Tuesday, September 22, 2009

Week 3: Tech Guide 1

1. What is computer hardware and what are the major hardware components?

Hardware refers to the physical equipment used for the input, processing, output and storage activities of a computer system. The hardware includes the physical artefacts technology for instance PC’s, printers, mouses, monitors, routers and hard drives.

Hardware consist of many parts such as the Central Processing Unit (CPU): which manipulates data ad controls the tasks performed by other components, Primary storage: internal to the CPU; which stores data and program instructions during processing, Secondary Data: external to the CPU; which stores data and programs for future use; Input Technologies: accepts data and instructions and convert them to a form that the computer can understand; Output Technologies: data and information that people understand and finally; Communication Technologies: provides the flow of data from external computer networks (internet) to the CPU, and CPU to networks.

2. What is Moore's Law/what does it mean in relation to computers.
According to computer narration and its development Moore’s Law is the preeminent way to describe the stages.
The law explains the continuing change and trends of the computer history. The following changes of Moore’s Law include:
· The increasing miniaturization of transistors,
· Making the physical layout of the of the chip’s component as compressed and efficient as possible,
· Using materials for the chip that improve the flow of electricity, and
· Targeting the amount of basic instructions programmed into the chip.
Thus in relation to computers, It is evident that from the law that the microprocessor complexity would double every two years and as a result from a business perspective this means that over time the price of PC will decrease and the speed will increase. Moore’s Law was constructed in the 1950’s as he was the founder of the Intel computer, thus the conclusion above was derived from the results.

3. In basic terms, describe how a microprocessor functions.

The microprocessor also known as the ‘processor’ or ‘central processing unit (CPU)’ performs the actual computation inside any computer e.g. Intel Core Duo. It is the chip that interprets program instructions and process data. It manipulates the data and controls the tasks performed by the other components. As seen in the image the microprocessor is made up of millions of microscopic transistors in a circuit on a silicon chip it consist of:
- Control Unit: accesses program instructions, decodes and controls the flow of data to and from the arithmetic logic unit as it registers primary and secondary storage.
- Arithmetic Logic Unit: performs the mathematical calculations
- Registers: high speed storage that store very small amounts of data and instructions for short periods of time.


4. What factors determine the speed of the microprocessor?

The factors that determine the speed of the CPU include the clock speed, word length, bus width, and design of the chip however with the assistance of binary form and the machine instruction cycle the microprocessor speed is established. The clock speed in GHz helps to preset the speed of the computer clock, while the word length shows how many characters the PC reacts in one clock cycle, additionally the bus width assists the speed by performance of the amount of data that can travel at the same time finally the line width shows the distance between transistors thus the smaller the line width, the faster the chip.

5. What are the four main types of primary storage.

Primary storage: stores small amount of data and information that will be immediately used by the CPU. The four main types include:

1) Registers: part of the CPU with least capacity, storing little data only immediate before and after processing.

2) Random Access Memory (RAM): holds software and small amount of data when brought from secondary storage.

3) Cache Memory: stores blocks of data used more often.

4) Read Only Memory (ROM): storage is non-volatile thus, retains instructions when the power of the computer is turned off.

6. What are the main types of secondary storage?

Secondary storage: stores much larger amounts of data and information for extended periods of time, four main types of storage include:
1) Magnetic Tape: (Sequential Access) medium storage, large open reel or smaller cartridge or cassette.

2) Magnetic Disk: (Direct Access) magnetic disk divided into track and sectors provide addresses for various data example include: hard disk.

3) Hard Drives: Platte divided into concentric tracks and sectors; it reads / writes pivots across the rotating disk.

4) Direct Access: any piece of data retrieved anytime located by data’s address.

Secondary Storage - http://en.wikipedia.org/wiki/Computer_data_storage

7. How does primary storage differ from secondary storage in terms of speed cost and capacity?
Primary storage stores small amount of data and information that will be immediately stored on the CPU.

The primary storage stores many types of information for a short time:
§ Data to be processes by the CPU
§ Instructions for the CPU as to how to process the data
§ Operating system programs that manage various aspects of the computer operation.
§ The storage is faster, RAM quickly though more costly.
§ The storage takes place on ‘chips’ on the motherhood.

Secondary storage is the permanent of larger amounts of data. The secondary storage stores many types of information for an extended period of time the storage differs from primary as it:
§ Non volatile
§ Takes much more to retrieve data because of the electromechanical nature
§ Cheaper than primary storage
§ Can be taken place on a variety of media.
§ Storage is moderate, RAM is less costly

The primary and secondary storages differ as primary has faster storage though more costly however has more capacity. Whereas the secondary storage is limited and cheaper though it is reliable as it can be taken everywhere.

8. What are enterprise storage systems?
Enterprise storage systems are independent, external system with intelligence that includes two or more storage devices.
Three types of enterprise storage systems include:
I. Redundant Arrays of Independent Disks (RAID): Similar to standard hard drive, it is a specialised microcontroller that coordinates the drive therefore; appears to a single logical drive. II. Storage Area Network (SAN): building special area network, that allows rapid and reliable access to storage devices by multiple servers.
III. Network Attached Storage (NAS): device is a special purpose server that provides file storage to user when access the device over a network.


