INF10003 Summary Final Exam
INF10003 Summary Final Exam
Question Answer
IT infrastructure
Why is the difference ‘Information technology’ and ‘information system’ are two closely related terms but
between information they are different. Information technology (IT) refers to methods, inventions,
technology and standards and products. As the term implies, it refers to raw technology and it concerns
information systems only the hardware, software and data components of an information system. In
important to you? contrast, an information system is a system of hardware, software, data, procedures and
people that produce information.
What do business • Hardware consists of electronic components and related gadgetry that input,
professionals need to process, output and store data according to instructions encoded in computer
know about computer programs or software
hardware? • Basic components
• Input hardware
• CPU
• Main memory - RAM
• Special function cards
• Output hardware
• Storage hardware
• USB
• Computer data
• Binary digits: Computers represent data using binary digits called bits
• Sizing computer data
• How a computer works, in fewer 300 words
• Why should a manager care how about a computer work
• What is the difference between a client and a server
• Users employ client computers for word processing, spreadsheets,
database access, and so forth. Most client computers also have
software, in the form of client-server applications, that enables them to
connect to a network. It could be a private network at their company
or university, or it could be the internet, which is a public network
1
• Servers , as their name implies, provide some service, and each server
can be accessed by many clients simultaneously.
What do business Every computer has an operating system, which is a program that controls that
professionals need to computer’s resources. Some of the functions of an operating system are to read and
know about operating write data, allocate main memory, perform memory swapping, start and stop
systems software? programs, respond to error conditions, and facilitate backup and recovery. In addition,
the operating system creates and manages the user interface, including the display,
keyboard, mouse and other devices. Although the operating system makes the
computer usable, it does little application-specific work.
• What are the major operating systems?
• Non-mobile client operating systems
• Microsoft windows
• Mac OS
• Unix
• Linux
• Mobile client operating systems
• BlackBerry OS
• IOS
• Android
• Server operating systems
• Virtualisation
• Virtualisation is the process whereby multiple operating systems share
the same hardware, allowing one computer to host the appearance of
many computers. One operating system, called the host operating
system , runs one or more other operating systems as applications.
Those hosted operating systems are called virtual machines (vm) . Each
virtual machine has disk space and other resources allocated to it, but
the virtual machines are isolated from each other, so it will appear to
each that it has exclusive control over the server computer.
2
• Three types of virtualisation exist: PC virtualisation, server
virtualisation, desktop virtualisation.
• Owning versus Licensing
What do business Application software is software that runs on top of the operating system and performs
professionals need to a business function.
know about
application software? What categories of application programs exist?
• Horizontal-market application software provides capabilities common across
all organisations and industries. Word processors, graphics programs,
spreadsheets and presentation programs are all horizontal-market application
software.
• Vertical-market application software serves the needs of a specific industry.
Vertical applications usually can be altered or customised
• One-of-a-kind application software is developed for a specific, unique need.
Thin clients versus thick clients
• Applications that process code on both the client and the server are called
client-server applications . A thick-client application is an application program
that must be pre-installed on the client. A thin-client application is one that
runs within a browser, and does not need to be pre-installed. When the user of
a thin-client application starts that application, if any code is needed the
browser loads that code dynamically from the server.
• Thin applications run only within a browser on phones and tablets; thick
applications are apps that are usually downloaded and installed from a store
such as iTunes or Google Play.
• To summarise, the relationship of user application types is as follows: desktop
application, client-server application ( thick-client application, thin-client
application).
How do organisations acquire application software?
• buy computer software in the same three ways: off the shelf , off the shelf with
alterations or tailor-made. Tailor-made software is called custom-developed
software
Thin-client Versus Thick-client Mobile Custom Software
• In most cases, it is easier to build a thin-client custom application than a thick-
client one. The programming languages are simpler, and fewer skills are
required to develop them. However, until recently, the user experience of a
thin-client application was not as fully featured or as interesting as on a thick
client. Recently, new technology has made thin clients’ user experience
competitive with thick ones.
What is Firmware?
3
• Firmware is computer software that is installed into devices such as printers,
print servers and various types of communication devices.
Telecommunications
and Networks
4
• Packet switching is based on the concept of turn taking and enables millions of
users to send large and small chunks of data across the network concurrently.
Network standards and Protocols
• Protocols
• The OSI model
• Transmission Control Protocol/Internet Protocol (TCP/IP)
• Ethernet
• Network topologies
• Media access control
Network technologies
• Networking hardware
• Cable media
• Twisted-pair cable
• Coaxial cable
• Fiber-optic cable
• Wireless media
• Infrared Line of Sight
• High-frequency radio
• Microwave transmission
The internet
• How did the internet get started
• Connecting independent networks
• Who manages the internet
• How to connect the internet
• Dial-Up
• Integrated services digital network
• Digital subscriber line
• Cable modems
• Satellite connections
• Wireless broadband
• Mobile wireless access
• Business internet connectivity
• Leased lines
• The current state of internet usage
Sway + Modules
5
• The message: For two entities to communicate, there must be a message
exchanged between them. This can vary in form such as text, audio, video or
image and be varying lengths. In business data communications, messages
include files, requests for data/information, responses to requests, network
status information, network control message and correspondence.
