
Week 9
1
Wireless devices such as pagers, cellular telephones, organizers etc) are convenient and productive technologies that enable users to connect and access web-based information and services. They are highly applicable to business as they enable users to use their time more effectively; for example when travelling via public transportation they can spend time doing work via their mobile making calls or on the Internet.
2
Wireless transmission media/technologies include:
- Microwave: mainly used for high-volume, long-distance, line-of-sight communication. They must have an unobstructed line of sight and can be susceptible to environmental interference.
- Satellite: include three types of satellites: geostationary, medium earth orbit and low earth orbit. They normally have a high bandwidth and large coverage area. Generally, satellites can be expensive and similarly, must have unobstructed lines of sight.
- Infrared: is the red light that is not commonly visible to human eyes. It has a low to medium bandwidth and normally is used only for short distances. Similarly to the above, infrared must have an unobstructed line of sight.
3
Bluetooth is used normally as an application device for wireless handsets such as cell phones and portable music players.
5
The main drivers of mobile computing is its’ mobility and broad reach. It is mobile in the fact that users can carry a mobile device with them and initiate real-time contact with other systems from different locations. The development of mobile computing has therefore allowed businesses and individuals to engage in mobile commerce.
6
Business problems such as financial services can be solved through wireless electronic payment systems where individuals can pay for bills, products and services online. Overall, mobile technologies such mobile phones and laptops have all helped close the communication gap between businesses and their customers and suppliers.
7
Radio Frequency Identification technology (RFID) generally allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals. RFID was mainly designed to replace barcodes and to deplete the limitations barcodes posses e.g. barcodes require line of sight to the scanning device.
8
1) A rouge access point: the unauthorised access point to a wireless network.
2) War driving: the act of locating WLAN’s while driving around a city or elsewhere.
3) Eavesdropping: unauthorized access to data when traveling over wireless networks.
4) Radio frequency jamming: where a person or device intentionally or unintentionally interferes with your wireless network transmissions.
Week 10
8.1
A transactional processing is whereby data worthy of being generated is captured and stored. They are systems that monitor, collect, store, and process the above data generated from all business transactions. The key objectives are to ensure efficiency, avoid errors and downtime, record results accurately and securely, and maintain privacy and security.
8.2.1
A functional area information systems provides information mainly to lower-and-middle level managers in the functional areas. One of its’ major characteristics are its’ routine reports which range from hourly quality control reports to daily reports on absenteeism rates.
8.2.2
Functional area information systems (FAIS) support management by exception through the characteristic of exception reports which reports include only information that falls outside certain threshold standards.
8.3.1
ERP are systems, which integrate the planning, management, and use of all of an organisation’s resources. Main aim is to integrate the functional areas of the organisation and to enable information to flow seamlessly across the functional areas.
8.3.2
- They can be extremely complex
- Expensive
- Time consuming to implement
- Companies must purchase the entire software package even if they require only a few of the modules.
8.5.1
A supply chain refers to the ‘flow of materials, information, money and services from raw material suppliers, through factories and warehouses to the end customers’. The supply chain management (SCM) also reduce uncertainty and risks by decreasing inventory levels and cycle time by improving business processes and customer service.
8.5.2
The supply chain involves 3 major segments which include
1) Upstream- whereby sourcing from external suppliers occur
2) Internal- here, packaging, assemble or manufacturing take place.
3) Downstream- distribution frequently by external distributors occurs.
8.5.3
Customer demand variables can become magnified when they are viewed through the eyes of managers at each link in the supply chain. The bullwhip effect is where erratic shifts in orders up and down the supply chain take place.
8.5.4
1) Using inventories: whereby building inventories creates insurance against supply chain uncertainties
2) Information sharing: this allows to monitoring of inventory levels whereby information sharing allows the transmission of data through electronic data interchange and extranets.
8.6
Electronic data Interchange (EDI) enables business partners to exchange routine documents
Benefits of EDI include:
• It minimizes data entry errors as each entry is checked by the computer
• Also reduces cycle time, increases productivity, enhances customer service and minimizes paper usage and storage.
• The length of the message can be shorter, and the messages are secured.
Disadvantages of EDI:
• Traditional EDI system is inflexible.
• Requires a long startup period.
• It involves a significant amount of initial investment
• Operating costs are high due to the use of expensive, private VANs.
Week 11
9.1.1
The decision making process proposed by Simon involves the following four phases:
1) Intelligence: where managers examine a situation and identify and define the problem
2) Design: decision makers construct a model that simplifies the problem
3) Choice: involves selecting a solution, which is tested “on paper”
4) Implementation: is only successful if the proposed solution resolves the problem.
9.1.3
The decision matrix is composed of three broad categories and the nature of decisions can be combined in a decision support matrix that consists of nine cells.
9.2
Data mining performs two operations including predicting trends and behaviours and identifying previously unknown patterns. Data mining identifies business opportunities in a bid to create a sustainable competitive advantage.
9.3
A digital dashboard provides rapid access to timely information and direct access to management reports. Some of the capabilities associated with digital dashboards include:
- Drill-down: the ability to go to details, at several levels which can be done by a series of menus or by direct queries.
- Status access: the latest data available on KPI or some other metric, ideally in real time.
- Exception reporting: reports that highlight deviations larger than certain thresholds. Reports may include only deviations.
Week 12
Section 10.1.1
A major problems that companies face is to allocate fixed costs among different IT projects. Costs for maintaining, debugging, and improving the system can accumulate over many years.
10.1.2
- Benefits can be harder to quantify due to these benefits being in an intangible form.
- Due to the fact that organizations use IT for several different purposes complicating benefit analysis.
- As many systems in reality are not implemented on time or within budget constraints creating problems when obtaining a return from an IT investment.
- If the proposed system is ‘cutting edge’- there may be no previous evidence of what sort of financial payback the company can expect.
10.1.3
Net Present Value is used by organizations to aid cost-benefit analysis calculations. When it is implemented, analysts convert future values of benefits to their present-value equivalent by discounting them at the organisation’s cost of funds.
Return on Investment (ROI) measures management’s effectiveness in generating profits with its available assets.
10.5.1
The types of companies that provide outsourcing services are small or medium-sized companies with few IT staff and restricted budgets. Large companies may also choose to use outsourcing if for example; they might want to experiment with new IT technologies without making a substantial up-front investment.
10.5.2
Application service providers are agents or vendors who assemble the software needed by enterprises and packages the software with services such as development, operations and maintenance. Advantages include:
- Saves expenses such as labour costs in the initial development stage.
- Helps reduce the costs of software maintenance and upgrading and user training over the long run.
- The company can select another software product from the vendor to meet its changing needs.
- Makes the company more competitive be enhancing the company’s ability to adapt to changing market conditions.
10.5.3
Disadvantages include:
- ASPs might not offer adequate security protection
- Software might not be a perfect fit for the desired application.
- Company must make certain that the speed of the Internet connection between the customer and the ASP is adequate to handle the requirements of the application.
10.6.1
The major steps of selection of a vendor and a software package:
- Step 1: Identify Potential Vendors
- Step 2: Determine the evaluation criteria
- Step 3: Evaluate Vendors and Packages
- Step 4: Choose the Vendor and Package
- Step 5: Negotiate a contract
- Step 6: Establish a service level agreement.
10.6.2
A request for proposal is a document that is sent to potential vendors inviting them to submit a proposal that describes their software package and explains how it would meet the company’s needs. It provides the vendors with information about the objectives and requirements of the system.
10.6.3
Service Level agreements are formal agreements that specify how work is to be divided between the company and its vendors.