Tuesday 26 April 2011

Week Six B.I.T

Week Six - Enterprise Architectures




1. What is information architecture and what is information infrastructure and how do they differ and how do they relate to each other?

Information architecture is a system which identifies the importance of current information, these could be such things like customer records which would allow companies to see what consumers are looking for, making the system easier to recognize what is needed. information architecture is the implement of providing effective information systems which include software and services. Although there is a difference between architecture and infrastructure as one opposes as a plan and the other acts an implication to a problem, yet with this in mind one can not exist without the other.


2. Describe how an organisation can implement a solid information architecture
organisation should concentrate on


1.Back up and Recovery
2. Disaster recovery
3. Information recovery


1. Back up is the process of an exact copy of a system's information which allows a business to have all information on hand in case of an information. The recovery process is the ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup.


2. Disaster Recovery; is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood.


3. An information system; is any combination of information technology and people's activities using that technology to support operations, management, and decision-making.












3. List and describe the five requirement characteristics of infrastructure architecture

infrastructure architecture is a combination of hardware, software, and telecommunication equipment that provides the underlying foundation to support the organization’s goals. Every time the organization changes, the systems should be able to change as well to support the operations new applications. There are five characteristics of adaptable systems for infrastructure architecture and they are the following:



·         Availability:  means that the information, the computing systems used to process the information, and the security controls used to protect the information are all available and functioning correctly when the information is needed      
    
·         Flexibility - mean the ability to meet changes within the business, also meaning the way the company adjust to domestic and international issues.

·         Performance - is the ability for a business computing system to process tasks at fast speeds to help accelerate the business performance and relieves pressure of the business


·         Reliability - is the businesses capability to be highly accurate and also incredibility efficient at offering exactly what the business requires

·         Scalability - is the systems capacity for growth, it involve planning for the future and planning to create space for new business activities





4. Describe the business value in deploying a service oriented architecture 

Service orientated architecture offers great value to our consumers within business.
As not only does it allow the business to be able to see current change and adapt to change in a cost effective way, but it also allows for services and upgrades within the business to be identified quickly to create a greater more efficient system.

5. What is a event?

An event is known as a electronic message which tells the user that something within the system has happened, it detects threats and opportunities and highlights to those within a business what's happening

6. What is a service?

A service is a set of commands in which the business can re use over and over, it's thought of more as a software product and an encoding system










7. What emerging technologies can companies can use to increase performance and utilise their infrastructure more effectively

Cloud computing could be one way in which a business could use emerging technologies in this system format to create and effective and efficient business. Cloud computing works in the same way; users of "the cloud" can share computer functions by connecting, via the Internet or direct connection, to a specialized data center that holds all the data and programs necessary for their needs. The user becomes responsible only for a simple computer that can connect to the internet (or localized network) and access the central data center. Thus using this would enable the business to format everything into a simple system and allow users to responsible for only there own work with minimal errors. 


Thursday 7 April 2011

Week Five B.I.T

 ETHICS AND SECURITY:



Explain the ethical issues surrounding information technology

Information is a source of power and, increasingly, the key to prosperity among those with access to it. Although, advancements in information systems also involve social and political entities, and this makes ethical considerations in how information is used all the more important. Electronic systems now reach into all levels of government, into the workplace, and into private lives to such an extent that even people without access to these systems are affected in significant ways by them. New ethical and legal decisions are necessary to balance the needs and rights of everyone.

http://libr.org/isc/issues/ISC23/B9a%20Ruth%20Rikowski.pdf

Describe a situation involving technology that is ethical but illegal

In today's modern age with the accessibility to the world wide web, a prime example of a ethical situation which could be ascertained as illegal would be; there is a situation in which a work college has being accessing confidential data of a business, so another employee breaks into there account to demonstrate to business owners that the employee has being hacking confidential data. Although it's ethical to show to the business owners of the employees mis behavior, it's illegal to access another person account breaking confidentiality rules and also rules of privacy.

Describe and explain one of the computer use policies that a company might employee


Ethical computer use policy;

Code of Computer Ethics and Acceptable Use policy provides for access to information technology (IT) resources and communications networks within a culture of openness, trust, and integrity. In addition, companies/institutions committed to protecting themselves, students, faculty, and staff from unethical, illegal, or damaging actions by individuals using these systems.

The purpose of this policy is to outline the ethical and acceptable use of information systems at companies/institutions world wide. These rules are in place to protect students, faculty, and staff, i.e., to ensure that members of the company or institution to have access to reliable, robust IT resources that are safe from unauthorized or malicious use.




http://en.wikipedia.org/wiki/Computer_ethics


What are the 5 main technology security risks?

Human Error, Natural Disasters, Technical Failures, Deliberate Acts, and Management Failure.
Outline one way to reduce each risk?

Human error: 
Two approaches to the problem of human fallibility exist: the person and the system approaches

The person approach focuses on the errors of individuals, blaming them for forgetfulness, inattention, or moral weakness
The system approach concentrates on the conditions under which individuals work and tries to build defences to avert errors or mitigate their effects

Natural disasters: attempting to access the information which was once stored on the computer system, after a natural disaster, this is why all business's need to use back all systems up onto external hardware or to an online source.

Technical failure: Is where the computer system either crashes or receives a virus, another reason to keep all work backed up onto online sources. 

Deliberate acts: Are acts committed by people within and without of the business to access viable data. Having set up a secure system which involves employees to have a password helps the business from not getting hacked, also having anti hacker software helps the company from loosing important information. 

Management failure: Management need to continually back up data, and have both hard and soft copies of all important information. Management also need to keep staff up to date with all important procedures in case of emergencies.




What is a disaster recovery plan, what strategies might a firm employee?

Business's after a disaster need to recover via implementing an action/communication plan to strategize how to keep the business progressing and locate data to pick up where they left off. 

The business must operate under the business continuity plan whilst in disaster mode, which means that all operations must be done off site and data must be slowly replaced to help the business regain ground. whilst this is happening the company must document all processes and check to see if all information is safe and unharmed  


Week Four B.I.T

eBusiness: 






1. why has the web grown so dramatically?


The world wide web has taken of dramatically since it's induction in 1991 with the introduction of the first web browser.


The internet has drastically impacted the business world in the last few years and this trend will certainly continue well into the future. several companies have discovered the advantages of having a presence on the internet and have successfully addressed business objectives by using their web site as part of their business strategy.
A web site can generate awareness and provide a world wide store front for your company while automating many business procedures 24 hours a day. A few characteristics of why the web has expanded are below;


* Networking
* Business information
* Service
* Remote access to employees/customers


http://www.britannica.com/EBchecked/topic/649051/World-Wide-Web-WWW


2. What is web 2.0 and how does it differ from web 1.0?


The term 2.0 is associated with  web applications that facilitate participatory information sharing, interoperability, user-centered design, and collaboration on the World Wide Web.

Web 2.0 websites allow users to do more than just access information. By increasing what is already possible in "Web 1.0", they provide users with optimal user-interface, software and storage facilities, all through their browser. This has been called Network as platform computing. Users can provide the data that is on a Web 2.0 site and utilize complete control over selected data. These sites may have an Architecture of participation that encourages users to add value to the application as they use it.



3. How could a web 2.0 technology be used in business?


Today the business world is undergoing a significant transformation thanks to a set of technologies collectively known as "Web 2.0." Although it's tempting to dismiss Web 2.0 as Silicon Valley hype, that would be a mistake. Web 2.0 represents an important step in the evolution of Internet-based tools, and in the years ahead, it's likely to have a major impact on the way information is managed and distributed within a company.


It becomes apparent that a business would use web 2.0 to facilitate communication, secure information sharing, interoperability, and collaboration on the world wide web. Web 2.0 concepts have led to the development and evolution of web-based communities, hosted services, and applications; such as social networking sites, video sharing sites, wikis and blog sites.This can really help a business to achieve higher growth and larger market share.


http://www.mckinseyquarterly.com/How_businesses_are_using_Web_20_A_McKinsey_Global_Survey_1913


4. What is eBusiness, how does it differ from eCommerce?


While the words Commerce and Business don't have much difference in English and in fact are largely interchangeable as nouns describing organized profit-seeking activity, there is a difference between eCommerce and eBusiness.


Ebusiness is a firm which, in relation to an electronic commerce firm,conducts its day-to-day business functions over the internet and/or other electronic networks such as electronic data interchange (EDI). Electronic business includes collaborating with distributors on sales promotions, interacting with and servicing the customers, and conducting joint research with business partners.

whereas, eCommerce 
refers to a wide range of online business activities for products and services. It also pertains to “any form of business transaction in which the parties interact electronically rather than by physical exchanges or direct physical contact.” 