• A sender: The transmitter of the message. A sender can be either a person or a
machine. Computers can use a system with enough intelligence to originate a
message or respond to a message without needing human intervention.
Sensors, scanners and other input devices may also be senders in today's
networks.
• A receiver: Can include terminals, network printers, display devices, people
and computer controllable devices such as drill presses, lighting systems and air
conditioners. Even though a message and a sender can exist without a receiver,
communication cannot take place unless there is a receiver. For example, a
network server may transmit a message that the network will shut down in 30
minutes but if all the nodes are turned off at that moment, no communication
has occurred.
• The medium: Refers to the actual carrier of data signals between senders and
receivers. Business data communication networks often use a variety of media
to transmit data, including wires, radio waves and light pulses.
• An understanding of message by receiver: Interpretation of the message which
can involve encoding and decoding techniques. But unlike human
communications, data communication systems can also include error detection
and recovery mechanisms. Which involve the transmission of both the data
and additional information that helps the receiver determine whether the
message has been received correctly or changed on route.
Key data communication concepts and terminologies
• Examine the following list of key data concepts and terminologies:
• Session: communication dialogue between network users or
applications.
• Network: interconnected group of computers and communication
devices.
• Node: a network-attached computer.
• Link: connects adjacent nodes.
• Path: end-to-end route within a network.
• Circuit: the conduit over which data travels.
Data communication frameworks
• There are two major data communication frameworks that have been
developed to help ensure that networks meet business and communication
requirements:
6
• Open Systems Interconnection (OSI) reference model developed by
the International Standards Organization (ISO)
• Transmission Control Protocol/Internet Protocol (TCP/IP) suite.
Types of network
• Three basic types of network are outlined in the example below:
• local area network (LAN)
• metropolitan area network (MAN)
• wide area network (WAN).
7
• Another way of classifying networks that you may have already come across is
based on who can access them: intranets and extranets. These are networks
built on technology similar to the internet but are not intended for general
access. An intranet is a network (typically a LAN) that uses internet
technologies such as web servers and allows access through a web browser for
people within the organisation. An extranet on the other hand, while still based
on internet technologies, allows certain invited parties to access information
services over the internet, typically by requiring them to authenticate using a
password.
Components of a network
• Network topology basics: Networks that link computers and computer devices
provide for flexible processing. Building a network involves two types of
design: logical and physical. A logical model shows how the network will be
organised and arranged. A physical model describes how the hardware and
software in the network will be physically and electronically linked. The
number of possible ways to logically arrange the nodes or computer systems
and devices on a network, may seem limitless, however there are actually four
basic types of network topologies which are logical models that describe how
networks are structured or configured. These types are bus, ring, star and mesh.
• For any network (LAN or WAN) to work it requires the following basic
components to be present:
• Servers that provide services to facilitate various applications and
hardware sharing.
• Communication media includes conducted media for wire or fibre
optic cable and radiated media for wireless WANS.
• Wiring centre technologies, including routers, hubs and switches
provide a central interconnection point for workstations, servers and
other network equipment.
8
• Network Interface Cards (NIC) an expansion card that allows a
computer to communicate via a network.
Wired (cable) and wireless requirements
• Wired or cable media options that can be used in a network include twisted
pair cables, coaxial cables and fibre optics. Each of these have specific uses and
disadvantages that need to be taken into consideration.
• Wireless media options include infrared line of sight, high-frequency radio and
microwave transmissions. Infrared is most often used in remote controls.
High-frequency radio includes the networks that allow for mobile phone usage
and Wi-Fi. Microwave transmissions can be classified as either terrestrial (earth-
bound) or satellite. Satellite transmissions include television and digital radio
subscription services.
Connecting hardware
• Network hub: A hub is like a power board; it duplicates the number of points
available from the original source. Hubs, also known as repeaters, are network
devices that can operate on layer-1 (i.e. the OSI physical layer) to connect
network devices for communication, but cannot process layer-2 or 3 traffic.
Hubs are also prone to collisions and as more and more devices are added the
performance of the network falls. Hubs are generally not used anymore in
business or in home networks.
• Network switch: A network switch is a small hardware device that joins
multiple computers together within one local area network (LAN).
Technically, network switches operate at layer two (data link layer) of the OSI
model. Network switches appear nearly identical to network hubs, but a switch
generally contains more intelligence (and a slightly higher price tag) than a hub.
But unlike hubs, network switches are capable of inspecting data packets as
they are received, determining the source and destination device of each packet,
and forwarding them appropriately. By delivering messages only to the
connected device intended, a network switch conserves network bandwidth
and offers generally better performance than a hub.
• Network router: The router is a device that forwards data packets along
networks. A router is connected to at least two networks, commonly two
LANs or WANs or a LAN and its ISP network. Generally, routers are located
at gateways, the places where two or more networks connect. Routers use
headers and forwarding tables to determine the best path for forwarding the
packets, and they use protocols such as ICMP (internet control message
protocol) to communicate with each other and configure the best route
between any two hosts. Today most routers have combined the features and
functionality of a router and switch/hub into a single unit. Most routers now
9
also include additional features like firewall facilities, web access functions as
well as being wireless enabled.
