Sunday 29 October 2017

Week 6

DAY 25     MONTH 10


Lecture time...

Today's Topic: Data Management!!! 


What is Data Management?
Development of practices, procedures or policies for effective information management.

What is Data?

  • Profession
  • Information
  • Analysis tool to determine the pattern and trend
  • 4G????? 

What is Big Data?
Extremely large data that have to be processed to analyse the pattern and trend.

Why we need Big Data?
when you want to use all the data obtained and use it for various functions.

How to process big data?
We need data mining to convert raw data into useful information.

Steps For Data Mining:














What are the examples of  data collection mechanism?

  • Radio-Frequency Identification (RFID) : Scanning barcode, PLUS
  • Transaction Processing System (TPS) : Electronic cash register (ECR)


Lab time...
Software and apps can be used to edit photos:

  • photoshop
  • be funky
  • canvas
  • photogrid
Steps to filter legal photo in Goocle image: 

  1. Search image
  2. Tools
  3. Usage rights
  4. Labeled for reuse
Otherwise, you can visit Freepik.com to get pictures free for use.

Netiquette = Net Ettiquette
  • Rule 1: Remember the Human
  • Rule 2: Adhere to the same standards of behavior online that you follow in real life
  • Rule 3: Know where you are in cyberspace
  • Rule 4: Respect other people's time and bandwidth
  • Rule 5: Make yourself look good online
  • Rule 6: Share expert knowledge
  • Rule 7: Help keep flame wars under control
  • Rule 8: Respect other people's privacy
  • Rule 9: Don't abuse your power
  • Rule 10: Be forgiving of other people's mistakes
(Source: http://www.albion.com/netiquette/corerules.html)

zoom.com

  • A website provide video conferencing function via web
  • Easy to use
  • Provide translation

Friday 13 October 2017

Week 5 (Part II)


REFLECTION!!!

  1. Review of Ethics, Privacy and Security
  • Ethic is very important to control the cyber crime in order to protect our privacy from being access by others without consent. Therefore, laws or policies should be implemented to control the unethical activities through information system. On the other hand, we should be aware of the security of our profile or data especially those published in social media. 

     2. Why you need skills of spreadsheet?

  • Spreadsheet is a very useful tools for all kind of industries. It save our time and effort to analyse the data since we can use a very simple way to calculate the data we need. Therefore, it is important for us to learn the skills of spreadsheet in this fast-paced environment. In addition, we can also draw all types of charts and graph in just a few minutes. Spreadsheet also provides many type of designs for us to decorate our charts automatically. By learning the skills of spreadsheet, it will become an extra advantage on future workplace life. Besides that, we should also have to learn spreadsheet skills in order to analyse our data in our final year project. 



Week 5 (Part I)

DAY 11     MONTH 10

Lecture time...
Today, the lecture topic is ethic and security. Ethic and security is crucial for a information system. Why we need ethics and security? 
Ethics is important to embedded by everyone to the use IT to do something bad or criminal. Security is necessary when people can access our data without any permission. 

How government cultivate ethics and enhance security?
Privacy codes and policies is practiced to protect the health information that collected, used and disclosed by health agencies. Besides that, Akta 709 is launched to protect our profile or data from being used by other people without our consent.

Why we need to protect databases?
Once the databases being hacked, the data can be manipulated and will bring negative impact to an organization, especially the databases regarding customer relationship management (CRM). For us, we can upload our databases to cloud to prevent databases being manipulated. 

Vulnerability refers to the strength of our profile being protected. What are the keys drive to the increase of vulnerability?

  • interconnected, interdependent business environment
  • everyone want faster device
  • reduced skills to become hacker
  • cybercrime
  • lack of management support
"Information system can be used for good things, but if lack of ethics, it will become negative!"

Lab time...
Firstly, we have learned about the tips to develop websites. Websites should have flow starts from the first page/ homepage to other pages.

What is Geo-targeting?
A strategy that used to attract more people at targeted place to visit your websites.

