You are on page 1of 83

STUDY GUIDE

BMIT5103

Information Technology for Managers

CENTRE FOR GRADUATE STUDIES

STUDY GUIDE
BMIT5103
Information Technology for
Managers
Writer:

Prof Dr Saadiah Yahya

Developed by:

Centre for Instructional Design and Technology


Open University Malaysia

First Edition, August 2012


Copyright Open University Malaysia (OUM)
All rights reserved. No part of this work may be reproduced in any form or by any means
without the written permission of the President, Open University Malaysia.

STUDY GUIDE

BMIT5103

Information Technology for Managers

INTRODUCTION TO STUDY GUIDE


This Study Guide is intended for Open University Malaysia's BMIT5103
Information Technology for Managers course. It comes in TWO parts, as
described below:
Part One comprises the Course Introduction, which gives you an overview
of the course. More specifically, it provides you with the course synopsis,
objectives, learning outcomes and study load. There is a brief description of
the main textbook(s), which you must read to fulfil the course requirements.
There is also a list of additional reading references. You are encouraged to
go into myVLE to check out the assessment, assignment and final
examination formats.
Part Two comprises the Learning Guide. This starts with an overview, a
recommended weekly study schedule to guide your learning process, and a
brief description of the various elements in the Learning Guide. There is also
a list of topics to be covered. For each topic, you are given the specific
learning outcomes, a topic overview and a listing of the focus areas, together
with assigned readings and the pages where information on the focus areas
is found. To consolidate your learning and test your understanding, a
summary of the main content covered and study questions are provided at
the end of each topic.
Finally, there are two appendices, Learning Support and Study Tips, to
help you walk through the course successfully.
Please read through this Study Guide before you commence your course.
We wish you a pleasant study experience.

STUDY GUIDE

BMIT5103

Information Technology for Managers

Contents
Course Introduction ..................................................................................... 5
Synopsis ............................................................................................. 5
Objectives .......................................................................................... 5
Learning Outcomes ............................................................................ 5
Study Load ......................................................................................... 6
Main Textbook(s) .............................................................................. 7
Assigned Readings ............................................................................ 7
Additional Recommended Readings .................................................. 7
Assessment ........................................................................................ 7
Learning Guide ............................................................................................ 8
An Overview ....................................................................................... 8
Topic 1 ............................................................................................ 11
Topic 2 ............................................................................................. 15
Topic 3 ............................................................................................ 19
Topic 4 ............................................................................................ 24
Topic 5 ............................................................................................ 29
Topic 6 ............................................................................................ 34
Topic 7 ............................................................................................ 39
Topic 8 ............................................................................................ 44
Topic 9 ............................................................................................ 49
Topic 10 .......................................................................................... 54
Topic 11 .......................................................................................... 59
Topic 12 .......................................................................................... 64
Topic 13 .......................................................................................... 69
Topic 14 .......................................................................................... 73
Appendices................................................................................................. 77
Appendix A: Learning Support ......................................................... 77
Appendix B: Study Tips .................................................................... 78

STUDY GUIDE

BMIT5103

Information Technology for Managers

STUDY GUIDE

BMIT5103

Information Technology for Managers

PART ONE: COURSE INTRODUCTION


Synopsis
This course is designed to equip learners of any discipline with the
knowledge and skills needed for a career in the rapidly expanding field of
information technology (IT). The course covers the content that students
need to learn and use for successful and sustainable management careers
in any of the functional areas. Each topic reinforces important business
principles and knowledge about the latest in IT such as mobile devices,
wireless networks, social media, logistic systems and interoperability,
collaboration and Internet applications.

Objectives
The general aims of this course are to:
1.

Provide a meaningful foundation in trends in information systems and


technology with in-depth and contextual information;

2.

Provide a portfolio of IT skills to give students a competitive edge in


seeking jobs and job advancements;

3.

Provide content within a business context so that students can


understand and value traditional and emerging information systems
and technologies; and

4.

Provide information on operational and strategic performance of all


types of organisations and government agencies.

Learning Outcomes
By the completion of this course, you should be able to:
1.

Explain how and why information systems are used today;

2.

Explain the technology, people and organisational components of


information systems;

3.

Describe globalisation and the role information systems play in this


evolution;

4.

Analyse how businesses use information systems for competitive


advantage vs competitive necessity;

5.

Elaborate on the value of information system investments and


formulate a business case for a new information system, which
includes analysis of both costs and benefits;

STUDY GUIDE

BMIT5103

Information Technology for Managers

6.

Identify the major components of an information systems infrastructure;

7.

Mitigate risks as well as plan for and recover from disasters;

8.

Assess how information systems enable new forms of commerce


between individuals, organisations and governments;

9.

Identify emerging technologies that enable


communication, collaboration and partnering;

10.

Classify how various types of information systems provide the


information needed to gain business intelligence to support the
decision making for the different levels and functions of an organisation;

11.

Explain how enterprise systems foster stronger relationships with


customers and suppliers and how these systems are widely used to
enforce organisational structures and processes;

12.

Differentiate how organisations develop and acquire information


systems and technologies;

13.

Explain how to secure information systems resources, focusing on both


human and technological safeguards; and

14.

Evaluate the ethical concerns that information systems raise in society


and the impact of information systems on crime, terrorism and war.

new

forms

of

Study Load
It is a standard OUM practice that learners accumulate 40 study hours for
every credit hour. As such, for a three-credit hour course, you are expected
to spend at least 120 hours of learning. Table 1 gives an estimation of how
the 120 hours can be accumulated.
Table 1: Allocation of Study Hours
Activities

No. of Hours

Reading course materials and completing exercises

60

Attending 5 seminar sessions (3 hours for each session)

15

Engaging in online discussions

15

Completing assignment(s)

20

Revision

10

Total

120

STUDY GUIDE

BMIT5103

Information Technology for Managers

Main Textbook(s)
Turban, E., & Volonino, L. (2012). Information technology for management,
International student version. Asia: John Wiley.

Assigned Readings
Laudon, K. C., et al. (2012). Management information systems: Managing
the digital firm. Canada: Pearson Education.

Additional Recommended Readings


Dua, S., et al. (2012). Information systems, technology and management:
Sixth international conference, ICISTM 2012. Grenoble, France:
Springer.
Oz, E. (2012). Management information systems (6th ed.). Boston: Thomson
Course Technology.
Turban E., et al. (2009). Information technology for management:
Transforming in the digital economy. New York: John Wiley & Sons Ltd.

Assessment
Please refer to myVLE for information on the assessment format and
requirements.

STUDY GUIDE

BMIT5103

Information Technology for Managers

PART TWO: LEARNING GUIDES


An Overview
This Learning Guide is arranged by topic. It covers essential content in the
main textbook and is organised to stretch over TEN study weeks, before the
examination period begins. Use this Learning Guide to plan your
engagement with the course content. You may follow the recommended
weekly study schedule in Table 2 to help you progress in a linear fashion,
starting with Week 1.
Table 2: Recommended Weekly Study Schedule
Topic

Week

Topic 1:
Topic 2:

Information Systems in the 2010s


IT Infrastructure and Support Systems

Topic 3:
Topic 4:

Data, Text, and Document Management


Network Management and Mobility

Topic 5:

IT Security, Crime, Compliance and Continuity

Topic 6:
Topic 7:

E-Business and E-Commerce


Mobile Computing and Commerce

Topic 8:
Topic 9:

Web 2.0 and Social Media and Support Systems


Operational Planning and Control Systems

Topic 10: Enterprise Information Systems

Topic 11: Business Intelligence and Decision Support

Topic 12: IT Strategic Planning

Topic 13: Business Process Management and Systems


Development

Topic 14: Global Ecology, Ethics and Social Responsibility

10

STUDY GUIDE

BMIT5103

Information Technology for Managers

Each topic in the Learning Guide comprises the following sections (refer to
Figure 1):
x

Learning Outcomes: outline the specific tasks to be accomplished;

Topic Overview: briefly explains what the topic touches on so as to


provide a general interpretative framework for understanding the topic
content;

Focus Areas: identify the main and sub areas to be covered;

Assigned Readings: help you to navigate the main textbook and reading
materials;

Content Summary: provides an


understanding the core content; and

Study Questions: help you to focus on key subject areas.

interpretative

Figure 1: Organisation of the Learning Guide

framework

for

STUDY GUIDE

BMIT5103

10

Information Technology for Managers

STUDY GUIDE

Topic 1:

BMIT5103

Information Technology for Managers

Information Systems in the 2010s

Learning Outcomes
By the end of this topic, you should be able to:
1.

Discuss the role of IT in optimising performance;

2.

Explain why the business value of IT is determined by people, business


processes and organisational culture;

3.

Describe the role of IT in business performance management (BPM)


and the performance measurement process;

4.

Examine the strategic planning process, SWOT (strengths,


weaknesses, opportunities, threats) analysis, and competitive models;
and

5.

Discuss how IT impacts your career and the positive outlook for
information systems (IS) management careers.

Topic Overview
This topic highlights the importance of being an agile enterprise. The
capability of IT in improving profitability by enabling ways to connect with and
push content through social networks and mobile devices is discussed.
Factors which determine the business value of IT and IS are emphasised.
Section 1.3 stresses the business performance management (BPM) cycle
and its challenges. The support of IT in enabling an organisation to respond
towards business pressure is described in detail. Strategic (SWOT) analysis
and strategic planning analysis are compared. The topic clarifies Porters
competitive forces and value chain model. Finally, it explains the importance
of learning IT.

11

STUDY GUIDE

BMIT5103

Information Technology for Managers

Focus Areas and Assigned Readings


Focus Areas

Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for management.
International student version. Asia: John
Wiley.

1.1
1.2
1.3

1.4
1.5

Positioning IT to Optimise
Performance
Information Systems and IT:
Core Concepts
Business Performance
Management (BPM) and
Measurement
Strategic Planning and
Competitive Models
Why IT is Important to Your
Career, and IT Careers

Chapter 1, pp 58.
Chapter 1, pp 811.
Chapter 1, pp 1215.

Chapter 1, pp 1621.
Chapter 2, pp 2224.
Extra Readings
How to generate a Microsoft Tag
microsoft.com/tag/
How to create a custom 2D tag
mediadl.microsoft.com/mediadl/www/t/t
ag/CreatingCustomTags.wmv
How to download a reader gettag.mobi/
Apple iPad apple.com/ipad/
iReport, a user-generated section of
CNN.com ireport.com/
Porters 5 Competitive Forces Model
youtube.com/watch?v=mYF2_FBCvXw
US Bureau of Labor Statistics
bls.gov/oco/ocos258.htm
Teradata University Network (TUN)
teradatauniversitynetwork.com/tun/
Leadership in Energy and
Environmental Design (LEED)
usgbc.org/leed
US CIA World Factbook
cia.gov/library/publications/the-worldfactbook/
UK National Offender Management
Information System project (NOMIS)
nao.org.uk/whats_new/0708-

12

STUDY GUIDE

BMIT5103

Information Technology for Managers

1/0809292.aspx

Content Summary
1.1

1.2

1.3

Positioning IT to Optimise Performance


x

IT at Work 1.1 Asia-Pacific Region is PayPals Engine for


Growth.