9. Distinguish between human data input devices and source data automation.

Human Data Entry is when the individual physical penetrates the information and process into the devices; this includes keyboards, optical mouse, trackball, joystick, and webcam. This procedure however takes longer.
In contrast, the Source-Data Automation Input is the gathering and amending data where it is primarily formed in so that it can be directly input in to the computer as a result indicating accuracy and timeliness. Types of source-data automation include barcodes scanners, Radio frequency identification (RFID), magnetic stripe readers and automated teller machines.

10. What is one new technology that will change how we do things?

Technology is a human innovation in action that involves the generation of knowledge and processes to develop systems that solve problems and extend human capabilities. (www.insme.org/page.asp)

However, a technology that will change how individuals perform their daily tasks and interaction in the world will be the iPhone.
With the release of the iPhone towards the end of 2007, the world had discovered a technology that combines three different devices, as it includes the innovative phone, widescreen iPod and advance internet device. With the combination of these three mechanisms, it has produced an efficient, effective, and reliable apparatus that assists the many busy people of the world helping them with their flexibility of time.

Nevertheless, the iPhone helps individuals that are always ‘on the go’ to check all their emails, make voice and video calls at any period. Additionally, it has the capability of downloading the latest songs and watching DVDs in the touch of a finger. If those were not enough reasons the iPhone uses the most up-to-date 3G and Wi-Fi connections to deliver all the aspects in web browsing. Therefore, this wireless technology will change the way we perform our daily tasks, as it will allow to multitask many events due to the masses of applications it holds and thus have no need to wait in queues!

iPhone - http://www.apple.com/iphone/why-iphone/

iPhone Specifications - http://en.wikipedia.org/wiki/IPhone

Monday, September 21, 2009

Week 8: Chapter 7 - Wireless, Mobile Computing, and Mobile Commerce

1. Identify common wireless devices and their application to business

Wireless technologies include both wireless devices, such as smart phones, and wireless transmission media, such as microwave, satellite and radio. These technologies are fundamentally changing the ways organizations operate and do business. Examples of wireless devices include:
· The Blackberry 8800 http://na.blackberry.com/eng/devices/blackberry8800/
· The Treo 750 http://www.palm.com/au/products/smartphones/treo750/
· The Motorola Q http://www.motorola.com/motoinfo/product/details.jsp?globalObjectId=113
· The Helio Ocean http://en.wikipedia.org/wiki/Helio_Ocean
· The Apple iPhone
· The Sony Mylo http://www.sonystyle.com/webapp/wcs/stores/servlet/ContentDisplayView?cmsId=content/FlankerBullets/mylo/index_mylo&hideHeaderFooter=false&storeId=10151&catalogId=10551&langId=-1

The capabilities of these devices include phone calls, Bluetooth, WI-Fi, a digital camera, GPS, organiser, a scheduler, address book, calculator, access to email and short messages, instant messaging, text messaging, MP3 player, video-player, internet access with full browser applications, and a QWERTY keyboard.

Businesses are finding the use of wireless devices convenient as it:
1. Make productive use of the time that was formally wasted (for example travelling to work.)
2. Is possible to take the devices with them whether at work or home any locations thus becoming more flexible.
3. Wireless technologies enable them to allocate their working time around personal and professional obligations.

2. Describe the various types and general characteristics of wireless transmission media/technologies - microwave, satellite, infrared and radio waves.


Wireless media; transmit signals without wires over the air or in space.
Microwave transmission systems are widely used for high-volume, long distance point-to-point communication. Communication satellites are used in satellite transmission systems. The three types of satellite geostationary earth orbit (GEO), medium earth orbit (MEO), and low earth orbit (LEO). Radio transmission uses radio – wave frequencies not commonly visible to human eye’s. The most common application of infrared light is in remote-control units for televisions and VCRs. Infrared transceivers are being used for short-distance connections between computers and peripheral equipment and LANs. Many portable PCs have infrared ports, which are handy when cable connections with a peripheral are not practical.


3. What is bluetooth/how is it used?

Bluetooth is chip technology that enables short-range connection (data and voice) between wireless devices. Bluetooth can link up to eight devices within a 10-metre area using low-power, radio-based communication. It can transmit up to 2.1 Mbps.
How does Bluetooth work - http://www.swedetrack.com/images/bluet13.htm

4. What are WLAN's, Wi-Fi, WWAN's, 3G?

Wireless local area network (WLAN) a computer network in a limited geographical area that uses wireless transmission for communication. WLAN - http://en.wikipedia.org/wiki/Wireless_LAN

Wireless fidelity (Wi-Fi) a set of standards for wireless local area networks based on the IEEE 802.11 standard. Wi-Fi - http://en.wikipedia.org/wiki/Wi-Fi

Wireless wide area network (WWAN) a network, generally provided by common carriers, that covers a wide geographic area.

