Professional Documents
Culture Documents
Bbsbmgt407 - Apply Digital Solutions To Work Processessbcrt401 - Articulate, Present and Debate Ideas
Bbsbmgt407 - Apply Digital Solutions To Work Processessbcrt401 - Articulate, Present and Debate Ideas
Activity 1
Activity 2
Activity 3
1. Validity can be defined as the quality of being correct or true. Reliability, on the other
hand, is the quality of being reliable, dependable, or trustworthy.
2. Five reasons why some information might be unreliable:
Data systems and storage might be inefficient, inadequate, or incomplete
Data suppliers might be untrustworthy, or have a different agenda from the
organization
Targets might be incorrectly identified
Data might be out to date
Data might be improperly collected.
3. There are six ways to tell if website is credible
o Author, Information on the internet with a listed author is one indication of a
credible site.
Date. The date of any research information is important.
Sources. Credible websites, like books and scholarly articles, should cite the
source of the information presented.
Domain. Some domains such as.edu is reserved for colleges and universities,
while .gov denotes a government website.
Site Design. This can be very subjective, but a well-designed site can be an
indication of more reliable information.
Writing Style. Poor spelling and grammar are an indication that the site may not
be credible.
Activity 4
1. There are a number of ways in which digital information can be stored, including:
a. Online, whether locally on an agency server, or by hosted storage through the
internet, for example in cloud storage.
b. In offline storage from which data can be quickly retrieved through a near-line
storage system and brought online for access.
c. On removable media such as magnetic tapes, CDs, DVDs, memory cards, flash
drives (USB sticks).
2. A strong password consists of at least six characters (and the more characters, the
stronger the password) that are a combination of letters, numbers and symbols (@, #,
$, %, etc.) if allowed. Passwords are typically case-sensitive, so a strong password
contains letters in both uppercase and lowercase. Strong passwords also do not
contain words that can be found in a dictionary or parts of the user's own name.
3. Document-retrieval systems store entire documents, which are usually retrieved by
title or by key words associated with the document. In some systems, the text of
documents is stored as data. This permits full text searching, enabling retrieval on the
basis of any words in the document. In others, a digitized image of the document is
stored, usually on a write-once optical disc.
Activity 5
Activity 6
1. Digital services deliver digital content across multiple platforms and devices, such as
mobile and internet. Information is presented in a way that is easy to use and
understand.
2. Meet with your team and see what needs to be done to reach those goals. Then draw a
kind of action plan with the strategies to be used and see what your internal team can
do. These factors will need to be considered:
a. Cost
b. Availability
c. Ease of use
d. Flexibility
e. Coverage
f. Reliability
g. Service
h. Length of contract
i. Any traditional fees (such as equipment and installation cost)
j. redundancy
3. Five steps that should be followed when integrating digital services into workplace
operations:
a. Outlining goals.
b. Creating policies and procedures
c. Communicating the change
d. Engaging and training employees
e. Removing barriers
4. Digital services deliver digital content across multiple platforms and devices, such as
mobile and internet. Information is presented in a way that is easy to use and
understand.
Activity 7
Activity 8
Activity 9
1. Netiquette is short for "Internet etiquette." Just like etiquette is a code of polite
behavior in society, netiquette is a code of good behavior on the Internet. The word
netiquette is a combination of ’net’ (from internet) and ’etiquette’. It means respecting
other users’ views and displaying common courtesy when posting your views to
online discussion groups. This includes several aspects of the Internet, such as email,
social media, online chat, web forums, website comments, multiplayer gaming, and
other types of online communication. While there is no official list of netiquette rules
or guidelines, the general idea is to respect others online.
2. The rapid pace of consumer adoption of digital platforms has taken most
organisations by surprise. In many ‘digital’ has been, until recently, an relatively
minor offshoot of the marketing department. Suddenly it is a C-Suite priority. Gartner
recently reported that over half of the firms in their CEO survey have some sort of
digital protocol and invention. Many others reported that they were working on one or
knew they needed one, so digital protocol and invention is clearly important for a
wide range of organisations.
3. In the short space of a current college student's lifetime, the internet has gone from a
specialized, futuristic system to the network that most significantly structures how we
engage daily with the world at large. It is now obvious to anyone who uses a
computer that intellectual exercises as basic as reading the newspaper or doing
research have become fundamentally different activities largely because of the
internet. So too have our views of communication in general; the very notion of
globalization, so consuming in today's world, is predicated on the possibilities
engendered by a technology barely twenty years old. Such is the nature of "new
media." Computers, and the digital systems and products for which they are currently
a shorthand, are what most of us think of when we hear the words new media. And
why not? The world of computer hardware, software, email, and e-business is for
most of us the latest communication and information frontier. Part of our experience
of digital media is the experience of their novelty. Yet if we were asked to think of
other "new media," we might have a harder time coming up with obvious examples.
