Professional Documents
Culture Documents
BMIT5103
STUDY GUIDE
BMIT5103
Information Technology for
Managers
Writer:
Developed by:
STUDY GUIDE
BMIT5103
STUDY GUIDE
BMIT5103
Contents
Course Introduction ..................................................................................... 5
Synopsis ............................................................................................. 5
Objectives .......................................................................................... 5
Learning Outcomes ............................................................................ 5
Study Load ......................................................................................... 6
Main Textbook(s) .............................................................................. 7
Assigned Readings ............................................................................ 7
Additional Recommended Readings .................................................. 7
Assessment ........................................................................................ 7
Learning Guide ............................................................................................ 8
An Overview ....................................................................................... 8
Topic 1 ............................................................................................ 11
Topic 2 ............................................................................................. 15
Topic 3 ............................................................................................ 19
Topic 4 ............................................................................................ 24
Topic 5 ............................................................................................ 29
Topic 6 ............................................................................................ 34
Topic 7 ............................................................................................ 39
Topic 8 ............................................................................................ 44
Topic 9 ............................................................................................ 49
Topic 10 .......................................................................................... 54
Topic 11 .......................................................................................... 59
Topic 12 .......................................................................................... 64
Topic 13 .......................................................................................... 69
Topic 14 .......................................................................................... 73
Appendices................................................................................................. 77
Appendix A: Learning Support ......................................................... 77
Appendix B: Study Tips .................................................................... 78
STUDY GUIDE
BMIT5103
STUDY GUIDE
BMIT5103
Objectives
The general aims of this course are to:
1.
2.
3.
4.
Learning Outcomes
By the completion of this course, you should be able to:
1.
2.
3.
4.
5.
STUDY GUIDE
BMIT5103
6.
7.
8.
9.
10.
11.
12.
13.
14.
new
forms
of
Study Load
It is a standard OUM practice that learners accumulate 40 study hours for
every credit hour. As such, for a three-credit hour course, you are expected
to spend at least 120 hours of learning. Table 1 gives an estimation of how
the 120 hours can be accumulated.
Table 1: Allocation of Study Hours
Activities
No. of Hours
60
15
15
Completing assignment(s)
20
Revision
10
Total
120
STUDY GUIDE
BMIT5103
Main Textbook(s)
Turban, E., & Volonino, L. (2012). Information technology for management,
International student version. Asia: John Wiley.
Assigned Readings
Laudon, K. C., et al. (2012). Management information systems: Managing
the digital firm. Canada: Pearson Education.
Assessment
Please refer to myVLE for information on the assessment format and
requirements.
STUDY GUIDE
BMIT5103
Week
Topic 1:
Topic 2:
Topic 3:
Topic 4:
Topic 5:
Topic 6:
Topic 7:
Topic 8:
Topic 9:
10
STUDY GUIDE
BMIT5103
Each topic in the Learning Guide comprises the following sections (refer to
Figure 1):
x
Assigned Readings: help you to navigate the main textbook and reading
materials;
interpretative
framework
for
STUDY GUIDE
BMIT5103
10
STUDY GUIDE
Topic 1:
BMIT5103
Learning Outcomes
By the end of this topic, you should be able to:
1.
2.
3.
4.
5.
Discuss how IT impacts your career and the positive outlook for
information systems (IS) management careers.
Topic Overview
This topic highlights the importance of being an agile enterprise. The
capability of IT in improving profitability by enabling ways to connect with and
push content through social networks and mobile devices is discussed.
Factors which determine the business value of IT and IS are emphasised.
Section 1.3 stresses the business performance management (BPM) cycle
and its challenges. The support of IT in enabling an organisation to respond
towards business pressure is described in detail. Strategic (SWOT) analysis
and strategic planning analysis are compared. The topic clarifies Porters
competitive forces and value chain model. Finally, it explains the importance
of learning IT.
11
STUDY GUIDE
BMIT5103
Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for management.
International student version. Asia: John
Wiley.
1.1
1.2
1.3
1.4
1.5
Positioning IT to Optimise
Performance
Information Systems and IT:
Core Concepts
Business Performance
Management (BPM) and
Measurement
Strategic Planning and
Competitive Models
Why IT is Important to Your
Career, and IT Careers
Chapter 1, pp 58.
Chapter 1, pp 811.
Chapter 1, pp 1215.
Chapter 1, pp 1621.
Chapter 2, pp 2224.
Extra Readings
How to generate a Microsoft Tag
microsoft.com/tag/
How to create a custom 2D tag
mediadl.microsoft.com/mediadl/www/t/t
ag/CreatingCustomTags.wmv
How to download a reader gettag.mobi/
Apple iPad apple.com/ipad/
iReport, a user-generated section of
CNN.com ireport.com/
Porters 5 Competitive Forces Model
youtube.com/watch?v=mYF2_FBCvXw
US Bureau of Labor Statistics
bls.gov/oco/ocos258.htm
Teradata University Network (TUN)
teradatauniversitynetwork.com/tun/
Leadership in Energy and
Environmental Design (LEED)
usgbc.org/leed
US CIA World Factbook
cia.gov/library/publications/the-worldfactbook/
UK National Offender Management
Information System project (NOMIS)
nao.org.uk/whats_new/0708-
12
STUDY GUIDE
BMIT5103
1/0809292.aspx
Content Summary
1.1
1.2
1.3
Components of an IS.