IT at Work 1.2 Middle East and North Africa (MENA) Countries


Engaged in Social Media.

The characteristics of an agile organisation.

Opportunities created by the mass migration of users from PCs to


mobile devices.

Ways to assess the value of an innovation.

Doing business with a comprehensive business model.

Information Systems and IT: Core Concepts


x

IT at Work 1.3 Dashboards Give Operators and Managers Access


to Accurate Data.

Generic definition and four basic functions of an IS.

Components of an IS.

Major capabilities of IS and supported business objectives.

Business Performance Management (BPM) and Measurement


x

IT at Work 1.4 Zero-Carbon, Green Data Centre launched in


Iceland.

Definition of performance management and ways to manage


performance.

Performance management process.

13

STUDY GUIDE

BMIT5103

Information Technology for Managers

Business environmental pressures and their impact.

Organisational responses to pressure and opportunities.

Green IT to reduce carbon and energy footprints.

Ethical issues.

14

STUDY GUIDE

1.4

1.5

BMIT5103

Information Technology for Managers

Strategic Planning and Competitive Models


x

IT at Work 1.5 Daimler AG Relies on Data Analytics to Improve


Performance.

Definition of Strategic Analysis (SWOT).

Strategic Planning.

Porters Competitive Forces Model and Strategies.

Adaptive and Innovative Organisations.

IS and IT Failures.

Why IT is Important to Your Career, and IT Careers


x

IT defines and creates businesses and markets.

IT as a career.

Earning in the IT field.

IT job prospects.

Study Questions
1.

Explain the characteristics of an agile organisation.

2.

Describe a business model. Give one example.

3.

Describe the building blocks of an information system.

4.

Describe the impact of the business environment and describe ways for
an organisation to respond.

5.

Explain Porters five forces model and give an example of each force.

6.

Why is IT a major enabler of business performance and success?

7.

How has mobile technology influenced opportunities for entrepreneurs?

8.

Explain how innovation can lead to profitable growth for businesses.

9.

How does green IT impact the bottom line?

10.

Discuss why information systems might fail.

15

STUDY GUIDE

Topic 2:

BMIT5103

Information Technology for Managers

Information Systems in the 2010s

Learning Outcomes
By the end of this topic, you should be able to:
1.

Explain the types of information systems and how they process data;

2.

State the types of information systems used to support business


operations and decision makers;

3.

Describe how IT supports supply chains and business processes; and

4.

Identify the attributes, benefits and risks of service-based and cloud


computing infrastructures.

Topic Overview
This topic highlights business information systems and business software
applications. The hierarchy of knowledge from data and information is
explained. Types of IS and support, specifically Transaction Processing
Systems (TPS), Management Information Systems (MIS) and Decision
Support Systems (DSS) are specified clearly. Section 2.3 emphasises supply
chain and logistics support which includes RFID systems to track and
monitor products and materials. Next, IT infrastructures, cloud computing
and services which include virtualisation and enterprise clouds are
explained. The topic ends with issues in moving workloads from enterprise to
the cloud.

16

STUDY GUIDE

BMIT5103

Information Technology for Managers

Focus Areas and Assigned Readings


Focus Areas

Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for management,
International student version. Asia: John
Wiley.

2.1
2.2
2.3
2.4

Data and Software Application


Concepts
Types of Information Systems
and Support
Supply Chain and Logistics
Support
IT Infrastructures, Cloud
Computing and Services

Chapter 2, pp 3334.
Chapter 2, pp 3542.
Chapter 2, pp 4345.
Chapter 2, pp 4650.

Extra Readings
Blog on cloud computing
http://infoworld.com/blogs/davidlinthicum
Planners Lab, for building a DSS
http://plannerslab.com
Supply Chain and Logistics Institute
http://SCL.gatech.edu/
Salesforce.com cloud demos
http://salesforce.com
US Defense Information Systems
Agency http://disa.mil
Supply Chain, Europes strategic
supply chain management resource.
http://supplychainstandard.com

17

STUDY GUIDE

BMIT5103

Information Technology for Managers

Content Summary
2.1

2.2

2.3

Data and Software Application Concepts


x

Definition of business software applications (apps) and how they


support business processes and functions.

The transformation of data to information, and information to


knowledge is illustrated.

Types of Information Systems and Support


x

IT at Work 2.1 Integrated Trade Management System for the


Energy Sector.

IT at Work 2.2 Architecture of BI Apps, Dashboards and Data


Mining Classification of Information System into managerial or
operational is determined by the type of support they provide.

Differentiation between batch and real-time processing.

Importance of data quality for obtaining good reports and


decisions.

Routine business transactions in manufacturing companies.

MIS and its functionalities with three scenarios.

Definition of DSS and the kind of applications these can support.

Types of information support systems together with the types of


employees these support.

Supply Chain and Logistics Support


x

IT at Work 2.3 Warehouse Control Systems in UK Distribution


Centre.

Definition and components of supply chain.

Description of logistics in context of supply chain.

The attainment of company competitive advantage depends on


how well the supply chain is aligned and managed.

The importance of supply chain management (SCM) by


discussing Walmarts global sourcing strategy.

The abilities of supply chains to create extended enterprise and


RFID for tracing, monitoring and validating products and
materials.

18

STUDY GUIDE

2.4

BMIT5103

Information Technology for Managers

IT Infrastructures, Cloud Computing and Services


x

IT at Work 2.4 Cloud Computing City is being built in China.

Characteristics of IT infrastructure.

The purpose and functions of virtualisation.

The initiatives for adopting enterprise clouds or private clouds.

Definition of cloud computing and reasons for using the cloud.

Services available in the cloud.

Issues and challenges in moving workloads from the enterprise to


the cloud.

Study Questions
1.

Explain information system.

2.

Differentiate data, information and knowledge.

3.

Differentiate TPS, MIS and DSS.

4.

Explain how MIS supports the needs of middle-level managers.

5.

Describe how IT can support the supply chain of a retailer.

6.

Discuss the benefits of RFID in supply chain.

7.

What is virtualisation?

8.

Describe cloud computing and the benefits it can offer.

9.

Describe software as a service and its benefits.

10. How can accurate reporting systems improve operational and strategic
performance?

19

STUDY GUIDE

Topic 3:

BMIT5103

Information Technology for Managers

Data, Text and Document Management

Learning Outcomes
By the end of this topic, you should be able to:
1.

Describe data, text and document management, and their impacts on


performance;

2.

Understand file management systems;

3.

Understand the functions of databases and database management


systems; and

4.

Describe the tactical and strategic benefits of data warehouses, data


marts and data centres.

Topic Overview
This topic highlights the importance of managing data, text and document
as well as their impacts on business performance. It begins by associating
data, text and documents as strategic assets of organisations and providing
reasons data management is necessary. Next, the need for a database
and a data warehouse for storing and managing data is emphasised. It is
indicated that high-quality data depends on effective approaches to data
management. Again in this topic, data visualisation deployment for
supporting decisions is explained. Problems and issues which occur due to
poor management of data are outlined. Master data management (MDM)
consolidates data from various data sources into a master reference file
which creates accurate and consistent data across the enterprise. Concept
and definition of a master reference file is elaborated. Data quality and
integrity is still the main concern when storing and managing data to gain
users trust. Text mining and analysis, and document management system
are also reviewed. Section 3.2 explains the file management systems and
their limitations compared to the Database Management Systems (DBMS).
Section 3.3 clarifies databases and DBMS benefits compared to the
computer-based files system. Section 3.4 compares databases to data
warehouses in terms of real-time support and benefits rendered by a data
warehouse. The characteristics and development of data warehouse is
further explained. The concept of data mart, operational data stores, and
dimensional databases is also reviewed. Enterprise Content Management
(ECM) has become an important data management technology, particularly
for large and medium-sized organisations. ECM includes electronic
document management, Web content management, digital asset
management and electronic records management (ERM). ERM are
important data management technology for large and medium-sized

20

STUDY GUIDE

BMIT5103

Information Technology for Managers

organisations. The business value of the E-Records Management is


highlighted. The topic ends with the explanation of ECM and ERM Growth.

Focus Areas and Assigned Readings


Focus Areas

Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, International student
version. Asia: John Wiley.

3.1
3.2
3.3
3.4
3.5

Data, Text, and Document


Management
File Management Systems
Database Management
Systems
Data Warehouses, Data Marts,
and Data Centres
Enterprise Content Management

Chapter 3, pp 5969.
Chapter 3, pp 6972.
Chapter 3, pp 7276.
Chapter 3, pp 7682.
Chapter 3, pp 8284.
Extra Readings
Advisor Solutions, data analytics
and
visualisation
http://advizorsolutions.com/
Clarabridge: How Text Mining Works
http://clarabridge.com/
SAS Text Miner http://sas.com/
Tableau data visualisation software
http://tableausoftware.com/datavisualization-software/
EMC Corp., enterprise content
management http://emc.com
Oracle DBMS http://oracle.com/

21

STUDY GUIDE

BMIT5103

Information Technology for Managers

Content Summary
3.1

3.2

3.3

Data, Text, and Document Management


x

IT at Work 3.1 Cold Supply Chain Management in the Healthcare


Industry.

IT at Work 3.2 Maximising Return on Time.

IT at Work 3.3 Data Mining Used by Intelligence Agencies.

IT at Work 3.4 Portals and Electronic Document Management.

Data is foundation of any IS and needs to be managed for its


useful life cycle.

Managers and information workers may be constrained by data


that cannot be trusted because it is incomplete, out of context,
outdated, inaccurate and inaccessible, therefore requiring a
longer time to analyse.

Data visualisation and decision support tools function to format


data into meaningful contexts for users.

Data quality, integrity, privacy and ethics are explained.

The roles of text mining and analysis, document management


and document management system towards ensuring business
efficiency and productivity are highlighted.

File Management Systems


x

File management system.

Disadvantages of file management systems compared to DBMS.

Database Management Systems


x

Two basic types of databases, namely, centralised database and


distributed database, are clarified.

The advantages and capabilities of DBMS are explained and


tabulated.

22

STUDY GUIDE

3.4

3.5

BMIT5103

Information Technology for Managers

Data Warehouses, Data Marts and Data Centres


x

Databases are compared to data warehouses.

The need for real-time data warehousing and analytics is


emphasised.

The benefits of data warehousing.

The characteristics and the building of a data warehouse.

Data marts, operational data stores, multidimensional databases


and data centres.

Enterprise Content Management


x

Enterprise Content Management


Management (ERM) are identified.