E-commerce is usually associated with buying and selling over the Internet, or conducting any transaction involving the transfer of ownership or rights to use goods or services through a computer-mediated network.


5. What is pure and partial eCommerce?

There is a subtle distinction between these two. Pure E-Commerce concerns business whose transactions are largely carried out on the Internet. For instance, my favourite commercial web site, SibeliusMusic publishes music written by members of the public. You can peruse the music, listen to it on line, then pay for it using your credit card and download it for yourself - All done on the Internet. 

"Partial E-Commerce on the other hand concerns business in which a large part of the transaction takes place in the off-line real world. Amazon, for instance, will sell you books online, but these must be stored in large 
warehouses and physically delivered through the post.


http://members.tripod.com/adm/banned.html?member=richardbowles
mgt.buffalo.edu/departments/mss/djmurray/.../Chapter05_web.ppt 






7. 
List and describe the major B2B models?

Established Buyer-Supplier Relationship


This is a pre-determined one-to-one relationship between a buyer and supplier that is supported by electronic commerce technologies. Companies are now pursuing a more intensive and interactive relationship with their suppliers, impacting upon the buyer-supplier relationship in a number of areas, including the integration of manufacturing systems and supplier involvement in new product development



 Supplier-Oriented Marketplace
In this model, both organizations and consumers use the supplier-provided marketplace. This is the most common type of B2B model. In this model, both business buyers and individual consumers use the same supplier-provided marketplace

 Buyer-Oriented Marketplace
Under this model, a buyer opens an electronic market on its own server and invites potential suppliers to bid on the announced Requests for Quotation (RFQs). 



 Business-to-Business Intermediary
This model is sometimes referred to as a ‘hub’ or ‘exchange’. It is established by an electronic intermediary that runs a marketplace where suppliers and buyers have a central point to come together. These B2B hubs tend to focus mainly on non-core items that may range from stationery and computers to catering services and travel. There are two types of hubs:
  • Vertical - focus on an industry and provide content that is specific to the industry’s value system of buyers and suppliers. Examples include e-Steel that acts as an intermediary between steel- makers and customers, and VerticalNet that provides intermediaries for many industries including electronics, process, telecommunications, and utilities.
  • Horizontal - provide the same function for a variety of industries










8. Outline 2 opportunities and 2 challenges faced by companies doing business online

Within online business there are two main challenges that business's face






The two main opportunities business have by conducting business online are:

1. In global prospects it's hard to look past the the development of website services as a opportunity for Ebusiness

There is practically an unlimited opportunity in the area of website development around the world.
Every single business and independent professional around the world is eventually going to need a website. There is going to be a perennial demand for creative website developers for at least the next 10 years. To start this business, you need not necessarily be a website developer yourself, through this development as a business it would allow for the company at hand to become a known presence on the internet and be able to generate sales through a webpage which entail outlines what they are offering.

2. Advancement in technology to increase business growth and expenditure

within today's business world the advancements in technology are a exciting prospect and opportunity for businesses are it enables items of the business to be processed faster, tracked and created. Keeping up to date with the latest technological advancements can help a business in delivery systems for example advanced GPS signalling and tracking systems for consumers to see where abouts of products. Another major item which is identified with technology advancements would be the ability to present business prospects to not only consumers but also other companies who are interested in becoming share holders, which in turn can help the business increased it's debits.



Within online business there are two main challenges that business's face: 




1. Marketing:

marketing is one of the core essentials in the business to help them succeed in there industry of choice. challenges becomes apparent for a business owner to market there own products/services online, especially in today's day and age the internet has such a vast majority of websites and companies offering the same items, which intend makes the market place rather congested with similar products and great deals, which can grab consumers attention quickly and swiftly. Also marketing becomes a challenge  as it tends to be a tedious job when trying to out do competitors.

2. Technology:
technology itself poses a risk to ebusiness, simply because ecommerce is so dependent on it. Infrastructure problems, such as a server malfunctioning, can shut down a website. Likewise, viruses can delete valuable data, and software glitches can keep a site from working properly. Of course, outside attacks from hackers, who want to steal sensitive customer information or deface a site, is also a risk that ecommerce merchants must try to guard against

http://www.nsf.gov/cise/cns/dddas/fran_k/tsld011.htm