Friday, 22 March 2013

Week 3 - Security and Privacy

Question 1 -
See if you can find an example of a privacy breach that was reported in the Australian or international news in the last 6 months. What were the Consequences? i.e. legal, political, financial, personal, etc. What action was taken in response to the privacy breach?

In October 2013 an Australian Post computer glitch exposed the names of thousands of Australians that have been sent parcels. A customer found that when entering a random number into the online parcel tracking system they were given details of thousands of customers. The consequences were personal as it was customers’ personal information that was exposed. Australia post was forced to shut down its electronic tracking service temporarily due to the bungle.



http://www.heraldsun.com.au/news/national/australia-post-in-online-privacy-breach/story-fndo45r1-1226498834454

Question 2 (Exercise) Most Ambient Intelligence (AmI) scenarios illustrate its benefits. The dark scenarios, developed by the SWAMI (Safeguards in a World of Ambient Intelligence) project, are different as they point out the risks that must be mediated if AMI is to be a future success story. The scenario we present here hinges on the theft of data from a multinational company. The company suffers from the illusion of security—that is, the belief it has implemented more than adequate security measures— only to discover it has not. Consider the following case (below) then - Complete a comprehensive analysis of the facts and issues in the case. Some questions to consider -

What AmI technologies are identified in the case?

Legislation constraints are irrelevant as the have merged with other companies to access the information. Information from thousands of individuals is collected then sold back to them.

What drives DMC’s officers to take the actions they took?

Possible financial loss is what drove the DMC officers to take the action they did to find these employees. The theft of the information had the capability of ruining the reputation of DMC, resulting in extreme financial loss. DMC is the clear market leader in the aggregation of AmI data.

Are there any comparisons you can make to technology companies today?

I tried searching Aml data mining however I could not find much information. DMC is clearly a driving force in this industry, but due to the increased use of digital technology I believe that there would be many data mining companies around.

How realistic is the description of governments using the technology and prohibiting immigration from states with no AmI data aggregation information?

 I don’t believe that it is realistic to prohibit immigration from states without Aml; however I do understand that it would be a very useful tool while processing immigrants as it would allow you access to more personal information.



What would be the impact of this digital divide?

 Digital divide refers to the gap or imbalance that exists between those who have access to Information and Communications Technology and also to the unequal access of resources. The digital divide can exist between those living in rural areas and those living in urban areas, between the educated and uneducated, between economic classes, and on a global scale between more and less industrially developed nations.

This digital divide will ruin the reputation on DMC and have devastating effects on their stance in the stock market.

http://www.caricomict4d.org/ict-for-development-topics-mainmenu-132/digital-divide-mainmenu-175/69-definition-of-digital-divide.html

List some of the ‘unintended consequences’ described in the case.

The company is forced to make improvements in their security system.

The publicity of the event made the general public aware of Aml.

Do members of the class all agree on the issues raised by this case? What were the main points of difference (if any) in discussions?

The DMC officers looked into the personal information of the three employees involved in the theft of the data. They tried to track them through personal tracking devices and watched their houses for movement, as well as look through large amounts of security footage to try and find them.

I personally disagree with the action that the DMC officers took, the theft of the data was a security risk not only to the company but also to the general public, and I therefore believe that DMC should have contacted the authorities as soon as they were made aware of the security breach

Friday, 15 March 2013

Week 2 - Navigating the Web


Part 1 – Navigation – One of the biggest challenges for businesses and customers alike is navigating the Internet. This week please answer the following questions on your blog -1) listen to the podcast on Navigation which can be found on the Digital Enterprise Page (Google – the digital enterprise).

a) What are the four (4) main points Michael Rappa makes about search? Please write them on your blog page.

·       The amount of data that is being generated daily is growing rapidly; this is presenting not only new opportunities but also new problems. Many data files are being added daily and are rarely removed for anything other than business purposes.

·       It is becoming more and more common for businesses to advertise through search engines, due to the vast use of digital technology this is a vital way for them to be seen.

·       Due to the huge amount of data on the internet searches return many results. Search engines are constantly assessed to allow searching to be more users friendly.

·       Picking and choosing the right key language is very important for both searching for web pages and for a web page to be found.

b) Watch or read the Marissa Mayer interview. Marissa says ‘search is in its infancy’. Do you agree or disagree with this statement? What is your personal experience with search? There are no right or wrong answers here, I just want your opinion.

I agree with Marissa’s statement ‘search is in its infancy’, technology is progressing rapidly and this will only create more and more opportunities to advance the way that we currently search the internet. I believed that the increased use of portable digital technology, such as smart phones and tablets will play a major role in this advance.

 

Part 2 – History of the internet

2) Please watch the Bill Joy video, and it will give you a good background to the Internet and particularly to the emergence of the World Wide Web.

From the video – answer (on your blog page) -

a)   So what are the 6 webs?

1. The near web: Internet you see

2. The here web: Internet that’s always with you e.g. via mobile phone

3. The far web: Internet you see when you sit back from a big screen e.g. TV, kiosk

4. The weird web: Internet you access with your voice. E.g. Request in our car, your phone, camera etc. He questions whether it fully exists yet.

5. B2B: Internet that doesn’t possess a consumer interface. Business machines talk to other business machines.

6. D2D: Internet of sensors deployed in meshes networks, adjusting urban systems for maximum efficiency. Also may not fully exist.

