The purpose of this module is to introduce the student to the concept of personal IT/IS security, to enable the students to describe various forms of e-commerce including, B2B, B2C, C2C, e-government, m-commerce and to introduce the student to business intelligence, analytics and how they can be used to improve decision making.
Business Software Tools
Advanced word processing, advanced spreadsheets, collaboration platforms.
Business Intelligence and analytics
This section begins with a definition of business intelligence (BI) and business analytics and the components necessary for a successful BI and analytics program. The section goes on to describe and provide examples of the use of several BI techniques and tools. It ends with a discussion of some of the issues associated with BI and analytics.
This section provides a brief overview of the dynamic world of e-commerce and continues with an overview of the individual transaction processing systems that support the fundamental operations of many organizations. Their processing methods, objectives, and primary activities are covered. Then enterprise systems, collections of integrated information systems that share a common database, are discussed.
Personal IT/IS security
This section covers personal IT/IS security. No business organisation, and hence no information system, operates in a vacuum. All IS professionals, business managers, and users have a responsibility to see that the potential consequences of IS use are fully considered. Even entrepreneurs, especially those who use computers and the Internet, must be aware of the potential personal and social impact of computers.
|Module Content & Assessment