The application architecture
• The way in which the functions of the application software are spread across
the network can be called the application architecture. The application
architecture is determined by which of these functions are picked up by
various clients and servers. Clients include desktops, laptops, netbooks, 'dumb'
terminals, EFTPOS (electronic funds transfer at point of sale) devices, mobile
phones and handheld devices. Servers include mainframes, desktop-like
machines, clusters (a group of computers linked together to share processing
power, storage and other resources).
• Depending on how the application functions are spread between servers and
clients, we can identify four common types of application architectures
(Dennis, Fitzgerald & Durcikova 2012, p. 40):
• Host-based architectures: Server performs almost all functions.
• Client-based architectures: Client performs most functions.
• Client-server architectures: Functions shared between client and server.
• Peer-to-peer architecture: Each computer or device in the network
functions as both a client and server and shares the network.
10
multiple expansion (PCI) slots has scalable graphics and I/O
capabilities since PCI cards may be added or upgraded.
• While scalable software typically refers to business applications that
can adapt to support an increasing amount of data or a growing
number of users. For example, a scalable database management system
(DBMS) should be able to efficiently expand as more data is added to
the database.
Infrastructure scalability
• While scalability refers to a component's ability to adapt readily to a greater or
lesser intensity of use, volume, or demand while still meeting business
objectives. Understanding the scalability of the components of your eBusiness
infrastructure and applying appropriate scaling techniques can greatly improve
availability and performance. Scaling techniques are especially useful in multi-
tier architectures when you evaluate components associated with the edge
servers, the web presentation servers, the web application servers, and the data
and transaction servers.
• There are two key primary ways of scaling web applications which are in
practice today.
• Vertical scalability—Adding resources within the same logical unit to
increase capacity. An example of this would be to add CPUs to an
existing server, or expanding storage by adding hard drive on an
existing RAID/SAN storage.
• Horizontal scalability—Adding multiple logical units of resources and
making them work as a single unit. Most clustering solutions,
distributed file systems, load-balancers help you with horizontal
scalability.
• Most high-volume web sites experience volumes that can vary widely on a
seasonal or other cyclical basis, or that exhibit burstiness as a result of sudden
and unpredictable changes in user demand.
Redundancy and • Three cloud computing models are shown: private, public and hybrid.
reliability of a system
11
• The basic features of the three main cloud models are as follows:
• Public cloud: based on the standard cloud computing model, in which
a service provider makes resources, such as virtual machines (VMs),
applications or storage, available to the general public over the internet.
Public cloud services may be free or offered on a pay-per-usage model.
• Private cloud: A type of cloud computing that delivers similar
advantages to public cloud, including scalability and self-service, but
through a proprietary architecture. Unlike public clouds, which deliver
services to multiple organisations, a private cloud is dedicated to a
single organisation.
• Hybrid cloud: A cloud computing environment which uses a mix of
on-premises, private cloud and third-party, public cloud services with
orchestration between the two platforms.
12
• Hardware redundancy should also be a consideration. This would include
selecting hardware with hot-swappable components, choosing between onsite
or cloud based data backup systems and choosing a UPS, a device that allows a
computer/server/network infrastructure to keep running for a short time
when a primary power source is lost.
Reliability
The five 9's – Availability is traditionally measured using a number of metrics,
including the percentage of time the network is available or the number of nines. A
system running at 99.999% availability would be running at five nines.
Summary
13
Week 7 - Chapter 7: ISs development and understanding supply chain systems
Question Answer
Information systems
What is system • Activities that go into producing an information system solution to an organizational
development problem or opportunity
and its • Components: hardware, software, data, procedures and people
components?
The difference • 3 kinds of software: off-the-shelf, off-the-shelf with adaptation and tailor-made
between • 2 kinds of IS: off-the-shelf with adaptation and tailor-made
software and
IS?
What is the Information technology architecture defines how those resources are used to achive desired
relationship outcomes
between • Technical aspects: hardware, operating systems, networking, data…
information • Management side: how managing the transition will occur and how other departments
technology will contribute and use the new system
architecture
and org’s
resources?
14
Seven-phase process
15
Challenges in • Requirements are difficult to determine
systems • Requirements change as the system is developed
development? • Scheduling and budgeting difficulties
• Changing technology
• Diseconomies of scale (bigger teams → lesser individual contribution)
16
Benefits of • Increase efficiency
automation? • Replaces manual tasks
17
o Implement the new process
o Continuous measurement
18
What is • Analysis of problem to be solved by new system
systems o Defining the problem
analysis? o Identifying causes
o Specifying solutions
o Identifying information requirements
• Feasibility study
• Systems proposal report
• Information requirements
o Faulty requirements analysis → systems failure and high systems development
costs
Systems • Describes system specifications that will deliver identified functions in systems analysis
design? • Should address all managerial, organizational, and technological components of system
solution
• Role of end users
o User information requirements drive system building
o Users must have sufficient control over design process to ensure system reflects
their business priorities and information needs
o Insufficient user involvement in design effort → system failure
19
What is • System specifications from design stage are translated into software program code
involved in
programming?
