Uploaded by malaikan72

unit 4

advertisement
1|Page
Table of Contents
MANAGING DATA ........................................................................................................................................ 4
Security techniques for the management of data .................................................................................. 4
Disaster recovery plan .......................................................................................................................... 4
Audit trails ............................................................................................................................................. 6
Types of backup techniques and archiving of data ................................................................................. 6
Snapshot imaging .................................................................................................................................. 7
Full back up ........................................................................................................................................... 7
Incremental back up ............................................................................................................................. 7
Differential back up............................................................................................................................... 8
Online data storage methods .................................................................................................................. 8
Data Warehouses .................................................................................................................................. 8
Data Mart .............................................................................................................................................. 9
Data in the Cloud .................................................................................................................................. 9
Purpose of data mining ....................................................................................................................... 10
Processing of data considering security of data through the use of .................................................... 10
Passwords ........................................................................................................................................... 10
Firewalls .............................................................................................................................................. 10
Biometrics ........................................................................................................................................... 11
Anti-virus software.............................................................................................................................. 11
Digital signatures................................................................................................................................. 11
Digital certificates ............................................................................................................................... 12
Encryption ........................................................................................................................................... 12
Concept of User generated content. ...................................................................................................... 13
Advantages and disadvantages of UGC .................................................................................................. 13
Purpose of worldwide consortium.......................................................................................................... 17
Purpose of W3C conventions ............................................................................................................... 17
HTML and CSS.................................................................................................................................... 17
Graphics ............................................................................................................................................. 18
AUDIO AND VIDEO ............................................................................................................................ 18
ACCESSIBILITY W3C GUIDELINES ................................................................................................... 19
INTERNATIONALIZATION ................................................................................................................ 19
MOBILE WEB ..................................................................................................................................... 19
2|Page
Validation techniques for online forms ............................................................................................... 20
NETWORKS ................................................................................................................................................ 20
Types and characteristics of communication protocols ......................................................................... 20
Transmission Control Protocol/Internet Protocol (TCP/IP) ......................................................... 21
Hyper Text Transfer Protocol (HTTP): ............................................................................................ 21
Hyper Text Transfer Protocol Secure (HTTPS)............................................................................... 21
Wireless Application Protocol (WAP).............................................................................................. 21
Types and Characteristics of Communication Standards .................................................................. 22
802.11x (wireless)............................................................................................................................. 22
802.3 (Ethernet) .................................................................................................................................. 22
Types of Network Security Measures .................................................................................................. 22
Physical Network Security ................................................................................................................... 22
Password Protection ........................................................................................................................... 22
Firewall ................................................................................................................................................ 23
IMPACTS OF TECHNOLOGY ...................................................................................................................... 23
Data and information security ............................................................................................................. 23
Purpose of code of conduct .................................................................................................................... 24
Elements of code of conduct .................................................................................................................. 24
EMPLOYEE WORK HOURS ................................................................................................................... 24
WORK HOURS ..................................................................................................................................... 24
EMPLOYEE EMAIL USE ........................................................................................................................ 24
EMPLOYEE INTERNET USE ................................................................................................................... 24
EMPLOYEE PRIVACY ............................................................................................................................ 25
EMPLOYER'S RIGHT TO MONITOR WORK EMAILS, INTERNET ACCESS AND PERSONAL USE ............. 25
Online censorship in a global context ..................................................................................................... 25
Issus with the use of cloud computing ................................................................................................... 27
Availability of Online Applications ...................................................................................................... 27
Level of Accessibility ........................................................................................................................... 27
Confidentiality of Data ........................................................................................................................ 28
Sensitivity of Documents .................................................................................................................... 28
Impacts of Digital Technologies and global markets on; ........................................................................ 28
Productivity: ........................................................................................................................................ 28
Outsourcing:........................................................................................................................................ 30
3|Page
PROJECT MANAGEMENT .......................................................................................................................... 30
Concept of service level agreement ....................................................................................................... 30
Features of SLA ....................................................................................................................................... 31
Availability of services ......................................................................................................................... 31
Types of services ................................................................................................................................. 31
Advantages of local and global outsourcing compared with in-house................................................... 32
Purpose of Outsourcing data management ............................................................................................ 34
4|Page
MANAGING DATA
Security techniques for the management of data
Disaster recovery plan
Disaster recovery plan is a detailed, step-by-step course of action for getting a
business back on its feet -- and quickly -- after a natural or manmade disaster.
A disaster recovery plan should be in such a manner that it should offer continuous
network monitoring, complete data backup and many more.
It means that it should support in different aspects and provide complete protection.
1. Is a set of steps to protect data in the event of a disaster
2. Usually it is in writing
3. It is to minimise data loss
4. It is to minimise down time
5. It includes storing data off-site
A disaster recovery plan contains four major components:
 the emergency plan
 the backup plan
 the recovery plan
 the test plan.
The Emergency Plan
An emergency plan specifies the steps to be taken immediately after a disaster
strikes. The emergency plan usually is organized by type of disaster, such as fire,
flood, or earthquake. Depending on the nature and extent of the disaster, the
procedures that are followed in an emergency will differ.
All emergency plans should contain the following information:
1. Names and telephone numbers of people and organizations to notify (e.g.,
management, fire department, police department)
2. Procedures to follow with the computer equipment (e.g., equipment shutdown,
power shutoff, file removal)
3. Employee evacuation procedures
4. Return procedures; that is, who can reenter the facility and what actions they are
to perform
5|Page
The Backup Plan
Once the procedures in the emergency plan have been executed, the next step is to
follow the backup plan. The backup plan specifies how an organization uses backup
files and equipment to resume information processing. The backup plan should
specify the location of an alternate computer facility in the event the organization’s
normal location is destroyed or unusable. The backup plan identifies these items:
1. The location of backup data, supplies, and equipment
2. The personnel responsible for gathering backup resources and transporting them
to the alternate computer facility
3. A schedule indicating the order in which, and approximate time by which, each
application should be up and running.
The Recovery Plan
The recovery plan specifies the actions to be taken to restore full information
processing operations. As with the emergency plan, the recovery plan differs for
each type of disaster. To prepare for disaster recovery, an organization should
establish planning committees, with each one responsible for different forms of
recovery.
