Wednesday, December 9, 2009

What have we learnt from Managment information Systems course

What have we learnt from Introduction to Management Information Systems?

This course is an introduction to information systems and information technology for students who are or who will soon become business professionals in the fast changing business world of today. We have been given an opportunity to learn how to use and manage information technologies to revitalize business processes, improve business decision making, and gain competitive advantage. There is a major emphasis on the essential role of Internet technologies in providing a platform for business, commerce, and collaboration processes among all business stakeholders in today’s networked enterprises and global markets. There is also an emphasis on ethical and security issues and challenges.

On completion of this course, we have achieved following objectives:



 I have gone through detailed information, and analyzed how the business applications of information systems and information technologies can support a firm’s business processes, managerial decision making, and strategies fro competitive advantage. 

 I have identifiied  the components, resources, and activities of an information system. This would include hardware, software, data, network, and people resources; as well as input, processing, output, storage, feedback and control components and activities. I am able to identify trends (past, present, and future) regarding components, resources, and activities.

 I have Identified cross-functional enterprise systems, and been given examples of how they can provide significant business value to a company. This includes examples of how Internet and other information technologies support business processes within the functional areas of business (accounting, finance, human resource management, marketing, and production and operations management). Detail information about SAP.

 I have learnt the major categories and trends of e-commerce applications. Compare and contrast e-commerce sites .Use the systems development life cycle as a problem-solving framework to help propose information systems solutions to simple business problems. This would include describing evaluation factors in the acquisition of hardware, software, and IS services, and identifying change management solutions for end user resistance.

 I have been provided details about several ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy, crime, health, and solutions to societal problems.

 I have Identified several types of security management strategies and defenses, and have been explained how they can be used to ensure the security of business applications of information technology.

 I have Identified several cultural, political, and geoeconomic challenges that confront managers in the management of global information technologies. This was included explaining the effect on global business/IT strategy by international business organizations.

Tuesday, December 8, 2009

Social Networking and Business:

Social Networking sites were initially embraced by today’s youth and grew and continue to grow at exceptional rates. However, businesses, educators and other organizations are realizing that social networking sites are a means to interact, market and connect with others in real time. While traditional media remains popular, online social media may move to the forefront as the trend continues to grow and various methods are used to cultivate this phenomenon. For example, Twitter is used by some as a means to connect with colleagues and vendors while attending conferences. Facebook is used by many to market themselves or by companies marketing their particular products. As much as social networking is enabling businesses and individuals, so are social networking sites causing new ethical dilemmas. For example, companies need to be concerned that employees using social networking sites during work or from the office are not interfering with or revealing company business. As social networking sites continue to gain popularity among all ages, the way in which they are utilize also will continue to change and expand. Businesses are now considering the potential benefits of participating in on line discussion groups and how to incorporate social networks into their business strategy. As Facebook and MySpace turned into social sites that are now appearing attractive to all age groups globally, businesses can evaluate and be creative as to how online social tools can enhance their organization (Barlas, (2009). Various types of social networking sites will remain popular while others will fade out. However, the concept of individuals or groups communicating, people searching for former friends and colleagues and the ability to meet others and attract attention online anywhere in the world is a phenomenon that is here to stay.


Social Networking Sites in the Business Environment

While there are many popular social networking sites, there are handfuls that appear to be the most popular. The top three sites are MySpace, Facebook and YouTube (Barlas, 2009). Currently Twitter a microblogging site seems to be the latest craze among social network fanatics. Linkedin is another popular site, especially among professionals who are looking to network with others in the same field. Wikipedia is popular as it allows users to create the content on the site. The power of social networking should not be ignored by businesses. Some of the advantages are in the advertising and marketing, linking businesses or business units, job searches and recruiting, and the ability to cultivate new ideas (Barlas, 2009). One of the most potential benefits is the ability to network with others outside of your company and find information or solutions prevalent to your company or product. However, there are several challenges that social networking sites present to organizations. For example, social sites open up the opportunity for competitors to promote a negative image of a company. Under this circumstance the ability to down play a negative image can be difficult and costly. Employers will also have the decision as to how they will monitor the activities of their employees on social networking sites during working hours. Finally there is the issue of copyright infringement as social networking sites seem to attract this type of behavior. (Barlas, 2009). Although there are potential benefits for companies who use social networking within their corporate environment, companies need to be aware of potential problems that may present themselves. Companies and educators are already using social networking to their advantage, while others are finding the cons of social networking. Twitter is popular now and appears to be gaining popular in the business and education sector.

