MSYS559-18B (NET)

E-Business Technologies

15 Points

Edit Header Content
Waikato Management School
Te Raupapa
School of Management and Marketing

Staff

Edit Staff Content

Convenor(s)

Lecturer(s)

Administrator(s)

: sade.lomas@waikato.ac.nz
: lori.jervis@waikato.ac.nz
: helena.wang@waikato.ac.nz

Placement Coordinator(s)

Tutor(s)

Student Representative(s)

Lab Technician(s)

Librarian(s)

: clive.wilkinson@waikato.ac.nz

You can contact staff by:

  • Calling +64 7 838 4466 select option 1, then enter the extension.
  • Extensions starting with 4, 5 or 9 can also be direct dialled:
    • For extensions starting with 4: dial +64 7 838 extension.
    • For extensions starting with 5: dial +64 7 858 extension.
    • For extensions starting with 9: dial +64 7 837 extension.
Edit Staff Content

Paper Description

Edit Paper Description Content
The Internet and Web technologies are driving fundamental changes in the way that businesses interact today, and e-business is booming as organisations strive to improve efficiency, enter new markets, or gain competitive advantage through improved business processes, resource management, just-in-time provisioning and business relationships. This paper explores the various concepts and technologies behind such developments, introducing fundamental technologies and approaches upon which systems and services are being built today.
Edit Paper Description Content

Paper Structure

Edit Paper Structure Content

This is a fully online paper. This course has material for 12 weeks. Each week has between three and five videos containing the respective material plus hints and requests for self-study. In addition to watching the videos, students are required to

-Read or watch supplementary material provided in folder "ToRead or View (week number)"

-Perform activities as outlined in the video

-Write their own blog to record what has been discussed and what they have learned; this should also cover the supplementary material

-Participate in online discussion of each other's blog entries. Ideally, blog entries are written weekly.

Edit Paper Structure Content

Learning Outcomes

Edit Learning Outcomes Content

Students who successfully complete the course should be able to:

  • Be able to articulate to others the fundamental technological concepts underpinning modern e-business technology as it can nowadays be experienced on a daily basis. This will include a high-level summary of key approaches to modern electronic business.
    Linked to the following assessments:
  • Be aware of the architectural issues that arise in connection with ICT (Information and Communication Technology) when applied to e-business and be able to relay these issues to non-technical managers.
    Linked to the following assessments:
  • Have developed skills in critiquing relevant literature, with particular emphasis on prominent material associated with the covered technologies.
    Linked to the following assessments:
Edit Learning Outcomes Content
Edit Learning Outcomes Content

Assessment

Edit Assessments Content

Assessment Components

Edit Assessments Content

The internal assessment/exam ratio (as stated in the University Calendar) is 100:0. There is no final exam. The final exam makes up 0% of the overall mark.

The internal assessment/exam ratio (as stated in the University Calendar) is 100:0 or 0:0, whichever is more favourable for the student. The final exam makes up either 0% or 0% of the overall mark.

Component DescriptionDue Date TimePercentage of overall markSubmission MethodCompulsory
1. Technology Review
23 Oct 2018
11:30 AM
30
  • Online: Submit through Moodle
2. Online Presentation
1 Oct 2018
12:00 PM
30
3. Online Discussion/Blogs
30
4. Online Quizzes
10
Assessment Total:     100    
Failing to complete a compulsory assessment component of a paper will result in an IC grade
Edit Assessments Content

Required and Recommended Readings

Edit Required Readings Content

Required Readings

Edit Required Readings Content

Internet business models

Corpu.com (2016). Business model canvas. Retrieved from https://corpu.com/wwwmedia/courses/course-overviews/business-model-canvas.pdf

Gassmann, O., Frankenberger, K., & Csik, M. (2013). The St. Gallen business model navigator (working paper). St Gallen, Switzerland: University of St Gallen.

Ovans, A. (2015). What is a business model.Harvard Business Review,23, 1-10.

Rappa, M. (2010). Business models on the web. Retrieved from http://digitalenterprise.org/models/models.html

Weinberger, M. (2013). Business models and the internet of things. Retrieved from http://blog.bosch-si.com/categories/business-models/2013/11/business-models-and-the-internet-of-things/

Search technology

Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Five)

Advertising technology

Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Eight)

Recommender systems

Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Nine)

Social media technology and social networks

Kietzmann, J. H., Hermkens, K., McCarthy, I. P., & Silvestre, B. S. (2011). Social media? Get serious! Understanding the functional building blocks of social media.Business horizons,54(3), 241-251.

Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Ten)

Trainor, K. J., Andzulis, J. M., Rapp, A., & Agnihotri, R. (2014). Social media technology usage and customer relationship performance: A capabilities-based examination of social CRM.Journal of Business Research,67(6), 1201-1208.

Video to watch: “Air NZ Social Media Strategy” in course file.

