Tuesday, September 28, 2010

Week 7 Blog Questions

1. List, describe, and provide an example of each of the five characteristics of high quality information.

The 5 Characteristics of high quality information include:
1.Accuracy - Ensuring that all the values are correct (i.e names correctly spelt)

2.Completeness – Ensuring there are no values missing (i.e all addresses are complete, including street, city, state, and zip code)
3.Consistency –Ensuring that the aggregate or summary information agrees to the detailed information.
(i.e all total fields equal the true total of the individual fields)
4.Uniqueness – Ensuring that each transaction, entity, and event is represented only once in the information (i.e ensuring that there are no duplicate names)
5. Timeliness- Ensuring that all information is current with regards to the business requirements. (i.e all information is updated regularly)
.(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)


2. Define the relationship between a database and a database management system.

A database is an organised collection of data and Database management systems are a group of programs that manipulate the database and provide an interface between the database and its users and other application programs..(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)

3. Describe the advantages an organisation can gain by using a database.

Advantages that an organisation can gain by using a database is that the those working for the organisation can search the database for the information they are looking for and they can access it in a timely and orderly manner.


4. Define the fundamental concepts of the relational database model.

The fundamental concept of the relational database model are unique records and primary keys. To ensure that each record is unique in each table, one field can be set up to be a Primary Key field. A Primary Key is a field that that will contain no duplicates and no blank values. (Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)


 
5. Describe the benefits of a data-driven website.


The benefits of a data-driven website are:
Development
Content management
Future expandability
Minimising human error
Cutting production and update costs
More efficient
Improved stability
Real time info like stock levels &price changes


Week 6 Blog Questions

1.What is information architecture and what is information infrastructure and how do they differ and how do they relate to each other?

Information Architecture is a general plan of how IT is going to be used within the organisation and Information infrastructure is the actual implementation of the systems which the organisation will be using.(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)


2.Describe how an organisation can implement a solid information architecture

Implementing a solid information architecture within the organisation should focus on the following:
Backup and recovery, Disaster recovery & Information security and how and where they can be accessed properly.(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)

3.List and describe the five requirement characteristics of infrastructure architecture.

Reliability - Refers to how systems function and ensures that they are functioning correctly and are providing accurate information.
Scalability- Refers to the systems ability to adopt growth requirements
Flexibility- Refers to the changing demands of business
Availability- Refers to how systems can be accessed by all involved (i.e - employees and customers).
Performance- Refers to how fast a system can perform a certain task.
(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill)



5.What is an event?

An event detects threats and opportunities and alerts those who can act on the information.(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)

6.What is a service?

Services are more like software products in that they must appeal to a broad audience and need to be reusable if they are going to have an impact on productivity.(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)



Week 5 Blog Questions

Explain the ethical issues surrounding information technology.

The ethical issues affected by surrounding technology include:

  •  Intellectual property
  • Copyright
  • Fair use doctrine
  • Pirated software
  • Counterfeit software
Describe a situation involving technology that is ethical but illegal.


 A situation involving technology  that is ethical but illegal would a someone buying software needed to run a certain program and and making a copy for their friend. 

Describe and explain one of the computer use policies that a company might employee


 A company may not allow employees to send or receive personal emails using their corporate email account. the company may choose to monitor emails sent and received.

What are the 5 main technology security risks?


 The 5 technology security risks include:
1. Human Errors
2. Natural Disasters
3.Technical Failures
4. Deliberate Acts
5. Management Failures

Outline one way to reduce each risk.

1. Human Errors - Put more controls in place that are a way of double checking work.


2. Natural Disasters - Ensure that work is always backed up and stored so that in the event of a natural disaster the system can be restored with minimal data loss.

3.Technical Failures - Ensure that software updates are installed regularly.

4. Deliberate Acts- The company should install anti virus software to avoid others hacking into their system

5. Management Failures- Ensure that management and all employees know how to operate the system properly by having regular training programs.

  
What is a disaster recovery plan, what strategies might a firm employee?

Disaster recovery plan that a firm should employee should be that the back up of data is easily accessible in the event of a disaster happening and that there is protocol put in place that all staff know to follow.

