You are on page 1of 36

BANNER ID: 001085680

STUDENT NAME: Ronald Fred Sikwese

COURSEWORK TITLE: Information and Content Management (Coursework 1)

COURSEWORK CODE: COMP1643

COURSEWORK LEADER: Pradeepan Manickam

CENTER NAME: NACIT Blantyre Campus (Blantyre, Malawi)


Table of Contents
Introduction ..................................................................................................................................... 3

1 – Evaluation of Enterprise 2.0 Systems .................................................................................. 4

1.1 – Defining criteria to evaluate different Enterprise 2.0 products ..................................... 4

1.1.1 – Improve staff engagement within the organization ............................................... 4

1.1.2 – Facilitate workflows............................................................................................... 4

1.1.3 – Develop an intranet for the organization ............................................................... 5

1.2 – Evaluation of Enterprise 2.0 by criteria ........................................................................ 5

1.2.1 – Performance ........................................................................................................... 5

1.2.2 – Ease of use ............................................................................................................. 5

1.2.3 – Customization ........................................................................................................ 6

1.2.4 – Support ................................................................................................................... 6

1.2.5 – Collaboration.......................................................................................................... 6

1.2.6 – Communication ...................................................................................................... 6

1.2.7 – Security .................................................................................................................. 6

1.2.8 – Migration................................................................................................................ 6

1.2.9 – SEO ........................................................................................................................ 6

Verdict..................................................................................................................................... 7

1.3 – Scoring Model ............................................................................................................... 7

2 – Legal, Ethical and Social Issues of Web 2.0 Systems ......................................................... 9

2.1 – Legal issues ................................................................................................................... 9

2.1.1 – Data privacy ........................................................................................................... 9

2.1.2 – Data loss ................................................................................................................. 9

2.1.3 – Illegal gaming ........................................................................................................ 9

2.1.4 – Confidentiality ....................................................................................................... 9

Page 1 of 35
2.2 – Ethical issues ................................................................................................................. 9

2.2.1 – Digital divide ......................................................................................................... 9

2.2.2 – Offensive Content and Censorship ...................................................................... 10

2.2.3 – Identity Theft ....................................................................................................... 10

2.3 – Social issues ................................................................................................................ 10

2.3.1 – Social isolation ..................................................................................................... 10

2.3.2 – Availability of services ........................................................................................ 10

2.3.3 – Culture and change .............................................................................................. 10

2.4 – Facebook Data Breach ..................................................................................................... 10

2.5 – US bans Huawei from dealing with American Companies.............................................. 11

2.6 – Why Enterprise 2.0 is better than Web 2.0 ...................................................................... 12

3 – Features of an Enterprise 2.0 System ................................................................................. 13

3.1 – Office 365 ......................................................................................................................... 13

3.2 – Change look and feel ........................................................................................................ 15

3.3 – Using web parts ................................................................................................................ 19

3.4 – Permissions Management ................................................................................................. 23

3.5 – Connectivity with mobile ................................................................................................. 25

3.6 – Document Management ................................................................................................... 29

Conclusion .................................................................................................................................... 33

References ..................................................................................................................................... 34

Page 2 of 35
Introduction
This report is going to cover the evaluation two Enterprise 2.0 against chosen criteria with a
scoring model. The ethical, social and legal issues of Web 2.0 systems are going to be discussed
in comparison to the Facebook data breach and Huawei’s US ban. Finally, six features of a
chosen Enterprise 2.0 system will be shown and explained.

Page 3 of 35
1 – Evaluation of Enterprise 2.0 Systems
Enterprise 2.0 are collaborative technologies that help end users work together to accomplish a
task (Bughin & Manyika, 2015).

1.1 – Defining criteria to evaluate different Enterprise 2.0 products


From the services that Enterprise 2.0 will offer to the organization, the following criteria were
discovered for each:

1.1.1 – Improve staff engagement within the organization


o Search Engine Optimization (SEO): As part of performance, the website must have a
URL that can easily be picked up by search engines. The site is supposed to have a 70%
chance of being found by the search engine.
o Ease of use: The CMS must be user friendly in the event that staff with technical skills
are able to make a website. The time it takes for users to find features in the CMS is
considered, such as adding articles to their site.
o Customization: The CMS must allow the user to customize the website to their liking.
Again, it is all about speed. How fast is the user able to find the right tools to change the
look and feel of the website?
o Support: When users run into problems, open source solutions must be readily available
(SCHÄFERHOFF, 2018). You can determine its success when there are less people
complaining about finding solutions.

1.1.2 – Facilitate workflows


o Communication: Teams must be able to communicate through the CMS by sharing
comments, documents and other resources. The CMS must provide a number of ways to
enable the users to communicate.
o Collaboration: The staff in the organization should be able to work a website together
other than having one person do it (SCHÄFERHOFF, 2018). There should be no
conflicts when users are working together on a website.

Page 4 of 35
o Migration: The website developed from the CMS must work after being exported to
another machine. There must be 0 failure when moving the website to another CMS to
determine the success of migration.

1.1.3 – Develop an intranet for the organization


o Security: The CMS must handle spam and attacks from hackers. The system must have
minimal breaches from anonymous sources for a period of time. Such as, 1 breach per
month.
o Collaboration: The CMS should support the end users working together when it is set up
in the organization’s private network.
o Performance: The responsiveness of loading web pages and content should not lag
(SCHÄFERHOFF, 2018). The time it takes for the CMS to respond to the user’s
interaction is measured.

1.2 – Evaluation of Enterprise 2.0 by criteria


The two CMS software to be compared are Joomla 3.9.12-0 and Drupal 8.7.7. These two CMS
are going to be compared against these criteria:

1.2.1 – Performance
Performance is measured how fast it can render a page. Drupal has no problem loading content
from large website because of its smart algorithms that allow it to scale (Drupal, 2019). Joomla
itself is lightweight and optimized in order to load the website without any trouble (Joomla,
2019).

1.2.2 – Ease of use


Drupal is a CMS that is more technically advanced and has a steeper learning curve because it
requires some knowledge in programming languages such as PHP. This means those without any
knowledge will find it harder and it will take time to make edits to their webpages. On the other
hand, Joomla is “balanced between the array of features and the ease to use these features”
(Chahal, 2019), but its page editor is nested within a complex layout that can be challenging to
understand.

Page 5 of 35
1.2.3 – Customization
Both of these platforms are highly customizable, but Drupal has the upper hand of over 42000
plugins as compared to over 7000 in Joomla (Chahal, 2019). The more plugins available for the
users, the more edits they can put in their website to their liking.

1.2.4 – Support
Joomla and Drupal are both community-based CMS where users can ask their questions and get
answered by others. Even though Joomla has a smaller community, it still delivers.

1.2.5 – Collaboration
Joomla has different access levels and permissions for each user and also provides a history of
when content was added, edited and deleted. Drupal doesn’t offer predefined user roles. Instead
it requires you to make your own. This is addition to the learning curve.

1.2.6 – Communication
Just like collaboration, both CMS will have a feature where the users can talk to each other by
leaving notes. Sometimes blogs are used for communication.

1.2.7 – Security
Both CMS platforms have proactive security measures and offer documentation when the user
experiences a breach. In addition, they have extensions that can be used to add more security to
the CMS.

1.2.8 – Migration
Drupal has a native way of migrating your content from the previous version to the current
version, but for Joomla you need to download a few extensions to aid the migration process.

1.2.9 – SEO
There is an in-built caching in Drupal to load pages faster. Themes in Drupal also help the
website to be responsive on different devices. Whereas Joomla’s SEO, title tag optimization and
meta description can be difficult to manage. Beginners will always have a problem configuring
the right SEO.

Page 6 of 35
Verdict
After evaluating both of these CMS, Drupal will be a better choice for the organization to use.
Mainly because it is more customizable than Joomla. Even though it not that user friendly and is
complex to set-up collaboration, it offers better SEO as compared to Joomla.

1.3 – Scoring Model


Below is the breakdown to the conclusion of using Drupal over Joomla.

This is the key to the scoring in the model

Description Poor Below average Average Above average Excellent


Value 10 20 30 40 50

Below is the table that shoes the scoring model of both Enterprise 2.0 systems:

Figure 1: Scoring Model of Enterprise 2.0 systems evaluation

Page 7 of 35
Figure 2: Bar chart showing visual results of evaluation

Figure 3: The result of how the decision was made

URL to the Scoring Model: https://youtu.be/5LXm1rEjx50

Page 8 of 35
2 – Legal, Ethical and Social Issues of Web 2.0 Systems
Using web 2.0 can bring up many problems in to the organization. Legal issues are how the rules
and regulations are broken by the systems, ethical issues mainly talk about getting consent from
users to use their personal information and to evaluate whether you are doing the right thing or
not, and social issues are the factors that will affect an individual (Hoeyer, 2012).

2.1 – Legal issues


2.1.1 – Data privacy
The systems should be able to handle the user’s information with care by protecting it from the
internet. (ACM, 2018) has a law stating “Respect privacy” that user’s information must remain
private and only used for the right purposes imposed by the organization.