20
Production • System reviewed to determine if revisions needed
and • May include post-implementation audit document
maintenance • Maintenance
o Changes in hardware, software, documentation, or procedures to a production
system to correct errors, meet new requirements, or improve processing
efficiency
o 20% debugging, emergency work
o 20% changes to hardware, software, data, reporting
o 60% of work: user nhancements, improving documentation, recoding for
greater processing efficiency
21
Elements of the
supply chain
Supply chain • To have close linkage and coordination of activities involved in buying, making, and
management moving a product
functions • Integrates supplier, manufacturer, distributor, and customer, logistics, time
• Reduce time, redundant effort, and inventory costs
22
Challenges to Without supply chain management
supply chain • Unexpected events: parts shortages, probs of suppliers’ factories,...
Bullwhip effect
• Change in consumer demand → companies in supply chain order more goods
• Start w/ retailer, wholesaler, distributor, manufacturer and raw material suppliers
• Cause: demand forecasts rather than actual demand
Benefits of • Essentially the optimisation of material flows and associated information flows
supply chain • Premier application of digital business
management? o Unifying concept that incorporates e-procurement
o Sell- side e-commerce
• Delivering profitability
• Customer satisfaction and repeat business
• Electronic procurement (e-procurement)
o Achieve significant savings
o Benefits – which directly impact upon the customer
What are some Inventory across all types of business broken down into
problems of • Manufacturers
supply chain • Retailers
management? • Merchant wholesales
Supply chain network
• Links with all partners
• Involved multiple supply chains
23
successful Powered by people
supply chain? • Utilize pp to add value
• Attract, retain and retrain are important elements
Transformed by technology
• Technological innovation & adoption have helped transform
Resilient and responsive
• The macro-environment, recognizing risks and impacts are requires a plan
Vendor- • Partners manage the replenishment of parts or items for sale through sharing of
managed information on variations in demand
inventory • Stocking level for goods used for manufacture or sale
(VMI)
24
• Outbound logistics: the management of resources supplied from its customers and
intermediaries
Only technologically advanced retailers and logistics providers are able to offer same-day
delivery
Push and pull • A change in supply chain thinking, and also in marketing communications thinking
supply chain • The move from push models of selling to pull models
model • To combined push–pull approaches
Pull supply • Emphasis on using the supply chain to deliver value to customers who are actively
chain involved in product and service specification
• Focused on the customer’s needs and starts with analysis of their requirements
25
Michael • Internal – boundaries of an organization
Porter’s value • External – activities performed by partners
chain (VC) • Improve their efficiency and effectiveness
o Within each element – procurement, manufacture, sales and distribution
o At the interface between elements – sales and distribution
• Value = (Benefit of each VC activity − Its cost) + (Benefit of each interface between
VC activities − Its cost)
26
The value • A concept closely related to VC, defined as
stream o Prob-solving task
o Info management task
o Physical transformation task
• The combination of actions required to deliver value to the customer as products and
services
How to add Cutting out waste in each of these three management tasks
value? • Reducing new product development, production times and costs
• Increase customer value by decreasing fulfilment time or price
• Increasing product and service quality
Value chain Value stream analysis, creating new products and delivering products or services to customers
analysis and then categorise them as
• Create value as perceived - create no value
• Don’t add value
• Improvements in the value chain: create a consensus forecast
• Statistical of diff departments or companies for improved decision - creating a
preliminary delivery plan
• Reduce planning effort
• Create a preliminary production plan - integrate several entities
• Adjust delivery and production plan - visibility info
• Settle delivery and production plan - overall benefits
27
o Outsource
• Sell-side partners
o Downstream supply chain
o Value chain integrators or partners (e-infrastructure)
What can value The value network offers a diff perspective that is intended to emphasize
network offers • The digital interconnections between partners and the organization and directly
between partners that potentially enable real-time information exchange
• Dynamic nature of the network
• Diff types of links between diff types of partners
Options for Supply chain management options can be viewed as a continuum between
restructuring • Internal control (‘vertical integration’)
the supply o The extent to which supply chain activities are undertaken and controlled
chain • External control through outsourcing (‘virtual integration’)
o The majority of supply chain activities are undertaken and controlled outside
by third parties
28
Three decisions of framework choices for vertical integration strategy
• The direction of any expansion
• Direct ownership at upstream or downstream - the extent of vertical
integration
• How far
• The balance amongst the vertically integrated stages
o What extend the supply chain focus on
Supply chain • To improve supply chain efficiency is dependent on effective exchange and sharing of
information
• The challenges of achieving standardized data formats and data exchange for
optimization
29
Technology • Data transfer options in standards to enable eSCM, -EDI
options and • Established and relatively simple method of exchanging orders, delivery notes in
standards for invoices
Supply Chain • XML or XML-EDI based data transfer
management o Enable more sophisticated one-to-many data transfers
• Middleware or software
o Integrate or translate external systems in real time
• Manual email orders online purchase
o Traditional web-based e-commerce store for B2B
30
Data Benefits approach for retailers