13
STUDY GUIDE
BMIT5103
Ethical issues.
14
STUDY GUIDE
1.4
1.5
BMIT5103
Strategic Planning.
IS and IT Failures.
IT as a career.
IT job prospects.
Study Questions
1.
2.
3.
4.
Describe the impact of the business environment and describe ways for
an organisation to respond.
5.
Explain Porters five forces model and give an example of each force.
6.
7.
8.
9.
10.
15
STUDY GUIDE
Topic 2:
BMIT5103
Learning Outcomes
By the end of this topic, you should be able to:
1.
Explain the types of information systems and how they process data;
2.
3.
4.
Topic Overview
This topic highlights business information systems and business software
applications. The hierarchy of knowledge from data and information is
explained. Types of IS and support, specifically Transaction Processing
Systems (TPS), Management Information Systems (MIS) and Decision
Support Systems (DSS) are specified clearly. Section 2.3 emphasises supply
chain and logistics support which includes RFID systems to track and
monitor products and materials. Next, IT infrastructures, cloud computing
and services which include virtualisation and enterprise clouds are
explained. The topic ends with issues in moving workloads from enterprise to
the cloud.
16
STUDY GUIDE
BMIT5103
Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for management,
International student version. Asia: John
Wiley.
2.1
2.2
2.3
2.4
Chapter 2, pp 3334.
Chapter 2, pp 3542.
Chapter 2, pp 4345.
Chapter 2, pp 4650.
Extra Readings
Blog on cloud computing
http://infoworld.com/blogs/davidlinthicum
Planners Lab, for building a DSS
http://plannerslab.com
Supply Chain and Logistics Institute
http://SCL.gatech.edu/
Salesforce.com cloud demos
http://salesforce.com
US Defense Information Systems
Agency http://disa.mil
Supply Chain, Europes strategic
supply chain management resource.
http://supplychainstandard.com
17
STUDY GUIDE
BMIT5103
Content Summary
2.1
2.2
2.3
18
STUDY GUIDE
2.4
BMIT5103
Characteristics of IT infrastructure.
Study Questions
1.
2.
3.
4.
5.
6.
7.
What is virtualisation?
8.
9.
10. How can accurate reporting systems improve operational and strategic
performance?
19
STUDY GUIDE
Topic 3:
BMIT5103
Learning Outcomes
By the end of this topic, you should be able to:
1.
2.
3.
4.
Topic Overview
This topic highlights the importance of managing data, text and document
as well as their impacts on business performance. It begins by associating
data, text and documents as strategic assets of organisations and providing
reasons data management is necessary. Next, the need for a database
and a data warehouse for storing and managing data is emphasised. It is
indicated that high-quality data depends on effective approaches to data
management. Again in this topic, data visualisation deployment for
supporting decisions is explained. Problems and issues which occur due to
poor management of data are outlined. Master data management (MDM)
consolidates data from various data sources into a master reference file
which creates accurate and consistent data across the enterprise. Concept
and definition of a master reference file is elaborated. Data quality and
integrity is still the main concern when storing and managing data to gain
users trust. Text mining and analysis, and document management system
are also reviewed. Section 3.2 explains the file management systems and
their limitations compared to the Database Management Systems (DBMS).
Section 3.3 clarifies databases and DBMS benefits compared to the
computer-based files system. Section 3.4 compares databases to data
warehouses in terms of real-time support and benefits rendered by a data
warehouse. The characteristics and development of data warehouse is
further explained. The concept of data mart, operational data stores, and
dimensional databases is also reviewed. Enterprise Content Management
(ECM) has become an important data management technology, particularly
for large and medium-sized organisations. ECM includes electronic
document management, Web content management, digital asset
management and electronic records management (ERM). ERM are
important data management technology for large and medium-sized
20
STUDY GUIDE
BMIT5103
Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, International student
version. Asia: John Wiley.
3.1
3.2
3.3
3.4
3.5
Chapter 3, pp 5969.
Chapter 3, pp 6972.
Chapter 3, pp 7276.
Chapter 3, pp 7682.
Chapter 3, pp 8284.
Extra Readings
Advisor Solutions, data analytics
and
visualisation
http://advizorsolutions.com/
Clarabridge: How Text Mining Works
http://clarabridge.com/
SAS Text Miner http://sas.com/
Tableau data visualisation software
http://tableausoftware.com/datavisualization-software/
EMC Corp., enterprise content
management http://emc.com
Oracle DBMS http://oracle.com/
21
STUDY GUIDE
BMIT5103
Content Summary
3.1
3.2
3.3
22
STUDY GUIDE
3.4
3.5
BMIT5103
(ECM)
and
E-Records
Study Questions
1.
2.
3.
4.
5.
