IINS5211MM
IINS5211MM
IINS5211MM
This manual enjoys copyright under the Berne Convention. In terms of the Copyright
Act, no 98 of 1978, no part of this manual may be reproduced or transmitted in any
form or by any means, electronic or mechanical, including photocopying, recording or
by any other information storage and retrieval system without permission in writing
from the proprietor.
Student Portal
The full-service Student Portal provides you with access to your academic
administrative information, including:
• an online calendar,
• timetable,
• academic results,
• module content,
• financial account, and so much more!
When you log into the Student Portal, the ‘Module Information’ page displays the
‘Module Purpose’ and ‘Textbook Information’ including the online ‘Module Guides or
‘Module Manuals’ and assignments for each module for which you are registered.
Supplementary Materials
For certain modules, electronic supplementary material is available to you via the
‘Supplementary Module Material’ link.
The ‘Module Discussion Forum’ may be used by your lecturer to discuss any topics
with you related to any supplementary materials and activities such as ICE, etc.
To view, print and annotate these related PDF documents, download Adobe
Reader at following link below:
www.adobe.com/products/reader.html
The following Library Online Databases are available. These links will prompt you for
a username and password. Use the same username and password as for student
portal. Please contact your librarian if you are unable to access any of these. Here
are links to some of the databases:
Table of Contents
Using this Manual ...................................................................................................... 6
Introduction ............................................................................................................... 7
Module Resources ..................................................... Error! Bookmark not defined.
Module Purpose ......................................................... Error! Bookmark not defined.
Module Outcomes ...................................................... Error! Bookmark not defined.
Pacer and Assessment Brief Applicable to Module: MODULE IINS5211 ............Error!
Bookmark not defined.
Module Pacer ............................................................. Error! Bookmark not defined.
Assessments .............................................................. Error! Bookmark not defined.
Learning Unit 1: Information Systems in Business ..................................................... 8
1 Introduction ........................................................................................................ 9
2 Building blocks of Information Systems .............................................................. 9
3 Information Systems Development ................................................................... 18
4 The Strategic Value of Information Systems ..................................................... 24
5 Recommended Additional Reading .................................................................. 28
6 Activities ........................................................................................................... 30
7 Revision Exercises ........................................................................................... 31
Learning Unit 2: Web Technologies for Business .................................................... 32
1 Introduction ...................................................................................................... 33
2 Evolution of the Web ........................................................................................ 33
3 Centralised and distributed computing models ................................................. 36
4 E-Commerce and m-Commerce ....................................................................... 46
5 Recommended Additional Reading .................................................................. 49
6 Activities ........................................................................................................... 50
7 Revision Exercises ........................................................................................... 51
Learning Unit 3: Information Security ...................................................................... 52
1 Introduction ...................................................................................................... 53
2 The Information Security Triad ......................................................................... 53
3 Cybersecurity Threats ...................................................................................... 53
4 Cybersecurity controls ...................................................................................... 59
5 Cybersecurity Risk Management ...................................................................... 64
6 Recommended Additional Reading .................................................................. 70
7 Activities ........................................................................................................... 71
8 Revision Exercises ........................................................................................... 72
Learning Unit 4: Issues provided by IS .................................................................... 73
9 Introduction ...................................................................................................... 74
10 Legal Issues of IS............................................................................................. 74
11 Ethical Issues of IS ........................................................................................... 79
12 Societal Issues of IS ......................................................................................... 83
13 Recommended Additional Reading .................................................................. 84
14 Activities ........................................................................................................... 86
15 Revision Exercises ........................................................................................... 87
Learning Unit 5: Organisational Information Systems .............................................. 88
1 Introduction ...................................................................................................... 89
2 Information Systems......................................................................................... 89
Various activities and revision questions are included in the learning units of this
manual. These are designed to help you to engage with the subject matter as well as
to help you prepare for your assessments.
Introduction
Welcome to the Introduction to Information Systems (IS) module. This module
provides you with an insight into the role of information systems within organisations.
This module focuses on the concept of the value of technology for future accounting
and finance professionals, and decision makers.