For example, one committee is in charge of hardware replacement. Another is
responsible for software replacement.
RECOVERY PLAN 1 - HOT SITE
•this is a duplicate of the existing site in every way, servers, rooming, real time
synchronisation so data is the same
•following a disaster, this new site would be up and running in a short time frame
e.g. 2 hours
•advantage is it is ready to go and is the best recovery solution
•disadvantage is it is very expensive to setup
RECOVERY PLAN 2 - WARM SITE
•this is a site that has computers set up, but not exact duplicates
•following a disaster, this new site would be up and running in a longer time frame
e.g. a week
•advantage is it is not as expensive as the hot site
•disadvantage is down time to get site operational
6|Page
RECOVERY PLAN 3 - COLD SITE
•this is a site that is not configured with computers and other hardware, some may
be more setup than others
•advantage is it is much cheaper than the hot or warm site
•disadvantage is it is more down time, more time needed to get up and running
The Test Plan
To provide assurance that the disaster plan is complete, it should be tested. A
disaster recovery test plan contains information for simulating various levels of
disasters and recording an organization’s ability to recover. In a simulation, all
personnel follow the steps in the disaster recovery plan. Any needed recovery
actions that are not specified in the plan should be added. Although simulations can
be scheduled, the best test of the plan is to simulate a disaster without advance
notice.
Audit trails
Audit trails maintain a record of system activity both by system and application
processes and by user activity of systems and applications. They can offer data
security from cyber attacks. In conjunction with appropriate tools and procedures,
audit trails can assist in detecting security violations, performance problems, and
flaws in applications. They document the who, what, when, where, and why of all
users’ behavior in an application. Audit trail entries capture access and changes
made to electronic records, so all electronic alterations and views are noted, along
with the user information of the employees who view or altered them An audit trail
is a series of records of computer events, about an operating system, an application,
or user activities. I.E




when the data was accessed
who accessed it
what was accessed
In most cases, it does not show why the data was accessed. Sometimes very
secure systems may ask for a reason before asking sensitive data.
 allow administrators to review who has been accessing data and identify any
unusual behaviour which can be investigated further. When files are moved
or modified, audit trails can be used to identify who was responsible for such
actions.
Types of backup techniques and archiving of data
Backup is the activity of copying/saving files or databases in another location so
that they will be preserved in case of equipment failure or other catastrophe.
7|Page
Backup is usually a routine part of the operation of large businesses with
mainframes as well as the administrators of smaller business computers. For
personal computer users, backup is also necessary but often neglected. The retrieval
of files you backed up is called restoring them. Personal computer users can
consider both local backup and Internet backup.
Snapshot imaging
In computer systems, a snapshot is the state of a system at a particular point in time.
Used in online and local image backups
Advantages:
 The computer system stays active and available for read and write operations
during the back up.
 It allows you to take an image of your computers current state and put it on
an external drive.
 It backs up your files, settings, data, registry, etc.
 When you restore to the image it will restore your computer to the exact
state it was in when you created the backup image.
Disadvantages:
 Requires additional software to be installed.
 Very large file sizes
Full back up
It's a backup of everything. A full backup of "your system" might include the entire
contents of all the drives connected to your system.
Advantages:
 All files from the selected drives and folders are backed up to one backup set.
 In the event you need to restore files, they are easily restored from the single
backup set.
Disadvantages:
 A full backup is more time consuming than other backup options.
 Full backups require more disk, tape, or network drive space.
Incremental back up
Includes only those things that have changed since the previous backup and saves
those things into a separate, additional, backup file or location.
1. The first incremental backup is a full backup
2. The second incremental backup backs up only those files that have changed
since the previous backup was taken
3. perform a monthly full backup and then a daily incremental
8|Page
ADVANTAGES:
 Backup time is faster than full backups.
 Incremental backups require less disk, tape, or network drive space.
 You can keep several versions of the same files on different backup sets.
DISADVANTAGES:
 In order to restore all the files, you must have all of the incremental backups
available.
 It may take longer to restore a specific file since you must search more than
one backup set to find the latest version of a file.
Differential back up
Includes only those things that have changed since the previous FULL backup and
saves those things into a separate, additional, backup file or location.
1. The first differential backup is a full backup
2. The second differential backup backs up only those files that have changed
since the previous full backup was taken
3. Perform a monthly full backup, weekly differential backup, and then a daily
incremental.
ADVANTAGES:
 Backup time is faster than full backups.
 Differential backups require less disk, tape, or network drive space.
 You can keep several versions of the same files on different backup sets.
 Safer than incremental backups – if one differential image becomes
corrupted, the other differential images are not reliant on it.
DISADVANTAGES:
 Larger files sizes than incremental
 Slower than incremental
Online data storage methods
Data Warehouses
Data warehouses are the facilities that hold all data for the business. Data
warehouses are comprised of hundreds of servers connected to provide users their
specific data and the business a summary of that historical transaction data. This is
to do analysis on that data (data mining) for financial or other gain. Often inside a
data warehouse you will find a large bank of very modern, high end computers with
a large database (Relational DataBase Management System RDBMS), and software
called Online Analytical Processing (OLAP) database. Users need this data and can
get it from the central data warehouse, or from smaller collection points called data
marts
9|Page
For example, an online store would store all of the customer's information on severs
in a data warehouse. The data warehouse provides customers individual data such
as transaction history and watch-lists. Business managers would receive a summary
of that information such as total sales, level of inventory and popular items bought.
Data Mart
Data marts are a subsection of a data warehouse that hold data relating to a specific
function or department of a business.
For example, a manufacturer could have a data mart dedicated to each product line
it manufactures.
Data in the Cloud
Data in the cloud refers to online cloud storage, where data is stored offsite of
business premises, onto internet connected servers located around the world.
Security and privacy of the data is surrendered to the cloud storage provider and
what they can or cannot do with the data is outlined in their license agreements. In
addition, data stored around the world is subject to different privacy laws.
