Friday, May 28, 2010

Week 12 Questions - Systems Development and Project Management

1. Explain the triple constraint and its importance in project management.

The three primary variables within any project are time, cost and scope. All projects are limited by one of these variables in some way. These three variables are interdependent and the relationship is that if a change is made to one variable, it is likely to affect one or all of the other variables. It is these three factors that determine the quality of a project with a successful project delivered on time, within the determined budget and according to the scope originally set out during the planning stages.





Triple Constraints Diagram

http://www.traue.com/media/project_triangle.png




2. Describe the two primary diagrams most frequently used in project planning.

The two primary diagrams used in project planning are;

· PERT Chart: A PERT (Program Evaluations and Review Technique) chart is a graphical diagram that presents are projects tasks and the relationship between those tasks. A dependency is a logical relationship that exists between two tasks or between a task and a milestone. They define dependency between project tasks before they are scheduled. The critical path is the path to completing the project in the shortest amount of time.





Example of a Pert chart


http://www.spottydog.u-net.com/images/fancy_pert.jpg



· Gantt Chart: A Gantt Chart is depicted in the form of a bar graph against a calendar. The tasks to be completed are listed vertically and the time frame they must be completed in is listed horizontally. A Gantt chart shows the schedule of a project and the progress of the tasks against their planned duration.



Example of a Gantt chart


http://www.total-quality-management-software.com/images/project_gantt_chart.gif



3. Identify the three primary areas a project manager must focus on managing to ensure success.

The three primary areas a project manager must focus on to manage success are;

· People: This is the hardest but most important task of a project manager. Two challenges that are faced are resolving conflict within the group and balancing the needs of the project with the personal and professional needs of the group. Project managers are the main communicators with the client. In many cases it is the people management side of the project that determines the success of the project. A project manager needs to manage the stakeholders as well as the team members of a project. It is important for a project manager to correctly manage the stages of the group (forming, storming, norming, performing and adjourning) as this can also determine the success of a project.

· Communications: Communication is the key to excellent project management. A project manager should plan what and how they will communicate as a formal part of the project management plan. The project manage should communicate to the team the time, cost and scope of the project in a timely, accurate and meaningful fashion, as well as keeping all stakeholders informed of the progress of the project. Project managers should also monitor feedback and respond in a timely and organised manner, as well as encouraging group members to provide feedback.

· Change: A project manager needs to be able to anticipate, monitor and prepare for change to occur. Change management is a set of techniques that aid in evolution, composition and policy management of the design and implementation of a system. It includes a collection of procedures to document a change request and the steps necessary to consider the change based on the expected impact of the change.

Three guidelines for effectively dealing with change management are:
1. Institute change management policies – clearly define the policies and procedures that must be followed each time a request for change is made.

2. Anticipate change – view change as an opportunity and embrace it.

3. Seek change – look for changes that may be a window to opportunity. Review successes and failures to determine for any opportunities to innovation.



4. Outline 2 reasons why projects fail and two reasons why projects succeed.

Why projects succeed:
· All team members working towards the common goal of the project

· Good decision making structure and communication, e.g. project can be completed within project timeline and all members are aware of their role within the project and are kept regularly informed.

Why projects fail:
· Unrealistic expectations of the project, e.g. too short a timeline, not enough resources available, too large for the company to handle.
· Lack of project management, e.g. no project manager guiding the project, no project plan developed (PERT or Gantt chart)

Week 10 Questions - Customer Relationship Management and Business Intelligence

1. What is your understanding of CRM?

Customer relationship management involves managing all aspects of a customer’s interactions with a business. It aims at increasing customer loyalty and retaining customers, as well as maintaining or increasing the profitability of an organisation.







Customer relationship model
http://www.marketingteacher.com/IMAGES/crm_model.gif



2. Compare operational and analytical customer relationship management.

The two primary components of a CRM strategy are:
· Operational - this supports the traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers.

· Analytical – supports the back-office operations and strategic analysis and includes all systems that do not deal directly with the customers.



3. Describe and differentiate the CRM technologies used by marketing departments and sales departments.

· Marketing Department – Marketing department looks at selling multiple products to one customer. CRM technologies allow them to gather information to ensure successful marketing campaigns.

o List generators: gather customer information from multiple sources and segment the information for different marketing campaigns, e.g. Questionnaires, surveys, website visits. Provides the marketing department with a solid understanding of the type of customer it needs to target for its campaigns.

o Campaign Management System: guide users through marketing campaigns for performing such tasks such as campaign definition, planning, scheduling, segmentation and success analysis. Can calculate quantifiable results for return on investment.

o Cross-selling: Cross-selling is selling additional products or services, up-selling is increasing the value of a sale. CRM technologies help companies to better understand their products to be able to cross-sell and up-sell.


· Sales Department – Sales force automation (SFA) is a system that tracks all the steps of the sales process and focus on increasing customer satisfaction, building customer relationships and improving product sales.


4. How could a sales department use operational CRM technologies?

· Sales Management CRM Systems: automates each phase of the sales process which helps sales representative co-ordinate all of their accounts. Features include calendars and alarm reminders, customisable media presentations and document generation. It provides an analysis of the sales cycle and how each sales representative is performing.

· Contact management CRM: maintains customer contact information and identifies potential customers for future sales. Features include maintaining organisational charts, detailed customer notes and supplemental sales information.

· Opportunity Management CRM Systems: target sales opportunities by finding new customers or companies for future sales. Determines potential customers and competitors and defines selling efforts, including budgets and schedules. It is also able to calculate the probability of a sale.

5. Describe business intelligence and its value to businesses.
Business Intellogence Diagram

Business intelligence refers to technologies that are used to gather, provide access to and analyse data and information to support decision-making efforts. It is the tools and analysis that provide access to data for strategic decision making for analysis that support strategic decision making to align with the company’s goals.

- BI can enable organisations to unlock information held in their database by giving authorised users a single point of access to the data where reports can be prepared to understand what best drives their business.
- BI can be used at every step in the value chain and can be used within every department.
- BI provides users with up-to-the-minute information

6. Explain the problem associated with business intelligence. Describe the solution to this business problem.

One of the problems with business intelligence is that businesses are becoming data rich and information poor. With their reliance on CRM systems they are rapidly gathering vast amounts of data with every transaction made between departments or the outside world being entered into these systems for future use and access. The amount of data being generated is doubling each year and in the future it may double each month. Although organizations have large amounts of data, they are not able to use this data to produce clear information and do not have a clear understanding of where the business is at, what their competitors are doing and their data is not aligning to their strategic goals.

The solution to this problem is business intelligence. A business makes many decisions each day which are normally based on experience, knowledge and the rule of thumb, which poses a problem as it takes many years to gain experience and knowledge, which some employees never gain. To ensure that the business is making informed decisions that will benefit the business, the employer should provide them with BI systems and tools.

7. What are two possible outcomes a company could get from using data mining?




Data mining is the process of analysing data to extract data that is not offered by the raw data alone. It is the primary tool used to uncover business intelligence in vast amounts of data.

Two outcomes that a company can get from using data mining are:
- Increased profits
- More efficient sales
For more information on Customer relationship management:

Week 9 Questions - Operations Management



1. Define the term operations management.

Operations Management (OM) is the management of systems or processes that convert or transform resources into goods and services. It is responsible for managing the core processes used to manufacture foods and produce services. Operations management transforms inputs into outputs and ensures that the processes are efficient and effective.









2. Explain operations management’s role in business.

Example of an airline business:
· Forecasting – Being able to plan and predict what is going to happen in the future. How many seats on a flight, weather and landing conditions, etc.

· Capacity Planning – Ensuring that the systems put in place are able to handle the demand being placed on them, ie. Are the systems large enough? Being able to plan for growth and decline in the markets to maintain profits

· Scheduling – When it will be done. When to schedule flights, how many flights and staff are needed, when to schedule maintenance, etc.

· Managing Inventory – Managing the essential items that are needed in order for the business to run. Food and beverage, first aid, pillow, blankets, life jackets, etc.

· Assuring quality – Ensuring everything is of the highest standard and in relation to the organisations goals.

· Motivating and training employees – Ensuring all employees receive the required training to perform their role effectively. This is the role of the operations manager. Needed for dealing with frustrated customer.

· Locating Facilities – Knowing where everything is located in the organisation. Knowing which cities to offer services

3. Describe the correlation between operations management and information technology.

Managers are able to use information technology to influence operations management decisions including productivity, costs, flexibility, quality and customer satisfaction. Operations management influences the degree to which an organisations goals and objectives are realised.

- What resources are needed and in what amounts
- When will each resource be needed? When should work be scheduled? When should materials and other supplies be ordered?
- Where will the work be performed?
- How will the product or service be designed? How will the work be done?
- Who will perform the work?

4. Explain supply chain management and its role in a business.




A supply chain is anyone who is involved, directly or indirectly, in the production of a product. Supply chain management (SCM) involves the management of information flows along the supply chain to maximise the effectiveness and profitability of the supply chain.

An efficient and effective supply chain management can enable an organisation to:
- Decrease the power of its buyers
- Increase its own supplier power
- Increase switching costs to reduce the threat of substitute products and services
- Create entry barriers thereby reducing the threat of new entrants
- Increase efficiencies while seeking a competitive advantage through cost leadership

5. List and describe the five components of a typical supply chain.

· Plan – This is the strategic component of the supply chain management. A business needs to have a plan in place to best manage their resources to help meet the customer demands for products and services. The most important part of planning is developing metrics to monitor the supply chain so that it is efficient, cost effective and delivers high quality and value to customers.
· Source – This involves companies choosing reliable suppliers that will deliver the goods and services for making their products. They need to develop a set of pricing, delivery and payment processes and create metrics for monitoring and improving their relationships.

· Make – This where the companies manufacture their products. This involves having a strong set of metrics for measuring quality levels, production outputs and worker productivity.

· Deliver – This process is known as logistics. It is the set of processes that plans for and controls the efficient and effective transportation and storage of supplies from suppliers to customers.

· Return – This is the most problematic stage of the supply chain process. Businesses need to have a system in place to receive defective and excess products and services and support customers who have problems with their products.
For more information on the 5 components of the supply chain:
http://www.associatedcontent.com/article/540671/five_components_to_supply_chain_management.html

6. Define the relationship between information technology and the supply chain.

The primary role of supply chain management in creating the integration of tight process and information linkages between functions within a firm, such as marketing, sales, finance, manufacturing and distribution and between firms, which allows the smooth and synchronised flow of information and product between customers, suppliers and transportations providers across the supply chain. Supply chain management relies on information technology to make accurate decisions for without it a business would be over forecasting leading to a loss in profits.


For more information on Operations Management:

Sunday, May 2, 2010

Week 8 Questions - Networks and Telecommunications

1. Explain the business benefits of using wireless technology.

Wireless refers to any electrical or electronic operation that is accomplished without the use of a ‘hard wired’ connection. It gives users a ‘live’ internet connection via satellite or radio transmitters without the use of wires. Mobile means that technology can travel with the user but is not necessarily in real time. Wireless devices, such as Blackberries and iPhones are small enough to carry around and have the ability to store information, perform productive tasks and communicate wirelessly over the internet and with other wireless devices.

The benefits of wireless technology for businesses are;


  • Universal access to information and applications – technology is getting to the stage where information is able to be accessed anywhere at any time.

  • The automation of business processes – wireless technologies have the ability to centralise critical information and eliminate redundant processes.

  • User convenience, timeliness and ability to conduct business 24/7, 365 days a year – information, through wireless technologies such as a Blackberry or iPhone, can be accessed anywhere and at any time.


http://www.tentechnologies.com/wp-content/uploads/2009/09/wireless.jpg



2. Describe the business benefits associated with VoIP.


Voice over IP (VoIP) uses TCP/IP technology to transmit voice calls over internet technology. As the calls are transported over the internet, international call costs have decreased. VOIP enables phone calls, faxes, voice mail, email and web conferences to be transmitted over the internet. It also reduces the cost and complexity with delivering these services and improves response and restoration times. With VOIP using existing networks to efficiently and inexpensively route telephone calls, businesses can gain significant cost savings, productivity gains and service enhancements.




  • It runs over the existing computer network


  • Calls over the internet do not attract extra telecommunication charges


  • Customers are able to port their numbers between carriers
    An example of a VOIP is Skype. Skype allows users to send copies of reports, pictures or other files with no size restrictions on files.

3. Compare LANs and WANs.

  • LAN – Local area networks connect a group of computers within a close proximity of each other to be able to share resources like files, games, printers and other applications. An LAN can connect to other LANs to the internet or wide area networks.

Example of a LAN:


http://www.internet-computer-checkup.com/image-files/wireless-lan-router.jpg



  • WAN – Wide area networks are networks that span over a larger distance, such as a state or country.

Example of a WAN:



http://technet.microsoft.com/en-us/library/Cc751420.wan_msp01_big(en-us,TechNet.10).gif



4. Describe RFID and how it can be used to help make a supply chain more effective.


Radio Frequency Identification (RFID) technologies use active or passive tags in the form of chips or smart labels that store unique identifiers and relay this information to electronic readers. RFID tags are smaller than a grain of sand and combine tiny chips with an antenna, which, when placed on an item, automatically radios its location to RFID readers on shop shelves, counters, loading bay doors and shopping carts. They can cut cost by reducing the number of workers required for scanning items and can provide current and more accurate information to the entire supply chain. They have allowed businesses to reduce costs and overheads by making inefficient business systems more visible and are being used to improve the cost, safety and reliability of managing business processes.

Week 7 Questions - Databases and Data Warehouses

1. List, describe, and provide an example of each of the five characteristics of high quality information.

a) Accuracy – This refers to how correct the information is. For example, have all of the names been spelled correctly and is the amount that is entered correct?

b) Completeness – Refers to whether or not the data base is complete or whether some fields are still requiring data to be entered. For example, is the address complete with street name, city, state and postcode included?

c) Consistency – This refers to whether or not the data presented in a field is consistent with other fields. For example, do all the totals presented in a field reflect the true total?

d) Uniqueness – This refers to whether or not the data has only been entered once or has been repeated throughout the data base. For example, are there any duplicate customers?

e) Timeliness – This refers to how often the data in the data base is updated. For example, is the data updated daily, weekly or monthly?


2. Define the relationship between a database and a database management system.

  • A database is the key to an organisation. It stores information on people, places, events and objects, for example employee data, financial records, etc. the schema of a database describes the objects in a database and the relationship between them.


  • A database management system (DBMS) is the program that is used to monitor the database. It allows all users to be able to access the data. A DBMS allows users to produce reports, as well as manage the in-put and out-put of data.


3. Describe the advantages an organisation can gain by using a database.


Example of a database:

http://www.qweas.com/download/business/database_management/screen/mobile_database_viewer_access_xls_oracle_2.jpg


The advantages to an organisation of using a database include:
- Increased flexibility – A good database is able to handle changes quickly and easily, as well as allowing users to access this information in a way that suits their needs.


- Increased scalability and performance – Scalability means how well a business is able to adapt to changes and increased demands. Performance means how well a system is able to perform a process or transaction. A good database will be able to keep up with the increased demand.




- Reduced information redundancy – Redundancy is the duplication of information or the storing of information in multiple places. With the same information being stored in multiple locations, it makes it difficult to determine which values are the most current and accurate. Through the elimination of information redundancy, it records each piece of data in the same space, which saves space making information updates easier and the information quality increases.



- Increases information integrity (quality) – Information integrity measures the quality of the information. Integrity constraints ensure the quality of information, which are able to be built in the database design. The database ensures that the user is not able to violate these constraints


- Increased information security – Information to an organisation is like an asset and needs to be protected from unauthorised users or misuse. Databases can protect this data through passwords (provide authentication to the user who is accessing the data), access levels (who has access to what information) and access controls (what type of access they have to the information).



4. Define the fundamental concepts of the relational database model.




Example of a Relational Database Model

http://www.databasedev.co.uk/image/holiday_cottage_bookings_data_model.gif


A relational database model is a database that stores information in the form of two-dimensional tables each consisting of rows and columns. It is the most commonly used database today, with each of the tables logically relating to each other.

The primary concepts of a relational database model are entities, which are a person, place, thing, transaction or event about which the information is stored, entity classes, attributes (fields or columns), which are the characteristics or properties of an entity class, keys and relationships. To be able to manage and organise the entity classes, the primary keys and foreign keys must be identified and used to create logical relationships. A primary key is a field that identifies a given entity in a table, while a foreign key is a primary key of one table that appears as an attribute in another table and provides a logical relationship between the two tables.


5. Describe the benefits of a data-driven website.

Example of a Data-driven Website


http://images.cowlesgraphicdesign.com/websites/district46.jpg



A data driven website is an interactive website that is constantly kept updated and is relevant to the needs of its customers through the use of a database. They are useful when the site offers a great deal of information, products or services. It works through the user entering a query and the relevant data coming up, for example Wikipedia.


The advantages of a data-driven website are:
- Information is able to be updated and changes made at any time, with little to no training required.
- A data-driven website allows the site to grow faster. The layout, displays and functionality of the site is easy.
- A well-designed data-driven website will have ‘error-trapping’ mechanisms to ensure that the information is filled out correctly and the content is entered and displayed in the correct format.
- Changes made to a data-driven website are easy, cutting time and cost. Training on how to use is minimal.
- Changes to the layout, navigation or site structure only need to be programmed once. A data-driven infrastructure improves the reliability and stability of a website while reducing the chance of it ‘breaking’.
- Content on the website is never lost
- A query or search is able to be made on the website with all information relating to the query returned.
- Increases customer satisfaction




6. Describe the roles and purposes of data warehouses and data marts in an organization.

A data warehouse is a logical collection of information that is gathered from many different operational databases and supports the business analysis activities and decision-making tasks (a large collection of many databases). A data mart is a smaller subset of a data warehouse. The main purpose is to gather all information from an organisation into a single repository so that employees can make business decisions and undertake business analysis activities. It allows the organisation to move away from transactional data giving them visibility across the organisation so that reports can written based on the data.

Week 6 Questions - Enterprise Architecture

1. What is information architecture and what is information infrastructure and how do they differ and how do they relate to each other?

- Information Infrastructure: Information infrastructure identifies how and where important information, such as a customer’s records, are maintained and secured. It is a general plan of how IT will be used within an organisation. This means having back-up systems in place to protect data from being lost, as lost data to an organisation can cost not only time, but money, with some of the data not able to be recovered.

- Infrastructure Architecture: Infrastructure Architecture relates to the hardware, software and telecommunications equipment that provide the underlying foundation to support the organisation’s goals. it is the implementation of the architecture that provides effective information.


2. Describe how an organisation can implement a solid information architecture.

An organisation can implement a solid information architecture through having backup and recovery systems, disaster recovery and information security.
A back-up system is an exact copy of an organisation’s information systems. Recovery is the ability for the business to get their systems back up and running after a system crash or failure. An organisation’s backup system should be in line with their business goals.
A disaster recovery plan is a detailed process that outlines how information on an IT system is to be recovered in the case of a disaster, such as a flood or fire. Many organisations have a backup information system stored offsite in the case of a disaster so that all information is able to be recovered.
Information security is about protecting the information that is stored on an organisations system. It is important for an organisation to have secure systems to prevent hackers, as well as having anti-virus software to prevent the attack of viruses on a systems, which can lead to loss of information.


3. List and describe the five requirement characteristics of infrastructure architecture.

The five primary characteristics of infrastructure architecture are:

a) Flexibility – The business structure put in place by an organisation must be flexible and able to adapt to business changes.

b) Scalability – Scalability refers to how able a system is to adapt to increased demands. This means being able to estimate how much a business is going to grow and being able to account for this growth in regards to the business systems. Capacity planning is a measure of ensuring your business systems are scalable.

c) Reliability – Reliability means ensuring that all of your systems are performing correctly and providing you with accurate information.

d) Availability – Availability refers to when the systems are able to be accessed by employees. A good system is one that is of high availability.

e) Performance – Performance measures how quickly a system performs a certain process or transaction.


4. Describe the business value in deploying a service oriented architecture.

Service oriented architecture is a business-driven IT architectural approach that supports integrating a business as a linked, repeatable tasks or services. It helps businesses to ensure their IT systems are able to adapt quickly, easily and economically to support the rapid changing business needs. It allows businesses to support and strengthen their IT architecture. Through using a service orientated architecture and using meta data and existing applications, these applications are able to be re-used for different tasks which allows development to become cheaper and more flexible.


5. What is an event?

An event is also known as the eyes and ears of a business. It is an electronic message that indicates something has gone wrong and identifies threats and opportunities and informs those who are able to act upon this information.


6. What is a service?

A service contains a set of related commands that are able to be re-used. It is more of a software product than a coding product. They describe a valuable business process.


7. What emerging technologies can companies can use to increase performance and utilise their infrastructure more effectively?

Virtualisation is one emerging technology that businesses can use to increase their performance. Virtualisation is about dividing the resources of a computer into multiple environments. It is about increasing the physical resources to get the most out of hardware. The logical functions of the computing system are removed from their physical function, which can then be automatically or manually allocated to meet the changing needs of the business. Virtualisation allows people, processes and technology to work together more efficiently to meet the increase in service levels. ‘System virtualisation’ (also referred to as ‘server virtualisation’ or ‘desktop virtualisation’) allows the resources of a single computer to be presented as though they are collection of separate computers, each with their own operating systems. The benefits of virtualisation are that it reduces hardware infrastructure to increase the utilisation of software, increase in security benefits, improved service-level management, the ability to run more legacy systems, greater flexibility in finding staff and reduced hardware and software costs.







Another emerging technology enabling businesses to improve their performance is grid computing. Grid computing uses virtualisation to gather computing and data resources to create a single system image. It helps to create a sustainable competitive advantage as the focus is placed on the core of the business. Some of the advantages of grid computing include:
- Improving productivity and collaboration of virtual organisations and respective computing and data resources
- Allowing widely separated departments and businesses to create virtual organisations to share data and resources
- Providing instant access to massive computer and data resources



Sunday, April 4, 2010

Week 5 Questions - Ethics and Security

1. Explain the ethical issues surrounding information technology.
  • Intellectual property: The rights that protect the creative and intellectual work of individuals
  • Fair use doctrine: Is the material you are using able to be used under copyright laws
  • Copyright: The right to do, or use certain acts on intangible property not owned by you, such as a video or information from a website.
  • Pirated software: The unauthorised use, duplication, distribution or sale of copyrighted software, that is, using software that has been downloaded or duplicated and is not an original copy.
  • Counterfeit software: Software that is not real, but is manufactured to look that way.