The volume of electronic records should be continuously


reviewed to determine whether they should be retained or
destroyed.

The business value of ERM.

The expected growth of ECM and ERM in the future.

(ECM)

and

E-Records

Study Questions
1.

What constraints do managers face when they cannot trust data?

2.

Why is it difficult to manage, search and retrieve data located


throughout the enterprise?

3.

How can data visualisation tools and technology improve decision


making?

4.

What is text and document management?

5.

What are three limitations of the file management approach?

6.

What are three data functions of a DBMS?


Compare databases and data warehouses in terms of data volatility
volatility and decision support.

8.

Why is ERM important for an organisation?

9.

Explain how having detailed real-time or near real-time data can


improve productivity and decision quality.

23

STUDY GUIDE

BMIT5103

Information Technology for Managers

10.

A data mart can substitute for a data warehouse or supplement it.


Compare and discuss these options.

11.

Discuss the factors that make document management so valuable.


What capabilities are particularly valuable?

12.

Relate document management to imaging systems.

24

STUDY GUIDE

Topic 4:

BMIT5103

Information Technology for Managers

Network Management and Mobility

Learning Outcomes
By the end of this topic, you should be able to:
1.

Describe networks, standards and mobility;

2.

Discuss network and collaboration technologies;

3.

Explain 4G and other mobile networks;

4.

Describe group work technologies; and

5.

Evaluate green, social and ethical issues related to the use and
operations of networks.

Topic Overview
This topic highlights business networks and their functionalities. The
transmission of signals from the sender to the receiver is enabled by
switches and routers. Circuit switch and packet switch are compared.
Popular network terminology is listed. IP networks support convergence. The
growth of high capacity networks is tabulated. Networks devices and mobile
network evaluation factors are emphasised. Section 4.2 stresses on wireless
broadband networks. Mobile infrastructure, Wi-Fi networking standards,
wireless wide area networks (WWANS), WLAN and WiMAX are elaborated.
Network management and portals focuses on the model of the network
capability, collaboration capability and performance relationship are clarified.
Convergence and interoperability of information services are examined.
Barriers to full integration of information services are outlined. Network
computing infrastructure which includes Internet, Intranet and Extranet is
also considered. Enterprise search and information portal operations and
usage are discussed. The importance of virtual collaboration, group work
and decision processes are discussed. Next, collaboration support
technologies are highlighted. This topic ends with legal and ethical issues
due to the impact of being connected 24/7 and working in a computercontrived virtual team.

25

STUDY GUIDE

BMIT5103

Information Technology for Managers

Focus Areas and Assigned Readings


Focus Areas

Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for management,
international student version. Asia: John
Wiley.

4.1
4.2
4.3
4.4
4.5

Business Networks
Wireless Broadband
Networks
Network Management and
Portals
Collaboration
Green, Legal and Ethical
Issues

Chapter 4, pp 9498.
Chapter 4, pp 98101.
Chapter 4, pp 101109.
Chapter 4, pp 109113.
Chapter 4, pp 113114.
Extra Readings
Google Wave http://wave.google.com/
video
wave.google.com/about.html#video
Twitter network status
http://status.twitter.com/
Azulstar http://azulstar.com/
Clear 4G WiMAX http://clear.com
International CTIA Wireless
Tradeshows http://ctiawireless.com/
Cisco http://cisco.com
Microsoft SharePoint 2010
http://sharepoint.microsoft.com/Pages/
Default.aspx
Cellular Telecommunications Industry
Association http://ctia.org/
WiMAX Forum http://wimaxforum.org
Packet switching flash demo
http://pbs.org/opb/nerds2.0.1/geek_gl
ossary/packet_switching_flash.html
Cell phone radiation levels (SAR)
http://reviews.cnet.com/2719-6602_7291-2.html?tag=
Kaiser Permanente HealthConnect
video
http://youtube.com/kaiserpermanenteo
rg

26

STUDY GUIDE

BMIT5103

Information Technology for Managers

Content Summary
4.1

4.2

4.3

Business Networks
x

Basic functions i.e. collaboration, mobility and search which are


supported by business networks.

Techniques to transmit signals from a sender to a receiver of a


communication: circuit switching and packet switching.

Networks and factors that determine their functionalities.

IP networks enable convergence of voice, data and video.

Growth of high-capacity networks.

Network devices and their functions.

Mobile network indicators.

Wireless Broadband Networks


x

Mobile infrastructures.

Wi-fi network standards which include 802.11b, 802.11a, 802.11g


and 802.11a.

WLAN, WiMAX and WWN.

Network Management and Portals


x

IT at Work 4.1 Monetary Authority of Singapore (MAS) Takes


Action Against DBS Bank for Network Crash

IT at Work 4.2 Thrifty Caters to Cost-Conscious Travellers.

IT at Work 4.3 The Pub, a Beer Information Portal.

Model of network collaboration and performance relation.

Convergence and Interoperability of IS.

Barriers to full integration of IS.

Network computing infrastructure: Internet, Intranet, Extranet,


information portal and support enterprise search.

27

STUDY GUIDE

4.4

4.5

BMIT5103

Information Technology for Managers

Collaboration
x

IT at Work 4.4 Subaru Uses WebEx for Online Training and


Meetings.

Virtual collaboration.

Group work and decision-making process.

Benefits of working in a group and dysfunctions of the group


process.

Support technologies for collaboration.

Green, Legal and Ethical Issues


x

IT at Work 4.5 Power of the Individual in the Connected Age.

Damage faced by individuals such as mishandling of equipment


and Driving While Distracted (DWD).

Health risks from 24/7 connectivity to hand-held devices.

Study Questions
1.

Differentiate circuit switching from packet switching.

2.

What factors should be considered when selecting a mobile network?

3.

What are the factors which contribute to mobility?

4.

What are the benefits of an IP-based network?

5.

Differentiate between extranet and intranet.

6.

Describe virtual collaboration.

7.

There is growing demand for video to handheld devices. Explain at


least three factors enabling or driving this demand.

8.

Why attend classes if you can view or listen to podcasts?

28

STUDY GUIDE

BMIT5103

Information Technology for Managers

9.

Discuss some of the potential applications of wireless technologies in


the financial sector.

10.

Discuss the impact of wireless computing on emergency response


services.

11.

Which of the current mobile computing limitations do you think will be


minimised within two years?

12.

What health and quality of life issues are associated with social
networks and a 24/7 connected life style?

29

STUDY GUIDE

Topic 5:

BMIT5103

Information Technology for Managers

Security, Crime, Compliance and Continuity

Learning Outcomes
By the end of this topic, you should be able to:
1.

State the objectives, functions and financial value of IT security;

2.

Explain IS vulnerabilities, threats, attack methods and cybercrime


symptoms;

3.

List crimes committed against computers and crimes committed with


computers;

4.

Explain key methods of defending information systems, networks and


wireless devices;

5.

State network security risks and defences;

6.

Describe internal control and fraud as well as fraud legislation; and

7.

Describe business continuity and disaster recovery planning methods.

Topic Overview
This topic highlights business vulnerabilities, risks and disasters which can
be solved with the use of IT. It begins by examining the misconception of
many regarding information and network security. Data security requires
integrated solutions which span technical, physical and policy control.
Knowing your enemy and your risks can solve half of your problems.
Business risks can be caused by insiders, outsiders and malware which can
impact business performance. The key IT security terms in accordance to
Infosec is provided. Social networks and cloud computing may increase
vulnerabilities by providing a single point of failure. Phishing and attacks are
getting more complicated by being linked together.
ERM and COBIT are two accepted models for IT governance. The IT
security defence-in-depth model emphasises information security as a
combination of people, processes and technology. The Risk Exposure Model
has been proposed for digital asset impact analysis. IT threats are classified
into unintentional and intentional threats. Two basic types of deliberate IT
attacks are data tempering and programming attacks. Targeted attacks such
as APT, Botnets and Malware on enterprises together with their measures
are also discussed. Section 5.3 explains the characteristics, prevention and
detection of fraud, crime and violation. The causes and characteristics of
identity theft are also identified.

30

STUDY GUIDE

BMIT5103

Information Technology for Managers

Section 5.4 explains strategies and controls which depend on what needs to
be protected and cost-benefit analysis. Major categories of general controls
such as physical, access, biometric, administrative application and endpoint
controls are clarified. Section 5.5 looks specifically at network security
control. It explains the aims and characteristics of the three layers of
measures which are perimeter security, authentication and authorisation.
Section 5.6 emphasises internal control and compliance to achieve reliable
financial reporting, operational efficiency and law compliance. Section 5.7
concludes the topic with business continuity planning, disaster recovery and
auditing. Cost-benefit analysis such as risk management auditing is
necessary to justify economic IT. Implementing security programs can
sometimes raise ethical issues. Therefore, an organisation should realise
that a security control system which is too strict can violate privacy and
increase dissatisfaction among users.

Focus Areas and Assigned Readings


Focus Areas

Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, International student
version. Asia: John Wiley.

5.1
5.2
5.3
5.4
5.5
5.6
5.7

Protecting Data and Business


Operations
IS Vulnerabilities and Threats
Fraud, Crimes, and Violations
Information Assurance and Risk
Management
Network Security
Internal Control and Compliance
Business Continuity and Auditing

Chapter 5, pp 123132.
Chapter 5, pp 132136.
Chapter 5, pp 136139.
Chapter 5, pp 139142.
Chapter 5, pp 142145.
Chapter 5, pp 145147.
Chapter 5, pp 147149.
Extra Readings
Information Security Magazine
http://searchsecurity.techtarget.com
CIO Magazine, IT Security
http://cio.com/topic/3089/Security
Computer and Internet Security
http://cnet.com/internet-security
IT Governance Institute http://itgi.org

31

STUDY GUIDE

BMIT5103

Information Technology for Managers

US Computer Emergency
Readiness Team http://uscert.gov/cas/tips/
SANS Information Security Reading
Room sans.org/reading_room/
Privacy news from around the world
pogowasright.org/
Government Computer News
(GCN ) http://gcn.com/
CompTIA http://comptia.org/
F-Secure http://fsecure.com/en_US/security/securitycenter/
Social engineering
http://symantec.com/connect/articles
/social-engineering

Content Summary
5.1

5.2

Protecting Data and Business Operations


x

Characteristics of information and network security.

Internal and external enemies.

Risks from cloud computing and social network activities.

Phishing and threats derived from the Web.

Search engine manipulation.

Multilink attacks.

Government regulation for control measure which include ERM


and COBIT.

Industry standard to protect customers and members brand


images and revenues.

IS Vulnerabilities and Threats


x

Unintended threats.

Internal threats.

IT attacks.

Targeted attacks.

Botnets.

Malware and Botnet defences.

32

STUDY GUIDE

5.3

5.4

5.5

5.6

5.7

BMIT5103

Information Technology for Managers

Fraud, Crimes and Violations


x

Occupational fraud.

Internal fraud prevention and detection.

