
DIGIB559-21B (NET)
E-Business Technologies
15 Points
Staff
Convenor(s)
William Wang
5030
MSB.2.33
william.wang@waikato.ac.nz
|
|
Administrator(s)
Librarian(s)
You can contact staff by:
- Calling +64 7 838 4466 select option 1, then enter the extension.
-
Extensions starting with 4, 5, 9 or 3 can also be direct dialled:
- For extensions starting with 4: dial +64 7 838 extension.
- For extensions starting with 5: dial +64 7 858 extension.
- For extensions starting with 9: dial +64 7 837 extension.
- For extensions starting with 3: dial +64 7 2620 + the last 3 digits of the extension e.g. 3123 = +64 7 262 0123.
Paper Description
Paper Structure
This is a fully online paper. All course material will be provided through the DIGIB559 Moodle page.
Each week has between three and five videos containing the respective material plus hints and requests for self-study. In addition to watching the videos, students are required to:
- Learn from the teaching material provided in folder "To Read or View (week number)"
- Perform activities as outlined in the lecture notes and this paper outline
- Write their own thoughts to reflect what has been learned and discuss with the class (this should also cover the supplementary material)
- Participate in online discussion of each other's discussion entries. Ideally, entries are written to reflect the weekly materials.
Learning Outcomes
Students who successfully complete the paper should be able to:
Assessment
Assessment Components
The internal assessment/exam ratio (as stated in the University Calendar) is 100:0. There is no final exam.
Required and Recommended Readings
Required Readings
Below are suggested readings that are related to the lecture contents:
Internet business models
Chron Contributor (2021) Internet-Based Business Models Definition
Extracted from https://smallbusiness.chron.com/explain-business-consumer-model-2258.html
Gassmann, O., Frankenberger, K., & Csik, M. (2013). The St. Gallen business model navigator (working paper). St Gallen, Switzerland: University of St Gallen.
Ovans, A. (2015). What is a Business Model? Harvard Business Review, 23, 1-10.
Rappa, M. (2010). Business models on the web. Retrieved from http://digitalenterprise.org/models/models.html
Weinberger, M. (2013). Business models and the internet of things. Retrieved from http://blog.bosch-si.com/categories/business-models/2013/11/business-models-and-the-internet-of-things/
Search technology
Priti Srinivas Sajja; Rajendra Akerkar (2012). Intelligent technologies for web applications. Boca Raton: CRC Press. p. 85. ISBN 978-1-4398-7162-1. Retrieved 3 June 2014.
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Five)
Lesk, M Bellcore, (2014) The Seven Ages of Information Retrieval
Retrieval(2019) http://home.mit.bme.hu/~meszaros/edu/onallo/it/valazsik.97/ages/ages.html
Advertising technology
NIDHI DAVE42 (2021) Digital Marketing Trends You Can’t Ignore in 2021
https://www.singlegrain.com/digital-marketing/digital-marketing-trends-2021/
Watkins E. A. (2018) Guide to Advertising Technology
Retrieved (2019) https://www.cjr.org/tow_center_reports/the-guide-to-advertising-technology.php
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014). Mining of massive datasets. Cambridge University Press. (Chapter Eight)
Recommender systems
Aggarwal, Charu C. (2016). Recommender Systems: The Textbook. Springer. ISBN 9783319296579.
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014). Mining of massive datasets. Cambridge University Press. (Chapter Nine)
Social media technology and social networks
Kietzmann, J. H., Hermkens, K., McCarthy, I. P., & Silvestre, B. S. (2011). Social media? Get serious! Understanding the functional building blocks of social media. Business Horizons, 54(3), 241-251.
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Ten)
Trainor, K. J., Andzulis, J. M., Rapp, A., & Agnihotri, R. (2014). Social media technology usage and customer relationship performance: A capabilities-based examination of social CRM.Journal of Business Research,67(6), 1201-1208.
Video to watch: “Air NZ Social Media Strategy” in the course file.
