Sunday, March 28, 2010

Week Five: Weekly Questions


Chapter Five: Weekly Questions

What is information architecture and what is information infrastructure and how do they differ and relate to each other?

Information architecture refers to a general plan implemented within firms that specifies how the information technology systems owned by the business will be implemented by the firm. According to Louis Rosenfeld, “Information architecture is defined as “The structural design of an information space to facilitate task completion and intuitive access to content” (Information Architecture for the World Wide Web, Louis Rosenfeld, O’Reilly, 2002). Information infrastructure is another discipline which refers to the actual implementation of information systems such as hardware, software, services and people to perform tasks within a firm. Information infrastructure is closely related to information architecture as it relies on the information technology systems detailed within a plan to be employed within the firm. However, information architecture differs from information infrastructure in the sense that information architecture solely focuses on a theoretical plan of how the firm will implement information technology systems, whereas, information infrastructure refers to a practical process of actually implementing the information systems listed in the information architecture plan.


Describe how an organisation can implement a solid information architecture

It is essential for all organisations to implement a solid information architecture. Such architecture can be created by management during planning time and can be implemented on a daily basis by ensuring employees are aware of the objectives of different information systems such as hardware, software, services and their actual labour to ensure such processes are enforced to meet their objectives. Information architecture can also be implemented through the creation and adherence of a strong information security plan and also by managing employee access to databases. Data patches, which are pieces of software designed to solve problems or update programs using data as well as antivirus software such as Norton Anti-Virus can also be implemented to ensure solid information architecture is maintained within a firm. To ensure a solid information architecture exists within a firm, back up and disaster recovery systems should be enforced and data should remain secure.


List and describe the five requirement characteristics of infrastructure architecture

There are five key characteristics that a solid infrastructure architecture should consist of. Such characteristics include reliability, scalability, flexibility, availability and performance. It is essential for the infrastructure architecture of a firm to be reliable and dependable because this will ensure high accuracy and will prevent a firm from becoming in threatened. Scalability is another characteristic of infrastructure architecture and refers to the process of ensuring a firms systems meet growth requirements. Infrastructure architectures must also be flexible and be able to easily adapt to changing business demands and external competition. Availability is another key requirement of a solid infrastructure architecture and infers the necessity of a firms system to be available 99.999% of the time to ensure business continuity and success. Performance is an essential characteristic of infrastructure architecture and refers to how quickly a system can perform certain tasks for example processing a customers order. It is essential that the systems within a firms infrastructure architecture perform at an optimal speed to combat the growing pressure for systems to perform at a faster pace.

Five Characteristics of Infrastructure Architecture (Baltzan et al)



Describe the business value in deploying a service orientated architecture

A service orientated architecture is an architectural approach that integrates business services as linked, repeatable tasks. Such services communicate with each other through the transmitting of metadata and allow the re-use of applications/services creating an economical benefit. Service orientated architectures can add value to a firm is it allows businesses to ‘plug in new services’, upgrade existing services, respond swiftly and economically to changing market conditions. This allows the use of existing systems in different ways to meet different demands and is beneficial as it allows a firm to quickly and easily adapt to changing circumstances to meet varying demands. The other characteristics associated with service orientated architecture which add business value in deploying services include: (http://www.sun.com/products/soa/benefits.jsp)

  • Improved business visibility: Integrated systems and aggregated data allow for a more consistent and accurate view of a firms customers
  • Achieve Business Flexibility: Create an integrated, agile software infrastructure for quickly responding to business needs
  • Gain Business Efficiency: Streamline, automate, and enable better tracking and visibility of your business processes

SOA (http://www.sun.com/products/soa/benefits.jsp)





What is an event?

In terms of information technology, an event is an electronic message transmitted to ones computer that identifies something has happened. An event can also detect threats and opportunities and accordingly alert such messages to those who can make use and act on the information provided. According to ITIL Service Operation book, Page 35, an event is "any detectable or discernable occurrence that has significance for the management of the IT infrastructure or the delivery of IT service and evaluation of the impact a deviation might cause to the services”. E.g. new employee on a system

Example of an event https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBVxVWvaUZZuD2oB5mXKzEx0ySvew5awVCFp_KAP09N7aKGg16w6BC7LfwHHRhbZicFJr_PyF0DG9QjaAUfKGMptWE285hnnE8eAvouJ3mVT7N6KVN_8wEb5kgjX343STwtqVNvG-4T8o/s400/Event+ID+52.JPG





What is a service?