Since the dawn of technology, there have been significant shifts from IS being a
trendy piece of hardware for an IT manager, towards the driving IS to meet the
demands of businesses related to increased profitability, reduced cost, and strategic
business value. In the early days of technology, the “best tech” was reserved for
large corporate organisations with sizeable IT budgets. However, we are aware that
technology has become commoditised and easily accessible to organisations of all
sizes, irrespective of their size or technology budget.
In order to fully understand how IS can help organisations to achieve value, this
module begins with outlining the fundamentals of IS in organisations. Thereafter,
focus is placed on Internet technologies including different computing models
(centralised and decentralised) and different e-commerce models. Then, the module
focuses on information security threats, risk management and controls. The issues to
consider when working with IS are then discussed ranging from ethical to legal and
social issues.
Throughout this module, you will be required to engage with several texts including
seminal works, blogs, websites, whitepapers, and academic articles. In engaging with
these resources alongside your own research, you will develop an understanding of
how IS influences organisations and adds strategic business value.
To obtain maximum value from this module, it is encouraged that you do not limit
your knowledge to what is contained in the Module Guide and prescribed material.
Instead, broaden your horizon by following global and local technology blobs on
social media and attempting to situate current affairs into what you learn in this
module – your lecturer will also point out how what is happening in the world around
you is related to this module. Consider how organisations are using various
technologies to solve their business problems and begin to seek solutions to the
problems of your profession and your community in the technologies you see around
you. As you will learn in this module, it’s how you use the technology that really adds
value.
We hope that you enjoy this module and that you leave with an awareness of and
interest in potential of the technologies that you could ultimately encounter in your
profession.
• Module Manual.
• Recommended readings outlined in this learning
unit.
How to prepare for this learning unit:
1 Introduction
As we get into a module on Information Systems for business,
we need to explore some first principles related to the topic. As
such, in this learning unit, we will explore the building blocks of
information systems, understand how information systems are
developed, and explore how they add value to organisations.
We also explore the implications of 4IR going into the future.
• As you walk through the store, you pick items that you
need to purchase. These items have prices attached to
them – the labels were generated using information
stored digitally somewhere within the organisation and
printed out on labels – the process was facilitated by an
information system.
• You go to the till and hand your items to cashier who
scans the barcodes of the items. Using the barcode, the
point-of-sale system accesses the prices of each item
(from a database somewhere within the organisation)
and calculates your order total – this process was also
facilitated by an information system.
• Then, you tap your card to make payment. When you
tap, the card machine might connect to your bank’s
server to confirm the availability of funds and reserve the
funds for your purchase. The bank’s servers will reply
approving (or declining) the transaction – you guessed it,
information systems at work here too.
• The cashier will print out your receipt and off you go.
2.2.1 Hardware
2.2.2 Software
2.2.3 Databases
2.2.4 Networks
2.2.5 Processes
2.2.6 People
Over the past few years, there has been a shift in how IT has
been viewed by organisations. While this context will be
shared later in this learning unit, let us explore the nature of
the people component in information systems.
• Industry 4.0:
https://www2.deloitte.com/za/en/pages/consumer-
industrial-products/articles/industry-4-0--are-you-
ready.html [Accessed 13 January 2023].
6 Activities
6.1 Activity 1
Conduct research on the different types of information systems
that may be used at a higher education institution. Classify
each of these information systems using the definitions in this
learning unit and explain how they enable an institution to
obtain operational, tactical or strategic advantage.
6.2 Activity 2
Consider this scenario: You have been asked to assemble a
team of professionals to develop an application to help
manage inventory, orders, customer management, and
reporting for a local restaurant. After conducting additional
research, identify the different stakeholders who you would
include as part of the team and describe the role that each
stakeholder will play in the successful implementation of the
application.
6.3 Activity 3
Imagine that you are in industry. You are approached by an IT
vendor wanting to sell you software, servers and the latest in
networking technology. They promise that you will be the
coolest company on the block with the best servers. Provide a
response to this approach to providing IT services in the
context how organisations should be procuring IT services.