 


b)   Could there be more?

As stated by Marissa Mayer ‘search is in its infancy’ I believe this statement to be true also about the web in general. I believe that constant advancing in the internet will lead to many new opportunities and this may result in the ‘6 webs’ becoming the ‘7 webs’ or possibly more.

c)   What does it mean for business?

The use of search engines is of great benefit to many businesses as it allows them to be more easily found, however for retail businesses such as clothing stores, electronic stores, etc. it may result in increased competition from other local stores as well as online stores.

 

 

Friday, 8 March 2013

PENA

Question - Part B PENA

9. My experience completing the PENA quiz was positive, the questions were straight to the point and well worded.

10. I beleive the PENA quiz was presented really well, my only comment would be to modernize the appearance slightly as it looked quite dated.

Tuesday, 5 March 2013

Week 1 - Intorduction to eBusiness


Questions Part A

1. Internet risks – give examples of four things that can go wrong with a transactional site?

There can be many risk involved when it comes to using transactional websites, these risks include:

·       You may buy an item from a website but the item may never arrive, this may be due to the website being fraudulent.

·       A transactional site may be untrustworthy and as a result misuse your credit card details or allow access for others to misuse your credit card details.

·       The transactional website you’re using may be trustworthy; however it may not be secure, allowing others to gain access to your transaction details.

·       The website may be unreliable. This could result in slow postage, damaged products or difficulties obtaining a refund or exchange where necessary.

 

2) Write down a definition for each:

a) E-commerce: E-commerce occurs when a customer purchases a product electronically rather than just face to face cash in hand. Without E-business you wouldn't have E-commerce because you need a business and products to be able to sell products electronically.


b) E-business: E-business is when a company or person advertises their business electronically and allows users to get details of their business from the comfort of their home or in some cases browse for items online.


3) What is the difference between buy side and sell side ecommerce?

 

Buy-side e-commerce refers to transactions to buy/procure resources needed by a business from its suppliers and the difference is that sell-side e-commerce is the transactions that are involved with selling products to businesses customers


4) Describe the different types of eBusiness

·        B2B (Business to Business): A transaction that occurs between two companies, as opposed to a transaction involving a consumer. The term may also describe a company that provides goods or services for another company.

·        B2C (Business to Consumer): A transaction that occurs between a company and a consumer. The term may also describe a company that provides goods or services for consumers.

·        B2G (Business to Government): Feedback to government businesses and NGO's.

·        C2B (Consumer to Business): Means through which consumers decide what they want to pay, and the vendors decide whether or not to accept.

·        C2C (Consumer to Consumer): Means through which consumers interact with other consumers through, for example, online auctions.

·        C2G (Consumer to Government): Feedback to government through pressure group or individual sites.

·        G2B (Government to Business): Refers to a government agency communicating with or purchasing products or services from a business.

·        G2C (Government to Consumer): The communication link between a government and private individuals or residents.

·        G2G (Government to Government): is the electronic sharing of data and/or information systems between government agencies, departments or organizations. The goal of G2G is to support e-government initiatives by improving communication, data access and data sharing. http://watsmynameuh.blogspot.com.au/2011/03/topic-1-questions-introduction-to-e.html

 

5) Which digital technology has the highest penetration rate? Explain and source your answer.

The number of mainstream technologies that are affordable and accessible is increasing, helping people to access information on the internet not just in their homes but in any location through portable devices. I believe that smart phones would have the highest penetration rate when it comes to digital technology, as they are so readily available and due to advancing technology they are becoming more affordable. They are also reasonable easy to use and they allow you access to an abundance of resources.


 

6) List::Four drivers to adoption of sell-side e-commerce by business.

Sell side e-commerce refers to transactions between a supplier and its customers. Drivers of the adoption of sell-side e-commerce by businesses include;

·       New sales leads including the introduction to new markets and new customers, and repeat selling and cross selling to existing customers.

·       Reduced marketing costs by spending less time in face-to-face customer service, completing sales online, and completing marketing online (meaning that printing and distribution costs diminish).

·       Decreased supply change costs due to reduced levels of inventory, increased competition from suppliers and shorter cycle time in ordering.

·       Administrative cost reductions from more efficient routine business processes such as recruitment, invoice payment and holiday authorization.


7) Four barriers to adoption of sell-side e-commerce by business.

·        Identification of products or services can be tricky due to poor quality content which includes descriptions and images as well as poor searching capabilities.

·        Cultural barriers which includes internet accessibility and language barriers.

·        Customers fear of change. Some customer would be more inclined to use the internet as a way to purchase goods and services as opposed to others. Therefore the customer base could be reduced by the adoption of sell side E-Commerce however this could depend on the target market.

·        Lack of technical competency. The customer might not have technical knowledge or understanding to use the online store


 

8) What are some examples of Digital information?

Digital information is anything the portrays information in a digital format such as:

·       Photos

·       Music

·       Video        

 

 

 

 

About Me

Hi I'm Jacqui and I'm from Horsham, Victoria.

I'm currently studying a Bachelor of Business (Marketing) at The University of Ballarat. I also work part time at Kevin Paisley Fashion Eyewear as an Optical Dispenser and Technician.

In the future I hope to work in advertising.

My hobbies include Cooking, Martial Arts, socializing and shopping.

I developed this blog for a class I am in called eBusiness Fundamentals and majority of my posts will be for the pupose of this class.