In terms of information technology, a service refers to the collaboration of a set of related commands that can be reused, such as a software products like Microsoft Word. Reusable services prove to be resource efficient as they reduce costs and improve productivity.

What emerging technologies can companies use to increase performance and utilize their infrastructure more effectively?

Grid computing is an emerging technology that can be employed by firms to increase their performance and to utilize their infrastructure more effectively. According to (http://www.wisegeek.com/what-is-grid-computing.htm), Grid computing is the act of sharing tasks over multiple computers. Tasks can range from data storage to complex calculations and can be spread over large geographical distances. Grid computing is beneficial to the performance and utilisation of infrastructure as it allows idle computers across the firm’s network to be employed for better use and also allows users to offer their free-processing time on home computers to firms. Other benefits that grid computing would create for businesses include:

  • improved productivity and collaboration of virtual organisations
  • widely dispersed departments to create virtual organisations
  • creation of robust and flexible operational architectures
  • allowing constant access to computing and data resources

(Business Driven Information Systems, Baltzan et al, 2010)

Graphical explanation of grid computing: (http://www.nusacm.org/newsletter/v116.gif)


Thursday, March 18, 2010

Week Four: Weekly Questions



Chapter Four Questions: Ethics & Security

There are various ethical issues surrounding the use of information technology that businesses and users must be wary of. Such ethical concerns include the use and distribution of intellectual property. Intellectual property refers to the rights regarding an intellectual product for example an author’s writings or a firm’s patent. Copyright refers to an exclusive right to have access or to perform certain actions for example, downloading a song or accessing a copyrighted document. The topic of copyrights is another ethical issue surrounding information technology. The fair use doctrine is also an ethical issue surrounding the use of information technology. The fair use doctrine states that in certain cases, it is authorised or legal to use copyrighted material. For example, most textbooks state that only 10% of the book can be photocopied and released. Pirated software is another ethical issue surrounding the use of information technology. Pirated software refers to original programs that have been duplicated and distributed for an illegitimate profit. Counterfeit software is an additional ethical issue surrounding the use of information technology. This refers to programs and softwares that have been replicated by fraudulent companies to appear to be the same as another firms good or service, for example, the fake iPhone. Firms must ensure that they are aware of all these ethical issues and implement the necessary procedures to prevent such issues from having a damaging effect on their business.


Describe the relationship between an ‘email privacy policy’ and an ‘Internet use policy’.

There is an obvious relationship between email privacy policies and internet use policies implemented by businesses. An email privacy policy is a written statement illustrating the extent to which emails can be read by others and how the email server is to be used by employees e.g. not using ones email to distribute spam such as chain letters. Email privacy policies usually consist of a definition of whom the legitimate email users of a firm are, explanation of backup procedures, legitimate grounds for reading other’s emails and requests users to be mindful when attaching files to emails and opening attached files. As emails are accessed online, to ethically use email systems, a firm must ensure that its users adhere to its internet use policy. This policy includes general principles to be followed to ensure the proper use of the internet within a firm. Such policy describes the services available on the internet, the purpose of internet access, user responsibilities and the sanctions for violations. Therefore, it is evident that, for a user such as an employee to effectively and ethically use the firms emailing system, the user must have a thorough understanding of the expectations set by the firm in relation to the overall internet use.


Summarise the five steps to creating an information security plan

There are five general steps that may be followed by firms when creating an information security plan. Such steps are displayed below in the chart.


Example of American Express’ Internet Security Statement[1]


What do the terms authentication and authorization mean and how do they differ? Provide some examples of each term.