2.1.2 – Data loss


At any cost any of the web 2.0 systems should not delete the users’ personal information that is
stored. Failure to secure the information will violate honesty and trustworthy from the (ACM,
2018) principle 1.3. The systems should not advertise features that are gimmicks, such as
promising 100% data security.

2.1.3 – Illegal gaming


Users use real money to buy virtual money to use in games that imitate a virtual life, such as
Sims. This is also known as the “Second life” (Sivarajah, et al., 2015). As a result, users end up
wasting their resources for something that is meaningless.

2.1.4 – Confidentiality
The (ACM, 2018) principle 1.7 needs computing professionals to protect a client’s sensitive data
at any cost. The sensitive data can be business strategies, when such information gets leaked
their competitors will have a greater edge towards them.

2.2 – Ethical issues


2.2.1 – Digital divide
Not everyone will be able to access the services from web 2.0 systems, for instance, individuals
who lack access to computers (Alam & Lucas, 2011). The companies that provide the web 2.0
systems will be biased to the individuals based on their skills and knowledge.

Page 9 of 35
2.2.2 – Offensive Content and Censorship
(Alam & Lucas, 2011) also wrote that charges will be given to any user that posts offensive
content. This mainly applied to blogs, social media and any form of media where people are
tempted to use offensive language to express their ideas more.

2.2.3 – Identity Theft


On social media applications, some users tend to create fake accounts with fake names and also
other people’s names for their own personal gain. Some people can easily be blamed for crimes
that they did not commit.

2.3 – Social issues


2.3.1 – Social isolation
Social media has a major impact to individuals. It can result in users isolating themselves from
the real world and engaging themselves virtually (Sivarajah, et al., 2015).

2.3.2 – Availability of services


It is not guaranteed that the web 2.0 will always provide services to the devices that the users
possess.

2.3.3 – Culture and change


We can also refer to demographics when it comes to this issue. Some of these web 2.0 systems
can violate cultural beliefs. Also, it can change people’s lives. As mentioned in 2.3.1, it can build
social isolation (Sivarajah, et al., 2015).

2.4 – Facebook Data Breach


(Moore, 2019) reflects on how Facebook did not succeed in letting its users know about the risk
of data breach last year in December. Facebook had weak security in its sign-on system that
resulted to user data being stolen and accessed easily on 29 million accounts. Hackers made use
of access tokens to gain full access to user accounts. The mistake that Facebook was to only
protect its employees from such attacks other than the large population of its users. A lot of
sensitive information of over 15 million users were exposed, as a result, the company was fined
$5bn to settle its privacy issues with the Cambridge Analytica data-selling scandal.

Page 10 of 35
Facebook violated users’ data privacy because it did not provide enough protection towards the
users accounts that allowed hackers to access them easily. Also, confidentiality was not
implemented well. With users it could raise a lot of trust issues with the company, everyone will
be afraid to upload their sensitive information on the platform. However, some users will be
reluctant to provide their real information such as name and gender, resulting to mistaken
identity or even stolen identity that is a criminal offense.

To date, Facebook’s security protection is being questioned on how they will resolve that
(Moore, 2019).

2.5 – US bans Huawei from dealing with American Companies


Huawei is a major supplier for networking equipment with excellent 5G technologies, however
the Trump administration accused the company for “espionage and IP (intellectual property)
theft” (Tayal, 2019). In the article, (Tayal, 2019) said that the US lawmakers labelled Huawei
from having security threats to be one of the major factors for the ban. These problems with
Huawei are not recent, they have been accumulating over the years. (Stewart, 2019) wrote that in
2011 Huawei tried defending itself about security and requested an investigation to prove
themselves right. In 2014, the US had banned Huawei from having contracts with the US
government. This got worse in 2018 when AT&T stopped selling Huawei phones.

The most worrisome ban was dealing with Google. Since Huawei uses android, it means their
phones will no longer support Google services, such as Play Store, Gmail and YouTube, apps
that are meaningful to end users now. Socially this will kill availability of services to the public.
The issue is that whoever will possess a Huawei device will not be allowed to access Google
services.

To conclude, US is not the only company complaining. We have Canada, United Kingdom and
also Japan. This still isn’t not slowing down Huawei at all. In September they unveiled a flagship
smartphone, the Mate 30 Pro, along with Watch GT 2 and Vision TV. In October, they are still
waiting UK to grant them access to the 5G network (Keane, 2019).

