

46

3.1.1 Creating Exponential Value:

Digital technologies have overwritten the traditional concepts of value creations

and have presented new and bright opportunities of delivering value to the end

users and customers. Technologies like Big Data, IoT and AI allows linking and

cross-selling of the different products and services which makes it easy and

assertive for businesses to look beyond increasing values and pre-defined revenue

opportunities.

3.1.2 Driving Mass Personalization:

Digital technologies are helping and enabling the businesses to deliver

customization at a huge scale. Big data tools and data analytics allow a singular

view of customer demands. It also allows nearly infinite scope of segmentations

across a number of variables. AI and IoT solutions can help us drive user

personalization at a large scale. Technologies like 3D printing can easily turn the

production process upside down by starting with the most basic customer

requirements.

3.1.3 Leveraging Ecosystems:

Digital technologies are variously expanding the boundaries of the industries and

the landscape of the competition. Businesses across many industries are working

together to deliver greater value and services to the customer. API, analytics and

the various digital platforms have taken the group collaboration to a new level.

3.1.4 Embracing Risk:

Digital technologies have enabled the businesses to gain new levels of agility and

flexibility in embracing the risks. Adaptation of digital means requires large-scale

restructuring and transformations to the processes as well as the business model.

Digital technologies have also created an environment that promises high returns

Page 51: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

47

on the risks taken. Maximization of digital technologies advantages for

businesses, the management needs to think big and focus on the betterment of the

customer, and ways of providing better and futuristic services and products.

3.2 Technology Pillars:

Technology pillars are the pillars on which the business 4.0 paradigm rests upon.

Overall, four technologies have been identified on whom the paradigm can be

handled upon [12].

Figure 2: Business 4.0, Technology Pillars

3.2.1 Agile:

Recently agile has completely transformed the alignment of business and

Information Technology (IT). Simple meaning of the term agile means to move

quickly. Agile is all about producing good quality, working software in quick

time. Agile transformations help businesses to respond faster and with better

results to the customers and competitors. It helps in becoming leaner and

Page 52: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

48

innovative. It also helps in taking calculated and well-informed risks which would

help in gaining profits [14].

3.2.2 Automation:

With the power of data analytics and AI, technology applications can monitor the

production and delivery of the products and services. They can also control it. It

will help in getting unmatched returns. Machine First approach gives the

flexibility to humans to move away from everyday repetitive tasks by giving the

machines the rights to make decisions without involvement of humans. In this

way, humans can focus their attention on areas where human intelligence is

required [15].

3.2.3 Intelligent:

Techniques like data science, cognitive capabilities and Natural Language

Processing (NLP) help the machines to understand and act autonomously and

independently. This allows the machines to be automated for the tasks prescribed

for them, saving time, energy, resources and at the same time increasing

efficiency. All these autonomous solutions have taken the human capabilities to

unforeseen levels [16].

3.2.4 Cloud:

Cloud is the hub of processing and data storage. It provides shared resources and

services which can be used over the internet, on demand and as per requirements.

These services are flexible, scalable, and available 24X7. They allow computing

capabilities to enterprises and businesses anytime, anywhere and support a large

number of platforms [17].

Page 53: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

49

3.3 The Age Of Abundance:

Digital technology has completely reshaped the traditional concept of static and

limited resource availability. Earlier humans used to work with limited resources

and they had to bring out the best from those limited resources. But now,

enterprises and businesses can harness resources in abundance. This is the key

enabler of Business 4.0. The three basic building blocks of growth of business

can be the following [12].

3.3.1 Talent:

Digital technology has allowed enterprises and businesses access to abundant

talent at all levels of expertise. Technologies such as cloud, automation and

analytics has made it possible to gain unscaled resources, powered mobility to

users, social and global access and platform economy. The availability of

abundant resources has helped businesses come up with innovative and futuristic

business models [18].

3.3.2 Capital:

Innovation is at its prime in this world of digital technology and developing it

into commercial scale has become easier. Governments and big enterprises are

eyeing and helping start-ups with brilliant minds and ideas. Technologies

facilitate proofs of concepts and pilots at a smaller scale with limited capital

requirements before increasing them [19].

3.3.3 Capabilities:

With the availability of cloud services, the enterprises and businesses are no

longer tied to limited in-house resources and capabilities. They are interested in

developing partnerships with ecosystems big or large businesses, service

Page 54: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

50

providers, suppliers, their competitors and even start-ups. APIs allow them access

to functional capabilities such as GPS, e-tailing and payment systems [20].

4. Business 4.0 At Work:

Business 4.0 is all about embracing technology. Industries and businesses are now

often using combinations of behavioural changes to sell products or services.

Let’s look at some of the most prominent success factors of some international

businesses in their success strategies [12].

4.1 Google’s Exponential Value Growth:

Google when it was launched was a simple search engine. It took queries and

displayed results. Its services were free for its users. Then after some time, many

people from around the world started using google service on a daily basis which

in turn gave google a huge userbase. First it started paid search for its users and

then launched Google ad words to earn profits [21]. In a very short span of time,

it became an integral hub for advertising and marketing. It started tracking its

users’ behaviour and used it to generate leads for other businesses. Further it

leveraged user data for the GPS services. It also started providing free email

service, and then introduced commercial use as well. Due to its data processing

and analytic abilities, it was able to introduce a large number of products and

services and grew to a $1 trillion company in no time [22].

4.2 Amazon:

When other businesses were still figuring how to use enormous data, Amazon

was busy using advanced analytics to drive personalization on the masses. The

traditional market segments at the time were gender, age and income. Whereas

amazon made a segment of one and started to break it up further. Automation,

analytics and AI were used to male customizations on a large scale. If a user

Page 55: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

51

purchases a mobile phone, they will start getting offers to buy covers for the

phone. It will display what the user searched the last time they visited the website

to drive more sales. These advanced technologies allowed amazon to increase

customer value and made it the worlds largest e-commerce marketplace and the

most valuable public company [23].

4.3 Uber:

Uber is a business that provides transport service to its users but uber itself does

not own a single vehicle. It operates by leveraging ecosystem of third-party

vehicle owners. They used digital technology to change the way the users perform

their day to day commutes. The app used to buy the services uses GPS to connect

the user/rider with the vehicle drivers. It further adds a payment gateway to give

quick and secure payment option. Dynamic pricing is also a functionality that

benefits both riders and drives [24].

4.4 Netflix:

Netflix started as an online video store in 1998. In 2007 it launched its unique

video streaming service. Finally, it launched its original programming business

in 2011. They were able to launch these services because they used technology

to read user preferences and likes and dislikes. In 2008, they completed moved

their services to the cloud, which in turn provided them with the speed that the

streaming services need and the scalability as it was expanding to different

geographical regions. The switch to the cloud helped them gain an exponential

rise in streaming hours. The moves were well timed and even better managed. Its

subscriber base grew from a 25 million to 125 million in a few years [25].

5. Relation With Industry 4.0: Industry 4.0 [26] is the main driver for Business

4.0. With the fourth industrial revolution the next business revolution was not far

behind. Everyone nowadays is talking about sustainability, which can only be

Page 56: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

52

realized with efficient use of the available resources and services. Industry 4.0

and Business 4.0 are the key enablers for human sustainability. According to

Forbes report, “what has been available to us through each of the three preceding

stages of our industrial revolution has been limited by what business could offer

during each period with the tools at its disposal. That's now changing for the

fourth time". So, we can say that the Industry 4.0 is providing business 4.0 with

a new set of tools to work with. Businesses are creating value in ways never used

before. The social systems are also adapting, evolving and reacting to the same

for better or worse. Technologies are allowing businesses to bridge the last mile

and last minute of the connectivity chain. Value is now being driven by

simplicity, convenience, connectivity, immediacy and many other experimental

focused offerings. The society is adjusting, adapting and reacting and trying to

advance what we have to work with and to live with it [27].

6. Steps To Achieve Sustainable Business Model:

Most businesses, earlier, did not possess any knowledge of sustainable

development. From a deeper perspective, a sustainable business is the one which

promises equal growth for business finances, environment and social factors. The

path to achieving sustainability is not easy. In this section we list a few ways

which will help businesses and enterprises to shape a more sustainable future for

themselves and the community [28].

1. Building Businesses On Belief:

It is possible to change everything about a business baring the core belief.

Developing a business on one’s beliefs is nothing but generating value to the

business. The modern business is totally dependent on the beliefs of the

management. Belief should be consistent, and one should work upon your beliefs

and derive value.

Page 57: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

53

2. Embracing The Changes:

When there are changes in the business environment either you act fast and adapt

to the situation or don’t change with the situation. If you access the situation

correctly and perform the switch, you can be the biggest, boldest and on the right

track. But if you access the situation wring and do not make the switch, then you

may be the closest to extinction. One may have a brilliant idea, but a brilliant idea

today may not be worth in a few months’ time. So, businesses should find ways

to take the ideas to the market quickly.

3. Developing Business Value Propositions:

Every business should have a crucial marketing tactics which acts as a catalyst

for value, in reference to client needs and problems. So, if the business process

doesn’t get the schedule and planning right and it loses the touch with the value

preposition, then our business can get completely failed. We should never lose

sight of the fact that the purpose of the business is to push value for the customers.

The focus should be on creating high business value and high capabilities which

will help the user.