3G is the third generation of wireless networks, which offer faster data transfers. 3G - http://en.wikipedia.org/wiki/3G


5. What are the drivers of mobile computing and mobile commerce

Mobile computing is a computing model designed for people who frequently travel. Mobile commerce is any e-commerce conducted in a wireless environment especially, the internet.


The drivers of m-commerce and mobile computing include:

Ø Widespread availability of mobile devices: approx 2.6 billion cells phones will be in use throughout the world in 2009 and in a few years 70% of mobiles will have internet access.
Ø No need for a PC: due to the increase in smart phones.
Ø The ‘cell phone culture’: the widespread use of cell phones is a social phenomenon, especially among young people.
Ø Declining prices: the price of wireless devices is declining and will continue to decline.
Ø Bandwidth improvement: sufficient bandwidth for transmitting text, video, and multimedia.


Mobile computing and m-commerce include many applications that results from the capabilities of various technologies.


6. Explain the nature of RFID

Radio frequency identification (RFID) allows manufactures to attach tags with antennas and computer chips on goods and then track their movement through radio signals. RFID systems use tags with embedded microchips, which contain data and antennas to transmit radio signals over a short distance to RFID readers. The readers pass the data over a network to a computer for processing. The chip in the RFID tag is programmed with information that uniquely identifies an item. It also identifies the location, where and when it was made.

Week 7: Chapter 5 - Network Applications & Chapter 6 - E-Business and E-Commerce:

Chapter 5: Network Applications
1. Describe the underlying technologies, applications and types of Web sites that comprise Web 2.0.
Information technologies and applications used by Web 2.0 sites include XML, AJAX, tagging, blogs, Wikis, Really Simple Syndication, podcasting, and video casting. AJAX is a Web development technique that allows portions of Web pages to reload with fresh data instead of requiring the entire Web page to reload. This process speeds up response time and increase user satisfaction. A tag is a keyword or term that describes pieces of information. Users typically choose tags that are meaningful to them. A weblog is a personal Web site, open to the public, in which the site creator expresses his or her feelings or opinions. A wiki is a Web site on which anyone can post material and make changes to other material.

Really simple syndication (RSS) allows anyone to syndicate his or her blog, or any other content, to anyone ho has an interest in subscribing. When changes to the content are made, the subscribers get a notification of the changes and an idea of what the new content contains. The subscriber can click on a link that will take them to the full text of the new content.

A podcast is a digital audio file that is distributed over the Web using Really simple syndication for playback on portable media players or personal computers. A videocast is the same as a podcast, except that it is a digital video file.

Web 2.0 Web sites that use some or all of these technologies and applications may be grouped into several categories: social media, aggregators, and mashups. Social networking Web sites allow users to upload their content to the Web, in the form of text, voice, images, and videos. Social networking sites provide an easy, interactive way to communicate and collaborate of content from the Web. A mash up is a web site that takes content from a number of other Web sites and mixes them together to create a new kind of content. Web services are self-contained, self-describing applications, delivered over the internet that users can select and combine through almost any devices.

Web 2.0 - http://en.wikipedia.org/wiki/Web_2.0
http://www.go2web20.net/
http://www.paulgraham.com/web20.html

2. Describe the function of Web services.

Web services are self-contained business/consumer modular applications delivered over the internet, users can select and combine through almost any device. By using a set of protocols and standards, these applications permit different systems to ‘talk’ with one another (to share data and services). Web services have a great potential because they can be used in a variety of environments: over the internet, firewalls etc.

They perform a number of tasks, from automating business process to integrating components of an enterprise wide system to streamlining online buying and selling. Web services are based on four key standards: XML, SOAP, WSDL, and UDDI.
3. Describe how you see Social Networking being used in Business.

Social networking Web sites allow users to upload their content to the Web, in the form of text, voice, images, and videos. Social networking sites provide an easy, interactive way to communicate and collaborate of content from the Web. These sites can be useful way to find like-mindened people online, either to peruse an interest or a goal. Social networking is a great way for small businesses to expand their knowledge as the websites allow discussing and sharing of knowledge. Some social networking sites include: MySpace, Flickr, Facebook, Twitter and YouTube.

Social Networking - http://www.whatissocialnetworking.com/


Chapter 6: E-Business and E-Commerce

Section 6.1 - Before You Go On…

1. Define e-commerce and distinguish it from e-business.

E-commerce is the process of buying, selling, transferring, or exchanging products or services, or information via computer networks, including the Internet. In comparison, e-business includes the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, conducting e-learning, and conducting electronic transactions within an organisation.




Difference among E-commerce and E-business- www.apdip.net/publications/iespprimers/eprimer-ecom.pdf


2. Distinguish among B2C, B2B, C2C and B2E electronic commerce.

B2C (e-tailing) can be pure or part of a clicks-and-mortar organisation this is when the sellers and organisations and the buyers are individuals. Direct marketing is done via solo storefronts, in malls, through electronic catalogs, or by using electronic auctions. The leading online B2C service industries are banking, securities trading, job markets, travel, and real estate. The major B2B applications are selling from catalogs and by forward auctions, buying in reverse auctions and in group and desktop purchasing, and trading in electronic exchanges and hubs it is completed through both the sellers and the buyers are the organisation. EC also can be done between consumers (C2C) but should be undertaken with caution as this is conducted when both the buyer and seller are individuals. Auctions are the most popular C2C mechanism. C2C also can be done by use of online classified ads. B2E provides services to employees, typically over the company’s intranet, it is internally that provides information and services to its employees.

