BIS3324 – LE9 (29March 2016)

Ppt <Leading Change – By John P. Kotter> — half of Pairs Project

  1. Create a sense of Urgency (-ve)
  2. Guiding Team
  3. Vision (+ve)
  4. Communicate the vision
    1. Leadership by example (benchmarking visit with steering committee / Success case training)
  5. Empower
  6. Short-term wins
  7. Keep on changing
    1. Different to adopt changes if there are considerable amount of frontline staff;
  8. Anchor

Pairs Project

  1. Case study about a change facilitated by IT in an organization
  2. Analyze the case from the perspectives of 8 steps
  3. Samples:
    1. Upgrade call centers;
    2. Brain storming:
      1. Cloud services?
      2. Mobile services?
    3. Search Portfolios of change:
      1. McDonald
      2. Asiamiles -> bad initial change from system failures;
  • MTR – difficult to adopt changes as many rules;
  1. Subject title (Select company) -> TOC -> Proposal at 12April;
  2. Short term win examples;

Findings – Supplementary materials (Surveys)

Contributors

  1. Active and visible sponsorship
  2. Identification of key stakeholders
  3. Direct communications with employees

Obstacles

  1. In-effective management engagement

Best practices

  1. Utilization team of change management
  2. Group meeting and presentations
  3. Face to face communication

Follow-ups

  1. Materials resin plan – SO & Loading
  2. Dashboard
  3. Heading and Auto-generation of TOC in MS word

Capabilities

  1. Native language <html5> for Andriod and IOS
BIS3324 – LE9 (29March 2016)

BIS3324 – Le8 (23March 2016)

  1. Contents:
    1. Contrasting views of change management
      1. Company approach
      2. Personal approach
      3. Field Force Analysis (Google)
        1. Add in pairs project
          1. Views of employers and customers
          2. Views of empolyees
    2. Wk13 PPT – IS development – A catalyst for change
      1. Organizational impact
      2. Market impact
      3. Personal impact
    3. Hot topics of IT
      1. Big Data
      2. IoT
      3. Video:
        1. <ThyssenKrupp – Giving cities a lift with the Internet of Things>: https://www.youtube.com/watch?v=SGXTWLQ76jI – predictive maintenance and preactive measures;Microsoft Azure Machine Learning;
        2. <SAP and Vuzix bring you the future of Field Service>: https://www.youtube.com/watch?v=UlpGDrSmg38 ;Remote field order handling; virtual reality;3D knowledge manual / guidance;
  2. References
  3. Follow-ups
    1. File server alerting file type of locky;
    2. Keywords searching:
      1. block customized file type in file sharing
      2. File Server Resource Manager
    3. Draft reviews of p.237 & p.240
    4. Final presentation (Max. 15 slides for 10 minutes)
      1. Screen / solution diagram with flows
      2. tangible and intangible cost
    5. Next lesson with Final draft of group assignment;
      1. Checklist with submission;
      2. Task allocation plan/table
      3. Submission Checklist
      4. Submit soft (CD-ROM) and hard copy;
      5. Completed Self assessment form;
BIS3324 – Le8 (23March 2016)

ITX3000 – Le8 (20Mar2016)

  1. Content: <Design Guidelines – Week 6>
    1. User acceptance: usability, user handling the system;
    2. User experience: reuse of users’ experience;
    3. Interface design principles:
      1. Nielsen’s 10 usability heuristics
      2. Shneiderman’s 8 golden rules
      3. Norman’s principles
    4. Common principles
      1. Consistency: Save button of Microsoft product;
      2. Affordances: push / pull
      3. Feedback of actions to users: passwords / status; frequent / infrequent;
      4. Visibility: progress / speed;
      5. Constraints: buttons
      6. Mappings: Left to right
      7. Error: eg. error alert “invalid input” vs suggestion of spelling tip, necessary field;
      8. Flexibility and efficiency use: eg. hot keys; eg. give level of users; templates & themes;
      9. Aestetic and minimalist design: Google sign;
      10. Help and documentation: tool tips;
  2. References
  3. Follow-ups
    1. Nielsen’s 10 usability heuristics
    2. Shneiderman’s 8 golden rules
    3. Norman’s principles
    4. Trello account for pairs work
ITX3000 – Le8 (20Mar2016)

BIS3999 – Le7 (18Mar2016)

  1. Content
    1. Requirement Analysis and Design
      1. Stakeholder Analysis: Actors (provide services, eg. administrator / employee) / customers (consume services) / owners and their needs;
      2. Process Design
        1. (Business functions / technical functions)
        2. (methodology: process flow: DFD / use case / flowchart)
        3. Process description
      3. Requirement Analysis (10 pages)
      4. Data Analysis (10 pages)
        1. Data Model – ER diagram (1 survey answered by many respondents)
        2. Data Dictionary: related to the implementation / production level; need reverse engineering from dumping tables and fill in the templates provided;
      5. UI + architecture (25pages)
  2. Comment of TOC
    1. Prototype 1 at 29Apr with certain customization (eg. Logo modifications)
    2. Hand in <Design> at 29Apr
    3. Install in VM with procedures / stages log
    4. ***Literature Reviews: research, compare and contrast options, that enrich your project design, available in market / existing trends; explain you choices
      1. Database: NOSQL, RDMS, SDMS
    5. Integrate knowledge from ITX3000 to this Project;
    6. Research funtionalities available and conclude you choices;
  3. Follow-up
    1. Search Google:
      1. Requirement Analysis (10 pages):
        1. DFD / Use case diagram / UML;
        2. Use case description; with exceptions flow; eg. 10 use case samples one sample per page in final report;
        3. Download freeware <Violet UML>;
      2. Data Analysis (10 pages)
        1. eg. MySQL workbench / phpMySQL / PHP editors
    2. Start work in Requirements and Analysis
  4. References
    1. Virtualbox.org / prebuilt virtualbox
    2. Overbooking algorithms
BIS3999 – Le7 (18Mar2016)

BIS3324 – Le7 (15/3/2016)

  1. Contents
    1. Youtube <Cisco Change Mangement Training Video>
      1. Cisco change roadmap
      2. 3 phases: prepare -> implement -> manage it;
      3. change to one-man-band reporter -> more opportunities
        1. form a team
      4. Comparing Kotter’s eight steps to 3-steps-approach (Lecture 12 ppt):
        1. Prepare: 1-Establish a sense of urgency / 2-Form a powerful guiding coalition / 3-Create a vision / 4-Communicate the vision;
        2. Implement: 5-Empower others to act on the vision / 6-Plan for and create short term wins;
        3. Manage: 7-Consolidate improvements – more change / 8-Institutionalise the new approach;
      5. Encourage and push by powerful guys;
      6. Success case in specific department / subsidiary…;
      7. Application of Change: Environmental Levy Scheme on Plastic Shopping Bags – http://www.epd.gov.hk/epd/psb_extension/en/
  2. Comments of our presentation
    1. Contents
      1. False <Threat to new entrants> in Five Forces analysis
      2. Revise wordings in <Weakness> in SWOT analysis
    2. Styles
      1. Improve expression phases for ideas
      2. Fonts are too small
      3. