Itma

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

Programme: BIT3 Module: ITMA6212

Lecturer: Cainy Binda

Name and Surname: Tshepiso Mathiane

Student Number: St10127879

Group: 2

Cell (Contact details): 079 127 1528


Question 1
1.1) The integration of cutting-edge technology in every functional area of an organization
is referred to as digital transformation (TURBAN, Volonino & Wood., 2015:1). There
are several reasons why organizations require digital transformation integration; this
integration not only alters the actual procedures of business operations but also has
an impact on the culture (TURBAN, Volonino & Wood., 2015:1). Businesses are
undergoing a digital transition as digital technology enables advances that were
unthinkable even a decade ago (TURBAN, Volonino & Wood., 2015:1). High-
performing firms are capitalizing on what is now possible thanks to advancements in
mobile, social, cloud, big data, data analytics, and visualization technologies. These
digital dynamics permit previously unheard-of degrees of connection, or
connectedness (TURBAN, Volonino & Wood., 2015:1).

In general, digitization exists to provide customers with a better experience and


greater value (TURBAN, Volonino & Wood., 2015:1). As a result of digital
transformation, the company's culture and processes evolve by encouraging
increased creativity, innovation, and attentiveness while generating meaningful
experiences for all consumers. This type of change is critical in order to meet the
demands and needs of all company clients or consumers (TURBAN, Volonino &
Wood., 2015:1). If this goal is met, company owners will undoubtedly be successful in
their activities. We live in a mobile-social-cloud-big-data world that shapes corporate
strategy and day-to-day operations. So much data is being collected in a single day
than accumulated in the world decade ago. Half of all data is stored in the cloud and
created through mobile and social activities, which is referred to as big data
(TURBAN, Volonino & Wood., 2015:1).
The following are the primary reasons why firms undergo digital transformation:
 Improved customer experience.
The concept of the customer journey is becoming increasingly important as
businesses transition from a service and product-driven mentality to a digital culture
and a customer-oriented one. Although your products and services are unlikely to
disappear anytime soon, they might become more visible or identifiable with the
help of digitization (TURBAN, Volonino & Wood., 2015:1).
 Technologies that are disruptive and innovative.
Innovative technological alternative solutions are the central vital components in
enterprise digital transformations. There's no denying that the globe experienced a
surge in technological innovation a few years ago (TURBAN, Volonino & Wood.,
2015:1).
 Models of Business Innovation
As business owners' perspectives alter and new technology arise, a plethora of
chances and possibilities emerge. In fact, having a sustainable, clear, and simple
cloud-based business strategy is more necessary and valuable than ever. To compete
in the market, several firms throughout the world began to develop their unique
business models (TURBAN, Volonino & Wood., 2015:1).

Digital transformation has assisted businesses in embracing change and remaining


competitive in an increasingly digital environment. The significance of big data in
digital transformation stems from an organization's capacity to integrate both in its
attempts to allow both digitalization and automation of business activities. This
digitalization and automation are what drives efficiency, innovation, and the
development of new business models (TURBAN, Volonino & Wood., 2015:1). Big data
analytics also enables firms to obtain detailed information about individual or various
client groups. This can include information on what they do on their websites, what
they buy, how frequently they buy it, and if they would buy the same things again in
the future. Using this knowledge, organizations may make changes to suit their
consumers' future wants while also creating targets for how to achieve these needs.
Businesses must thus employ big data and data analytics to complete their digital
transformation (TURBAN, Volonino & Wood., 2015:1).