standardization • Order and item administration
and exchange • Coupon rejection
• Data management efforts
• Improvement of on-shelf availability, w/ out-of-stock items
31
eSCM
• Strategies for supply chain improvement according to the scope of change in a speed of
change
• 4 strategic options for the supply chain
• 2 strategies that are relatively limited scope apply
o Individual processes such as procurement or outbound logistics
o Delivery improvement and an operational level
32
How to • Cost in supply chain: all cost
manage eSCM • Profitability: ROI
effectively? • Customer responsiveness: time required
• Flexibility: volume, delivery, mix, new product
• Supply chain partnership: level and degree
• Producion level metric: range of product
• Delivery perf
• Customer service and satisfaction
• Supply chain finance and logistic cost
• Cost perf: material, labour, energy, inventory
• Internal and external time perf: time to market, setup
• Quality perf
• CRM for eSCM
33
o Develop strong partnership
o Share info and trust
Long-term arrangeent information exchange
• Short-term orders
• Medium-to-long-term capacity commitment
• Long-term financial or contractual agreement
• Product design - perf monitoring - logistics
Procurement
process
34
8 types of • Traditional manufacturers
intermediary of • Direct sales manufacturers
developing an • Value-added procurement partners - intermediaries
e-procurement • Online hubs – vertical portals
strategy • Knowledge experts
• Online information services
• Online retailers
• Portal communities – seek different online information
Potential Planning
benefits in • Increase dissemination quality
terms of Development
process • Be incorporated early in new product event
efficiency and Inbound
effectiveness • Efficiency gains (supplier)
and strategic • Vendor-managed inventory (VMI): supply chain partners managing replenishment
approach Production
• Integrate systems managing manufacturing
Outbound
• Fulfilment of products (customers)
35
• Efficient consumer response (ECR): focus on demand generation
36
Integrate Three models
company
systems w/
supplier
systems
37
B2B Electronic B2B marketplaces
marketplaces • Marketplaces, exchanges or hubs virtual locations
were heralded • Intermediaries part of the reintermediation
38
as transforming General digital marketplace
B2B purchases • Alibaba.com
Types of Metamediaries
marketplace • 3rd party provide a single point of contact and deliver a rage of services between
customers and supplier
A taxonomy of B2B marketplaces by existing classifications
• How businesses buy – systematic purchasing or spot purchasing
• What businesses buy – manufacturing inputs or operating resource inputs
Summary
1. Main elements of supply chain management and e-procurement
2. Potential of IS to sp supply chain management and procurement
3. Analyze procurement methods to evaluate cost savings
39
Week 8 - Chapter 8- Outsourcing and management of IT/IS infrastructure
Question Answer
1, What are the • plan the use of information systems (IS) to accomplish organisational goals and strategy
main functions of • manage outsourcing relationships
IT/IS ? • protect information assets
• develop, operate and maintain the organisation’s computing infrastructure
• develop, operate and maintain applications.
2, How is the
IT/IS Department
organized?
- CIO usually report directly to CEO, but sometimes they report to COO, then the COO will report
to CEO
- IT/ IS Department includes:
• Technology office: investigates new IS technology and determines how org can benefit from
them. CTO heads this group (they sort out ideas to identify which are most relevant to org).
• Operations: manage computing infrastructure: individual computers, computer center,
network, communication media,... They monitor user experience and respond to user
problems.
• Development: manage the process of creating new IS and maintaining existing IS
(maintenance in this context means either removing problems or adapting existing IS to
support new features and functions).
• Outsourcing relations: negotiate outsourcing agreements with other companies to provide
equipment, services,...
• Data administration: protect data and in4 assets by establishing data standards and data-
management policies.
-> In a larger org, there might be more groups: data warehousing, data marts,...
40
3, What is the - IS: exist to help the org achieve its goals and objective, it has 5 components: hardware, software,
difference database, network and people.
between IT and IS - IT: is just technology, it concerns the products, techniques, designs of computer- based technology.
? IT must be placed into the structure of IS before org can use it.
41
5, What are the - Outsourcing: the process of hiring another org to perform service. It is done to save cost, gain
advantages and expertise and to free management time.
disadvantages of - Advantages:
Outsourcing? Management advantages:
• obtain expertise
• Avoid management problems
• Free up management time
Cost reduction:
• Obtain part- time services
• Gain economies of scale
Risk reduction:
• Cap financial risk
• Improve quality
• Reduce implementation risk.
*Note: - Gain economies of scale: means many companies have the same service vendors, so whenever
the service changes into a new one, the vendors just need one time to change all the services of those
companies -> the charge for each company will reduce.
• Reduce implementation risk: means prevent the risk of picking wrong hardware,...
- Disadvantages:
• Risk of exposing confidential data and IP: When an organisation outsourced HR,
payroll and recruitment services, it involves a risk of exposing confidential company
information to a third-party. This may also include intellectual property.
• Synchronising the deliverables: In case you do not choose the right partner for
outsourcing, some of the common problem areas include stretched delivery time frames,
sub-standard quality output and inappropriate categorisation of responsibilities. At times
it is easier to regulate these factors inside an organisation rather than with an outsourced
partner.
• Hidden costs: Although outsourcing most of the time is cost-effective. Hidden costs
involved in signing international contracts can result in unexpected outcomes.