Identity theft.

Information Assurance and Risk Management


x

Defence strategy.

Major categories of general controls.

Network Security
x

Three layers of network security measures.

Perimeter security and firewalls.

Network authentication.

Network authorisation.

Security wireless network.

Internal Control and Compliance


x

Internal control environment.

Internal security compliance.

World-wide anti-fraud regulation.

Business Continuity and Auditing


x

Planning business continuity.

Auditing information systems.

Cost-effective analysis to look at economic IT.

Ethical issues rise from the implementation of a security system.

33

STUDY GUIDE

BMIT5103

Information Technology for Managers

Study Questions
1.

Who are the potential victims of an organisations data breach?

2.

What is time-to-exploitation? What is the trend in the length of such a


time?

3.

What is a multi-link attack? Suggest ways to solve it.

4.

What are two causes of the top information problems at organisations?

5.

Define and give three examples of an intentional threat and an


unintentional threat.

6.

What is social engineering? Give an example.

7.

List and specify three types of malware.

8.

Identify Botnets risks and explain how to mitigate the risks.

9.

Explain the differences between an IDS and an IPS.

10.

Explain how identity theft can occur.

11.

What are the major objectives of a defence strategy?

12.

Discuss access control by giving one example.

13.

What are biometric controls? Give two examples.

14.

What are network access control (NAC) products?

15.

Why should information control and security be of prime concern to


management?

34

STUDY GUIDE

Topic 6:

BMIT5103

Information Technology for Managers

E-Business and E-Commerce

Learning Outcomes
By the end of this topic, you should be able to:
1.

Describe e-business strategies and e-commerce operations;

2.

List effective business-to-consumer e-commerce applications;

3.

Explain business-to-business applications, logistics, procurement,


order fulfilment and payment systems;

4.

Describe e-government activities and public sector e-commerce;

5.

Examine e-commerce support services; and

6.

Identify and describe ethics and legal issues of e-business.

Topic Overview
This topic highlights e-commerce and its benefits to organisations,
consumers and society. Nevertheless, it also has technological and nontechnological limitations. The current technological limitations are expected
to lessen with time. The major mechanism of e-commerce is the use of
electronic markets, which frequently include online catalogues. Another
mechanism of e-commerce is auctions. The Internet provides an
infrastructure for executing auctions at lower cost and with many more
involved sellers and buyers, including both individual consumers and
corporations. Two major types of auctions exist: forward auctions and
reverse auctions. Forward auctions are used in the traditional process of
selling to the highest bidder. Reverse auctions are used for buying, using a
tendering system to buy at the lowest bid.
B2C e-tailing can be pure (such as Amazon.com) or part of a click-andmortar organisation (such as Walmart). Direct marketing is done via solo
storefronts or in malls. It can be done via electronic catalogues or by using
electronic auctions. The leading online B2C service industries are banking,
securities trading, job markets, travel and real estate. The major issues faced
by e-tailers are channel conflict, conflict within click-and-mortar
organisations, order fulfilment, determining viability and risk, and identifying
appropriate revenue models.

35

STUDY GUIDE

BMIT5103

Information Technology for Managers

The major B2B applications are selling from catalogues and by forward
auctions (the sell-side marketplace), buying in reverse auctions and in group
and desktop purchasing (the buy-side marketplace) and trading in electronic
exchanges. E-government commerce can take place between government
and citizens, between businesses and governments, or among government
units. It makes government operations more effective and efficient.
New electronic payment systems are needed to complete transactions on
the Internet. Electronic payments can be made by e-checks, e-credit cards,
purchasing cards, e-cash, stored-value money cards, smart cards, personto-person payments via services such as Paypal, electronic bill presentment
and payment, and e-wallets. Order fulfilments are especially difficult and
expensive in B2C because of the need to ship relatively small orders to
many customers. Several activities take place, some of which can be done
simultaneously; others must be done in sequence. Activities that take
place in order fulfilments include: (1) making sure the customer will pay;
(2) checking for in-stock availability; (3) arranging shipments; (4) insurance;
(5) replenishment; (6) in-house production; (7) use of contractors;
(8) contacts with customers; and (9) returns (if applicable). Ethical and legal
issues are persistent in e-commerce and must constantly be addressed.

Focus Areas and Assigned Readings


Focus Areas

Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, International student
version. Asia: John Wiley.

6.1
6.2
6.3

6.4
6.5

e-Business Challenges and


Strategies
Business-to-Consumer (B2C)
e-Commerce
Business-to-Business (B2B)
e-Commerce and
e-Procurement
e-Government
e-Commerce Support Services:
Payment & Order Fulfilment

Chapter 6, pp 160167.
Chapter 6, pp 167171.
Chapter 6, pp 171173.

Chapter 6, pp 173176.
Chapter 6, pp 176182.

36

STUDY GUIDE

6.6

BMIT5103

e-Business Ethics and Legal


Issues

Information Technology for Managers

Chapter 6, pp 183184.
Extra Readings
Amazon.coms First Website, 1995
digitalenterprise.org/images/amazo
n.gif
e-Business forum
ebusinessforum.com
Google Merchant Centre
google.com/merchants
Google Product Search
google.com/products
Shopzilla shopzilla.com
US Federal Trade Commission
ftc.gov
PCI Security Standards Council
pcisecuritystandards.org/index.sht
ml
Internet statistics
internetworldstats.com
Many Eyes (beta) data sets and
visualisation tools
manyeyes.alphaworks.ibm.com/ma
nyeyes/
Washington, DC Data
Catalogue data.octo.dc.gov/

Content Summary
6.1

e-Business Challenges and Strategies


x

IT at Work 6.1 E-Commerce Auctions.

The Dot.Com era 19952002.

E-Business and E-Commerce fundamentals.

E-Business websites requirements and challenges.

E-Business Models.

37

STUDY GUIDE

6.2

6.3

6.4

6.5

6.6

BMIT5103

Information Technology for Managers

Business-to-Consumer (B2C) e-Commerce


x

IT at Work 6.2 IT Patents Are Amazon.coms Edge.

IT at Work 6.3 ING Direct Has Soaring Profits.

Leading online service industries: banking, trading of securities,


employment, travel, and real estate services.

Issues in e-tailing.

Online business and marketing planning.

Business-to-Business (B2B) e-Commerce and e-Procurement


x

IT at Work 6.4 Global Chemical Commodity Portal.

Sell-side market places.

E-sourcing.

E-Procurement.

e-Government
x

IT at Work 6.5 Using a Contest to Generate Open Source Apps


for Citizens.

E-Government in the cloud.

The City of Carlsbad turns to the cloud.

E-Government serves citizens with apps to curb drunken driving.

e-Commerce Support Services: Payment & Order Fulfilment


x

IT at Work 6.6 E-Money Lifestyle.

Market research for e-commerce.

Web advertising.

Representative advertising strategies online.

Electronic payments.

Security electronic payments.

Order fulfilment process.

e-Business Ethics and Legal Issues


x

Ethical and implementation issues.

Legal issues specific to e-commerce.

38

STUDY GUIDE

BMIT5103

Information Technology for Managers

Study Questions
1.

What are the requirements and challenges of e-business?

2.

What are the major types of e-business transactions?

3.

Define a business model and discuss five e-business models.

4.

Describe how digital content and services can lead to significantly


lower costs.

5.

What general features make the delivery of online services successful


for both sellers and buyers?

6.

Explain the major issues related to e-tailing.

7.

Determine the viability and risk of online e-tailers.

8.

Identify appropriate revenue (business) models.

9.

Discuss three online marketing planning recommendations.

10.

Briefly differentiate between sell-side marketplace and e-sourcing.

11.

What is the advantage of using cloud computing as the platform for


e-government?

12.

What are the major e-commerce support services?

13.

Describe the issues in e-commerce order fulfilment.

14.

What are some of the online advertisement strategies?

15.

List some ethical issues in e-commerce.

16.

Distinguish between business-to-business forward auctions and


buyers bids for RFQs.

39

STUDY GUIDE

Topic 7:

BMIT5103

Information Technology for Managers

Mobile Computing and Commerce

Learning Outcomes
By the end of this topic, you should be able to:
1.

Explain mobile computing technologies;

2.

Describe the emergence of the mobile financial services industry;

3.

Discuss the growing role of mobile computing in shopping,


entertainment, gaming, hospitality and travel, and advertising;

4.

Describe the growth of location-based services and commerce; and

5.

Identify the expansion of enterprise handhelds that make use of mobile


computing technology.

Topic Overview
This topic highlights the technologies of mobile computing and its roles in
shopping, entertainment, gaming, hospitality and travel, and advertising.
Mobile computing and commerce are based on a foundation of mobile
software (operating systems and handhelds), and wireless networks. Mobile
computing devices include laptop computers, iPad, mobile devices like
smartphones and PDAs, e-readers and slate computers as well as wearable
computers. A wide variety of mobile operating system exists to power
smartphones and other mobile devices. This presents a challenge for mobile
website and handheld programmers. Wireless networks based on Wi-Fi and
telecommunications technology (e.g. 3G and 4G) have expanded
considerably in the last few years, offering wide-scale coverage for mobile
users. People are increasingly using mobile devices, especially
smartphones, to perform financial transactions, including banking, credit card
transactions and stock purchases. Numerous mobile electronic payment
systems have been developed. It remains to be seen which one(s) will be
accepted by merchants and consumers.

40

STUDY GUIDE

BMIT5103

Information Technology for Managers

People access financial services using a combination of mobile media


channels including SMS, text and short code, mobile Web browsers and
customised smartphone applications (apps). Mobile retail shopping has
grown considerably of late. Japanese consumers have embraced mobile
commerce more than any other group but American interest in mobile retail
is alarming. Shoppers are increasingly using their mobile devices to find
product and price information while shopping in traditional stores.
Smartphones and other mobile devices are becoming a key channel for
entertainment such as music, movies and games. Hotels and others in the
hospitality and travel industries are expanding their use of mobile apps to
provide greater service and convenience to travellers.
Mobile social networking is expected to grow dramatically over the next
decade and experts predict it will be a primary driver of mobile computing
technology. Advertising through the mobile channel is attractive to
businesses because it allows them to send targeted messages to
prospective customers. These messages can be based on users location
which can be determined using GPS technology. A mobile portal is a
customer channel, optimised for mobility that aggregates and provides
content and services for mobile users. Location-based commerce (LBC) or
services refers to the delivery of advertisements, products, information or
services to customers whose locations are known at a given time. An
increasing number of handhelds are evident in several industries, particularly
in transportation. These handhelds relate mainly to customer service,
advertising/marketing and operations. Many organisations use mobile
computing technology to improve their operations, automate their sale force
and improve employee communications and interactions. These uses are
referred to as mobile enterprise applications.
Retailers are increasingly using mobile technology to improve operations in
their stores and provide enhanced customer service and inventory
management. Mobile SCM refers to the use of mobile computing technology
to manage the flow of goods from the point of manufacturer to the end user.
Mobile computing technology allows different business organisations in a
supply chain to communicate and share information in order to improve the
efficiency of the whole distribution system. CRM systems are increasingly
being enhanced with mobile technology to improve the ability of businesses
and their partners to provide greater service and value to end users.