Types of E-commerce - www.accountingsoftwareadvisor.com/ec/ectypes.htm

3. List some benefits and limitations of e-commerce.

Benefits of e-commerce include making international markets accessible and lowering the costs of processing, distributing and retrieving information. Though customers benefit by being capable of accessing all products and services. Besides benefits include: the ability ti easily and conveniently deliver information, services and products to people in cities, rural areas and developing countries.

On the other hand limitations include technological and nontechnological. Technological limitations include the lack of universally accepted security standards, insufficient telecommunications bandwidth, and expensive accessibility. Nontechnological limitations include the perception that EC is insecure, has unresolved legal issues, and lacks a critical mass of sellers and buyers.

Section 6.2 - Before You Go On…

1. What are spamming, permission marketing and viral marketing?

Spamming is the indiscriminate distribution of e-mail without the receivers permission. Permission marketing is the method of marketing that asks consumers to give their permission to voluntarily accept online advertising and e-mail, and viral marketing is the online word for word-of-mouth marketing.

Marketing - www.marketingterms.com/dictionary/permission_marketing

Section 6.4 - Before You Go On…


1. What are micropayments?

According to the dictionary of SensaCom (http://sensacom.com/web_glossary.html) micropayment is the digital cash systems that allow very small sums of money to be transferred but with lower security. Such small sums do not warrant a credit card payment because processing is too costly.

2. What is Multichanneling?


Multichanneling is the process through which a company integrates its online and offline channels. This process occurs when a channel of conflict arise in areas such as pricing if products and services and resources allocations. However this method can increase expenses and reduce the synergy between the two organizational channels.

Section 6.5 - Before You Go On…

1. List some ethical issues in EC.


There is increasing fraud and unethical behaviour on the internet, including invasion of privacy by sellers and misuse of domain names. The value of domain names, taxation of online business, and how to handle issues in a multicounty environment are major legal concerns protections of customers, sellers, and intellectual property is also important.


Various Issues - http://baggins.nottingham.edu.my/~kcztm/Handouts_DDB/L10-6spp.pdf

2. List the major legal issues of EC.
When buyers and sellers do not know one another and cannot see one another, there is a chance that dishonest People will commit fraud and other crimes. The major types of legal issues include:

· Fraud on the internet: It is the fastest growing concern than internet use. It includes the false selling of investments and setting up counterfeit business opportunities.
· Domain Names: is when assigned by central nonprofit organizations that check for conflicts and possible infringements of trademarks.
· Cyber squatting: the practice of registering or using domain names for the purpose of profiting from the goodwill of someone else. Companies such as Nike, Christian Dior, and Microsoft have had to battle to pay to obtain the domain name that communicates to their company’s name away from cyber squatters.
· Taxes and Other Fees: For example, the claim that the state in which the seller is located deserves the entire sales tax.
· Copyright: grants the author of the original work special rights for an assured time phase, in which the work has penetrated into the public domain.

Week 6: Tech Guide 4

1. Describe the basic telecommunications system?

A telecommunication system consists of hardware and software that transmits information from one location to another. These systems can transmit text, data, graphics, voice, documents, or full-motion video information with two basic types of signals analog and digital. The major components of a telecommunication system include the following: devices, communication processors, and communications channels and media.

2. Compare and contrast the main wired communications channels ? (Ethernet & Fibre Optic)

Fibre Optic cables consist of thousands of very thin filaments of glass fibres that transmit information via light pulse generated by lasers. The fibre-optic cable is surrounded by cladding, a coating that prevents the light from leaking out of the fibre. In disparity, Ethernet is a common LAN protocol, it consists of coaxial cable carriers (insulated copper wire; used to carry high speed data traffic and television signals) which transmits data at the speeds of 1 billion bits per second.



3. What are the main business reasons for using networks?

A computer network is a system that connects computers via communications media so that data can be transmitted among them, these include networks such as WANs, LANs and personal area network. A network connects Pc’s. Laptops, servers, printers, point of sale terminal, and mobiles. Nevertheless, the main reasons for using networks include:
- Networked computer systems enable organisations to be more flexible so that they can adapt to rapidly changing business conditions.
- Networks allow companies to share, hardware, computer applications, and data across and among the organization.
- Networks make it possible for geographically dispersed employees and workgroups to share, documents, ideas, and creative insights, as this encourages teamwork, innovation, and more efficient and effective interactions.
- Networks are a critical link between businesses and their customers.

Networks - http://en.wikipedia.org/wiki/Computer_network

4. What is the difference between LANs and WANs?

The two major types of networks are local area networks (LANs) and wide area networks (WANs).