2. Describe the relationship between an ‘email privacy policy’ and an ‘Internet use policy’.
  • Email privacy policy: A policy relating to the sending, receiving and storing of emails. Wirth emails being a common form of communication within a business, it has become necessary for business to introduce policies in relation to emails. It states how an email system within a business can be used and to what extent they have privacy over their emails.
    The email privacy policy an organisation has in place should include:
    - How employees are to use their email for private and non-employment purposes
    - State what activities are permitted and what are not (e.g. no spamming)
    - Detail what information from emails will be recorded and who has access to that information
  • Internet use policy: An internet use policy should be implemented in all business and details how employees are to use the internet, including what sites are allowed to be viewed and those of which are blocked, or banned (e.g. social networking sites such as Facebook).
    The internet use policy an organisation has in place should include:
    - The available internet services to employees and which of those sites are not to be visited
    - The position an organisation takes on the viewing of banned websites
    - Ethical use of the internet
    - The user’s responsibility for citing sources, properly handling offensive material and protecting the name of the organisation
    - The ramifications for breaches of the policy

3. Summarise the five steps to creating an information security plan.

1. Develop the information security policies: Who is responsible and accountable for designing and implementing the information security policies within the organisation. The chief security officer (CSO) is usually responsible for implementing these policies. Examples include having employees log off their systems and having them password protected.
2. Communicate the information security policies: Train all employees on the policies to ensure they are aware of their expectations.
3. Identify critical information assets and risks: Requires that all systems be installed with anti-virus software, as well as having user log-ins with passwords. All systems linked with external systems should have firewall installed for protection.
4. Test and re-evaluate risks: Continually perform security reviews, audits, background checks and security assessments.
5. Obtain stakeholder support: Gain approval and support on your information policies from the board of directors and all stakeholders.


4. What do the terms; authentication and authorization mean, how do they differ, provide some examples of each term.

  • Authentication: A method to confirm the identity of a user. It is the means by which you have the rights to access a system.
  • Authorisation: The process of giving someone permission to do or have access to something. This means that when you have accessed a system, what, within the system, you have access to.
    Authentication and authorisation broken down into three categories, which, when combined make the system secure:
    - Something the user knows, e.g. User ID and password
    - Something the user has, such as a smart card or token
    - Something that is part of the user, such as a thumb print or voice recognition

5. What the Five main types of Security Risks? Suggest one method to prevent the severity of risk.
  • Human error: Provide all employees with the necessary training and standards to abide by when using the computer systems.
  • Technical failure: Have a back-up system/ data recovery system in place where all data is stored and can be recovered
  • Natural disaster: Have an off-site back-up where copies of the data are kept in an off-site location
  • Deliberate act: This can be caused by viruses or by a disgruntled employee. Have anti-virus systems on all information and data systems
  • Management failure: Ensure managers receive training on how to correctly use information systems. An IT professional may be hired to manage these systems to keep data files in tact.

Week 4 Questions - E Business

1. What is an IP Address? What is its main function?

IP stands for internet protocol. An IP address is a unique number that is assigned to each computer in the world, which can be either public or private. The main function of an IP address is so that computers are able to communicate with each other.


2. What is Web 2.0, how does it differ from 1.0?

Web 2.0 is a set of economic, social and technology trends that together form the basis for the next generation for the internet. It is the current internet type that we are in now and is referred to as Live Web and is controlled by many people. It allows users to be more interactive; a 2-way service, through mashups, which allow users to use content from more than one source to create their own service. Social networking sites, such as Facebook and Myspace, blog sites, RSS (really simple sydnication) and Podcasts are common features of web 2.0.

Web 1.0 is a one-way web that is controlled by one person, where information was posted on a site and could only be read. It was a non-interactive/ passive web service.


3. What is Web 3.0?

Web 3.0 is about transforming the web into a database. Web 3.0 is based on metadata, which is the concept of tagging where all data is tagged to other data and is used to search for information. It is the process of using media to search for other media.


4. Describe the different methods an organisation can use to access information.

There are three tools that an organisation can use to access information. These three tools are;

  • Intranet – An intranet is a personalised and private section of the internet that is used for internal means, commonly used in businesses, universities and schools.
  • Extranet – An extranet is an intranet that is also available to strategic allies, such as customers, suppliers and partners, providing them with certain data about the company that is of benefit to them.
  • Portal – A portal is a website that offers a broad array of resources and services on the one page. It is personalised to the needs of the people it is targeted at. It features services including email, online discussion groups, search engines and online shopping.

5. What is e-Business, how does it differ from e-Commerce?

  • E- Business is the conducting of business on the internet, including buying and selling, serving customers and collaborating with business partners.
  • E- Commerce is the buying and selling of goods on the internet.



6. List and describe the various e-Business models? (Hint: B2B)

  • Business-to-Business (B2B) – Businesses buying and selling to each other over the internet. Online access to data is widely supported.
  • Business-to-Consumer (B2C) – This applies to any business that sells their products and services to consumers over the internet.
  • Consumer-to-Business (C2B) – Applies to consumers who sell their products and services to a business over the internet.
  • Consumer-to Consumer (C2C) – Applies to websites that assist consumers interacting with each other over the internet.