6.
8.
9.
23
STUDY GUIDE
BMIT5103
10.
11.
12.
24
STUDY GUIDE
Topic 4:
BMIT5103
Learning Outcomes
By the end of this topic, you should be able to:
1.
2.
3.
4.
5.
Evaluate green, social and ethical issues related to the use and
operations of networks.
Topic Overview
This topic highlights business networks and their functionalities. The
transmission of signals from the sender to the receiver is enabled by
switches and routers. Circuit switch and packet switch are compared.
Popular network terminology is listed. IP networks support convergence. The
growth of high capacity networks is tabulated. Networks devices and mobile
network evaluation factors are emphasised. Section 4.2 stresses on wireless
broadband networks. Mobile infrastructure, Wi-Fi networking standards,
wireless wide area networks (WWANS), WLAN and WiMAX are elaborated.
Network management and portals focuses on the model of the network
capability, collaboration capability and performance relationship are clarified.
Convergence and interoperability of information services are examined.
Barriers to full integration of information services are outlined. Network
computing infrastructure which includes Internet, Intranet and Extranet is
also considered. Enterprise search and information portal operations and
usage are discussed. The importance of virtual collaboration, group work
and decision processes are discussed. Next, collaboration support
technologies are highlighted. This topic ends with legal and ethical issues
due to the impact of being connected 24/7 and working in a computercontrived virtual team.
25
STUDY GUIDE
BMIT5103
Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for management,
international student version. Asia: John
Wiley.
4.1
4.2
4.3
4.4
4.5
Business Networks
Wireless Broadband
Networks
Network Management and
Portals
Collaboration
Green, Legal and Ethical
Issues
Chapter 4, pp 9498.
Chapter 4, pp 98101.
Chapter 4, pp 101109.
Chapter 4, pp 109113.
Chapter 4, pp 113114.
Extra Readings
Google Wave http://wave.google.com/
video
wave.google.com/about.html#video
Twitter network status
http://status.twitter.com/
Azulstar http://azulstar.com/
Clear 4G WiMAX http://clear.com
International CTIA Wireless
Tradeshows http://ctiawireless.com/
Cisco http://cisco.com
Microsoft SharePoint 2010
http://sharepoint.microsoft.com/Pages/
Default.aspx
Cellular Telecommunications Industry
Association http://ctia.org/
WiMAX Forum http://wimaxforum.org
Packet switching flash demo
http://pbs.org/opb/nerds2.0.1/geek_gl
ossary/packet_switching_flash.html
Cell phone radiation levels (SAR)
http://reviews.cnet.com/2719-6602_7291-2.html?tag=
Kaiser Permanente HealthConnect
video
http://youtube.com/kaiserpermanenteo
rg
26
STUDY GUIDE
BMIT5103
Content Summary
4.1
4.2
4.3
Business Networks
x
Mobile infrastructures.
27
STUDY GUIDE
4.4
4.5
BMIT5103
Collaboration
x
Virtual collaboration.
Study Questions
1.
2.
3.
4.
5.
6.
7.
8.
28
STUDY GUIDE
BMIT5103
9.
10.
11.
12.
What health and quality of life issues are associated with social
networks and a 24/7 connected life style?
29
STUDY GUIDE
Topic 5:
BMIT5103
Learning Outcomes
By the end of this topic, you should be able to:
1.
2.
3.
4.
5.
6.
7.
Topic Overview
This topic highlights business vulnerabilities, risks and disasters which can
be solved with the use of IT. It begins by examining the misconception of
many regarding information and network security. Data security requires
integrated solutions which span technical, physical and policy control.
Knowing your enemy and your risks can solve half of your problems.
Business risks can be caused by insiders, outsiders and malware which can
impact business performance. The key IT security terms in accordance to
Infosec is provided. Social networks and cloud computing may increase
vulnerabilities by providing a single point of failure. Phishing and attacks are
getting more complicated by being linked together.
ERM and COBIT are two accepted models for IT governance. The IT
security defence-in-depth model emphasises information security as a
combination of people, processes and technology. The Risk Exposure Model
has been proposed for digital asset impact analysis. IT threats are classified
into unintentional and intentional threats. Two basic types of deliberate IT
attacks are data tempering and programming attacks. Targeted attacks such
as APT, Botnets and Malware on enterprises together with their measures
are also discussed. Section 5.3 explains the characteristics, prevention and
detection of fraud, crime and violation. The causes and characteristics of
identity theft are also identified.
30
STUDY GUIDE
BMIT5103
Section 5.4 explains strategies and controls which depend on what needs to
be protected and cost-benefit analysis. Major categories of general controls
such as physical, access, biometric, administrative application and endpoint
controls are clarified. Section 5.5 looks specifically at network security
control. It explains the aims and characteristics of the three layers of
measures which are perimeter security, authentication and authorisation.
Section 5.6 emphasises internal control and compliance to achieve reliable
financial reporting, operational efficiency and law compliance. Section 5.7
concludes the topic with business continuity planning, disaster recovery and
auditing. Cost-benefit analysis such as risk management auditing is
necessary to justify economic IT. Implementing security programs can
sometimes raise ethical issues. Therefore, an organisation should realise
that a security control system which is too strict can violate privacy and
increase dissatisfaction among users.
Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, International student
version. Asia: John Wiley.
5.1
5.2
5.3
5.4
5.5
5.6
5.7
Chapter 5, pp 123132.
Chapter 5, pp 132136.
Chapter 5, pp 136139.
Chapter 5, pp 139142.
Chapter 5, pp 142145.
Chapter 5, pp 145147.
Chapter 5, pp 147149.
Extra Readings
Information Security Magazine
http://searchsecurity.techtarget.com
CIO Magazine, IT Security
http://cio.com/topic/3089/Security
Computer and Internet Security
http://cnet.com/internet-security
IT Governance Institute http://itgi.org
31
STUDY GUIDE
BMIT5103
US Computer Emergency
Readiness Team http://uscert.gov/cas/tips/
SANS Information Security Reading
Room sans.org/reading_room/
Privacy news from around the world
pogowasright.org/
Government Computer News
(GCN ) http://gcn.com/
CompTIA http://comptia.org/
F-Secure http://fsecure.com/en_US/security/securitycenter/
Social engineering
http://symantec.com/connect/articles
/social-engineering
Content Summary
5.1
5.2
Multilink attacks.
Unintended threats.
Internal threats.
IT attacks.
Targeted attacks.
Botnets.
32
STUDY GUIDE
5.3
5.4
5.5
5.6
5.7
BMIT5103
Occupational fraud.
Identity theft.
Defence strategy.
Network Security
x
Network authentication.
Network authorisation.
33
STUDY GUIDE
BMIT5103
Study Questions
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
34
STUDY GUIDE
Topic 6:
BMIT5103
Learning Outcomes
By the end of this topic, you should be able to:
1.
2.
3.
4.
5.
6.
Topic Overview
This topic highlights e-commerce and its benefits to organisations,
consumers and society. Nevertheless, it also has technological and nontechnological limitations. The current technological limitations are expected
to lessen with time. The major mechanism of e-commerce is the use of
electronic markets, which frequently include online catalogues. Another
mechanism of e-commerce is auctions. The Internet provides an
infrastructure for executing auctions at lower cost and with many more
involved sellers and buyers, including both individual consumers and
corporations. Two major types of auctions exist: forward auctions and
reverse auctions. Forward auctions are used in the traditional process of
selling to the highest bidder. Reverse auctions are used for buying, using a
tendering system to buy at the lowest bid.
B2C e-tailing can be pure (such as Amazon.com) or part of a click-andmortar organisation (such as Walmart). Direct marketing is done via solo
storefronts or in malls. It can be done via electronic catalogues or by using
electronic auctions. The leading online B2C service industries are banking,
securities trading, job markets, travel and real estate. The major issues faced
by e-tailers are channel conflict, conflict within click-and-mortar
organisations, order fulfilment, determining viability and risk, and identifying
appropriate revenue models.
35
STUDY GUIDE
BMIT5103
The major B2B applications are selling from catalogues and by forward
auctions (the sell-side marketplace), buying in reverse auctions and in group
and desktop purchasing (the buy-side marketplace) and trading in electronic
exchanges. E-government commerce can take place between government
and citizens, between businesses and governments, or among government
units. It makes government operations more effective and efficient.
New electronic payment systems are needed to complete transactions on
the Internet. Electronic payments can be made by e-checks, e-credit cards,
purchasing cards, e-cash, stored-value money cards, smart cards, personto-person payments via services such as Paypal, electronic bill presentment
and payment, and e-wallets. Order fulfilments are especially difficult and
expensive in B2C because of the need to ship relatively small orders to
many customers. Several activities take place, some of which can be done
simultaneously; others must be done in sequence. Activities that take
place in order fulfilments include: (1) making sure the customer will pay;
(2) checking for in-stock availability; (3) arranging shipments; (4) insurance;
(5) replenishment; (6) in-house production; (7) use of contractors;
(8) contacts with customers; and (9) returns (if applicable). Ethical and legal
issues are persistent in e-commerce and must constantly be addressed.
Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, International student
version. Asia: John Wiley.
6.1
6.2
6.3
6.4
6.5
Chapter 6, pp 160167.
Chapter 6, pp 167171.
Chapter 6, pp 171173.
Chapter 6, pp 173176.
Chapter 6, pp 176182.
36
STUDY GUIDE
6.6
BMIT5103
Chapter 6, pp 183184.
Extra Readings
Amazon.coms First Website, 1995
digitalenterprise.org/images/amazo
n.gif
e-Business forum
ebusinessforum.com
Google Merchant Centre
google.com/merchants
Google Product Search
google.com/products
Shopzilla shopzilla.com
US Federal Trade Commission
ftc.gov
PCI Security Standards Council
pcisecuritystandards.org/index.sht
ml
Internet statistics
internetworldstats.com
Many Eyes (beta) data sets and
visualisation tools
manyeyes.alphaworks.ibm.com/ma
nyeyes/
Washington, DC Data
Catalogue data.octo.dc.gov/
Content Summary
6.1
E-Business Models.