41

STUDY GUIDE

BMIT5103

Information Technology for Managers

Focus Areas and Assigned Readings


Focus Areas

Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, international student
version. Asia: John Wiley.

7.1
7.2
7.3
7.4
7.5

Mobile Computing Technology


Mobile Financial Services
(MFS)
Mobile Shopping,
Entertainment and Advertising
Location-Based Services and
Commerce
Mobile Enterprise Applications

Chapter 7, pp 192197.
Chapter 7, pp 197200.
Chapter 7, pp 200205.
Chapter 7, pp 205208.
Chapter 7, pp 209211.
Extra Readings
Ecommerce Times M-Commerce
ecommercetimes.com/perl/section/m
-commerce/
Mobile Commerce Daily
mobilecommercedaily.com
Storefront Backtalk
storefrontbacktalk.com/
Lo-So (Location-based social
networking) Foursquare.com
Augmented Reality on Smartphones
youtube.com/watch?v=b64_16K2e0
8
Mobile payments threaten retail
banks and credit cards
youtube.com/watch?v=vpw9KcqgVv
E&feature=related
Wearable Computer by Motorola
youtube.com/watch?v=zNYNZ03WH
1E&feature=related
Innovative Mobile Payment System
by Square
youtube.com/watch?v=iBieYjxUj5Q
Mobile Inventory Management
youtube.com/watch?v=6ekRCUDD9o

42

STUDY GUIDE

BMIT5103

Information Technology for Managers

Content Summary
7.1

7.2

7.3

7.4

Mobile Computing Technology


x

Mobile computing devices.

Mobile computing software.

Wireless network growth.

Mobile Financial Services (MFS)


x

Mobile banking and stock trading.

Mobile electronic payment systems.

Mobile banking security risks.

Mobile Shopping, Entertainment and Advertising


x

IT at Work 7.1 Mobile Godiva.

IT at Work 7.2 Wireless Marketing and Advertising in Action.

Mobile form wireless devices.

Mobile entertainment.

Mobile games.

Hotel services and travel go wireless.

Mobile social networking.

Other mobile computing services for consumers.

Targeted advertising.

Mobile portal.

Location-Based Services and Commerce


x

IT at Work 7.3 L-Commerce Mobile Strategy.

IT at Work 7.4 Real-Time Public Transport System.

L-Commerce Technologies.

Global Positioning system (GPS).

Geographical Information System (GIS).

43

STUDY GUIDE

7.5

BMIT5103

Information Technology for Managers

Mobile Enterprise Applications


x

Mobile apps.

Customer Support and Mobile CRM.

Mobile Supply Chain Management (MSCM).

Study Questions
1.

What are the three technological foundations of mobile computing?

2.

List some of the reasons why is it can be difficult to categorise mobile


computing devices.

3.

What factors have led to the recent growth of the smartphone market?

4.

What are the two kinds of basic transactions requiring mobile payment
systems?

5.

What are the most common security risks associated with mobile
banking?

6.

Describe some mobile payment systems.

7.

Describe how shoppers use mobile devices to enhance their shopping


experience.

8.

How is targeted advertising done wirelessly?

9.

Describe some location-based applications particularly advertising.

10.

Describe how mobile computing is used to improve supply chain


management.

11.

Explain how mobile computing technology is used to enhance the


safety and effectiveness of the health care industry.

12.

Describe GPS and GIS. What are they used for?

13.

How do people use mobile devices to conduct banking and other


financial services?

44

STUDY GUIDE

Topic 8:

BMIT5103

Information Technology for Managers

Web 2.0 and Social Media

Learning Outcomes
By the end of this topic, you should be able to:
1.

Define the nature of Web 2.0 and its business applications;

2.

Explain online communities and how social networking services are


evolving;

3.

Describe how businesses use Web 2.0 applications to carry out a


variety of business functions more effectively;

4.

State how businesses evaluate the effectiveness of their social media


strategies and tactics; and

5.

Describe how the Internet is evolving and the significant changes that
will take place in the near future.

Topic Overview
This topic highlights Web 2.0 and social media. Web 2.0 consists of several
tools that allow for enhanced social interaction on the Web. The new social
Web is changing the way people communicate, their behaviour and their
expectations of how business organisations should interact with them.
Typical Web 2.0 applications include blogs, wikis, social networking services,
sharing sites, RSS, widget, mashup and social benchmarking. Online
communities predate the World Wide Web and can take a variety of forms.
The social graph describes how we are all connected to one another through
relationships. The giant global graph describes the connection between
people and/or documents and pages online. Social networking services are a
dominant form of online community today and include companies such as
Facebook, Ozone, Orkut and Habbo. Enterprise 2.0 refers to the use of Web
2.0 technologies for business use. The use of social media tools by
businesses is likely to change the behaviours of employees and the way that
managers lead their organisations. Businesses are using social media tools
in human resources, marketing and sales, SCM, internal collaboration and
communication and other areas. Businesses use metrics to evaluate the
efficiency and effectiveness of their social media efforts. Social media
metrics fall into four categories: tool metrics, tactical metrics, strategic
metrics and ROI metrics. Technology is being created to make information
search on the Web more effective. The future Internet is frequently referred
to as semantic Web which will be based on new languages such as RDF,

45

STUDY GUIDE

BMIT5103

Information Technology for Managers

OWL, and SPARQL. In addition, the use of Application Programming


Interfaces (APIs) is expected to increase. However, Web evolution has many
challenges, among which are: closed data sources, incompatible data
structures, interoperability across equipment and software.

Focus Areas and Assigned Readings


Focus Areas

Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for management,
international student version. Asia: John
Wiley.

8.1
8.2
8.3
8.4
8.5

Web 2.0 and Social Media


Virtual Communities and
Social Networking Services
Enterprise 2.0 Tools
Social Media Objectives and
Metrics
Social Media Future

Chapter 8, pp 221228.
Chapter 8, pp 228235.
Chapter 8, pp 235239.
Chapter 8, pp 239244.
Chapter 8, pp 244248.
Chapter 8, pp 147149.
Extra Readings
Web 2.0The Machine Is Us/ing Us
youtube.com/user/mwesch#p/u/9/NLlG
opyXT_g
Social Media Revolution Is it a fad?
youtube.com/watch?v=lFZ0z5Fm-Ng
Mashable Social Media Guide
mashable.com/social-media/
Cluetrain Manifesto cluetrain.com/
OReilly Media oreilly.com/community/
World Wide Web Consortium
w3.org/Consortium/
Read, Write, Web technology blog
readwriteweb.com/

46

STUDY GUIDE

BMIT5103

Information Technology for Managers

Content Summary
8.1

8.2

Web 2.0 and Social Media


x

IT at Work 8.1 Mashups: Interactive Web Apps.

Characteristics of information and network security.

Internal and external enemies.

Risks from the cloud computing and social network activities.

Phishing and threats derived from the Web.

Search engine manipulation.

Multilink attacks.

Government regulations for control measure which include ERM


and COBIT.

Industry standard to protect their customers and their members


brand images and revenues.

Virtual Communities and Social Networking Services


x

IT at Work 8.2 Social Privacy.

Types of online communities.

Social Network analysis (SNA).

The acceptance of online communities by the business


community.

Social networking services (SNS).

Facebook becomes leading SNS.

Twitter: Miccroblogging.

Private SNS services.

47

STUDY GUIDE

8.3

8.4

8.5

BMIT5103

Information Technology for Managers

Enterprise 2.0 Tools


x

IT at Work 8.3 Social Networking Differs by Culture.

IT at Work 8.4 Will it Blend? Occupational fraud goes viral.

Business use of Web 2.0 Technologies.

Recruiting and professional networking.

Marketing promotion and sales.

Internal collaboration and communication.

Supply Chain Management 2.0.

Social Media Objectives and Metrics


x

IT at Work 8.5 Search Engine Optimisation and Social Media.

Why measure social media.

Dashboard and scorecards.

Examples of social media metrics.

Tool-based metrics.

Tactical metrics.

Strategic metrics.

ROI metrics.

Social Media Future Three layers of network security


measures
x

Semantic Web.

The Language(s) of Web 3.0.

Artificial intelligence.

Mobility.

Barriers to overcome.

48

STUDY GUIDE

BMIT5103

Information Technology for Managers

Study Questions
1.

How has Web 2.0 changed the behaviour of Internet users?

2.

What are the basic tools or applications that characterise Web 2.0?

3.

What are the major differences between social networking services and
other online communities?

4.

Why would a business want to create a private SNS? What are some
of the challenges associated with doing this?

5.

Explain why social media tools are likely to make supply chains more
efficient and productive in the future.

6.

List examples of tool-based metrics. What questions can an


organisation answer with this kind of information?

7.

List social media strategies that businesses might pursue. What kind of
information could they gather to see if they are being effective with
social media?

8.

Why do businesses find ROI metrics so compelling?

9.

Explain some of the fundamental differences between Web 1.0 and


Web 2.0.

10.

What are some of the barriers or challenges to be overcome in creating


Web 3.0?

11.

Many NPOs, NGOs and government agencies serve the poor and
disadvantaged, many of whom have limited access to the Internet.
Identify some ways that social media might still be an important tool for
these groups.

12.

Describe the fundamental changes that need to take place before the
semantic Web concept becomes widespread.

49

STUDY GUIDE

Topic 9:

BMIT5103

Information Technology for Managers

Operational Planning and Control Systems

Learning Outcomes
By the end of this topic, you should be able to:
1.

Describe how functional systems support managers and workers at the


operational level;

2.

Explain the support provided by manufacturing and production/


operations systems;

3.

Explain the support provided by marketing and sales systems;

4.

Explain the support provided by accounting and finance systems; and

5.

Explain the support provided by human resources systems.

Topic Overview
This topic highlights IS applications and their support on the functional
activities of an organisation. The major business functional areas are
production/operation management, marketing, accounting/finance, and
human resources management. The backbone of most IS applications is
TPS which take cares of the routine mission central operations of the
organisation. The core area of IT support to production/operations
management is logistics and inventory management: JIT, mass
customisation and CRM. Financial IS deal with topics such as: investment
management, financing operations, raising capital, risk analysis and credit
approval. Accounting IS cover many non-TPS applications in areas such as
cost control, taxation and auditing. Most tasks related to human resource
development can be supported by human resource IS. These tasks include
employee recruitment and selection, hiring, performance evaluation, salary
and benefits administration, training and development, labour negotiation
and work planning. Online human resource systems are extremely useful for
recruiting and training.

