Reference no: EM133766416 , Length: word count:3500
Leveraging IT for Business Advantage
Purpose of the assessment
LO 1: Critically evaluate how technology can enable an organisation's core business processes and support the strategic goals.
LO 2: Analyse and comprehend the issues that arise with the acquisition and adoption of technology and recommend possible solutions.
LO 3: Critically evaluate the ways in which information technology can contribute to organisational innovation, efficiency and overall corporate performance.
Objectives: This assessment item relates to the unit learning outcomes as in the Unit of Study Guide. This assessment is designed to enhance students' skills on critically analyzing and evaluating key issues and challenges in recent IS technologies and how they can be acquired and contribute to business core processes. The assessment helps develop presentation and problem-solving skills.
Instruction: For this assignment students will be divided into small groups (the size will depend on class size), and each group will select a specific technology/ topic to research.
The research topic you select must be directly relevant to IT in Business. A list of possible topics is provided in the attachment (for reference purposes only).
Instructions For this assignment students will be divided into small groups (the size will depend on class size), and each group will select a specific technology/ topic to research.
The research topic you select must be directly relevant to IT in Business. A list of possible topics is provided in the attachment (for reference purposes only).
A set of research groups have been created in the Blackboard. Students are required to join a research group on their campus by Week 5. Group members must only be from the same campus, same mode, and same unit code. Each group can have maximum 4 members.
Group Presentation (20 minutes)
Each group will be required to prepare a presentation on the selected research topic. The video presentation must be in Microsoft PowerPoint only. No other file formats are accepted. Both "presentation slide" and "the face of presenter" should be in the recorded video. Each group should prepare a cohesive presentation that succinctly summarizes the studies related to the selected research topic. Each member should present the part of the work they are most involved with, ensuring a balanced distribution of speaking time.
NOTE: Blackboard has a file size limit of 3Mb. If your presentation is larger than 3Mb, upload your presentation to Youtube and submit a Word document with the hyperlink to Blackboard.
Group Case Study Report (2500 words)
Each group will then be required to research a real-life company and write a case study report. The case study must be directly relevant to the selected research topic.
From a broad perspective, a case study is an in-depth analysis of a particular subject. Generally, the study covers a problem-solution-results format. When applied to this unit, a case study examines how a real-life company had a problem, found a solution using a particular information technology, and shares the results of the solution.
The following eight elements must be included in your case study report:
Executive Summary/Synopsis
Introduction
introduce the selected company, including the background and any previous studies of the issue (literature review); briefly describe the key problem and its significance
Challenges
explain the challenge the selected company faced before using the presented technology;
Discussion
discuss how the selected company found the presented technology;
discuss the selected company's decision process and the steps they
went through before discovering the solution
Implementation
explain how the solution was implemented; discuss if the implementation meets the expectations, and who was involved in the implementation process
Conclusion
conclude your case study with the end results; sum up the main points from the challenges, discussion and recommendations
Recommendations
provide proposals for future action to solve the problem or improve the situation
References.
List of Research topics
Research topics sourced from Lecture 2
Application of digital business models by:
Financial institutions
On-line retail business • Government agencies for business advantage
How businesses can leverage disruptive technologies for competitive advantage. Choose a particular business field.
Social media as a driving force for democratisation and how business can take advantage of it for competitive advantage.
Use of social media for collaboration, marketing, management, human resources, productivity. Focus on a business field or industry.
Social media features that businesses can leverage to their advantage. Focus on a business field or industry.
Ways in which a business can leverage online communities for competitive advantage. Focus on a business field or industry.
What is the network effect, and how can a business leverage network effect for competitive advantage? Focus on a business field or industry.
Ways in which a business can leverage enterprise mashup technology for competitive advantage. Focus on a business field or industry.
Ways in which a business can use social monitoring services to improve its competitive advantage. Focus on a business field or industry.
Research topics sourced from Lecture 3
Research the advantages that cloud computing technology has over the traditional infrastructure model.
Explain the three main cloud delivery models. Select one model and research how a particular business can leverage it for business advantage.
Explain the four main cloud deployment model. Select one deployment model and research how a particular business or industry can leverage it for business advantage.
Select a business that uses cloud computing technologies and research some of the main issues and challenges it faces such as cloud computing security and Ethical issues arising from the use of cloud computing.
Research topics sourced from Lecture 4
Research the main advantages that enterprise systems have over traditional types of information systems.
Select a business type or category and research how it can leverage supply chain management system for business advantage.
Select a business type or category and research how it can leverage a customer relationship management system for business advantage.
Select a business type or category and research how it can leverage an enterprise resource planning system for business advantage.
Research topics sourced from Lecture 5
Select a business in the retail industry. Research how retail industry drives e-commerce in the chosen business in terms of how it conducts business-to-business, business- toconsumer and business-to-employee transactions.
Select an online retail business. Research its sell-side and buy-side ecommerce transaction activities and how it leverages various ecommerce technologies for competitive advantage.
Select a small to medium size business. Research how it overcomes its e-commerce challenges of cyber security, competition, order-fulfillment, customer experience, website development and visibility and so on.
Select a business that utilises e-commerce. Research how it is leveraging mobilecommerce (M-Commerce) to enhance its e-commerce activities and become more competitive.
Social commerce refers to e-commerce transactions delivered via social media. Select a business that utilises e-commerce and research ways in which social commerce is enhancing its e-commerce activities and making it more competitive.
Select a business that uses e-commerce and social commerce. Research some of the security threats and challenges it faces and how it overcomes them.
Research topics sourced from Lecture 6
Select a government that you are familiar with. Research the types of cyber threats and attacks it has encountered, the consequences of those threats and attacks, the sources of those and the subsequent cybersecurity measures it took to overcome them.
Select a health care system that you are familiar with. Research the types of cyber threats and attacks it has encountered, the consequences of those threats and attacks, the sources of those and the subsequent cybersecurity measures it took to overcome them.
Select an education system that you are familiar with. Research the types of cyber threats and attacks it has encountered, the consequences of those threats and attacks, the sources of those and the subsequent cybersecurity measures it took to overcome them.
Research a number of organisations that have experienced cyberattacks. Identify the type according to whether it is one of the following crimeware (Spyware, adware, malware or ransomware) and identify the attack vectors (the weak points in the system that allowed the attack to occur.)
Cyberattacks can be carried out against critical infrastructure such as government facilities, emergency services, water and wastewater, transportation, health care services etc. Research a government you are familiar with and study how such cyberattacks had a negative impact on national security, economic security, health care security and so on.