Authentication refers to a method implemented by the informational technology department of a firm to confirm the identities of the users accessing the network. Authentication refers to what the user is, has or knows and employs the use of biometrics such as face recognition, whereas, authorization refers to the process of giving a user permission to perform a particular action, for example, accessing certain files. There are various types of authentication procedures implemented by businesses. Such procedures can include the use of user ID’s and passwords, smart cards or tokens or fingerprint recognition. These various examples have different degrees of effectiveness for maintaining the security of a firm’s information. For example, a user token (a tool that sends a user a different password to type into a system each time the system is accessed) proves to be more effective than a traditional password system, which is easily hacked through the answering of secret questions etc. Authorization may allow an internet user such as an employee to gain access to a certain database, or to enable a user to access a specific website.

Ways of overcoming security risks:

YOUTUBE LINK: Description of Smart Cards:

What the Five main types of Security Risks, suggest one method to prevent the severity of risk?

The five main security risks faced by businesses include human errors, natural diasters, technical failures, deliberate acts and management failure. Human error is inevitable in a business and is not considered to be malicious or intentional. An example of a human error may be mistyping data into a computer system such as MYOB which would result in the wrong amount of pay being sent to an employee. A natural disaster is another example which may impose a security risk for a business. Examples of natural disasters may be floods, earthquakes or terrorist attacks. A disaster such as a major earthquake may physically affect a business or may just have a minor effect such as limiting internet access for a certain period. Firms must also be aware of the growing security risk of terrorism. Most large businesses have incorporated strategies and procedures for if such event did occur within the firm. Technical failures are another example of an inevitable security risk which businesses must be aware of. Technical failures may include software bugs such as viruses which are commonly transmitted through emails and other internet systems. Technical failures may also consist of hardware crashes. To prevent such risks from having a negative effect on the operations of a firm, the information security officer should implement routine checks on the databases and conduct physical checks on employee’s hard drives to ensure such security risk does not occur. Deliberate acts are also considered a key security risk facing firms. Deliberate acts may include sabotage or white collar crime. Sabotage refers to the intentional vandalism or misuse of information by employees for revenge or for ones own benefit. For example, an employee may be annoyed by the management system at their workplace, so in an act of revenge emails all of the firm’s important data to the firm’s competitors. White collar crime is normally considered to be a financial crime in which the employees of a firm may use their inside knowledge of the firm to inform people outside the organisation of important information. For example, an employee of a public business on the Australian Stock Exchange may inform their friends to swiftly sell their shares due to the financial state of the business. Lastly, management failure is also considered to be a main security risk faced by businesses. Management failure may be considered intentional or accidental and usually consists of a lack of procedure, lack of documentation and a lack of training. To ensure the management team of a business is correctly moving their business in the right direction, the managers must have consistent and adequate training to ensure they are aware of the goals of the firm and are aware of certain facets of the business, for example, the necessity to secure all of the firm’s information. To prevent the severity of a risk, such as human error, a business should employ ‘checks’ to ensure employees are correctly handling and distributing the businesses data. To prevent issues such as sabotage, a business could employ monitoring software that could oversee what emails are being sent to external and internal addresses. Such software is quite controversial but could be used to adequately oversee the processing of information and the movements of the employees within a firm.




Friday, March 12, 2010

Week Three: Questions

Week Three: Questions

What is an IP address? What is its main function?

An Internet Protocol (IP) address is a numerical marker assigned to internet devices on a particular network or a unique address given to every computer on any given network. IP addresses are assigned to each computer connected to the internet and can be either public or private but there numbers are totally unique. IP addresses play an integral function as they are implemented by routers that are systems used to transmit information from one computer to another over the internet. For example, when a message for example, an order is placed over the internet, the data is broken down into small fragments or packets which are sent to the receiving computer. Another example where packets of information are sent to another’s computer is through the transmitting of emails. According to Business Driven Information Systems (Baltzan et al, 2010), the total number of IP addresses globally is just over 4 billion. A domain name system is used to translate a URL into an IP address. For example, a user may type in www.google.com into the URL panel of Internet Explorer, and this is automatically converted into an IP address, allowing the website to be accessed.