Page 11 of 35
2.6 – Why Enterprise 2.0 is better than Web 2.0
Enterprise 2.0 will provide users with “innovation and intelligence” (Haiba, et al., 2014) from the
collaboration and communication done by them. The system will be able to produce rich
solutions to help the users in decision making.

Towards the organization, the Enterprise 2.0 can improve various of areas such as creating a
well-built hierarchy where it is easy for each member to collaborate. Also, it has the ability to
allocate resources and make sure there is “organizational flexibility” (Haiba, et al., 2014).

Lastly, it builds a strong working environment for the employees and is able to motivate each of
them to tackle tasks in management, handling delegation and boosting the team spirit (Haiba, et
al., 2014).

Page 12 of 35
3 – Features of an Enterprise 2.0 System
3.1 – Office 365
Office 365 provides the user with the Microsoft Office packages online. Clicking the option
menu on the top left corner of the screen will open a drawer where the user can access Office
365 applications.

Figure 4: Navigation pane showing SharePoint apps

After clicking Office 365 the user will be apple to choose an application of choice from the list

Figure 5: Another form how apps area listed

Word is selected a new document is created

Figure 6: Creating a new word document

Page 13 of 35
The layout of the package will look similar to the one that can be installed on the machine. It will
provide the user with familiarity.

Figure 7: New word document created

Page 14 of 35
3.2 – Change look and feel
By default, this is how the website looks like, it has an orange color to it

Figure 8: Default site look and feel

On the top menu navigation to the right, click the cog icon to access setting where the site look
can be changed. Then click on “Change the look”

Figure 9: Selecting "Change the look"

Page 15 of 35
Figure 10: Options for changing the look

Click on the Class change the look options to have a better customization. The immerse theme
has been selected.

Figure 11: Selected theme

The colors, font and site layout have been chosen too

Page 16 of 35
Figure 12: More site settings; font, layout, colors

However, these edits were not affected to the main default site.

To change the header of the main site, you select header, from figure 10, and then make you
edits

Changes have been made to the layout, logo and background.

Page 17 of 35
Figure 13: Changes made to the Header

Page 18 of 35
Figure 14: The site after changes have been made

3.3 – Using web parts


Web parts allow the user to add content to the pages that are present on the site, from the
simplest of text web parts to the complex Microsoft forms. To access the webparts you either
create a new page or simply edit an existing page. In this example a new page is going to be
created and then edited. To create a new page, you click the option labeled New located below
the main navigation bar

Figure 15: Creating a new page

Page 19 of 35
When selecting a page template, choose “blank page”. Add the title and the click publish

Figure 16: Naming the page

In edit mode, to the left of the page there will be a plus button that will allow the user to add a
section on the page of choice. The One column is chosen

Figure 17: Adding a section to the page

When in the section, another plus icon button appears where the user is able to add a web part

Page 20 of 35
Figure 18: Adding a web part to the section

Here are most of the items you can select

Page 21 of 35
Figure 19: List of some of the available web parts

An image has been added to the About Me page

Figure 20: An image has been added to the page

Page 22 of 35
3.4 – Permissions Management
With permissions, the user is able to add other people to view or make edits to the site

Click on invite people to either add a new member or just a user to view

Figure 21: Option to invite people

In this example, adding a new member is demonstrated. You select the option and then you will
be prompted to provide a name or email. After that you click save. Once the member is added
you can then add their role.

Page 23 of 35
Figure 22: Selecting added member role

You can also add visitor by selecting Share site only, this time the owner will choose the access
levels that the visitor can have

Figure 23: Adding a visitor and selecting their access level

Page 24 of 35
For more permissions customization the owner can access the advanced permissions settings

Figure 24: Advances permission settings

3.5 – Connectivity with mobile


The best thing about SharePoint is that it has a dedicated mobile application where a user can
access the site they have created and view its documents on it.

Figure 25: SharePoint mobile application

When the application is opened you search for the site that you have created. You will land at the
homepage

Page 25 of 35
Figure 26: Landing page of site for lab work

You can then use the hamburger drop down menu option to visit other pages that were created

Page 26 of 35
Figure 27: Side navigation for the site in the mobile application

Page 27 of 35
Figure 28: A page created during the lab work

Page 28 of 35
3.6 – Document Management
From the navigation pane on the left, you select documents for the site that can be shared
amongst the team

Figure 29: Site ide navigation

Below is how the user can create, upload and make edits to the documents.

Figure 30: Options used for managing documents

The screen shot below will demonstrate how the user can manage their documents. By adding
folders, they are able to categories their documents.

