MSYS559-17B (NET)
E-Business Technologies
15 Points
Staff
Convenor(s)
Heidi Lu
To be advised
heidi.lu@waikato.ac.nz
|
Administrator(s)
Librarian(s)
You can contact staff by:
- Calling +64 7 838 4466 select option 1, then enter the extension.
-
Extensions starting with 4, 5 or 9 can also be direct dialled:
- For extensions starting with 4: dial +64 7 838 extension.
- For extensions starting with 5: dial +64 7 858 extension.
- For extensions starting with 9: dial +64 7 837 extension.
Paper Description
Paper Structure
This is a fully online paper. This course has material for 12 weeks. Each week has between three and five videos containing the respective material plus hints and requests for self-study. In addition to watching the videos, students are required to
-Read or watch supplementary material provided in folder "ToRead or View (week number)"
-Perform activities as outlined in the video
-Write their own blog to record what has been discussed and what they have learned; this should also cover the supplementary material
-Participate in online discussion of each other's blog entries. Ideally, blog entries are written weekly.
Learning Outcomes
Students who successfully complete the course should be able to:
Assessment
Assessment Components
The internal assessment/exam ratio (as stated in the University Calendar) is 1:0. There is no final exam.
Required and Recommended Readings
Required Readings
Internet business models
Corpu.com (2016). Business model canvas. Retrieved from https://corpu.com/wwwmedia/courses/course-overviews/business-model-canvas.pdf
Gassmann, O., Frankenberger, K., & Csik, M. (2013). The St. Gallen business model navigator (working paper). St Gallen, Switzerland: University of St Gallen.
Ovans, A. (2015). What is a business model.Harvard Business Review,23, 1-10.
Rappa, M. (2010). Business models on the web. Retrieved from http://digitalenterprise.org/models/models.html
Weinberger, M. (2013). Business models and the internet of things. Retrieved from http://blog.bosch-si.com/categories/business-models/2013/11/business-models-and-the-internet-of-things/
Search technology
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Five)
Advertising technology
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Eight)
Recommender systems
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Nine)
Social media technology and social networks
Kietzmann, J. H., Hermkens, K., McCarthy, I. P., & Silvestre, B. S. (2011). Social media? Get serious! Understanding the functional building blocks of social media.Business horizons,54(3), 241-251.
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Ten)
Trainor, K. J., Andzulis, J. M., Rapp, A., & Agnihotri, R. (2014). Social media technology usage and customer relationship performance: A capabilities-based examination of social CRM.Journal of Business Research,67(6), 1201-1208.
Video to watch: “Air NZ Social Media Strategy” in course file.
Cloud computing technologies and cloud security
Gallagher, S. (2014). In-depth: How cloudflare promises SSL security without the key. Retrieved from http://arstechnica.com/information-technology/2014/09/in-depth-how-cloudflares-new-web-service-promises-security-without-the-key/
Osborne, C. (2015). The top trends shaping the face of cloud services by 2020. Retrieved from http://www.zdnet.com/article/the-top-trends-shaping-the-face-of-cloud-services-by-2020/
Stadtmueller, L. (2014). Stepping into the cloud: A practical guide to creating and implementing a successful cloud. Retrieved from http://www-935.ibm.com/services/us/leveragingit/stepping-into-the-cloud-ibm.pdf
University of Cambridge. (2015). How can we protect our information in the era of cloud computing? Retrieved from http://www.cam.ac.uk/research/news/how-can-we-protect-our-information-in-the-era-of-cloud-computing
Big Data technology
IBM. (2015). Five ways to get started with big data. Retrieved from http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=IMW14710USEN
Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014).Mining of massive datasets. Cambridge University Press. (Chapter Two)
Russom, P. (2015). Hadoop for the Enterprise: Making data management massively scalable, agile, feature-rich, and cost-effective. Retrieved from https://www.cloudera.com/content/dam/cloudera/Resources/PDF/Reports/TDWI-Best-Practices-Report_Hadoop-for-the-Enterprise.pdf
Walker, R. (2015). From big data to big profits: A lesson from Google’s Nest. Retrieved from http://www.kdnuggets.com/2015/07/big->Technological foundations of Business Intelligence (BI) and data warehouses
Fields, E. (2013). Top 10 trends in business intelligence for 2014. Retrieved from http://www.tableau.com/about/blog/2013/12/top-10-trends-business-intelligence-2014-27275
Russom, P. (2013). Integrating Hadoop into business intelligence and data warehousing. Retrieved from https://tdwi.org/research/2013/04/tdwi-best-practices-report-integrating-hadoop-into-business-intelligence-and->E-business architectures, service orientation
IBM developerWorks. (2007). SOA terminology overview, part 1: Service,
architecture, governance, and business terms. Retrieved from http://www.ibm.com/developerworks/library/ws-soa-term1/
IBM developerWorks. (2007). SOA terminology overview, part 2: Development processes, models, and assets. Retrieved from http://www.ibm.com/developerworks/library/ws-soa-term2/
Kharytonov, S., & Sukholeyster, O. (2012). Enterprise IT architecture: Goals, trends and perspectives. Retrieved from http://sandhill.com/article/enterprise-it-architecture-goals-trends-and-perspectives/
Koushik, S., & Joodi, P. (2000). E-business architecture design issues.IT Professional,2(3), 38-43.
Technologies for mobile commerce and location-based services
Fatemi, F. (2015). The future of the web is all about context. Retrieved from https://techcrunch.com/2015/08/18/the-future-of-the-web-is-all-about-context/#.ceaetn:Cl9H
Marr, B. (2015). The amazing ways Uber is using big data. Retrieved from http://www.datasciencecentral.com/profiles/blogs/the-amazing-ways-uber-is-using-big-data
Taiji, A. (2014). Top 10 essential tools in Airbnb hosts should have. Retrieved from http://thenextweb.com/gadgets/2014/03/13/top-10-tools-airbnb-hosts-2014/
Tepper, F. (2015). Uber’s new update gives food delivery as much attention as transportation. Retrieved from https://techcrunch.com/2015/08/17/ubers-new-update-gives-food-delivery-as-much-attention-as-transportation/
Yusuf, R.M. (2015). How innovation is disrupting the energy industry – and what it means for the Middle East and North Africa. Retrieved from http://blogs.worldbank.org/arabvoices/how-innovation-disrupting-energy-industry-and-what-it-means-middle-east-and-north-africa
Technological basis of the Internet of Things and ubiquitous computing
O’Reilly, T. (2015). Software above the level of a single device: The implications. Retrieved from http://www.oreilly.com/iot/free/software-above-device.csp
Trend Micro. (2015). Walking into wearable threats: Assessing business readiness for wearable devices. Retrieved from http://www.trendmicro.co.uk/media/campaigns/wearables/uk/pdf/wearables-pdf.pdf
Recommended Readings
Other Resources
Online Support
Workload
This is a 500 level course, and the 15 points represent approximately 150 learning hours on the part of the students. This course runs over 12 weeks, students are expected to put in at least 15 hours per week of learning effort over the duration of the course.
Linkages to Other Papers
Prerequisite(s)
MSYS458 or equivalent at the discretion of the Chairperson.