Misy6211a1 FT

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

22; 23; 24 2023

MODULE NAME: MODULE CODE:


MANAGEMENT INFORMATION SYSTEMS MISY6211/d/f

ASSESSMENT TYPE: ASSIGNMENT (PAPER ONLY)

TOTAL MARK ALLOCATION: 100 MARKS

TOTAL HOURS: 10 HOURS

By submitting this assignment, you acknowledge that you have read and understood all the rules as
per the terms in the registration contract, in particular the assignment and assessment rules in The
IIE Assessment Strategy and Policy (IIE009), the intellectual integrity and plagiarism rules in the
Intellectual Integrity and Property Rights Policy (IIE023), as well as any rules and regulations
published in the student portal.

INSTRUCTIONS:
1. No material may be copied from original sources, even if referenced correctly, unless it is a
direct quote indicated with quotation marks. No more than 10% of the assignment may
consist of direct quotes.
2. Your assignment must be submitted through SafeAssign.
3. Save a copy of your assignment before submitting it.
4. Assignments must be typed unless otherwise specified.
5. All work must be adequately and correctly referenced.
6. This is an individual assignment.

© The Independent Institute of Education (Pty) Ltd 2023


Page 1 of 7
22; 23; 24 2023

Referencing Rubric

Providing evidence based on valid and referenced academic sources Markers are required to provide feedback to students by indicating
is a fundamental educational principle and the cornerstone of high- (circling/underlining) the information that best describes the
quality academic work. Hence, The IIE considers it essential to student’s work.
develop the referencing skills of our students in our commitment to
achieve high academic standards. Part of achieving these high Minor technical referencing errors: 5% deduction from the
standards is referencing in a way that is consistent, technically overall percentage – the student’s work contains five or more
correct, and congruent. This is not plagiarism, which is handled errors listed in the minor errors column in the table below.
differently.
Major technical referencing errors: 10% deduction from the
Poor quality formatting in your referencing will result in a penalty of overall percentage – the student’s work contains five or more
a maximum of ten percent being deducted from the percentage errors listed in the major errors column in the table below.
awarded, according to the following guidelines. Please note,
however, that evidence of plagiarism in the form of copied or If both minor and major errors are indicated, then 10% only (and
uncited work (not referenced), absent reference lists, or not 5% or 15%) is deducted from the overall percentage. The
exceptionally poor referencing, may result in action being taken in examples provided below are not exhaustive but are provided to
accordance with The IIE’s Intellectual Integrity Policy (0023). illustrate the error

Required: Minor errors in technical correctness of Major errors in technical correctness of referencing
Technically correct referencing referencing style style
style Deduct 5% from percentage awarded Deduct 10% from percentage awarded
Consistency Minor inconsistencies. Major inconsistencies.
• The referencing style is generally • Poor and inconsistent referencing style used in-
• The same referencing format consistent, but there are one or two text and/or in the bibliography/ reference list.
has been used for all in-text changes in the format of in-text • Multiple formats for the same type of referencing
references and in the referencing and/or in the bibliography. have been used.
bibliography/reference list. • For example, page numbers for direct • For example, the format for direct quotes (in-text)
quotes (in-text) have been provided for and/or book chapters (bibliography/ reference
one source, but not in another instance. list) is different across multiple instances.
Two book chapters (bibliography) have
been referenced in the bibliography in
two different formats.
Technical correctness Generally, technically correct with some Technically incorrect.
minor errors. • The referencing format is incorrect.
• Referencing format is • The correct referencing format has been • Concepts and ideas are typically referenced, but a
technically correct throughout consistently used, but there are one or reference is missing from small sections of the
the submission. two errors. work.
• Concepts and ideas are typically • Position of the references: references are only
• The correct referencing format referenced, but a reference is missing given at the beginning or end of large sections of
for the module’s discipline has from one small section of the work. work.
been used, i.e., either APA, OR • Position of the references: references • For example, incorrect author information is
Harvard OR Law are only given at the beginning or end of provided, no year of publication is provided,
every paragraph. quotation marks and/or page numbers for direct
• Position of the reference: a • For example, the student has incorrectly quotes missing, page numbers are provided for
reference is directly associated presented direct quotes (in-text) and/or paraphrased material, the incorrect punctuation is
with every concept or idea. book chapters (bibliography/reference used (in-text); the bibliography/reference list is
list). not in alphabetical order, the incorrect format for
• For example, quotation marks, a book chapter/journal article is used, information
page numbers, years, etc. are is missing e.g. no place of publication had been
applied correctly, sources in provided (bibliography); repeated sources on the
the bibliography/reference list reference list.
are correctly presented.
Congruence between in-text Generally, congruence between the in- A lack of congruence between the in-text
referencing and bibliography/ text referencing and the bibliography/ referencing and the bibliography.
reference list reference list with one or two errors. • No relationship/several incongruencies between
• There is largely a match between the the in-text referencing and the
• All sources are accurately sources presented in-text and the bibliography/reference list.
reflected and are all accurately bibliography. • For example, sources are included in-text, but not
included in the bibliography/ • For example, a source appears in the in the bibliography and vice versa, a link, rather
reference list. text, but not in the bibliography/ than the actual reference is provided in the
reference list or vice versa. bibliography.
In summary: the recording of In summary, at least 80% of the sources In summary, at least 60% of the sources are
references is accurate and are correctly reflected and included in a incorrectly reflected and/or not included in the
complete. reference list. reference list.

