Why are businesses becoming so dependent on mobile applications?

Neccessities of Project Management.
September 20, 2019
Types of positive communication styles.
September 20, 2019

Why are businesses becoming so dependent on mobile applications?

Question Description

You are to research and prepare answers to all questions listed below. You may use quotations or referenced paraphrasing, but you must always summarise your findings and conclusions in your own words. Failure to do this will cost you marks – see marking guide. Answers to each question should be around 250 to 300 words. Be succinct and to the point.

Sources of information:

Do not use direct quotations. Instead, you are required to research, read, understand and then explain in your own words. Any paraphrasing from sources must be correctly referenced in-text and in the References section, using the Harvard referencing standard.

Use a variety of web sources, journals and books (avoid using Wikipedia for every question). It is always helpful to read about the same topics from more than one source. Visit the CQU library journal database. The minimum resource to use for all questions is the prescribed textbook.

Report document layout and formatting requirements

This report should be from the third person point of view, which is standard in business reports. Your report must have the following sections in the order listed:

1. Title Page: Include on your title page a suitable title for the assignment, your name, student number, date. (no executive summary)

2. Table of Contents: The Table of Contents (TOC) must be generated by the word processor software. The title page and table of contents itself should not appear in the table of contents. The table of contents should be on its own page.

3. The Questions: Type out each question formatted as a sub-heading. Each question should then be an entry in the Table of Contents with page reference see hint below. Your answer should then follow the question with a space in between. Number each question.

4. Hint: You do not have to make the entire question a heading that appears in the Table of Contents. You can use the first sentence of the question as the heading, and then include the question as plain text below this heading.

IMPORTANT: Do not attempt to shorten or to re-phrase the question, as this runs the risk of accidentally changing the question. Marking will always be against the original question as published in this specification.

5. References: Include in this section any web site addresses from which you obtained information, as well as information or help you received from any other sources, including the textbook. Remember that only cited sources should be included in a References section. Use the Harvard system of referencing to correctly cite in-text as well as listing in the References. For the purpose of this assignment, avoid using direct citations or quotes. You are to read sources, develop an understanding of the material, and paraphrase using your own words. Unreferenced direct quotations may be treated as plagiarism. If or when you paraphrase an idea, you should certainly use an in-text reference to note the source.

6. Header & Footer: Provide a header and footer for your assignment. In the header, put your student ID on the left side and your full name on the right side. In the footer, insert a page number, centered. The header and footer should not appear on the Title Page or on the Table of Contents page, but should appear on all other pages.

7. Style: Use a word processor to create the business report in portrait-mode, single spaced, Times New Roman (TNR), 12-point font for all non-heading text.

The Ten Questions:

page3image37674496

  1. Why are businesses becoming so dependent on mobile applications? Provide specific examples to support your answer.Source: Chapter 1 and online search
  2. Apply Porter’s five competitive forces model to a business example in an Australia company such as Big W (www.bigw.com.au) or Telstra (you can nominate a company as you would like). Discuss the competitive strategy of the business of this company and how the Internet has influenced the various competitive forces for the business of this company.Source: Chapter 2 and online search
  3. Explain Internet access in the United States and throughout the world is continuing to grow steadily. In early 2016, nearly 50 percent of the world’s total population was accessing the Internet. In the United States, 88.5 percent of the population was accessing the Internet. Whereas many western European countries are in the mid-90 percent range and slowly move toward 100 percent penetration, Iceland is still ranked as the only country having 100 percent of its population online. At the other end of the spectrum, many small and very poor countries are still struggling to gain access. In countries such as Guinea, Somalia, and Eritrea, less than 2 percent of the population is online. In between the bottom and the top, access varies widely. In Asia, about 50 percent of the population has access, while less than 10 percent of those living in Africa have access.

(a) Search the web for the most up-to-date statistics.
(b) Discuss how these numbers will look in 5 years and 10 years. What changes have to be

made to the global networking infrastructure? What issues/opportunities do you see arising?

Source: Chapter 3 and online search

4. Describe social commerce and explain how companies can leverage consumer’s socialnetworks.Source: Chapter 4 and online search

5. Discuss three of the downsides and dangers using social media applications.Source: Chapter 5 and online search

6. Define a Database Management System (DBMS). What is an entity? Differentiate between records and attributes with example.Source: Chapter 6 and online search

7. Why do organizations need integrated enterprise systems?Source: Chapter 7 and online search

8. Briefly describe the concept of portals in the context of supply chain management.Source: Chapter 8 and online search

9. Describe some methods of requirements collection during systems analysis.Source: Chapter 9 and online search

10. (a) What is unauthorized access? Provide a few examples for unauthorized access.
(b) Write a short note on information systems risk assessment. What are the three ways in

which organizations react to perceived risks?

Source: Chapter 10 and online search