LANs encompassed a limited geographic area and are usually composed of one communication medium. As stated before they are located within one geographic site for example Notre Dame – Broadway Campus, it is fast and secure approximately 1000mb/s Cat 6, usually fibre optic cables are used though may sometimes be wireless. LANs enables companies to share data and hardware e.g. printers; each device has a network interface and a unique IP address.
In contrast, WANs encompass a broad geographical area and are usually composed of multiple communication media. It allows to connect LANs in remote locations, for example Notre Dame Sydney, Broome and Perth campuses. Thus, WANs are slower and less secure as they use the Internet to form a virtual link. They are also used to share data, but not network devices.



5. What is a network protocol?


The network protocol is a set of rules and procedures governing transmissions across a network. Computing devices that are connected to the network access and share the network to transmit and receive data. These components are often referred to as “nodes” of the network. The “nodes” and “protocols” work together by adhering to a common set of rules that enable them to communicate with one another.


6. Describe TCP/IP protocol.


The Transmission Control Protocol/Internet Protocol (TCP/IP) is a file- transfer, packet switching protocol that can send large files of information with the assurance that the data will arrive in uncorrupted form. TCP/IP is the communications protocol of the internet. It can also be used as a communication protocol in a private network. The TCP/IP is the basic communication. The TCP performs three basic functions:
I. It manages the movement of packets between computers by establishing a connection between the computers.
II. It sequences the transfer of packets, and
III. It acknowledges the packets that have been transmitted.

The Internet Protocol (IP) is responsible for disassembling, delivering and reassembling the data during transmission. Each computer on the internet has an IP address, these can either be private or public, and however every address must be unique. An example of this includes a domain name system that is used to translate a url into n IP address.

Week 5: Chapter 3 questions - Ethics Privacy, and Information Security

1. Provide an IT example that relates to the ethical issues for the ideas of privacy, accuracy, property, and accessibility.

The major ethical issues related to IT are privacy, accuracy, property (including intellectual property), and accessibility to information. Privacy may be violated when data are held in database or are transmitted over networks. Privacy policies that address issues if data collection, data accuracy, and data confidentiality can help organizations avoid legal problems. Intellectual property is the intangible property created by individuals or corporations that is protected under trade secret, patent, and copyright laws. The most common intellectual property related to IT deals with software. Copying software without paying the owner is a copyright violation, and it is a major problem for software vendors.

· Privacy: involve collecting, storing, and disseminating information about individuals
· Accuracy: involves the authenticity, fidelity, and accuracy of information that is collected and processed
· Property: involves the ownership and value of information
· Accessibility: revolve around who should have access to information and whether they should have to pay for this access.


2. What are the 4 general types of IT threats? Provide an example for each one

The 4 main types of IT threats include natural disasters, human error, management behaviour and technical failure.

The first type of IT threat and least impact includes human error occurs when employees are not proficient in their duties, for instance an employee deletes an important customer records or sensitive company data is lost due to the lack of adequate training in procedures, or leaving a public computer logged on or even when it is poorly written applications. Thus human error occurs by an individual which is not malicious. Examples of human errors include: tailgating “hold the door”, shoulder surfing, carelessness with laptops, opening questionable emails and poor password selection.

In addition, the second IT hazard includes natural disaster includes the events that lead to destruction of data system for example fires, floods, earthquakes and tsunamis. As a result blackouts, brownouts and system failures occur. Thought from the examples given terrorism is the worst major threat for instance the 9/11 incident destroyed the entire companies personal and computer systems.

Additionally, technical behaviour is another IT threat with greater risk as it includes the problems with hardware and software. The most common hardware problem is a crash of a hard disk. A notable hardware problem occurred when Intel released a Pentium chip with a defect that caused the chip to 0erform some mathematical incorrectly. The most common software problem is errors called bugs in computer programs.

Finally management behaviour, is the most highest risk of an IT menace as it involve a lack of funding for information security efforts and lack of interest in those efforts. Such lack of leadership will cause the information security of the organisation to suffer.

Virus Portal -www.virusportal.com/com/training/train_dat3.shtml

3. Describe/discuss three types of software attack and a problem that may result from them

There are many types of software attacks for instance; worms, Trojan horses, back door, logic bomb, and password attack just to mention a few though the main software attacks include Virus, Denial-Of-Service attack and Phishing attack.

Viruses are a segment of computer code that performs malicious actions by attaching to another computer program. Therefore, viruses are malevolent code that spreads by making copies of themselves. The results can be simply annoying messages or they can steal data or damage your computer system. As a result the use of a firewall, and up to date Anti Virus will assist the computer in protecting from these software attacks.

Secondly, Denial-Of-Service Attack is when attackers send so many information requests to a target computer system that the target cannot handle them successfully and typically crashes (i.e. ceases to function). It prevents a user from accessing a computer or website. For example, the front of a company network is overloaded with fake hits which results in denying any real business data from accessing the website.