Cloud computing technologies and cloud security
Gallagher, S. (2014). In-depth: How Cloudflare promises SSL security without the key. Retrieved from http://arstechnica.com/information-technology/2014/09/in-depth-how-cloudflares-new-web-service-promises-security-without-the-key/
Osborne, C. (2015). The top trends shaping the face of cloud services by 2020. Retrieved from http://www.zdnet.com/article/the-top-trends-shaping-the-face-of-cloud-services-by-2020/
Stadtmueller, L. (2014). Stepping into the cloud: A practical guide to creating and implementing a successful cloud. Retrieved from https://www.techrepublic.com/resource-library/whitepapers/stepping-into-the-cloud-a-practical-guide-to-creating-and-implementing-a-successful-cloud-strategy-copy3/
The University of Cambridge. (2015). How can we protect our information in the era of cloud computing? Retrieved from http://www.cam.ac.uk/research/news/how-can-we-protect-our-information-in-the-era-of-cloud-computing
Big Data technology
Disha Sinha, (2021) TOP 10 BIG DATA TECHNOLOGIES RISING IN 2021
https://www.analyticsinsight.net/top-10-big->Technological Foundations of Business Intelligence (BI) and Data Warehouses
Russom, P. (2013). Integrating Hadoop into business intelligence and data warehousing. Retrieved from https://tdwi.org/research/2013/04/tdwi-best-practices-report-integrating-hadoop-into-business-intelligence-and->E-business architectures, service orientation architectures
Tsai, W., Sun, X., & Balasooriya, J. (2010). Service-Oriented Cloud Computing Architecture. 2010 Seventh International Conference on Information Technology: New Generations, 684-689.
IBM developerWorks. (2007). SOA terminology overview, part 1: Service,
architecture, governance, and business terms. Retrieved from http://www.ibm.com/developerworks/library/ws-soa-term1/
IBM developerWorks. (2007). SOA terminology overview, part 2: Development processes, models, and assets. Retrieved from http://www.ibm.com/developerworks/library/ws-soa-term2/
Kharytonov, S., & Sukholeyster, O. (2012). Enterprise IT architecture: Goals, trends, and perspectives. Retrieved from http://sandhill.com/article/enterprise-it-architecture-goals-trends-and-perspectives/
Koushik, S., & Joodi, P. (2000). E-business architecture design issues. IT Professional,2(3), 38-43.
The Open Group, SOA Source Book, (2019) Retrieved from https://www.opengroup.org/soa/source-book/intro/index.htm
Technologies for mobile commerce and location-based services
Fatemi, F. (2015). The future of the web is all about context. Retrieved from https://techcrunch.com/2015/08/18/the-future-of-the-web-is-all-about-context/#.ceaetn:Cl9H
Marr, B. (2015). The amazing ways Uber is using big data. Retrieved from http://www.datasciencecentral.com/profiles/blogs/the-amazing-ways-uber-is-using-big-data
Taiji, A. (2014). Top 10 essential tools in Airbnb hosts should have. Retrieved from http://thenextweb.com/gadgets/2014/03/13/top-10-tools-airbnb-hosts-2014/
Also check: Airbnb Tools For Hosts: Manage Your Airbnb Business Efficiently Retrieved 2019 from https://getpaidforyourpad.com/airbnb-tools/
Tepper, F. (2015). Uber’s new update gives food delivery as much attention as transportation. Retrieved from https://techcrunch.com/2015/08/17/ubers-new-update-gives-food-delivery-as-much-attention-as-transportation/
Yusuf, R.M. (2015). How innovation is disrupting the energy industry – and what it means for the Middle East and North Africa. Retrieved from http://blogs.worldbank.org/arabvoices/how-innovation-disrupting-energy-industry-and-what-it-means-middle-east-and-north-africa
In addition, if you are interested, you may get a PDF of the following report:
Sample PDF of Location-Based Services (LBS) and Real-Time Location Systems (RTLS) Market Research Report at https://www.absolutereports.com/enquiry/request-sample/12899849
The technological basis of the Internet of Things and ubiquitous computing
O’Reilly, T. (2015). Software above the level of a single device: The implications. Retrieved from http://www.oreilly.com/iot/free/software-above-device.csp
Trend Micro. (2015). Walking into wearable threats: Assessing business readiness for wearable devices. Retrieved from http://www.trendmicro.co.uk/media/campaigns/wearables/uk/pdf/wearables-pdf.pdf
Chauhuri, Abhik (2018). Internet of Things, for Things, and by Things. Boca Raton, Florida: CRC Press. ISBN 9781138710443.
Online Support
Workload
This is a 500 level course, and the 15 points represent approximately 150 learning hours on the part of the students. This course runs over 12 weeks, students are expected to put in at least 15 hours per week of learning effort over the duration of the course.
Linkages to Other Papers
Prerequisite(s)
Prerequisite papers: MSYS358, MSYS458 or equivalent OR at the discretion of the Chairperson.
Restriction(s)
Restricted papers: MSYS559