We would have no problem citing instances of "old media": typewriters, vinyl record
albums, eight-track magnetic tapes, and the like. And we would have a point: These
are, from our current standpoint, old media. But they were not always old, and
studying them in terms that allow us to understand what it meant for them to be new
is a timely and culturally important task, an exercise that in this volume we hope
profitably to apply to media much older than we are. As our title suggests, this
collection of essays challenges the notion that to study "new media" is to study today's
new media. All media were once "new media; and our purpose in these essays is to
consider such emergent media within their historical contexts, to seek out the past on
its own passed terms. We do so, in part, to counter the narrow devotion to the present
that is often evident today in "new media" studies, a growing field whose conceptual
frameworks and methods of inquiry are heavily influenced by experiences of digital
networks and the professional protocols of the social science of communications. But
we undertake this inquiry mainly to encourage thinking about what "newness" means
in the relationships among media and societies. There is a moment, before the
material means and the conceptual modes of new media have become fixed, when
such media are not yet accepted as natural, when their own meanings are in flux. At
such a moment, we might say that new media briefly acknowledge and question the
mythic character and the ritualized conventions of existing media, while they are
themselves defined within a perceptual and semiotic economy that they then help to
transform. This collection of essays explores such moments in order to enrich our
contemporary perspective on what media are, and on when and how they are
meaningfully "new." (http://web.mit.edu/transition/subs/newmediaintro.html)
Activity 10
1. Five ways to train, encourage and support staff in the application of digital solutions:
a. Recognize When to Train
b. Begin With Team Leaders
c. Train Online
d. Choose Hands-On Instructional Methods
e. Experiment With New Tools and Software
2. In forward-thinking organisations coaching is embedded into the culture and
leadership style and forms part of the norm for daily conversations and
communication. People just simply coach others as part of their day-to-day
discussions. A great way to get this model evolving is to spread the organisation with
coaching role models – usually by rolling out an initial training program on coaching
benefits and methods. The key is to create a pool of leaders who can be role models,
supporters and sustainers of a coaching mindset, which will then cascade and filter
through the rest of the organisation. To ensure successful coaching it is useful to
always link the purpose and results of coaching back to the business needs. Leaders
have to know the business case for coaching and developing others if they are to value
it and use it effectively. Finally, give it time to become embedded within the company
and to see results. Time is tight for everyone and some people will naturally resist.
3. To determine specific coaching needs managers could:
a. Observe work performance. Observation will enable them to see, first-hand how
employee performance, meets expectations.
b. Test / assess employee skills, knowledge and attitudes. Employees can be tested
using short answer test, demonstration of performance, role-plays, simulations etc.
to determine both their skill and knowledge levels. Role-plays and theoretical
questions can also help in assessing employee attitude.
c. Analyze customer feedback and complains which will provide valuable insight
into the ways in which clients/customers perceive the organisation’s products and
the accompanying service.
d. Map demonstrated employee skills against their job specifications and the KPIs
applicable to their roles.
e. Analyze employee satisfaction levels and refer to organizational records relating
to accidents, incidents, attrition, and absenteeism.
f. Conduct regular performance evaluations.
g. Assess employee performance against expected work standards.
Activity 11
Activity 12
1. Outdated policies can leave your organization at risk. Old policies may fail to comply
with new laws and regulations. They may not address new systems or technology,
which can result in inconsistent practices. Regularly reviewing policies and
procedures keeps your organization up to date with regulations, technology, and
industry best practices. Policy review ensures that your policies are consistent and
effective. Reviewing policies and procedures is especially important for high-risk or
highly regulated industries such as healthcare, public safety, banking, and more. But
organizations in every industry should regularly review and revise their company
policies. With all the pressing daily tasks in the workplace, it’s easy for policy review
to fall through the cracks. Administrators may know that it’s important to review
policies and procedures, but other tasks take precedence. However, policy review is
best when it’s done regularly and proactively. Company leaders shouldn’t wait for an
incident to occur before they review and update company policies. The best way to
proactively tackle policy and procedure review is just to build it into the corporate
calendar. As a general rule, every policy should be reviewed every one to three years.
But most experts recommend reviewing policies annually. Policy review doesn’t have
to be as daunting a task as it sounds. Good policy management software will let you
set up workflows to collaborate with your policy review committee, gather feedback,
and track approvals.