7 Revision Exercises
Answer the following questions to test your knowledge from
this learning unit:
• Module Manual.
• Recommended readings outlined in
this learning unit.
How to prepare for this learning unit:
1 Introduction
As discussed in the previous learning unit, it is essential for
organisations to utilise technology to participate in the 4th
industrial revolution. This learning unit shifts focus on a critical
component of participation in the 4th industrial revolution - the
world wide web. We will explore the evolution of the web, e-
commerce and m-commerce and the nature of centralised and
decentralised computing.
Despite this uptake, the ability to post content in a Web 1.0 lay
in the hands of a select few with the technical ability to do so
while most users simply consumed content (Andews, 2019;
Silver, 2020). The web browser as a tool gained traction with
Netscape launching in 1994 (Silver, 2020).
With Web 3.0, it is envisaged that users will own their data and
have the freedom of knowing how it is being utilised and
shared. For society, Web 3.0 can alleviate world problems
such as unequal access to healthcare, food insecurity,
unsustainability, and financial inequality by harnessing the
capabilities of artificial intelligence (Mersch & Muirhead, 2019).
Since data will now be more widely available as opposed to
being stored and utilised centrally, Web 3.0 opens
opportunities for data to be shared, analysed, and have value
extracted from the data for wider benefit (Mersch & Muirhead,
2019).
E-Commerce:
6 Activities
6.1 Activity 1
You have been approached by a local FMCG retailer that has
been in existence for about 15 years. They have a national
footprint of stores in major malls and have noticed a drop in
foot-traffic over the past year. As a result, they are looking to
expand their online operations. Using the knowledge gained in
this learning unit, and with the help of additional research,
provide a one-page recommendation to the client.
6.2 Activity 2
A South African auditing firm recently suffered a major
cybersecurity breach and lost the data of clients. They are
since looking at moving their IT operations to the cloud.
Conduct research into the different types of workloads that can
be moved to the cloud as well as the major cloud providers
and outline a cloud migration strategy that incorporates what IT
services can be moved to the cloud, how this can be done, and
which providers can be used.
6.3 Activity 3
When consulting with a client in the legal field recently, they
indicate you that blockchain is all about cryptocurrency and it’s
a passing fad. Having learnt about blockchain, you feel it
imperative to politely correct their understanding. Provide an
explanation of what is blockchain and how it can be used
within the legal field. You will need to conduct additional
research.
7 Revision Exercises
Answer the following questions to test your knowledge from
this learning unit:
• Module Manual.
• Recommended readings outlined in
this learning unit.
How to prepare for this learning unit:
8 Introduction
In the previous learning unit, we explored different computing
models that organisations may adopt in order to fulfil their IT
needs. The reality is that decisions to adopt different
technologies carry a degree of associated risk for an
organisation. A critical risk that must be considered is that of
cybersecurity.
2 Cybersecurity Threats
2.1 Threat actors
The individuals who carry out cyberattacks are known as threat
actors. Threat actors include:
2.2 Malware
As explained by Ciampa (2017) and Laudon & Laudon (2021),
malware is software that enters a user’s system or network
without the user’s knowledge or consent, and then carries out
malicious activity. The reach and potential damage caused by
malware differs as malware varies in complexity and function
(Ciampa, 2017). The different types of malware and attacks
are outlined below:
Category of
Type Description
Attack
Circulation Viruses
Viruses are malicious code that
enters the computers file
systems and when launched, it
reproduces itself and mutates
without human intervention.
Viruses can remove files,
prevent other applications from
running, steal data, modify
settings and cause a device to
crash. Viruses travel between
devices through users sharing
infected files with each other
(Ciampa, 2017).
Worms Worms are malicious code that
enters a computer through a
network, finds a vulnerability or
security weakness on the host
system which it exploits, and
then proceeds to spread across
other devices on the network to
exploit the same vulnerability
(Ciampa, 2017).
Infection Trojans Trojans are malicious code that
enters a device by
masquerading as a legitimate
application, but then proceeds
to cause on harm on the user’s
device. This harm can include
stealing sensitive information
and allowing remote access to
a threat actor (Ciampa, 2017).
