You are on page 1of 4

20; 21 2021

MODULE NAME: MODULE CODE:


MANAGEMENT INFORMATION SYSTEMS MISY6211/d/e/f/p/w

ASSESSMENT TYPE: ASSIGNMENT 1 (PAPER ONLY)

TOTAL MARK ALLOCATION: 100 MARKS

TOTAL HOURS: 10 HOURS

By submitting this assignment, you acknowledge that you have read and understood all the rules
as per the terms in the registration contract, in particular the assignment and assessment rules in
The IIE Assessment Strategy and Policy (IIE009), the intellectual integrity and plagiarism rules in
the Intellectual Integrity Policy (IIE023), as well as any rules and regulations published in the
student portal.

INSTRUCTIONS:

1. No material may be copied from original sources, even if referenced correctly, unless it is a
direct quote indicated with quotation marks. No more than 10% of the assignment may
consist of direct quotes.
2. Any assignment with a similarity index of more than 25% will be scrutinised for
plagiarism. Please ensure you attach an originality report to your assignment if required.
3. Make a copy of your assignment before handing it in.
4. Assignments must be typed unless otherwise specified.
5. All work must be adequately and correctly referenced.
6. Begin each section on a new page.
7. Follow all instructions on the assignment cover sheet.
8. This is an individual assignment.

© The Independent Institute of Education (Pty) Ltd 2021


Page 1 of 4
20; 21 2021

Referencing Rubric
Providing evidence based on valid and referenced academic sources Markers are required to provide feedback to students by indicating
is a fundamental educational principle and the cornerstone of high- (circling/underlining) the information that best describes the
quality academic work. Hence, The IIE considers it essential to student’s work.
develop the referencing skills of our students in our commitment to
achieve high academic standards. Part of achieving these high Minor technical referencing errors: 5% deduction from the
standards is referencing in a way that is consistent, technically overall percentage – the student’s work contains five or more
correct and congruent. This is not plagiarism, which is handled errors listed in the minor errors column in the table below.
differently.
Major technical referencing errors: 10% deduction from the
Poor quality formatting in your referencing will result in a penalty of overall percentage – the student’s work contains five or more
a maximum of ten percent being deducted from the percentage errors listed in the major errors column in the table below.
awarded, according to the following guidelines. Please note,
however, that evidence of plagiarism in the form of copied or If both minor and major errors are indicated, then 10% only (and
uncited work (not referenced), absent reference lists, or not 5% or 15%) is deducted from the overall percentage. The
exceptionally poor referencing, may result in action being taken in examples provided below are not exhaustive but are provided to
accordance with The IIE’s Intellectual Integrity Policy (0023). illustrate the error.

Required: Minor errors in technical correctness of Major errors in technical correctness of referencing
Technically correct referencing referencing style style
style Deduct 5% from percentage awarded Deduct 10% from percentage awarded
Consistency Minor inconsistencies. Major inconsistencies.
• The referencing style is generally • Poor and inconsistent referencing style used in-
• The same referencing format consistent, but there are one or two text and/or in the bibliography/ reference list.
has been used for all in-text changes in the format of in-text • Multiple formats for the same type of referencing
references and in the referencing and/or in the bibliography. have been used.
bibliography/reference list. • For example, page numbers for direct • For example, the format for direct quotes (in-text)
quotes (in-text) have been provided for and/or book chapters (bibliography/ reference
one source, but not in another instance. list) is different across multiple instances.
Two book chapters (bibliography) have
been referenced in the bibliography in
two different formats.
Technical correctness Generally, technically correct with some Technically incorrect.
minor errors. • The referencing format is incorrect.
• Referencing format is • The correct referencing format has been • Concepts and ideas are typically referenced, but a
technically correct throughout consistently used, but there are one or reference is missing from small sections of the
the submission. two errors. work.
• Concepts and ideas are typically • Position of the references: references are only
• Position of the reference: a referenced, but a reference is missing given at the beginning or end of large sections of
reference is directly associated from one small section of the work. work.
with every concept or idea. • Position of the references: references • For example, incorrect author information is
are only given at the beginning or end of provided, no year of publication is provided,
• For example, quotation marks, every paragraph. quotation marks and/or page numbers for direct
page numbers, years, etc. are • For example, the student has incorrectly quotes missing, page numbers are provided for
applied correctly, sources in presented direct quotes (in-text) and/or paraphrased material, the incorrect punctuation is
the bibliography/reference list book chapters (bibliography/reference used (in-text); the bibliography/reference list is
are correctly presented. list). not in alphabetical order, the incorrect format for
a book chapter/journal article is used, information
is missing e.g. no place of publication had been
provided (bibliography); repeated sources on the
reference list.
Congruence between in-text Generally, congruence between the in- A lack of congruence between the in-text
referencing and bibliography/ text referencing and the bibliography/ referencing and the bibliography.
reference list reference list with one or two errors. • No relationship/several incongruencies between
• There is largely a match between the the in-text referencing and the
• All sources are accurately sources presented in-text and the bibliography/reference list.
reflected and are all accurately bibliography. • For example, sources are included in-text, but not
included in the bibliography/ • For example, a source appears in the in the bibliography and vice versa, a link, rather
reference list. text, but not in the bibliography/ than the actual reference is provided in the
reference list or vice versa. bibliography.
In summary: the recording of In summary, at least 80% of the sources In summary, at least 60% of the sources are
references is accurate and are correctly reflected and included in a incorrectly reflected and/or not included in
complete. reference list. reference list.