37
STUDY GUIDE
6.2
6.3
6.4
6.5
6.6
BMIT5103
Issues in e-tailing.
E-sourcing.
E-Procurement.
e-Government
x
Web advertising.
Electronic payments.
38
STUDY GUIDE
BMIT5103
Study Questions
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
39
STUDY GUIDE
Topic 7:
BMIT5103
Learning Outcomes
By the end of this topic, you should be able to:
1.
2.
3.
4.
5.
Topic Overview
This topic highlights the technologies of mobile computing and its roles in
shopping, entertainment, gaming, hospitality and travel, and advertising.
Mobile computing and commerce are based on a foundation of mobile
software (operating systems and handhelds), and wireless networks. Mobile
computing devices include laptop computers, iPad, mobile devices like
smartphones and PDAs, e-readers and slate computers as well as wearable
computers. A wide variety of mobile operating system exists to power
smartphones and other mobile devices. This presents a challenge for mobile
website and handheld programmers. Wireless networks based on Wi-Fi and
telecommunications technology (e.g. 3G and 4G) have expanded
considerably in the last few years, offering wide-scale coverage for mobile
users. People are increasingly using mobile devices, especially
smartphones, to perform financial transactions, including banking, credit card
transactions and stock purchases. Numerous mobile electronic payment
systems have been developed. It remains to be seen which one(s) will be
accepted by merchants and consumers.
40
STUDY GUIDE
BMIT5103
41
STUDY GUIDE
BMIT5103
Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, international student
version. Asia: John Wiley.
7.1
7.2
7.3
7.4
7.5
Chapter 7, pp 192197.
Chapter 7, pp 197200.
Chapter 7, pp 200205.
Chapter 7, pp 205208.
Chapter 7, pp 209211.
Extra Readings
Ecommerce Times M-Commerce
ecommercetimes.com/perl/section/m
-commerce/
Mobile Commerce Daily
mobilecommercedaily.com
Storefront Backtalk
storefrontbacktalk.com/
Lo-So (Location-based social
networking) Foursquare.com
Augmented Reality on Smartphones
youtube.com/watch?v=b64_16K2e0
8
Mobile payments threaten retail
banks and credit cards
youtube.com/watch?v=vpw9KcqgVv
E&feature=related
Wearable Computer by Motorola
youtube.com/watch?v=zNYNZ03WH
1E&feature=related
Innovative Mobile Payment System
by Square
youtube.com/watch?v=iBieYjxUj5Q
Mobile Inventory Management
youtube.com/watch?v=6ekRCUDD9o
42
STUDY GUIDE
BMIT5103
Content Summary
7.1
7.2
7.3
7.4
Mobile entertainment.
Mobile games.
Targeted advertising.
Mobile portal.
L-Commerce Technologies.
43
STUDY GUIDE
7.5
BMIT5103
Mobile apps.
Study Questions
1.
2.
3.
What factors have led to the recent growth of the smartphone market?
4.
What are the two kinds of basic transactions requiring mobile payment
systems?
5.
What are the most common security risks associated with mobile
banking?
6.
7.
8.
9.
10.
11.
12.
13.
44
STUDY GUIDE
Topic 8:
BMIT5103
Learning Outcomes
By the end of this topic, you should be able to:
1.
2.
3.
4.
5.
Describe how the Internet is evolving and the significant changes that
will take place in the near future.
Topic Overview
This topic highlights Web 2.0 and social media. Web 2.0 consists of several
tools that allow for enhanced social interaction on the Web. The new social
Web is changing the way people communicate, their behaviour and their
expectations of how business organisations should interact with them.
Typical Web 2.0 applications include blogs, wikis, social networking services,
sharing sites, RSS, widget, mashup and social benchmarking. Online
communities predate the World Wide Web and can take a variety of forms.
The social graph describes how we are all connected to one another through
relationships. The giant global graph describes the connection between
people and/or documents and pages online. Social networking services are a
dominant form of online community today and include companies such as
Facebook, Ozone, Orkut and Habbo. Enterprise 2.0 refers to the use of Web
2.0 technologies for business use. The use of social media tools by
businesses is likely to change the behaviours of employees and the way that
managers lead their organisations. Businesses are using social media tools
in human resources, marketing and sales, SCM, internal collaboration and
communication and other areas. Businesses use metrics to evaluate the
efficiency and effectiveness of their social media efforts. Social media
metrics fall into four categories: tool metrics, tactical metrics, strategic
metrics and ROI metrics. Technology is being created to make information
search on the Web more effective. The future Internet is frequently referred
to as semantic Web which will be based on new languages such as RDF,
45
STUDY GUIDE
BMIT5103
Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for management,
international student version. Asia: John
Wiley.
8.1
8.2
8.3
8.4
8.5
Chapter 8, pp 221228.
Chapter 8, pp 228235.
Chapter 8, pp 235239.
Chapter 8, pp 239244.
