Friday 16 September 2011



Week 7: Networks and Wireless

1) Explain the business benefits of using wireless technology.


Wireless technology is a beneficial aspect for businesses. It allows access to more information and files such as customer or employee information. It extends to places that cable and fiber are unable to and provides broadband access extension. It reduces costs and can be assembled and brought online in 2-3 hours.

2) Describe the business benefits associated with VOIP

VOIP stands for voice over internet protocol. It enables phone calls, faxes, voice mail, email and web conferences over digital networks.
It can be beneficial for businesses as it reduces communication and infrastructure costs. It facilitates tasks and provides services that may be  harder to implement using the Public switched telephone network (PSTN).

3) Compare LANs and WANs

Local area networks (LAN) connect computers that are located in a single geographic location on the premises of a company that operates LANs. However, wide are networks (WAN) connect computers from differing geographic sites.

4) Describe RFID and how it can be used to help make a supply chain more effective.

Radio frequency identification (RFID) tags use radio waves for the transmission of data. Shipments can be identified with RFID smart labels that enable unattended ID, verification and the sorting of data at different points in the supply chain across trading partners and distribution centers.
zebra.com can assist with any additional required information.

5) What is one new emerging technology that could change a specific industry?

An emerging technology that could change a specific industry includes ‘Pay Buy Mobile’’ impacting the mobile phone industry. It would merge financial and mobile industries together.
gsmworld.com  can assist with any additional required information.
Week 6: Enterprise Architectures 


1) What is information architecture and what is information infrastructure and how do they differ and how do they relate to each other?


Information architecture is a general plan of how IT is to be used within an organisation, that is, useful for planning. It identifies where and how important information is maintained and secured. It should also focus on backup and recovery, disaster recovery and information security.


IT infrastructure is the actual implementation stage that will provide for effective information systems, including hardware, software, services as well as the people involved. It includes equipment for all hardware, software and telecommunications activities that provide the underlying foundation to support the organisation's goals when combined. 


2) Describe how an organisation can implement a solid information architecture


An organisation can implement solid information architecture by having a strong information security plan, managing user access and having up-to-date antivirus software and patches.


3) List and describe the five requirement characteristics of infrastructure architecture.


The five required characteristics of infrastructure and architecture include:
1.Reliability:
- high accuracy
- low accuracy puts the organisation at risk


2. Scalability
- systems ability to meet growth requirements
capacity planning


3. Flexibility
- ability to meet changing business demands
- may involve multinational challenges


4. Availability
- high availability 99.99% uptime
- ensures business continuity


5. Performance 
- how quickly a system performs a certain task
- growing pressure on systems to be faster


4) Describe the business value in deploying a service oriented architecture.


Service Oriented Architecture (SOA) is a business-driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services. It ensures IT systems can adapt quickly, easily and economically to support rapidly changing business needs. A SOA allows enterprises to plug in new services or upgrade existing services in a granular fashion. As well it responds more quickly and is cost-effective to changes in market-conditions.
5) What is an event?


An event is an electronic message that indicates something has happened. It detects threats and opportunities and alerts those who can act on the information


6) What is a service?


A service contains a set of related commands that can be re-used. It is more like a software product as opposed to a coding product.


7) What emerging technologies can companies use to increase performance and utilise their infrastructure more effectively?


The emerging technologies that companies can use to increase performance and utilise their infrastructure more effectively include:
- Service
- Interoperability
- Loose coupling
- Virtualisation
Week 5: Ethics and Security

1) Explain the ethical issues surrounding information technology

One ethical issue surrounding IT is intellectual property, which is the collection of rights that protect creative and intelllectual effort. Copyright is another issue, surrounding the exclusive right to do, or omit to do, certain acts with intangible property such as a song, video game and some types of proprietary documents. Fair use of doctrine is also an ethical issue, dealing with how in certain situations, it is legal to use copyrighted material. Pirated software is the unauthorised use, duplication distribution, or sale of copyrighted software, hence why it is an ethical issue. Counterfeit software is also an example of ethical issues surrounding IT, being software that is manufactured to look like the real thing and sold as such.

