HC1041 Impact Of IT On Businesses :
HC1041 Impact Of IT On Businesses Assessment Details and Submission Guidelines Trimester T2 2022
Unit Code HC1041
Unit Title Information Technology for Business
Assessment Type Individual assessment
Assessment Title The Impact Of IT On Businesses
Purpose of the Students are required to research on a real-life business and the impact of IT on the
assessment (with UL chosen business.
Mapping) 1. Students will be able to evaluate and justify theoretical and practical knowledge of information technology in a business context [ULO 1].
- Students will be able to analyse information technology issues in a business environment and provide solutions to these issues using their knowledge of information technology and practical techniques in a business environment [ULO 2].
- Students will be able to apply research skills to analyse academic literature and integrate ideas from the literature to business information technology issues and prepare for life-long learning [ULO 3].
- Students will be able to understand the ICT profession in information technology [ULO 4].
- Students will be able to communicate using effective oral and written communication tools and act professionally [ULO 5].
- Students will be able to review and describe the major privacy, legal, ethical and societal issues with respect to managing digital information and information systems [ULO 6].
Weight 20% of the total marks
Total Marks 20
Word limit 1500-2000 words
Due Date Week 10 on Friday, dated 23th Sept 2022, at 11:59 pm (AEST).
Submission • All work must be submitted on Blackboard by the due date along with a completed Assignment Cover Page.
- The assignment must be in MS Word format, double spacing, 12-pt Arial font and 2 cm margins on all four sides of the page with appropriate section headings and page numbers.
- Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using Adapted Harvard Referencing style. Please see the section Assignment Design – Adapted Harvard Referencing Section below.
- Include a minimum of ten references, at least five from peer-reviewed journals relevant to the unit.
Impact Of IT ASSIGNMENT DETAILS
Purpose: This HC1041 Impact Of IT On Businesses assignment aims to conduct research about your chosen company or organisation and address the following points to produce a report.
Company Selection: You can only choose one of the following businesses or organisations:
- JBS Foods
Assignment Requirements: Your report must address the following key areas. Your focus should be IT or Technology based. You may include graphics, tables and other animation to enhance your report.
- A brief background of your selected company and the industry it is associated with.
- Identify any key business competitors and any competitive advantage they may have within the IT field.
- How is IT utilised within your chosen business to assist their daily operations and customer service?
- What skills would you need as a new computing employee to work within your selected company.
- What type of risks does IT bring to your chosen business? (i.e. security, privacy, confidentiality). More importantly, how has ransomware affected the organisation, and how do they deal with the ransomware attack. Also, did the criminals expect to get paid?
- What steps they should have taken in the first place to stop or limit such an attack on their information systems?
Your report will be assessed on your research and report presentation quality. Discussion must be relevant to your chosen business or organisation.
Your report may include the following components. [Suggestion only]
The executive summary should be concise and not involve too much detail. It should make commentary on the main points only and follow the sequence of the report. Write the executive summary after the report is completed, and once you have an overview of the whole text.
Table of Contents
This needs to show a logical listing of all the sub-headings of the report’s contents. Note this is excluded from the total word count.
Typically, the introduction is a short paragraph that includes background, scope and the main points raised in the order of importance. There should be a brief conclusion statement at the end of the introduction.
Main Body Paragraphs with Numbered Sub-headings
This HC1041 Impact Of IT On Businesses section contains detailed information which elaborates on the main points raised in the introduction. Each paragraph should begin with an exact topic sentence, then supporting sentences with facts and evidence obtained from research and finish with a concluding sentence.
This section contains a logical and coherent evaluation of the work you have performed during this assessment.
Please see the “Assessment Design – Adapted Harvard Referencing” section for the referencing guidelines.
This section includes any additional explanatory information, which is supplementary and graphical to help communicate the main ideas made in the report. Refer to the appendices in the main body paragraphs as and where appropriate. (Note this is excluded from the total word count.)