Ransomware Like its name suggestions,
ransomware is malware that
enters a user’s device, locks
the devices, restricts access to
files, and displays a ransom
message requesting payment,
typically using an offshore
means or cryptocurrency to
make it harder to track
(Ciampa, 2017; Laudon &
Laudon, 2021).
Concealment Rootkit A rootkit is malware that hides
itself within the operating
system out of reach of
Type of
Description
Attack
Impersonation An attack where a threat actor impersonates
some legitimate person like a support
technician who calls a user to solve a problem
that they were not aware of in order to obtain
details, sensitive information or install
malware.
Phishing In a phishing attack, a threat actor sends an
email that falsely claims and seems to be from
a legitimate organization or enterprise, like a
financial institution or law enforcement
agency. The user then acts on this information
3 Cybersecurity controls
Armed with knowledge of threats facing organisations, we can
now explore mechanisms that organisations can adopt to
control and manage these threats by way of a comprehensive
information security strategy.
1. Threat: Malware
2. Vulnerability: Outdated malware on an employee’s
laptop.
3. Impact: Depending on the malware, it could be isolated
to a single machine or devastating across the network.
4. Likelihood: Employees’ device accesses the internet so
the risk could be very likely.
BYOD:
Risk Management:
BCDR
6 Activities
6.1 Activity 1
Visit the campus IT department and conduct research on the
password policy at our institution. How often do users have to
change passwords? What are the minimum requirements for a
password?
6.2 Activity 2
Being a student who is familiar with cybersecurity, you have
been invited to present a discussion on social engineering.
Conduct additional research and find three relevant interesting
cases of social engineering. Using these three cases, explain
the intended target, how each attack was carried out and why
the attack was or was not successful, and outline the lessons
that can be learnt.
6.3 Activity 3
Consider this scenario: You are a business owner of an
organisation with over 50 employees. A new employee is
joining the company but does not want to use the laptop that
the company will issue. Instead, they want to use their laptop
to connect to the Wi-Fi, use collaboration software, access
emails, and share files on the network. Craft a short BYOD
policy for your organisation.
7 Revision Exercises
Answer the following questions to test your knowledge from
this learning unit (you may be required to conduct additional
research):
8 Introduction
Aside from information security, there are other issues
presented by IS for business. This learning unit explores the
legal, ethical, and social issues associated with technology.
When exploring legal issues, we will explore South African
legislation and how they affect IS in organisations. We will also
explore the ethical issues like misinformation, and the role of
artificial intelligence in decision making. Lastly, we will discuss
societal issues like the digital divide, broadband access being
a human right and how to bridge the digital divide.
9 Legal Issues of IS
9.1 Legal vs ethical issues
Before we jump into legal and ethical issues, let’s look at the
difference between these two concepts.
Ethics deals with the concepts of right and wrong, and how
one should behave. It would be considered ethically wrong to
murder somebody, for example. (Velasquez, Andre, Shanks
and Meyer, 2010)
Laws also deal with right and wrong, but breaking a law has
consequences. (Sullivan and Pecorino, 2002) The fact that
society considers murder to be ethically wrong, does not have
any consequences attached to it. But the fact that it is illegal,
means that a murderer can be apprehended and punished.
So, if all people have the right to privacy, how can interception
of communication then be legal? The Regulation of
Interception of Communications and Provision of
Communication-related Information Act (RICA) explains when
law enforcement officers may intercept communication, for
example to provide serious harm to someone. It describes how
warrants can be obtained, and how intercepted communication
may be used. And it expressly prohibits other parties from
even building equipment that could intercept communications,
let alone actually intercepting communications. Another
interesting requirement is that telecommunications services
must have the capability to be intercepted. (South African
Government, 2002b)
Read the media summary of the case that prompted this ruling
here: http://www.saflii.org/za/cases/ZACC/2021/3media.pdf
[Accessed 13 January 2023].
Parts of the Act only came into effect in 2021, despite the Act
dating back to 2013. This means that companies had plenty of
time to adapt their systems and processes.