Storing data in the cloud requires 3 things.
 an internet connection
 a username and password
 accepting a user agreement
The cloud is actually a collection of servers that store and transmit data, you can;
 Upload - you can upload your files,
 Download - you can download your files
Advantages:
 advantage - no need to buy the software
 advantage - can be used from any device with an internet connection
 advantage - compatible with most devices and operating systems
 advantage - updates transfer automatically across devices eg calendar, email,
notes, messages
Disadvantages:
 disadvantage - security problems
 disadvantage - privacy issues
 disadvantage - ownership of your data
For example, cloud storage provider, Dropbox, will release information upon
request by authorities.
10 | P a g e
Purpose of data mining
Data mining is the process of finding information in a data mart or data warehouse
to extract useful patterns, trends or information. This is done by businesses for their
business to gain financially from it and is a source of business intelligence. The idea
is that once marketers know who you are, they can better promote products and
services based on your interests and personal attributes. Marketers use algorithms
to detect and identify certain patterns in online activity to build a customer profile.
Common uses:
 A human resource department, for example, can use data mining to explore a
large pool of applicants and extract the best candidates for the job. Where
previously HR professionals would spend hours pouring over resumes, data
mining now uses keyword targeting and other methods to cull down the
candidate pool.
 When it comes to making the decision on whether or not to approve a line of
credit, predictive modeling, a form of data mining, allows banks to determine
the likelihood of an applicant following the terms of the loan.
 In the education field, college admissions offices are using data mining to
predict whether an applicant will accept an admissions offer.
Processing of data considering security of data through the use of
Data security is hiding your data from other people. It is protecting your data so
only authorised people can see it.
Passwords
A password is used to protect data. Data that is not important, may not even need a
password, however, important data needs strong passwords. A combination of
characters, linked to a username (often an email), used to unlock access to certain
computer resources.
Firewalls
A firewall is a barrier to prevent harmful programs getting to a computer, a simple
firewall is software on the computer which is turned on to prevent access to the
computer from the internet. A firewall can also be hardware which filters
information from the internet, again to protect the computer. E.g a proxy server in a
computing network
11 | P a g e
Biometrics
Unique human characteristics, used to verify the user to unlock access to certain
computer resources. Biometrics can include:





Fingerprints
facial recognition
(eye) iris recognition
hand geometry (the shape of hand/length of fingers)
voice recognition
Anti-virus software
Software installed on a device with the purpose of monitoring and removing
malware. Malware is checked against a list of regularly updated virus definitions.
Each time a new intruder program (or virus) is found, it is added to the server,
individuals also use anti-malware software to protect data.
Digital signatures
An electronic code, embedded in a document via public key infrastructure, with the
purpose of verifying the contents of the document and the sender's identity. Used to
make sure that a document hasn't been touched or altered while emailed or
transferred. If someone tries to alter a document with a digital signature, they can't
re-create a valid digital signature, the reason for this is because the intruder cannot
know the private key made at document creation, for it to be successful the public
and private keys must be matched.
A digital signature helps in establishing the following:
1. Authenticity: ensure that the contents of the document to which it is attached is
not tampered with by the recipient.
2. Integrity: Ensure that both the sender and the receiver receive the same
document containing the same data with integrity.
3. Non-Denial: Prevent the signer from denying of signing the document at a later
stage.
12 | P a g e
Digital certificates
An electronic passport that uses public key infrastructure, to secure transmit data
between a website and a user's device (this is basically that little lock next to the
URL). These are kept on your computer and when you link to the location (e.g.
Woolworths online), the digital certificate is matched to the online version. If it
matches you can connect. Digital certificates use public keys and digital signatures
A digital certificate helps in establishing the following:
1. Trustworthiness of a person or organization is verified by a Certificate Authority
2. The recipient can check for legitimacy of the information by looking up the
ownership of the sender.
3. Holds public keys that can be used to encrypt data.
Encryption
Encryption is the process of encoding data, through algorithms, so it can only be
read by the sender and its intended recipient. Encryption uses public key
infrastructure, which consists of two keys, a public key that anyone can obtain off
the web, and a private key known only by the sender and the intended recipient.
It is the translation of a file or document into a secret code, the only way to read the
file or document is to have the secret code. Putting it into the secret code is called
encryption, reading it from the secret code is called decryption. If encrypted, it is
called cypher text, if not encrypted, it is called plain text. Encryption can be used
when transferring a file, it can also be used when storing a file. It is becoming
popular with more people worried about data security, you can use encryption
software to protect your data, but it can slow down your work procedures quite a
lot.
Encryption helps in establishing the following:
1. Ensures end to end obscuration of information sent/received
2. Ensures that what is sent is what is received
3. Only those who have keys can encrypt/decrypt
13 | P a g e
Concept of User generated content.
User-generated content (UGC), alternatively known as user-created content (UCC),
is any form of content created by users of a system or service and made available
publicly on that system. UGC most often appears as supplements to online
platforms, such as social media websites, and may include such content types as
blog posts, wikis, videos, photos, comments or ecommerce. It is the act of users
promoting a brand rather than the brand itself.
Advantages and disadvantages of UGC
Advantages
1. Take Advantage of Content Curation





Build brand awareness
Establish credibility as a thought leader
Streamline lead nurturing
Boost social media metrics
Support lead generation
2. Boost Social Media Reach and Growth










Strategies that encourage user-generated content on social include:
Create a custom hashtag or photo contest on Instagram
Ask a question or create a challenge on Twitter or Facebook
Launch a video contest
Additionally, designing a social media based UGC campaign increases social
traffic, which results in:
A higher follower base
Extended reach
Increased brand awareness
Boosted social metrics such as likes, shares, comments, retweets
Greater web traffic/page views
3. Get SEO Perks
If your users are publishing content on their own blogs, backlinks to your website
can also improve its SEO ranking. And analyzing the most frequently used words
and phrases your audience uses can improve your keyword optimization research.
14 | P a g e
4. Gain Audience Insights




User-generated content is a gold mine of data
Better understand your audience and what they find engaging. ]
help generate leads and increase sales
If they're writing reviews, notice what customers are complaining about, and
improve on it.
 B2B companies will probably find a Twitter chat or online suggestion box
work better than an Instagram photo contest.
5. Find Unique Content
 Audience will produce different content from your marketing team.
 Take advantage of this "outsider" perspective
 These photos, videos, reviews, blog posts and more offer a fresh take and a
varying point of view.
 Encourages new audiences to join the fun and loyal users to stay engaged.
6. Increase Personalization
 Develop an online community that strengthens the customer/brand
relationship.
 To get your target audience to notice and engage with content is to
understand what resonates with them.
Disadvantages
1. Negative feedback, obscene or rude feedback. Flaming can occur if someone
disagrees with comments by another person.
2. Bias - users often hold strong opinions about a topic and often don't contribute a
balanced perspective
3. Lack of reliability and creditability - anyone can publish content from a 5-year-old
to a University professor, therefore, user generated content must be taken with a
pinch of salt. There's no guarantee that information presented in user generated
content is factual and is why Wikipedia has a poor reputation and often avoided
in referencing
4. Online Defamation risk - users can publish false, offensive or inappropriate
content, which could pose a legal liability towards the website owner. In February
2016, an online user on TripAdvisor, wrote a defaming review of Gold Coast hotel
- Paradise Resort. Such comments could negatively impact the business by
deterring future guests from staying at the hotel.
15 | P a g e
5. Confusion over Intellectual Property - who owns user generated content? There is
often confusion over who owns user generated content and how it can be used?
Concept of web 2.0 and web 3.0
WEB 1.0 - INFORMATION WEB
 It is first generation of web, it allows only read the information from web.
 It has only limited interaction between sites and web users.
 It is simply an information portal where users passively receive information
without being given the opportunity to post reviews, comments, and feedback
 It is era of static websites and representation of static content.
Web 2.0 – SOCIAL WEB
Web 2.0 is a new-age web application, which encourages interactivity, information
sharing, and collaboration on the Internet. It is quite opposite of a website, where
users can take a passive view of the content. Web 2.0 is based on user interaction.
All social networking sites, video sharing sites, blogs, forums, wikis etc. are
examples of web 2.0 application.
Major features of Web 2.0 –
 Free sorting of information permits users to retrieve and classify the
information collectively.
 Dynamic content that is responsive to user input.
 Information flows between site owner and site users by means of evaluation
& online commenting.
 Developed APIs (Application Programming Interface) to allow self-usage,
such as by a software application.
 Web access leads to concern different, from the traditional Internet user base
to a wider variety of users.
Web 3.0 – SEMANTIC WEB
Web 3.0 is based on semantic web. This is a technology, where information and data
are stored in such a way that the computer systems understand them. It may give
birth to a next-gen artificial intelligence. It can lead to a virtual web. With the advent
16 | P a g e
of web 3.0 and virtual games, it is clearly evident that it will discover a new web,
based on a virtual world.
Web 3.0 brings the concept of personal desktop. It gives you the option to save your
data and access it from anywhere in the world. You just need to login to your
account from same browser. It is assumed that web 3.0 allows users to drag and
drop files from their desktop to the internet browser. Several features such as 3D,
seamless animation, high-definition graphics, audio, and video are expected to be
embedded in web 3.0.
Main features that can help us define Web 3.0:
 Semantic Web
The succeeding evolution of the Web involves the Semantic Web. The
semantic web improves web technologies in demand to create, share and
connect content through search and analysis based on the capability to
comprehend the meaning of words, rather than on keywords or numbers.
 Artificial Intelligence
Combining this capability with natural language processing, in Web 3.0,
computers can distinguish information like humans in order to provide faster
and more relevant results. They become more intelligent to fulfil the
requirements of users.
 3D Graphics
The three-dimensional design is being used widely in websites and services in
Web 3.0. Museum guides, computer games, ecommerce, geospatial contexts,
etc. are all examples that use 3D graphics.
 Connectivity
With Web 3.0, information is more connected thanks to semantic metadata.
As a result, the user experience evolves to another level of connectivity that
leverages all the available information.
 Ubiquity
Content is accessible by multiple applications, every device is connected to
the web, the services can be used everywhere.
WEB 4.0 -INTELLIGENT WEB
 It is fourth generation of web
 It is “intelligent”
17 | P a g e




Self -learning
Self-organizing
Connects all devices in the real and virtual world in real time
IoT - IoT encompasses everything connected to the internet, but it is
increasingly being used to define objects that "talk" to each other. "Simply, the
Internet of Things is made up of devices – from simple sensors to
smartphones and wearables – connected together,"
Purpose of worldwide consortium
The W3C (World Wide Web *Consortium) is an international community consisting
of member organisations, full time staff and the public who work together to
develop web standards.
They develop web standards to ensure web accessibility and to ensure that the web
evolves in one direction rather than being split amongst multiple directions by rival
groups.
(*Consortium = an association of two or more individuals, companies, organizations
or governments.)
Purpose of W3C conventions
Web standards are a set of rules that web developers should follow when
developing and choosing file formats for their websites. Of course, anyone can do
anything on the web, but the rules act as a guide to ensure accessibility and
compatibility for all users.
The W3C standards aim to ensure accessibility and compatibility for all users, using
all browsers on all devices.
The Web is fundamentally designed to work for all people, whatever their hardware,
software, language, location, or ability. When the Web meets this goal, it is
accessible to people with a diverse range of hearing, movement, sight, and cognitive
ability.
HTML and CSS
What is HTML?
Hypertext Markup Language (HTML) is the standard markup language used for the
creation, structuring and presentation of web pages, websites and web
applications. Hypertext means machine readable text and markup means to
structure it in a specific format. So, HTML is called hypertext markup language
because it is a language that allows users to organize, improve the appearance of,
and link text with data on the internet. HTML consists of plain text and HTML tags.
The tags instruct the browser how to render (display) the text.
18 | P a g e
W3C sets the standard for the structure and language for a website as HTML, that
means that the web standard for markup languages for websites is HTML. Other
formats are not preferred to ensure web comparability.
What is CSS?
Cascading Style Sheets (CSS) is a style sheet language used for describing the
presentation (e.g. layout, colours, fonts) of a document written in a markup
language like HTML. It describes the style of a HTML document and how HTML
elements should be displayed.CSS is a cornerstone technology of the World Wide
Web, alongside HTML and JavaScript. CSS enables multiple web pages to share
formatting by specifying the relevant CSS in a separate .css file and reduce
complexity and repetition in the structural content. Multiple web pages in a website
will usually by linked to one CSS file controlling the layout, design, colour etc. of
those pages. The CSS standards are maintained by the World Wide Web Consortium
(W3C) and CSS3 is the current standard.
