Documente Academic
Documente Profesional
Documente Cultură
Software: Program or collection of programs that enable the hardware to process data.
3.
4.
Network: Connecting system (wireline or wireless) that permits different computers to
share resources.
5.
Procedures: Instructions for combining the above component in order to process
information and generate the desired output.
6.
People: Are those individuals who use the hardware and software, interface with it, or
utilizeis output.
WEEK 2
Question 1: Discuss the pressures that characterize the modern global business
environment
The pressures that characterize the morden global bussiness enviroment include market ,
technologies and societal/political/legal.
Market Pressures.
Technologies
Pressures.
The globalisation phenomenon has introduced a new paradigm into business locally and
globally. Corporations have more power to wield over politics, economics, society, culture,
people and the environment. Moreover, the advent of the internet era has increased the power
of communications and technologies throughout the world, even in the most remote areas.
Consequently, this new medium of transferring information has become another factor in
influencing people's opinions globally.
FM LECTURER: There is another factor that generated Market and Societal/Political/Legal
pressures respectively, what are they?
Ethics is refers to the principles of right and wrong that individuals use to make choices that
guide their behavior. Deciding what is right or wrong is not always easy and clear cut. There
is 4 categories of ethical issues related to information technology. These issue are:
3
1. Privacy issue involve collecting, storing and disseminating information about individuals.
2. Accuracy issue involve the authenticity, fidelity and accuracy of information that is
collected and processed.
3. Property issues involve the ownership and value of information
4. Accessibility issues revolve around who should have access to information and whether a
fee should be paid for this access.
WEEK 4
Q1: Describe the factors that contribute to the increasing vulnerability of information
resources.
There 5 key factor are contributing to the increasing vulnerability of information resources.
1.
2.
3.
4.
5.
There are many types of deliberate threats to information systems such as:
a.
Espionage or trespass.
b.
Information extortion.
c.
Sabotage or vandalism.
d.
e.
Identity theft.
f.
g.
Software attacks.
4
h.
Alien software.
i.
j.
Espionage or trespass
Espionage or trespass occurs when an unauthorized individual attempts to gain illegal access
to organizational information. when we discuss trespass, it is important that we distinguish
between competitive intelligence and industrial espionage. competitive intelligence consists
of legal information-gathering techniques, such as studying a company's website and press
releases, attending trade shows, and so on. in contrast, industrial espionage crosses the legal
boundary.
In addition to the many complex attacks, there are much simpler methods of obtaining
valuable information. Because sensitive data is often not sufficiently protected, it can often be
obtained visually, audibly or electronically.
Sabotage
Sabotage refers to the malicious manipulation or damaging of objects with the aim of
inflicting damage on the victim. Computer centers or communications links owned by an
official body or company make particularly attractive targets, as a major effect can be
achieved here with only slender means.
External aggressors and especially insiders can selectively manipulate the complex
infrastructure of a computer center through targeted attacks on important components, so as
to induce equipment failures. Particularly at risk here are building-related or communications
infrastructure that is inadequately protected and central supply points which are not
monitored by organizational or technical means and are easy for outsiders to access
unobserved.
Extortion
Extortion, out wresting, or exaction is a criminal offense, which occurs, when a
person unlawfully obtains either money, property or services from a person, entity, or
institution, through coercion. Refraining from doing harm is sometimes euphemistically
called protection. Extortion is commonly practiced by organized crime groups. The actual
obtainment of money or property is not required to commit the offense. Making
a threat of violence or a lawsuit which refers to a requirement of a payment of money or
property to halt future violence or lawsuit is sufficient to commit the offense. Exaction refers
not only to extortion or the unlawful demanding and obtaining of something through force,
additionally, exact in its formal definition means the infliction of something such as pain and
suffering or to make somebody endure something unpleasant.
Q3: Identify the single most important security control for organizations. (belum jwp)
b.
Procedural controls ( incident response processes, management oversight, security
awareness and training)
c.