50

STUDY GUIDE

BMIT5103

Information Technology for Managers

Focus Areas and Assigned Readings


Focus Areas

Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for management,
international student version. Asia: John
Wiley.

9.1
9.2
9.3
9.4
9.5

Management Levels, Functions,


and Operational Systems
Manufacturing and Production
Systems
Sales and Marketing Systems
Accounting and Finance Systems
Human Resource Systems

Chapter 9, pp 258265.
Chapter 9, pp 265267.
Chapter 9, pp 268270.
Chapter 9, pp 270275.
Chapter 9, pp 275279.
Extra Readings
Data sets, including profit margins
data360.org
Web Analytics Association
webanalyticsassociation.org
Piwik, open source Web analytics
piwik.org/
Google Analytics
google.com/analytics
Yahoo! Web Analytics
web.analytics.yahoo.com/
Oracle oracle.com
EOQ Tutorial
scm.ncsu.edu/public/inventory/6eoq.h
tml
Project Management Institute (PMI)
pmi.org
WebEx webex.com
Salesforce software salesforce.com

51

STUDY GUIDE

BMIT5103

Information Technology for Managers

Content Summary
9.1

9.2

9.3

Management Levels, Functions, and Operational Systems


x

IT at Work 9.1 Cut Costs and Delivery Time with TPS.

IT at Work 9.2 First Choice Ski Beats Its Competition with Yahoo!
Web Analytics.

IT at Work 9.3 Microsoft Excel and OLAP Connector Tool.

Traditional functional IS design.

Operational systems and data quality.

Key Characteristics of a TPS.

Operational Subsystems.

Transaction processing systems and core operations.

Tasks in transaction processing: order processing and Web


analytics.

What if a TPS fails?

Manufacturing and Production Systems


x

POM function in an organisation.

In-house logistics.

Inventory control.

JIT management and lean manufacturing.

Quality control.

Project management.

Other POM areas.

Computer-integrated manufacturing.

Sales and Marketing Systems


x

Data-driven marketing.

Distributed channels

Marketing management.

52

STUDY GUIDE

9.4

9.5

BMIT5103

Information Technology for Managers

Accounting and Finance Systems


x

IT at Work 9.4 Forensic Accountants Learn about Employee


Fraud.

Auditing IS.

Financial planning and budgeting.

Control and auditing.

Human Resource Systems


x

IT at Work 9.5 IPGs HR Management Apps.

IT at Work 9.6 Using Interactive Simulation in Training.

HR Management activities.

HR Maintenance and development.

HR planning, control, and management.

Study Questions
1.

List the major characteristics of TPS.

2.

Describe the importance of high quality (error-free) data entry.

3.

Describe the importance of Web analytics and show some of its


applications.

4.

What is the function of POM in an organisation? How can it be


enhanced with IT?

5.

What are the three categories of inventory costs?

6.

Explain the difference between a project and operations.

7.

Define data-driven marketing.

8.

What marketing strategies can be enhanced by the Web?

9.

How are financial planning and budgeting facilitated by IT?

10.

Explain how accounting IS help deter fraud.

53

STUDY GUIDE

BMIT5103

Information Technology for Managers

11.

Define capital budgeting.

12.

List IT-supported recruitment activities.

13.

How can training be done online?

14.

Describe IT support
development.

15.

Which functional areas are related to payroll, and how does the
relevant information flow?

for

employee

54

selection,

promotion

and

STUDY GUIDE

Topic 10:

BMIT5103

Information Technology for Managers

Enterprise Information Systems

Learning Outcomes
By the end of this topic, you should be able to:
1.

State how enterprise systems support cross-functional and multinational operations;

2.

Explain why companies need enterprise resource planning (ERP)


systems;

3.

Describe supply chain management (SCM) networks and solutions;

4.

Discuss collaborative planning, forecasting and replenishment (CPFR);

5.

Describe customer relationship management (CRM) systems; and

6.

Discuss the benefits of knowledge management (KM) systems.

Topic Overview
This topic highlights information systems that support several departments
and/or the entire enterprise. A good example is ERP which supports supply
chains and CRM. Supply chains connect suppliers to manufacturers,
departments inside a company to one another, and a company to its
customers which are supported by a variety of IT application programs. The
supply chain must be completely managed from the raw materials to the end
customers. Typical supply chains involve the upstream, internal and
downstream. Lack of coordination and communication among players along
the supply chain can cause Bullwhip effect problems. Supply chain problems
can be supported and solved by IT, such as appropriate inventory
management, vertical integration, information sharing, VMI, supply chain
collaboration, RFID supply chain teams, virtual factories and wireless
solutions. SCM evolves by integrating routine transactions, including internal
suppliers/customers and external suppliers/customers, in ERP and extended
ERP. Next, BI and CRM applications are integrated into supply chain
software. CRM is an enterprise-wide activity through which an organisation
takes care of its customers and their needs. This demands good
communication and collaboration, most of which are IT-supported and Webbased. Knowledge management (KM) is a process which helps
organisations identify, select, organise, disseminate and transfer important
information and expertise that typically reside within the organisation in an
unstructured way. The KM model involves following cyclical steps: create,
capture, refine, store, manage and disseminate knowledge. Several
technologies can establish a knowledge management system: Internet,
Intranet, data warehousing, DSS tools, groupware, etc. KM has many

55

STUDY GUIDE

BMIT5103

Information Technology for Managers

potential benefits resulting from reuse of expertise. However, the success of


a KM system is difficult to measure. Traditional methods of financial
measurement are not appropriate since they do not consider intellectual
capital as an asset. Therefore, non-financial metrics are typically used to
measure the success of a KM system.

Focus Areas and Assigned Readings


Focus Areas

Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, International student
version. Asia: John Wiley.

10.1 Enterprise Systems


10.2 Enterprise Resource Planning
(ERP) Systems
10.3 Supply Chain Management
(SCM) Systems
10.4 Collaborative Planning,
Forecasting and
Replenishment (CPFR)
Systems
10.5 Customer Relationship
Management (CRM) Systems
10.6 Knowledge Management
(KM) Systems

Chapter 10, pp 286288.


Chapter 10, pp 288296.
Chapter 10, pp 296301.
Chapter 10, pp 301305.

Chapter 10, pp 305310.


Chapter 10, pp 31115.
Extra Readings
Comparison of top 10 ERP vendors
top10erp.org
ERP Vendor Shootout
erpshootout.com
Oracle httoracle.com
SAP sap.com
SSA Global
ssaglobal.com/solutions/erp/ln.aspx
Microsoft Dynamics
microsoft.com/dynamics/en/us/defau
lt.aspx
Teradata Teradata.com

56

STUDY GUIDE

BMIT5103

57

Information Technology for Managers

STUDY GUIDE

BMIT5103

Information Technology for Managers

Content Summary
10.1

10.2

10.3

Enterprise Systems
x

Types of enterprise systems and their functions.

Reasons companies migrate to enterprise systems.

Implementation challenges and best practices.

Enterprise systems insights.

Enterprise Resource Planning (ERP) Systems


x

IT at Work 10.1 Achieving Efficient Flexible Manufacturing.

ERP: Strategic weapon for food manufacturers.

An ERP system integrates all IS functions of a food manufacturer


around a single set of data.

Comparison of disparate systems within an enterprise to an


integrated ERP system.

How ERP interfaces with other enterprise systems.

Justifying an ERP.

Acquiring an ERP.

Understanding ERP success and failure factors.

Supply Chain Management (SCM) Systems


x

IT at Work 10.2 Improving Food Supply Chain Safety with Track


and Trace IT Occupational fraud.

Managing the flow of materials, data and money.

Order fulfilment and logistics.

Steps in the order fulfilment process.

Supply chain management concepts.

Managing on-demand activities.

58

STUDY GUIDE

10.4

10.5

10.6

BMIT5103

Information Technology for Managers

Collaborative Planning, Forecasting & Replenishment (CPFR)


Systems
x

IT at Work 10.3.

Bullwhip effect in the supply chain.

Improving B2B E-Commerce.

Collaborative planning, forecasting and replenishment.

Customer Relationship Management (CRM) Systems


x

IT at Work 10.4 Kelloggs K-Lean Programs in Latin America.

IT at Work 10.5 CRM and e-CRM Apps.

CRM example: Travelocity.

CRM is multi-channel.

CRM is an enterprise wide initiative.

E-CRM.

CRM Successes and Failures.

Knowledge Management (KM) Systems


x

IT at Work 10.6 Knowledge Management in PETRONAS


(Malaysia).

IT at Work 10.7 AskMe Expert Location System (ELS).

Knowledge.

Knowledge management (KM).

Components of KM systems.

KM system implementation.

Integration of KM systems with other IS.

59

STUDY GUIDE

BMIT5103

Information Technology for Managers

Study Questions
1.

Explain the purpose of an enterprise system.

2.

Describe five types of enterprise systems.

3.

What are two challenges of legacy systems?

4.

Explain the three types of changes needed when an enterprise system


is implemented.

5.

Briefly describe the challenges of legacy systems that motivate


migration to ERP.

6.

List and briefly describe three ERP implementation success factors.

7.

Describe two barriers to ERP implementation.

8.

List and describe the three main flows managed in a supply chain.

9.

What is order fulfilment?

10.

How does demand uncertainty affect inventory? Give an example.

11.

Describe a collaborative supply chain.

12.

Describe how vendor-managed inventory works.

13.

List the major types of CRM.

14.

List some customer-facing, customer-touching and customer-intelligent


CRM tools.

15.

Define KM and relate it to knowledge and intellectual capital. What are


the major benefits of KM to a company?

16.

Draw the KM life cycle and explain the major steps.

60

STUDY GUIDE

Topic 11:

BMIT5103

Information Technology for Managers

Business Intelligence and Decision Support

Learning Outcomes
By the end of this topic, you should be able to:
1.

State why organisations need BI and BI technologies as well as how to


make a business case for BI investments;

2.

Describe BI architecture, data mining, predictive analytics, dashboards,


scorecards, and other reporting and visualisation tools;

3.

Explain the value of data, text and Web mining;

4.

Discuss managerial
processes;

5.

Describe DSS, benefits and structure; and

6.

Predict the future of BI in the form of mobile intelligence (MI).

decision

making

processes

and

decision

Topic Overview
This topic clarifies that BI is driven by the need to get accurate and timely
information in an easy way. BPM covers methodologies, metrics, processes
and systems used to drive the performance of the enterprise. The major
components of BI are data warehouses and/or marts, predictive analysis,
data mining, data visualisation and business performance management
system. Predictive analysis uses different algorithms to forecast results and
relationships among variables as well as to identify data patterns. Data
mining is one of the predictive analysis tools. Scorecards and dashboards
are common components of most performance managements systems,
performance measurement systems and BPM suites. Decision making
involves four major phases: intelligence, design, choice and implementation.
Models provide fast and inexpensive virtual experimentations with new or
modified systems. DSS can improve the effectiveness of decision making,
decrease the need for training, improve management control, facilitate
communication, decrease costs and allow for more objective decision
making. The major components of a DSS are database and its management,
the model based on its management and the user-friendly interface. MI and
analytics in the cloud are expected to define the future BI.