Overall Feedback about the consistency, technical correctness and congruence between in-text referencing and bibliography:
......................................................................................................................................................................................................................

© The Independent Institute of Education (Pty) Ltd 2023


Page 2 of 7
22; 23; 24 2023

Assignment Instructions

NB – Your lecturer will not mark beyond the maximum word count or page requirements for the
question. For example, if you exceed the 1000-word limit by submitting a 1200-word essay, you
could lose all marks allocated to any sections/arguments that fall into the 200 words not marked.

Question 1 (Marks: 30)


Read the case study extract below and answer all the questions that follow.

Case study extract: Security and Privacy issues with Zoom

The outbreak of the coronavirus pandemic in early 2020 forced people to stay indoors. That
increased daily downloads of the Zoom app by 30 times year-over-year and Zoom became the top
free app for iPhones. The number of daily users for Zoom increased to 200 million in March 2020
and to 300 million in April 2020. The Zoom app helped professionals conduct their meetings
through video conferencing and facilitated face-to-face communication through a range of free
services and virtual experiences. It became a primary communication platform for millions of
people, especially for high school and college students, as institutions moved to online learning.

The demand for videoconferencing apps had been increasing in recent times with people working
from home. Besides Zoom, there were several apps available in the market. Skype, Cisco Webex,
and Google remained the major competitors for Zoom. After the security and privacy issues with
Zoom surfaced, some private schools that had been using the app for online classes and
companies that had used the video conferencing platform for calls with clients – switched to
alternatives such as Microsoft Teams and Google Meet.

The demand for videoconferencing apps was expected to rise in the future. Despite the issues
with Zoom, the popularity of the app did not take a hit. The company’s future included reaching
both enterprise customers and ‘prosumers’ who used its platform in both their professional and
personal lives.

URL: https://www.icmrindia.org/casestudies/Case_Studies.asp?cat=IT%20and%20Systems
(Accessed 13 March 2023) [Available Online]

© The Independent Institute of Education (Pty) Ltd 2023


Page 3 of 7
22; 23; 24 2023

Q.1.1 Using the case study above and other supporting research materials, write a one- (20)
page paper that outlines five recommendations for improving security and
privacy at Zoom. Your recommendations should also explain ways that minimise
or eliminate Zoom’s corporate data leakage.

The following provides a guide for allocation of marks:


• 2 marks awarded for each recommendation for improving the security
and privacy at Zoom (2marks * 5)
• 2 marks awarded for each adequate explanation of ways that minimize
or eliminate Zoom’s corporate data leakage (2marks * 5).

Q.1.2 Zoom is used as an example of an online and videoconferencing tool that needs (10)
to follow some ethical and censorship principles. Your company X has adopted
this tool for all its online conferences.

You have been appointed as an IT manager who needs to reinforce the ethical
and censorship principles in your company.

Discuss how you will be reinforcing the notion of ethics and censorship at this
company. Your discussion should not be more than half a page.

Question 2 (Marks: 30)


Read the case study extract below and answer all the questions that follow.

Case study extract: Data security breach at Virgin Media

On March 5, 2020, UK-based telecom and Internet service provider Virgin Media Inc. disclosed
that it had suffered a data security breach after it was found that Virgin Media’s marketing
database containing the personal details of about 900,000 customers had been left unsecured
online since April 2019, accessible to anyone without any authentication being required.
Reportedly, the company had become aware of the breach only after it was flagged by a third-
party researcher at security firm TurgenSec.

© The Independent Institute of Education (Pty) Ltd 2023


Page 4 of 7
22; 23; 24 2023

Virgin Media maintained that the compromised information was mostly limited to contact and
product data and did not contain financial information or passwords.