Social Networking Sites to Boost Business

Social media marketing is a fast-growing innovation, tapping into the rising influence of user-generated communities such as blogs, wikis, networking, and bookmarking sites.

By joining these active communities, you can build relationships and promote your products and/or expertise.
Generally, online social networks attract members who bond over shared interests and opinions. That creates a clubby and trusted group of virtually connected friends or associates. So when a member or blogger recommends your product, commends your service, or endorses your comments, it results in powerful "word of mouse" referrals.
Alternatively, if you make the effort, you can develop your own following on social media sites as an opinion-maker, authority, adviser, industry analyst, or wry observer.
As a result of getting noticed in all the right places, you can generate leads and convert those leads into sales.

Here are some proven ways to start stirring the pot.
1. Contribute to a community whose members mirror your customers. By checking into the comments, forums, and profiles of a community, you can determine member interests, locations, and a rough sense of demographics. Once you've identified a community that matches your preferred customer,

there are a number of ways to get noticed.

2. Become a commentator on a well-trafficked blog in your industry or field. Don't ignore the blogosphere.Get familiar with a few blogs compatible with your business. A good start is a search on Technorati as well as visits to your industry or professional associations and trade journals to see what they serve up. Make sure you're up-to-speed on the blog's tone, issues, and attitudes before you chime in. When you start generating reactions, you'll know you're hitting nerves.

3. Create a viral video campaign. Online videos are now cheap and easy to create and upload, notes search engine marketing consultant Susan Gilbert at JoomlaJump.com.
Produce a video of two to three minutes that dramatizes or explains your online site or your market niche and yourself. Then upload the video to MSN, YouTube, or other video communities to drive traffic to your Web site, Gilbert says.
If you link the videos to community pages on social bookmarking sites, you create a little network that search engines will find. Next thing you know, you're getting referred traffic and, potentially, more customers.

4. Join a professional networking site.
These can be hit or miss, depending on what you market and how you work the community. For professional services such as PR and consulting, it can generate leads. Check out examples such as LinkedIn, ZoomInfo, Facebook, and Biltmore Who's Who. Then branch out to others.

5. Launch a blog.
This is the most obvious idea, and, no question, online templates now make it easy to create a blog. Run a search and you'll find options. What's hard is to gain traction and keep posting lively content (with a link to your company site, of course). See these tips for starting a blog.

6. Become a dedicated gamer. Game for this? Depending on your wares and customer profile, engaging in the multi-user online gaming community can be a rewarding way to draw traffic and viral referrals, says Marian Sabety, at Wyndstorm, a social network technology marketer.
One of the largest is World of Warcraft, but new ones pop up frequently.
Unless you are already pulling lots of traffic, first gain experience with some of the above tactics before starting a blog. Once you have the hang of it, you'll know more about leveraging the power of a personal blog.
Finally, remember to add value rather than to merely advertise your product. To make social media marketing work, you must enjoy being part of the community.

Twitter email security issues

You might think your password protects the confidential information stored on Web sites. But as Twitter executives discovered, that is a dangerous assumption.


The Web was abuzz after it was revealed that a hacker had broken into the e-mail account of a Twitter employee and had exposed corporate information. The breach raised red flags for individuals as well as businesses about the passwords used to secure information they store on the Web.

On Web sites containing personal information like e-mail, financial data or documents, there is usually just a user name and password for protection. More individuals are storing information on Web servers, where it is accessible from any online computer through services offered by Google, Amazon and Microsoft; social networks like Facebook; and backup services like Mozy.