• Lack of customer focus: An outsourced vendor may be catering to the expertise-needs of
multiple organisations at a time. In such situations vendors may lack complete focus on
your organisation’s tasks.
• Reputation and Social backlash: A company’s reputation may be damaged to their key
customers if the service provided by the outsourcing company is contrary to their social
values.
42
6, What are
alternatives to
outsourcing?
(p.169)
8, What is cloud - A way helps businesses solve their IT- infrastructure related issues.
computing? - A model for enabling ubiquitous, convenient, on- demand network access to a shared pool of
(p.174) configurable computing resources (e.g: network, servers, storage, application, services) that can be
rapidly provisioned and released with minimal management effort or service provider interaction.
43
9, What are cloud - On- demand self- service:
computing - Rapid elasticity:
characteristics? - Broad network access:
- Resource pooling:
- Measured service:
11, What are 2 - Public cloud: can be used by any interested party
types of clouds? - Private cloud: used in internal org to balance demand and supply of cloud computing within org.
13, How many - Service- oriented architecture: used for flexibly deploying new applications
various other - Grid computing: help solve large- scale computing problems
applications are - Content delivery networks: increase web application performance
provided by the - IP convergence: transmit voice, video communication over the Internet.
cloud?
14, Which are 3 - The on-demand business model: The on-demand economy is defined as the economic activity
new models of created by technology companies that fulfil consumer demand via the immediate provisioning of
business? goods and services.
- Crowd purchasing model: Also known as collective buying, offers products and services at
significantly reduced prices on the condition that a minimum number of buyers would make the
purchase.
- Platform business model: A platform business model is a business model that connects two or
more participating sides and allows them to interact with each other. The goal of the business model is
to enable interactions.
-> Generally, these models are often referred to under the umbrella of ‘disruptive innovation’. This
concept of 'disruption' describes a process whereby a smaller company with fewer resources is able to
44
successfully challenge established incumbent businesses. Specifically, as incumbents focus on
improving their products and services for their most demanding (and usually most profitable)
customers, they exceed the needs of some segments and ignore the needs of others.
45
16, What is a
- Origins of group buying can be traced to China where team buying was executed to get discount
crowd purchasing
prices from retailers when a large group of people was willing to buy the same item. In recent times,
model?
group buying websites have emerged as a major player in online shopping business. Typically, these
websites feature a 'deal of the day', with the deal kicking in when a set number of people agree to buy
the product or service.
- Buyers then print off a voucher to claim their discount at the retailer. Many of the group-buying sites
work by negotiating deals with local merchants and promising to deliver a higher foot count in
exchange for better prices. One of the first B2C group-buying websites developed in the late 1990’s
was Mobshop of the U.S. Users allied with consumers of the same intent through the Internet,
developed a bargaining ability and then acquired merchandise at a lower price.
- This concept of group buying power has also been extended recently to entities that have no real
relationship with one another other than sharing a postcode or subscribing to a similar personal
service, like a gymnasium, car servicing, holiday destination, etc. The term of these relationships may
only last a few minutes and may only require a brief interview or signup process but the outcome of
these relationships is about producing an outcome that is mutually beneficial to all concerned. But the
outcome of these relationships, unlike the low level personal, instantaneous gratification outcomes,
these outcomes may also last for months and maybe years. These include:
46
processes are more environmentally friendly, for example, by reducing CO2 emissions or by
making products more biodegradable. Overall, green technology aims at contributing to
environmental sustainability.
In general, terms green ICT and green IT are common terms used in various publications and literature.
These terms refer to more generic types of ICT and IT which are eco-friendly. The term green ICT is also
used in this context to refer to generic eco-friendly ICT products and applications.
Summary
- Main functions of IS/IT
- Departments of IS/IT and the ways org use IT/IS
- Pros and cons of Outsourcing and risks of outsourcing
- 3 new business models
- Green technology
47
Week 9 - Chapter 9: Business intelligence
Question Answer
Data
• Raw facts (alphanumeric, image, audio, video)
Information
• Data in context
Wisdom
• Insights
Information creation process
48
• Observation and codification of data and statistics → store relevant information as knowledge in
a file system (each used its own applications to access data; request info → create report → data
becomes useful info)
What is a • Is used to aid in the process of using data to create information and knowledge
database? o Alter 2002: data items stored, controlled, accessed on a computer, based on predefined
relationships
o Rob & Coronel 2002: computer structure housing related data (raw facts) and metadata
(data characteristics and relationships)
• Moore 2017: databases allow us to manage our data, look after the integrity of our data
and afford just-in-time reporting through queries to the database itself. The database
forms a repository for our information system
• Single user (Access) or multiple users (Oracle)
49
o an attribute (a piece of data on an entity, e.g. student number, name, date of birth) with a
specific type (text, number, date).
What is database • A collection of programs that enables you to store, modify, and extract information from a
management database
system (DBMS)? • Handles security, integrity constraints (ensure uniqueness) and who has access to certain areas
• A software package designed to define rules to validate and manipulate data, manipulate data
itself, the data format, field names, record structure and file structure, retrieve and manage data
in a database
• Include
o Software that permits centralisation of data
o Data management so that businesses have a single consistent source for all their data
needs
Link database to A large percentage of corporate databases are accessed over the internet through a standard web browser
the internet → convenient for individual users, increases effectiveness and efficiency for businesses and organisations
What is business • A technology-driven process for analysing data and presenting actionable information to help
intelligence? corporate executives, business managers and other end users make more informed business
decisions
• encompasses many tools, applications and methodologies that enable organisations to collect
data from internal systems and external sources for analysis to corporate decision makers as well
as operational workers
50
How to select a • Org’s info needs → the type of collected data, type of used database management system
database • Analyze database needs & characteristics:
management o Database size: The number of records or files in the database.
system? o Database cost: The purchase or lease costs of the database.
o Concurrent users: The number of people who need to use the database at the same time
(the number of concurrent users).
o Performance: How fast the database is able to update records.
o Integration: The ability to be integrated with other applications and databases.
o Vendor: The reputation and financial stability of the database vendor (Stair & Reynolds
2010).
• Database size doubles about every year or two
Summary: Database management technology is another major component of IT infrastructure for information systems. A
database management system (DBMS) consists of software that permits centralisation of data and data management so that
businesses have a single consistent source for all their data needs. A single database services multiple applications. The DBMS
separates the logical and physical views of data so that the user does not have to be concerned with the data's physical
51
location. The principal capabilities of a DBMS include a data definition capability, a data dictionary capability, and a data
manipulation language (Laudon & Laudon 2010).
Question Answer
Sway + Modules
Customer relationship • CEOs, CIOs and chief marketing officers have become interested
management (CRM) in this topic because of the low-cost and ubiquitous access to
52
information for customers, the rise of globalisation, and the "death
of distance" mean that customers are more empowered than
ever.(Smith 2015)
• At the same time, competitive differentiation—achieved through
a strategic decision to invent better products that are hard to
imitate, or by being the most efficient producer of a service—has
diminished over time. What remains the same is how challenging
it is to create a superior customer experience that will serve as a
sustainable differentiator.
53
• supply chain management
• eBusiness components: including eLogistics and
eProcurement. Customers and suppliers are more likely to
now expect access to some ERP information including
order status and inventory levels.
Challenges of ERP ERP systems contain multiple complex components that are not only
expensive to purchase but also expensive to implement. The high install
costs increase the ERP vendor’s negotiating power, which can increase
support, maintenance and upgrade expenses. The software must perform
many different tasks, this complexity can bring added difficulties in the
implementation of an ERP across an organisation. As most companies do
not carry ERP software expertise within their staff and do not understand
ERP as well as they should, it is easy for an organisation to choose the
wrong package. The costs of implementing an ERP needs to consider the
software and hardware expenses, consulting fees and training fees.
Sách INF
Supply Chain
Management
54
• Customer Portals: are designed to automate the business processes
that occur before, during and after ales have been transacted
between a supplier and multiple customers
B2B marketplaces
Managing complex
supply networks
Developing an SCM
strategy
CRM
55
• Employee training
• Data collection, analysis and sharing
Enterprise resource
planning
56
problems of enterprise
silos?
Summary
Question Answer
1, What are the - Confidentiality: Also known as secrecy, meaning that the information assets can be accessed
concepts/ principles of and disclosed only by authorised parties.
information security? - Integrity: Meaning that the information assets can only be modified or deleted by
authorised parties in authorised ways, therefore they are always complete and true.
- Availability: Meaning that the information assets are accessible to the authorised parties in a
timely manner.
-> These are old principles, which do not seem to be sufficiently describing information
security any longer, the following principles are used rather consistently extending the
confidentiality, integrity and availability (CIA) principles as a description of information
security:
- Privacy: protecting the confidentiality and identity of a user (compared to Confidentiality
where the in4 asset itself is protected)
- Accountability: the ability to audit the level of protection provided for in4 assets and the
ability to identify where the responsibility lies to provide such protection.
- Assurance: the measurement of confidence in the level of protection of an in4 asset and the
degree to which a particular control enforces in4 security policy requirements.
- Non- repudiation (Legal enforceability): the ability to “prove” that a sender sent or
receiver received a message (or both), even if the sender or receiver wishes to deny it later.
- Authenticity: both genuineness (not corrupted from the original) and validity (verifying the
identity of a subject requesting the use) of an in4 asset.
57
3, What are the Factors - More complex systems, distributed data, unmanaged devices
making security harder? - Criminals becoming cleverer leading to increased amount of possible threats
- Crimes often not detected for long periods
- Wide range of users, mostly non-expert and outsourcing issues
- Management unaware of problems
- Security measures often inconvenient
- Substantial costs
- Benefits are hard to quantify.
58
7, What are five
components required
balanced attention to
have
effective security ?
8, Monitoring security - Collect feedbacks to ensure that the entire system is working properly
- Capture processing details for evidence
- Check logs for unusual activities
- Verify whether attacks have been unsuccessful
9, Senior management The following are some common mistakes made by senior management when dealing with
mistakes information security:
10, Specific threats and • All the vulnerabilities that exist in a conventional wired network apply to wireless
vulnerabilities technologies.