Note: The report should be grounded on relevant literature, and all references must be cited appropriately and included in the reference list.
ASSESSMENT DESIGN – ADAPTED HARVARD REFERENCING
As a pilot program, Holmes implements a revised Harvard approach to referencing. The following guidelines apply:
- Reference sources in assignments are limited to sources that provide full-text access to the source’s content for lecturers and markers.
- The Reference list should be located on a separate page at the end of the essay and titled: References.
- It should include the details of all the in-text citations, arranged A-Z alphabetically by author surname. In addition, it MUST consist of a hyperlink to the full text of the cited reference source.
Hawking P, McCarthy B, Stein A (2004), Second Wave ERP Education, Journal of Information Systems Education, Fall, http://jise.org/Volume15/n3/JISEv15n3p327.pdf
- All assignments will require additional in-text reference details, which will consist of the surname of the author/authors or name of the authoring body, year of publication, page number of content, the paragraph where the content can be found.
“The company decided to implement a enterprise wide data warehouse business intelligence strategies (Hawking et al, 2004, p3(4)).”
Non-Adherence to Referencing Guidelines
Where students do not follow the above guidelines:
- Students who submit assignments that do not comply with the guidelines will be asked to resubmit their assignments.
- As per the Student Handbook, late penalties will apply each day after the student/s have been notified of the resubmission requirements.
- Students who comply with guidelines and the citations are “fake” will be reported for academic misconduct.
- Save submission with your student id number and unit code, e.g. EMV54897_HC1041
- Submission must be in Microsoft Word format only.
- Upload your submission to the appropriate link on Blackboard • Please ensure your submission is the correct document.
- All submissions are automatically passed through SafeAssign to assess academic integrity.
- Where required, you must adhere to Adapted Harvard rules of in-text referencing and your reference list for your answers.
MARKING CRITERIA OVERVIEW
Weighting in Total Grades
A brief background of your selected company/industry 2%
Identify any key competitor of the business and any competitive advantage they may
have within the IT field.
How is IT utilised within your chosen business to assist their daily operations and
What skills would you need to work within your selected company as a new
What type of risks does IT bring to your chosen business? 3%
What steps should they have taken in the first place to stop or limit such an attack on
their information systems?
TOTAL Weight 20%
MARKING RUBRIC DETAIL VIEW
|A brief background of your||An excellent||A very good discussion||A good discussion on the||An adequate discussion||Inappropriate discussion|
|selected company/industry.||discussion on the||on the background of||background of your||on the background of||on the background of|
|[2 Marks].||background of your||your selected||selected||your selected||your selected|
|Identify any key competitor||Demonstrate an||Demonstrate a very good||Demonstrate a good||Demonstrate an||Unable to present a|
|of the business and any||excellent||understanding of key||understanding of key||adequate understanding||proper discussion of key|
|competitive advantage they||understanding of key||business competitors and||business competitors and||of key business||business competitors and|
|may have within the IT field.||business competitors||competitive advantage.||competitive advantage.||competitors and||competitive advantage.|
|[4 Marks].||and competitive||competitive advantage.|
|How is IT utilised within||Present an excellent||Present a very good||Present a good||Present a discussion||Unable to present a|
|your chosen business to||discussion on the||discussion on the||discussion on the||on the utilisation of||proper discussion on the|
|assist their daily operations||utilisation of IT||utilisation of IT within||utilisation of IT within||IT within the||utilisation of IT within|
|and customer service? [4||within the business.||the business.||the business.||business.||the business.|
|As a new computing||Present an excellent||Present a very good||Present a good||Present a reasonable||Unable to present a|
|employee, what skills would||discussion on the||discussion on the skills||discussion on the skills||discussion on the skills||discussion on the skills|
|you need to work within||skills required to||required to work within||required to work within||required to work within||required to work within|
|your selected company? [3||work within the||the selected company.||the selected company.||the selected company.||the selected company.|
|What type of risks does IT||Present an excellent||Present a very good||Present a good||Present a reasonable||Unable to present a|
|bring to your chosen||discussion on the||discussion on the risks||discussion on the risks||discussion on the risks||discussion on the risks|
|business? [3 Marks].||risks that IT brings to||that IT brings to the||that IT brings to the||that IT brings to the||that IT brings to the|
|the selected company.||selected company.||selected company.||selected company.||selected company.|
What steps should they have taken in the first place to stop or limit such an attack on their information systems?
