0% found this document useful (0 votes)
98 views17 pages

Marvellous - Stambuli - ICM Assignment

The document evaluates and compares two enterprise content management systems, Joomla and WordPress, against criteria for evaluating such systems. It discusses the criteria which includes customization, performance, user experience, collaboration, permission levels, search optimization, cost, and security. Each criterion is then evaluated for both Joomla and WordPress.

Uploaded by

matewereimmanuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
98 views17 pages

Marvellous - Stambuli - ICM Assignment

The document evaluates and compares two enterprise content management systems, Joomla and WordPress, against criteria for evaluating such systems. It discusses the criteria which includes customization, performance, user experience, collaboration, permission levels, search optimization, cost, and security. Each criterion is then evaluated for both Joomla and WordPress.

Uploaded by

matewereimmanuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

BANNER ID: [001085749]

STUDENT NAME: [Marvellous Stambuli]

COURSEWORK TITLE: Information and Content Management Systems]

COURSEWORK CODE: [Coursework code; COMP1649]

COURSEWORK LEADER: [Pradeepan Manickam]

CENTER NAME: [National College of Information Technology – Blantyre Campus]


Table of Contents
Introduction ............................................................................................................................................ 3
Task 1 ...................................................................................................................................................... 4
Content Management Systems............................................................................................................... 4
1a. Criteria for Evaluating Different Content Management System Products .................................. 4
1b. Evaluating Enterprise 2.0 Systems against the Criteria ................................................................ 5
1c. Scoring Model................................................................................................................................ 6
Task 2 ...................................................................................................................................................... 9
2a. Legal, Ethical and Social Issues Generated by Web 2.0 Systems ................................................. 9
2b. Examples of Legal, Ethical and Social Issues Generated by Web 2.0 Systems .......................... 10
Task 3: examples illustrating the wide range of functionality that is available using an Enterprise 2.0
system. .................................................................................................................................................. 12
Conclusion ............................................................................................................................................. 16
References ............................................................................................................................................ 17

Introduction
The report outli and some functionalities that are offered by enterprise 2.0
systemses some legal issues that are generated by enterprise 2.0 systems
Task 1

Content Management Systems


Laleci et al.(2010) defined content management systems (CMSs) as “software applications
for creating, publishing, editing and managing content” throughout the lifecycle of a site.
The authors further explain that Content management systems “are widely used by the
news and media organizations, e-commerce websites, libraries, broadcasting and film
industry, and educational institutions to handle the content efficiently”.

1a. Criteria for Evaluating Different Content


Management System Products
a. Improve Staff Engagement Within the Organization
• Customization – The content management system should allow flexibility to
alter the structure of the site to be in-line with the organizational needs in
terms of the ability to change page designs, fonts, color and layout.

• Performance – The CMS should have the ability to load and return content
results in a minimum time of less than a minute

• User Experience – The CMS Should have the ability to promote ease of use of
the content for user with little knowledge of programming (non-technical). It
should allow users to make changes regardless of their technical expertise.
Users should not rely on developers to make changes required on their site.

b. Facilitate Workflows
The CMS should have workflow capabilities to meet business needs
Your ECM system should have sufficient and expandable workflow capabilities to
meet the varied needs of your business
• Collaboration - The CMS should have the ability to allow multiple users using
individual accounts to work on specific content simultaneously without
hindering the contributions of other members. The users must also be able to
contribute ideas, comment and share the content created.
• Permission Levels - Ability to control who can perform a particular task on
the site by assigning access privileges to site members e.g. controlling who
can edit, approve and publish content.

• Versioning Control
The CMS should have the ability to revert to the previous version of a
document if required. (Oracle and Paper, 2013)
• Search Optimization – Ability to allow users to find the right content they
want with maximum speed to reduce the time employees spend on searching
for information.

c. Develop an Intranet for the Organization


• Cost – The CMS should not produce extra usage costs. This can be in terms of
maintenance or purchase.