Technical controls ( user authentication (login) and logical access controls, antivirus
software, firewalls)
d.
Legal and regulatory or compliance controls ( privacy laws, policies and clauses)
WEEK 5
Q1: Describe the major difficulties involved in managing data.
Describe the major difficulties involved in managing data.
1.
The amount of data increase exponentially with time. Much historical data-data
that include time as a variable must be kept for a long time, and new data are added
rapidly.For example, to support millions of customers, large retailers such as Walmart have to
manage petabytes of data.
2.
Data are also scattered throughout organization and are collected by many
individual using different methods and devices. The data are frequently stored in numerous
servers and locations and in different computing systems, database, formats, and human and
computer languages.
3.
documents.
b.
experience.
c.
External sources-(for example- commercial data bases, goverment reports,
and corporate websites.
4.
Data also are downdoad from the web, in the form of clickstream. Clickstream
data are produced by visitors and customers when they visit a website and click on
hyperlinks. The data provide a trail of the users activities in the websites, including user
behavior and browsing patters.
5.
Data degrade over time. For example- customers move to new addresses or change
their names, companies go out of business or are bought, new products are developed,
employees are hired or fired, companies expand into new countries, and son on.
6.
Data are also subject to data rot. A term that refers primarily to problems with the
media on which the data are stored. Over time, temperature, humidity, and exposure to light
can cause physical problems with storage media and thus make it difficult to access the data.
7.
The data security, quality, and integrity are critical. They are easily jeopardized.
in addition, legal requirement relating to data differ among countries as well as industries,
and they change frequently.
Q2: Explain the two types of knowledge and provide examples of each type.
Explain the two types of knowledge and provide examples of each type.
1.
Explicit knowledge. Explicit knowledge deals with more objective,rational and
technical knowledge. Explicit knowledge can be recorded digitally in documents, records,
patents and other intellectual property artifacts. Explicit knowledge is representational and
can live and be manipulated within the digital domain. Converting data-to-information, and
information-to-knowledge describes a value continuum of explicit knowledge. The tools and
business processes of KM are intended to enhance this continuum of value.
2.
Tacit knowledge. Tacit knowledge is the cumulative store of subjective or
experiential learning.Tacit knowledge is made up of best practices, experience, wisdom and
unrecordable intellectual property that lives within individuals and teams. Since tacit
knowledge exists within minds, it cannot be reduced to the digital domain as a material asset,
or be manipulated directly. However, it expresses in the social realm as the response ability of
individuals (productivity, innovation and initiative), and teamwork (communication,
coordination and collaboration).
WEEK 6
Q1. Describe the differences between Internet, Intranet, Extranet and the World Wide
Web...
DIFFERENCES BETWEEN INTRANET,INTERNET,EXTRANET AND WORLD WIDE
WEB :
7
1.
Internet.
a.
Is a global WAN that connects approximately 1 million organizational
computer networks.
b.
Connected to one another by data communication lines of different speeds.
c.
Enables people to access data in the organizations and to communicate and
exchange
information seamlessly around the world.
2.
Intranet.
a.
Network that uses internet protocol so that users can take advantage of
familiar applications and work habits.
b.
Support discovery, communication and collaboration inside an organization.
3.
Extranet.
a.
Connect parts of the intranet of different organizations.
b.
Enables business partners to communicate securely over the internet using
virtual private networks.
4.
Discovery.
a.
Involve browsing and information retrieval and provides users the ability to
information in database,dowload it or process it.
b.
Discovery tools include search engine,directories and portals.
2.
Networks.
a.
Provide fast,inexpensive communication via email,call centers and voice
communication.
b.
Communication tools provide business users with a seamless interface among
team member.
3.
Collaboration.
a.
Refer to mutual efforts by two or more entities (individual,groups or
companies) who work
in accomplish task.
b.
Enables business user to collabrate with collegues,business partner and
customer.
4.