Graphical Explanation of the processes involved with an IP address.[1]



  1. What is Web 2.0 and how does it differ from Web 1.0?

    1. Web 2.0 originated in 2004 and is also referred to as the Live Web. The system allows internet users to collaborate and share information on the internet. Web 2.0 systems also allow users to formulate and publish their own content on the World Wide Web. Common examples of Web 2.0 applications include social-networking sites such as facebook, video sharing sites such as youtube, blogs such as google blogger and mashups (a webpage combining data from two or more sources).

  1. Web 2.0 is referred to as the Live Web. Users can collaborate and build their own content. Web 2.0 differs dramatically from Web 1.0. Web 1.0 refers to the establishment of the World Wide Web. Web 1.0 was a simple system allowing the use of framesets, online guestbook’s, pixels in web browsers and HTML forms sent via email. [2] Below is a comparative analysis of Web 2.0 and Web 1.0[3].

    Web 1.0

    Web 2.0

    Was about reading

    Is about writing

    Was about companies

    Is about communities

    Was about client-server

    Is about peer to peer

    Was about HTML

    Is about XML

    Was about home pages

    Is about blogs

    Was text

    Is video

    Was dial up

    Is broadband

    Was IE

    Is FireFox


    Web 2.0 is considered to be an interactive approach to the internet, whereas, Web 1.0 was considered to be a 'passive' style of internet usage. The key difference between Web 2.0 and Web 1.0 is that in Web 2.0 (which is also referred to as a two-way web), users can easily interact with the website and create and add data. Common examples of Web 2.0 programs include file sharing programs such as Lime Wire and social-networking sites such as Facebook. These sites allow users to share files and to post comments, ultimately allowing them to have a greater interaction with certain programs or websites. Web 1.0 (also referred to as a one-way web) is a traditional format of websites where web masters such as newspaper journalists post data onto a website for viewing purposes only. Such data on a web 1.0 system cannot be manipulated (unlike Wikipedia) and data cannot be added to the final document published.

            1. What is Web 3.0?

                    1. Web 3.0 has been coined as the ultimate revolution of web usage and proposes to transform the internet into a database accessible by non-browser applications or by the semantic web. The semantic web is a proposed advancement of the World Wide Web in which information is worded so it can be read by software agents, allowing them to find and utilise information more readily. Web 3.0 proposes to use 'metadata'. Metadata refers to 'data of data' such as 'tags' used in to identify facebook users in a particular photograph. Tags allow the knowledge of data to expand, ultimately allowing the internet to be transformed into a database.


        1. It is believed that Web 3.0 or the Semantic Web will transform the internet into a database that publishes information in formats reusable and easily accessible. The Web 3.0 also allows an evolutionary path to artificial intelligence, for example, websites will be able to predict the hit songs by gathering information from other websites. The Web 3.0 or semantic web will also search for information using different mediums and move towards a 3D model of internet which could open new ways to connect via 3D shared sites.

                1. Comparison of Web 3.0, 2.0 and 1.0:[4]



          Describe the different methods an organisation can use to access information

          There are four key methods used by organisations to access information. The four common tools implemented by businesses today include the use of an intranet, extranet, portal and a kiosk. An intranet is an internal segment of a firm’s internet service inaccessible to external users. Intranets provide access to application software and specific information to the employees of a firm and prove to be an effective mechanism for any firm, regardless of their size as it provides a core structure or meeting place where employees can access information for example their rosters or information on marketing campaigns. The use of intranet services is evident as Citigroup Global Corporate and Investment Banking Division uses such service to provide its IT department with specialised information in relation to its IT projects and has allowed the firm to gain a 15% improvement in its IT project delivery.[5]

          Extranets are also a common method employed by organisations to access information. Extranets are intranet services available to direct external parties including customers, suppliers and partners. Information provided through extranets may include updates on the shipment of a product purchased by a consumer or the publication of prices for different products offered by a business.

                        1. Ericsson Intranet[6]


                  A portal is a website that offers links to an array of resources such as other internet websites. Portals may be classified as general or specialised/niche. For example, google is considered to be a general portal offering a vast selection of website URL’s to users, whereas, the website, garden.com provides links for individuals or firms interested in gardening. Portals prove to be a very important resource commonly used by businesses to access a large array or variety of information.