Chapter 8, pp 244248.
Chapter 8, pp 147149.
Extra Readings
Web 2.0The Machine Is Us/ing Us
youtube.com/user/mwesch#p/u/9/NLlG
opyXT_g
Social Media Revolution Is it a fad?
youtube.com/watch?v=lFZ0z5Fm-Ng
Mashable Social Media Guide
mashable.com/social-media/
Cluetrain Manifesto cluetrain.com/
OReilly Media oreilly.com/community/
World Wide Web Consortium
w3.org/Consortium/
Read, Write, Web technology blog
readwriteweb.com/
46
STUDY GUIDE
BMIT5103
Content Summary
8.1
8.2
Multilink attacks.
Twitter: Miccroblogging.
47
STUDY GUIDE
8.3
8.4
8.5
BMIT5103
Tool-based metrics.
Tactical metrics.
Strategic metrics.
ROI metrics.
Semantic Web.
Artificial intelligence.
Mobility.
Barriers to overcome.
48
STUDY GUIDE
BMIT5103
Study Questions
1.
2.
What are the basic tools or applications that characterise Web 2.0?
3.
What are the major differences between social networking services and
other online communities?
4.
Why would a business want to create a private SNS? What are some
of the challenges associated with doing this?
5.
Explain why social media tools are likely to make supply chains more
efficient and productive in the future.
6.
7.
List social media strategies that businesses might pursue. What kind of
information could they gather to see if they are being effective with
social media?
8.
9.
10.
11.
Many NPOs, NGOs and government agencies serve the poor and
disadvantaged, many of whom have limited access to the Internet.
Identify some ways that social media might still be an important tool for
these groups.
12.
Describe the fundamental changes that need to take place before the
semantic Web concept becomes widespread.
49
STUDY GUIDE
Topic 9:
BMIT5103
Learning Outcomes
By the end of this topic, you should be able to:
1.
2.
3.
4.
5.
Topic Overview
This topic highlights IS applications and their support on the functional
activities of an organisation. The major business functional areas are
production/operation management, marketing, accounting/finance, and
human resources management. The backbone of most IS applications is
TPS which take cares of the routine mission central operations of the
organisation. The core area of IT support to production/operations
management is logistics and inventory management: JIT, mass
customisation and CRM. Financial IS deal with topics such as: investment
management, financing operations, raising capital, risk analysis and credit
approval. Accounting IS cover many non-TPS applications in areas such as
cost control, taxation and auditing. Most tasks related to human resource
development can be supported by human resource IS. These tasks include
employee recruitment and selection, hiring, performance evaluation, salary
and benefits administration, training and development, labour negotiation
and work planning. Online human resource systems are extremely useful for
recruiting and training.
50
STUDY GUIDE
BMIT5103
Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for management,
international student version. Asia: John
Wiley.
9.1
9.2
9.3
9.4
9.5
Chapter 9, pp 258265.
Chapter 9, pp 265267.
Chapter 9, pp 268270.
Chapter 9, pp 270275.
Chapter 9, pp 275279.
Extra Readings
Data sets, including profit margins
data360.org
Web Analytics Association
webanalyticsassociation.org
Piwik, open source Web analytics
piwik.org/
Google Analytics
google.com/analytics
Yahoo! Web Analytics
web.analytics.yahoo.com/
Oracle oracle.com
EOQ Tutorial
scm.ncsu.edu/public/inventory/6eoq.h
tml
Project Management Institute (PMI)
pmi.org
WebEx webex.com
Salesforce software salesforce.com
51
STUDY GUIDE
BMIT5103
Content Summary
9.1
9.2
9.3
IT at Work 9.2 First Choice Ski Beats Its Competition with Yahoo!
Web Analytics.
Operational Subsystems.
In-house logistics.
Inventory control.
Quality control.
Project management.
Computer-integrated manufacturing.
Data-driven marketing.
Distributed channels
Marketing management.
52
STUDY GUIDE
9.4
9.5
BMIT5103
Auditing IS.
HR Management activities.
Study Questions
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
53
STUDY GUIDE
BMIT5103
11.
12.
13.
14.
Describe IT support
development.
15.
Which functional areas are related to payroll, and how does the
relevant information flow?
for
employee
54
selection,
promotion
and
STUDY GUIDE
Topic 10:
BMIT5103
Learning Outcomes
By the end of this topic, you should be able to:
1.
2.
3.
4.
5.
6.
