Tuesday, November 15, 2016

ITGS Case Study Activity

Read the ITGS Case Study posted in the link below;

https://ekrisnawan.wikispaces.com/file/view/Case%20Study%202013.pdf/386374376/Case%20Study%202013.pdf

Using the case study above and your further extended research on the Taxi systems, answer the following questions individually and posted your work in managebac;


  1. Describe TWO main social and ethical issues that can arise from using behavioral marketing software by the Red Dragon Taxi Company. (4 mks)
  2. Explain TWO situations where Business intelligence software can be used by the Taxi Company. (6 mks)
Surveillance

3. "The management of Red Dragon Taxi Company has announced that CCTV equipment will be installed to monitor the activities in the taxi in the interests of driver and customer safety. GPS and GPRS will also provide the location of the vehicles. However, this raises concerns from the drivers about employee monitoring. Different monitoring systems are being investigated. "


The extract above is from line 116

 a) Red Dragon company may be considering to move to 4G technology instead of GPRS. What is the impact of this move to the Company? (6 mks)


 b) "Different monitoring systems are being investigated".  Give evidence from research of measures that can be put in place to address the concerns of drivers in having monitoring technologies in the taxis. (10 mks)


4. UBER is a world wide transportation system; Evaluate the impact of using UBER to the different stakeholders. (Support with real evidence from research) (10 mks) 
         

    Monday, November 14, 2016

    Network Administration

    Write short notes on network administration related terms below and post them on your OneNote page

    Electronic security:
    for example, authorized access, levels of access, biometrics with examples, login, password, firewalls, proxy server, encryption, secure socket layer (SSL), audit trails and others

    http://www.itmanagerdaily.com/network-security-fundamentals/

    http://www.computernetworkingnotes.com/ccna-study-guide/network-security-threat-and-solutions.html

    Network Licences:
    single-user, multi-user, concurrent, network, site

    Physical security:
    for example, locks, safes and others http://www.techrepublic.com/blog/10-things/10-physical-security-measures-every-organization-should-take/

    Monitoring:
    for example, keystroke monitoring, system performance, surveillance
    check others methods in  http://www.techrepublic.com/blog/10-things/10-ways-to-monitor-what-your-users-are-doing-with-company-computers/

    Network policies:
    -Give an example of what the policy can say and why that is important.
    for example, backup, archiving, disaster recovery, usage, redundancy, failover

    Codes of ethics and professional conduct:
    for example, ACM (Association for Computing Machinery)

    Data centres
    • What are they?
    • Name some examples
    • Why are they important?

    Energy usage in managing computer networks
    - uninterruptable power supply (UPS) how effective are they?
    - Do we have other sources of energy used to support computer networks?
    - What solutions have been put in place to address Energy concerns resulting from using computer networks?


    Network Administration

    Write short notes on network administration related terms below and post them on your OneNote page

    Electronic security:
    for example, authorized access, levels of access, biometrics with examples, login, password, firewalls, proxy server, encryption, secure socket layer (SSL), audit trails and others

    http://www.itmanagerdaily.com/network-security-fundamentals/

    http://www.computernetworkingnotes.com/ccna-study-guide/network-security-threat-and-solutions.html

    Network Licences:
    single-user, multi-user, concurrent, network, site

    Physical security:
    for example, locks, safes and others http://www.techrepublic.com/blog/10-things/10-physical-security-measures-every-organization-should-take/

    Monitoring:
    for example, keystroke monitoring, system performance, surveillance
    check others methods in  http://www.techrepublic.com/blog/10-things/10-ways-to-monitor-what-your-users-are-doing-with-company-computers/

    Network policies:
    -Give an example of what the policy can say and why that is important.
    for example, backup, archiving, disaster recovery, usage, redundancy, failover

    Codes of ethics and professional conduct:
    for example, ACM (Association for Computing Machinery)

    Data centres
    • What are they?
    • Name some examples
    • Why are they important?