E-learning.
a.
Refers to learning supported by the web.
b.
Provides tools for business users to enable their lifelong learning.
5.
Virtual universities.
8
a.
Are online universities in which students take classes from home or at an offsite location via the internet.
b.
Virtual universities make it possible for students to obtain degrees while
working full time,thus increasing their value to their firms
6.
Telecommuting.
a.
Process where knowledge workers are able to work anywhere and anytime.
b.
Provides flexibility for employees with many benefits and some drawbacks.
WEEK 7
Q 1: Describe three (3) major business models for business-to-bisoness (B2B) applications.
1.
Sell-side Marketplaces.
a.
Model in which organization attempt to sell their products or services to other
organizations electronically from their own private e-marketplace website and/or from
a third-party website.
b.
The key mechanisms in the sell-side model are electronic catalogs that can be
customized for each large buyer and forward auctions.
2.
Buy-side Marketplaces.
a.
Organizations attempt to buy needed products or services from other
organizations electronically.
b.
A major method of buying goods and services in the buy-side model is the
reverse auction.
3.
Electronic exchanges.
a.
Private exchanges have one buyer and many sellers. Independently owned by
a third party and connect many sellers and many sellers
b.
Some electronic exchanges deal in direct materials and others in indirect
materials. Direct materials are inputs to the manufacturing process, such as safety
glass used in automobile wind shields and windows. Indirect materials are items, such
as office suppliers, that are needed for maintenance, repairs and operations.
c.
There are three basic types of public exchanges vertical, horizontal and
functional. All three types offer diversified support services, ranging from payment to
logistics.
Q2: Discuss five (5) major legal and ethical issues of E-commerce.
1.
Fraud on the internet.E xample, stock promoters falsely spread positive rumors
about the prospect of the companies they touted in order to boost the stock price.Auction also
are especially conducive to fraud,by both sellers and buyers.Other types of fraud include
selling bogus investment and setting up phantom business opportunities.
2.
Domain Names. Domain names are assigned by central nonprofits organizations that
check for conflict and possible infringement of trademark. Domain name is considered to be
legal when the person or business who owns the name has operated a legitimate business
under that name for some period of time.
3.
Cybersquatting.
Refer to the practice of registering or using domain names for
the purpose of profitting from the goodwill or the trademark that belongs to someone else.
4.
Taxes and other Fees. Federal,state and local authorities are scrambling to create
some type of taxation policy for e business.This problem particularly complex for interstate
and international e commerce.
5.
Copyright. Copying material from website without permission is a violation of
copyright laws.Protecting intellectual property rights in e-commerce is extremely difficult
because it involves hundreds or million of people who have access to billion of web pages.
WEEK 8
Q1: Discuss the advantages and disadvantages of Wireless Media.
Advantages of wireless media:
1.
2.
3.
4.
few years, about 70 percent of cell phones will have Internet access (smart-phones). Thus, a
potential mass market is available for conducting discovery, communication, collaboration,
(e.g.,see Global Mobile, a special report, Computer World, May 14,2007), and mcommerce. Cell phones are spreading quickly even in developing countries.
2.
No Need for a PC. Todays PDAs and some cell phones have as much processing
power as personal computers did just a few years ago, and possess the range of software
available to PC users. This suggests that the smart phone-not the PC-may soon become the
foremost tool that connects people to the Internet.
3.
Improvement of Bandwidth. To properly conduct m-commerce, it is necessary to
have sufficient bandwidth for transmitting text; however, bandwidth is also required for
voice, video, and multimedia. The 3G (third-generation) and 3.5G technologies (described in
Chapter 4) provide the necessary band width.
4.
The Handset Culture. Another driver of m-commerce is the widespread use of cell
phones, which is a social phenomenon, especially among the 15-to-25-year-old age group.
These users will constitute a major force of online buyers once they begin to make and spend
larger amounts of money. The use of SMS has been spreading like wildfire in several
European and Asian countries.