1.2) The Internet of Things (IoT) is defined as "a network of interconnected computing
devices, mechanical and digital machinery, items, animals, or people with unique IDs
and the capacity to send data across a network without the need for human-to-
human or human-to-computer contact."
The following are the ways they introduced IoT (Kumari, 2021). These are the
following examples of IoT:
 Automated Automobiles.
Tesla and Ford are the two automakers that have already made smart vehicles a
reality. Having a little car used to be a huge problem, but today we live in an era
where smart automobiles are accessible (Kumari, 2021).
 Smart Homes.
Isn't it fascinating if you forget to switch off the lights in your room and can do so
even after leaving? Yes, IoT allows you to do everything at your leisure. Smart houses
are an essential and powerful example of IoT (Kumari, 2021). Nest, Ecobee, Ring, and
other smart home businesses are hoping to create something unprecedented. Smart
houses are expected to become as prevalent as smartphones in the near future
(Kumari, 2021).
 Barcode Scanners
IoT barcode readers are extremely useful for shops since they aid in inventory
management (Kumari, 2021). IoT-based bar card scanners place a premium on cloud
data connectivity in order to communicate with other systems (Kumari, 2021). As a
result, utilizing the attached bar code reader will simplify the inventory management
operation (Kumari, 2021). IoT barcode readers might be integrated into shopping
carts, allowing the scanners to identify goods that are added or deleted from the
basket. As a result, this saves a lot of time and makes things easier for customers and
businesses alike.
 Wearables.
Wearables are in great demand in the market, and major corporations are spending
heavily in the development of these gadgets (Kumari, 2021). Some of these gadgets,
such as smartwatches, may also be used in your daily life. IoT includes any gadget
that is connected to the internet, such as a wristwatch or a Fitbit (Kumari, 2021).
These gadgets have sensors and software that can collect data about their users.
These devices primarily meet exercise, health, and entertainment needs. As a result,
these gadgets may transmit data to offer you with the most complete information
about your wishes (Kumari, 2021).
 Microchips
Microchips are a well-known phrase that is utilized for a variety of applications in
risky and sensitive industries such as defence. Microchips are often employed to
track something or detect data (Kumari, 2021). However, you can now use it to
monitor the activity of your pets (Kumari, 2021). Furthermore, IoT devices are small
in size, run on a low power source, and have limited computing capabilities, for
example. You may either connect a tiny IoT-based microchip to your pet or place it
on their collar so you don't have to physically seek for them and can easily follow
their travels (Kumari, 2021). As a result, your pet will feel more at ease, and you will
be able to keep track of their health records (Kumari, 2021).

Question 2
Data governance, often known as information governance, is the formal control of
organizational data through rules and processes (Stedman, 2020). One purpose of data
governance is to deliver high-quality data that workers and business partners can rely on
and access on demand (Stedman, 2020). Data governance guarantees that data is
consistent and trustworthy, and that it is not misused. It is becoming increasingly important
as firms confront new data privacy requirements and rely on data analytics to assist
improve operations and drive corporate decision-making (Stedman, 2020).
A well-designed data governance program will often consist of a governance team, a
steering committee that serves as the governing body, and a group of data stewards
(Stedman, 2020). They collaborate to develop data governance standards and policies, as
well as implementation and enforcement methods that are generally carried out by data
stewards (Stedman, 2020). In addition to the IT and data management teams, executives
and other officials from an organization's business operations participate (Stedman, 2020).
A business executive is someone who is in charge of operating a company, albeit the
particular nature of the function varies depending on the company. Executives are in charge
of corporations or government bodies (Hertz, 2016). They devise strategies to assist their
businesses in growing (Hertz, 2016).
List of executives involved in data governance:
Chief Data Officer: A senior executive in charge of supervising the data governance
program is known as the chief data officer (CDO). CDO tasks often include obtaining
program approval and money, hiring key personnel, and directing the initiative.
Manager of data governance: The data governance team is led by a program manager. This
might or could not be the CDO. In the absence of a CDO, for example, businesses may
choose to choose a manager to act as the lead.
Data governance committee made up of company executives and other interested parties.
This committee is in charge of developing policies and standards, which are subsequently
implemented by the data governance manager and team. The committee is also in charge
of settling disputes and making policy changes as needed.
Data stewards: are often team members who are experts in specific topics and data assets.
A data steward may be familiar with IT, business, or both. Overseeing data sets, ensuring
policies are effectively executed, and achieving compliance are all possible responsibilities.