(easy way to remember it for me is, HTML is the structure of the website and the
overall layout, CSS the style of the website)
Graphics
Web graphics are visual representations used on a Web site to enhance or enable
the representation of an idea or feeling. Graphics may Entertain, educate or
emotionally impact the user. Graphics are crucial to strength of branding, clarity of
illustration and ease of use of interface. The use of graphics on Web sites enhances
the experience for users. Different use cases for graphics demand different
solutions:
 Photographs are best represented with PNG – lossless, portable well-compressed
storage, rich color control. PNG is designed for web.
 Line art, data visualization, and even user interfaces need the power of SVG vector
images and Canvas API.
 CSS exists to enhance other formats like HTML or SVG.
 WebCGM meets the needs for technical illustration and documentation in many
industries.
AUDIO AND VIDEO
The terms audio and video commonly refer to the time-based media storage format
for sound/music and moving pictures information. Use of video and audio on
Web sites enhance the experience for users
 Only MP3, WAV, and Ogg audio are supported by the HTML standard.
 The MP4 format is recommended by YouTube
19 | P a g e
ACCESSIBILITY W3C GUIDELINES
Guidelines and resources to help make the Web accessible to people with
auditory, cognitive, neurological, physical, speech, and visual disabilities
Examples of Web Accessibility Guidelines include:
 Alternative Text for Images
 Keyboard Input as an alternative to mouse input
 Transcripts for Audio
INTERNATIONALIZATION
W3C working groups liaise with other organizations to make it possible to use Web
technologies with different languages, scripts, and cultures. Internationalization
comes under the remit of W3C commitment to accessibility and inclusion. You
design or develop your content, application, specification, and so on, in a way that
ensures it will work well for, or can be easily adapted for, users from any
culture, region, or language.
Examples include
 Language options for websites
 Use of Unicode encoded fonts such as Arial, Times New Roman
 Translation options built in that uses translation engines rather than alternative
versions of websites.
 Currency options
 Payment options
MOBILE WEB
Responsive web design takes into account the screen size of web enabled devices.
Over the past years, W3C has developed a number of Web technologies
that explicitly take into account the specificities of mobile devices:
 CSS Mobile, a profile of the cascading style sheet language that matches the need
of mobile Web authors
 SVG Tiny, a profile of the Web’s scalable vector graphics format well-suited to the
capabilities of mobile devices
 XHTML For Mobile, which defines a subset of XHTML for mobile
 The latest generation of mobile browsers are capable of using more advanced
Web technologies, including features from HTML5, CSS 2.1 and 3, a number of rich
JavaScript APIs, opening the way for Web-based mobile applications (including
widgets).
20 | P a g e
Validation techniques for online forms
SERVER-SIDE VALIDATION
Server-side validation is validation which occurs on the server, after the data has
been submitted. Used to validate the data before it is saved into the database. If the
data fails authentication, a response is sent back to the client to tell the user what
corrections to make. Server-side validation is not as user-friendly as client-side
validation, as it does not provide errors until the entire form has been submitted.
However, it is last line of defense against incorrect or even malicious data. All
popular server-side frameworks have features for validating and sanitizing data
(making it safe).
CLIENT-SIDE VALIDATION
Client-side validation is validation that occurs in the browser, before the data has
been submitted to the server. This is more user-friendly than server-side validation
as it gives an instant response. This can be further subdivided: JavaScript validation
is coded using JavaScript. It is completely customizable.
REAL-TIME VALIDATION
Real-time validation is where JavaScript can be used to provide an instant response
to a user action. So rather than having to fill out the entire form and pressing submit,
the user gets an instant response as they are typing so that they can make
immediate corrections if necessary.
One example of real-time validation would be a password strength indicator where
each key stroke triggers the validation and sends a response to indicate to a user
how weak or strong that website thinks the password they have chosen is.
NETWORKS
Types and characteristics of communication protocols
For a network to work correctly it needs to have rules to make the system work.
These rules are called protocols, for example when you type in a web address, it is
the HTTP protocol that is working. A protocol is a set of rules that allow a computing
device to communicate with another computing device. A network standard is an
industry agreed upon standard for the rules that make up protocols
21 | P a g e
A protocol can also be a standard because there is an industry agreed upon set of
rules to use to communicate.
Transmission Control Protocol/Internet Protocol (TCP/IP)
TCP is a popular communication protocol which is used for communicating over a
network. It divides any message into series of packets that are sent from source to
destination and there it gets reassembled at the destination. IP is designed explicitly
as addressing protocol. It is mostly used with TCP. The IP addresses in packets help
in routing them through different nodes in a network until it reaches the destination
system. TCP/IP is the most popular protocol connecting the networks.
Hyper Text Transfer Protocol (HTTP):
It is the standard to transfer hypertext, HTTP is the request, response protocol. A
client requests, yes via typing http... into the web address bar, if the web server can
proceed with the request, ie the web address is correct, it will send the page. If the
server cannot proceed with the request, ie the web address is wrong, it will send an
error page 404 page not found.
Hyper Text Transfer Protocol Secure (HTTPS)
It is the standard to transfer hypertext, but with a secure connection. It is secure
because data passes within a connection encrypted by SSL (secure socket layer). A
web server will authenticate to see if the password, called a digital certificate
public/private key matches, if this key setup matches, it remains secure and you can
get into the webpage.
Wireless Application Protocol (WAP)
WAP is the set of rules governing the transmission and reception of data by
computer applications on or via wireless devices like mobile phones. WAP allows
wireless devices to view specifically designed pages from the Internet using only
plain text and very simple black-and-white pictures.
Some of the advantages of WAP includes:
 simplifies the receipt of internet content to wireless devices
 standardises the way that wireless/mobile devices, such as cellular
telephones and radio transceivers, can be used for internet access, including
email, the World Wide Web, newsgroups, and instant messaging
 enhances wireless specification interoperability
 supported by all operating systems.