2) Describe a situation involving technology that is ethical but illegal

A situation involving technology that is ethical but illegal includes making an extra copy of a software package that you purchased and keeping one on file for backup.

3) Describe and explain one of the computer use policies that a company might employ

An ethical computer use policy contains general principles to guide computer use behaviour. For example, the ethical computer use policy might explicitly state that users should refrain from playing computer games during working hours. this policy ensures the users know how to behave at work and the organisation has a published standard by which to deal with user infractions.

4) What are the 5 main technology security risks?

The five main technology security risks are:
- Human error
- Natural disasters
- Technical failures
- Deliberate acts
- Management failure

5) Outline one way to reduce each risk


One way to reduce human error risks and malicious acts can be reduced with the use of a strong password incorporating letters and numbers, and regularly changed to ensure a high level of security. This makes it more difficult for hackers and other unauthorised users to frequently access your information.


There is no way to prevent Natural disasters however a company can prepare themselves efficiently in case of this event and have all files backed up and alternative plans.


Technical failures are most of the time unforeseen and cannot be predicted therefore organisations must ensure they have all files backed up and frequently saved so that if systems were to crash, their data and unsaved files will not be lost.

6) What is a disaster recovery plan, what strategies might a firm employ?

A disaster recovery plan is the process of regaining access to a computer systems and its data after a disaster has occurred. It is encouraged that all firms have a comprehensive disaster recovery plan set. This plan lists things such as communication plans, alternative sites, business continuity and location of backup data. All firms must have business continuity plans which outlines in detail what happens in the case of a disaster, offsite data kept in date order, hot or warm sites, well documented procedures and regular recovery testing.
Week 4: eBusiness

1) Why has the web grown so dramatically?

The web has grown so dramatically because of the fact that the majority of society now owns a computer. Organizations now have the ability to transform themselves over a larger base and reach a much wider audience. Advancements in hardware and software in regards to computers allow speed and convenience and at a quarter of the cost.

2) What is web 2.0, how does it differ from 1.0?

Web 2.0 is a set of economic, social and technology trends that collectively form the basis for the next generation of the internet – a more mature, distinctive medium characterized by user participation, openness and network effects. This allows users to collaborate and build their own content. Examples of this include Wiki, Blogger, RSS and even podcasts. Web 1.0 however is the ‘read only web’. This means that the web user is only capable of finding information and reading it. This is very little user interaction or contribution.

3) How could a web 2.0 technology be used in a business?

Web 2.0 technology could be used to the advantage of any business. Blogs/social networking sites/RSS could be used to update stakeholders or even people who are generally interested in a business and about what is going on. They create a more intimate setting so that others can communicate.

4) What is eBusiness, how does it differ from e-Commerce?

eBusiness is also known as electronic business is a business that is done over the Internet. E-Commerce is the buying and selling of goods and services over the Internet. The term e-Commerce, refers only to online transactions. e-Business, derived from e-commerce, is the conducting of business on the Internet including buying, selling, serving customers and collaborating with business partners. For example, eBay, Amazon

5) What is pure and partial e-Commerce?

6) List and describe the various eBusiness models

The various eBusiness models include:
-       Business to business (B2B) applies to businesses buying from and selling to each other over the internet
-       Business to consumer (B2C) applies to any business that sells its products or services to consumers online
-       Consumer to Consumer (C2C) applies to any consumer that sells a product or service to a business online
-       Consumer to Business (C2B) applies to sites primarily offering goods and services to assist consumers when interacting with each other over the internet

7) List and describe the major B2B models

-       Sell-side B2B
A web based niche marketplace in which one company sells to many business buyers from e-catalogues or auctions, frequently over an extranet
-       Buyer-side market place
A corporate based acquisition site that uses reverse auctions, negotiations, group purchasing or any other e-procurement methods

8) Outline opportunities and 2 challenges faced by companies doing business online?

-       Opportunities
1.     Quick and simple. The message that needs to be sent goes through automatically and on a familiar platform
2.     Better communication. No external sources interrupt.

-       Challenges
1.     Security. Unsure of who may be on the connection or could see the information being relayed.
2.     Disruption in information. Information could be lost or unable to open on another computer. This could waste time and resources.


