Information Technology

HC1041 Information Technology For Business

11 April 2023 08:45 AM | UPDATED 2 years ago

HC1041 Information Technology For Business :

For solution: +610482078788

+61482073403

+61482072848

HC1041 Information Technology For Business
HC1041 Information Technology For Business

 Assessment Details and Submission Guidelines                                                         Trimester                             T2 2022

Unit Code                            HC1041

Unit Title                             Information Technology for Business

Assessment Type              Individual assessment

Assessment Title               The impact of IT on businesses

Purpose of the                   Students are required to research on a real-life business and the impact of IT on the

assessment (with UL   chosen business.

Mapping)                                    1. Students will be able to evaluate and justify theoretical and practical knowledge of information technology in a business context [ULO 1].

  • Students will be able to analyse information technology issues in a business environment and provide solutions to these issues using their knowledge of information technology and practical techniques in a business environment [ULO 2].
  • Students will be able to apply research skills to analyse academic literature and integrate ideas from the literature to business information technology issues and prepare for life-long learning [ULO 3].
  • Students will be able to understand the ICT profession in information technology [ULO 4].
  • Students will be able to communicate using effective oral and written communication tools and act professionally [ULO 5].
  • Students will be able to review and describe the major privacy, legal, ethical and societal issues with respect to managing digital information and information systems [ULO 6].

Weight                                  20% of the total marks

Total Marks                        20

Word limit                           1500-2000 words

Due Date                             Week 10 on Friday, dated 23th Sept 2022, at 11:59 pm (AEST).

Submission • All work must be submitted on Blackboard by the due date along with a completed Assignment Cover Page.

Additional Instructions:

  • The assignment must be in MS Word format, double spacing, 12-pt Arial font and 2 cm margins on all four sides of the page with appropriate section headings and page numbers.
  • Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using Adapted Harvard Referencing style. Please see the section Assignment Design – Adapted Harvard Referencing Section below.
  • Include a minimum of ten references, at least five from peer-reviewed journals relevant to the unit.

ASSIGNMENT DETAILS

Purpose: This assignment aims to conduct research about your chosen company or organisation and address the following points to produce a report.

Company Selection: You can only choose one of the following businesses or organisations:

  • Tesla
    • JBS Foods
    • Facebook
    • Yahoo
    • AXA

Assignment Requirements: Your report must address the following key areas. Your focus should be IT or Technology based. You may include graphics, tables and other animation to enhance your report.

  1. A brief background of your selected company and the industry it is associated with.
  2. Identify any key business competitors and any competitive advantage they may have within the IT field.
  3. How is IT utilised within your chosen business to assist their daily operations and customer service?
  4. What skills would you need as a new computing employee to work within your selected company.
  5. What type of risks does IT bring to your chosen business? (i.e. security, privacy, confidentiality). More importantly, how has ransomware affected the organisation, and how do they deal with the ransomware attack. Also, did the criminals expect to get paid?
  6. What steps they should have taken in the first place to stop or limit such an attack on their information systems?
  7. Conclusion/Recommendation.

Your report will be assessed on your research and report presentation quality. Discussion must be relevant to your chosen business or organisation.

ASSIGNMENT STRUCTURE

Your report may include the following components. [Suggestion only]

Executive Summary

The executive summary should be concise and not involve too much detail. It should make commentary on the main points only and follow the sequence of the report. Write the executive summary after the report is completed, and once you have an overview of the whole text.

Table of Contents

This needs to show a logical listing of all the sub-headings of the report’s contents. Note this is excluded from the total word count.

Introduction

Typically, the introduction is a short paragraph that includes background, scope and the main points raised in the order of importance. There should be a brief conclusion statement at the end of the introduction.

Main Body Paragraphs with Numbered Sub-headings

This section contains detailed information which elaborates on the main points raised in the introduction. Each paragraph should begin with an exact topic sentence, then supporting sentences with facts and evidence obtained from research and finish with a concluding sentence.

Conclusion

This section contains a logical and coherent evaluation of the work you have performed during this assessment.

References

Please see the “Assessment Design – Adapted Harvard Referencing” section for the referencing guidelines.

Appendices

This section includes any additional explanatory information, which is supplementary and graphical to help communicate the main ideas made in the report. Refer to the appendices in the main body paragraphs as and where appropriate. (Note this is excluded from the total word count.)