5.
Declining Prices and Increased Functionalities. The price of wireless devices is
declining, and the per-minute pricing of mobile services declined by 50 percent in recent
years. At the same time, functionalities are increasing. Also, a flat fee (e.g., monthly)
encourages
more
use
of
mobile
devices.
WEEK 9
Q1: Describe Web 2.0 to someone who has not taken a course in information systems.
Web 2.0 (or Web 2) is the popular term for advanced Internet technology and
applications including blogs, wiki, RSS, nescasting, crowdsourcing and sosial boomarking.
The two major components of Web 2.0 are the technological advances enabled by Ajax and
other new applications such as RSS and Eclipse and the user empowerment that they support.
Web 2.0 application use some or all of the technologies you have just seen. A Web 2.0 site
may allow users to interact and collaborate with each other in a social media dialogue as
creators of user-generated content in a virtual community, in contrast to websites where
people are limited to the passive viewing of content.
a.
A Blog (short for weblog) is a personal online journal that is frequently
updated and intended for general public consumption. Blogs are defined by their
format: a series of entries posted to a single page in reverse-chronological order.Blogs
generally represent the personality of the author or reflect the purpose of the
website that hosts the blog. Topics sometimes include brief philosophical musings,
commentary on Internet and other social issues, and links to other sites the author
favors, especially those that support a point being made on a post. The author of a
blog is often referred to as a blogger. Many blogs syndicate their content to
subscribers using RSS, a popular content distribution tool.
11
b.
A Wiki (sometimes spelled "Wiki") is a server program that allows users to
collaborate in forming the content of a Web site. With a wiki, any user can edit the site
content, including other users' contributions, using a regular Web browser. Basically, a
wiki Web site operates on a principle of collaborative trust.
c.
Netcasting including podcasting and videocasting, is the distribution of digital
media, primarily audio files(podcasting) and video files (videocasting), via
syndication feeds for playback on digital media players and personal computers.
d.
Crowdsourcing involves taking a job traditionally performed by an employee
or a consultant and outsoucing it to on underfined group of people in the form of an
open call. The benefits of crowdsoucing is finding large numbers of workers to
complete projects quikly, attracting niche expertise, saving money, and better use of
in-house resouces.
Q2: Explain how an organization can best employ Web 2.0 technologies and applications to
benefit their business processes.
Web 2.0 technologies and applications to beneft business process by
a.
Weblog. Weblog is a personal website,open to the public,in which the site
creator expresses feelings or opinion with a series of chronological entries.Some
companies listen to the blogosphere for marketing purposes.
b.
Wiki.Wiki is a website on which anyone can post material and make changes
to already posted material.Wiki foster easy collaboration and they harness the
collective intelligence of internet users.
c.
Netcasting. Netcasting is the disribution of digital media, such as audio files
and video files.Educational instituitions use netcast for providing students with
access to lectures,lab demonstrations and sport events.
d.
Printing on demand . Printing on demand is customized printing
performed in small batches.For example,Create space provides end to end servcice
where authors submit their manuscript and the online publisher edits,format and sells
the work.
e.
Crowdsourcingb .Crowdsourcing is the process of taking job traditionally
performed by an employee or a consultant and outsourcing it to an undefined group
of people in the form of an open call.
WEEK 10
Q1: Explain how an organization can best employ Web 2.0 technologies and applications to
benefit their business processes.
Web 2.0 technologies and applications to beneft business process by
12
a.
Weblog. Weblog is a personal website,open to the public,in which the site creator
expresses feelings or opinion with a series of chronological entries.Some companies listen to
the blogosphere for marketing purposes.
b.
Wiki.Wiki is a website on which anyone can post material and make changes to
already posted material.Wiki foster easy collaboration and they harness the collective
intelligence of internet users.
c.
Netcasting. Netcasting is the disribution of digital media, such as audio files and
video files.Educational instituitions use netcast for providing students with access to
lectures,lab demonstrations and sport events.
d.