59
for Wireless networks • Malicious entities may gain unauthorised access to an agency's computer network
security through wireless connections, bypassing any firewall protections.
• Sensitive information that is not encrypted (or that is encrypted with poor
cryptographic techniques) and that is transmitted between two wireless devices
may be intercepted and disclosed.
• DoS attacks may be directed at wireless connections or devices.
• Malicious entities may steal the identity of legitimate users and masquerade as
them on internal or external corporate networks.
• Sensitive data may be corrupted during improper synchronisation.
• Malicious entities may be able to violate the privacy of legitimate users and be able
to track their movements.
• Malicious entities may deploy unauthorised equipment (e.g., client devices and
access points) to surreptitiously gain access to sensitive information.
• Handheld devices are easily stolen and can reveal sensitive information.
• Data may be extracted without detection from improperly configured devices.
• Viruses or other malicious code may corrupt data on a wireless device and
subsequently be introduced to a wired network connection.
• Malicious entities may, through wireless connections, connect to other agencies or
organisations for the purposes of launching attacks and concealing their activities.
• Interlopers, from inside or out, may be able to gain connectivity to network
management controls and thereby disable or disrupt operations.
• Malicious entities may use third-party, untrusted wireless network services to gain
access to an agency's or other organisation's network resources.
• Internal attacks may be possible via ad hoc transmissions.
60
Wired Equivalent Privacy (WEP) Wireless Protected Access (WPA and
Wired Equivalent Privacy (WEP) is an older WPA2)
network security method that's still available Wireless Protected Access encrypts
to support older devices, but it's no longer information and makes sure that the network
recommended. When you enable WEP, you security key has not been modified. Wi-fi
set up a network security key. This key Protected Access also authenticates users to
encrypts the information that one computer help ensure that only authorised people can
sends to another computer across your access the network. There are two types of
network. However, WEP security is WPA authentication: WPA and WPA2,
relatively easy to break into and compromise WPA is designed to work with all wireless
the networks integrity network adapters, but it might not work with
older routers or access points. WPA2 is more
secure than WPA, but it will not work with
some older network adapters.
12, Difference between - The key difference between laws and ethics is that laws carry the authority of a governing
ethics and laws body, and ethics do not .
- Laws: are rules that mandate or prohibit certain behaviour. They are drawn from ethics,
which define socially acceptable behaviours.
- Ethics: are based on cultural mores, the fixed moral attitudes or customs of a particular
group. Some ethical standards are universal.
E.g: murder, theft, assault, and arson are actions that deviate from ethical and legal codes
throughout the world.
Descriptive ethics is the Normative ethics is the Information ethics govern the
study of how people do study of how people ought ethical and moral issues arising
behave, and how they think to behave. It is an from the development and use
they should behave. It is argumentative discipline of information technologies, as
grounded in observation of aimed at sorting out what well as the creation, collection,
some sort—looking at duplication, distribution and
61
people as they are, not behaviours (or rules for processing of information
necessarily as they should be. behaviour) would be best. itself.
14, Types of laws Civil law comprises a wide variety of laws that govern a nation or state and deal with the
relationships and conflicts between organisational entities and people.
Tort law is a way in which the law can interfere with relationships between private individuals
to correct a form of conduct or wrong. A large number of torts exist, and they generally derive
their legal status from the common law.
Criminal law addresses activities and conduct harmful to society, and is actively enforced by
the state. Law can also be categorised as private or public.
Private law encompasses family law, commercial law, and labour law, and regulates the
relationship between individuals and organisations.
Public law regulates the structure and administration of government agencies and their
relationships with citizens, employees, and other governments. Public law includes criminal,
administrative, and constitutional law
15, Four levels of Level 1: Accessing data or impairing electronic communication done with intention to
Australian Cybercrimes commit a serious offense
Act Level 2: Impairing or modifying data or impairing electronic communications done with
intent to cause harm or inconvenience
Level 3: Possession, control, production or supply of data with the intent to commit any of
the above computer offenses
Level 4: Accessing data that is subject to an access control restriction
16, Code of ethics The primacy of the public interest: You will place the interests of the public above those of
personal, business or sectional interests.
The enhancement of quality of life: You will strive to enhance the quality of life of those
affected by your work.
Honesty: You will be honest in your representation of skills, knowledge, services and
products.
Competence: You will work competently and diligently for your stakeholders.
Professional development: You will enhance your own professional development, and that
of your colleagues and staff.
Professionalism: You will enhance the integrity of the Society and the respect of its members
for each other.
62
Summary:
- In the past, there were only 3 principles of in4 security, but nowadays they are extended to 5 principles: privacy,
accountability, assurance, non- repudiation (Legal enforceability), authenticity.
- There are many threats that cause in4 systems and many factors that make in4 security become harder.
- There are 5 steps to create security policy and security policy has to adapt those points: Authentication, Access control,
Secrecy, Data integrity, and Audit.
- Common mistakes made by senior managers when dealing with in4 security
- Specific threats and vulnerabilities for Wireless networks security & difference between different Wireless network
security.
- 3 types of ethics and 5 types of laws
63