Page 29 of 35
Figure 31: Options for adding a new item to the documents

Creating a folder

Figure 32: Creating a folder

Files can be added by two ways into the folder. The first way is using the upload from the top
menu

Page 30 of 35
Figure 33: Uploading a file using sharepoint

Figure 34: Selecting the document from the PC

The other way is by dragging and dropping the file as shown by the message in the screenshot

Figure 35: Second way of adding files, dragging and dropping

Page 31 of 35
Figure 36: File been dragged

Documented has been added

Figure 37: File added

By clicking on the document, you are able to make edits to it

Figure 38: Editing the added file

Page 32 of 35
Conclusion
Between Drupal and Joomla, Drupal seemed to be much better based on the chosen criteria.
Apart from chosen Enterprise 2.0 WordPress seemed to surpass both of these Enterprise 2.0
systems. I managed to see the functionality Enterprise 2.0 systems have and how they can benefit
an organization socially and technically, but it can raise a lot of issues mostly security on data
privacy and also data loss. The challenges were faced when finding out features of an Enterprise
2.0 system, SharePoint, and also making use of the Enterprise 2.0. SharePoint had a lot of
limitations when it came to customizing the site, it did not offer enough colors or additional
options to change the looks and feel. On the other hand, WordPress is better option because it
provides a website builder that allows the developer to fully customize the site.

Page 33 of 35
References
ACM, 2018. ACM Code of Ethics and Professional Conduct. [Online]
Available at: https://www.acm.org/code-of-ethics
[Accessed 22 October 2019].

Alam, S. L. & Lucas, R., 2011. Some ethical considerations for Gov 2.0 using web 2.0.
Proceedings - IEEE 9th International Conference on Dependable, Autonomic and Secure
Computing, DASC 2011, Issue 12, pp. 1078-1083.

Bughin, J. & Manyika, J., 2015. LEVERAGING "ENTERPISE 2.0" FOR COMPETIVE
ADVANTAGE. Lisbon, IADIS International Conference.

Chahal, P., 2019. Drupal Vs Joomla Comparison 2019 - SEO, Security, performance, Content
Management. [Online]
Available at: https://blog.templatetoaster.com/drupal-vs-joomla-comparison/
[Accessed 19 October 2019].

Drupal, 2019. What Are Some Of The Commonly Advantages Of Drupal?. [Online]
Available at: https://www.drupal.org/docs/7/understanding-drupal/what-are-some-of-the-
commonly-advantages-of-drupal
[Accessed 10 October 2019].

Haiba, M. E., Bassiti, L. E. & Ajhoun, R., 2014. Toward enterprise 2.0: Opportunities,
weaknesses and best practices. International Journal of Business and Management Study -
IJBMS, 1(3), pp. 108-113.

Hoeyer, K. L., 2012. Size matters: the ethical, legal, and social issues surrounding large-scale
genetic biobank initiatives. Norsk Epidemiologi, 21(2), pp. 211-220.

Joomla, 2019. Joomla! Benefits & Core Features. [Online]


Available at: https://www.joomla.org/core-features.html
[Accessed 10 Octpber 2019].

Keane, S., 2019. Huawei ban: Full timeline as FCC says it'll cut off carriers using Chinese
company's gear. [Online]
Available at: https://www.cnet.com/news/huawei-ban-full-timeline-fcc-carriers-china-trump-

Page 34 of 35
ban-security-threat-mate-x/
[Accessed 1 November 2019].

Moore, M., 2019. Facebook failed to warn users they were at risk of data breach. [Online]
Available at: https://www.techradar.com/news/facebook-data-breach-had-no-warning
[Accessed 29 October 2019].

SCHÄFERHOFF, N., 2018. WordPress vs Joomla vs Drupal (Comparison). [Online]


Available at: https://websitesetup.org/cms-comparison-wordpress-vs-joomla-drupal/
[Accessed 10 October 2019].

Sivarajah, U., Irani, Z. & Weerakkody, V., 2015. Evaluating the use and impact of Web 2.0
technologies in local government. Government Information Quarterly, 32(4), pp. 473-487.

Stewart, E., 2019. The US government’s battle with Chinese telecom giant Huawei, explained.
[Online]
Available at: https://www.vox.com/technology/2018/12/11/18134440/huawei-executive-order-
entity-list-china-trump
[Accessed 1 November 2019].

Tayal, P., 2019. What Huawei’s CEO Has to Say about the US Ban. [Online]
Available at: https://marketrealist.com/2019/07/huaweis-ceo-talks-us-ban/
[Accessed 1 November 2019].

Page 35 of 35

You might also like