2. a. Patents: A patent is a form of intellectual property that gives its owner the legal
right to exclude others from making, using, selling, and importing an invention for a
limited period of years, in exchange for publishing an enabling public disclosure of
the invention. In most countries patent rights fall under civil law and the patent holder
needs to sue someone infringing the patent in order to enforce his or her rights. In
some industries patents are an essential form of competitive advantage; in others they
are irrelevant. The procedure for granting patents, requirements placed on the
patentee, and the extent of the exclusive rights vary widely between countries
according to national laws and international agreements. Typically, however, a patent
application must include one or more claims that define the invention. A patent may
include many claims, each of which defines a specific property right. These claims
must meet relevant patentability requirements, such as novelty, usefulness, and non-
obviousness.
b. Trademarks: A trademark is a unique symbol or word(s) used to represent a
business or its products. Once registered, that same symbol or series of words cannot
be used by any other organization, forever, as long as it remains in use and proper
paperwork and fees are paid. Once a trademark has been granted, the owner receives
three key benefits A notice of claim to any other businesses thinking of using the
same symbol or word as its trademark, A legal presumption of ownership, which can
help fend off would-be users, and The exclusive right to use the claimed trademark.
c. Circuit layouts are the layout designs or plans (topographies) of integrated circuits
used in computer-generated equipment, also referred to as computer chip or semi-
conductor chip designs. These rights are handled by the Australian Government
Department of Communications and the Arts.
Activity 13
Question 1
Policies and procedures can fulfill employers' obligations and responsibilities under
certain legislation such as work health and safety and discrimination legislation.
Policies and procedures provide employees with a clear understanding of what is
expected of them. All organisations who employ staff should have well documented
policies and procedures, at the very least, for the following reasons:
- Policies and procedures can fulfill employers’ obligations and responsibilities
under certain legislation such as work health and safety and discrimination
legislation.
- Policies and procedures provide employees with a clear understanding of what is
expected of them.
- Policies and procedures provide a fair, predictable and consistent approach to
managing the workplace and workplace issues. Avoiding the need make it up as
you go which in almost all cases will result in a problem.
- Being able to refer to a set of policies and procedures can save time when
inducting new employees and for training purposes.
- Policies and procedures and a written employment agreement are valuable
reference tools in managing workplace issues arising from employee misconduct
or inappropriate behavior.
The general protections provisions in the Fair Work Act 2009 (Cth) (“the Act”)
provide broad protections to employees and others in relation to adverse action taken
by employers if that action is taken for a prohibited reason. Adverse action broadly
includes doing, threatening or organizing any of the following:
Question 2
Digital tools have the potential to revolutionize the operation of any organization,
while at the same time befuddling even the most tech-savvy people. While each
nonprofit has its own unique needs and challenges; my method of evaluation was
similar for each. I encourage all organizations to consider using this approach to
improve their use of digital technologies. My approach involves the following 6 steps:
1) Learn about the organization and the staff
2) Assess and build digital literacy
3) Review the organization’s current use of digital tools
4) Identify tools that can make an organization more efficient, saving time and
money
5) Identify tools that can increase the effectiveness of the organization
6) Evaluate available resources and find opportunities to leverage new resources
Question 3
Project 1
1. Digital applications are a strategic part of modernizing and digitalizing your business
processes. They are online services and applications, which combine data,
functionality and modern user interface to serve your customers – in any time and
place they desire. Digital applications can complement your current services, or they
can be your main channel to do business. The benefits of well designed and
implemented digital applications are improved end-user satisfaction and reduced cost
of customer service. We apply design thinking methodologies to understand how the
applications should be built to bring maximum value to the end-users and thus to your
business, too. A digital workplace is important because it lowers the dependence on a
physical work location and allows flexibility in the way people work, how teams are
formed, and how peers come together to share ideas and solve workplace problems.
Providing employees with seamless access to digital workplace applications,
regardless of time and location, increases productivity and supports collaboration with
colleagues, partners and customers. Digital services deliver digital content across
multiple platforms and devices, such as mobile and internet. Information is presented
in a way that is easy to use and understand. Digital workplace information should be
structured in a way that helps people to do their jobs and to coordinate work
processes, practices and projects in ways that deliver meaningful outcomes.
Organisations should ensure that any policies and procedures introduced are necessary
and relevant, and that managers have the capacity and capability to work within the
policy framework. Every piece of content you create should be carefully designed to
achieve your goals such as driving customers to your business or improving employee
job satisfaction. Information management requires an integrated approach to locating,
capturing, evaluating, retrieving and sharing an organisation’s information assets. IT
data and systems are at risk of hacking, malware, viruses, spam and online scams that
may corrupt your hardware or allow criminals to steal private data. Proper data and
online security can protect your organisation from internal and external threats.