Data modelers, data quality analysts, data engineers, and data architects are some of the
various professions that may be involved in the process. Other business roles and
departments should be properly trained to guarantee compliance across all departments.
Data governance gives a clear direction for the team to rally around and achieve business
objectives. Encouragement from the CEO may go a long way toward building a workforce
that expects choices to be based on accurate facts.

Question 3
1. Unicsoft
Unicsoft is a reputable technology consulting firm that provides AI and Blockchain solutions
to help start-ups and corporations achieve their goals (Goodfirms, 2022). The Unicsoft team
has extensive experience in the disciplines of Machine Learning, Natural Language
Processing, Computer Vision, Blockchain, Big Data, Data Science, and Data Analytics
(Goodfirms, 2022). We assist entrepreneurs in validating concepts, creating an MVP,
iterating toward product-market fit, and scaling quickly (Goodfirms, 2022). For businesses,
we offer technology consulting services that include developing business-led solutions and
re-energizing old systems to improve company performance and reduce inefficiencies
(Goodfirms, 2022). Our first concern at Unicsoft is providing an outstanding client
experience. We do this through clear and timely communication, openness in managing
customer expectations, a well-organized development process, and an engaged and
consistent staff (Goodfirms, 2022).
2. Quantium
Data may be transformative when effectively handled and intelligently deployed. Quantium
has a 16-year track record of data science innovation (Goodfirms, 2022). We mix the finest
of human and artificial intelligence to empower individuals, organizations, and society.
Quantium, which was founded in Australia in 2002, works with renowned businesses in
over 20 countries, collaborating on their most difficult issues and uncovering breakthrough
prospects (Goodfirms, 2022).
Healthcare, retail, insurance, entertainment, and business services are some of the most
important clients (Goodfirms, 2022).
3. Dimension data

Dimension Data is a multinational technology integrator and managed services company


that helps its clients achieve great things and create new possibilities by leveraging
technology (Goodfirms, 2022). Dimension Data, founded in 1983, is currently a USD 8 billion
global leader in creating, managing, and optimizing today's growing technological
environments to enable its clients to exploit data in the digital age, convert it to
information, and extract insights (Goodfirms, 2022). Dimension Data, headquartered in
Johannesburg and employing 28,000 people in 46 countries, brings together the best
technologies from industry leaders and niche innovators – from consultancy, technical, and
support services to a fully managed service. Healthcare, retail, insurance, entertainment,
and business services are some of the most important clients (Goodfirms, 2022).

Question 4
4.1) New cyberthreats, including as viruses, lost drives, and distributed denial-of-service
(DDoS) cyberattacks, are arising and modify old ones (TURBAN, Volonino & Wood.,
2015:148). According to specialists, the most significant cybersecurity concerns in the next
years will be sustained threats, mobile computing, and the use of social media for social
engineering (TURBAN, Volonino & Wood., 2015:148).
Human hacking is another term for social engineering, which involves fooling individuals
into exposing their credentials and then utilizing them to gain access to networks or
accounts (TURBAN, Volonino & Wood., 2015:148). From the standpoint of IT security, social
engineering is a hacker's deceit or exploitation of people's proclivity to trust, be helpful, or
just pursue their curiosity (TURBAN, Volonino & Wood., 2015:148). Even the most powerful
IT security solutions cannot prevent what seems to be authorized access. Humans are
readily hacked, making individuals and their social media posts prime targets for
cybercriminals (TURBAN, Volonino & Wood., 2015:148). For example, it is typically simple
to deceive people into downloading and installing harmful programs or backdoors on their
workplace network or mobile devices.