King III is not a law. So, why bring it up here at all? Because
good governance means that it is easy for a company to
comply with the law. (Bowman Gilfillan Attorneys, n.d.) Many
South African companies apply this code, and you will likely
come across it in your career.
10 Ethical Issues of IS
Ethics can be applied to different areas of life, especially in the
workplace. While general ethics like “murder is wrong” might
go without saying, there could be ethics in the context of
information systems that might not be as obvious. One way to
know what is considered ethical, is to read a code of ethics,
such as the one written by Association for Computing
Machinery (ACM). (Bourgeois et al., 2019)
The ACM code of ethics lists things like honesty, fairness, and
respecting privacy. So, here we see where ethics and South
African law correspond. (Association for Computing Machinery.
2018)
Copyright
Intellectual Property
Patent Trademark
Figure 15 – Types of Intellectual Property
10.1.1 Copyright
10.1.2 Trademarks
10.1.3 Patents
10.2 Misinformation
Using social media, anybody can publish anything they want to
and reach a large audience. There is no regulatory oversight.
(Susarla, Kim and Zuckerman, 2021)
11 Societal Issues of IS
11.1 The digital divide
The digital divide is the gap between the people that have
access to technology and those that do not. There are different
factors that contribute to the digital divide in South Africa:
(Huge Connect, 2022)
13 Activities
13.1 Activity 1
Read through the contract that you signed when you registered
as a student. Do you think any parts of the contract relate to
the laws described in this learning unit?
14 Revision Exercises
Answer the following questions to test your knowledge from
this learning unit (you may be required to conduct additional
research):
• Module Manual.
• Recommended readings outlined in
this learning unit.
How to prepare for this learning unit:
15 Introduction
Now that you are equipped with an understanding of
Information Systems (IS), this learning unit explores the
different types of organisational information systems,
enterprise resource planning systems, Accounting Information
Systems and the impact of the Fourth Industrial Revolutions
(4IR).
16 Information Systems
Financial
Accounting
Manufacture and
Stock and Sales
Distribution
ERP
Components
Human Customer
Resources and Relationship
Payroll Management
20 Activities
20.1 Activity 1
Visit campus IT and ask them about the kinds of systems used
in the management of student data.
21 Revision Exercises
Answer the following questions to test your knowledge from
this learning unit (you may be required to conduct additional
research):
23 Bibliography
Adam, E., Wassermann, J. and Blewett, C. 2016. An investigation of UKZN students’
adoption and utilisation of personal cloud technologies. South African Journal of
Higher Education, 29(6).
Altynpara, E. 2021. Why Migrate To The Cloud: The Basics, Benefits And Real-Life
Examples. Forbes Technology Council.
https://www.forbes.com/sites/forbestechcouncil/2021/03/12/why-migrate-to-the-cloud-
the-basics-benefits-and-real-life-examples/?sh=f62fdd25e272 [Accessed 13 January
2023].
Association for Computing Machinery. 2018. ACM Code of Ethics and Professional
Conduct. [Online] Available at: https://www.acm.org/code-of-ethics [Accessed 13
January 2023].
Bala, R., Gill, B., Smith, D., Ji, K. Wright, D. 2021. Magic Quadrant for Cloud
Infrastructure and Platform Services. Gartner.
https://www.gartner.com/doc/reprints?id=1-271OE4VR&ct=210802&st=sb [Accessed
13 January 2023].
Botha, J. and Pieterse, H. 2020. Fake News and Deepfakes: A Dangerous Threat for
21st Century Information Security. [Online] Available at:
https://www.proquest.com/openview/67064446abb3dec6bea4c680d5aa3a31/1?cbl=3
96500&pq-origsite=gscholar [Accessed 13 January 2023].
Bourgeois, David T., Smith, James L., Wang, S., and Mortati, J. 2019. Information
Systems for Business and Beyond. Open Textbooks.
https://digitalcommons.biola.edu/open-textbooks/1 [Accessed 13 January 2023].
Bowman Gilfillan Attorneys. n.d. Quick Guide to Corporate Governance and King III.
[Online] Available at:
http://diversionservices.dsd.gov.za/FORMS/download/Corporate-Governance-King-
3.pdf [Accessed 13 January 2023].