    Energy usage in managing computer networks
    - uninterruptable power supply (UPS) how effective are they?
    - Do we have other sources of energy used to support computer networks?
    - What solutions have been put in place to address Energy concerns resulting from using computer networks?


    Wednesday, November 9, 2016

    Business And Employment: Online Security

    Read the article and prepare to present briefly what you have been assigned. Posting on OneNote is an optional activity

    Saumya:
    Describe briefly the 6 fraud risks for small businesses
    http://programs.online.utica.edu/articles/TopSixFraudRisksforSmallBusinesses

    Sahir:
    Describe briefly the 7 e-commerce frauds
    http://www.information-age.com/seven-types-e-commerce-fraud-explained-123461276/

    Shad
    List the different online frauds and suggest the different measures to prevent on from online fraud.
    http://www.techradar.com/news/world-of-tech/roundup/the-small-business-guide-to-preventing-online-fraud-1101869

    Ali
    Describe 5 business related scams from the list in the website and suggest how one can protect themselves from the scam
    http://www.actionfraud.police.uk/fraud-az-online-fraud

    Wayne
    Explain the crime committed in article below. Explain in detail how credit card skimmers are used to commit crime.
    http://www.theoaklandpress.com/general-news/20161107/feds-charge-foreign-nationals-in-alleged-credit-card-skimming-scheme

    Hezi
    Describe how each of the 5 examples 5 scams was executed.
    http://www.makeuseof.com/tag/top-5-internet-fraud-scams-time/

    Samy
    Explain the different Frauds identified in the article
    https://www.entrepreneur.com/article/227689

    Tanzil
    Why do hackers target small businesses? What are types of cyber-attacks? what are the Security solutions and and best practices for your business
    http://www.businessnewsdaily.com/8231-small-business-cybersecurity-guide.html

    Amaar
    Explain the 6 different business security risks and how you can protect your self from them
    http://www.cio.com/article/2872517/data-breach/6-biggest-business-security-risks-and-how-you-can-fight-back.html?page=2

    Wednesday, November 2, 2016

    Business and Employment: Online Businesses

    Watch the videos in the YouTube links below;

    https://www.youtube.com/watch?v=NdXf6f22N4g

    https://www.youtube.com/watch?v=RaH1jc3zBM0


    A friend has approached you to start an online business;

    a) Study ONE example of an online business ensuring that the following is captured;


    • What is the name of the online business?
    • What are the different technologies used by the online business?
    • Describe in detail how the business functions / operates online
    • What are the common issues/ethical concerns associated with the online business?
    • What are some of the solutions put in place to address the concerns / problems?
    b) As for your friend
    • What online business would you recommend? and why?
    • Describe the IT technologies that will be used in the recommended online business?
    • Describe in detail how the online business will function/operate?
    • Provide a detail account of the expected challenges/ concerns/ problems in running the proposed online business.
    • For each concern suggest some of the solution to address them.
    Further Reading

     ATM, EFT, Online Banking Fraud Cases

    Read the news article below
    ATM frauds
    http://www.northeastfraudforum.co.uk/atmfraud
    http://www.bankersonline.com/security/gm_atm_skimming.html

    ATM Crime & Fraud Information
    https://www.european-atm-security.eu/ATM%20Crime%20/

    EFT POS Hacker Net $50 Million
    http://www.bloggernews.net/123778

    Steps for Preventing EFT problems
    http://www.isaca.org/Journal/Past-Issues/2003/Volume-4/Pages/Preventing-EFT-Fraud.aspx

    Other news
    http://www.atmsecurity.com/

    http://www.asiaone.com/News/Latest%2BNews/Singapore/Story/A1Story20120111-321215.html

    http://www.bdo.co.za/resources/showitemarticle.asp?ResourceSectionId=4&ResourceSectionName=Publications&ResourceId=11&ResourceName=News%20and%20Views&IssueId=44&ContentPageID=&Archive=&articleid=52