61

STUDY GUIDE

BMIT5103

Information Technology for Managers

Focus Areas and Assigned Readings


Focus Areas

Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, International student
version. Asia: John Wiley.

11.1
11.2

11.3
11.4
11.5
11.6

Business Intelligence (BI) for


Profits and Nonprofits
BI Architecture, Analytics,
Reporting, & Data
Visualisation
Data, Text, and Web Mining
Decision Making Processes
Decision Support Systems
(DSS)
Mobile Intelligence:
Convergence of Mobile
Computing & BI

Chapter 11, pp 325336.


Chapter 11, pp 326342.

Chapter 11, pp 342345.


Chapter 11, pp 345348.
Chapter 11, pp 348351.
Chapter 11, pp 351353.
Extra Readings
Business Intelligence Journal
businessintel.org/
The Data Warehousing Institute
(TDWI) tdwi.org/
Cloud9 Analytics, on-demand
(SaaS) cloud9analytics.com/
Information Builders
informationbuilders.com/
WebFOCUS BI platform
informationbuilders.com/products/we
bfocus/
IBM Cognos 8 BI www01.ibm.com/software/data/cognos/
Oracle Oracle.com
SAS BI sas.com/technologies/bi/
SAP AG Sap.com
Microsoft BI
microsoft.com/bi/default.aspx
Tableau Software
tableausoftware.com/
QlikTech qlikview.com
iDashboards idashboards.com
Honouring Those Who Use IT to
Benefit Society cwhonors.org/

62

STUDY GUIDE

BMIT5103

Information Technology for Managers

Content Summary
11.1

11.2

Business Intelligence (BI) for Profits and Nonprofits


x

IT at Work 11.1 Chinas New Predictive Analytics Lab.

BI Cases.

Types of BI.

How to recognise the need for BI.

The business case for BI.

Overview of BI components and core functions.

Integrating disparate data stores.

Power of predictive analytics, alerts and decision support.

How BI system works.

BI flaws that contribute to BI failures.

Organisational culture factors that contribute to BI success.

Defining business performance KPI.

BI Architecture, Analytics, Reporting & Data Visualisation


x

IT at Work 11.2 Soldiers Saved by Battlefield BI.

IT at Work 11.3 Bank Chain Relies on BI and DSS to Forecast


Fashion Trends.

A closer look at BI architecture.

Elements of a BI plan.

63

STUDY GUIDE

BMIT5103

Information Technology for Managers

Digital dashboard capabilities.

Multidimensional (3D) view of sales revenue data.

Data mining, query and analysis.

Business performance management (BPM).

BI payoffs and applications.

Industry-specific BI.

Business value of BI Analytical apps.

64

STUDY GUIDE

11.3

11.4

11.5

11.6

BMIT5103

Information Technology for Managers

Data, Text and Web Mining


x

IT at Work 11.4 Enterprise Location Intelligence Apps.

Benefits of data mining.

Power users of data mining tools.

Data mining apps.

Text Mining and Web mining.

Decision Making Processes


x

Decision process and decision support system (DSS).

Phases in the decision-making process.

A framework for decision analysis.

Decision Support Systems (DSS)


x

Sensitivity analysis: what-if and goal seeking.

Structure and components of DSS.

DSS apps.

Mobile Intelligence: Convergence of Mobile Computing & BI


x

Mobile intelligence infrastructure.

Redefining hardware functions.

Mobile intelligence.

65

STUDY GUIDE

BMIT5103

Information Technology for Managers

Study Questions
1.

Explain how to recognise the need for BI.

2.

Describe the components of BI.

3.

Distinguish between traditional and operational BI.

4.

Explain predictive analytics. List three business pressures driving


adoption of predictive analysis.

5.

Explain how an event-driven alert system functions.

6.

Explain four BI flaws that contribute to BI failure.

7.

Explain the capabilities of dashboards and scorecards. Why are they


important BI tools?

8.

What is the benefit to end users of having ad-hoc query capabilities?

9.

How does text mining differ from search?

10.

What is Web mining? Give three examples of Web content that would
be mined for intelligence purposes.

11.

What are the three roles of management?

12.

Identify and explain the three phases of decision making.

13.

Give an example of a structured, an unstructured and a semistructured decision. Which of these types of decisions can be
optimised? Why?

14.

Explain the two types of decisions that DSS are used to solve. Why
arent DSS used to support structured decisions?

15.

What are the components of a DSS?

16.

What might be the impact on organisations that exploit mobile


intelligence?

66

STUDY GUIDE

Topic 12:

BMIT5103

Information Technology for Managers

Security, Crime, Compliance and Continuity

Learning Outcomes
By the end of this topic, you should be able to:
1.

Explain the value of aligning IT and business strategies and how this
alignment can be achieved;

2.

Recognise the importance, functions and challenges of IT governance;

3.

Describe the reasons and benefits of aligning IT and business


strategies;

4.

Describe the IT strategic planning process;

5.

Discuss major types of outsourcing, reasons for outsourcing and the


risks and benefits; and

6.

Take a forward-look at the future of BI in the form of mobile intelligence


(MI).

Topic Overview
This topic highlights the value of aligning IT and business strategies, and
ways to achieve this alignment. IT governance is concerned with ensuring
that organisational investments in IT return full value. IT performance
management enables failures to be anticipated before it is too late.
Therefore, it is vital for managers to realise the importance, functions and
challenges of IT governance. The IT planning process results in a formal IT
strategy. Several tools and methodologies are used to facilitate IT strategic
planning. Examples of these methodologies are Business Service
Management and Business Systems Planning Model. Business Service
Management uses real-time dashboard views to understand and predict how
IT impacts business and how business impacts IT architecture. Balanced
scorecard is a business management concept that transforms both financial
and non-financial data into a detailed roadmap which helps measure
performance. Scenario planning is a methodology which planners first create
several scenarios, then a team compile as many future events as possible
that may influence the outcome of each scenario. Companies should
understand major types and reasons for outsourcing as well as the risks and
benefits of outsourcing. It is also worth identifying the factors that drive the
growth in outsourcing as an IT strategy. Prediction of future BI in the form of
mobile intelligence (MI) is extrapolated.

67

STUDY GUIDE

BMIT5103

Information Technology for Managers

Focus Areas and Assigned Readings


Focus Areas

Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, International student
version. Asia: John Wiley.

12.1
12.2
12.3
12.4
12.5

IT Strategies
Corporate and IT Governance
Aligning IT with Business
Strategy
IT Strategic Planning Process
IT Outsourcing Strategies

Chapter 12, pp 361364.


Chapter 12, pp 364366.
Chapter 12, pp 367371.
Chapter 12, pp 371378.
Chapter 12, pp 378383.
Extra Readings
Balanced Scorecard Institute
balancedscorecard.org/
Outsourcing Professionals best
outsourcing service providers
outsourcingprofessional.org/content/
23/152/1197/
Visual Ark virtualark.com/
Windows Azure
microsoft.com/windowsazure/
Rackspace Hosting rackspace.com/
CIO Insights and Strategy
IBM.com/CIO/
Debate Over Offshore Outsourcing
quality-web-solutions.com/offshoreoutsourcing-debate.php
Outsource Blog
theoutsourceblog.com/
Bloomberg Real-time Information
Services bloomberg.com/
IT Governance Institute itgi.org/
Video on SaaS & Outsourcing
Relationship Management
janeeva.com/blog/

68

STUDY GUIDE

BMIT5103

Information Technology for Managers

Content Summary
12.1

12.2

12.3

12.4

IT Strategies
x

IT strategies: in-house and outsourcing.

IT and business strategy disconnects.

IT and business strategy success cases.

Business and IT strategies defined.

Corporate and IT Governance


x

IT governance.

What does IT governance cover?

Aligning IT with Business Strategy


x

IT at Work 12.1 CIOs Strategic Direction and Initiative.

Strategic role of IT.

Competitive advantage through IT.

Key resource attributes that create competitive advantage.

IT Strategic Planning Process


x

IT at Work 12.2 IT Steering Committees.

IT strategic planning process.

Tools and methodologies of IT strategic planning.

Business service management.

Business systems planning model.

Balanced scorecard.

CSF model.

Scenario planning.

Resource application.

69

STUDY GUIDE

12.5

BMIT5103

Information Technology for Managers

IT Outsourcing Strategies
x

IT at Work 12.3 eBays Rapid Growth Pains.

IT at Work 12.4 CIO Discusses J. P. Morgan Chases Sourcing


Strategy.

BPO and ITES.

Factors driving growth in outsourcing as an IT strategy.

Risk concerns and hidden costs.

Offshoring.

The outsourcing life cycle.

Study Questions
1.

Explain the difference between in-house and outsourcing IT strategies.

2.

What are the possible reasons why a high percentage of IT projects are
abandoned?

3.

What are the goals of ITbusiness alignment?

4.

Why is IT performance management a key part of IT governance?

5.

How can ITbusiness alignment be improved?

6.

Describe three types of resources that information systems can


contribute to a firm.

7.

Why is it important for the CIO to be included as a member of the


CEO's senior management team?

8.

Why must IT strategic planning be revisited on a regular basis?

9.

Describe the IT strategic planning process.

10.

Describe project portfolio and applications portfolio. When are these


portfolios developed?

70

STUDY GUIDE

BMIT5103

Information Technology for Managers

11.

What tools and methodologies are available to assist in the IT strategic


planning process? How are these methods used to help organisations?

12.

What are some of the major reasons for outsourcing?

13.

What are the benefits of outsourcing? What are the risks of


outsourcing?

14.

Discuss the strategies organisations should consider in managing the


risks associated with outsourcing contracts.

15. Distinguish between outsourcing and offshore outsourcing.

71

STUDY GUIDE

Topic 13:

BMIT5103

Information Technology for Managers

Business Process Management and System


Development

Learning Outcomes
By the end of this topic, you should be able to:
1.

Describe business process management (BPM), BPM tools and


service-oriented architecture (SOA) and their role in business agility
and process optimisation;

2.

State the importance of software architecture


maintenance and agility of business processes;

3.

Describe IT project identification, justification, planning and triple


constraints; and

4.

Explain the systems development lifecycle (SDLC).

design

to the

Topic Overview
This topic associates business process management (BPM), BPM tools and
service-oriented architecture (SOA) with their role in business agility and
process optimisation. It highlights the importance of software architecture
design to the maintenance and agility of business processes. IT project
identification, justification, planning and triple constraints are important
factors to consider when doing IT projects. Eight stages of systems
development lifecycle (SDLC), namely, feasibility studies, systems analysis,
system design, programming, testing, implementation, operation and
maintenance are explained to conclude the topic.