4. Growth And Comfort Don’t Co-Exist:

Today, things are changing very fast. Everyone today is trying to shift to the

technological perspectives. If a business wants to grow, it needs to come out of

its comfort zone and play in the open, since, competition in the market is at the

highest. Banking industry is growing, everybody now a days is a retailer,

everyone is selling and manufacturing mobiles. Furthermore, businesses should

have the main focus on delivering values to the users in innovative ways.

Page 58: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

54

5. Excelling In A Particular Area:

It is an ecosystem of businesses today. It is not that one business is delivering

products to all the users at every place. If you are not a part of the ecosystem, then

your business is limiting itself. As the time passes on, the business will drift

towards difficulty. One business can be a part of a number of ecosystems. And

one’s contribution in each ecosystem should be significant. One should always

look at how things work to drive the incremental value.

6. Constant Reinvention:

For a business it is very important to constantly reinvent what you do and

reimaging the way you do business, but the core belief of the complete system

should be retained. It is so because the employees, the clients and the partners

need a strong belief to work with you and for you.

7. Conclusion:

It is hard to remember that smartphones have only been with us for over a decade,

or the internet only really got going in the last 20 years. AI has been around for

decades, but its only since the advent of smarter computers powered chips with

faster processing, that it has become mainstream. Sensor technology has

propelled the Internet of Things. In business 4.0, automation, robotics, AI, cloud

computing and other technologies are changing the way business are conducted.

Now, man and machines are working in tandem and more closely than ever. The

technology powered by machine learning will in the near future emulate the

workings and patterns of the human brain. Smart robots will work alongside

humans, not to replace them but to augment their capabilities. Smart technologies

will make Business 4.0 more sustainable and efficient in the near future.

Page 59: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

55

References:

1. Sheth, J. N., Sethia, N. K., & Srinivas, S. (2011). Mindful consumption: a

customer-centric approach to sustainability. Journal of the Academy of

Marketing Science, 39(1), 21-39.

2. Brentani, U. D. (1991). Success factors in developing new business services.

European Journal of marketing, 25(2), 33-59.

3. https://www.wu.ac.at/en/strategy-and-innovation/department-research-

program/relevance-and-concept

4. There are other (related) definitions of a business model. Amit and Zott see R.

Amit and C. Zott, Value creation in e-business, Strategic Management Journal

22, 493e520 (2001);

5. C. Zott and R. Amit, The fit between product market strategy and business

model: implications for firm performance, Strategic Management Journal 29,

1e26 (2008) define a business model as ‘the structure, content, and governance

of transaction’ between the focal firm and its exchange partners

6. H. Chesbrough and R. S. Rosenbloom, The role of the business model in

capturing value from innovation: evidence from xerox corporation’s

technology, Industrial and Corporate Change 11(3), 529e555 (2002).

7. Landau, C., Karna, A., & Sailer, M. (2016). Business model adaptation for

emerging markets: a case study of a German automobile manufacturer in

India. R&D Management, 46(3), 480-503.

8. Anderson, J. C., & Narus, J. A. (1990). A model of distributor firm and

manufacturer firm working partnerships. Journal of marketing, 54(1), 42-58.

9. Sorescu, A., Frambach, R. T., Singh, J., Rangaswamy, A., & Bridges, C.

(2011). Innovations in retail business models. Journal of retailing, 87, S3-S16.

10. Gillis, W., & Castrogiovanni, G. J. (2012). The franchising business model:

an entrepreneurial growth alternative. International Entrepreneurship and

Management Journal, 8(1), 75-98.

Page 60: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

56

11. The end of the free lunch e again, The Economist 390(8623) (March 21st,

2009).

12. https://www.business4.tcs.com/content/dam/tcs_b4/pdf/About%20Business

%204.0.pdf, https://www.business4.tcs.com/

13. Müller, J. M., Buliga, O., & Voigt, K. I. (2018). Fortune favors the prepared:

How SMEs approach business model innovations in Industry 4.0.

Technological Forecasting and Social Change, 132, 2-17.

14. Ghezzi, A., & Cavallo, A. (2020). Agile business model innovation in digital

entrepreneurship: Lean startup approaches. Journal of business research, 110,

519-537.

15. Caswell, N. S., Ciccolo, A. C., & Nigam, A. (2003). U.S. Patent No.

6,662,355. Washington, DC: U.S. Patent and Trademark Office.

16. Coria, J. A. G., Castellanos-Garzón, J. A., & Corchado, J. M. (2014).

Intelligent business processes composition based on multi-agent systems.

Expert Systems with Applications, 41(4), 1189-1205.

17. [17] Ojala, A., & Tyrvainen, P. (2011). Developing cloud business models: A

case study on cloud gaming. IEEE software, 28(4), 42-47.

18. Walford-Wright, G., & Scott-Jackson, W. (2018). Talent Rising; people

analytics and technology driving talent acquisition strategy. Strategic HR

Review.

19. Park, S. (2017). Understanding digital capital within a user’s digital

technology ecosystem. In Digital Capital (pp. 63-82). Palgrave Macmillan,

London.

20. Day, J., Freiberg, K., Hayes, A., & Homel, R. (2019). Towards scalable,

integrative assessment of children’s self-regulatory capabilities: New

applications of digital technology. Clinical child and family psychology

review, 22(1), 90-103.

21. Geddes, B. (2014). Advanced Google AdWords. John Wiley & Sons.

Page 61: INFORMATION TECHNOLOGY FOR

Business 4.0-A New Revolution

57

22. https://www.theverge.com/2020/1/16/21069458/google-alphabet-trillion-

dollar-market-cap-apple-microsoft

23. https://www.cnbc.com/2019/01/07/amazon-passes-microsoft-market-value-

becomes-largest.html

24. Cannon, S., & Summers, L. H. (2014). How Uber and the sharing economy

can win over regulators. Harvard business review, 13(10), 24-28.

25. Gomez-Uribe, C. A., & Hunt, N. (2015). The Netflix recommender system:

Algorithms, business value, and innovation. ACM Transactions on

Management Information Systems (TMIS), 6(4), 1-19.

26. Vaidya, S., Ambad, P., & Bhosle, S. (2018). Industry 4.0–a glimpse. Procedia

Manufacturing, 20, 233-238.

27. https://www.forbes.com/sites/bobzukis/2019/02/28/why-business-4-0-is-

driving-social-and-industry-upheaval/#4a3d43c134c4

28. Bocken, N. M., Short, S. W., Rana, P., & Evans, S. (2014). A literature and

practice review to develop sustainable business model archetypes. Journal of

cleaner production, 65, 42-56.

Page 62: INFORMATION TECHNOLOGY FOR

Information Technology For Management https://www.kdpublications.in

ISBN: 978-81-947839-1-6

58

4. Quality Access Control To Provide Security To Data

Owners In Cloud Computing

Amit Phadikar

Dept. of Information Technology,

MCKV Institute of Engineering, Liluah, Howrah, India.

Abstract:

The present chapter attempts to develop two quality access control schemes using

region of interest (ROI) coding of an image and lifting. In the first algorithm,

quality access control for ROI is presented using K-means clustering, and data

hiding. The scheme uses two types of dithers for efficient data embedding. The

embedded watermark is removed completely by reversible process that leads to

greater improvement in quality. In the second algorithm, a quality access control

scheme is described with ROI coding functionality in compressed domain. In this

algorithm, a data modulation based scheme is used for quality access control of

ROI at various qualities of gray scale image. The detailed wavelets coefficients

that lie within the area of ROI are modulated by a key supplied by the user/owner.

Those operations collectively are called here as passive data hiding and the

necessary information are encrypted in the form of a secret key which is used at

the time of decoding. Experimental results show that the work provides a

reference solution to the critical problem of cloud security.

Keywords:

Quality Access Control, Data Hiding, Passive Data Hiding, QIM, ROI, Wavelet,

Foreground, K-mean clustering.

1. Introduction:

Cloud computing is a set of services that are given to a client over a network

(mainly over Internet) on a rent basis. The clients also have the capability to

Page 63: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

59

rescale their service as per their requirements. Normally, cloud computing

services are distributed by a third-party provider who possesses the

infrastructure/resources. It offers various advantages like scalability, resilience,

flexibility, efficiency and outsourcing non-core activities. As a result, it offers a

pioneering business model for organizations to accept IT services without direct

investment. Despite the potential gains achieved from the cloud computing, the

organizations are slow in accepting it due to security issues and challenges

associated with it. Security is one of the major concerns that hinder the growth

of cloud. Access control technique may find its usage to provide a kind of

security either to deny fully or to allow partial accessing of the digital content.

Research in access control is now in its very early stage. Scrambling,

cryptography and visual cryptography are the few widely used methods adopted

either to deny or partial accessing of the media. Digital data hiding, although

originally developed for copyright protection, ownership verification and

authentication are now being used for access control due to commercial or

security reasons. In literature, active data hiding (popularly known as

watermarking) is commonly used for former class of applications while the latter

purpose is served by passive data hiding methods. Passive data hiding is a

technique used for media identification where it is expected that signal distortions

caused due to data hiding can be reverted by the authorized user to enjoy the full

quality. Manipulation in the image for controlling its access to the different

categories of users is generally guided by the content of the original image.

Access control may find an important application in 5th generation mobile

communication system where billing is expected to be performed based on the

fulfillment of degree of quality of services (QoS).

