Monday, March 29, 2010

Week 6 Questions

What is information architecture and what is information infrastructure and how do they differ and how do they relate to each other?

Information architecture identifies where and how important information, such as customer records is maintained and secured and is very useful for planning. Information infrastructure is the actual implementation that will provide for effective information systems, including the hardware, software, services and people involved. These differ because one is a plan and the other is the implementation of the plan. They relate to each other because there can not be one without the other.

Describe how an organisation can implement a solid information architecture

For an organisation to have a solid information architecture they need to have:
  • A backup and recovery system: A backup is an exact copy of a systems information and Recovery is the ability to get a system up and running in the event of a system crash or failure
  • A disaster recovery plan: A detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood.
  • Information security: Such as managing user accounts and keeping up to date antivirus software and patches.

List and describe the five requirement characteristics of infrastructure architecture.

The five requirement characteristics of infrastructure architecture are:
  1. Flexibility: The ability to meet all types of business changes
  2. Scalability: How well a system can adapt to increased demands and meet growth requirements.
  3. Reliability: Ensures all systems are functioning correctly and providing accurate information. High accuracy, low accuracy puts organisations at risk.
  4. Availability: Addresses when systems can be accessed by users. This ensures business continuity
  5. Performance: Measures how quickly a system performas a certain process or transaction.

Describe the business value in deploying a service oriented architecture

A service oriented architecture is a business driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services. By using a service orientated architecture businesses are able to innovate by ensuring that IT systems can adapt quickly, easily and economically to support rapidly changing business needs.

What is an event?

An event is the eyes and ears of the business expressed in technology- they detect threats and opportunities and alert those who can act on the information.

What is a service?

A service must appeal to a broad audience and need to be reusable if they are going to have an impact on productivity.

What emerging technologies can companies use to increase performance and utilise their infrastructure more effectively?

The emerging technologies that companies can use to increase performance and utilise their infrastructure more effectively are Virtualisation and Grid Computing. Virtualisation is a framework for dividing the resources of a computer into multiple execution environments. It is a way of increasing physical resources to maximise the investment in hardware. Grid Computing is an aggregation of geographically dispersed computing, storage and network resources, coordinated to deliver improved performance, higher quality of service, better utilisation and easier access to data


All answers came from Business Driven Information Systems (Baltzan, Phillips, Lynch, Blakey)

Saturday, March 27, 2010

Week 5 Questions

Explain the ethical issues surrounding information technology.

Information ethics are concerned with the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution and processing of information itself. Ethical issues surrounding information technology include: Privacy- the interest of a person in protecting their life from unwanted intrusion and public scrutiny; and Confidentiality- the principle that certain information will remain outside the public domain.

Describe the relationship between an ‘email privacy policy’ and an ‘Internet use policy’.

An email privacy policy is where companies can mitigate many of the risks using by electronic messaging systems. Where an Internet use policy contains general principles to guide the proper use of the internet.

Summarise the five steps to creating an information security plan

The five steps of creating an internet security plan include:

1. Developing the information security policies- Identify who is responsible and accountable for designing and implementing the organisations information security policies

2. Communicating the information security policies- training all employees on the policies and establishing clear expectations for the following policies.

3. Identifying critical information assets and risks- requiring the use of user ID's passwords and antivirus software on all systems

4. Testing and re-evaluating risks- continually perform security reviews, audits, background checks and security assessments

5. Obtaining stakeholder support- gain the approval and support of the information security policies from the board of directors and all stakeholders

What do the terms; authentication and authorization mean, how do they differ, provide some examples of each term.

Authentication: a method for confirming user identities.

Authorisation: the process of giving someone permission to do or have something.

Authentication and authorisation differ as Authentication is for confirming an identity and Authorisation is giving permission to use details. Examples of these terms are use of names, credit card details, birth dates and addresses.

What are the Five main types of Security Risks, suggest one method to prevent the severity of risk?

The five main types of security risks are:

1. Identity Theft- the forging of someones identity for the purpose of fraud

2. Phishing- a technique used to gain personal information for the purpose of identity theft, usully by means of fraudulent email.

3. Tokens- small electronic devices that change user passwords automatically

4. Smart Card- a device that is around the same size as a credit card, contains embedded technologies that can store information and small amounts of software to perform some limited processing/

5. Biometrics- the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice or handwriting.

To help prevent risk change passwords regularly and keep anti virus software up to date.

All answers came from Business Driven Information Systems (Baltzan, Phillips, Lynch, Blakey)

Monday, March 15, 2010

Week 4 Questions

What is an IP Address? What is it’s main function?
An IP address is how information gets to computers. It is the basic communication language or protocol of the internet. It can also be used as a communications protocol in a private network.

What is Web 2.0, how does it differ from 1.0?
Web 2.0 is a set of economic, social and technology trends that collectively form the basis for the next generation of the internet. Web 2.0 differs from 1.0 because web 1.0 is one way published and we don't get involved. Web 2.0 is where we get involved in the internet.

What is Web 3.0?
Web 3.0 is the term given to describe the evolution of web usage and interaction among several separate parts. Web 3.0 will transform the web into a database, search for information using different medias and will use the concept of tagging to build information about people.