4.2) Advanced persistent threats are some of the deadliest cyberthreats (APT). APT is a type
of network assault in which an unauthorized user obtains access to a network and remains
undiscovered for an extended period of time (TURBAN, Volonino & Wood., 2015:149). APT
assaults are carried out by skilled hackers in order to steal data continually (e.g., daily) over
months or years, rather than to inflict harm that might betray their existence. APTs need
the development of a new information-security strategy that relies on constant monitoring
of network activity and high-value data. Most organizations in the United States lack these
competences (TURBAN, Volonino & Wood., 2015:149).
To get initial access to a network, advanced persistent threats employ a number of tactics.
Attackers may use the internet to deliver malware and gain access, as well as physical
malware infection or external exploitation to gain access to secure networks (TURBAN,
Volonino & Wood., 2015:149).
These assaults differ from many traditional threats, such as viruses and malware, which
continually display the same behaviour and are recycled to attack other systems or
enterprises (TURBAN, Volonino & Wood., 2015:149). Advanced persistent threats do not
take a wide, generic approach; instead, they are meticulously planned and created with the
objective of assaulting a single corporation or organization. As a result, advanced persistent
attacks are highly personalized and clever, built expressly to circumvent a company's
existing security procedures (TURBAN, Volonino & Wood., 2015:149).
However, there are a few significant symptoms that your firm may be under assault by an
advanced persistent threat:
 A surge in logins late at night or when these personnel would not normally use
the network (TURBAN, Volonino & Wood., 2015:149).
 Detection of ubiquitous backdoor Trojans (TURBAN, Volonino & Wood.,
2015:149). Backdoor Trojans are frequently employed by attackers trying an
advanced persistent threat to guarantee that they can maintain access even if
a victim whose login credentials have been compromised finds the breach and
changes his or her credentials (TURBAN, Volonino & Wood., 2015:149).
 Large, unexpected data flows Look for massive data transfers from internal to
internal or external computers. These flows should be distinct from your
company's standard baseline (TURBAN, Volonino & Wood., 2015:149).
 Unexpected data bundles are discovered. Attackers launching an advanced
persistent threat assault frequently gather data within the network before
attempting to transport it outside of it. These data bundles are frequently
located in places where data would not normally be housed within the firm
and are occasionally bundled in archive formats that the company would not
normally utilize (TURBAN, Volonino & Wood., 2015:149).
 Pass-the-hash attacks are detected. These attacks, which steal password
hashes from password-hash-storage databases or memory and utilize them to
construct new, authorized sessions, aren't always employed in sophisticated
persistent threats. Discovering them within your company's network, on the
other hand, is a solid indicator that more research is required (TURBAN,
Volonino & Wood., 2015:149).

Question 5
5.1) Social Media Optimization
The use of social media networks to manage and expand an organization's message and
online presence is known as social media optimization (SMO) (RockContentWriter, 2021).
Social media optimization may be used as a digital marketing approach to raise awareness
of new products and services, engage with consumers, and neutralize potentially bad news
(RockContentWriter, 2021). Social media optimization (SMO) is the process of increasing a
company's or organization's online presence via the use of social media platforms
(RockContentWriter, 2021). It may raise awareness of new products and services while also
allowing businesses to communicate with customers. Digital marketing may be carried out
on popular social media sites such as Facebook, Twitter, Instagram, YouTube, Snapchat,
TikTok, and Pinterest (RockContentWriter, 2021).
Messages on social media platforms can be tailored so that they have a greater impact on
specific groups of individuals (RockContentWriter, 2021). Marketers using social media can
customize their content based on demographic and geographic profiles. For example, a
soft drink maker may post a message about how cold and refreshing a beverage is to
internet users in hot climates (RockContentWriter, 2021). For their audience in cold
climates, they might tell users that drinking their beverage will evoke the sensation of
warm, summery days. SMO, when done correctly, maintains your brand messaging
constant across all networks, enhances your site's search results, attracts traffic from social
sites and organic search, and raises awareness of you and your business
(RockContentWriter, 2021).