7. List 3 metrics would you use if you were hired to assess the effectiveness and the efficiency of an e-Business web site?


To assess the effectiveness and efficiency of an e-Business website, three metrics that could be used include;

  • How many people are visiting the website and the amount of revenue that is being generated by this
  • The length of time people spend on a website and the times they visit
  • The types of visitors on a website. Information on known visitors can be gained through their log-ins and registrations.


8. Outline 2 opportunities and 2 challenges faced by companies doing business online?


Opportunities

  • Available to access 24 hours a day, 7 days a week, 365 days a year to anyone all over the world.
  • Both small and large businesses are able to reach new markets at a lower cost than owning an actual business.

Challenges

  • Ensuring your customers details are protected at all times.
  • Opening an online business is a simple task and so there are many people online in the market from all over the world, which can make it difficult for you to market and sell your products.

Monday, March 29, 2010

Week 3 Questions - Strategic Decision Making

1. Define TPS & DSS, and explain how an organisation can use these systems to make decisions and gain competitive advantages.
  • TPS – Transaction Processing Systems (TPS) contain all of the information of a business, with its primary purpose to support the daily operational tasks. They record every transaction within the organisation. Examples of TPS include online reservations for hotels and airlines or using an ATM to withdraw cash. Analytical information incorporates all of the information of an organisation, which is utilised by managers when decisions need to be made.
  • DCS - Decision Support Systems (DCS) model information to support managers and business professionals during the decision-making process. A DCS gathers the data from TPS and builds a model of this data to make decisions.



2. Describe the three quantitative models typically used by decision support systems.

Sensitivity Analysis – Sensitive Analysis studies the impact of change on the organisation. It studies the change on a model if parts of another model are changed and how this affects the results of that model as well as other supporting models.
  • What-If Analysis – The what-if analysis checks the impact of a change in an assumption on the proposed solutions. This means that they look at all the possible affects a change may have on an organisation.
  • Goal-seeking Analysis – Goal-seeking analysis determines what is needed in order for an organisation to achieve the goals, ie. The resources needed. It involves variables being changed to determine when the goal is reached.
  • 3. Describe a business processes and their importance to an organisation.


    A business process is a set of standardised activities or steps that are followed to complete a specific task. An example is processing a customer order. They transform inputs into outputs and are needed for a business to be effective as without a business process, the goals of an organisation can not be achieved. Business-facing processes are invisible to external customers but are essential to the effective management of a business as it includes goal setting, day-to-day planning, performance feedback, rewards and resource allocation.



    4. Compare business process improvement and business process re-engineering.

    • Business process improvements attempts to understand the processes an organisation has in place and make changes to these processes to improve the systems. The steps to business process improvement include; documenting what they currently do, follow the process, measure the performance and ideas the areas where improvements can be made.
    • Business process re-engineering assumes that the business process used within an organisation is not relevant and a new process is implemented from scratch. A new business system is developed first, before a business process is built. The steps in business process re-engineering are; set project scope, study competition, create new processes and implement the solution. A business process re-engineering does not just make a process better, faster and cheaper, but it can redefine the best practices for the entire industry.

    5. Describe the importance of business process modelling (or mapping) and business process models.


    Business process modelling is a detailed flowchart of the work processes showing inputs, tasks and activities in a structured sequence. It is a visual representation of the processes of a business. The purpose of a business process model is that is allows organisations to visually see the effectiveness of their processes within the organisation and highlight where changes need to be made and determine whether or not they are in line with the goals of the organisation.

    Sunday, March 7, 2010

    Week 2 Questions - Information Systems in Business




    1. Explain information technology’s role in business and describe how you measure success?

    Information technology is everywhere in business and is a means of processing and managing information. Technology acts as a support role for the business. It can benefit an organisation through the potential to transform it, for example from a small organisation to a nationwide enterprise. Information technology has allowed businesses to grow, through the use of email and broadband, which makes communication faster and simpler. A business operates through functional areas known as ‘silos’, which are interdependent; with each silo working together to share common information to reach the goals of the organisation.

    Most businesses today have a Management Information System (MIS), which covers the application of people, technologies and procedures to solve business problems. Within an organisation they would utilise ‘business intelligence’ systems or technologies, to gather information and data and analyse it to provide information that can be used to make decisions based on the goals of the company, which may need to be modified based on the received data.