Describe the different methods an organisation can use to access information
The different methods that an organisation can use to access information are the:
1. Intranet: an internalised portion of the internet protected from outside access, that allows an organisation to provide access to information and application software to only its employees
2. Extranet: an intranet that is available to strategic allies
3. Portal: a website that offers a broad array of resources and services
4: Kiosk: a publicly accessible computer system that has been set up to allow interactive information browsing

What is eBusiness, how does it differ from eCommerce?
eBusiness is the conducting of business on the internet, while eCommerce is the buying and selling of goods and services over the internet

List and describe the various eBusiness models? (Hint: B2B)
There are four eBusiness models:
1. Business to Business: applies to businesses buying from and selling to each other over the internet
2. Business to Consumer: applies to any business that sells its products or services to consumers over the internet
3. Consumer to Business: applies to any consumer that sells a product or ser ice to a business over the internet
4. Consumer to Consumer: applies to sites primarily offering goods and services to assist consumers interacting with each other over the internet

List 3 metrics would you use if you were hired to assess the effectiveness and the efficiency of an eBusiness web site?
If I was hired to assess the effectiveness and efficiency of an eBusiness web site I would use the following metrics:
1. Cookie: a small file deposited on a hard drive by a website containing information about customers and their web activities
2. Click through: to count the number of people who visit a site of the advertiser
3. Banner ad: advertises the products and services of another business, usually another dot-com business

Outline 2 opportunities and 2 challenges faced by companies doing business online?
Two opportunities of doing business online are: it is highly accessible as it operates 24 hours a day, 7 days a week and it has increased convenience because it automates and improves many of the activities that make up a buying experience.
Two challenges of doing business online are: increasing liability because internet commerce law us vaguely defined and varies country to country and consumer protection because consumers must be protected against unsolicited goods and communication, illegal and harmful goods, insufficient information, invasion of privacy and cyber fraud



All answers came from Business Driven Information Systems (Baltzan, Phillips, Lynch, Blakey)

Week 3 Questions

Define TPS & DSS, and explain how an organisation can use these systems to make decisions and gain competitive advantages

A TPS is a Transaction Processing System. This records transactions within a business such as an EFTPOS machine. A DSS is a Decision Support System. This allows managers to make strategic decisions based on data. By doing this businesses can gain competitive advantages because they are able to see where their strengths and weaknesses lie.

Describe the three quantitative models typically used by decision support systems.

Sensitivity analysis: model that looks at what will happen to the overall result when a variable is changed

What if analysis: model that tests the impacts of an assumption on the proposed solution

Goal seeking analysis: model that helps determine how to make x profit- how many units need to be sold

Describe a business processes and their importance to an organisation.

A business process is a standardised set of activities that accomplish a specific task. A business process is important to an organisation because it helps the way that the business functions and gives the business purpose

Compare business process improvement and business process re-engineering.

Business process inprovement: Looks at current processes and and makes small improvements or changes. While business re-engineering assumes that all business processes are no longer needed

Describe the importance of business process modelling (or mapping) and business process models.

Business process modelling is the activity of creating a detailed flowchart or process map of a work process, showing its inputs, task and activities in structured sequence. A business process model is a graphic description of a process showing the sequence of process task. Business process modelling and business process models are important because they help to expose process detail in a controlled matter, encourage conciseness and accuracy, focus attention and provide an analysis.



All answers came from Business Driven Information Systems (Baltzan, Phillips, Lynch, Blakey)

Thursday, March 4, 2010

Week 2 Questions

Explain information technology’s role in business and describe how you measure success?

The role of information technology in business is very important. IT is very important in business because IT is everywhere.

IT success is extremely hard to measure. So by determining the return on investment of the new computer is very difficult. When determining the success of IT systems, there are several questions that need to be asked. These are:

  • Is the internal IT operation performing satisfactorily?
  • Should I outsource some or all of the IT operations?
  • How is my outsourcer performing?
  • What are the risk factors to consider in an IT project?
  • What questions should be asked to ensure an IT project proposal is realistic?
  • What are the characteristics of a healthy project?
  • Which factors are most critical to monitor to ensure the project remains on track?
By asking these questions, executives are able to determine how successful their IT business is.

List and describe each of the forces in Porter’s Five Forces Model?

Porters five forces model includes:

  1. buyer power: high when buyers have many sellers to choose from and low when they don't
  2. supplier power: high when one supplier has has concentrated power over an industry
  3. threat of substitute products or services: high when there are many alternatives to a product or service and low when few market alternatives to choose from
  4. threat of new entrants: high when it is easy for competition to enter a market and low when there are significant barriers
  5. rivalry among existing competitors: high when competition is in a fierce market and low when competition is more complacent

Describe the relationship between business processes and value chains?

A business process is a standardised set of activities that accomplish a specific task, such as processing a customers order. A value chain approach views an organisation as a series of processes, each of which adds value to the product or service for each consumer. These two aspects work together in order to evaluate the effectiveness of the busienss processes and to create a competitive advantage.


Compare Porter’s three generic strategies?

Porter has three generic Strategies: Broad cost leadership, Broad Differentiation and a Focused strategy. Broad strategies reach a large market segment, while focused strategies have a much smaller market. A focused strategy focuses on either cost leadership or fiffferentiation





All answers came from Business Driven Information Systems (Baltzan, Phillips, Lynch, Blakey)