0% found this document useful (0 votes)
167 views

IS322 Assignment 1 - v1

This document provides instructions for Assignment 1 for the course IS322: Business Information Systems at the University of the South Pacific. The assignment is worth 20% and is due on September 30, 2021. It consists of 4 parts related to data/business intelligence, information security, communication/networks, and ethics in business. For each part, students must discuss the concept, answer questions based on a case study or scenario, and provide a concluding statement in 200-400 words. Submissions must be in PDF format and plagiarism is strictly prohibited.

Uploaded by

shaniya maharaj
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
167 views

IS322 Assignment 1 - v1

This document provides instructions for Assignment 1 for the course IS322: Business Information Systems at the University of the South Pacific. The assignment is worth 20% and is due on September 30, 2021. It consists of 4 parts related to data/business intelligence, information security, communication/networks, and ethics in business. For each part, students must discuss the concept, answer questions based on a case study or scenario, and provide a concluding statement in 200-400 words. Submissions must be in PDF format and plagiarism is strictly prohibited.

Uploaded by

shaniya maharaj
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

School of Information Technology, Engineering, Mathematics & Physics

The University of the South Pacific

IS322: Business Information Systems

Assignment 1 (20%)

Due Date: Thursday 30th September 2021, 11.55pm (Fiji Time)

Learning Outcomes Tested:


1. Select appropriate BIS for existing business needs.
2. Identify ethical considerations in businesses.

Tasks:
For each of the following 4 parts, write a short report. Include the following in the reports:

 Discuss in general the concept covered in each part.


 Answer the questions based on the case study or scenario given in each part.
 Conclude with a short statement.
 You may write between 200-400 words for each report. Try to use your own words as much as
possible.

Part A – Data and Business Intelligence (5 marks)

Case Study: Supermarket peak period

A supermarket has been experiencing long lines during peak periods of the day. The problem is noticeably
worse on certain days of the week, and the peak periods sometimes differ according to the day of the
week. There are usually enough workers on the job to open all cash registers. The problem the
supermarket manager faces is knowing when to call some of the workers who are stocking shelves up to
the front to work the checkout counters.

How might business analytics help the supermarket manager?


What data would be needed to facilitate good decisions?
How is the data analyst going to achieve this?
Part B - Information Security (5 marks)

Use one of your favourite search engines and search world’s biggest data breaches. Select at least two
of the major data breaches from the list you found and complete the following.
• Explain how they impacted you.
• Many of the breached companies had standard security controls like firewalls and intrusion
detection systems. Discuss what was missing in their designs and processes.
• Add other items that you believe organizations should improve on to avoid breaches.

Part C - Communication and Networks (5 marks)

Case Study: Should Manufacturer convert to IoT?

You are a member of the plant information systems group for a small manufacturer of all-natural
ingredient cosmetics. Your firm promotes itself as adhering to the highest standards of compliance and
quality. Manufacturing is rigorously monitored via sensors and computer controls throughout the entire
process, and automated temperature controls ensure complete stability in the manufacturing
environment. Sensor tracking is performed from the moment that raw materials enter your facility,
throughout the manufacturing process, packaging, and on to distribution. The sensors and computer
controls were installed when the plant was built in the 1990s and use proprietary communications
protocols and are not Internet enabled. Data from these sensors is monitored by a group of three
technicians in the computer control room. Twelve workers are required to staff the control room 24/7,
including weekends and most holidays.

Your company has just purchased a plant previously owned by one of your competitors in a nearby state.
Your group has been asked to look at the feasibility of upgrading the sensors used in both plants to
Internet-enabled sensors connected to the Internet of Things. This would make it possible for technicians
in one control room to monitor the operation of both plants. Plant staffing could be reduced by 12 workers
saving $1.2 million in labour expenses per year. It is estimated that the cost of replacing the existing
sensors and converting to the Internet of Things is in the vicinity of $1.5 million.

Why is it necessary to replace the existing sensors to implement an IoT network?


What additional benefits may arise from converting the plants to the Internet of Things?
What new risks are raised by placing the new system of sensors on the Internet of Things?
What actions could be taken to reduce these risks?
Part D - Ethics in Business (5 marks)

Case Study: Apple vs. FBI

In the wake of the December 2015 terrorist attack in San Bernardino, attention turned to the perpetrator’s
iPhone. A federal judge asked Apple, maker of the iPhone, to provide “reasonable technical assistance”
to the FBI in accessing the information on the phone with that hope of discovering additional threats to
national security.

Apple provided the FBI with data it had in their possession and sent Apple engineers to advise the FBI, but
refused to comply with the court order to bypass the phone’s security measures: specifically the 4-digit
login code and a feature that erases all data after ten incorrect attempts. The FBI argued that the bypass
could only be used for this phone, this one time. The agency also cited national security concerns, given
the phone may lead to better understanding the attack and preventing further incidents.

Apple CEO Tim Cook issued a public letter reiterating Apple’s refusal to cooperate. Cook advocated for
the benefits of encryption in society to keep personal information safe. He stated that creating the
backdoor entry into the iPhone would be akin to creating a master key capable of accessing the tens of
millions of iPhones in the U.S. alone. Cook also had concerns that the FBI was outstepping its bounds - by
using the court system to expand its authority - and believed the case should be settled after public debate
and legislative action through Congress instead.

Public opinion polls on the issue were split. A number of major tech firms filed amicus briefs in support
of Apple. The White House and Bill Gates stood behind the FBI. In anticlimactic fashion, the FBI withdrew
its request a day before the hearing, claiming it no longer needed Apple’s help to assess the phone.

Was Apple wrong for not complying with the FBI’s request? If so, why? If not, why not?
What ethical issues are involved in this case?
Who are the stakeholders in this situation?
Submission instructions

You will have to convert your assignment word document into a PDF document and name it:
SXXXXXXXX_Asg_1.pdf

Submit your completed assignment using the Assignment 1 DropBox available on the IS322
course page on Moodle before the due date - Thursday, 30th September 2021, 11:55 PM (Fiji
Time (FJT).

Individual Assignment
This assignment is to be completed individually. You must complete the assignment on your own
merit to get the marks allocated for this assignment.

Plagiarism
Any kind of plagiarism or cheating; like submission of work that is not your own will lead to a ZERO
(0) score AND you will be subject to disciplinary action. Discussing is permitted however you must
avoid giving your working copy or the final assignment file to anyone. This increases the risk of your
assignment being cited as a plagiarized work.

For this course, plagiarism detection software will be actively used to identify similar assignments.
ALL detected assignments will receive a mark of ZERO and will be referred to the disciplinary
committee.

Note: If you need clarifications while doing this assignment, you may post a message on the
Assignment 1 Help! Forum located on the IS322 Course Page under the Assessments block. Students
are advised to read through the responses for postings made by other students before posting their
own to avoid repetition of the queries.

All the best.

You might also like