Topic Overview
This topic highlights information systems that support several departments
and/or the entire enterprise. A good example is ERP which supports supply
chains and CRM. Supply chains connect suppliers to manufacturers,
departments inside a company to one another, and a company to its
customers which are supported by a variety of IT application programs. The
supply chain must be completely managed from the raw materials to the end
customers. Typical supply chains involve the upstream, internal and
downstream. Lack of coordination and communication among players along
the supply chain can cause Bullwhip effect problems. Supply chain problems
can be supported and solved by IT, such as appropriate inventory
management, vertical integration, information sharing, VMI, supply chain
collaboration, RFID supply chain teams, virtual factories and wireless
solutions. SCM evolves by integrating routine transactions, including internal
suppliers/customers and external suppliers/customers, in ERP and extended
ERP. Next, BI and CRM applications are integrated into supply chain
software. CRM is an enterprise-wide activity through which an organisation
takes care of its customers and their needs. This demands good
communication and collaboration, most of which are IT-supported and Webbased. Knowledge management (KM) is a process which helps
organisations identify, select, organise, disseminate and transfer important
information and expertise that typically reside within the organisation in an
unstructured way. The KM model involves following cyclical steps: create,
capture, refine, store, manage and disseminate knowledge. Several
technologies can establish a knowledge management system: Internet,
Intranet, data warehousing, DSS tools, groupware, etc. KM has many
55
STUDY GUIDE
BMIT5103
Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, International student
version. Asia: John Wiley.
56
STUDY GUIDE
BMIT5103
57
STUDY GUIDE
BMIT5103
Content Summary
10.1
10.2
10.3
Enterprise Systems
x
Justifying an ERP.
Acquiring an ERP.
58
STUDY GUIDE
10.4
10.5
10.6
BMIT5103
IT at Work 10.3.
CRM is multi-channel.
E-CRM.
Knowledge.
Components of KM systems.
KM system implementation.
59
STUDY GUIDE
BMIT5103
Study Questions
1.
2.
3.
4.
5.
6.
7.
8.
List and describe the three main flows managed in a supply chain.
9.
10.
11.
12.
13.
14.
15.
16.
60
STUDY GUIDE
Topic 11:
BMIT5103
Learning Outcomes
By the end of this topic, you should be able to:
1.
2.
3.
4.
Discuss managerial
processes;
5.
6.
decision
making
processes
and
decision
Topic Overview
This topic clarifies that BI is driven by the need to get accurate and timely
information in an easy way. BPM covers methodologies, metrics, processes
and systems used to drive the performance of the enterprise. The major
components of BI are data warehouses and/or marts, predictive analysis,
data mining, data visualisation and business performance management
system. Predictive analysis uses different algorithms to forecast results and
relationships among variables as well as to identify data patterns. Data
mining is one of the predictive analysis tools. Scorecards and dashboards
are common components of most performance managements systems,
performance measurement systems and BPM suites. Decision making
involves four major phases: intelligence, design, choice and implementation.
Models provide fast and inexpensive virtual experimentations with new or
modified systems. DSS can improve the effectiveness of decision making,
decrease the need for training, improve management control, facilitate
communication, decrease costs and allow for more objective decision
making. The major components of a DSS are database and its management,
the model based on its management and the user-friendly interface. MI and
analytics in the cloud are expected to define the future BI.
61
STUDY GUIDE
BMIT5103
Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, International student
version. Asia: John Wiley.
11.1
11.2
11.3
11.4
11.5
11.6
62
STUDY GUIDE
BMIT5103
Content Summary
11.1
11.2
BI Cases.
Types of BI.
Elements of a BI plan.
63
STUDY GUIDE
BMIT5103
Industry-specific BI.
64
STUDY GUIDE
11.3
11.4
11.5
11.6
BMIT5103
DSS apps.
Mobile intelligence.
65
STUDY GUIDE
BMIT5103
Study Questions
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
What is Web mining? Give three examples of Web content that would
be mined for intelligence purposes.
11.
12.
13.
Give an example of a structured, an unstructured and a semistructured decision. Which of these types of decisions can be
optimised? Why?
14.
Explain the two types of decisions that DSS are used to solve. Why
arent DSS used to support structured decisions?
15.
16.
66
STUDY GUIDE
Topic 12:
BMIT5103
Learning Outcomes
By the end of this topic, you should be able to:
1.
Explain the value of aligning IT and business strategies and how this
alignment can be achieved;
2.
3.
4.
5.
6.
Topic Overview
This topic highlights the value of aligning IT and business strategies, and
ways to achieve this alignment. IT governance is concerned with ensuring
that organisational investments in IT return full value. IT performance
management enables failures to be anticipated before it is too late.
Therefore, it is vital for managers to realise the importance, functions and
challenges of IT governance. The IT planning process results in a formal IT
strategy. Several tools and methodologies are used to facilitate IT strategic
planning. Examples of these methodologies are Business Service
Management and Business Systems Planning Model. Business Service
Management uses real-time dashboard views to understand and predict how
IT impacts business and how business impacts IT architecture. Balanced
scorecard is a business management concept that transforms both financial
and non-financial data into a detailed roadmap which helps measure
performance. Scenario planning is a methodology which planners first create
several scenarios, then a team compile as many future events as possible
that may influence the outcome of each scenario. Companies should
understand major types and reasons for outsourcing as well as the risks and
benefits of outsourcing. It is also worth identifying the factors that drive the
growth in outsourcing as an IT strategy. Prediction of future BI in the form of
mobile intelligence (MI) is extrapolated.
67
STUDY GUIDE
BMIT5103
Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, International student
version. Asia: John Wiley.