The majority of the conventional discrete wavelet transform (DWT) and discrete

cosine transform (DCT) based access control schemes reported in the literature

suffer form few shortcomings: (1) protection of region-of-interest (ROI) is not

Page 64: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

60

taken into consideration during access control. It is to be noted that ROI of an

image remains untouched from modification during many applications like

coding and compression in order to preserve its essential value or importance.

However, with reverse argument this image feature may be modified if the

process is reversible leading to its application in access control. (2) The other

shortcoming is high computation complexity that makes the algorithms

unsuitable for faster implementation. It is reported in the literature that compared

to DCT (discrete cosine transforms), conventional DWT (discrete wavelet

transforms) has less computational cost. But in the case of an image having large

size, it is still a problem when DWT applied to a whole image. The issue becomes

important as many algorithms in recent times demanded real time implementation

for which hardware realization becomes a viable alternative. Lifting scheme is an

effective method to improve the computation speed of conventional DWT as well

for digital design. Integer wavelets transform (lifting) allows to construct lossless

wavelet transform, which is important for quality access control scheme. On the

other hand, though 80 % of image and video data are still available in DCT

compressed form but future generation relies on DWT based coding technique.

So, development of cost-effective access control for DWT coded image and video

become an important research issue.

The present chapter attempts to develop two quality access control scheme using

ROI coding of an image by applying lifting based discrete wavelet transformation

(DWT). Lifting technique is used to achieve lower computational complexity. In

the first algorithm, quality access control for region of interest (ROI) is presented

using K-means clustering, Lifting and data hiding. The scheme uses two types of

dithers for efficient data embedding. The 1st type of dither is used to randomize

quantization error, thereby preventing large-scale patterns that are more

objectionable than uncorrelated noise. The 2nd dither is used for detecting

reliable watermark. The decoded watermark can also be removed completely by

Page 65: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

61

the reversible process that leads to greater improvement in quality. In the second

algorithm, an access control technique is described with region of interest (ROI)

coding functionality in compressed domain. In this algorithm, a data modulation-

based scheme is used for quality access control of ROI at various qualities of gray

scale image. The detailed DWT coefficients that lie within the area of ROI in an

image are modulated by a key supplied by the user/owner. Those operations

collectively are called here as passive data hiding in the DWT coefficients and

the necessary information are encrypted in the form of a secret key which is used

at the time of decoding. The experimental results show that the work provides a

reference solution to the critical problem of cloud security. The related works are

outlined in the next section.

2. Related Work:

This section briefly reviews few access control methods of digital images and

video signals reported in the literature. Imaizumi et al. [1] offered a new private-

key encryption for JPEG 2000 code streams for flexible access control of layers,

resolution levels and color components. Authors pointed out that conventional

access control schemes generally used several keys to control image quality.

However, their work used only one master key for both data management and

delivery. At the same time, different key generated by the master key can be

delivered to the user permitted to access at different quality. Fujiyoshi et al. [2]

proposed a similar type of hierarchical encryption scheme for composite

multimedia content that enabled versatile access control. The scheme had only

one master key and delivered one key to the user. The scheme can keep all the

objects in a particular medium in encrypted form and simultaneously decrypts

several objects in other media using unusable keys. Moreover, the scheme

supports multiple images with scalabilities by numbering keys. The above

cryptographic approaches that are used for access control are usually complex in

nature. Moreover, an error in a cipher text may lead to partially or totally failed

Page 66: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

62

in decryption. In broadcast environment, with large volume of data exchange,

error in transmission may occur from time to time and retransmission is not

allowed, leading to a serious problem [3]. To overcome the above problem, Liu

et al. [4] proposed a computationally efficient, secure, selective encryption

scheme for JPEG-2000 images without decreasing the compressibility of JPEG-

2000 coding. The scheme used a secret key and a mapping function to generate a

private initial table to encrypt the selected DWT code blocks in the entropy

coding stage of JPEG-2000 coding scheme.

Won et al. [5] proposed a conditional access control to protect scalable video

coding (SVC) bit stream by encryption in the network abstraction layer (NAL).

Besides this conditional access control mechanism, key management was also

proposed. Wen et al. [6] introduced a technique to perform selective encryption

and spatial/frequency shuffling of compressed MPEG-4 video content in wireless

channel. The simulation results indicate that by selective encryption and

shuffling, a good trade-off can be made among complexity, security and bit rate

overhead. Wang et al. [7] offered a transparent scrambling technique, where the

image degradation is varied according to parameter control. Authors claimed that

the technique had low computation complexity since the scrambling technique

was applied only on INTRA macro blocks of MPEG-2 stream that had little

influence on the output bit rate. Kingston et al. [8] proposed a crypto-compression

scheme based on cascading of Radon projection which enables fast encryption of

large amount of digital data. Standard encryption techniques, such as advanced

encryption standard (AES), data encryption standard (DES), or 3DES can be

applied to encrypt very small percentages of high-resolution images. As the

proposed scheme used standard encryption, and only transmits uncorrelated data

along with the encrypted part, this technique took benefit of the security related

to the chosen encryption standard.

Page 67: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

63

Zaidee et al. [9] proposed two new scrambling techniques, which can be applied

selectively i.e. apply either one or both. The techniques are called combined-

reverse-and-normal-direction (CRND) zigzag and quantized blocks permutation

(QBP) scrambling. Authors claimed that the scrambling techniques were easy to

implement and by combining both the techniques, the scrambled image had

higher resistance to spatial plain-text attack. Roche et al [10] presented a new

approach based on iterated function system coding (IFSC) that provides both

compression and hierarchical access control for images at various resolution

levels. Since the protection mechanism was integrated with IFSC, specific

properties of images were taken into account in the design of the access control

mechanism as opposed to a general encryption algorithm. Thus, instead of the

whole encoded image, only key parameters of the IFS code need to be encrypted

that ultimately reduces the computation load. Kankahalli et al. [11] proposed an

access control scheme of video using joint lightweight encryption and

compression. The goal was achieved by selective bit scrambling, block shuffling

and block rotation of the transformed coefficients and motion vectors. Bertino et

al. [12] proposed a novel approach to support multilevel access control in video

databases that combined video database indexing mechanism with a hierarchical

organization of visual concepts (i.e. video database indexing units), so that

different classes of users could access different video elements or even the same

video element with different quality levels according to their permissions.

Next three sections will discuss about basic principles and key features of lifting

based DWT, K-mean image clustering and QIM data hiding. Those tools and

techniques are used in the proposed accesses control scheme.

3. Basic Principles And Key Features Of Lifting Based DWT:

The lifting scheme is a technique for both designing fast wavelets and performing

the discrete wavelet transform. The technique was introduced by Wim Sweldens.

Page 68: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

64

The discrete wavelet transform applies several filters separately to the same

signal. In contrast to that, for the lifting scheme the signal is divided like a zipper.

Then a series of convolution-accumulate operations across the divided signals is

applied. Generally speaking, lifting scheme includes three steps that are splitting,

prediction and update. The basic idea of lifting is described here briefly [13]:

Split: The original signal is divided into two disjoint subsets. Although any

disjoint split is possible, the scheme splits the original data set x[n] into xe[n]=

x[2n], the even indexed points and xo[n]= x[2n+1], the odd indexed points.

Predict: The wavelet coefficients d[n] are generated as an error in predicting

xo[n] from xe[n] using prediction operator P.

d[n] = xo[n]-P(xe[n]) (1)

Update: xe[n] and d[n] are combined to obtain scaling coefficients c[n] that

represent a coarse approximation to the original signal x[n]. This is accomplished

by applying an update operator U to the wavelet coefficients and adding the result

to xe[n]:

c[n]=xe[n]+ U(d[n]) (2)

These three steps form a lifting stage. Iteration of the lifting stage on the output

c[n] creates the complete set of DWT scaling and wavelet coefficients cj[n] and

dj[n]. At each scale, the scheme weights the cj[n] and dj[n] with ke and ko,

respectively as shown in Fig. 1. This normalizes the energy of the underlying

scaling and wavelet functions.

Page 69: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

65

Fig. 1: Lifting Steps.

The lifting steps are easily inverted even if P and U are nonlinear, space-varying,

or noninvertible. Rearranging Eq. (1) and (2) we have

xe[n]=c[n]-U(d[n]), xo[n]=d[n]+ P(xe[n]) (3)

The original signal will be perfectly reconstructed as long as the same P and U

are chosen for the forward and inverse transforms. The inverse lifting stage is

shown in Fig. 2.

Fig. 2: Typical Inverse Lifting Steps.

Lifting scheme has several advantages over classical wavelet based transform and

are described below [14].

• Easy to understand and implement.

• Faster (×2, but still O (n), where n is the length of signal).

• Inverse transform is easier to find.

• Inverse transform has exactly the same complexity as the forward transform.

• Transforms signals with an arbitrary length (need not be 2n, where n is length

of signal)

• Requires less amount of memory.

• All wavelet filters can be implemented using the lifting scheme.

• Simple extensions to an integer transform possible.

Page 70: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

66

4. Basic Principles And Key Features Of K-Mean Image Clustering:

The basis objective of the clustering technique is to divide the data points of the

feature space into a number of groups so that a predefined set of criteria are

satisfied. Given the number of classes, K-means algorithm finds the clusters

through an iterative procedure that minimize intra-class distances. Suppose

number of classes which the given data belong to is K. then the algorithm may be

described as follows [15]:

Step 1: Choose first K different feature vectors as K different cluster centers c0

(0), c1 (0) , …, ck-1

(0), where K is the number of classes and the superscript denotes

the iteration number.