But password-protected sites are growing more vulnerable because, to keep up with the growing number of passwords, people use the same simple ones on numerous sites across the Web. In a study last year, Sophos, an Internet security company, found that 40 percent of Internet users use the same password for every Web site they access.

The attack on Twitter highlights the problem. For its internal documents, the company uses the business version of Google Apps, a service that Google offers to individuals free. Google Apps provides e-mail, word processing, spreadsheets and calendars via the Web.

The content is stored on Google's servers, which can save time and money and allow employees to work together on documents at the same time. But it also means that the security is only as good as the password. A hacker who breaks into one person's account can access information shared by friends, family members or colleagues, which is what happened at Twitter.

The Twitter breach occurred about a month ago, Twitter said. A hacker calling himself Hacker Croll broke into an administrative employee's e-mail account and gained access to the employee's Google Apps account, where Twitter shares spreadsheets and documents with business ideas and financial details, Biz Stone, a Twitter co- founder, said.

The hacker then sent documents about company plans and finances, confidential contracts and job applicants to two technology news blogs, TechCrunch, in Silicon Valley, and Korben, in France. This bring to bear another issue of these companies taken this "stolen" information and publishing it as news, but that is another issue.

There was also personal information about Twitter employees, including credit card numbers.

The hacker also broke into the e-mail account of the wife of Evan Williams, Twitter's chief executive, and from there accessed several of Mr. Williams' personal Internet accounts, including those at Amazon and PayPal, Mr. Stone said.

TechCrunch revealed documents showing that Twitter, a private company that so far has no revenue, projected it would reach a billion users and $1.54 billion in revenue by 2013. Michael Arrington, founder of TechCrunch, said during an interview that the hacker had also sent him detailed strategy documents about potential business models, and the competitive threat from Facebook.

Some analysts say the breach highlights how dangerous it can be for people and companies to store confidential documents on Web servers, or "in the cloud."

But Mr. Stone said the attack "isn't about any flaw in Web apps," but rather about a bigger issue that affects individuals and businesses alike. "It speaks to the importance of following good personal security guidelines like choosing strong passwords," he said.

Instead of circumventing security, it appears the Twitter hacker correctly answered personal questions that Gmail asks of users to reset the password.

"If you broadcast all your details about what your dog's name is and what your hometown is, it's not that hard to figure out a password," said Chris King, director of product marketing at Palo Alto Networks, which creates firewalls.

The Twitter hacker posted a blog message claiming to have wanted to teach people to be more careful on the Net.

Issues using face book

Security issues:

It seems to me that facebook collects (or has the opportunity to) collect much more information than the other platforms out there. To even join a “network” that is a university/college, it requires you to enter in your personal email account at that particular institution. Some people even have their resumes (work history) on there so to speak. Literally, be it friend, foe, neighbour, peeping Tom, Dick, and Harry, or employer can do a search for your name and look you up.

Even worse, is people can tag others on pictures. So yesterday, as I took a look at facebook, I realized I belonged to a network, which allowed me to see a lot of pages of people who belonged in the network. And a classmate of mine had signed up, and then put really embarrassing pictures of another classmate who was extremely drunk and silly looking on her facebook album. And to top it off, she had tagged it. Lovely. At that very moment I was thanking my lucky stars I wasn’t the one in her picture. How embarrassing. There it was, out there for the world to see.

And then… there was another classmate who had received a “private” e-present in the picture of a thong, but for some reason it was available for everyone who was a friend of the person to see. Ewww. Also embarrassing.

Anyways, it seems according to wikipedia, Facebook has quite a bit of issues with security. I can just even think of datamining being a big issue with this as people have their real names, their school affiliations, their coursework, their emails, contacts, relatives, and friends… the list is endless. Scary actually.