Thirdly, phishing attacks use deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages. It is the use of bogus websites and emails to trick you into supplying confidential information. The most common are fake bank websites that appear to be the real thing and steal your credit card details. Spear phishing is more directed attempts at a specific employee of companies.

4. Describe the four major types of security controls in relation to protecting information systems.

In order to protect the information system organizations implement four different types of controls (countermeasures), as they are designed to protect all of the components of an information system, including data, software, hardware and networks.

The four main categories include: physical, access, communications and application controls.

· Physical controls: prevent unauthorized individuals from gaining access to a company’s facilities. The main controls include walls, doors, fencing, gates, locks, and alarm systems. Techniques that are more sophisticated include: motion detectors and temperature sensors.
· Access controls: restrict unauthorized individuals from using information resources. This involves two major functions: authentication (identity of the person requiring access) and authorization (determinants of the actions, rights, or privileges the person has).
· Communication Controls: secure the movement of data across networks. Communications controls consist of firewalls, anti-malware systems, intrusion detection systems, encryption, viral private networking (VPN), and vulnerability management systems.
· Application controls: are security counter measures that protect specific applications. The three major categories are input (e.g. Social Security), processing (e.g. matching time and employment cards) and output (documentation specifying) control.

5. Name one recent software threat and briefly discuss its effects and resolutions ?



A recent attack on Windows Live Messenger a social networking site was one of the most recent software attacks of phishing. It demonstrated the attempt to obtain insightful information for instance passwords, usernames and personal information of the user. With recent research it has been stated that 75% of these (phishing) attacks are successful.



Though on the 15th September 2009, this attack was evidently seen; as when these scams were sending instant messages to the user to enter the password in order to see who has ‘blocked’ them, or in other cases messages appearing stating that your friend is ‘inviting you to see pictures of yourself’. Nevertheless, this has not only been the case as on June 5th 2008, offline friends sent links to inexplicable sites demanding for their username and password. Examples of this “phishing” attacks can be seen on the following link: http://blog.trendmicro.com/see-who-blocked-you-on-msn-phishing-attacks/


6. What is the difference between authentication and authorization and why are they important to e-Commerce/give an example of their relevance to e-Commerce:


Authentication is the process that determines the identity of the person requiring access whereas, authorization is a process that determines which actions, rights, or privileges the person has, based on verified identity.

Thus the importance of authentication and authorization to e-commerce is that company’s need to know that it is safe and therefore there rights cannot be stolen.

Week 4: Tech Guide 2

1. What are main differences/distinction between system software and application software?

System software is the class of computer instructions that serves primarily as an intermediary between computer hardware and application programs. System software also facilitates the programming, testing and debugging of computer programs. Two groups of system software include: system control programs (the system that controls the desktop computers, manage file, data, and web servers, manage networks and are used in enterprise level computing environment in large corporations) and system support programs (software that supports the operations management and users of a computer sysemt by providing a variety of support services.). An example of operating software includes the control of the computer and Window XP / Vista.


Whereas application software is programs designed to make users more productive with personal and business tasks, thus allowing them to provide functionality for their specific core. Types of application that are used to perform a particular task include proprietary software which addresses a company’s specific or unique business needs. Specific software a program specifically develop to the accordance of the business requirements and off-the-shelf software, programs that can be purchase in store e.g. MYOB, MS Office, Windows XP.

2. What are the two main types of system software? Provide some examples of their functions.


System software programs support the operations, management and users of a computer system by providing a variety of support services, the main types include: System Utilities, System Performances Monitors, and System Security Monitors.


System Utilities are programs that accomplish common tasks such as sorting records, locating files and managing memory usage. Example of this function in Windows include: File Manager, Backup and Disk scanner / defragment.


System Performances Monitors program is the processing of ‘jobs’ and system performances in areas such as processor time, memory space and application programs, this monitors the processing of jons on a computer screen. Example of this functionality includes: Task Manager.

System Security Monitors program monitors a computer system to protect it and its resources from unauthorised use, fraud, or destruction. An example of this role is evident in Window Personal Firewall and many differentiated anti-virus and anti-spyware tools.


Main Types of System Software - http://en.wikipedia.org/wiki/Computer_software



3. What is the difference between proprietary and open source software? What considerations should be made when a business selects either software.


Proprietary software is software generally controlled by a single company (though the product maybe licensed to resellers). It is usually protected by copyright and licenses, and sold commercially for profit, thus the source code is not available. Example of Proprietary software includes MS Office, and Windows code as it is mostly tightly guided.


On the other hand, Open Source is the source code made freely available to enable the further development of the software. The users of open source generally change, improve, and redistribute the software to others. Open source software is typically free to use, however business model exist that relate to buying it, installing and supporting it, providing training/certification, or in customising it. Example of Open source software include: Apache, Firefox, OpenOffice, and Moodle just to name a few.


Therefore the difference, between proprietary and open source software is that proprietary is that you buy the licence for the software for example Internet Explorer, and can’t change how the format is written, and open source is freely open to the public for example Fire Fox.