Whenever you locate and use digital information to support workplace operations,
you must evaluate information sources for reliability, accuracy and appropriateness.
Keeping up with digital trends and technologies, and incorporating them into your
daily business operations is essential if you want to remain competitive in the digital
marketplace. Through prototyping and minimum viable products methodology, we
deliver digital applications in incremental fashion, adding customer value in each
phase. The applications do not exist in a vacuum, but they need to be connected into
your back-office platforms, such as ERP and CRM systems. Our deep knowledge
with architectures, system performance, integrations to other business systems, and
data migrations allow us to implement connected applications with ease. To speed up
development, we have selected open technology application platforms as a base of our
work. The final choice of technology depends on the nature of the project, and the
decision is based on the requirements of your business and your end-user needs.
Intellectual property (IP) is intangible property that is the result of human intelligence
and creation. It includes inventions, copyright, trademarks and brands, designs and the
application of an idea. To protect your idea under IP laws, it must be something new
or original. Until recently, IP was a specialized field that only applied to inventors,
and corporate research and development managers. But in today’s digital economy,
where ideas and innovation drive economic growth and business success, IP has
moved to the forefront as a key success factor in a wide range of professions and
industries. When applying digital solutions to work processes, you must identify your
IP obligations, review your digital processes for compliance, and document and report
IP issues as they arise. The unauthorized distribution of digital information and
materials among employees could create a potential liability and place your business
at legal, financial and reputational risk-trade secret (or confidential information) refers
to knowledge of an idea or process that is known only to people inside an
organisation. It is up to the organisation to protect that knowledge, such as by
ensuring employees or distributors sign confidentiality agreements. Other types of IP
include circuit layouts and plant breeder’s rights. Circuit layouts are the layout
designs or plans (topographies) of integrated circuits used in computer-generated
equipment, also referred to as computer chip or semi-conductor chip designs. These
rights are handled by the Australian Government Department of Communications and
the Arts. Plant breeder’s rights are exclusive commercial rights for a registered variety
of plant. These rights protect plant breeders and give them a commercial monopoly
for 20–25 years. This encourages innovation, and means that new plant varieties are
freely available to anybody when the protection period lapses.The legal basis for plant
breeder’s rights in Australia can be found in: Plant Breeder’s Rights Act 1994 (Cth),
and Plant Breeder’s Rights Regulations 1994 (Cth). Examples include cotton plant
with insect resistance, grapevines and the pink iceberg rose. Copyright protection is
provided under the Copyright Act 1968 (Cth) and gives copyright owners exclusive
rights to copy the work, perform it in public, broadcast, publish or make an adaptation
of it. Each country has its own copyright laws. In Australia, copyright laws became
the responsibility of the Australian Government Department of Communications and
the Arts in 2015. While there is no such thing as international copyright, there are
international treaties that govern it. The oldest and most important of these is the
Berne Convention, which was first signed in 1886 in Berne, Switzerland. The Berne
Convention sets minimum standards for copyrighted works. Digital innovations be
integrated into workplace operations While the workplace began transforming as far
back at the agricultural and industrial revolutions, the widespread proliferation of
information technology forever changed the ways in which employees connect,
collaborate and communicate. As workplace demographics continue to shift,
employers struggle to meet the varying needs of a multi-generational workforce. As
the use of the Internet and mobile devices grows, the pace of change continues to
accelerate. These changes are further exacerbated by ongoing demands to increase
productivity and cut costs, making it harder for employees to meet market
expectations. Together, these trends are reshaping the work environment.
2. The network infrastructure is subject to myriad internal and external attacks through
services, protocols, and open ports. It is imperative that you understand how to
properly implement services and protocols, especially if the network has been in
existence for some period of time and some services are no longer needed or have
been forgotten. To stop many would-be attackers, you must understand how protocols
are used on the network, what common ports are used by network protocols, and how
to securely implement a wireless network. This chapter discusses these concepts to
help you understand how to use the proper network implementation of protocols and
services as a tool to protect and mitigate threats against network infrastructure based
on organizational needs. It also has a section specifically dedicated to wireless
security implementation based on organization requirements. The Internet Protocol
Security (IPsec) authentication and encapsulation standard is widely used to establish
secure VPN communications. The use of IPsec can secure transmissions between
critical servers and clients. This helps prevent attacks from taking place. Unlike most
security systems that function within the application layer of the Open Systems
Interconnection (OSI) model, IPsec functions within the network layer. Internet
Control Message Protocol (ICMP) is a protocol meant to be used as an aid for other
protocols and system administrators to test for connectivity and search for
configuration errors in a network. Ping uses the ICMP echo function and is the
lowest-level test of whether a remote host is alive. A small packet containing an
ICMP echo message is sent through the network to a particular IP address. The
computer that sent the packet then waits for a return packet. If the connections are
good and the target computer is up, the echo message return packet will be received.