• Security – The CMS should have the ability to make it easy to protect content
against any threats e.g. hackers and data breaches through providing data
encryption and additional access control. (Oracle and Paper, 2013)

• Extensibility – The CMS should address security issues through promoting


continual site improvements

1b. Evaluating Enterprise 2.0 Systems against the Criteria


There are many Content management systems in use, these includes SharePoint,
Joomla, Drupal, WordPress, Magento, Wikis and Ghost. However, the right CMS for an
organization depends on the list of its priorities and requirements. The use of web 2.0
technologies within an organization is referred to as Enterprise 2.0. Jandoš (2004)
defined Enterprise 2.0 as the “private use of web 2.0 technologies as tools for
knowledge management”. For this report, two enterprise 2.0 systems (WordPress and
Joomla) are to be evaluated against the developed criteria.
CRITERIA ENTERRISE 2.0 SYSTEM
Joomla WordPress
Customization Joomla allows users to change WordPress also allows users to
the structure of their site manipulate site structure but is
without relying on extensions more customizable than Joomla
Performance Joomla takes long to load In WordPress content loading time
is reduced than in Joomla
User Experience Jooma requires high level of User-friendly to non-technical users
skills to manage as there are as it makes it easy for a beginner to
limited templates for users to upload files, allows drag and drop
follow and the functionality of and provides templates for users.
drag and drop requires plugins. WordPress on the other hand is
Joomla has a steep learning simpler for beginners to pick up and
curve its popularity provides user with a
better support
Collaboration and Joomla allows users to work WordPress also allows users to
Communication simultaneously on the site and perform different tasks on a work
share content simultaneously.
Permission Levels and It is very extensive to manage WordPress allows permissions to be
Versioning Control Joomla permissions In Joomla “a set for users
website admin cannot set
privileges for site visitors
(Wakode, 2013)
Search Optimization Joomla requires Search Engine WordPress has excellent Search
Optimization components for engine optimization options by
additional control default and it makes the process of
optimization easy for its users
through countless plugins available
e.g. yoast
Cost Joomla is a bit costly than WordPress is less costly, it is a free
WordPress to download, use and alter, it does
not not require extra costs
Security Highly secure as it has an option Due to popularity, WordPress is
that forces connection over highly targeted and is vulnerable to
secure socket Layer (SSL) and security threats. To address this
offers its own set of security issue, it has a lot of plugins that
extensions and “updates are makes each installation unique and
released frequently.”(Wakode, because of this, it is impossible to
2013) make sure every plugin is in line
with safety standards. Unlike
Joomla WordPress do not have
features that force connection over
SSL.
Extensibility Jooma has a powerful WordPress can also be extended
extensibility as it allows according to growing organizational
continual improvements needs

1c. Scoring Model


A scoring model is a model where different variables are weighed to have a final score. The score that
is found usually forms the basis where decisions or conclusions are made. Scoring models usually
consist of predefined and predetermined criteria for calculations. A scoring model is essential as
subjections to different interpretations of results are removed when making the final decision, thereby
making sound decisions through a standardized process.
The scoring model below, compares two popular CMSs on the market, WordPress and Joomla in which
scores were added according to how each CMS works.
From the comparison above, a chart illustrating the scores of each CMS was produced basing on the
criteria.

According to the comparison results, WordPress stands out with just a slight difference of overall
score.
In this scoring model, WordPress emerged the best content management system. This is because it
is open software which makes it very inexpensive and this means the organization will not encounter
extra purchasing costs, easy to use assuming that other organizational users are inexperienced, its
functionalities are easy to understand hence improving staff engagement and it is secure enough to
use which means organizational data is very safe from issues of data breaches. With WordPress,
roles can be assigned to users because it has a multiuser capability and users are able to create
organizational blogs.

