0% found this document useful (0 votes)
114 views2 pages

AI and Big Data in HR and Security

AI is used in human resources for candidate screening, engagement and development, employee training, and workforce planning by predicting future employee demand. Big data users include cloud, healthcare, and financial companies who process large volumes of customer data. Data science involves tools and algorithms for insights from raw data, while big data refers to large amounts of structured, unstructured, and semi-structured data, and data analytics provides operational insights and predicts opportunities. Anti-virus software identifies malware by scanning files against known virus signatures or by monitoring programs for suspicious behaviors like writing to other executables.

Uploaded by

vinay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views2 pages

AI and Big Data in HR and Security

AI is used in human resources for candidate screening, engagement and development, employee training, and workforce planning by predicting future employee demand. Big data users include cloud, healthcare, and financial companies who process large volumes of customer data. Data science involves tools and algorithms for insights from raw data, while big data refers to large amounts of structured, unstructured, and semi-structured data, and data analytics provides operational insights and predicts opportunities. Anti-virus software identifies malware by scanning files against known virus signatures or by monitoring programs for suspicious behaviors like writing to other executables.

Uploaded by

vinay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Module-3

● How is AI used in human resources?


• During the recruitment process, AI can be used to the benefit of not only the hiring
organization but its job applicants. Instead, AI technology allows new hires to utilize human
resources support at any time of day and in any location through the use of chatbots and
remote support applications. AI can be used for Candidate Screening, Engagement and
Development and Employees Training.
• Another interesting area where artificial intelligence is helping HR is workforce planning.
AI can be used to predict future demand for employees based on multiple data points such
as weather forecasts, day of week, holiday, closures etc
• Using AI frees up talent acquisition teams to spend more time on the work that only
humans can do: conducting phone screens and interviews, building relationships, putting
together offers and guiding both hiring managers and candidates through the process.

● Who are some of the BIG DATA users?


From cloud companies like Amazon to healthcare companies to financial firms, it seems as
if everyone is developing a strategy to use big data. For example, every mobile phone user
has a monthly bill which catalogs every call and every text; processing the sheer volume of
that data can be challenging. The size of Big Data can be relative to the size of the
enterprise. For some, it may be hundreds of gigabytes, for others, tens or hundreds of
terabytes to cause.

● How Data Science differs from Big Data and Data Analytics?
Data Science is a field which contains various tools and algorithms for gaining useful
insights from raw data. It involves various methods for data modelling and other data
related tasks such as data cleansing, preprocessing, analysis, etc. Big Data implies the
enormous amount of data which can be structured, unstructured and semi-structured
generated through various channels and organisations. The tasks of Data Analytics involve
providing operational insights into complex business situations. This also predicts the
upcoming opportunities which the organisation can exploit.

● What are Big Data Tools and Software?


a. Hadoop.
b. Quoble.
c. Cassandra.
d. MongoDB.
e. Apache Storm.
f. CouchDB.
g. Statwing

● How Big Data is changing the Way People Live Their Lives?
The changes in how big data is collected have occurred so rapidly that big data is more
prevalent in daily life than you might think. Companies and organizations are collecting
information about their targeted audiences. They know what you’re watching, what you’re
reading, and what you’re [Link] access to key, personalized data then affects your
daily experience in some of the most important and common areas of life. Consider these
ways big data is used in your everyday life:

a. Music, Shows, and Movies


b. Healthcare and medical services
c. Shopping and Marketing
d. Travel and Transportation
e. News and Information
f. Education and Employment

● How can I protect myself from identity theft?


Protecting yourself from identity theft is largely a matter of following best practices (and
requirements) for information security. If you learn to identify and avoid phishing scams
and install and run anti-virus software, you'll protect yourself from the most common means
by which hackers and scammers steal your personal information. Exercise caution when
providing personal information, including your name and date of birth, Social Security
number, and bank account or credit card numbers, to anybody. If you're providing this
information online, make sure that you're using a secure form and connection and that
you're on the legitimate website of the company or group you mean to contact.

● How does anti-virus software work?


Anti-virus software typically uses two different techniques to identify and eliminate
malware:
• Virus dictionary approach: The anti-virus software scans a file while referring to a
dictionary of known virus signatures that have been previously identified. If a code
segment in the filematches any virus signature in the virus dictionary, then the anti-virus
software performs one or more of the following operations: deletes the file; quarantines the
file so that it is unable to spread; or attempts to repair the file by removing the virus from
the file.
• Suspicious behaviour approach: The anti-virus software monitors the behaviour of all
programs, flagging suspicious behaviour, such as one executing program attempting to
write date to another executable program. The user is alerted to all suspicious behaviour,
and is queried regarding how the suspicious behaviour should be handled.

You might also like