Business Tech. 2021. South Africa is looking at giving free data to citizens – similar
to water and electricity. [Online] Available at:
https://businesstech.co.za/news/broadband/512368/south-africa-is-looking-at-giving-
free-data-to-citizens-similar-to-water-and-electricity/ [Accessed 13 January 2023].
Chai, W., Holak, B, & Cole, B. 2020. What is e-commerce? Definition and meaning.
TechTarget. https://searchcio.techtarget.com/definition/e-commerce [Accessed 13
January 2023].
Constitutional Court of South Africa. 2021. CCT 278/19 and CCT 279/19 Media
Summary. [Online] Available at:
http://www.saflii.org/za/cases/ZACC/2021/3media.pdf [Accessed 13 January 2023].
Deloitte, 2017. Industry 4.0 — The Fourth Industrial Revolution is here, are you
ready? Deloitte. https://www2.deloitte.com/za/en/pages/consumer-industrial-
products/articles/industry-4-0—are-you-ready.html [Accessed 13 January 2023].
Eisikovits, N. and Feldman, D. 2021. AI is killing choice and chance – which means
changing what it means to be human. [Online] Available at:
https://theconversation.com/ai-is-killing-choice-and-chance-which-means-changing-
what-it-means-to-be-human-151826 [Accessed 13 January 2023].
Gov.za, 1996. The Constitution of the Republic of South. [online] Available at:
https://justice.gov.za/legislation/constitution/SAConstitution-web-eng.pdf [Accessed
13 January 2023].
© The Independent Institute of Education (Pty) Ltd 2023 Page 100 of 109
IIE Module Manual IINS5211
Huge Connect, 2022. Digital Divide in South Africa. [Online] Available at:
https://hugeconnect.co.za/digital-divide-in-south-africa/ [Accessed 13 January 2023].
Iansiti, M. and Lakhani, K. R. 2017. The Truth About Blockchain. Harvard Business
Review. https://hbr.org/2017/01/the-truth-about-blockchain [Accessed 13 January
2023].
Kamaar, A. and Diedericks, N. 2022. Copyright Laws and Regulations 2022. [Online]
Available at: https://iclg.com/practice-areas/copyright-laws-and-regulations/south-
africa [Accessed 13 January 2023].
Mahlaka, R. 2021. South Africa’s shopping mall malaise worsens – and the road to
recovery will be long. Daily Maverick. https://www.dailymaverick.co.za/article/2021-
09-15-south-africas-shopping-mall-malaise-worsens-and-the-road-to-recovery-will-
be-long/ [Accessed 13 January 2023].
Malinga, S., 2018. Absa joins Sovrin Foundation in blockchain, security push. ITWeb.
https://www.itweb.co.za/content/Kjlyr7wdjPQMk6am [Accessed 13 January 2023].
Marko, K. 2020. Explore the pros and cons of cloud computing. TechTarget.
https://searchcloudcomputing.techtarget.com/tip/Explore-the-pros-and-cons-of-cloud-
computing [Accessed 13 January 2023].
© The Independent Institute of Education (Pty) Ltd 2023 Page 101 of 109
IIE Module Manual IINS5211
Martin, M. 2021. Types of Information System: MIS, TPS, DSS, Pyramid Diagram.
[Online] Available at: https://www.guru99.com/mis-types-information-system.html
[Accessed 13 January 2023].
Mell, P. & Grance, T. 2011, The NIST Definition of Cloud Computing. National
Institute of Standards and Technology.
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
[Accessed 13 January 2023].
Mersch, M. & Muirhead, R. 2019. What Is Web 3.0 & Why It Matters. Fabric
Ventures. https://medium.com/fabric-ventures/what-is-web-3-0-why-it-matters-
934eb07f3d2b [Accessed 13 January 2023].
Microsoft. 2022. What is ERP and why do you need it? [Online] Available at:
https://dynamics.microsoft.com/en-us/erp/what-is-erp/ [Accessed 13 January 2023].