Week 3: Strategic Decision Making

1) Define TPS and DSS, provide some examples of these systems in business

Transaction Processing Systems (TPS) are the basic business systems that serves the operational level (analysts) in an organization. They were the first system to be automated because these repetitive, consistent and high volume tasks were ideal candidates for ‘computerization’. The most common example of a TPS is an operational accounting system such as payroll system or an order-entry system and Point of Sale systems (POS). In today’s society however, it has moved to online transaction processes such as PayPal.

Decision Support Systems (DSS) assist decision making to make more complex problems simpler. For example, estimating future cash flows from the use of long-lived assets or preparing an operating budget for the next 5 years.

2) Describe the three quantitative models typically used by decision support systems

The three quantitative models that are typically used by decision support systems include:
-       Sensitivity analysis
Which is the study of the impact that changes in one (or more) parts of the model
-       What-if analysis
Checks the impact of a change in an assumption on the proposed solution
-       Goal-seeking analysis
Finds the inputs necessary to achieve a goal such as a desired level of output

3) Describe a business process and their importance to an organization, outline an example of how they are used

A business process is a standardized set of activities that accomplish a specific task, such as processing a customer’s order. It organizes, coordinates and focuses to produce a valuable product or service for the business.
An organization can only be as effective as their business process, therefore, if they do not have a strict set of procedures and rules to follow, they will not be able to operate effectively as a business. An example of this process being used is when a person wants to travel overseas



4) Compare business process improvement and business process re-engineering

Business Process Improvement attempts to understand and measure the current process and make performance improvements accordingly. It requires taking a broad view of both information technology and business activity and the relationships between the two in order to understand and make these improvements. Business process re-engineering however is the analysis and redesign of workflow within and between enterprises. It is about improving the experience for the company and often attempts to set new standards for the industry.

5) Describe the importance of business process modeling (or mapping) and business process models

The importance of business process modeling is the activity of creating a detailed flowchart or process map of a work process, showing its inputs, tasks and activities in a structured sequence. A business process model is a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint. By making a detailed flowchart, a business can then show their process details in a gradual and controlled manner, encourage consciousness and accuracy in describing the process model, focus attention on the process model interfaces and provide a powerful process analysis and consistent design vocabulary. 
Week 2: Information Systems in Business

1) Explain information technology’s role in business.
Information Technology is found in all aspects of a business including:
-       Accounting; deals with the strategic financial issues associated with the value of the business
-       Finance; deals with strategic financial issues associated with increasing the value of business whilst observing social responsibilities
-       Human Resources (HR); includes policies, plans and procedures for effective management of employees
-       Sales; the function of selling a good or service and focuses on customer sales to increase company revenue
-       Marketing; the process associated with promoting the sale of goods or services. This department supports the sales department by creating promotions that help sell products
-       Operations Management; the management of systems or processes that converts or transforms resources into goods and services including human resources
-       Management information systems (MIS); business function and academic discipline covering the application of people, technologies and procedures to solve business problems

2) What are efficiency and effectiveness metrics? Provide some examples of each.

Efficiency IT metrics focus on the technology itself. While efficiency metrics are important to monitor, they do not always guarantee effectiveness.. Efficiency focuses on the extent to which an organization is using its resources in an optimal way,

for example, throughput, speed and availability.

Effectiveness metrics are determined according to an organization’s goals, strategies and objectives. It focuses on how well an organization is achieving its goals and objectives,

for example, customer satisfaction, conversion rates and sell-through increases.

3) What does Porter’s five forces model attempt to explain? How does the internet affect the model?


Understanding Porter’s five forces can help a company to identify any potential opportunities to create a competitive advantage while deterring potential rivals. The five forces that are enforced in order to determine the attractiveness of an industry include:
-       Buying power
-       Selling power
-       Threat of substitute products or services
-       Threat of new entrants
-       Rivalry among existing competitors
4) Describe the relationship between business processes and value chains
A business process in a standardized set of activities that accomplish a specific task such as processing a customer’s order. Value chains however views an organization as a series of processes, each of which adds value to the product or service for each customer.