Note: The report should be grounded on relevant literature, and all references must be cited appropriately and included in the reference list.

ASSESSMENT DESIGN – ADAPTED HARVARD REFERENCING

As a pilot program, Holmes implements a revised Harvard approach to referencing. The following guidelines apply:

  1. Reference sources in assignments are limited to sources that provide full-text access to the source’s content for lecturers and markers.
  2. The Reference list should be located on a separate page at the end of the essay and titled: References.
  3. It should include the details of all the in-text citations, arranged A-Z alphabetically by author surname. In addition, it MUST consist of a hyperlink to the full text of the cited reference source.

For example;

Hawking P, McCarthy B, Stein A (2004), Second Wave ERP Education, Journal of Information Systems Education, Fall, http://jise.org/Volume15/n3/JISEv15n3p327.pdf

  • All assignments will require additional in-text reference details, which will consist of the surname of the author/authors or name of the authoring body, year of publication, page number of content, the paragraph where the content can be found.

For example;

“The company decided to implement a enterprise wide data warehouse business intelligence strategies (Hawking et al, 2004, p3(4)).”

Non-Adherence to Referencing Guidelines

Where students do not follow the above guidelines:

  1. Students who submit assignments that do not comply with the guidelines will be asked to resubmit their assignments.
  2. As per the Student Handbook, late penalties will apply each day after the student/s have been notified of the resubmission requirements.
  3. Students who comply with guidelines and the citations are “fake” will be reported for academic misconduct.

SUBMISSION INSTRUCTIONS

  • Save submission with your student id number and unit code, e.g. EMV54897_HC1041
    • Submission must be in Microsoft Word format only.
    • Upload your submission to the appropriate link on Blackboard       •     Please ensure your submission is the correct document.
    • All submissions are automatically passed through SafeAssign to assess academic integrity.
    • Where required, you must adhere to Adapted Harvard rules of in-text referencing and your reference list for your answers.

Marking criteria

MARKING CRITERIA OVERVIEW

Weighting in Total Grades

A brief background of your selected company/industry                                                                                   2%

Identify any key competitor of the business and any competitive advantage they may

4%

have within the IT field.

How is IT utilised within your chosen business to assist their daily operations and

4%

customer service?

What skills would you need to work within your selected company as a new

3%

computing employee?

What type of risks does IT bring to your chosen business?                                                                               3%

What steps should they have taken in the first place to stop or limit such an attack on

2%

their information systems?

Conclusion/Recommendations                                                                                                                                   2%

TOTAL Weight                                                                                                                                                               20%

MARKING RUBRIC DETAIL VIEW

 ExcellentVery GoodGoodSatisfactoryUnsatisfactory
 (80-100%)(70-79%)(60-69%)(50-59%)(0-49%)
A brief background of yourAn excellentA very good discussionA good discussion on theAn adequate discussionInappropriate discussion
selected company/industry.discussion on theon the background ofbackground of youron the background ofon the background of
[2 Marks].background of youryour selectedselectedyour selectedyour selected
 selectedcompany/industry.company/industry.company/industry.company/industry.
 company/industry.    
Identify any key competitorDemonstrate anDemonstrate a very goodDemonstrate a goodDemonstrate anUnable to present a
of the business and anyexcellentunderstanding of keyunderstanding of keyadequate understandingproper discussion of key
competitive advantage theyunderstanding of keybusiness competitors andbusiness competitors andof key businessbusiness competitors and
may have within the IT field.business competitorscompetitive advantage.competitive advantage.competitors andcompetitive advantage.
[4 Marks].and competitive  competitive advantage. 
 advantage.    
How is IT utilised withinPresent an excellentPresent a very goodPresent a goodPresent a discussionUnable to present a
your chosen business todiscussion on thediscussion on thediscussion on theon the utilisation ofproper discussion on the
assist their daily operationsutilisation of ITutilisation of IT withinutilisation of IT withinIT within theutilisation of IT within
and customer service? [4within the business.the business.the business.business.the business.
Marks].     
As a new computingPresent an excellentPresent a very goodPresent a goodPresent a reasonableUnable to present a
employee, what skills woulddiscussion on thediscussion on the skillsdiscussion on the skillsdiscussion on the skillsdiscussion on the skills
you need to work withinskills required torequired to work withinrequired to work withinrequired to work withinrequired to work within
your selected company? [3work within thethe selected company.the selected company.the selected company.the selected company.
Marks].selected company.    
What type of risks does ITPresent an excellentPresent a very goodPresent a goodPresent a reasonableUnable to present a
bring to your chosendiscussion on thediscussion on the risksdiscussion on the risksdiscussion on the risksdiscussion on the risks
business? [3 Marks].risks that IT brings tothat IT brings to thethat IT brings to thethat IT brings to thethat IT brings to the
 the selected company.selected company.selected company.selected company.selected company.