                1. A kiosk is another method that may be implemented by organisations to access information. A kiosk is a public computer system consisting of simple steps for navigation (commonly through the use of touch-screens). One of the most common forms of kiosk’s used by businesses include self-check-in airline kiosks. Such kiosks allow employees to easily access information relating to their flight such as their seat number, the gate of departure and the time of departure and arrival. The picture below[7] displays an example of Air New Zealand’s check-in kiosk service which allows individuals such as business employees to personally check-in and deposit their bags at the ‘bag drops’.




                  What is eBusiness and how does it differ from eCommerce?


                  E-business refers to the conduct of business transactions and the exchange of business information on the internet, whereas, e-commerce refers to the use of internet to solely order and pay for goods or services. E-commerce is considered to be a sub-set and is differentiated between e-business as it only refers to the payment of goods or services. E-business however, also consists of the transmitting of information over the internet for example, a financial institution such as the Commonwealth Bank allowing its customers to review its accounts online via net banking. E-business and e-commerce prove to be a useful asset for businesses as such processes allow enhanced productivity and convenience. Other benefits of e-business and e-commerce include:

                    • improved accuracy and delivery of information regarding goods and services
                    • access to products 24/7
                    • enhanced market intelligence
                    • creation of improved distribution channels
                    • expansion of consumer base

          List and describe the various eBusiness models

          E-business model refers to the different forms in which internet transactions can occur. There are four key eBusiness models implemented by businesses. Such models include Business-to-business (B2B), Business to consumer (B2C), Consumer to business (C2B) and Consumer to consumer (C2C). B2B transactions refer to the process of businesses buying from and selling to each other over the internet through electronic marketplaces such as officeworks.com or directly from the business. The B2B business model is the most common model in the Australian Business Industry, representing 80% of transactions (Baltzan et al). B2C transactions apply to any firm that sells its goods or services directly to consumers over the internet. Corporate Express is a leader in this type of transaction. The firm sells office supplies, furniture and other products to consumers and was reported to achieve an annual turnover of $1.3 billion in 2007.[8] B2C transactions can be completed using an e-shop (an online retail store such as amazon.com) or via an e-mall (a database consisting of various e-shops allowing a variety of deals such as www.tripadvisor.com). Another e-business model is the C2B model. This applies to any consumer that markets a product or service to a business over the internet. Examples may include a photographer selling a business its photos over iStockphoto.com or simply an individual answering a poll through a survey website. The final e-business model evident in the commercial world is the C2C model. This model refers to the process of consumers selling goods or services to other consumer through internet websites such as eBay. Such products can be sold through e-auctions (use of consecutive bids), forward auctions (auction where highest bidder wins) or reverse auctions (auction where lowest bidder wins). C2C communities consist of communities of interest which includes the collaboration of people with a similar hobby such as stamp collecting. Communities of relations are another C2C community channel which consists of people who collaborate as they share certain life experiences such as cancer patients. Communities of fantasies are another example of a C2C community which consists of people who participate in imaginary environments such as fantasy football teams[9]. It is essential to understand the different eBusiness models as different approaches to marketing are implemented accordingly.


          List 3 metrics you would use if you were hired to assess the effectiveness and efficiency of an eBusiness website.


          There are various metrics implemented by managers to evaluate the effectiveness and efficiency of eBusiness websites. Such metrics or tools consist of cookies, ‘click-throughs’ and banner ads. A cookie is a small packet of information deposited on a hard drive that has been sent by a World Wide Web browser. The information contained in this ‘packet’ consists of information regarding a customer and their web activities without their knowledge or consent. Cookies can therefore be used as an analytical tool to measure how commonly a firm’s e-business site is visited per day or per hour and would allow a firm to evaluate how effective their site proves to be in intriguing users or potential customers. A ‘Click-through’ is an internet tool used to count the amount of users who access their e-commerce site by clicking on an advertisement. By analyzing how many users clicked the firms ad, they can evaluate how well its placement is and how effectively it is attracting customers. Even though such mechanism allows firms to gather how many people clicked their ad, it does not include any information relating to the time spent on the advertisement or whether or not the user was satisfied with the information contained in the ad. A banner-ad is another metric implemented by businesses to measure the effectiveness and efficiency of their eBusiness website. A banner-ad advertises the products or services sold by the eBusiness on another webpage, for example in a panel at the top of the ninemsn.com.au website. Advertisers can monitor how often customers click on their banner ads, allowing them to be connected the eBusiness being marketed, thus, allows the firm to evaluate the efficiency and effectiveness of the ad and conclude how the ad is reaching its targeted audience. Other metrics that can be used to assess the effectiveness and efficiency of an eBusiness website include:

          - the number of page views

          - duration spent on the firms website

          - the demographical information of visitors to website

          - number of abandoned shopping carts

          Banner Advertisement [10]



                  1. Outline 2 opportunities/benefits and 2 challenges faced by companies doing business online.

          There are various opportunities and benefits faced by companies conducting online business. Such benefits include increased convenience and an increased global reach. Through the use of eBusinesses, firms and customers are able to have an easy and convenient access of the firm’s website and information 24 hours a day, 7 days a week. Another benefit of eBusinesses is the improved ability firms have at expanding their consumer base. Both large and small firms who wish to sell products online through websites such as eBay or other e-markets are able to sell their goods or services internationally from countries ranging from Africa to America. Through the increased global reach eBusinesses allow, firms are able to enter new geographical locations, ultimately allowing revenue maximization. Even though such benefits exist, there are also challenges firms conducing business online must consider. Such challenges include security risks and the necessity to adhere to taxation rules and guidelines. As transactions are commonly performed online, businesses must ensure that they protect the security of their consumers and implement well-maintained privacy and security systems to prevent scams such as credit-card fraud from occurring in online transactions. Online bodies that monitor transactions such as Pay Pal have stern programs enforced to prevent such issues. Another challenge eBusinesses commonly face is also the necessity for them to adhere to strict taxation rules. As online transactions are a fairly new concept, the internet is not yet subject to the strict levels of taxation common to traditional businesses. As the online marketplace remains considerably duty-free or tax-free, businesses must consider that taxes may be implemented in the future and they will have to account for this in their prices. Even though such challenges exist, overall, the internet proves to be an advantageous and profitable source for business.

          Other opportunities and challenges are listed below:


          Opportunities:

          - self-running business: whilst employees are not working, the firm is still running online 24/7 in a global market (highly accessible)

          - improved content information available online: web 2.0 allows users to comment and rate various products. For example, on eBay, users can leave feedback describing the quality of certain products purchased from a seller. Through the leaving of feedback and a thorough description of products for sale, consumers can make more informed decisions regarding their purchases.


          Challenges:

          - many firms are global in the contemporary commercial world, thus firms that wish to enter the global market must maintain a competitive edge

          - currency fluctuations must be foreshadowed and accounted for

          - different languages: businesses selling online must adequately be able to converse with their market base

          - online businesses must have a stratified method enforced to ensure the firm is able to meet the demands for certain products (cannot have customers waiting due to lack of stock)

          [1] http://www.3cx.com/phone-system/images/3CX_ip-pbx-overview.jpg, 3CX, 2009

          [2] http://www.weballey.nl/forms/index.html, Gerben Hoekstra, 2007

          [3] http://www.darrenbarefoot.com/archives/2006/05/web-10-vs-web-20.html, Darren Barefoot, 2008

          [4] http://www.theappgap.com/wp-content/uploads/2008/03/web1to31.jpg Pod Press, 2007

          [5] Info on 3.9M Citigroup, Money, 6 June 2005

          [6] http://intranetblog.blogware.com/Ericsson%20Group%20Intranet%20case%20study.jpg, Toby Ward, April 2007

          [7] http://www.rfidjournal.com/ezimagecatalogue/catalogue/phpe2DGTK.jpg, Dave Friedlos, Nov 2008

          [8] www.ce.com.au, Corporate Express, 2010

          [9] Business Driven Information Systems, Baltzan et al (2010), Page 126

          [10] http://www.techfuels.com/attachments/general-internet-terms/1072d1206441399-banner-ad-banner-ad.jpg, VBulletin, 2008