Overall Feedback about the consistency, technical correctness and congruence between in-text referencing and bibliography:
....................................................................................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................................................................................

© The Independent Institute of Education (Pty) Ltd 2021


Page 2 of 4
20; 21 2021

Question 1 (Marks: 10)


This question relates to the ethical issues associated with information technology. Evidence of
research is needed.

Consider the ten commandments of computer ethics provided in the textbook. Select any five of
these commandments. Then, find one published example that describes a violation of each of the
selected commandments.

Note: The violation identified should be described.

Question 2 (Marks: 15)


Social engineering provides criminals with a means to trick unsuspecting victims into revealing
personal information. The topic of the question in this section is social engineering. This question
will require you to conduct additional research.
A perpetrator first investigates the intended victim to
gather necessary background information, such as
potential points of entry and weak security protocols,
Design an A4-size poster which can be used to create awarenessneeded about the with
to proceed dangers of social
the attack. Then, the attacker
moves to gain the victim’s trust and provide stimuli for
engineering. Address the following aspects in your poster:subsequent actions that break security practices, such
as revealing sensitive information or granting access to
• What is social engineering? social engineering is the psychological
critical resources
manipulation of people into performing actions or
divulging confidential information
• Statistics on the prevalence of social engineering in South Africa.
• Three examples of how social engineering takes place. Baiting
As its name implies, baiting attacks use a false promise to
pique a victim’s greed or curiosity. They lure users into a
• Three measures an individual can take to avoid becoming a victim of social engineering.
trap that steals their personal information or inflicts their
systems with malware
• Steps an individual can take if one finds oneself a victim of social engineering.
Phishing
As one of the most popular social engineering attack types,
phishing scams are email and text message campaigns
Question 3 aimed at creating a sense (Marks: 15)curiosity or fear in
of urgency,
victims. It then prods them into revealing sensitive
You have decided to create an application specifically designedinformation,
for the students
clickingon
onyour
links campus.
to malicious websites, or
opening attachments that contain malware.
Students can use your application to order anything from textbooks to computer consumables.
Scareware
Scareware involves victims being bombarded with false
alarms and fictitious threats. Users are deceived to think
Explain how you will implement the B2C e-commerce cycle in your
their application.
system is infected with malware, prompting them to
install software that has no real benefit (other than for the
perpetrator) or is malware itself. Scareware is also referred
to as deception software, rogue scanner software and
fraudware.

© The Independent Institute of Education (Pty) Ltd 2021


Page 3 of 4
20; 21 2021

Question 4 (Marks: 15)


CQ is an organisation that realised that they can save money by importing the raw materials in
bulk from an overseas supplier who wishes to invest in South Africa. CQ has realised that although
it will be highly beneficial to partner with overseas suppliers, it might be tricky to manage the
relationships. They are considering the implementation of SAP’s Ariba suite of solutions to help
manage this relationship.

Conduct additional research on SAP’s Ariba suite of solutions. Then, by referring to any five of the
operational and strategic requirements for a Global Information Systems (GIS), state how SAP’s
Ariba suite of solutions can aid CQ in managing their relationship with the overseas suppliers.

Question 5 (Marks: 20)


An educational institution, which caters for distance learning students, wishes to develop a web
application that will support their students. Students will be able to download all their course
material from the system and upload their assignments to the system for marking. This will also
be the primary platform which administrators and lecturers will use to communicate with
students. The system is expected to be made operational from within one year after development
has commenced.

Briefly explain what will happen during the planning phase for the development of the web
application described in the scenario at the beginning of the question.

Question 6 (Marks: 25)


Effective knowledge management systems can benefit an organisation by promoting the sharing
of knowledge and ideas, improving customer service, increasing revenue and improving employee
retention. The effectiveness of a knowledge management system relies on a well-designed
knowledge management infrastructure which will provide the long-term foundation for these
systems.

Conduct additional research. Then, identify and describe the five components of a knowledge
management infrastructure. Also describe how each component should be implemented in order
to support the effectiveness of the knowledge management system.

© The Independent Institute of Education (Pty) Ltd 2021


Page 4 of 4

You might also like