Step 2: At r-th iteration for each of the feature vectors, assign feature vector {fi}

to cluster Ck if

d(fi, ck (r-1))=min {d (fi, cj

(r-1)}

(4)

for j=0,1,...., k-1 where ‘d’ is a distance measure, or Euclidean distance.

Step 3: New cluster centers are computed by minimizing intra-class distances. If

ck (r) is the centre of Ck at r-th iteration, this is calculated by minimizing

( )

2r= -i∈i

f cf

Dk kCk

(5)

for k=0,1,2,…k-1. The cluster centre obtained by minimizing Dk in Eq. (5) is the

mean value of feature vectors belonging to Ck at r-th iteration, i.e.

( )( ) k

1

k

r

k ri ck

cn

= f (6)

Page 71: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

67

where ( )r

kn is the number of feature vectors assigned to Ck at r-th iteration.

Step 4: if ( ) ( )1r r

k k

−c c for all k, that means there are insignificant or no changes in

cluster centres, then the algorithm is terminated, else from Step 2. Cluster thus

obtained have minimum intra-class distance for a given set of feature vectors and

number of classes.

5. Basic Principles And Key Features Of QIM Data Hiding:

The process of mapping a large (possibly infinite) set of values to a much smaller

set is called quantization. Since quantization reduces the number of distinct

symbols that have to be coded, it is central to many lossy compression schemes.

Dither quantization (or dither modulation) is a special case of quantization index

modulation (QIM) for self noise suppression. Dither quantizers are quantizer

ensembles where the quantization cell and reconstruction points of every

quantizer in the ensemble are shifted versions of some base quantizer Q having

step size ∆. The shift is given by a dither vector d. The encoding and the decoding

processes (assuming binary coding) can be expressed as follows [16]:

Encoder:

𝑥′ = 𝑄∆(𝑥 + 𝑑(𝑚)) − 𝑑(𝑚) 𝑚 ∈ {0,1} (7)

where x, m and 𝑥′ are the host signal, embedded information and the composite

signal, respectively.

Decoder:

𝑑𝑖𝑠𝑡𝑚 = 𝑄∆(𝑦 + 𝑑(𝑚)) − 𝑑(𝑚) − 𝑦 𝑚 = 0,1 (8)

Page 72: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

68

and 𝑜𝑢𝑡𝑝𝑢𝑡 {𝑏𝑖𝑡 0 𝑖𝑓 |𝑑𝑖𝑠𝑡0| < |𝑑𝑖𝑠𝑡1|

𝑏𝑖𝑡 1 𝑜𝑡ℎ𝑒𝑟 𝑤𝑖𝑠𝑒 (9)

where y is the received distorted watermarked signal (𝑥′). The next two sections

will discuss the propose quality access control schemes.

6. Quality Access Control Of Uncompressed Gray Scale Image:

In this scheme, the objective of watermark encoding is the insertion of watermark

in the foreground part of the image, so that the watermarked image has little or

low commercial value. On the other hand, the objective of the decoding scheme

is the elimination of watermark from the watermarked image by authorized user

to get better quality of image [17].

6.1 Watermark Encoding:

The block diagram representation of the proposed encoding scheme is shown in

Fig. 3. The encoding process is performed in different steps as follows:

Fig. 3: Block Diagram Of Watermark Process: Encoder.

Step 1: K-mean Image Segmentation: K-mean clustering algorithm is applied

on the host image to get a binary mask (M) that represents the foreground of the

image. Fig. 4 (a) and (b) show one such test image and the generated mask using

the K-mean clustering algorithms, respectively.

Page 73: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

69

Fig. 4: Test Image (A); Generated Binary Mask (B).

Step 2: Image Transformation: n-level lifting wavelet transform (LWT) is

performed on the original image and the binary mask generated in Step 1.

Step 3: Generation of Watermark: Depending on the number of coefficients

found in the LL (low-low) subband that are within the foreground area, a binary

sequence of random bits is generated using a secret key K. Those random bits

are worked as a watermark and are inserted into different subbands using

following steps.

Step 4: Coefficients Selection Criteria for One Bit of Watermark

Embedding: One bit of watermark (W ) is inserted into different energy level so

that it can be resists against low and high pass filtering. Moreover, in case of

scalable decoding if only high-energy subbands are sent to the decoder,

watermark can be detected efficiently from those subbands without waiting for

the others. The scheme selects the entire high-high(HH) subband, as this

component contains both of the characteristics of horizontal and vertical

component. Fig. 5 shows the group of selected coefficients (G) for one bit of

watermark insertion when the image is decomposed using 4-level LWT. In the

case of 4-level decomposition of an image, total 88 coefficients (G) (four

coefficients from LL4, HL4, LH4, HH4 each, four coefficients from HH3, 16

coefficients from HH2 and 64 coefficients from HH1) are selected for one bit of

watermark insertion.

Page 74: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

70

Fig. 5: Selected Coefficients For One Bit Of Watermark Embedding.

Step 5: Selection of Step Size (∆b): The step size (∆b) depends on the band to

which the watermark is embedded. The step size ( Δb) for subband ‘b’ is calculated

using Eq. 10, which is the quantization step size used for standard JPEG 2000

[18].

μR -ε bb bΔ = 2 1+b 11

2

(10)

where, Rb is the nominal dynamic range of subband b. The symbols εb and µb are

the number of bits allotted to the exponent and mantissa of the subband’s

coefficients.

Step 6: Generation of Binary Dither for Each Subband: In this scheme, two

types of dithers are used for efficient data embedding. The first type of dither is

used to randomize quantization error, thereby preventing large-scale patterns

such as contouring that are more objectionable than uncorrelated noise. The

dither is generated pseudo ramomly as follows.

( )( ) ( )... ( ) 0.5* /1 2

d rand L rand L rand L k km k= + + − (11)

Page 75: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

71

The symbol ‘ L ’ is the number of coefficients that are considered for one bit data

embedding i.e. 88. It is seen from experimentation that the value of k=4 is enough

for generating acceptable dm that can randomize quantization error. Whereas, the

second category of dither is used for watermark bit embedding to achieve better

quality access control of foreground area of an image and is generated as follows.

Let the number of LWT coefficient(s) for a particular category be denoted by L.

For coefficient(s) in category ‘ b ’, two dither sequences, with length L, are

generated pseudo randomly using a key as follows:

( ), (0) ( ) / 2b q b bd key= − 0 1q L − (12)

, ,

,

, ,

(0) / 2 (0) 0(1)

(0) / 2 (0) 0

b q b b q

b q

b q b b q

d if dd

d if d

+ = −

(13)

where, ( )key is a random number generator and is the round function. The

sequences , (0)b qd and

, (1)b qd are used, respectively, for embedding the bit 0 and bit

1.

Step 7: Watermark Insertion: The bits of the permuted watermark W are now

embedded into the LWT coefficients of different subbands. The q-th watermarked

LWT coefficient qS corresponding to a category ‘b’ obtained as follows:

,

,

, (0) ( , ) 0

, (1) ( , ) 1

q m b b q

q

q m b b q

Q X d d if W i jS

Q X d d if W i j

+ − ==

+ + =

(14)

where, qX is the original q-th LWT coefficient, Q is a uniform quantizer (and

dequantizer) with step b , for category ‘b’. After watermark embedding, inverse

LWT (iLWT) is applied and the watermarked image is formed.

Page 76: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

72

6.2 Watermark Decoding:

The proposed watermarking method is a blind scheme in the sense that the

decoding process does not require the original/host image, but only required the

foreground mask (M). The block diagram for watermark decoding scheme is

shown in Fig. 6. The steps for watermark decoding scheme are described as

follows:

Fig. 6: Block Diagram Of Watermark Process: Decoder.

Step 1: Steps 2, 3, 4, 5 and 6 of watermark encoding, are performed on the

watermarked or possibly distorted watermarked image. The same step size (Δ) is

selected for respective category of block that was used at the time of encoding.

Step 2: Watermark Bit Extraction: The detection method uses the principal of

minimum distance decoding to determine which quantizer has been used at the

encoder side. A watermark bit (W (i, j) is decoded by examining the group of

coefficients (G) of different subbands (Fig. 5) that are lies in the foreground area

of the image using the following rule.

( )1

0

( (0), ) (0)L

q bq b bq q

q

Q Y d d Y−

=

= + − − (15a)

( )1

0

( (1), ) (1)L

q bq b bq q

q

B Q Y d d Y−

=

= − + − (15b)

Page 77: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

73

where, qY is the q-th LWT coefficient (possibly distorted) of the received signal

for category ‘b’. The watermark bit ( , )W i j corresponding to a group of selected

coefficients (G) is now decoded using the following rule.

0 ( , )

1

if A BW i j

otherwise

=

(16)

Step 3: Removal of Watermark for Access Control: The embedded watermark

is suppressed to get better quality of image using following rule.

,

,

(0) ( , ) 0

(1) ( , ) 1

q b q

q

q b q

Y d if W i jY

Y d if W i j

+ = =

− =

(17)

where, qY is the host signal after watermark elimination. Then inverse LWT

(iLWT) is applied to get relatively high quality of the image.

Step 4: Decision of Watermark Existence: The scheme calculate the

normalized cross correlation (NCC) between the original watermark (W) and the

decoded watermark (W ) in order to make a decision for a given watermark to

exist or not. The normalized cross correlation is defined as:

( )

=

i jji

i jjiji

W

WW

NCC2

ˆ

(18)

where, ,i jW and

i jW are the original and the decoded watermark bits, respectively

at ( ,i j )th position.