What steps should they have taken in the first place to stop or limit such an attack on their information systems?

[2 Marks]

Present an excellent discussion on the steps taken in the first place to stop or limit an attack on the information systems.

Present a very good discussion on the steps taken in the first place to stop or limit an attack on the information systems.

Present        a        good discussion on the steps taken in the first place to stop or limit an attack on the information systems.

Present      a     reasonable discussion on the steps taken in the first place to stop or limit an attack on the information systems.

Unable to present a discussion on the steps taken in the first place to stop or limit an attack on the information systems.

Conclusions and

Recommendations. [2 Marks]

The report included

all elements and is very well presented.

The writing flowed clearly, and sections were linked very effectively.

Referencing is exemplary.

English is used very effectively and is error-free.

An extensive amount of high-quality

evidence from peer- reviewed journal articles and other sources are included and used effectively to support the

discussion.

The report included all

elements and is well presented.

The writing flowed clearly, and sections were linked effectively.

Referencing is of a high standard.

English is used effectively with very few errors present.

A broad range of quality peer-reviewed journal references and other sources are included and used effectively to support the discussion.

The report included all

elements and is generally presented appropriately.

The writing flowed well in most cases, and sections are linked.

Referencing is in accordance with guidelines.

English is used effectively with few errors present.

An adequate range of peer-reviewed journal references is included and used to support the discussion.

The report included most

elements and is adequately presented.

Writing sometimes does not flow clearly, leaving the paper to seem

disjointed in areas.

Referencing is somewhat in accordance with guidelines.

Basic English is used with some errors present.

An adequate range of peer-reviewed journal references are included and used to a basic extent to support the discussion.

The report lacked some

elements and was poorly presented.

Writing often does not flow clearly, leaving the paper to seem somewhat disjointed.

Referencing is not entirely in accordance with relevant guidelines.

Basic English is used with errors present.

Little or no peer- reviewed journal references are included, and these are rarely used to support discussion

effectively.

Total Marks (20 Marks)

ACADEMIC INTEGRITY

Holmes Institute is committed to ensuring and upholding Academic Integrity, as Academic Integrity is integral to maintaining academic quality and the reputation of Holmes’ graduates. Accordingly, all assessment tasks need to comply with academic integrity guidelines. Table 1 identifies the six categories of Academic Integrity breaches. If you have any questions about Academic Integrity issues related to your assessment tasks, please consult your lecturer or tutor for relevant referencing guidelines and support resources. Many of these resources can also be found through the Study Sills link on Blackboard.

Academic Integrity breaches are a serious offence punishable by penalties that may range from deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment, or cancellation of course enrolment.

Please refer to the schools’ handbook for further direction.

Table 1: Six categories of Academic Integrity breaches

    PlagiarismReproducing the work of someone else without attribution. When a student submits their own work on multiple occasions this is known as self-plagiarism.
  Collusion  Working with one or more other individuals to complete an assignment, in a way that is not authorised.
    CopyingReproducing and submitting the work of another student, with or without their knowledge. If a student fails to take reasonable precautions to prevent their own original work from being copied, this may also be considered an offence.
  ImpersonationFalsely presenting oneself, or engaging someone else to present as oneself, in an in-person examination.
    Contract cheatingContracting a third party to complete an assessment task, generally in exchange for money or other manner of payment.
  Data fabrication and falsification  Manipulating or inventing data with the intent of supporting false conclusions, including manipulating images.

Source: INQAAHE, 2020

——END OF DOCUMENT——

Visit:https://auspali.info/

Also visit:https://www.notesnepal.com/archives/767

For solution: +610482078788

+61482073403

+61482072848