Privacy Issues:


Facebook's growth as an Internet social networking site has met criticism on a range of issues, especially the privacy of users, child safety, the use of advertising scripts, data mining, and the inability to terminate accounts without first manually deleting all the content. Many companies removed their adverts from the site in 2007 because they were being displayed on the pages of controversial individuals and groups. The actual content of user's pages, groups and forums has been criticised for promoting controversial topics such as pro-anorexia and holocaust denial. There have been several issues with censorship, both on and off the site. The changes made by Facebook have been criticised, in particular the new format launched in 2008 and the changes in Facebook's Terms of Use which removed the clause detailing automatic expiry of deleted content. Facebook has also been successfully sued several times for violation of intellectual property rights.

There have been some concerns expressed regarding the use of Facebook as a means of surveillance and data mining. Theories have been written about the possible misuse of Facebook and privacy proponents have criticized the site’s current privacy agreement. According to the policy, “We may use information about you that we collect from other sources, including but not limited to newspapers and Internet sources such as blogs, instant messaging services and other users of Facebook, to supplement your profile.” However, some features—such as AIM away message harvesting and campus newspaper monitoring have been dropped and Facebook has since responded to the concerns. Facebook has assured worried users the next privacy policy will not include the clause about information collection and has denied any data mining is being done for the CIA or any other group. However, the possibility of data mining by private individuals unaffiliated with Facebook remains open, as evidenced by the fact that two MIT students were able to download, using an automated script, over 70,000 Facebook profiles from four schools (MIT, NYU, the University of Oklahoma, and Harvard) as part of a research project on Facebook privacy published on December 14th, 2005.

Friday, December 4, 2009

Biggest one-month gain in Canadian jobs since September 2008

Canada's economy created 79,100 jobs in November, busting through forecasts for a modest 15,000 job increase. This rise eclipsed the 43,200 jobs lost in October and is consistent with an acceleration in growth in the economy. The unemployment rate edged down to 8.5% from 8.6% in October as the strong employment gains outstripped the 65,800 rise in the labour force in the month.

November's gain in employment reflected a rebound in part-time employment which rose 40,400 partially recovering the 59,700 drop recorded in October. Full-time jobs increased by 38,600 for a total of 146,700 jobs created during the past three months. Both private companies and the public sector were hiring in November with the largest increases in employment in Ontario, Quebec and Alberta.

Gains were concentrated in the services-producing industries, which added 73,000 jobs and more than reversed October's 37,000 loss. A surge in hiring in educational services of 37,900 accounted for one-half the service-sector increase. Retail and wholesale trade were steady after 30,800 positions were cut in October. Finance, insurance and real estate, professional services and public administration posted solid gains in the month. In the goods-producing industries a modest 6,200 jobs were created, almost exactly recovering the 6,300 positions cut in October. Manufacturers added to their payrolls, while employment in construction and utilities was cut back.

The annual gain in the average hourly wage rate for permanent workers slowed in November to 2.1% from 2.9% in October, the slowest annual pace since March 2007.

The labour data have been very volatile but, on net, 66,500 jobs were created in the three months to November, which supports our call for more robust growth in the fourth quarter. Still, the amount of slack generated during the recession is consistent with the unemployment rate remaining relatively high, at least until the pace of economic growth heats up enough to chew through some of the large output gap.

The start to the recovery — Canada's economy grew at a 0.4% annualized pace in the third quarter — fell short of the Bank of Canada's forecast, supporting the case for monetary policy to remain stimulative until the recovery builds momentum. The soft start also keeps alive the risk that the unemployment rate will rise in the months ahead and is consistent with inflation pressures remaining subdued.

Our forecast that the fourth quarter will see a much stronger pick-up in growth, with the recovery's momentum building in 2010 sets up for the unemployment rate to peak early next year and then gradually drift low. As this occurs, the Bank will look to remove monetary stimulus, although conditions aren't likely to warrant rates to start to move higher until the third quarter of next year. On balance, this week's data are not expected to cause the Bank change its stance at next week's rate setting, with the conditional commitment to a 0.25% overnight rate likely to be maintained.

Dawn Desjardins, Assistant Chief Economist, RBC Economics Research