72

STUDY GUIDE

BMIT5103

Information Technology for Managers

Focus Areas and Assigned Readings


Focus Areas

Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management, International student
version. Asia: John Wiley.

13.1

13.2
13.3
13.4

Business Process
Management (BPM) and
Service-Oriented Architecture
(SOA)
Software Architecture and IS
Design
IT Project Management
Systems Development

Chapter 13, pp 393396.

Chapter 13, pp 397403.


Chapter 13, pp 403405.
Chapter 13, pp 405411.
Extra Readings
ARIS Express, business process
modelling software.
ariscommunity.com/aris-express
Oracle BPM Suite 11g
oracle.com/us/technologies/bpm/
Oracle SOA Suite 11g
oracle.com/us/technologies/soa/
Project Management Institute
pmi.org/
Fast forward BPM blog
fastforwardblog.com/
Open source BPM and workflow
processmaker.com/
BPM/SOA Community Insights
blog.soa-consortium.org/
Adaptive Planning demo for
budgeting, forecasting, reporting,
analysis adaptiveplanning.com/
IBM BPM www01.ibm.com/software/info/bpm/
IBM BPM Blueprint demo www01.ibm.com/software/integration/bp
m-blueprint/
IT Business Edge BPM
itbusinessedge.com/topics/show.asp
x?t=482

73

STUDY GUIDE

BMIT5103

Information Technology for Managers

Oracle Business Activity Monitoring


(BAM)
oracle.com/appserver/businessactivity-monitoring.html
InfoSys Research BPM, SOA,
and enterprise architecture
infosys.com/research/ and
infosys.com/research/centers-ofexcellence/

Content Summary
13.1

13.2

Business Process Management (BPM) and Service-Oriented


Architecture (SOA)
x

Characteristics of information and network security.

Internal and external enemies.

Risks from cloud computing and social network activities.

Phishing and threats derived from the Web.

Search engine manipulation.

Multilink attacks.

Government regulation for control measure which include ERM


and COBIT.

Industry standard to protect customers and members brand


images and revenues.

Software Architecture and IS Design


x

IT at Work 13.1 FINRA SOA Approach to System Integration.

Unintended threats.

Internal threats.

IT attacks.

Targeted attacks.

Botnets.

Malware and Botnet defences.

74

STUDY GUIDE

13.3

13.4

BMIT5103

Information Technology for Managers

IT Project Management
x

Occupational fraud.

Detection and prevention of internal fraud.

Identity theft.

Systems Development
x

Defence strategy.

Major categories of general controls.

Study Questions
1.

What is a business process? Give three examples.

2.

Why is BPM important?

3.

What is a BPM mashup?

4.

Explain the three-tier software architecture design.

5.

Explain the functions of middleware.

6.

List major acquisition and development strategies.

7.

Compare buy option against lease option.

8.

List in-house development approaches.

9.

What are the risks and limitations of end-user development?

10.

What is scope creep? Why does it pose risks to a project and a project
manager?

11.

Define the eight stages of the SDLC.

12.

Explain feasibility tests and their importance.

13.

Discuss the four conversion methods.

14.

How does a business process differ from an information system?

75

STUDY GUIDE

Topic 14:

BMIT5103

Information Technology for Managers

Global Ecology, Ethics and Social


Responsibility

Learning Outcomes
By the end of this topic, you should be able to:
1.

Explain how IT and users can reduce their carbon footprint through
green business practices and data centre designs that conserve natural
resources;

2.

Describe tradeoffs associated with conveniences and competitive


advantages that IT offers;

3.

State the impacts of constant connectivity and distractions on quality of


life, business, safety and interpersonal relationships; and

4.

Discuss the key trends and forecasts for IT.

Topic Overview
This topic highlights the role of IT and users in reducing carbon emission and
hence global warming, which can potentially harm the planet, through green
business practices and data centre design that conserve natural resources.
IT solutions for data access, tracking, monitoring and profiling can have
ethical implications if these applications violate privacy and do not follow
standard operation procedures. Green computing is the study and practice of
eco-friendly computing resources that concern businesses in all industries
and organisations. Social media monitoring may be considered an integral
component of social media strategies because it enables marketers to
discover public conversation about their brands. Globalisation, the Internet
and connectivity have the potential to undermine moral responsibility
because it becomes relatively easy to ignore the harm that might be done to
others. ITs capability to accumulate ever-growing amounts of data into our
lives can exceed our capacity to keep up with the data, leading to information
overload. Business users are more likely to suffer from too much data than
from data scarcity. Finding the information they need in massive collections
of documents can be complicated, time consuming, frustrating and
expensive.

76

STUDY GUIDE

BMIT5103

Information Technology for Managers

Focus Areas and Assigned Readings


Focus Areas

Assigned Readings
Turban, E., & Volonino, L. (2012).
Information technology for
management,International student
version. Asia: John Wiley.

14.1
14.2
14.3
14.4

ITs Role in Reducing the


Global Carbon Footprint
IT Ethical Issues and
Responsibility
Connectivity Overload and
Culture of Distraction
Future of IT in Business

Chapter 14, pp 419426.


Chapter 14, pp 426429.
Chapter 14, pp 429431.
Chapter 14, pp 431433.
Extra Readings
Internet World Stats
internetworldstats.com/stats.htm
Green IT greenit.net/
Nicholas Institute for Environmental
Policy Solutions at Duke University
nicholas.duke.edu/institute/about.ht
ml
SMART 2020, low carbon economy
in the information age
smart2020.org/
Internet statistics, trends, and
demographics isoc.org/internet/stats/
Green Student U
greenstudentu.com/
National Research Council
americasclimatechoices.org/
Green Power for Mobile (GPM) of
the GSMA gsmworld.com/ourwork/mobile_planet/green_power_fo
r_mobile/index.htm
3D view of mobile Green Power
deployments
wirelessintelligence.com/greenpower/
Google Earth plug-in
earth.google.com/plugin/
ENERGY STAR ratings
energystar.gov/

77

STUDY GUIDE

BMIT5103

Information Technology for Managers

Information Commissioners Office,


U.K. ico.gov.uk/
Stop Climate Change, European
Free Alliance
stopclimatechange.net/
US Global Change Research
Program globalchange.gov/

Content Summary
14.1

ITs Role in Reducing the Global Carbon Footprint


x

IT at Work 14.1 South Africa Use of Biofuels Cuts Energy and


Creates Local Employment.

IT at Work 14.2 Green IT Myths.

Global E-sustainability initiative and the Smart 2020 report.

Towards a low carbon economy in the information age.

Green IT and mobile solutions in developed and developing


nations.

Worldwide telecom industry can lead the low carbon revolution.

Financial benefits of reducing IT power consumption.

Virtualisation in data centres.

Global green regulations.

Telework and its benefits.

78

STUDY GUIDE

14.2

BMIT5103

Information Technology for Managers

IT Ethical Issues and Responsibilities


x

IT at Work 14.3 Kenneth Cole Faces Backlash for Insensitive


Tweet and Lack of Integrity.

Social media monitoring.

Urban planning with wireless sensor networks.

79

STUDY GUIDE

14.3

14.4

BMIT5103

Information Technology for Managers

Connectivity Overload and Culture of Distraction


x

Overloads and distractions.

Information quality.

Impacts on individuals.

Impacts of IT on structure, authority, power and job content.

Future of IT in Business
x

Seven IT trends that help define how organisations and the


business world are developing.

Study Questions
1.

Explain global warming and the greenhouse effect. How can users and
organisations reduce their carbon footprints?

2.

What is the role of virtualisation in green data centres?

3.

What are the benefits of telework?

4.

How can wireless sensors improve urban planning efforts?

5.

Distinguish between presence and location. Give an example of each.

6.

What are the consequences of connectivity or information overload?

7.

What is information quality? Name one law that requires companies to


ensure information quality.

8.

Describe major IT trends influencing organisations.

80

STUDY GUIDE

BMIT5103

Information Technology for Managers

Appendices
Appendix A: Learning Support
Seminars
There are 15 hours of face-to-face facilitation, in the form of FIVE seminars
of three hours each. You will be notified of the date, time and location of
these seminars, together with the name and e-mail address of your
facilitator, as soon as you are allocated a group.

Discussion and Participation


Besides the face-to-face seminars, you have the support of online
discussions in myVLE with your facilitator and coursemates. Your
contributions to online discussions will greatly enhance your understanding
of the course content, and help you do the assignment(s) and prepare for the
examination.

Feedback and Input from Facilitator


As you work on the activities and the assigned text(s), your facilitator will
provide assistance to you throughout the duration of the course. Should you
need assistance at any time, do not hesitate to contact your facilitator and
discuss your problems with him/her.
Bear in mind that communication is important for you to be able to get the
most out of this course. Therefore, you should, at all times, be in touch with
your facilitator, e-facilitator and coursemates, and be aware of all the
requirements for successful completion of the course.

Tan Sri Dr Abdullah Sanusi (TSDAS) Digital Library


For the purpose of referencing materials and doing library-based research,
OUM has a comprehensive digital library. For this course, you may use the
following databases: InfoTrac, ProQuest and EBSCO. From time to time,
materials from these databases will be assigned for additional reading and
activities.

81

STUDY GUIDE

BMIT5103

Information Technology for Managers

Appendix B: Study Tips


Time Commitments for Study
You should plan to spend about 12 hours of study time on each topic, which
includes doing all assigned readings and activities. You must also set aside
time to discuss work online. It is often more effective to distribute the study
hours over a number of days rather than spend a whole day studying one
topic.

Study Strategy
The following is a proposed strategy for working through the course. If you
have difficulty following this strategy, discuss your problems with your
facilitator either through the online forum or during the seminars.
(i)

The most important step is to read the contents of this Study Guide
thoroughly.

(ii)

Organise a study schedule (as recommended in Table 2). Take note of


the amount of time you spend on each topic as well as the dates for
submission of assignment(s), seminars and examination.

(iii)

Once you have created a study schedule, make every effort to stick to
it. One reason learners are unable to cope with postgraduate courses
is that they procrastinate and delay completing their course work.

(iv)

You are encouraged to do the following:


x

Read the Study Guide carefully and look through the list of topics
covered. Try to examine each topic in relation to other topics.

Complete all assigned readings and go through as many


supplementary texts as possible to get a broader understanding of
the course content.

Go through all the activities and study questions to better


understand the various concepts and facts presented in a topic.

Draw ideas from a large number of readings as you work on the


assignments. Work regularly on the assignments as the semester
progresses so that you are able to systematically produce a
commendable paper.

82

STUDY GUIDE

BMIT5103

Information Technology for Managers

(v)

When you have completed a topic, review the Learning Outcomes for
the topic to confirm that you have achieved them and are able to do
what is required.

(vi)

After completing all topics, review the Learning Outcomes of the course
to see if you have achieved them.

83

You might also like