According to the company, the incident occurred because a staff member incorrectly configured
the database. The issue was immediately resolved by shutting down access to this database,
which contained some contact details of approximately 900,000 people, including fixed-line
customers representing approximately 15% of that customer base. Protecting the customers’ data
was a top priority and the company sincerely apologized.”

Virgin Media began its operations in 2006, following a merger among telecom providers NTL,
Telewest, and one of its sub-brands Virgin Mobile. Within a year it became the first quadruple-
play media company in the UK, offering television, internet, mobile phone, and fixed-line
telephone services. The company launched ads featuring celebrities to showcase its unique
offering of TV, home phone, and broadband packages in a single bundle. In 2010, it began to
deliver television and broadband services through telegraph poles in London.

Reportedly, the unprotected database was not discovered by Virgin Media but by security firm
TurgenSec which alerted the company about the exposure on February 28, 2020. According to
TurgenSec, more personal details than those revealed by VM might have been compromised.

URL: https://www.icmrindia.org/casestudies/Case_Studies.asp?cat=IT%20and%20Systems
(Accessed 15 March 2023) [Available Online]

Q.2.1 You have been appointed as an IT security manager at Virgin Media and you are (20)
required to develop a comprehensive security plan.

Using the case study above, develop a comprehensive security plan that will assist
to protect against security threats from both inside and outside the organization.

N.B: Ensure that your comprehensive security plan relates to the case study and
should not be more than one page.

© The Independent Institute of Education (Pty) Ltd 2023


Page 5 of 7
22; 23; 24 2023

The following provides a guide for allocation of marks:


• Up to 10 marks awarded for security plan detail.
• Up to 8 marks awarded for the explanation provided for each step used or
considered.
• Up to 2 marks awarded for the clarity and conciseness relating to the case
study.

Q.2.2 Discuss the details of business continuity planning that could be recommended to (10)
Virginia Media.

The following provides a guide for allocation of marks:


• Up to 5 marks awarded for the details of the business continuity planning.
• Up to 3 marks for the explanation of the elements of the business
continuity planning relating to the case study.
• Up to 2 marks for the clarity and conciseness relating to the case study.

Question 3 (Marks: 40)


Read the case study extract below and answer all the questions that follow.

Case study extract: Leading Digitalization at ICICI Bank

In March 2020, Chanda Kochhar, Managing Director and CEO of India-based multinational banking
and financial services company ICICI Bank (ICICI), made an announcement that took the bank and
outsiders by surprise. She created a new senior executive role in the bank as part of its annual
reorganization. The position was unique – not only in the banking sector but also across other
sectors.

The post created was that of the Chief Technology and Digital Officer, who was to report directly
to Kochhar and would be responsible for a newly created team, the Technology and Digital Group,
which would work exclusively on developing and improving the bank’s digital initiatives and
technology. The creation of the CTDO post and the TDG were aimed at facilitating ICICI’s digital
agenda across the bank’s portfolio of segments viz. retail, wholesale, commercial banking, small
and medium enterprises (SMEs), and treasury businesses. Analysts said this move indicated the
bank’s big plans around digitizing its banking functions.

© The Independent Institute of Education (Pty) Ltd 2023


Page 6 of 7
22; 23; 24 2023

URL: https://www.icmrindia.org/casestudies/Case_Studies.asp?cat=IT%20and%20Systems
(Accessed on the 04th of Jan 2023) [Available Online]

Q.3.1 Discuss at least two methods for developing an information system/or applications (10)
that could be recommended to support the digital agenda of the ICICI bank.

The following provides a guide for allocation of marks:


• Up to 2 marks for identifying two methods.
• Up to 4 marks for discussion of each of the identified methods.

Q.3.2 Based on the identification of the IS development methods that you have (15)
mentioned in Q.3.1., discuss five major factors behind your recommendations using
online resources and your other recommended materials.

The following provides a guide for allocation of marks:


• Up to 3marks each for each major factor behind your recommendations.
Your recommendations need to be aligned with the mentioned methods in
Q.3.1.

Q.3.3 Most experts believe that the SAP ERP system at ICICI bank, with all the advantages (15)
it offered, also had its drawbacks such as high cost, difficulties in installation, a
need for extensive training, and compatibility problems with legacy systems.

Using prescribed and additional resources online, discuss on a one-page paper


some of your recommendations to minimise these drawbacks.

The following provides a guide for allocation of marks:


• Up to 3 marks for each recommendation fully discussed (3 marks *4)
• Up to 3 marks for applicability of recommendations.

[TOTAL MARKS: 100]

© The Independent Institute of Education (Pty) Ltd 2023


Page 7 of 7

You might also like