22 | P a g e
Types and Characteristics of Communication Standards
802.11x (wireless)
802.11 (sometimes called 802.11x, but not 802.11X) is the generic name of a family
of standards for wireless networking related to Wi-Fi. They form wireless local-area
networks (WLANs). An access point acts as a central transmitter and receiver of
wireless radio signals. Wireless 802.11.x is the Wireless standard to how two
wireless devices use radio waves to communicate with one another.
802.3 (Ethernet)
802.3 is a standard specification for Ethernet, a method of packet-based physical
communication in a local area network (LAN), a LAN is a network of computers and
other electronic devices that covers a small area such as a room, office, or building.
Which is maintained by the Institute of Electrical and Electronics Engineers (IEEE).
In general, 802.3 specifies the physical media and the working characteristics of
Ethernet. Ethernet uses cables to connect devices.
Types of Network Security Measures
Physical Network Security
Protecting your hardware devices from theft and physical intrusion - Corporations
spend large sums to lock their network servers, network switches, and other core
network components in well-guarded facilities.





Lock your servers in a separate room
Use surveillance
Secure the devices within the room
Ensure you have proper ventilation and cooling
Back it up
Password Protection
If applied properly, passwords are extremely effective in improving network
security. A few other best practices in password management go a long way toward
network and device security, too:
 Set strong passwords or passcodes on all devices that join the network.
 Change the default administrator password of network routers.
 Don't share passwords with others unless absolutely necessary.
23 | P a g e
Firewall
A firewall is a network security device/software that monitors incoming and
outgoing network traffic and permits or blocks data packets based on a set of
security rules. Its purpose is to establish a barrier between your internal
network and incoming traffic from external sources (such as the internet) in order
to block malicious traffic like viruses and hackers. Firewalls carefully analyze
incoming traffic based on pre-established rules and filter traffic coming
from unsecured or suspicious sources to prevent attacks. Firewalls can either
be software or hardware, though it’s best to have both. A software firewall is a
program installed on each computer and regulates traffic through port numbers and
applications, while a physical firewall is a piece of equipment installed between your
network and gateway.
IMPACTS OF TECHNOLOGY
Data and information security
Personal Information - Personal information is any information that can be used to
identify you. Personal information could be characterised as belonging to you.
Examples of Personal Information





Address
Date of Birth
Name
Email Address
Phone Number
Sensitive Information - Sensitive information is information that is protected and
should not be disclosed unless under specific circumstances. The Privacy Act defines
sensitive information as "information or an opinion about an individual’s:







racial or ethnic origin;
political opinions;
membership of a political association;
religious beliefs or affiliations;
philosophical beliefs;
membership of a professional or trade association;
criminal record"
24 | P a g e
Purpose of code of conduct
A code of a conduct is a written document that establishes the expected behavior
and standards of employees and acts as grounds for disciplinary action and in
extreme cases, termination where codes have been breached.
Elements of code of conduct
EMPLOYEE WORK HOURS
> Under the Code of Conduct, an employer’s expectation in terms of work hours may
be stated
> At AIC, teachers are expected to be on campus between 8:15am to 3:45 pm
>This would include work breaks
WORK HOURS
> Under the Code of Conduct, work hours accepts a degree of flexibility with ICT
systems.
> ICT can enable workers to work offsite business premises with remote access to
work files and programs.
EMPLOYEE EMAIL USE
> Under the Code of Conduct, email sent using an official company email address is
regarded as official company policy.
> Employees should be careful when sending emails as it gives the receiver written
evidence which could be used to legally enforce contracts or conditions.
>Employees are also refrained from sending inappropriate emails, including but not
limited to offensive emails or defamatory emails about another person.
>Personal emails are allowed to be sent using the business email address as long as
it does not have a significant impact on the productivity of the employee.
>Employees have the right to monitor all communications on business email
addresses.
EMPLOYEE INTERNET USE
> Employees can only use business internet resources for business purposes.
> Employees must not visit websites that could diminish their level of productivity,
websites such as social media, pornography, gambling or online games.
> Employees must also not visit illegal websites.
25 | P a g e
> Employers have the right to monitor all traffic on business internet resources.
> Employees should limit their use of social media to official breaks and it should
never affect their workplace performance
EMPLOYEE PRIVACY
> Employees are allowed a degree of privacy with the right to be trusted when using
business equipment and resources.
> Employees are allowed privacy of confidential and personal information.
> While employers have the right to monitor traffic and activities on ICT systems,
they must also respect the privacy of confidential and personal information.
EMPLOYER'S RIGHT TO MONITOR WORK EMAILS, INTERNET ACCESS AND
PERSONAL USE
> Employers own the business and ICT business resources, including the right to
monitor work emails, internet access and personal use.
> While they have the right to monitor these systems, they should respect the
privacy of personal and confidential information.
> (For example, an employer should avoid opening personal emails and only
checking work related emails).
> Employers have the right to monitor ICT systems as they have the right to:
>Protect the business from legal threats
>Ensure the business reflects a positive reputation
>Ensure workers remain productive
>Protect ICT systems from malware
> Employers however, must consider employee's rights to:
> Be trusted
> Take regular breaks
>Confidentiality of own data
Online censorship in a global context
Internet censorship puts restrictions on what information can be publicized or
viewed on the Internet. Governments and other organizations commonly use
internet censorship to block access to copyrighted information as well as to harmful
or sensitive content. However, internet censorship can also be used as a propaganda
method to promote specific religions and political agendas.
26 | P a g e
Internet censorship is used for protection by
> Preventing individuals accessing copyrighted information.
> Stopping people from viewing harmful or sensitive content.
> Control Internet-related and Internet-communicated crime.
> Monitoring the billions of people on the Internet with varying opinions and
preferences.
> Promote particular religions and political ideas
Forms of online censorship of information
DNS Tampering/filtering: In countries where authorities have control over
domain name servers, officials can “deregister” a domain that is hosting nefarious
content. This makes the website invisible to the browsers of users seeking to access
the site because it prevents the translation of domain names to site IP addresses.
IP Blocking: Governments with control over internet service providers can blacklist
certain IP addresses of websites they do not like. When you request access to a site,
your request is monitored by surveillance computers, which check your request
against a list of blacklisted IP addresses. If you are trying to reach one of these
forbidden sites, the internet service provider will drop the connection, causing it to
fail.