    In order for a business to achieve success, three key resources; people, information and information technology, must work together. These three key resources are linked so that if one fails, they all fail. Businesses rely on their information technology to maintain success for the organisation. Measuring success is not always easy within a business and the return of investment (ROI) may not always be distinguishable. One of the methods of measuring success is by implementing Key Performance Indicators (KPI’s), which set the standard and the level to be achieved for certain tasks and how they are going to be achieved, for example to distribute 500 discount vouchers with a 10% return rate on the vouchers. The most important aspect of a KPI is that it must be measurable. Another way of measuring success is by setting benchmarks, as decided upon by the organisation, and continually measuring the results against the benchmarks. If the results are not being achieved, the systems may have to be modified. Success within a business can also be measured through efficiency and effective metrics. Efficiency IT metrics measure the performance of the IT system and focuses on the technology itself. Effectiveness IT metrics measure the impact IT has on business processes and support and is determined according to an organisation’s goals, strategies and objectives.


    2. List and describe each of the forces in Porter’s Five Forces Model?

    The ‘Five Forces Model’ was developed by Michael Porter as a means of identifying and understanding the competition within the business environment and how this impacts on a business’ strategy.
    The five forces include;

    1. Buyer Power
    Buyer Power relates to those who are buying your products. The influence they have on your business can relate to how much they are willing to pay for a product or service, for example if your price is set too high, buyers are not likely to purchase this product or service as opposed to if the prices are lower. The most common tool that businesses are using to attract customers is a loyalty program, which rewards customers for the amount they spend. IT is important for buyer power in being able to keep track of all your customer purchases. Buyer power is high when buyer have many sellers to choose from and is low when choices are few.

    2. Supplier Power
    Supplier power relates to the influence that suppliers have on the price of products and services. The supplier chain dictates how the suppliers sell goods to the organisation, who in turn, sell these goods to the customer. This means that the cost of goods purchased by an organisation directly affect the price for the customer. That is, if a supplier increases the price of a product then for the organisation to make a profit, they too must increase their price. Supplier power is high when there are few suppliers to choose from and low when there are many suppliers, for example phone companies.

    3. Threat of Substitute Products or Services
    This relates to the number of competitors selling the same products and services as your organisation. If there are many organisations selling the same products, them there is a large threat from your competitors to attract customers to your business. Threat of substitute products and services is high when there are many alternatives to a product or service and low when there are few alternatives to choose from.

    4. Threat of New Entrants
    This relates to how easy it is for a new organisation to enter your market. This means being aware of your competitors and the products they have to offer. This may mean that an organisation is having to offer incentives to compete with the other organisations and making it difficult for a new organisation to enter the market. Threat of new entrants is high when it is easy for a new organisation to enter a market and low when there are significant barriers to market.

    5. Rivalry Among Existing Competitors
    Rivalry among existing competitors exists within any industry. It is about being knowledgeable on your competitors, of the products and services they offer, and altering the products and services you offer in a means to keep in touch with them and remain on the same level. Rivalry among existing competitors is high when competition is fierce in a market and low when competition is complacent.




    Porter's Five Forces Model:


    http://kelas.files.wordpress.com/2009/10/porters-five-forces-model.jpg





    For more information on Porter's Five Forces Model:

    http://www.quickmba.com/strategy/porter.shtml




    3. Describe the relationship between business processes and value chains?

    Business processes and value chains are both concerned with adding value to the organisation. The processes that an organisation uses, combined with the value chain, play an important role in the way the strategies are executed.

    The business process relates to standards set out by the organisation that they follow when completing tasks, which relate to the goals they set out. These tasks that they complete aim to create value, which is known as the value chain identified by Porter. Each of these processes adds value to the product or service being provided to the customer, which to offer a competitive advantage must be unique to your organisation. In order for the value chain to be successful, the organisation should identify what tasks add the most value to customers and then find IT systems that are able to provide for these tasks.


    4. Compare Porter’s three generic strategies?

    http://charliealfred.files.wordpress.com/2009/01/porter-1.png?w=694&h=396


    Porter’s three generic strategies were designed for organisations willing to enter a new market. His three strategies are: broad cost leadership, broad differentiation or focused strategy.

    Broad cost leadership is based on efficiency and finding ways to reduce costs in all aspects of the business. A cost leadership strategy is when a business is able to design, produce and market a product more efficiently than a competitor. By selling mass produced products at a lower price, an organisation is likely to gain an advantage over their competitors with higher sales gained on that product. If a business can maintain the low cost of the product, their market share is likely to increase.

    Broad differentiation involves creating/ selling a product that is different or unique from your competitors. This will usually result in higher returns for the business as customers feel a loyalty to the brand, as it is not being offered elsewhere. Examples include Apple products and Mercedes-Benz automobiles.

    Focused Strategy is about focusing your products or services to a particular market or a niche market. This means altering your marketing mix to suit the particular target market. Competitor advantage is gained though product innovation as opposed to efficiency. It is best suited to smaller organisations.