5.2) Opportunities for business via social media


People may readily access the internet from anywhere and at any time thanks to home
PCs, laptops, tablets, cell phones, and even internet-enabled televisions (Nibusinessinfo,
2022). Faster connections, more gadgets, and new online apps have all contributed to a
shift in how people work, socialize, and buy (Nibusinessinfo, 2022).
The below are some opportunities:
 Marketing campaigns may be used to directly target customers (Nibusinessinfo,
2022).
 They have the ability to promote new items or services (Nibusinessinfo, 2022).
 They have the ability to raise brand awareness (Nibusinessinfo, 2022).
 They can also communicate with current and future consumers in person
(Nibusinessinfo, 2022).
 They may track sales referrals from your social media activities (Nibusinessinfo,
2022).
Social media may be a low-cost and successful tool to launch a marketing campaign, with a
large impact potential with a small expenditure (Nibusinessinfo, 2022). Your social media
strategy should include a smart combination of compelling material and a pleasant and
responsive 'persona' to develop a targeted community interested in your
product/service/brand and willing to recommend your business to others (Nibusinessinfo,
2022).
Business's Social Media Challenges
There are so many social media tools and platforms to choose from that it may be difficult
to know where to begin (Nibusinessinfo, 2022). The main challenge for small businesses is a
lack of resources; if you don't have someone who can handle a social media campaign, it
may be a time drain and a possible distraction from your primary company (Nibusinessinfo,
2022). Some of the most important issues to address are:
 What do you expect to accomplish by utilizing social media?
 How much time do you have to spend on social media?
 Which platforms are the most beneficial to use?
 What are you hoping to accomplish with your company?
While social media allows you to increase brand exposure and client loyalty, there are risks
to engaging in a public debate forum (Nibusinessinfo, 2022). You must have a firm grasp on
how to manage unfavourable criticism about your company (Nibusinessinfo, 2022). You
must ensure that what you share and how you engage with others offer a professional
picture to the rest of the world. Writing out a set of guidelines for how you will handle
social media will help you navigate the hurdles - read how to establish a social media
strategy for more information (Nibusinessinfo, 2022).

5.3) Understanding how Web technology develops assists managers in determining tactical
challenges as well as opportunities, as well as strategies for a firm to establish long-term
competitive advantages in the marketplace (TURBAN, Volonino & Wood., 2015:229). As a
result, it is critical to keep track of the continual development of APIs, Web development
languages, and other technologies that impact how the Web works (TURBAN, Volonino &
Wood., 2015:229).
APIs: For example, Facebook APIs dictate the type of apps that may be built to connect with
fundamental Facebook functions (TURBAN, Volonino & Wood., 2015:229). Major
modifications to the Facebook APIs are frequently heralded with enthusiasm because they
define new potential for users to produce and share content on Facebook and across the
Web (TURBAN, Volonino & Wood., 2015:229).
Web technologies enable businesses to project a certain image while also attracting and
retaining clients. Customer relationship management software apps ensure a better
interaction with customers (TURBAN, Volonino & Wood., 2015:229).
Plug-ins: Plug-ins are widgets or functionalities on non-Facebook sites that connect in some
manner with Facebook (TURBAN, Volonino & Wood., 2015:229). CNN.com, for example,
may feature a Recommend button on all of its news items. When a Facebook user clicks the
button, an automated link to the story is established on the person's Facebook profile
(TURBAN, Volonino & Wood., 2015:229). You don't have to be a Web developer to
comprehend and follow public announcements regarding API upgrades from Facebook,
Google Maps, YouTube, Twitter, and other prominent social media sites (TURBAN, Volonino
& Wood., 2015:229).