Keyword filtering: IP address filtering only blocks websites that are explicitly
blacklisted. However, there are billions of websites, and new ones are created all the
time, making it nearly impossible to create a fully updated list of sites of forbidden
content. Keyword filtering will inspect website on a per visit basis and scan for
“suspect” keywords.
URL filtering. This mechanism scans the requested Uniform Resource Locator
(URL) string. If the URL includes forbidden terms, the connection will be reset.
Packet filtering/IP address filtering: Packet filters analyze incoming and outgoing
packets and let them pass or not based on the IP addresses of the source and
destination. It can only block communication on the basis of where packets are
going to or coming from – that is, their address – not the actual material of their
contents.
Deep packet filtering: Examines packet contents for banned keywords.
Communication identified as containing forbidden content can be disrupted by
dropping the connection. Users may receive one of a number of error message on
their browsers, none indicating explicitly that they are being censored.
27 | P a g e
Negative impacts of online censorship
> It restricts too much information. It’s entirely possible that real info is blocked
along with fake info, which opens up what you should and shouldn’t restrict/access.
> Who’s to define what is censored and what is not? Are there checks and balances
in place to ensure that what is censored is done so in the best interest of the
community being censored.
> Censors free speech. Internet censorship not only limits the content you can
access but potentially the content you post as well.
> There is a cost. There are human and electronic resources , required to control and
survey Internet users. And this is ultimately at the expense of taxpayers.
Positive impacts of online censorship
> Stop fake news. If more content was closely monitored, it could cut down on the
mass amounts of fraudulent information including false advertising.
> Curb access to harmful activities. The dark web is unchartered territory to the
majority of Internet users, but there are sites that are shockingly easy to find that
are dedicated to illegal acts
Issus with the use of cloud computing
“Cloud computing is the delivery of computing services – servers, storage,
databases, networking, software, analytics and more – over the Internet“
Availability of Online Applications
> The more online applications we have, the more online data we have.
> 10 years ago there were hardly any online applications. Now we have 1000s to
choose from.
> We can use online applications such as social networking to keep in touch with
family and friends.
> Business can choose from 100s of online storage applications.
> The more that data is stored online, the more opportunity for criminal activity
such as theft and fraud.
Level of Accessibility
> Access to the data, means who can get to the data.
> Is it a matter of going to a website and collecting the information.
> Do you need to log in to get the information?
> Google docs uses the login method. So does Facebook, Twitter and many more.
> The more valuable the data is, the more care needs to be taken to keep it safe.
28 | P a g e
> We need to train people to have secure passwords, and to consider unauthorised
access as a way of cloud life.
> Businesses need to consider reliable and secure cloud computing services, if they
were to go down this road.
Confidentiality of Data
> If your data is saved on your home computer, you know it is relatively safe.
> If your data is saved in the cloud, you don’t know if it is safe or not.
> It is the same with business. If stored locally, they know it is mostly safe.
> If business store in the cloud, then there are many questions that can be asked.
> Is the data safe from unauthorised people looking at it and possibly using it?
> The Cloud Service Provider (CSP) may analyse client data.
> Hackers may get into the data and analyse it for business secrets and the like.
> People need to consider where they place confidential or secret data.
>Businesses need to consider if the cloud storage solution they are using is secure
or not.
Sensitivity of Documents
> Data stored in the cloud is important.
> Some are more important than others.
> For example the secret business plans for Holden’s latest model car.
> Patient records for hospital systems are sensitive and their storage needs to be
different from that of a blog post for kid writing about his BMX race on the
weekend.
> The more sensitive the document, the more care needs to be taken to keep it safe.
Impacts of Digital Technologies and global markets on;
Productivity:
> Global markets provides more opportunities for consumers.
> Technological improvements in farm machinery, mean that farmers can buy
tractors that can be driven remotely to seed or plough a paddock.
> Improvements in educational opportunities via online learning improves the
productivity of graduates from universities.
> Improvements in medical diagnosis equipment such as a MRI, means improved
productivity for the health industry.
29 | P a g e
> Digital analysis of business statistics can point out areas where costs can be made
and where cutbacks should occur.
> Computer analysis of production samples can assist purity for minerals such as
gold and iron ore assisting productivity.
> Computer analysis of DNA in police forensics is advancing so that criminals can be
caught and bodies identified which has improved policing productivity
Access to Knowledge or Resources
Access to learning:
> 24/7 access to university and courses online, cheaper method of getting a degree,
less travel,
> 24/7 access to students in schools via school extranets, improved results with
constant feedback for improvement opportunities
> 24/7 access to information on a plethora of topics. We now have access to all past
and present knowledge at our fingertips.
> This makes for a more informed society
> There is also a devaluation of knowledge
Access to entertainment:
> 24/7 access to movies on demand, is there uncontrolled viewing for young kids
watching the wrong thing
> Can lead to indolence
> 24//7 access to online games. Will this lead to lack of concentration in class
Access to work
> 24/7 access to work extranets
> 24/7 access to work cloud storage is convenient, but there are privacy concerns
> 24/7 access to emails and work from home may affect work/life balance
Access to online purchasing:
> 24/7 access to ebay and gumtree style of websites
> 24/7 access to a plethora of items for purchase.
> The long tale with more niche products
> Harder to return items.
Access to family and friends:
> 24/7 access to social networking to share news and events.
> Improved communication for families
> Cyber bullying and social media addiction are issues
30 | P a g e
Outsourcing:
> Outsourcing is getting other companies to do some of a company’s normal
business activity.
> Improvements in digital technologies and availability of global markets assist this
to happen.
> For example, Telstra, Optus and many other companies have outsourced a lot
of customer support off shore.
> An impact of this is that local jobs in Australia are lost.
> Security of company details could be lost off shore.
> Privacy laws in Australia are not relevant in other countries so privacy is a
large issue.
> Quality control of services is up to the whim of the company conducting the
outsourcing.
> Company projects could be copied and sold on as their own causing copyright and
licensing issues.
> The reputation of the company is in the hands of a different company
PROJECT MANAGEMENT
Concept of service level agreement
Service Level Agreements are a contract between a service provider and a user of
the service (ie the customer), that defines the expected quality of services to be
provided by the service provider.
