To be advised
You can contact staff by:
- Calling +64 7 838 4466 select option 1, then enter the extension.
Extensions starting with 4, 5 or 9 can also be direct dialled:
- For extensions starting with 4: dial +64 7 838 extension.
- For extensions starting with 5: dial +64 7 858 extension.
- For extensions starting with 9: dial +64 7 837 extension.
This is a fully online paper. This course has material for 12 weeks. Each week has between three and five videos containing the respective material plus hints and requests for self-study. In addition to watching the videos, students are required to
-Read or watch supplementary material provided in folder "ToRead or View (week number)"
-Perform activities as outlined in the video
-Write their own blog to record what has been discussed and what they have learned; this should also cover the supplementary material
-Participate in online discussion of each other's blog entries. Ideally, blog entries are written weekly.
Students who successfully complete the course should be able to:
Be able to articulate to others the fundamental technological concepts underpinning modern e-business technology as it can nowadays be experienced on a daily basis. This will include a high-level summary of key approaches to modern electronic business.
Linked to the following assessments:
Be aware of the architectural issues that arise in connection with ICT (Information and Communication Technology) when applied to e-business and be able to relay these issues to non-technical managers.
Linked to the following assessments:
Have developed skills in critiquing relevant literature, with particular emphasis on prominent material associated with the covered technologies.
Linked to the following assessments:
The internal assessment/exam ratio (as stated in the University Calendar) is 100:0. There is no final exam. The final exam makes up 0% of the overall mark.
The internal assessment/exam ratio (as stated in the University Calendar) is 100:0 or 0:0, whichever is more favourable for the student. The final exam makes up either 0% or 0% of the overall mark.
Error: Assessment components must add up to 100%
At least one Assessment Component needs to be entered
|Component Description||Due Date||Time||Percentage of overall mark||Submission Method||Compulsory|
|1. Technology Review||
23 Oct 2018
|2. Online Presentation||
1 Oct 2018
|3. Online Discussion/Blogs||
|4. Online Quizzes||
Required and Recommended Readings*
Internet business models
Corpu.com (2016). Business model canvas. Retrieved from https://corpu.com/wwwmedia/courses/course-overviews/business-model-canvas.pdf
Gassmann, O., Frankenberger, K., & Csik, M. (2013). The St. Gallen business model navigator (working paper). St Gallen, Switzerland: University of St Gallen.
Ovans, A. (2015). What is a business model.Harvard Business Review,23, 1-10.
Rappa, M. (2010). Business models on the web. Retrieved from http://digitalenterprise.org/models/models.html
Weinberger, M. (2013). Business models and the internet of things. Retrieved from http://blog.bosch-si.com/categories/business-models/2013/11/business-models-and-the-internet-of-things/
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Five)
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Eight)
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Nine)
Social media technology and social networks
Kietzmann, J. H., Hermkens, K., McCarthy, I. P., & Silvestre, B. S. (2011). Social media? Get serious! Understanding the functional building blocks of social media.Business horizons,54(3), 241-251.
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Ten)
Trainor, K. J., Andzulis, J. M., Rapp, A., & Agnihotri, R. (2014). Social media technology usage and customer relationship performance: A capabilities-based examination of social CRM.Journal of Business Research,67(6), 1201-1208.
Video to watch: “Air NZ Social Media Strategy” in course file.