Key elements of an effective websites:
     1. Appearance
    • Not more than 3 colours 
    • Font size in 10-12 pt 
    • Not more than 3 or 4 images per page
    • Use of high quality images
    • Keep the page simple with adequate empty space

    2. Content
    • Short and organized copy
    • Update content regularly
    • Interact with visitors by frequently use the word "you"
    • Using professional to write the text content
   3. Functionality
    • ensure every component in the websites work quick and correctly to avoid broken links
   4. Usability
    • Easy to read, navigate and understand
    • simple design, fast loading pages, minimal scroll, consistent layout, logical nagivation by  placing the menu obviously,descriptive link text, high screen resolution
   5. Search engine optimization (SEO)
    • use HTML format in written content. Avoid to use Flash, JavaScript or image-only objects as the navigational items.
    • Use crucial keywords frequently
    • avoid to use too many tables and use Cascading Style Sheets for layout and positioning; keep your HTML code clutter-free.
    • Leverage your links -- make them descriptive and use your keywords in the link text
There are two websites introduced by Dr, and I was wondered by those websites! 
First is Wayback machine, an internet tool that used for website analytic. By just enter the websites address, this internet tool will allowed us look at the evolution or history of that websites. For example, the date of the website being launched. 


Second is Alexa.com. We can look through the statistical analysis of the websites from this websites. For example, by enter the websites address that you want to check for, the number of visitors that from different countries will be shown. 



After that, we were having a Excel practice in the lab class. We have learned how to sum up the value from the columns and rows. Besides that, We have also learned to construct 3 types of chart using spreadsheet.


Saturday 7 October 2017

Week 4

DAY 04      MONTH 10

Lecture time...
It was a cloudy morning. But we don't feel cloudy because we were having our third IS class today:) The topic of today's class is e-commerce and global collaboration. As we know, to survive or succeed in a  marketplace, the businesses should have their competitive advantages. Nowadays, information technology is potential to become the competitive advantage of a business. Today, we can easily found many people start their online business through social mediasss. Besides that, many virtual companies also have their own Facebook pages or official instagram in order to communicate with customers. Although social medias are easy (and FREE!) to use and can attract more people, a business still need the website because it is more formal and official so that can gain the trust of customers. ( thinking of our CIP now... ) 



Let's talk about the story of FireFox web browser. I think most people are the ex-users of Internet Explore (IE) right?? I think most of you abandon IE is because can't endure the slow loading speed right?(shhh). Actually, the IE became so miserable is because of the hard work of a bunch of foxes (hackers)! This bunch of hackers were on the line and held the same goal, that was kick IE out. They dreamed to replace the position of IE as the leading of web browser in world and finally develop the "FireFox". They use the idea of somewhat awesome, so called open source to operate FireFox. The open source idea is aimed to make all the things the internet be free to access, in other words we can download and use that web browser for free. For your information, one of the open source example around us is Massive Open Online Course (MOOC).

Bussiness via internet is known as e-business or e-commerce. I was wondering that both terms are not the same. What is the main difference between e-business and e commerce??
e-business ➙ no online transaction
e-commerce ➙ provide online transaction


Diffusion of innovation (DOI) curve:


Innovators are those develop a completely new things. Early adopters are tend to accept a completely new things. Most of the people are early majority and late majority that fear to accept a new things. While laggards those old fashion that resist of any new things. What type of people you are?

Lab time...

It was my first time access to wix.com. Before that, I have saw it's advertisement on youtube but I don't mind it. Wix.com is a website creator that can help us to create our own website for FREE!!! As long as we have a email address or Facebook account. The advantages of is website editor are that it has many types of fashionable template styles for us to choose and we don't need to create and design the icons by ourselves. In my opinion, wix.com is not so hard to operate and it has many features that are interesting. Most important, all the design of the website are following the trends today (claps).



The class was ended with a task, that was to create our own personal website using wix.com as for a practice to prepare our CIP. 

Week 14

Day 20       Month 12 The End of IS Journey... Time flies. Today is the last class for  course FSM 4401. By the way, Dr Fareed have cover...