1D. Screencast
https://youtube/6TvpnWJHDMY
Task 2

2a. Legal, Ethical and Social Issues Generated by Web 2.0


Systems
The use of web 2.0 systems can help organizations to concentrate on its primary objectives. Web 2.0
systems help organizations to improve interactivity among employees and improve communications
either with customers and partners. Although there may be some benefits around web 2.0
technologies, there are also several issues evolving around this technology due to improper use of the
technology. These issues include data security, privacy and confidentiality, discrimination, harm and
harassment and copyright infringement
Data security is the protection of stored information. Unproper data security settings on web 2.0
systems may lead to information e.g. financial information being accessed by malicious people e.g.
hackers who may bypass the security controls and gain unauthorized access to organization
information and use this for personal gain. According to Gotterbarn et al (no date) this is not in
conjunction with the ACM code of ethics 2.9 which states that “security features should be designed
to be as intuitive and easy to use as possible. Computing professionals should discourage security
precautions that are too confusing, are situationally inappropriate, or otherwise inhibit legitimate
use”. WordPress allows a two-factor authentication that adds an extra layer of protection.
Data Privacy is about proper handling of data, improper encryptions and configuration errors in web
2.0 systems, information is left vulnerable to malicious software engineering activities such as
malware and hacking. Information leakage might also result from the blurred line between the use of
web 2.0 systems for both personal and work where employees may accidentally upload confidential
information to the public. According to the ACM code of ethics 1.6, this can result in reputation
damage causing customer and to the organization. WordPress has built-in privacy settings to control
who can or who cannot access or view particular information.
Confidentiality aims at preventing leakage of organizational or personal sensitive information from
unauthorized parties but the easy to use features that web 2.0 systems offers allows even non-
technical staff to upload and alter content resulting in accidental leakage of sensitive information
thereby leading to reputation damage. According to the ACM code of ethics 1.7 of Honoring
confidentiality which states that “computing professionals are often entrusted with confidential
information. Computing professionals should protect confidentiality except in cases where it is
evidence of the violation of law, of organizational regulations, or of the Code. In these cases, the
nature or contents of that information should not be disclosed except to appropriate authorities. A
computing professional should consider thoughtfully whether such disclosures are consistent with the
Code”. WordPress addresses the issue of confidentiality by limiting the number of login attempts of
users.
The use of web 2.0 systems may foster discrimination e.g. among employees as most of these
technologies do not include accessible features to the underprivileged like the deaf and the blind and
this may lead in hatred against the organization. Referring to the ACM code of ethics, this is not inline
with code 1.4 which explains that “technologies and practices should be as inclusive and accessible as
possible and computing professionals should take action to avoid creating systems or technologies
that disenfranchise or oppress people. Failure to design for inclusiveness and accessibility may
constitute unfair discrimination” (Gotterbarn et al., no date).
Web 2.0 systems facilitate the ability for different users to access information on web 2.0 system can
result in organization facing lawsuit as other employees may use some confidential information
about their colleagues to cause harm or facilitate criminal activities such as stalking, bullying and
harassment. This may direct the victims to sue the company hence they may lose business. This does
not support the ACM code of ethics 1.2 of avoiding harm.
Web 2.0 systems enhances Copyright Infringement due to the freedom that is given to users to
upload and share content. Employees may use unauthorized data sources to upload content on the
organization site thereby leading them into financial losses as they may be required to paying fine to
the victims of copyright infringement. Referring to the ACM code of ethics, this is in contrary to the
code

2b. Examples of Legal, Ethical and Social Issues


Generated by Web 2.0 Systems
Due to the rise of technology, a lot of issues concerning data usage have been generated. Many
organizations are facing a lot of challenges because of the use of using web 2.0. This may be due to
unintentional or intentional reason either by employees in an organization or through the outside
world. Below are examples of recent issues generated by Web 2.0 systems.
a. Facebook
The first recent example where legal, social and ethical issues were generated in an enterprise
environment is about a social networking site “Facebook”. In 2019 Facebook allowed organizations
such as Cambridge Analytica to harvest user data for targeted advertising particularly political
advertising. This data privacy scandal centers around the collection of personality identifiable
information of up to 82 million users. In this saga, Cambridge Analytica harvested information through
a personality quiz app called this is your digital life. Facebook also admitted to giving tech companies
like Amazon and Yahoo access to user’s personal data.

Firstly, the issue of honoring confidentiality of entrusted information is compromised as unauthorized


access to personal sensitive data is given to third parties, in this case Cambridge Analytica. Due to this,
the company credibility is at stake. According to this scenario, legal issues were not considered as
Facebook did not abide by the ACM code of ethics 1.7 of honoring confidentiality (Gotterbarn et al.,
no date).
Referring to the scenario, another issue that was not considered by Facebook is security. There may
be disclosure of personal identifiable information to the general public as a result of giving out
sensitive information to third parties who are not obliged to keep the information safe. Due to this,
the individual owners of the information may end up being victims of ridicule and theft, resulting in
mental harm which does not comply to the ACM code of ethics 1.2 that focus on avoiding harm
(Gotterbarn et al., no date).
According to the scenario, privacy of Facebook users is at risk as their personal identifiable information
is given out without their consent. This may result in loss customers due to lack of confidence in the
company and Facebook might also face lawsuit resulting in financial loss due to cost of compensations.
This ethical issue is not inline with the ACM code of ethics 1.6 of respecting privacy (Gotterbarn et al.,
no date).