Cloud computing technologies and cloud security

Gallagher, S. (2014). In-depth: How cloudflare promises SSL security without the key. Retrieved from http://arstechnica.com/information-technology/2014/09/in-depth-how-cloudflares-new-web-service-promises-security-without-the-key/

Osborne, C. (2015). The top trends shaping the face of cloud services by 2020. Retrieved from http://www.zdnet.com/article/the-top-trends-shaping-the-face-of-cloud-services-by-2020/

Stadtmueller, L. (2014). Stepping into the cloud: A practical guide to creating and implementing a successful cloud. Retrieved from http://www-935.ibm.com/services/us/leveragingit/stepping-into-the-cloud-ibm.pdf

University of Cambridge. (2015). How can we protect our information in the era of cloud computing? Retrieved from http://www.cam.ac.uk/research/news/how-can-we-protect-our-information-in-the-era-of-cloud-computing

Big Data technology

IBM. (2015). Five ways to get started with big data. Retrieved from http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=IMW14710USEN

Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Two)

Russom, P. (2015). Hadoop for the Enterprise: Making data management massively scalable, agile, feature-rich, and cost-effective. Retrieved from https://www.cloudera.com/content/dam/cloudera/Resources/PDF/Reports/TDWI-Best-Practices-Report_Hadoop-for-the-Enterprise.pdf

Walker, R. (2015). From big data to big profits: A lesson from Google’s Nest. Retrieved from http://www.kdnuggets.com/2015/07/big->Technological foundations of Business Intelligence (BI) and data warehouses

Fields, E. (2013). Top 10 trends in business intelligence for 2014. Retrieved from http://www.tableau.com/about/blog/2013/12/top-10-trends-business-intelligence-2014-27275

Russom, P. (2013). Integrating Hadoop into business intelligence and data warehousing. Retrieved from https://tdwi.org/research/2013/04/tdwi-best-practices-report-integrating-hadoop-into-business-intelligence-and->E-business architectures, service orientation

IBM developerWorks. (2007). SOA terminology overview, part 1: Service,

architecture, governance, and business terms. Retrieved from http://www.ibm.com/developerworks/library/ws-soa-term1/

IBM developerWorks. (2007). SOA terminology overview, part 2: Development processes, models, and assets. Retrieved from http://www.ibm.com/developerworks/library/ws-soa-term2/

Kharytonov, S., & Sukholeyster, O. (2012). Enterprise IT architecture: Goals, trends and perspectives. Retrieved from http://sandhill.com/article/enterprise-it-architecture-goals-trends-and-perspectives/

Koushik, S., & Joodi, P. (2000). E-business architecture design issues.IT Professional,2(3), 38-43.

Technologies for mobile commerce and location-based services

Fatemi, F. (2015). The future of the web is all about context. Retrieved from https://techcrunch.com/2015/08/18/the-future-of-the-web-is-all-about-context/#.ceaetn:Cl9H

Marr, B. (2015). The amazing ways Uber is using big data. Retrieved from http://www.datasciencecentral.com/profiles/blogs/the-amazing-ways-uber-is-using-big-data

Taiji, A. (2014). Top 10 essential tools in Airbnb hosts should have. Retrieved from http://thenextweb.com/gadgets/2014/03/13/top-10-tools-airbnb-hosts-2014/

Tepper, F. (2015). Uber’s new update gives food delivery as much attention as transportation. Retrieved from https://techcrunch.com/2015/08/17/ubers-new-update-gives-food-delivery-as-much-attention-as-transportation/

Yusuf, R.M. (2015). How innovation is disrupting the energy industry – and what it means for the Middle East and North Africa. Retrieved from http://blogs.worldbank.org/arabvoices/how-innovation-disrupting-energy-industry-and-what-it-means-middle-east-and-north-africa

Technological basis of the Internet of Things and ubiquitous computing

O’Reilly, T. (2015). Software above the level of a single device: The implications. Retrieved from http://www.oreilly.com/iot/free/software-above-device.csp

Trend Micro. (2015). Walking into wearable threats: Assessing business readiness for wearable devices. Retrieved from http://www.trendmicro.co.uk/media/campaigns/wearables/uk/pdf/wearables-pdf.pdf

Edit Required Readings Content

Recommended Readings

Edit Recommended Readings Content
Specify the recommended readings for this paper.
Edit Recommended Readings Content

Other Resources

Edit Other Resources Content
Specify any other resources that students will benefit from accessing. You may like to include other learning resources such as online recordings etc.
Edit Other Resources Content

Online Support

Edit Online Support Content
All course materials are available through Moodle.
Edit Online Support Content

Workload

Edit Workload Content

This is a 500 level course, and the 15 points represent approximately 150 learning hours on the part of the students. This course runs over 12 weeks, students are expected to put in at least 15 hours per week of learning effort over the duration of the course.

Edit Workload Content

Linkages to Other Papers

Edit Linkages Content
Note any linkages to other papers where the linkage is of importance.
Edit Linkages Content

Prerequisite(s)

Prerequisite papers: MSYS458 or equivalent at the discretion of the Chairperson.

Corequisite(s)

Equivalent(s)

Restriction(s)

Edit Linkages Content