Cloud computing technologies and cloud security
Gallagher, S. (2014). In-depth: How cloudflare promises SSL security without the key. Retrieved from http://arstechnica.com/information-technology/2014/09/in-depth-how-cloudflares-new-web-service-promises-security-without-the-key/
Osborne, C. (2015). The top trends shaping the face of cloud services by 2020. Retrieved from http://www.zdnet.com/article/the-top-trends-shaping-the-face-of-cloud-services-by-2020/
Stadtmueller, L. (2014). Stepping into the cloud: A practical guide to creating and implementing a successful cloud. Retrieved from http://www-935.ibm.com/services/us/leveragingit/stepping-into-the-cloud-ibm.pdf
University of Cambridge. (2015). How can we protect our information in the era of cloud computing? Retrieved from http://www.cam.ac.uk/research/news/how-can-we-protect-our-information-in-the-era-of-cloud-computing
Big Data technology
IBM. (2015). Five ways to get started with big data. Retrieved from http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=IMW14710USEN
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Two)
Russom, P. (2015). Hadoop for the Enterprise: Making data management massively scalable, agile, feature-rich, and cost-effective. Retrieved from https://www.cloudera.com/content/dam/cloudera/Resources/PDF/Reports/TDWI-Best-Practices-Report_Hadoop-for-the-Enterprise.pdf
Walker, R. (2015). From big data to big profits: A lesson from Google’s Nest. Retrieved from http://www.kdnuggets.com/2015/07/big->Technological foundations of Business Intelligence (BI) and data warehouses
Fields, E. (2013). Top 10 trends in business intelligence for 2014. Retrieved from http://www.tableau.com/about/blog/2013/12/top-10-trends-business-intelligence-2014-27275
Russom, P. (2013). Integrating Hadoop into business intelligence and data warehousing. Retrieved from https://tdwi.org/research/2013/04/tdwi-best-practices-report-integrating-hadoop-into-business-intelligence-and->E-business architectures, service orientation
IBM developerWorks. (2007). SOA terminology overview, part 1: Service,
architecture, governance, and business terms. Retrieved from http://www.ibm.com/developerworks/library/ws-soa-term1/
IBM developerWorks. (2007). SOA terminology overview, part 2: Development processes, models, and assets. Retrieved from http://www.ibm.com/developerworks/library/ws-soa-term2/
Kharytonov, S., & Sukholeyster, O. (2012). Enterprise IT architecture: Goals, trends and perspectives. Retrieved from http://sandhill.com/article/enterprise-it-architecture-goals-trends-and-perspectives/
Koushik, S., & Joodi, P. (2000). E-business architecture design issues.IT Professional,2(3), 38-43.
Technologies for mobile commerce and location-based services
Fatemi, F. (2015). The future of the web is all about context. Retrieved from https://techcrunch.com/2015/08/18/the-future-of-the-web-is-all-about-context/#.ceaetn:Cl9H
Marr, B. (2015). The amazing ways Uber is using big data. Retrieved from http://www.datasciencecentral.com/profiles/blogs/the-amazing-ways-uber-is-using-big-data
Taiji, A. (2014). Top 10 essential tools in Airbnb hosts should have. Retrieved from http://thenextweb.com/gadgets/2014/03/13/top-10-tools-airbnb-hosts-2014/
Tepper, F. (2015). Uber’s new update gives food delivery as much attention as transportation. Retrieved from https://techcrunch.com/2015/08/17/ubers-new-update-gives-food-delivery-as-much-attention-as-transportation/
Yusuf, R.M. (2015). How innovation is disrupting the energy industry – and what it means for the Middle East and North Africa. Retrieved from http://blogs.worldbank.org/arabvoices/how-innovation-disrupting-energy-industry-and-what-it-means-middle-east-and-north-africa
Technological basis of the Internet of Things and ubiquitous computing
O’Reilly, T. (2015). Software above the level of a single device: The implications. Retrieved from http://www.oreilly.com/iot/free/software-above-device.csp
Trend Micro. (2015). Walking into wearable threats: Assessing business readiness for wearable devices. Retrieved from http://www.trendmicro.co.uk/media/campaigns/wearables/uk/pdf/wearables-pdf.pdf
This is a 500 level course, and the 15 points represent approximately 150 learning hours on the part of the students. This course runs over 12 weeks, students are expected to put in at least 15 hours per week of learning effort over the duration of the course.
Linkages to Other Papers*
Prerequisite papers: MSYS458 or equivalent at the discretion of the Chairperson.