Mwanza, K. & Wilkins, H. 2018. African startups bet on blockchain to tackle land
fraud. Thomson Reuters Foundation. https://www.reuters.com/article/us-africa-
landrights-blockchain-idUSKCN1G00YK [Accessed 13 January 2023].
Moore, J. 2020. What is BCDR? Business continuity and disaster recovery guide.
TechTarget. https://searchdisasterrecovery.techtarget.com/definition/Business-
Continuity-and-Disaster-Recovery-BCDR [Accessed 13 January 2023].
Morsy, H. 2020. How can Africa succeed in the Fourth Industrial Revolution? World
Economic Forum. https://www.weforum.org/agenda/2020/08/africa-fourth-industrial-
revolution-technology-digital-education/ [Accessed 13 January 2023].
Parliament of the Republic of South Africa, n.d. How a law is made. [Online]
Available at: https://www.parliament.gov.za/how-law-made [Accessed 13 January
2023].
© The Independent Institute of Education (Pty) Ltd 2023 Page 102 of 109
IIE Module Manual IINS5211
Romney, M. B. & Steinbart, P.J. 2018. Accounting Information Systems. 14th ed.
Pearson. New York.
Schwab, K. 2016. The Fourth Industrial Revolution: what it means, how to respond.
World Economic Forum. https://www.weforum.org/agenda/2016/01/the-fourth-
industrial-revolution-what-it-means-and-how-to-respond/ [Accessed 13 January
2023].
Smit & Van Wyk Attorneys. n.d. Copyright Law in South Africa. [Online] Available at:
https://www.svw.co.za/copyright-law-in-south-africa/ [Accessed 13 January 2023].
© The Independent Institute of Education (Pty) Ltd 2023 Page 103 of 109
IIE Module Manual IINS5211
Stewart, R. 2007. Desktop vs. Browser - when to deploy applications for each.
ZDNet. https://www.zdnet.com/article/desktop-vs-browser-when-to-deploy-
applications-for-each/ [Accessed 13 January 2023].
Sullivan, E. 2018. What's the difference between a hot site and cold site for DR?
TechTarget. https://searchdisasterrecovery.techtarget.com/answer/Whats-the-
difference-between-a-hot-site-and-cold-site-for-disaster-recovery [Accessed 13
January 2023].
Sullivan, S.O. and Pecorino, P.A. 2002. Ethics and Law. [Online] Available at:
https://www.qcc.cuny.edu/SocialSciences/ppecorino/ETHICS_TEXT/Chapter_1_Intro
duction/Ethics_and_Law.htm [Accessed 13 January 2023].
Susarla, A., Kim, D.H, and Zuckerman, E. 2021. Misinformation could be a growing
challenge in 2022, experts predict. [Online] Available at:
https://www.upi.com/Voices/2021/12/28/social-media-
misinformation/9701640614447/ [Accessed 13 January 2023].
Velasquez, M., Andre, C., Shanks, T., S.J., and Meyer, M.J. 2010. What is Ethics?
[Online] Available at: https://www.scu.edu/ethics/ethics-resources/ethical-decision-
making/what-is-ethics/ [Accessed 13 January 2023].
Watling, J., McCabe, J. & Seedat Y., 2019. Rethinking the eCommerce Opportunity
in South Africa. Accenture. https://www.accenture.com/_acnmedia/PDF-
108/Accenture-eCommerce-POV.pdf [Accessed 13 January 2023].
World Intellectual Property Organisation. n.d. Summary of the Berne Convention for
the Protection of Literary and Artistic Works (1886). [Online] Available at:
https://www.wipo.int/treaties/en/ip/berne/summary_berne.html [Accessed 13 January
2023].
Xia, V. 2017. What is Mobile First Design? Why It’s Important & How To Make It?
Medium. https://medium.com/@Vincentxia77/what-is-mobile-first-design-why-its-
important-how-to-make-it-7d3cf2e29d00 [Accessed 13 January 2023].