> The SLA may address several areas including the availability of the service, the
performance of the service, how it will operate, priorities, responsibilities of
involved parties, guarantees and warranties.
> As well as defining key areas, the Service Level Agreement may also specify a level
of service, including targets and a minimum level that can be reached.
SLA – PURPOSE:
It is as important to have an SLA as it is to have a contract for business
arrangements of all types as it constitutes a single document that contains the terms
of the agreement as understood by both parties.
> Defines the customer’s needs and wants
> Provides a framework of understanding between the supplier and consumer
> Simplifies complex issues with supply of the service
31 | P a g e
> Reduce areas of conflict between supplier and consumer
> Encourages dialogue in the event of disputes
> Eliminates any unrealistic expectations from either party.
Features of SLA
Availability of services
This section of the Service Level Agreement outlines the period of time the services
will be provided and the quality of service to be provided, including outlining any
downtimes such as those from routine maintenance, planned outages or unplanned
outages. This indicates the amount of time/window of time that the services
managed by the outsourcer are available, ranging from online application
availability to delivery of reports by a specified time of day. Measures can be
reported positively or negatively and usually incorporate some level of tolerance
(for example, online application availability 99 percent of the time between the
hours of 8:00 am and 6:00 pm).
Types of services
Customer Service Level Agreement
A customer service level agreement is a contract between a service provider and an
external customer. An external customer is someone who receives services in
exchange for money.
Customer Service Level Agreements often outlines support services to be provided
to the customer such as help desks, email/phone/online support.
Internal Service Level Agreement
An internal service level agreement is a contract for an internal customer, that is
someone who works in a different department of the same organisation.
An Internal Service Level Agreement outlines the expected quality of services to be
received by an internal service provider and outlines items such as response times.
Vendor Service Level Agreement
A vendor service level agreement is a contact between a service provider and a
vendor. A vendor is someone who provides service to the company.
For example, you could hire someone to provide ICT support and guarantees uptime
of ICT services.
32 | P a g e
Advantages of local and global outsourcing compared with in-house
WHAT IS OUTSOURCING
> Outsourcing is an arrangement in which one party provides services for another
> Traditionally these services may have been provided in-house (within the
company).
In-house (sometimes called insourcing)






If a company is to make a product (or service) it will need employees to do it.
Employees need to be paid a minimum wage.
Employees need holiday pay.
Employees need long service leave (in Australia)
Employees need sick leave.
All of these costs add up, so some companies don't produce things in-house
anymore. They outsource.
OUTSOURCING VS. IN-HOUSE:
Local
> Outsourcing locally can be beneficial to both the business and the local economy.
> By outsourcing services the company will get expertise whilst also fostering
employment locally
Global
> Outsourcing globally can mean that you get a wider range of expertise.
> It can also be cheaper to outsource a job/service overseas as wages are lower in
those countries.
Advantages of Local Outsourcing
 Cost efficiencies - Outsourcing producers could have significantly larger
production facilities or more specialised equipment to lower the unit cost of
production
 Mass production - Outsourcing can produce large output demanded by
businesses. Producing large outputs reduce the unit costs of production.
33 | P a g e
 Greater focus on core business areas - eliminating focus on manufacturing
aspects of their business, businesses can dedicate more resources to
increasing client relationships, marketing and research and development.
 Eliminates required investment in infrastructure and technology - in addition,
businesses do not need to constantly upgrade equipment and can get access
to the latest manufacturing equipment
 Access to skilled workers - eliminates the need for businesses to recruit and
train employees
Advantages of Global Outsourcing
In addition to the above benefits of local outsourcing, global outsourcing also offers
additional benefits including:
 Lower company tax rates - businesses may be able to save money by
producing elsewhere to take advantage of lower company tax rates such as
Ireland at 12.5%, Germany at 15%, Cambodia at 20% while Australia's
company tax rate is 30%
 Lower regulation and red tape - other countries can have significant less
barriers to production. For example, outsourcing can avoid strict
environmental, planning and employee regulation.
 Lower wage costs - Australia has relatively high minimum wages.
Outsourcing can take advantage of lower wage costs in developing countries.
DRAWBACKS OF OUTSOURCING
> Risk that outsourcing supplier will fail to meet quality standards or otherwise not
deliver
> Potential loss of expertise from the business
> No guarantee that costs will be lower
Advantages of In-House Production
 Greater quality control - the business is able to examine the quality of the
manufacture of goods or providing of service.
 Easier customisation - the business is able to easily modify production to suit
special orders or request by customers. Outsourcers may have difficulty
understanding the client requirements of special orders.
34 | P a g e
 Greater volume production control - the business can easily adjust its volume
of production in accordance to demand. If there is low demand for a product,
the business can easily decrease production whereas outsourcing could be
contracted to a fixed volume.
 May be cost effective at small volumes
 No transportation delays - businesses have to wait for outsourced production
to arrive at the business which is especially long for global outsourcers
 Lower shipping and distribution costs
Purpose of Outsourcing data management
Data management consists of the entry and policies of the storage of valuable data.
Why do Businesses Outsource Data Management?
 Save on costs - global outsourcing of data management leads to lower costs
but achieves the same purpose.
 Eliminate investment on infrastructure and technology - businesses will not
need to invest in data management technologies and eliminates the need to
constantly increase expenditure on acquiring latest data management
systems. Outsourcing provides access to the latest data management systems.
 Saves on ICT costs in managing data in-house - eliminates cost for support,
hardware and software of data management
 Saves on physical space
Evaluating Digital Solutions for Usability
How can you evaluate a digital product?
 Surveys - ask for user's opinions about the use of an ICT product by filling out
a survey. The survey can be used to gather analytics about areas of ICT
product that are liked and disliked and any comments or recommendations.
The survey results can then be used to refine an ICT product to meet the
needs of its users.
 Self Reflection - the creator of an ICT product could critically evaluate aspects
of an ICT product for usability, noting down any areas that could be refined
and improved.
35 | P a g e
 Client Feedback - the creator of an ICT product could ask the client to
evaluate the product, noting down any areas where features can be added or
removed. The ICT product can then be refined to suit the client's needs.
Download