Monday, April 5, 2010

Week Five Questions - Ethics and Security

1. Explain the ethical issues surrounding information technology.

A.
When information technology is used in a business it faces many of the same ethical issues as the rest of the business, including privacy, accurate data records and property. However they do need to be put into an information technology realm. Examples of ethical issues involving information systems include; Intellectual property, where an employee designs and develops an idea or product for a company, who owns the intellectual property of the idea? It also includes the monitoring of employees while at work to make sure that only properly licensed software is being used by the company, or if they are using someone else's intellectual property there are proper ways for the use to be reported. This monitoring of employees can however cause problems with employee privacy.


2. Describe the relationship between an 'email privacy policy' and 'internet use policy'

A.
A privacy policy that a company has in place describes how certain systems are to be used and the right of the company to have access to your information at work. A clear example of this would be the policy a company has in place in regard to emails at work, for example a companies policy may outline that they have the right to check your emails at anytime, although it will not be done unless suspicion has been raised. The policy may also go into details such as forbidding employees from using internal mail lists for spam emails, for things such as goods for sale.

The 'internet use policy' on the other hand regulates the way in which employees use the internet while they are at work. This policy may forbid employees from looking at non-work related websites or from using social networking websites for personal use. The policy may also go into detail forbidding employees from using the internet at work to run their own online business.


3. Summarise the five steps to creating an information security plan.

A.
- Develop the information security policies
Identifies who is responsible and accountable for designing and implementing the organisation's information security policies. This can include implementing rules such as mandatory logging off for breaks or putting in an automatic sign off after 5 minutes of inactivity.

- Communicate the information security policies.
Train all employees on the policies and establish clear expectations for following the polices. An example of this can be the issuing reprimands to employees who leave computers unsecure.

- Identify critical information assets and risks.
Require the use of user IDs, passwords and anti-virus software on all systems. Also have necessary firewalls on all computers that have external links. The inclusion of intrusion detection software allows for attacks to be identified quickly and responded to.

- Test and re-evaluate risks.
Continually perform security reviews, audits, background checks and security assessments. This testing can be done by a third party company, who can then continue with the on-going maintenance of the system.

- Obtain stakeholder support
Gain the approval and support of the information security policies from the board of directors and all stakeholders.


4. What do the terms; authentication and authorization mean, how do they differ, provide some examples of each term.

A.
Authentication refers to proving who you are. It can be either something the user is such as facial recognition or retina scans, something the user knows such as a user ID and password or something that the user has such a smart card or token card.

Authorization is concerned with the level of access you have once you are within the system. Once you have authenticated who you are then you will have a level of authorization which determines what you are allowed to have access to. Examples of this would be those that are not in the accounting department may not have authorization to have access to he financial records.


5. What are the Five main types of Security Risks, suggest one method to prevent the severity of the risk?

A.
- Human error.
To minimise the damage that can be done from this risk a company should put in the necessary training programs for all employees that could possibly use the system.

- Technical failure.
Where a technical failure occurs have adequately trained professionals on hand to deal with the problem. This will minimise the time the system is down and decrease the cost as well as the amount of time the system is unprotected.

- Natural disaster.
Where an unforeseeable natural disaster occurs a company should have the necessary back ups and disaster recovery systems in place to minimise the damage.

- Deliberate act.
This is caused by spam, spyware or sabotage by an employee. This can be dealt with by giving employees the necessary training on how to handle spam and spyware on their computer. Companies can try to avoid sabotage by employees by running background checks as well on-going monitoring of employee activities.

- Management failure.
By enforcing that all the necessary training is done down the management hierarchy, it will limit the damage that will be done by management failure. By also having an adequate reporting system to clearly show when the necessary training has been done.

Week Four Questions - eBusiness

1. What is an IP Address? What is it's main function?

A.
An IP address is a unique number assigned to each individual computer. It can be used either public or private. IP address now consist of both letters and numbers, this means there is enough possible combination's for the future. It's main function is that is the method in which computers 'talk' to each other.


2. What is Web 2.0, how does it differ from 1.0?

A.
Web 2.0 refers to the current form of the internet. One which allows us to read/write on the web and makes available technology for social networking, blogs etc. 2.0 has been referred to as the 'business revolution in the computer industry' as reliance on the internet has increased so much.

It differs from 2.0 in the level that it allows users to interact with a website and have an effect on its content. This view shows 2.0 as being interactive, while 1.0 was seen as a more passive system.


3. What is Web 3.0?

A.
Web 3.0 is the what they are calling the evolution of the web and what it will become. One of the focuses of 3.0 is to make the internet more of a database using metadata, making more information more available from non-browser applications. It is also the development of artificial intelligence. With 3.0 it could become possible to search for a video using only a photo with no description.


4. Describe the different methods an organisation can use to access information.

A.
Four different methods that can be used to access information are:
INTRANET
This is a portion of the internet a company uses privately. It is there for internal use use, this allows companies to give their employees access to applications over the internet, while still having the information protected from the general public.

EXTRANET
This is the same as an Intranet in that allows some users to access to information while still having it protected from the general public. The difference is that the information is now made available to not employees, but also strategic allies such as customers, parent companies, strategic partners. This technology allows for the easier communications between the parties concerned.

PORTAL
A portal is a website that allows access to a broad array of information. Through this combination of services it allows easier access to things such as emails, updates, events etc. Examples of portals are ninemsn and the university homepage. The aim of the portal is to be tailored to the needs of each person coming into the portal.