7. Quality Access Control Of Compressed Gray Scale Image:

The proposed access control scheme consists of two modules, namely, image

encoding and image decoding [19]. The encoding module basically performs

compression, modulation and symbol encoding while the decoding module does

Page 78: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

74

the reverse operations i.e. symbol decoding, demodulation and decompression.

The detailed block diagram representation of the image encoding, and image

decoding are shown in Fig. 7 and Fig. 8, respectively.

Fig. 7: Block Diagram Of Quality Access Control: Encoding Process.

Fig. 8: Block Diagram Of Quality Access Control: Decoding Process.

7.1 Image Encoding Process:

The image encoding process consists of the following steps:

Step 1: Image Pre-processing: The pixel values of the original image are level

shifted by subtracting 2m-1, where ‘m’ is the number of bits required to represent

the gray level of the image.

Step 2: Image Transformation: n-level LWT is performed on the original image

and on the binary mask supplied by the owner/user.

Step 3: ROI Coding: Depending on the mask supplied by the user, ROI is

calculated using generic ROI mask generation method, which is used in

JPEG2000.

Page 79: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

75

Step 4: Quantization of Wavelet Coefficients: Each of the transform

coefficients ab (u, v) of subband ‘b’, which lies outside of the ROI, is quantized

to the value qb (u, v) using the following rule [20].

𝑞𝑏(𝑢, 𝑣) = 𝑠𝑖𝑔𝑛(𝑎𝑏(𝑢, 𝑣) ⌊|𝑎𝑏 (𝑢,𝑣)|

∆𝑏⌋ (19)

Step 5: Owner/User Define Key and its Significance: Owner/user of the image

has to give a master key (K) of length ‘L’ bit to the system, which implies the

number of level of wavelet subbands coefficients to be considered and the type

of modulation to be performed on all detail subbands coefficients which are

within the ROI. Fig. 9 shows the key where ‘k’ number of MSB (i.e. bit 2 L-1 to

2L- k) represent the number of levels of the detail subbands to be modulated. The

rest of the bits in the key are used to denote the type of modulation to be

performed on the coefficients, which lie in the ROI.

Fig. 9: L Bit Binary Key Used For Modulation.

Step 6: ROI Coefficients Modulation: Depending on the key (‘K’) supplied by

the owner, the respective level of modulation is determined. The coefficients that

lie in the area of ROI are modulated pseudo randomly according to the locally

generated key based on ‘K ’. The modulation is described by the following rule:

Xe= (-1)*X (20)

where, X and Xe are the quantized LWT coefficients, before and after modulation.

Page 80: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

76

Step 7: Symbol Encoding: For efficient storage and transmission, all resulting

coefficients (both within ROI and non-ROI) are Arithmetic and Huffman coded

and the secret key ‘K’ is padded at the end of the bit sequence.

7.2 Image Decoding Process:

The decoding process is just reverse to that of the encoding process where the

input is the modulated compressed bit sequence. The steps for decoding process

are described below.

Step 1: Key Extraction and Symbol Decoding: Key (K) is extracted from the

end of the bit sequence and then both Huffman and Arithmetic decoding is done

on the rest of the bits, to get the modulated quantized LWT coefficient.

Step 2: Separation of Coefficients into ROI and Non-ROI: Using the

knowledge of the mask, LWT coefficients are separated into two group i.e. ROI

and non-ROI coefficients.

Step 3: ROI Coefficients Demodulation: Depending on the key extracted, the

number of level to be demodulated is determined. The coefficients, which are

within the ROI, are demodulated pseudo randomly according to locally generated

key based on ‘K ’. The demodulation is described by the following rule.

Xe1= (-1)* Xe (21)

where, X e and X e1 are the quantized LWT coefficient before and after

demodulation.

Step 4: Inverse Transformation: The image is reconstructed by performing the

operations such as dequantization (only on the coefficients which are outside of

the ROI), inverse LWT and inverse level shifting on the resulted quantized

coefficients.

Page 81: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

77

8. Performance Evaluation:

The performance of the proposed algorithms are evaluated over a large number

of benchmark images [21][22] including eight popular test images: Cameraman,

Lifting body, Airplane, Terraux, Lena, Pepper, Baboon, and F161 as shown in

Fig. 10. All of the test images are of size (256×256), 8 bit/pixel gray scale image.

The present study uses Peak-Signal-to-Noise-Ratio (PSNR) [20] and Mean–

Structure-Similarity Index-Measure (MSSIM) [23] as a distortion measure for the

watermarked image under inspection with respect to the original image.

(a) (b) (c) (d)

(e) (f) (g) (h)

Fig. 10: Test images. (a) Cameraman, (b) Lifting body, (c) Airplane, (d)

Terraux, (e) Lena, (f) Pepper, (g) Baboon, (h) F161.

8.1 Performance Evaluation Of Uncompressed Gray Scale Image:

8.1.1 Visibility Measure:

Table 1 illustrates PSNR and MSSIM before and after decoding process for four

test images and Fig. 11 shows the generated mask using K-mean clustering

Page 82: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

78

technique for various test image. A normal user without the knowledge of the key

can view lower quality images with PSNR as shown in column 2 of Table 1.

However, a user with a valid key can decode a superior quality image with PSNR

shown in 5th column. Fig. 12 show the watermarked image after embedding

watermark and Fig. 14 are the same after removing of watermark from the

watermarked images. Fig. 13 shows the embedded regions for various test

images.

Table1: PSNR And MSSIM Before And After Decoding Process.

Before Decoding After Decoding

Name of Image PSNR (dB) MSSIM NCC PSNR (dB) MSSIM

Cameraman 27.53 0.85 1 41.31 0.98

Lifting body 31.68 0.93 1 43.07 0.99

Airplane 34.97 0.97 1 49.35 1.00

Terraux 28.57 0.93 1 39.02 1.00

.

(a) (b) (c) (d)

Fig.11: Generated foreground using K-mean clustering (a) Cameraman, (b)

Lifting body, (c) Airplane, (d) Terraux.

Page 83: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

79

(P: 27.53; M: 0.85) (P: 31.68; M: 0.93) (P: 34.97; M: 0.97) (P: 28.57; M: 0.93)

(a) (b) (c) (d)

Fig. 12: Watermarked images (a) Cameraman, (b) Lifting body, (c)

Airplane, (d) Terraux. (P, M) above each image represents the PSNR (in dB)

and MSSIM values of the image.

(a) (b) (c) (d)

Fig. 13: The embedded regions. (a) Cameraman, (b) Lifting body, (c)

Airplane, (d) Terraux.

(P: 41.31; M: 0.98) (P: 43.07; M: 0.99) (P: 49.35; M: 1.00) (P:39.02;M:1.00)

(a) (b) (c) (d)

Fig. 14: Decoded images after removing embedded watermark. (a)

Cameraman, (b) Lifting body, (c) Airplane, (d) Terraux. (P, M) above each

image represents the PSNR (in dB) and MSSIM values of the image.

Page 84: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

80

Table 2: Results Of Test Image ‘Lena’ With Different Attacks.

Strength

PSNR

Before

Deco.

MSSIM

Before

Deco.

PSNR

After

Deco.

MSSIM

After

Deco.

NCC

Median Filtering

(3×3) 26.32 0.80 24.45 0.73 0.90

Mean Filtering

(3×3) 24.84 0.79 23.32 0.71 0.65

High pass Filtering

1.8 19.62 0.78 20.00 0.82 1.00

Down & Up Sampling

0.90 28.22 0.85 26.37 0.80 1.00

0.75 27.27 0.87 25.33 0.77 1.00

Histogram Equalization

18.69 0.73 19.08 0.77 1.00

Dynamic Range Change

[50- 200] 19.41 0.79 19.11 0.77 1.00

Salt & Pepper Noise

0.001 27.58 0.84 32.26 0.92 1.00

0.005 25.36 0.76 27.54 0.84 1.00

0.009 23.72 0.70 25.02 0.76 1.00

Speckle Noise

0.001 27.73 0.74 32.66 0.82 1.00

0.005 25.52 0.56 27.78 0.64 1.00

0.009 24.09 0.49 25.62 0.56 1.00

Gaussian Noise

0.001 19.75 0.32 20.09 0.33 1.00

0.005 19.74 0.32 20.07 0.33 1.00

0.009 19.64 0.32 19.96 0.33 1.00

8.1.2 Robustness Test:

The robustness of the proposed access control scheme is tested, after applying

some typical signal processing attacks, such as filtering, sampling, histogram

equalization, various noise addition, dynamic range change, and lossy JPEG

Page 85: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

81

compression. The term robustness implies here the ability of quality access

control through self-noise suppression after various signal processing operations.

It is to be noted that these signal processing operations are quite common for

storage and transmission. Robustness against such operations is essential as it is

expected that an un-authorized user may distort the watermarked images so that

the user having valid commercial agreement may not avail better quality of the

images. The experimental results are shown in Table 2. It can be seen that our

algorithm can successfully resist attacks like median and mean filtering, high pass

filtering of mask size (3×3) each, sampling, histogram equalization and JPEG

compression with quality factor 50.