Question 6
Mobile banking is a relatively new financial service that is quickly gaining traction among
individuals and companies. More than half of the top 100 banks in the United States
provide mobile banking1, and around 19 million American households utilize it. 2 According
to analysts, mobile banking will continue to increase, perhaps reaching 38 million
households by 2015. However, if the technology becomes more widely used, there is a
greater risk of fraud, which may affect financial institutions and clients (TURBAN, Volonino
& Wood., 2015:289).
Security risk in mobile banking:
 Cloning. Duplicating one phone's electronic serial number (ESM) and utilizing it in a
second phone, the clone. This enables the culprit to charge calls and other
transactions to the original phone (TURBAN, Volonino & Wood., 2015:290).
 Phishing Using a forged communication, such as an e-mail, to dupe the recipient into
disclosing sensitive information such as account numbers, passwords, or other
identifying information (TURBAN, Volonino & Wood., 2015:290).
 Smishing The fraudulent communication is similar to phishing; however, it takes the
shape of an SMS message (TURBAN, Volonino & Wood., 2015:290).
 Vishing. Similar to phishing, except the fraudulent communication takes the form of
a voice or voicemail message persuading the victim to give sensitive information.
 Cell phones that have been lost or stolen can be used to undertake financial
transactions without the owner's authorization (TURBAN, Volonino & Wood.,
2015:290).
 Unauthorized third parties acquiring access to online bank accounts by utilizing login
credentials acquired directly, released publicly following a data breach at the target's
own bank, or taken from the victim themselves using social engineering.
 Shoulder surfing is the practice of a criminal looking over a victim's shoulder (or
watching them on CCTV) when they login on their computer or mobile device and
having their login details ‘sniffed' (stolen) across unsecured Wi-Fi networks and rogue
hotspots.
Tips for ensuring the safety of social media:
 Locking your mobile device with a PIN code (an acceptable degree of protection) or a
longer password (more secure, if you use a combination of letters, numbers, symbols
and avoid using common words).
 Being aware of your surroundings and who may be observing you directly or through
any cameras in the area.
 Allowing a website or app to remember your login data is never a good idea - such
convenience might end up costing you a lot of money.
 Keeping your mobile banking app, as well as the device's operating system, up to
date.
 Keep an eye out for rogue emails that urge you to connect into your bank account
through a link in the email — your bank should never ask you to do this.
 Download banking and other programs only from legitimate sources, such as Google
Play and Apple's App Store, as third-party websites are frequently known to include
rogue versions of popular software.
 Consider installing a mobile security solution - numerous apps, including those from
the security industry's largest names, are available for free on mobile platforms.
References
 Goodfirms, 2022. Top Big Data Analytics Companies in South Africa. [Online]
Available at: https://www.goodfirms.co/big-data-analytics/south-africa
[Accessed 13 April 2022].
 Hertz, I., 2016. 5 reasons CEOs need to start caring about data governance. [Online]
Available at: https://betanews.com/2016/08/12/5-reasons-ceos-need-to-start-caring-about-data-
governance/#:~:text=Build%20the%20Executive%20Team&text=Data%20governance%20provides
%20clear%20direction,be%20made%20with%20reliable%20data.
[Accessed 13 April 2022].
 Kumari, R., 2021. Top 10 Internet of Things (IoT) Examples. [Online]
Available at: https://www.analyticssteps.com/blogs/top-internet-things-iot-examples
[Accessed 13 April 2022].
 Nibusinessinfo, 2022. Social media best practice for business. [Online]
Available at: https://www.nibusinessinfo.co.uk/content/social-media-business-opportunities-and-
challenges
[Accessed 13 April 2022].
 RockContentWriter, 2021. What is Social Media Optimization (SMO) and How to Improve Your
Content for Social Media. [Online]
Available at: https://rockcontent.com/blog/social-media-optimization/
[Accessed 13 April 2022].
 Stedman, C., 2020. What is data governance and why does it matter?. [Online]
Available at: https://www.techtarget.com/searchdatamanagement/definition/data-governance
[Accessed 13 April 2022].
 TURBAN, E., VOLONINO, L. & WOOD, G. R., 2015. Information Technology for Management. 10th
ed. United States of America: John Wiley & Sons, Inc.

You might also like