© The Independent Institute of Education (Pty) Ltd 2023 Page 104 of 109
IIE Module Manual IINS5211
Intellectual Property
Plagiarism occurs in a variety of forms. Ultimately though, it refers to the use of the
words, ideas or images of another person without acknowledging the source using
the required conventions. The IIE publishes a Quick Reference Guide that provides
more detailed guidance, but a brief description of plagiarism and referencing is
included below for your reference. It is vital that you are familiar with this information
and the Intellectual Integrity Policy before attempting any assignments.
‘Plagiarism’ is the act of taking someone’s words or ideas and presenting them as
your own.
What is ‘Referencing’?
‘Referencing’ is the act of citing or giving credit to the authors of any work that you
have referred to or consulted. A ‘reference’ then refers to a citation (a credit) or the
actual information from a publication that is referred to.
Referencing is the acknowledgment of any work that is not your own, but is used by
you in an academic document. It is simply a way of giving credit to and
acknowledging the ideas and words of others.
When writing assignments, students are required to acknowledge the work, words or
ideas of others through the technique of referencing. Referencing occurs in the text
at the place where the work of others is being cited, and at the end of the document,
in the bibliography.
The bibliography is a list of all the work (published and unpublished) that a writer has
read in the course of preparing a piece of writing. This includes items that are not
directly cited in the work.
• Quote directly: when you use the exact words as they appear in the source;
• Copy directly: when you copy data, figures, tables, images, music, videos or
frameworks;
• Summarise: when you write a short account of what is in the source;
• Paraphrase: when you state the work, words and ideas of someone else in
your own words.
© The Independent Institute of Education (Pty) Ltd 2023 Page 105 of 109
IIE Module Manual IINS5211
It is standard practice in the academic world to recognise and respect the ownership
of ideas, known as intellectual property, through good referencing techniques.
However, there are other reasons why referencing is useful.
Sources
• Books,
• Chapters from books,
• Encyclopaedias,
• Articles,
• Journals,
• Magazines,
• Periodicals,
• Newspaper articles,
• Items from the Internet (images, videos, etc.),
• Pictures,
• Unpublished notes, articles, papers, books, manuscripts, dissertations, theses,
etc.,
• Diagrams,
• Videos,
• Films,
• Music,
• Works of fiction (novels, short stories or poetry).
What You Need to Document from the Hard Copy Source You
are Using
(Not every detail will be applicable in every case. However, the following lists provide
a guide to what information is needed.)
© The Independent Institute of Education (Pty) Ltd 2023 Page 106 of 109
IIE Module Manual IINS5211
Referencing Systems
There are a number of referencing systems in use and each has its own consistent
rules. While these may differ from system-to-system, the referencing system followed
needs to be used consistently, throughout the text. Different referencing systems
cannot be mixed in the same piece of work!
© The Independent Institute of Education (Pty) Ltd 2023 Page 107 of 109
IIE Module Manual IINS5211
Usually, all of the above examples would not be referenced. The equation 𝐸 = 𝑚𝑐 2
is Einstein’s famous equation for calculations of total energy and has become so
familiar that it is not referenced to Einstein.
Sometimes what we think is ‘common knowledge’, is not. For example, the above
statement about the sky being blue is only partly true. The light from the sun looks
white, but it is actually made up of all the colours of the rainbow. Sunlight reaches the
Earth's atmosphere and is scattered in all directions by all the gases and particles in
the air. The smallest particles are by coincidence the same length as the wavelength
of blue light. Blue is scattered more than the other colours because it travels as
shorter, smaller waves. It is not entirely accurate then to claim that the sky is blue. It
is thus generally safer to always check your facts and try to find a reputable source
for your claim.
If you fail to acknowledge the work or ideas of others or do so inadequately this will
be handled in terms of the Intellectual Integrity Policy (available in the library) and/ or
the Student Code of Conduct – depending on whether or not plagiarism and/ or
cheating (passing off the work of other people as your own by copying the work of
other students or copying off the Internet or from another source) is suspected.
© The Independent Institute of Education (Pty) Ltd 2023 Page 108 of 109
IIE Module Manual IINS5211
Please ask for assistance prior to submitting work if you are at all unsure.
© The Independent Institute of Education (Pty) Ltd 2023 Page 109 of 109