Marvellous - Stambuli - ICM Assignment
Marvellous - Stambuli - ICM Assignment
Introduction
The report outli and some functionalities that are offered by enterprise 2.0
systemses some legal issues that are generated by enterprise 2.0 systems
Task 1
• Performance – The CMS should have the ability to load and return content
results in a minimum time of less than a minute
• User Experience – The CMS Should have the ability to promote ease of use of
the content for user with little knowledge of programming (non-technical). It
should allow users to make changes regardless of their technical expertise.
Users should not rely on developers to make changes required on their site.
b. Facilitate Workflows
The CMS should have workflow capabilities to meet business needs
Your ECM system should have sufficient and expandable workflow capabilities to
meet the varied needs of your business
• Collaboration - The CMS should have the ability to allow multiple users using
individual accounts to work on specific content simultaneously without
hindering the contributions of other members. The users must also be able to
contribute ideas, comment and share the content created.
• Permission Levels - Ability to control who can perform a particular task on
the site by assigning access privileges to site members e.g. controlling who
can edit, approve and publish content.
• Versioning Control
The CMS should have the ability to revert to the previous version of a
document if required. (Oracle and Paper, 2013)
• Search Optimization – Ability to allow users to find the right content they
want with maximum speed to reduce the time employees spend on searching
for information.
• Security – The CMS should have the ability to make it easy to protect content
against any threats e.g. hackers and data breaches through providing data
encryption and additional access control. (Oracle and Paper, 2013)
According to the comparison results, WordPress stands out with just a slight difference of overall
score.
In this scoring model, WordPress emerged the best content management system. This is because it
is open software which makes it very inexpensive and this means the organization will not encounter
extra purchasing costs, easy to use assuming that other organizational users are inexperienced, its
functionalities are easy to understand hence improving staff engagement and it is secure enough to
use which means organizational data is very safe from issues of data breaches. With WordPress,
roles can be assigned to users because it has a multiuser capability and users are able to create
organizational blogs.
1D. Screencast
https://youtube/6TvpnWJHDMY
Task 2
b. Yahoo
Another recent example where legal, social and ethical issues were generated is the issue of data
breach concerning Yahoo. According to cisomag (2019), “A former Yahoo software engineer, Reyes
Daniels hacked into personal accounts of over 6,000 Yahoo users. Cisomag further explains that Reyes
used his role at work to access internal Yahoo systems and crack passwords to hack accounts which
mostly belonged to women. As noted by cisomeg, the hacker admitted that he made copies of images
and videos that he compromised and stored on his personal computer. He also compromised other
accounts such as Facebook, Gmail, iCloud and DropBox where he searched for private images and
videos”.
According to the scenario concerning Yahoo, the users could be victims to reputation damage since
their private life is invaded and the copies made from this could go viral to the public as a whole. From
this the company might face high employee turnovers and loss of customers due to lack of confidence
and trust in the organization. This is not in line with the ACM code of ethics 1.2 of avoiding harm.
Yahoo did not consider placing new security settings to bar ex-employees from login into the system.
Due to this negligence in ensuring security protocols are in place, Yahoo may be liable to pay
compensations to the victims of the data breach for causing them mental harm thereby leading the
company into financial loses. According to this, the ACM code of ethics of managing resources….was
not practiced. (Gotterbarn et al., no date).
Negligence in accepting and providing an appropriate professional review of the code of conduct as
stated by ACM code of conduct Act 2.4 will result in imprisonment of the hacker for breach of sensitive
data.
Task 3: examplesillustrating the wide range of functionality that is
available using an Enterprise 2.0 system.
To illustrate the vast functionalities that web 2.0 systems offers, SharePoint which is one of the
Content management systems available for a vast number of users was evaluated
• User Permissions
SharePoint allows customization of roles and permissions to users so that they are able to
contribute as required.
• Sharing
SharePoint has an external sharing feature that enable users to share content
with customers, partners or other organizations.
• Search
SharePoint allows to users to search for required content. This enhances performance of the
users as less time is spent to carry out particular tasks.
• Customization
SharePoint enables users to change the site structure in order to fit with
organizational requirements
• Upload Content
With SharePoint users are able to upload content to their site. Users can choose to either
upload files, folder and templates.
• Create workflows
With SharePoint, users can create ways of how they want their work to be done by following
predefined steps that can be completed sequentially.
• Comments
With sharepoint users are able to view and comment on changes that are made to site pages
by their collegues.
Viewing
With SharePoint, it is easy to trace who performed a particular work e.g. in the example
below we are able to notice that one member created a web page and the other was able to
edit. Members were able to work on the same content without infringing the contributions
of other mebers
Conclusion
The report has outlined an evaluation of enterprise 2.0 systems, the legal issues that may arise from
the use of Web 2.0 systems and how the chosen enterprise 2.0 system addresses these issues. The
report also illustrates some of the vast examples of functionalities that are offered by enterprise 2.0
systems.
References
Gotterbarn, D. et al. (no date) ‘ACM Code of Ethics and Professional Conduct’. doi:
10.1145/3274591.
Jandoš, J. (2004) ‘From Web 2 . 0 to Enterprise Web 2 . 0 and’, pp. 112–119.
Laleci, G. B. et al. (2010) ‘A semantic backend for content management systems’,
Knowledge-Based Systems, 23(8), pp. 832–843. doi: 10.1016/j.knosys.2010.05.008.
Oracle, A. and Paper, W. (2013) ‘Top 10 Criteria for Choosing an Enterprise Content
Management System’, (May). Available at:
http://www.oracle.com/us/products/middleware/top-10-criterias-for-ecm-wp-
1939579.pdf.
Wakode, B. V (2013) ‘Study of Content Management Systems Joomla and Drupal’,
International Journal of Research in Engineering and Technology, 02(12), pp. 569–573. doi:
10.15623/ijret.2013.0212096.