b. Yahoo
Another recent example where legal, social and ethical issues were generated is the issue of data
breach concerning Yahoo. According to cisomag (2019), “A former Yahoo software engineer, Reyes
Daniels hacked into personal accounts of over 6,000 Yahoo users. Cisomag further explains that Reyes
used his role at work to access internal Yahoo systems and crack passwords to hack accounts which
mostly belonged to women. As noted by cisomeg, the hacker admitted that he made copies of images
and videos that he compromised and stored on his personal computer. He also compromised other
accounts such as Facebook, Gmail, iCloud and DropBox where he searched for private images and
videos”.
According to the scenario concerning Yahoo, the users could be victims to reputation damage since
their private life is invaded and the copies made from this could go viral to the public as a whole. From
this the company might face high employee turnovers and loss of customers due to lack of confidence
and trust in the organization. This is not in line with the ACM code of ethics 1.2 of avoiding harm.
Yahoo did not consider placing new security settings to bar ex-employees from login into the system.
Due to this negligence in ensuring security protocols are in place, Yahoo may be liable to pay
compensations to the victims of the data breach for causing them mental harm thereby leading the
company into financial loses. According to this, the ACM code of ethics of managing resources….was
not practiced. (Gotterbarn et al., no date).
Negligence in accepting and providing an appropriate professional review of the code of conduct as
stated by ACM code of conduct Act 2.4 will result in imprisonment of the hacker for breach of sensitive
data.
Task 3: examplesillustrating the wide range of functionality that is
available using an Enterprise 2.0 system.
To illustrate the vast functionalities that web 2.0 systems offers, SharePoint which is one of the
Content management systems available for a vast number of users was evaluated

• User Permissions
SharePoint allows customization of roles and permissions to users so that they are able to
contribute as required.

• Sharing
SharePoint has an external sharing feature that enable users to share content
with customers, partners or other organizations.
• Search
SharePoint allows to users to search for required content. This enhances performance of the
users as less time is spent to carry out particular tasks.

• Customization
SharePoint enables users to change the site structure in order to fit with
organizational requirements
• Upload Content
With SharePoint users are able to upload content to their site. Users can choose to either
upload files, folder and templates.

• Create workflows
With SharePoint, users can create ways of how they want their work to be done by following
predefined steps that can be completed sequentially.
• Comments
With sharepoint users are able to view and comment on changes that are made to site pages
by their collegues.

Viewing
With SharePoint, it is easy to trace who performed a particular work e.g. in the example
below we are able to notice that one member created a web page and the other was able to
edit. Members were able to work on the same content without infringing the contributions
of other mebers
Conclusion
The report has outlined an evaluation of enterprise 2.0 systems, the legal issues that may arise from
the use of Web 2.0 systems and how the chosen enterprise 2.0 system addresses these issues. The
report also illustrates some of the vast examples of functionalities that are offered by enterprise 2.0
systems.
References
Gotterbarn, D. et al. (no date) ‘ACM Code of Ethics and Professional Conduct’. doi:
10.1145/3274591.
Jandoš, J. (2004) ‘From Web 2 . 0 to Enterprise Web 2 . 0 and’, pp. 112–119.
Laleci, G. B. et al. (2010) ‘A semantic backend for content management systems’,
Knowledge-Based Systems, 23(8), pp. 832–843. doi: 10.1016/j.knosys.2010.05.008.
Oracle, A. and Paper, W. (2013) ‘Top 10 Criteria for Choosing an Enterprise Content
Management System’, (May). Available at:
http://www.oracle.com/us/products/middleware/top-10-criterias-for-ecm-wp-
1939579.pdf.
Wakode, B. V (2013) ‘Study of Content Management Systems Joomla and Drupal’,
International Journal of Research in Engineering and Technology, 02(12), pp. 569–573. doi:
10.15623/ijret.2013.0212096.

You might also like