Open Source Software vs. Proprietary Software - http://software.ivertech.com/_ivertechArticle13894_OpenSourceSoftwarevsProprietarySoftware.htm
4. What are some of the legal issues involved in acquiring and using software in most businesses/organizations?

The issues involved in acquiring and using software in associations is that you have to own a licence for proprietary therefore you can’t sell the software to others, thus it becomes private software.

5. Choose an Operating System, provide some details on it's developer, it license type and key benefits.

The main system control program is the operating system. The operating system (OS) supervises the overall operation of the computer. One of the key functions is to monitor the computers status and scheduling operations, including the input and output processes. Nevertheless, an operating system includes Microsoft Windows.

Microsoft Windows is a proprietary operating system for the IBM PC. As of mid 2008, Microsoft has held a strong share of the market at 93%. However, the operating system has been used to support applications, such as web servers. Though the most new edition of the operating system included was Windows Vista, as it contained a number of new features and architectural changes along with its new inventions Microsoft Windows will be launching ‘Windows 7’ towards the end of October, 2009.

The development of Microsoft was proclaimed in 1983 as it had an innovative way of creating Windows, as a graphical user interface (GUI) for its operating system MS-DOS, which was formed for the IBM computers and ever since 1981 has been compatible for PCs. From the time of development Microsoft has produced several editions of Windows, thus the product line has transformed from a GUI to an operating system.



The license type of Microsoft Windows is End-User license agreement (EULA) this agreement occurs either on paper or during the installation period (electronically), after reading the term, conditions, and clicking on “accept.” This agreement defines the provisions of the software, and may specify on how many CPUs it is allowed to be installed on.
Benefits of this operating system include:
· It decreases operating expenses
· Increases productivity
· Steady and secure
· Minimize downtime, and
· Affordable.


Microsoft Windows - http://www.microsoft.com/WINDOWS/
Microsoft Windows - http://en.wikipedia.org/wiki/Microsoft_Windows
History of Microsoft Windows - http://en.wikipedia.org/wiki/History_of_Microsoft_Windows

Week 2: Chapter 1 - The Modern Organization in the Golbal, Web-Based Environment & Chapter 2 – Information Systems: Concepts and Management

Chapter 1: The Modern Organization in the Global, Web-Based Environment
Q1. What are the characteristics of the modern business environment?

The Business environment encompasses all those factors that affect a company's operations, and includes customers, competitors, stakeholders, suppliers, industry trends, regulations, other government activities, social and economic factors, and technological developments. (http://www.quantum3.co.za/CI%20Glossary.htm#B)

The characteristics of the modern business environment include:
Ø Global
Ø Massively interconnected
Ø 24/7/365
Ø Real time
Ø Rapidly changing & dynamic
Ø Information
Ø intensive
Ø Operates through e-commerce
Ø Increasing use social networking

Q2. What is meant by a web-based, global platform, what does it provide, and how has it affected business?

The term web-based platform includes the components of hardware, software, and communications technologies as it comprises of the internet and the functionality of the World Wide Web. This platform enables individuals to connect, compute, communicate, compete and collaborate everywhere and anywhere, anytime and all the time, and to access limitless amounts of information, services and entertainment. This platform operates without regard to geography time, distance, and even language barriers. The Web-based platform has created today’s business environment, which is global, massively interconnected, intensely competitive, real-time, rapidly changing and information intensive.

Q3. What are the main pressures that characterize the modern global business environment?

Now days many organizations compete in a challenging environment. Companies must react rapidly to problems and opportunities happening from extreme dynamic conditions. Thus this occurs due to business pressures. The business environment is the combination of social (changing attitudes to goods), legal (changes in law), economic (inflation, unemployment, labour costs), physical (the space, building, noise, ergonomics), and political (local or foreign markets) factors that affect business activities.

However the three types of business pressures that organizations face include: market, technology and societal pressures. Therefore, significant changes in any of these factors are likely to create business pressures within the organization. Business pressures can be defined as: market, technology, and societal pressures.
o Market pressures – global economy/competition, changing workforce, more power to customers
o Technology pressures – innovation and obsolescence, information overload
o Social pressures ‐ social responsibility government regulation/deregulation, terrorism, ethical issues

These pressures can change quickly, sometimes in an unpredictable manner. Recent pressures include: exchange rate changes, SARS, bird flu, US/Australian free trade agreement, open‐source software.


Q4. What are/discuss some of the common; IT oriented organizational responses to these pressures?


Organizations are responding to the pressures by implementing different organization responses. Organizational Responses, to the pressure is by implementing IT such as strategic systems, customer focus, make to order and mass communication and e-business. Companies need to react frequently and quickly to both the threats and the opportunities resulting from these pressures and the resulting new business environment. Technology is often seen as providing the answer.


— Strategic systems: provide organisations with advantages that enable them to increase their market share and or profits, to better negotiate with suppliers or to prevent competitors from entering their markets.
— Customer focus: provide excellent customer service by attracting and keeping customers, then to losing them to competitors.
— Make to order and mass customization: make to order producing customises products and services (efficiently and low cost). Mass customization large quantity but customizes t fit each customers desire.
— E-commerce: doing transaction electronically for the business is great as it provides flexibility during this competing environment.