Week 4 Blog Questions

1. What is an IP Address? What is it’s main function?

An IP Address is an Internet protocol that allows data to move around the Internet

2. What is Web 2.0, how does it differ from 1.0?
Web 1.0 is the generation of web sites and web applications that are mostly static or with limited functionality, and with limited participation, interaction and collaboration and Web 2.0 involves are rich user experience and participation, dynamic content, metadata, web standards and scalability, openness, freedom and collective intelligence.(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)

3. What is Web 3.0?

Web 3.0 uses the concept of Tagging to build information about you, your devices talk to each other and build intelligence about you.(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)

4. What is eBusiness, how does it differ from eCommerce?
e-Business refers to the conducting of business on the Internet including, not only buying and selling, but also serving customers and collaborating with business partners and e-Commerce refers to the buying and selling of goods and services over the Internet .(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)

5. What is pure and partial eCommerce
Brick-and-mortar organizations are purely physical organizations.
Click-and-mortar organizations are those that conduct some e-commerce activities, yet their business is primarily done in the physical world. i.e. partial EC..(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)

6. List and describe the various eBusiness models?
The various eBusiness models include:
B2B - Business to business
B2C - Business to consumer

7. List and describe the major B2B models?
The major B2B Models include is the sell-side e-marketplace which is a Web-based niche marketplace where 1 company sells to many business buyers from e-catalogs or auctions, frequently over an extranet (Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)

8. Outline 2 opportunities and 2 challenges faced by companies doing business online.
Opportunities for companies doing business online could include:
1. easier method of purchasing and conducting business.
2. companies products could be viewed globally.
Challenges faced by companies doing business online could include:
1.Security risks are higher
2.Protecting consumers would be difficult.

Week 3 Blog Questions

1. Define TPS &DSS, and explain how an organisation can use these systems to make decisions and gain competitive advantages.

Transaction Processing System (TPS) includes all basic day to day information of a business. TPS functions at an operational level of the business.(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia) DSS is the decision support system that models information from analysts to assist managers and others in a capacity of making decisions for the organisation and as a result can help them put their organisation in a more competitive position against other organisations of the profession.


2. Describe the three quantitative models typically used by decision support systems.

The 3 quantitative models used by decision support systems are:
1- What-if analysis "which checks the impact of a change in an assumption on a proposed situation" so that means management can formulate an idea see the impact it will have if the idea is implemented..(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)
2- goal-seeking analysis "finds the inputs necessary to achieve a goal such as a desired level of output". This means that management can find out for example how much a certain expense will impact the business if they want to achieve a certain amount profit. (Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)
3- Sensitivity analysis "is the study of the impact that changes in one or more parts of the model have on other parts of the model".(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)

3. Describe a business process and their importance to an organisation.

"A business process is a standardised set of activities that accomplish a specific task".(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia). Business processes are important to an organisation because if the organisation does not have a defined business process they will not be able to achieve a proper outcome.

4. Compare the business process improvement and business process re-engineering.

Business process improvement "attempts to understand and measure the current process and make performance improvements accordingly" and the business process re-engineering "is the analysis and redesign of workflow within and between  enterprises".(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)

Week 2 Blog Questions

1. Explain information technology’s role in business and describe how you measure success?
 The role of Information technology within a business is to improve productivity, minimise cost and help in quality decision making. 
Success is measured through the efficiency and effective metrics. The efficiency metric measures the performance of the system (eg how fast it works) and the effectiveness metrics measures the impact that the system has on the business.(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)

2. List and describe each of the forces in Porter’s Five Forces Model?


http://consumerpackagedgoods.blogspot.com/2009/06/forces-shaping-packaged-food-industry.html

1.Buyer power- buyer power is high when consumers have more of a choice of products to choose from and low when there are not so many choices. Loyalty programs is a method used to reduce buyer power. Loyalty programs are designed to offer some sort of reward to consumers who purchase more of their products.
2.Supplier Power is when one particular supplier is the main distributor of products to consumers, therefore making buyer power low as there is no variety for the consumer to choose from.
The supplier chain is made up of all elements that are directly or indirectly  in the process of making products and raw materials..(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)



3. Threat of Substitute is normally high when there are different types of products that all serve or provide the same service (examples of this are soft drinks and the different brands they come in) and is low when there is only one of a particular product that is designed for a specific purpose (examples of this are certain types of medicine that are one of a kind for a particular cure).

4.Threat of New Entrants is high when a new competitor can enter into the market easily and low when there entry barriers that to prevent new competitors entering. 
5.Rivalry Among existing competitors is high when the competition in the market is fierce and is low when the competition is not so fierce.(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)

Describe the relationship between business process and Value chains

Business Processes are "a set of standardised activities that accomplish a specific task". Value Chains "values an organisation as a series of processes, each of which adds value to the product or service" Therefore, Value chains incorporate an organisations business process.(Baltzan P, Phillips A, Lynch K, Blakey P, 2010 Business Driven Information Systems, 1st edn, McGraw-Hill Australia)

Compare Porters 3 generic strategies


http://qwickstep.com/search/generic-strategies.html?p=8