The differences between IPv4 and IPv6 are in five major areas: addressing and
routing, security, network address translation, administrative workload, and support
for mobile devices. These are NetBIOS ports that are required for certain Windows
network functions such as file sharing. But these ports also provide information about
your computer that can be exploited by attackers. They also contain vulnerabilities
that are widely used to break into systems and exploit them in various ways. Secure
Shell (SSH), Secure File Transfer Protocol (SFTP), and Secure Copy Protocol (SCP)
are all protocols that operate on port 22. SSH is used to securely access a remote
computer. SFTP is used for FTP access and encrypts both commands and data. SCP is
used to securely transfer files to a remote host. The Internet Protocol Security (IPsec)
authentication and encapsulation standard is widely used to establish secure VPN
communications. The use of IPsec can secure transmissions between critical servers
and clients. This helps prevent network-based attacks from taking place. Unlike most
security systems that function within the application layer of the OSI model, IPsec
functions within the network layer. IPsec provides authentication services and
encapsulation of data through support of the Internet Key Exchange (IKE) protocol.
The asymmetric key standard defining IPsec provides two primary security services:
a. Authentication Header (AH): This provides authentication of the data’s sender,
along with integrity and nonrepudiation. RFC 2402 states that AH provides
authentication for as much of the IP header as possible, as well as for upper-level
protocol data. However, some IP header fields might change in transit, and when
the packet arrives at the receiver, the value of these fields might not be predictable
by the sender. The values of such fields cannot be protected by AH. So, the
protection provided to the IP header by AH is somewhat piecemeal.
b. Encapsulating Security Payload (ESP): This supports authentication of the data’s
sender and encryption of the data being transferred along with confidentiality and
integrity protection. ESP is used to provide confidentiality, data origin
authentication, connectionless integrity, an antireplay service (a form of partial
sequence integrity), and limited traffic-flow confidentiality. The set of services
provided depends on options selected at the time of security association
establishment and on the placement of the implementation. Confidentiality may be
selected independently of all other services. However, the use of confidentiality
without integrity/authentication (either in ESP or separately in AH) might subject
traffic to certain forms of active attacks that could undermine the confidentiality
service.
Protocols 51 and 50 are the AH and ESP components of the IPsec protocol. IPsec
inserts ESP or AH (or both) as protocol headers into an IP datagram that immediately
follows an IP header. The protocol field of the IP header will be 50 for ESP or 51 for
AH. If IPsec is configured to do authentication rather than encryption, you must
configure an IP filter to let protocol 51 traffic pass. If IPsec uses nested AH and ESP,
you can configure an IP filter to let only protocol 51 (AH) traffic pass. IPsec supports
the IKE protocol, which is a key management standard used to allow specification of
separate key protocols to be used during data encryption. IKE functions within the
Internet Security Association and Key Management Protocol (ISAKMP), which
defines the payloads used to exchange key and authentication data appended to each
packet. The common key exchange protocols and standard encryption algorithms,
including asymmetric key solutions such as the Diffie-Hellman Key Agreement and
Rivest-Shamir-Adleman (RSA) standards; symmetric key solutions such as the
International Data Encryption Algorithm (IDEA) and Digital Encryption Standard
(DES); Triple DES (3DES) and hashing algorithms, such as the message digest 5
(MD5) and Secure Hash Algorithm (SHA), are covered in detail in Chapter 12,
“Cryptography Tools and Techniques.” Although IPsec by itself does not control
access to the wireless local-area network (WAN), it can be used in conjunction with
802.1X to provide security for data being sent to client computers that are roaming
between access points (AP) on the same network. For better security, segment the
wireless network by placing a firewall between the WLAN and the remainder of the
network. Because IPsec is a solution to securely authenticate and encrypt network IP
packets, you can use IPsec to provide strong security between a Remote
Authentication Dial-In User Service (RADIUS) server and a domain controller, or to
secure traffic to a partner organization’s RADIUS servers. RADIUS provides
authentication and access control within an enterprise network and is explained in
greater detail in Chapter 10, “Authentication, Authorization, and Access Control.”
Many of the VPN solutions use IPsec, and, like a virtual private network (VPN),
IPsec is an excellent solution in many circumstances. However, it should not be a
direct alternative for WLAN protection implemented at the network hardware layer.