Q5. How are IT architecture and IT infrastructure are interrelated:


An organisation’s information technology architecture is a high-level map or plan of the information assets in an organization. The IT architecture integrates the information requirements of the overall organization and all individual users, the IT infrastructure, and all applications. An organisations information technology infrastructure consists of the physical facilities, IT components, IT services and IT managements that support the entire organization. Therefore the two concepts are interrelated as both guide and direct the IT departments of an organisation. Both IT architecture and IT infrastructure provide the basis for all information systems in the organization.


Q6. Is the Internet an infrastructure, an architecture, or an application program? or something else. Why?


The internet is architecture as it compromises of a high level of information assets, which is joint with an infrastructure (consist of the physical facilities, IT components, IT services and IT personnel) of tools and a vast collection of application (a program designed to support a specific task or business process) outlines to complete the role as an internet service.


Chapter 2: Information Systems: Concepts and Management


Q1. What is the difference between an 'application' and computer-based information systems?


An application program is a computer program designed to support a specific task or business process. Each functional area or department within a business organisation uses dozens of application programs.


Computer based information system is an information system that uses computer technology to perform some or all of its intended tasks. Basic components of information system:
o Hardware
o Software
o Database
o Network
o Procedures and
o People


As a result information systems allow to perform high-speed, high-volume, numerical computations, Provides fast, accurate communication collaboration within and among organisations, Store huge amounts of information, easy to access, Allow quick and cheap access to information, Interprets vast amount of info quickly and Increase effectiveness and efficiency of people.


Q2. What are strategic information systems?


Strategic information systems (SISs) provide a competitive advantage by helping an organization implement its strategic goals and increase its performance and productivity. Any information system that helps an organisation gain a competitive advantage or reduces a competitive disadvantage is a strategic information system. Strategic information systems support or shape a business unit’s competitive strategy. An SIS can significantly change the manner in which business is conducted to help the firm gain a competitive advantage.


Strategic Information Systems - http://it.toolbox.com/wiki/index.php/Strategic_Information_System


http://en.wikipedia.org/wiki/Strategic_information_system

Q3. According to Porter, what are the five forces that could endanger a firm’s position in its industry or marketplaces?

For analysing competiveness Michal Porters Model 1985, is the used by many companies to develop strategies to increase their competitive advantage.
The five forces that need to be considered include:


1) Threat of entry of new competitors is high when it is easy to enter a market and low when significant barriers to entry exist. A barrier to entry is a product or service feature that customers expect from organizations in a certain industry. This feature maybe offered by a competing organization for it to survive in the marketplace.



2) The bargaining power of suppliers is high when buyers have few choices from whom to buy and low when buyers have many choices. Therefore, organisations would rather have more potential suppliers to be able to better negotiate price, quality and delivery terms.



3) The bargaining power of customers (buyers)is high when buyers have many choices from whom to buy and low when buyers have few choices.




4) The threat of substitute products or service if there are many substitutes for an organisation’s products or services, then the threat of substitutes is high. New technologies create substitute products very rapidly.



5) The rivalry among existing firms in the industry is high when there is intense competition among many firms in an industry. The threat is low when the competition is among fewer firms and is not as intense.

Q4. In relation to Porter's value chain model, what is meant by primary activities and support activities, and how does IT support these activities?




Michael Porter’s Value Chain Model (1985): used to identify specific activities where they can use competitive strategies for greatest impact.



Primary activities are those business activities that relate to the production and distribution of the firms products and services, thus creating value for which customers are willing to pay. Five main primary activities include:
· Inbound logics (inputs)
· Operations (manufacturing and testing)
· Outbound logistics (storage and distribution)
· Marketing and sales
· Services



Support activities do not add value directly to the firm’s products or services, they contribute to the firms competitive advantage by supporting the primary activities. Four Support activities include:
I. The firms infrastructure (accounting, finance, managements)
II. Human resources management
III. Product and technology development (R&D)
IV. Procurement

Porter's Model - http://www.ifm.eng.cam.ac.uk/dstools/paradigm/valuch.html




Q5. Discuss the logic of building information systems in accordance with the organizational hierarchical structure.



Organizations employ many different types of information systems (IS), as the IS collects, processes, stores, analyses and disseminates information for a specific purpose.




From this figure, it is evident that there are collections of applications programs (i.e. information systems), therefore building the information systems into the hierarchy supports a particular functional area in the organization.


Q6. How has the Internet affected each of the five forces in Porter’s competitive forces model.



An understanding of these models may lead businesses to adopt one or more competitive strategies:
— Cost leadership – produce products and/or services at the lowest cost in the industry for example Big W.
— Differentiation – offer different products, services or product features for example Apple
— Innovation –introduce new products, services and new features for example 3M
— Operational effectiveness – improve the manner in which internal business processes are executed so that a firm performs similar activities for example BMW
— Customer orientation – concentrate on making customers happy for example AAMI.