KIOSK
A kiosk is a publicly accessible computer system that has been set up to allow users to access information through interactive browsing. Examples of these are the computers that are made available within libraries to search databases as well as library content.


5. What is eBusiness, how does it differ from eCommerce?

A.
eBusiness is a term that refers to the conducting of business over the internet. It is different to eCommerce, as eCommerce only refers to buying and selling of goods and services over the internet. eBusiness however has a much broader meaning, as it not only means buying and selling of goods over the internet, but it also takes in serving customers and collaborating with other businesses.


6. List and describe the various eBusiness models?

A.
BUSINESS-TO-BUSINESS (B2B)
This refers to businesses buying from and selling to each other over the internet. Electronic marketplaces have caused an increase in the amount of B2B transactions

BUSINESS-TO-CONSUMERS (B2C)
This applies to any business that sells its products or services to consumers over the internet. An example of this is the Apple online store.

CONSUMER-TO-BUSINESS (C2B)
This refers to any consumer that sells a product or service to a business over the internet. An example of this would be a photographer selling his/her photos online to other companies.

CONSUMER-TO-CONSUMER (C2C)
This applies to sites primarily offering goods and services to assist consumers interacting with each other over the internet. A clear example of this is eBay, this site links like minded buyers and sellers.


7. List 3 metrics you would use if your were hired to assess the effectiveness and efficiency of an eBusiness web site?

A.
Metrics that could be used to analysis the effectiveness of a site could be; The number of page views, this shows the whole number of people visiting the site. Time spent on the site, this will show if once people are on the site they are finding it useful/interesting. The number of abandoned shopping carts the site has, this could show that the purchasing process in place is to difficult or intrusive by asking to many questions. Another method could be analysing the type of the visitors the site is receiving, this could be done by analysing cookies or surveys.


8. Outline 2 opportunities and 2 challenges faced by companies doing business online?

A.
Opportunities that eBusiness allows for:
- Business remain open 24 hours a day, 7 days a week, allyear round with no extra cost. This availability can only increase business.
- If the site is efficient, has good services and is reliable, it will increase customer loyalty.
- It allows another method of getting information on your customers and allows greater on-going access to them.

Challenges that eBusiness can cause:
- The protection of your consumers against unsolicitated goods, illegal or harmful goods must be established and maintained as the business continues to operate.
- Companies must have greater protection of their assets as the internet provides universal access. However this security must still allow the site to work properly and efficiently without causing excessive complexity.

Week Three Questions - Strategic Decision Making

1. Define TPS & DSS, and explain how an organisation can use these systems to make decisions and gain competitive advantages.

A.
Transaction Processing Systems (TPS) are concerned with the fundamental operations a business undertakes. Examples of these operations are sales, reciepts, payroll and credit decisions. Two ways these transactions can be managed is by the Batch or Online methods. Batch processing is where data is collected and then prepared periodically such as nightly or hourly. Online processing sorts and prepares data in real time as it happens. The information from TPS is then used for all other information systems.

Decision Support Systems (DSS) use the data provided from the TPS to inform manages so as they can make better decisions. This is particularly helpful when managers are dealing with complex unstructured problems such as estimating the future cash flows from long-lived assets. The DSS summarises the information provided from a range of TPS, this assists manager by giving them a greater understanding of the business activities.

Both the TPS and DSS should be used by managers so as they can make better decisions as both systems give information on the current operations of the business. Through having a better understanding of the business managers will be in a better situation to make informed decisions, which would be more likely to yield a better result.


2. Describe the three quantitative models typically used by Decision Support Systems (DSS).

A.
SENSITIVITY ANALYSIS
Studies the effect that changes in one (or more) part of the model will have on the rest of the model. This shows how different sections of a business, will affect other sections.
WHAT-IF ANALYSIS
Checks the impact of a change in an assumption on the proposed solution. Such as what would happen if sales increased or decreased from what is predicted.
GOAL-SEEKING ANALYSIS
Shows what inputs will be needed to achieve a goal. This helps to outlay the cost a certain goal may have for a company.


3. Describe a business process and their importance to an organisation.

A.
A business process is a standardised set of activities to complete a procees within a company. A business process would be used to process a customers order. Business processes can used in variety of situations such as accounts payable, hazardous waste management and health care benefits.

Through implementing businesses process a company can become more efficient and cut costs. They will also help streamline and minimise costs of a business. For these reasosns alone it is important for businesses to have good business processes.


4. Compare business process improvement and business process re-engineering.

A.
Business process improvement is crucial for a business to stay competitive in today's ever evolving marketplace. Business process improvement attempts to comprehend and measure current processes in place and determine what improvements are necessary.

Business Process Re-Engineering (BPR) differs from business process improvement as it assumes the current process is irrelevant. This allows designer to seperate themselves from current operating methods and create something from the beginning. This method of analysis and redesign of work flow allows for a system that may be better capable of demand in the future.


5. Describe the importance of business process modelling (or mapping) and business process models.

A.
Business process modelling allows a business to map out each process that it undertakes and identify all their outputs. A business process model is necessary as technology can make the processes invisible, so the business process model makes all the processes visible. Business process modelling shows the activities as a flowchart an example of this is the To-Be and As-Is model shown here:


Both business process modellling and business process models provide process anlaysis and information necessary for managers to make informed decisions and have an understanding of operations undertaken within the business.