Fig. 15 and Fig. 16 show the improvement of quality in terms of PSNR and

MSSIM after lossy JPEG compression. It is seen from the Fig. 15 and Fig. 16 that

even the JPEG quality factor down to 50, the scheme still can extract the

watermark correctly and based on the extracted watermark the scheme suppress

watermark, that results in the improvement of the quality. Fig. 17 shows the NCC

values for JPEG compression with different quality factors. Fig. 17 suggests that

the scheme can detect the presence of watermark even the JPEG quality factor

down to 30.

Fig. 15: Improvement of quality in PSNR (dB) due to decoding for lossy

JPEG compression operation.

0 10 20 30 40 50 60 70 80 90 10025

26

27

28

29

30

31

32

33

34

35

Quality Factor

PS

NR

(dB

)

Before

After

Page 86: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

82

Fig. 16: Improvement of quality in MSSIM due to decoding for lossy JPEG

compression operation.

8.2 Performance Evaluation Of Compressed Gray Scale Image:

The present scheme decomposes the test images into 3-Level during our

experimentation (see Fig.18(c)). Fig. 18(e) shows the decoded ‘Lena’ image

(PSNR: 36.03, MSSIM: 0.93, bit rate 2.52 bits/pixel, compression ratio 3.17: 1),

without quality access control mechanism. Table 3 lists the bit rate, compression

ratio, and PSNR and MSSIM values for other test images.

Table 3: Results Of Images Without Quality Control Mechanism.

Name of

image

Bit rate (Bits /

pixel)

Compression

Ratio

PSNR

(dB)

MSSIM

Pepper 2.48 3.23: 1 35.28 0.90

Babbon 2.96 2.71: 1 28.07 0.87

F161 2.59 3.09: 1 35.59 0.94

0 10 20 30 40 50 60 70 80 90 1000.5

0.55

0.6

0.65

0.7

0.75

0.8

0.85

0.9

0.95

1

JPEG Quality Factor

MS

SIM

Before

After

Page 87: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

83

Fig. 17: Results Of Robustness For Lossy JPEG Compression Operation.

8.2.1 Test With Key Having Different Level Of Detail Subband Modulation:

In the present scheme, the first two MSB of the key (K) represents the number of

levels of detailed subbands used for modulation. Table 4 represents the respective

type of modulation corresponding to each combination.

Table 4: List Of Different Level Of Subband Modulated For Experiment.

First Two MSB Of The Key Type Of Modulation Of Coefficients In

ROI

00 No modulation

01 Only detail coefficient of Level-1 Case-1

10 Detail coefficient of Level-1 and 2 Case-2

11 Detail coefficient of Level-1, 2 and 3 Case-3

Figs. (18(f), 18(h), 18(j)) and (18(g), 18(i), 18(k)): show the ‘Lena’ image, if ROI

is decoded without and with the true key respectively for the different cases as

mentioned above. It is seen that in all cases decoded ROI of ‘Lena’ images with

0 10 20 30 40 50 60 70 80 90 1000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Quality Factor

NC

C

Page 88: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

84

the true key are of ultimate quality and images without the proper key produce a

lower level of quality. In other words, images of Figs. 18(f), 18(h), and 18(j) will

be available to all users but images of Figs. 18(g), 18(i), 18(k) will only be

available to the true users who have subscription agreement.

Table 5 lists the bit rate, compression ratio, PSNR and MSSIM values for various

test images under different cases. Results show that in all test cases, modulation

process do not increase any bit rate and is reverted completely so that full quality

restoration of ROI in the inspected images is achieved.

Fig 18(l) shows the ‘Lena’ image if it is decomposed by 4-Level lifting

transformation and all of the detail subband coefficients of ROI are modulated by

the key. Figs. 18(m)-18(p) show the decoded images, if the coefficients of ROI

for different level of detail subbands are demodulated by the true key.

Table 5: Results Of Images For Different Test Cases If Decoded Without

And With The True Key.

Cases Name of image Lena Pepper Baboon F161

Case-

1

Without key PSNR (dB) 33.94 33.12 26.21 32.87

MSSIM 0.90 0.86 0.80 0.92

Bit

rate(bit/pixel)

2.53 2.48 2.96 2.59

Compression

ratio

3.17: 1 3.23: 1 2.71: 1 3.08: 1

With key PSNR (dB) 36.03 35.28 28.07 35.58

MSSIM 0.93 0.90 0.87 0.94

Without

key

PSNR (dB) 30.59 30.62 24.87 28.75

MSSIM 0.85 0.82 0.73 0.88

Page 89: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

85

Cases Name of image Lena Pepper Baboon F161

Case-

2

Bit

rate(bit/pixel)

2.52 2.48 2.95 2.59

Compression

ratio

3.17: 1 3.23: 1 2.70: 1 3.09: 1

With key PSNR (dB) 36.03 35.28 28.07 35.58

MSSIM 0.93 0.90 0.874 0.94

Case-

3

Without key PSNR (dB) 26.62 27.23 23.89 24.94

MSSIM 0.79 0.78 0.69 0.82

Bit

rate(bit/pixel)

2.52 2.48 2.95 2.59

Compression

ratio

3.17: 1 3.23: 1 2.71: 1 3.09: 1

With key PSNR (dB) 36.03 35.28 28.07 35.58

MSSIM 0.93 0.90 0.87 0.94

8.2.2 Having No Knowledge Of Key: Author also studied the scheme under the

consideration that if a user has no knowledge (brute force attacker) of the key and

attempts to decode the entire detail subbands of the image with a random key.

Figs. 18(q) -18(t) show the respective images if the ROI of the picture is decoded

using a random key. It is seen that in all cases the quality of ROI of the decoded

picture is of poor quality than the picture if decoded by the true key. It means that

only authentic user can avail better quality of the original one.

8.2.3 Computational Complexity: Author also examines the time that is taken

in one whole procedure of encoding and decoding for quality access control of

image to depict the computational complexity. It is known that the computational

load of conventional DCT and DWT are of O(n.log n) and O(n), respectively

Page 90: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

86

having a signal of length ‘n’. Feig [21] also pointed out, that it only takes 54

multiplications to compute DCT for a block of size (8×8), unlike wavelet

calculation depends upon the length of the filter used, which is at least one

multiplication per coefficients. As all the previous access control schemes are

based on conventional DWT or DCT, which required high computational load.

Our scheme is based on lifting-base DWT method that is two times faster (though

complexity is O (n)) and requires less amount of memory. So, the scheme is

efficient for real-time implementation of quality access control scheme.

(a) (b) (c) (d) (e)

(f) (g) (h) (i) (j)

(k) (l) (m) (n) (o)

Page 91: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

87

(p) (q) (r) (s) (t)

Fig. 18: (a) Original image, (b) Binary mask, (c) 3-Scale LWT of original image

(a), (d) 3-Scale LWT of binary mask (b) , (e) Decoded image without quality

control scheme, (f) & (g): Quality accesses control for Case-1, (f) Decoded image

without key, (g) Decoded image with the true key, (h) & (i): Quality access

control for Case-2, (h) Decoded image without key, (i) Decoded image with the

true key, (j) & (k): Quality access control for Case-3, (j) Decoded image without

key, (k) Decoded image with the true key, (l)– (p): Results when original image

goes through 4-Scale LWT and all detail subbands are modulated,

(l) Decoded image without key (PSNR=23.86, MSSIM=0.74), (m) Output when

detail coefficients of Level-1 are decoded with true key (PSNR=24.02,

MSSIM=0.76), (n) Output when detail coefficients of Level-1 and 2 are decoded

with true key (PSNR=24.57,MSSIM=0.79) , (o) Output when detail coefficients

of Level-1, 2 and 3 are decoded with true key (PSNR=26.62, MSSIM= 0.85) , (p)

Output when detail coefficients of Level-1, 2, 3 and 4 are decoded with true key

(PSNR=34.10, MSSIM 0.91). (q)-(t): Results if “Lena” image is decoded by

different false (random) key (for Case-3), (q): decoded image with false key (1st

try) (PSNR-26.72 dB, MSSIM-0.79),(r): Decoded image with false key (2nd try)

(PSNR-26.71 dB, MSSIM-0.79), (s): Decoded image with false key (3rd try)

(PSNR-26.67 dB, MSSIM-0.79),(t): decoded image with false key (4th try)

(PSNR-26.74 dB,MSSIM-0.79).

Page 92: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

88

9. Conclusion And Scope Of Future Works:

The present chapter attempts to develop two quality access control scheme using

ROI coding of an image by applying lifting based discrete wavelet transformation

(DWT). In the 1st algorithm, a data hiding scheme is proposed for quality access

control of foreground of an image using K-mean clustering. The scheme uses

two categories of dither. The experimental results show that the uses of two

different dithers improve the performance of the proposed scheme. The

experimental results also show that the scheme is not only robust against various

image processing operations but also a secured scheme. Only the user with the

correct key can generate the true dither and can get better (40.73%) quality of the

decoded picture. The work can be extended to video signal where foreground is

very important due to large amount of redundant data.

In the 2nd algorithm, a passive data-hiding scheme in compressed domain is

proposed using lifting-base DWT. The method may be used as an access control

of ROI at various qualities of an image. Experimental results show that valid users

having full knowledge of the key can restore the ROI, where all other users can

access the ROI to a certain level. The scheme is simple, fast, cost effective and

easy to implement. All these characteristics make the scheme a possible solution

for digital right management. Future work will be concentrated on real time VLSI

implementation of the scheme for image and video signal.