12.1
12.2
12.3
12.4
12.5
IT Strategies
Corporate and IT Governance
Aligning IT with Business
Strategy
IT Strategic Planning Process
IT Outsourcing Strategies
68
STUDY GUIDE
BMIT5103
Content Summary
12.1
12.2
12.3
12.4
IT Strategies
x
IT governance.
Balanced scorecard.
CSF model.
Scenario planning.
Resource application.
69
STUDY GUIDE
12.5
BMIT5103
IT Outsourcing Strategies
x
Offshoring.
Study Questions
1.
2.
What are the possible reasons why a high percentage of IT projects are
abandoned?
3.
4.
5.
6.
7.
8.
9.
10.
70
STUDY GUIDE
BMIT5103
11.
12.
13.
14.
71
STUDY GUIDE
Topic 13:
BMIT5103
Learning Outcomes
By the end of this topic, you should be able to:
1.
2.
3.
4.
design
to the
Topic Overview
This topic associates business process management (BPM), BPM tools and
service-oriented architecture (SOA) with their role in business agility and
process optimisation. It highlights the importance of software architecture
design to the maintenance and agility of business processes. IT project
identification, justification, planning and triple constraints are important
factors to consider when doing IT projects. Eight stages of systems
development lifecycle (SDLC), namely, feasibility studies, systems analysis,
system design, programming, testing, implementation, operation and
maintenance are explained to conclude the topic.
72
STUDY GUIDE
BMIT5103
Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, International student
version. Asia: John Wiley.
13.1
13.2
13.3
13.4
Business Process
Management (BPM) and
Service-Oriented Architecture
(SOA)
Software Architecture and IS
Design
IT Project Management
Systems Development
73
STUDY GUIDE
BMIT5103
Content Summary
13.1
13.2
Multilink attacks.
Unintended threats.
Internal threats.
IT attacks.
Targeted attacks.
Botnets.
74
STUDY GUIDE
13.3
13.4
BMIT5103
IT Project Management
x
Occupational fraud.
Identity theft.
Systems Development
x
Defence strategy.
Study Questions
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
What is scope creep? Why does it pose risks to a project and a project
manager?
11.
12.
13.
14.
75
STUDY GUIDE
Topic 14:
BMIT5103
Learning Outcomes
By the end of this topic, you should be able to:
1.
Explain how IT and users can reduce their carbon footprint through
green business practices and data centre designs that conserve natural
resources;
2.
3.
4.
Topic Overview
This topic highlights the role of IT and users in reducing carbon emission and
hence global warming, which can potentially harm the planet, through green
business practices and data centre design that conserve natural resources.
IT solutions for data access, tracking, monitoring and profiling can have
ethical implications if these applications violate privacy and do not follow
standard operation procedures. Green computing is the study and practice of
eco-friendly computing resources that concern businesses in all industries
and organisations. Social media monitoring may be considered an integral
component of social media strategies because it enables marketers to
discover public conversation about their brands. Globalisation, the Internet
and connectivity have the potential to undermine moral responsibility
because it becomes relatively easy to ignore the harm that might be done to
others. ITs capability to accumulate ever-growing amounts of data into our
lives can exceed our capacity to keep up with the data, leading to information
overload. Business users are more likely to suffer from too much data than
from data scarcity. Finding the information they need in massive collections
of documents can be complicated, time consuming, frustrating and
expensive.
76
STUDY GUIDE
BMIT5103
Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management,International student
version. Asia: John Wiley.
14.1
14.2
14.3
14.4
77
STUDY GUIDE
BMIT5103
Content Summary
14.1
78
STUDY GUIDE
14.2
BMIT5103
79
STUDY GUIDE
14.3
14.4
BMIT5103
Information quality.
Impacts on individuals.
Future of IT in Business
x
Study Questions
1.
Explain global warming and the greenhouse effect. How can users and
organisations reduce their carbon footprints?
2.
3.
4.
5.
6.
7.
8.
80
STUDY GUIDE
BMIT5103
Appendices
Appendix A: Learning Support
Seminars
There are 15 hours of face-to-face facilitation, in the form of FIVE seminars
of three hours each. You will be notified of the date, time and location of
these seminars, together with the name and e-mail address of your
facilitator, as soon as you are allocated a group.
81
STUDY GUIDE
BMIT5103
Study Strategy
The following is a proposed strategy for working through the course. If you
have difficulty following this strategy, discuss your problems with your
facilitator either through the online forum or during the seminars.
(i)
The most important step is to read the contents of this Study Guide
thoroughly.
(ii)
(iii)
Once you have created a study schedule, make every effort to stick to
it. One reason learners are unable to cope with postgraduate courses
is that they procrastinate and delay completing their course work.
(iv)
Read the Study Guide carefully and look through the list of topics
covered. Try to examine each topic in relation to other topics.
82
STUDY GUIDE
BMIT5103
(v)
When you have completed a topic, review the Learning Outcomes for
the topic to confirm that you have achieved them and are able to do
what is required.
(vi)
After completing all topics, review the Learning Outcomes of the course
to see if you have achieved them.
83