Printing on demand . Printing on demand is customized printing performed in
small batches.For example,Create space provides end to end servcice where authors submit
their manuscript and the online publisher edits,format and sells the work.
e.
Crowdsourcingb .Crowdsourcing is the process of taking job traditionally performed
by an employee or a consultant and outsourcing it to an undefined group of people in the
form of an open call.
Q2: Describe what a functional area information system is and list its major characteristics.
The functional area information systems (FAISs) provide information mainly to lower and
middle level managers in the functional areas. They use the information to help them plan,
organize, and control operations. The information is provided in a variety of reports. Also
provides supports for the various funtional areas in an organizational by increasing each area
internal efficiency and effectiveness.
The major characteristics;a.
They use this information to help them plan, organize, and control operations.
b.
The information is provided in a variety of reports (routine, ad hoc and exception) and
provide information to managers regardless of their functional areas.
c.
Routine reports are produced at scheduled intervals. Ad-hoc reports also can include
requests for drill-down reports, key-indicator reports and comparative reports. And exception
reports include information that falls outside certain threshold standards.
Q3: Define Enterprise Resource Planning Systems and describe its functionalities.
Enterprise Resource Planning(ERP) is a system thats adopts a business process view of the
over all organization to integrate the planning,management and use of all of an organization's
resources,employing a common software platform and database.
13
Their functions help integrate management, staff, and equipment, combining all aspects of
your business into one system in order to facilitate every element of the manufacturing
process.
Typical ERP system modules include features and functions for accounting, human resources
(HR), manufacturing management, customer relationship management (CRM), and other
business functions.
ERP systems with manufacturing management functionality also include features and
functions for inventory, purchasing, and quality and sales management. ERP software is often
configured with specialized features and functions for a particular industry or type of
manufacturing. For example you can compare ERP systems for discrete manufacturing,
process manufacturing, engineer-to-order (ETO) manufacturing, distribution, fashion and
apparel.
WEEK 11
Q1: Explain what customer relationship management is.
Customer relationship management is most commonly used to describe a business-customer
relationship, CRM systems are used in the same way to manage business contacts, clients,
contract wins and sales leads.
Customer relationship management solutions provide you with the customer business data to
help you provide services or products that your customers want, provide better customer
service, cross-sell and up sell more effectively, close deals, retain current customers and
understand who the customer is.
It entails all aspects of interaction that a company has with its customer, whether it is sales or
service-related. CRM is often thought of as a business strategy that enables businesses to
understand the customer, retain customers through better customer experience,attract new
customer,win new clients and contracts, increase profitably and decrease customer
management costs.
Q2: Discuss what supply chain is and identify its segments.
A supply chain is a system of organizations, people, activities, information, and resources
involved in moving a product or service from supplier to customer. Supply chain activities
transform natural resources, raw materials, and components into a finished product that is
delivered to the end customer. In sophisticated supply chain systems, used products may reenter the supply chain at any point where residual value is recyclable.
In addition, they must deal with demands from internal and external sources. Many of which
create distracting and sometimes conflicting noises--with regards to service and costs. The
noise can be situational or repetitive; it may be on topics that have nominal profit benefit. It
can even become a cacophony. But no matter the source or cause, the static distracts and
interferes with the supply chain organization and its performance with important issues and
requirements, both strategic and tactical. The scope, complexity, competition and noise are
ongoing. This continuous test of agility is compounded by limited resources.
14
Sectoring supply chains is a superior best practice. The benefits go beyond supply chain
performance and very positively impact the company in important ways. It has bothmaster
plan and operations importance and impact. Supply chain segmenting can be used by all
companies, regardless of size, industry, market or type.
Q3: Describe three (3) major types of extranets.
and other users can make decisions, solve problems, supervise activities, and track
progress. Because it generates reports on a regular basis, a management information system
sometimes is called a management reporting system (MRS).
manager or team leader, takes the units of work that need to be done and then allocate them to
the members of the team to complete. Simply, work is pushed onto the people who will be
doing it.