References:

1. Imaizumi, S., Watanabe, O., Fujiyoshi, M., & Kiya, H. (2005). Generalized

hierarchical encryption of JPEG 2000 code streams for access control. In Proc.

of IEEE International Conference on Image Processing, Genoa (pp. 1094-7)

Italy.

Page 93: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

89

2. Fujiyoshi, M., Saitou, W., Watanabe, O., & Kiya, H. (2006). Hierarchical

encryption of multimedia contents for access control. In Proc. of IEEE

International Conference on Image Processing (pp. 1977 – 1980) Atlanta, GA,

USA.

3. Xu, X., Dexter, S., & Eskicioglu, A.M. (2004). A hybrid scheme for

encryption and watermarking. IS&T/SPIE Symposium Electronic Imaging

(pp.723–734), Bellingham WA.

4. Liu, J. L. (2006). Efficient selective encryption for JPEG 2000 images using

private initial table. Pattern Recognition, 39(8), 509-1517.

5. Won, Y.G., Bae, T. M. & Ro, Y.M. (2006). Scalable protection and access

control in full scalable video coding, LNCS, 4283, 407-421.

6. Wen, J.G., Severa, M., Zeng, W., Luttrell, M.H., & Jin, W. (2002). A format-

compliant configurable encryption framework for access control of video.

IEEE Transactions on Circuits and Systems for Video Technology, 12(6), 545

– 557.

7. Wang, C., Yu, H.B., & Zheng, M. A DCT-based MPEG-2 transparent

scrambling algorithm. IEEE Transaction on Consumer Electronics, 49(4),

1208-1213.

8. Kingston, A., Colosimo, S., Campisi, P., & Autrusseau, F. (2007). Lossless

image compression and selective encryption using a discreteradon transform.

In Proc. of IEEE International Conference on Image Processing (pp. 465-468)

San Antonio, TX, USA.

9. Zaidee, A.A., Fazdliana, S., & Adznan, B.J., (2006). Content access control

for JPEG images using CRND zigzag scanning and QBP. In Proc. of the Sixth

IEEE International Conference on Computer and Information Technology

(pp. 146 – 146), Seoul, Korea.

10. Roche, S., Dugelay J. L., & Molva, R. (1996). Multi-resolution access control

algorithm based on fractal coding. In Proc. of International Conference on

Image Processing (pp. 235 – 238). Lausanne, Switzerland.

Page 94: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

90

11. Kankahalli, M.S., & Guan, T. (2002). Compressed domain

scrambler/descrambler for digital video. IEEE Transactions on Consumer

Electronics, 48(2), 356-365.

12. Bertino, E., Fan, J., Ferrari, E., Hacid, M.S., Elmagarmid, A.K., & Zhu, X.

(2003). A hierarchical access control model for video database systems. ACM

Transactions on Information System, 21(2), 155 –191.

13. Claypoole, R. L., Baraniuk, R. G., & Nowak, R. D., (1998). Adaptive wavelet

transforms via lifting. In Proc. of the IEEE International Conference on

Acoustics, Speech and Signal Processing, (pp. 1513-1516) Seattle, WA.

14. Uytterhoeven, G., Roose, D., & Bultheel, A., (1997). Wavelet transforms

using lifting scheme. Technical Report ITA-Wavelets Report WP 1.1,

Katholieke Universiteit Leuven, Department of Computer Science, Belgium.

15. Chanda, B., & Majumdar, D. D. (2000). Digital image processing and

analysis. New Delhi, Prentice-Hall of India Private Limited.

16. Chen, B., & Wornell, G. W. (2001). Quantization index modulation: a class

of provably good methods for digital watermarking and information

embedding. IEEE Trans. of Information Theory, 47(4), 1423-1443.

17. Phadikar, A., & Maity, S.P. (2010) Quality access control of foregrounds of

an image using QIM data hiding. In Proc. of the Int. Conf. on Intelligent

Human Computer Interaction (pp. 303-309), Alahabad, India.

18. Christopoulos, C., Skodras, A., & Ebrahimi, T. (2000). The JPEG 2000 still

image coding system: an overview. IEEE Transactions on Consumer

Electronics, 46(4), 1103-1127.

19. Phadikar, A., Maity, S.P., & Kundu, M.K. (2008). Efficient quality access

control scheme for compressed gray scale image using DWT via lifting, In

Proc. of National Conf. on Information Security Issue and Challenges (pp.

120-127), Orissa, India.

Page 95: INFORMATION TECHNOLOGY FOR

Quality Access Control To Provide Security To Data Owners In Cloud Computing

91

20. Gonzalez, R.C., Woods R. E., & Eddins, S. L., (2005). Digital Image

Processing Using Matlab, Digital Image Processing Using Matlab, USA,

Gatesmark Publishing.

21. Image database. http://www.cl.cam.ac.uk/fapp2/watermarking, 2010.

22. Image database.

http://www.petitcolas.net/fabien/watermarking/image_database/index.html,

2010.

23. Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image

quality assessment: from error measurement to structural similarity. IEEE

Transactions on Image Processing, 13(1), 2004.

24. Feig, E. (1990). A fast scaled DCT algorithm, In Proc. SPIE Image Processing

Algorithms and Techniques (pp. 2-13), Santa Clara, United States.

Page 96: INFORMATION TECHNOLOGY FOR

Information Technology For Management https://www.kdpublications.in

ISBN: 978-81-947839-1-6

92

5. Mis In Business

Prof. Dr. C. B. Senthil Kumar

Head, of the Department Commerce,

Dr. M. G. R. Educational and Research Institute University,

Chennai, Tamil Nadu.

Abstract:

The word MIS is the discipline focused on combining computer systems with an

organization's goals. Management Information Systems (MIS) .Due to its

information technology capabilities, the role of management information systems

is defined and analyzed. The process of information technology and its effect on

top management in an enterprise organization, with a focus on automated

decision making, is clarified.

There are discussed MIS limits and challenges and a series of six

recommendations to improve MIS productivity in IT processes. The creation and

management of IT resources aid managers and employees in carrying out any

tasks related to information processing. In particular, MIS and business processes

act as instruments for gathering business data and generating reports.

Keywords:

Information Systems, Transactional Processing Systems, TPS, Management

Information Systems, MIS,

Applications of MIS:

With computers as omnipresent as they are today, there is almost no large

organisation which does not rely extensively on their IT systems.

However, MIS has been invaluable in a variety of unique fields.

Page 97: INFORMATION TECHNOLOGY FOR

Mis In Business

93

1. Strategy Support :

Although computers do not build business strategies alone, they can enable

management to understand the impacts of their strategies. To convert data into

information which is useful for decision-making, MIS systems can be used. In

the preparation, monitoring and execution of the policy, computers will provide

financial statements and performance reports. MIS systems are useful for

gathering unmanageable quantities of data into consistent reports that would

otherwise be generally worthless for decision-makers. Through analysing these

studies, lawmakers would be able to detect patterns and trends not seen had the

raw data been manually consulted. These raw data can also be used by MIS

systems to conduct simulations – hypothetical scenarios which address a number

of 'what if' issues regarding strategy changes. MIS systems can, for example,

forecast the impact on sales of a commodity by adjusting prices. These DSS

(Decision Support Systems) allow decision making within an undertaking to be

more knowledgeable than without MIS systems would be possible.

2. Data Processing:

In addition to allowing large quantities of business information to be obtained,

the MIS systems often save precious time for employee use. If business

information had previously to be managed for filing and review, a data processor

can now be quickly and conveniently entered to a computer so that the

organization as a whole can make better decisions and reflexes.

Management by Objectives:

While MIS systems are very important in producing statistical reports and data

analysis, they can also be used as a tool for Objective Management (MBO). MBO

is a management mechanism in which managers and subordinates agree on a

range of goals that are supposed to be accomplished by the subordinate in a given

Page 98: INFORMATION TECHNOLOGY FOR

Mis In Business

94

timeframe. The goals are set using the SMART ratio, that is, the goals are precise,

observable, accepted, practical and timely.

These targets are structured to include a collection of main performance metrics

from which a organization can measure an employee or project 's performance.

A continuous monitoring of progress is necessary for the success of any MBO

goal. It can be extremely helpful to use a MIS system to monitor this performance.

Since all SMART goals are observable by definition, management reports to be

analyzed by decision-makers will be produced.

Benefits of MIS:

The MIS sector can provide companies in any industry with various benefits.

Expert organizations such as the MIS Institute and peer reviews such as MIS

Quarterly also identify and report on new ways in which MIS is used to achieve

corporate goals.

Core Competencies:

Each market-leading firm has at least one core ability – a feature that is better

than its competition. It is possible to drive the market forward by creating an

exceptional management information system in the business. MIS program

provide the requisite tools for a deeper understanding of the business and the

organization itself.

Enhance Supply Chain Management:

Enhanced documentation of company processes eventually results in more

advanced manufacturing. The ability to enhance the supply-chain management,

from everything from inventory procured, to manufacturing and delivery of the

finished product, comes from better knowledge on the production process.

Page 99: INFORMATION TECHNOLOGY FOR

Mis In Business

95

Quick Reflexes:

Increased capacity to respond to shifts of the market can be an indication of

improved supply chain management. Better MIS systems allow a company to

adapt more rapidly to the environment , allowing it to drive forward the

competition and to deliver a better service and a larger piece of pastry.

