Information Technology – Volume 4 – Issue 1


In this volume of Exponent group of Journals – Information Technology, we will continue our journey of exploring one of the mainstream Enterprise Resource Planning (ERP) software as well as the cyber security threats that organizations face in today’s digital world and their mitigation. As part of this volume, we will also explore one of the key initiatives launched recently by the Indian government. To start with, we will highlight the latest developments in the Information technology world through the “I.T. – News” section. The next article will explain the intricacies of one of the key modules of SAP ERP software that is Materials Management, also known as MM. The article highlights the key elements in the procurement life cycle and how the MM module helps in tracking the various stages of procurement process. Following this article, we will further explore the SAP R/3 ERP software by diving deeper into some of the advanced modules related to Document Management System, Supply Chain Management, Customer Relationship Management, Human Capital Management, Supplier Relationship Management, Industry Solutions,etc. After exploring the ERP components and their functionality and significance, we will move on to understand more on the cyber security threats that we face on a daily basis and how to protect our systems and information from such attacks. In the previous volumes, we have seen the basics of Distributed Denial-of-Service (DDoS) attacks, their types and how they are constructed. In this volume, we will explore “DDoS Protection Management”. This article will equip system administrators to arm themselves with enough instruments so as to mitigate the threat of DDoS hazards. In the next article, we will explore our new identities a.k.a. digital identities. For ages and decades, we have been associating our identities with the physical traits, beliefs, thoughts, talents, skills, qualifications, etc. However, the current information age has thrown in a new dimension for formulating one’s identity that is one’s digital presence. In this article, we will explore what information constitutes a person’s digital identity as well as how digital identities influence the digital transactions. We will also explore through this article how digital identity helps in authentication, how different organizations, be it government organizations or banks, use digital identities for tracking and trace ability as well as how messages are encrypted and decrypted to ensure integrity of the transaction is retained. The digital or information age has not only given each of us a new identity, but has also enabled corporations and agencies to leverage a whole new medium for advertisement and marketing. In the next article, we will explore how businesses are using digital marketing and advertisement to increase their market reach effectively. The article also highlights the differences between traditional and digital marketing as well as discusses the different modes of digital marketing such as web-based marketing, search engine marketing, social media marketing, etc.


Leave a Reply

Your email address will not be published. Required fields are marked *