3.
In a pull system, the tasks that must be done are stored in a queue, often a priority
queue of sorts. An example might be Scrum's product and sprint backlogs, which contain user
stories that are to be done. A developer who is currently not working on anything will go to
the queue and take off the highest priority story that they are able to do and work on it. The
people who are doing the work pull the work out of a list and do it.
4.
The concept of push and pull aren't related to iterative/incremental versus sequential
development. A team using iterative/incremental/agile techniques could use a push system,
while a team using sequential development could use a pull system. However, typically, the
agile methods (XP, Scrum) favor self-organizing teams and therefore pull systems.
WEEK 13
Q1 Describe mashups and discuss their business value.
Mashup. Mashup is a lightweight web application created by transforming, merging, and
mixingcapabilities or information from existing data sources to deliver useful new
functionality or dashboard-like aggregations.
Business value. Mashups enable rapid application assembly and prototyping, with ever
increasing scalability, policy security, and access control, reducing cost and development time
to hours vs. months. Non-technical users can easily assemble and remix data mashups from
internal and external sources themselves, allowing IT to focus on strategic business
applications. Enterprise, departmental, and personal data can be transformed into fresh,
relevant, mashup feeds and services for new markets and new customers, improving return on
investment.
an unauthorized user might be able to intrude into networks. The intruder then can obtain a
free internet connection and possibly gain access to important data and other resources.
3.
Eavesdropping. Refers to efforts by unauthorized users to access data travelling over
wireless networks.
4.
RF jamming. A person or device ,whether intentionally or unintentionally ,interferes
with your wireless network transmissions.
WEEK 14
Q1 Describe four (4) types of wireless trasmission media.
1.
Infrared (IR).Is a wireless transmission media that sends signals using infrared light
waves. Infrared transmission requires a line of sight transmission, that is the sender and
receiver must be aligned so that nothing obstructs the path of infrared light wave.
2.
Communication Satelite.This is a space station that receive microwave signals from
an earth-based station, amplifies the signals, and broadcasts the signal back over a wide area
to any number of earth-based station. A transmission from the earth to a satellite is called an
uplink; a transmission from a satellite to an earth station is called a downlink.
Communication satellites are used in application such as air navigation, television and radio
broadcast , videoconferencing and paging.
3.
Microwaves.These are radio waves that provides a high-speed signal transmission;
from one microwave station to another; which are normally located on the top of buildings,
towers or mountain . Microwave signals must be transmitted in as straight line with o
obstructions between microwave antennas.
4.
Bluetooth. This is an open wireles protocol for exchanging data over short distances
(using short radio waves) from fixed and mobile devices. It can connect several devices,
overcoming problems of synchronization.
Q2 Describe four (4) types of electronic payments.
1.
Electronic Cash.-Electronic cash is a new concept in online payment system because
it combines computerized convenience with security and privacy that improve on paper cash.
Primary advantage is with purchase of items less than $10.
a.
b.
2.
Electronic Wallets. Stores credit card, electronic cash, owner identification and
address information and provides this information at e-commerce site. Makes shopping easier
and more efficient. Eliminates need to repeatedly enter identifying information into forms to
18
3.
Smart Cards.
Plastic card containing an embedded microchip.Store over 100
times more information than a magnetic-stripped plastic card.Contains user information such
as financial facts, account information, credit card numbers, health insurance, etc.Smart card
information is encrypted.Available for over 10 years.
4.
Credit Cards. Credit card provides a card holder credit to make purchase up to
amount fixed by a card issuer. B2C business, it continues to be the most used form of
payment system given its high convenience.Entities that involve in the credit card payment
system include Card holder, Merchant (seller), Card Issuer (Your bank), Acquirer (merchants
financial institution),Card Association (Visa, Master Card etc) and third party processor.
19