Present an excellent discussion on the steps taken in the first place to stop or limit an attack on the information systems.
Present a very good discussion on the steps taken in the first place to stop or limit an attack on the information systems.
Present a good discussion on the steps taken in the first place to stop or limit an attack on the information systems.
Present a reasonable discussion on the steps taken in the first place to stop or limit an attack on the information systems.
Unable to present a discussion on the steps taken in the first place to stop or limit an attack on the information systems.
Recommendations. [2 Marks]
The report included
all elements and is very well presented.
The writing flowed clearly, and sections were linked very effectively.
Referencing is exemplary.
English is used very effectively and is error-free.
An extensive amount of high-quality
evidence from peer- reviewed journal articles and other sources are included and used effectively to support the
The report included all
elements and is well presented.
The writing flowed clearly, and sections were linked effectively.
Referencing is of a high standard.
English is used effectively with very few errors present.
A broad range of quality peer-reviewed journal references and other sources are included and used effectively to support the discussion.
The report included all
elements and is generally presented appropriately.
The writing flowed well in most cases, and sections are linked.
Referencing is in accordance with guidelines.
English is used effectively with few errors present.
An adequate range of peer-reviewed journal references is included and used to support the discussion.
The report included most
elements and is adequately presented.
Writing sometimes does not flow clearly, leaving the paper to seem
disjointed in areas.
Referencing is somewhat in accordance with guidelines.
Basic English is used with some errors present.
An adequate range of peer-reviewed journal references are included and used to a basic extent to support the discussion.
The report lacked some
elements and was poorly presented.
Writing often does not flow clearly, leaving the paper to seem somewhat disjointed.
Referencing is not entirely in accordance with relevant guidelines.
Basic English is used with errors present.
Little or no peer- reviewed journal references are included, and these are rarely used to support discussion
Total Marks (20 Marks)
Holmes Institute is committed to ensuring and upholding Academic Integrity, as Academic Integrity is integral to maintaining academic quality and the reputation of Holmes’ graduates. Accordingly, all assessment tasks need to comply with academic integrity guidelines. Table 1 identifies the six categories of Academic Integrity breaches. If you have any questions about Academic Integrity issues related to your assessment tasks, please consult your lecturer or tutor for relevant referencing guidelines and support resources. Many of these resources can also be found through the Study Sills link on Blackboard.
Academic Integrity breaches are a serious offence punishable by penalties that may range from deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment, or cancellation of course enrolment.
Please refer to the schools’ handbook for further direction.
Table 1: Six categories of Academic Integrity breaches
|Plagiarism||Reproducing the work of someone else without attribution. When a student submits their own work on multiple occasions this is known as self-plagiarism.|
|Collusion||Working with one or more other individuals to complete an assignment, in a way that is not authorised.|
|Copying||Reproducing and submitting the work of another student, with or without their knowledge. If a student fails to take reasonable precautions to prevent their own original work from being copied, this may also be considered an offence.|
|Impersonation||Falsely presenting oneself, or engaging someone else to present as oneself, in an in-person examination.|
|Contract cheating||Contracting a third party to complete an assessment task, generally in exchange for money or other manner of payment.|
|Data fabrication and falsification||Manipulating or inventing data with the intent of supporting false conclusions, including manipulating images.|
Source: INQAAHE, 2020
——END OF DOCUMENT——