More information on MIS can be found in the MIS and the MIS manual of the

US Treasury and the Social Services Department of Connecticut for example an

organizational MIS division can be found.

MIS Design Process:

Implications Of The Project:

1. To The Organization:

This project assists management in constantly tracking the ongoing project

process. It also assists them in evaluating their efficiency, managing their

resources and making decisions.

The steadily changing challenges facing the management and organizations,

varied management styles and ever-present requirements provide a demanding

Page 100: INFORMATION TECHNOLOGY FOR

Mis In Business

96

environment for computer-based information systems. MIS uses computer

technology to assist and optimize knowledge and decision-making for its

managers. In the young computer industry, the style of management is evolving.

Managers use identical data at all stages. Operational managers need timely,

reliable, comprehensive, internal and historical data. High-level managers need

aggregated data, both externally and internally, both future-oriented and

historical. Without viable data management software an efficient MIS cannot be

developed. These methods have usually not been available before. Moreover,

until two decades before DBMS technology was used successfully by most

organizations. The efficient management of data resources of an enterprise is an

essential key to a successful MIS.

2. Role Of The Database In An Organization:

An organization is historically seen as three levels of pyramid functioning at the

bottom, mid- and strategic planning and management policy-making activities in

top management. Data concerning the organization, activities, strategy and the

environment is contained in the Corporate Databank.

3. State Of Database Management In Organizations:

There are evolving, diversified and sometimes unspecified needs of organizations

and managers, which must be addressed. In addition to these, there are external

pressure on federal tax authorities, federal security agencies and lawmakers to

implement private protection laws. Internal and external forces also enable

organizations to manage their data resources.

Data is and must be handled as an essential resource in an enterprise. An

important component of an information management system is the organizational

database. Data care has lagged behind the development of machinery and

Page 101: INFORMATION TECHNOLOGY FOR

Mis In Business

97

programming technology of the four components of a data processing system.

The approach of a database requires a company to focus on data as a valuable

resource. Data is distinct from the applications and programmes that use it.

Data and Information:

Data refers to any facts collected from observations , questionnaires or measuring

of persons, objects and locations. Data may be true contexts and figures. False

contexts and figures like trash are useless, which no one needs. If a company uses

false information, it can be wrong or can not resolve a problem. Sometimes we

call data raw because it is unused or unfit for users.

When information is collected, classified, organized, linked or interpreted in a

context to give meaning, it becomes information. There are activities that

transform data into information, and the process is known for these activities. In

short, information means processed data outputs. Users can therefore use it. For

instance, in the last year, a management require a chart of the total sales of each

product. Because summarized data are needed for planning sales (the diagram

information is easier and faster to understand than raw data of each product). For

example, each student is graded by teachers using the overall scores. The data

and information are shown in Figure 1.

Data and Information ( Laudon and Laudon, 2004: 99)

Input Processing, Classify,

Arrange And Calculate

Output

Data Process

Information

Feedback

Page 102: INFORMATION TECHNOLOGY FOR

Mis In Business

98

The process is the process of converting data into the information requested. In

technology, computers (both hardware and software) do these procedures

quickly. A suitable computer programme can be selected for use. Many computer

programmes like word processing, tablets and database management systems are

available. Data and information are organized and manipulated. The process tasks

include five activities known as 5Cs.

1. Capture. Originally, this processing gets information through IT instruments

such as a mouse, a keyboard and barcode reader. Simplify, at the original point

it's input data. The selection of IT input tools depends on the information

and/or commands collected and their shape.

2. Transport. By using IT tools like a screen, printer, speaker and monitor, this

treatment shows most helpful information. Simplify, output data. Output data.

The choice of IT output tools is based on user needs.

3. Create. This processing uses IT tools such as CPU and RAM to create new

information. This is the main process in 5Cs. This is done by software

execution from the central processing unit ( CPU) and all other hardware

devices interact with each other. The RAM or internal memory temporarily

stores working information, on-the-go software applications and operating

system.

4. Cradling. For a later time this processing is using IT tools as hard disc, CD-

ROM, and DVD to store information. The data that users can modify or

remove is stored indefinitely. The choice of IT storage tools depends on the

need for the user to update and to size details.

5. Communicating. This processing distributes information through IT

instruments such as a modem, satellite and a digital pager to other individuals

or to another location. It affects telecommunications infrastructure when we

talk about communications. A computer network is one of them. It connects

Page 103: INFORMATION TECHNOLOGY FOR

Mis In Business

99

at least two computers to share information, applications, devices and/or

processing power.

The information’s attributes comprise of accuracy and verification, completeness,

timeliness and relevance.

1. Accuracy and Verification. The knowledge gathered must be based on

evidence using techniques such as observations , questionnaires and

measurements. The expectation can offer wrong details. If the facts are

collected, the implementation or consumer requirements are properly

addressed. An executive, for example, needs decisions to be taken. If

information is inaccurate, harm may occur to an organization. Knowledge

must have references, so it can track users. Users would actually be secure in

using information if they know the information sources.

2. Completeness. The details must be obtained by users. In particular, managers

need completed decision-making information.

3. Timeliness. You always need to refresh, not obsolete the best details. For the

present case, therefore, users should apply it. In particular, businesses need

updated competition data. Competition data. Any business enterprise could be

adversely affected by the outdated data.

4. Relevance. The information collected must be connected to the behaviors of

users. Overloaded knowledge must not be accessed from users.

Trade contests have not been intensive in the past. He took a decision and then

an executive could wait for enough details. Knowledge is currently recognized as

an organization's valuable property. It can preserve competitiveness of the

company. When a business receives information correctly and efficiently, the

executive may determine or solve a problem quickly and precisely. The company

would then be able to compete intensively.

Page 104: INFORMATION TECHNOLOGY FOR

Mis In Business

100

Information Systems:

A system is a collection of elements interactive to serve a function by working as

a community. A system can be made up of individuals, machines, equipment ,

materials and processes for the same purpose. A supply chain system for example

has a function to supply end consumers with goods.

A supply chain system (Schroeder, 2000:181)

Device components consist of objects that are tangible, immaturable and

individual. Materials, vehicles , equipment, warehouses, inventory, suppliers,

computers, managers, processes, staff, views, relationship, and consumers may

be included in the distribution chain. They all work together to achieve the same

goal.

Now, we conclude that an information system involves all components that start

from the collection of data, insertion of data, storage dates, processing of data,

storage of information, distributing and displaying information according to

requirements of the users. Today, computer-based information systems. They

therefore contain applications and computer hardware. In consequence,

computers are information management instruments. Data and information can

be easily stored, processed and transmitted. Therefore, there are 6 components in

an information system. Hardware , software, telecom, people, procedures, data or

information are available.

Suppliers Suppliers Factories Warehouses Retailers Customers

Page 105: INFORMATION TECHNOLOGY FOR

Mis In Business

101

5. Management Information Systems (MIS) to an Organization:

Organizations are currently conscious of the value of knowledge as a property. It

can give organizations added value. It allows companies to continue to compete

intensively. Organizations also need management information. In particular,

knowledge should be a system for executing organizations' added value. By

systematically gathering, each company should handle information.

Subsequently, information will be submitted, retrieved and analyzed.

Organizations use information technology (IT) for information management

because of most information in organizations. The research used to handle

information is being used in information technology. Both software, including

computers, wires, magnetic taps, CDs, control systems, operating systems,

application software, signal etc. they are equally compatible. The systematization

of information technology in organizations , particularly computer base. Users

can then implement knowledge rapidly and easily. Data may be processed by

information technology to be needed for information and information to be sent /

received.

In order to handle functions such as interpersonal roles, informative roles and

decisional function, management information systems ( MIS) are using a

computer base for handling information in an organization. MIS compound of

informatics and administration theories. These theories construct structures and

the use of programmes. User and software (computer) integrated systems are

usually MIS with the objective of providing running, handling and decision-

making information for organizations. Computer hardware and software are used

for these systems. In addition, MIS is used to collect and cumulate data for the

collection and arrangement of information from various both internal and external

sources. Managers or consumers should then qualify for decision-making and

other management.

Page 106: INFORMATION TECHNOLOGY FOR

Mis In Business

102

References:

1. G. Satyanarayana Reddy, Rallabandi Srinivasu, Srikanth Reddy

Rikkula, VudaSreenivasa Rao, “Management Information System to help

managers for providing decision making in an organization,” in International

Journal of Reviews in Computing,2009

2. Gabriel, Justin Mgbechi Odinioha, Management Information Systems and

Corporate Decision-Making : A literature Review, The International Journal

of Management, Vol.2 Issue 3,July,2013

3. Srinivas Nowduri,” Management information systems and business

decision making review, analysis, and recommendations”, Journal of

Management and Marketing Research

4. Predrag Ranisavljević, Tanja Spasić, Ivana Mladenović-Ranisavljević,

“Management Information Systems and Decision-Making Process in

Enterprise” , Economics Management Information Technology, Vol.

1,No. 2, 2012.

5. Allen, B., Heurtebise, A., & Turnbull, J. (2010). Improving Information

Access. Business Management US. Retrieved October 2, 2010 from

http://www.busmanagement.com/article/Improving-information-access/

6. Jahangir, K. (2005). Improving organizational best practice with information

systems. Knowledge Management Review. Retrieved October 2, 2010 from

http://findarticles.com/p/articles/mi_qa5362/is_200501/ai_n21371132/

Page 107: INFORMATION TECHNOLOGY FOR