Professional Documents
Culture Documents
1179-1591970574952-Week 12 - HND BBE W12 Dynamic Macro Environment and Emerging Trends I
1179-1591970574952-Week 12 - HND BBE W12 Dynamic Macro Environment and Emerging Trends I
1
8.1 – Dynamic Macro Environment and
Emerging Trends I :
2
Digital Revolution
▪ The Digital Revolution is the shift from
mechanical and analogue electronic
technology to digital electronics which
began anywhere from the late 1950s to the
late 1970s.
2. Increased productivity
Collaborative robots will significantly increase the productivity of operators and improve
their safety and well-being.
3. A massive reorganization of the supply chain
Traditional production models sometimes lead to having to relocate certain factories in order
to make them profitable by producing a lot at low cost.
4. Mass customization
Henri Ford said, “You can choose any colour for the Model T Ford, as long as it’s black.”
The industry of the future is based on the opposite principle: we are entering the era of
mass customization, where production responds to demand, where virtual reality makes it
possible to push the limits of the imagination ever further.
5
Consumption :
7
Social Technology
Example :
▪ Social Networks
▪ Web Conferencing
8
Impact of social technologies
10
Viral Marketing
• Let your customers do your marketing
o Zynga (Farmville)
o Minecraft
o Will it blend?
o OK GO
• Social media networks allow companies to access
younger markets and particular demographic
groups.
• Companies can reach consumers who uses mobile
devices for product or company research.
Cyber Security
▪ This refers to the body of technologies, processes, and practices designed to protect
networks, devices, programs, and data from attack, damage, or unauthorized access.
12
High-Profile Cybercrime Cases
▪ eBay
Date: May 2014
Impact: 145 million users
▪ Dubsmash
Date: December 2018 ▪ LinkedIn
Impact: 162 million user accounts Date: 2012 (and 2016)
Impact: 165 million user accounts
▪ Ransomware –
✓ A type of malicious software. It is designed to extort money by blocking access to files or the
computer system until the ransom is paid
▪ Malware –
✓ A type of software designed to gain unauthorized access or to cause damage to a computer.
▪ Social engineering –
✓ Can be combined with any of the threats listed above to make you more likely to click on
links, download malware, or trust a malicious source.
15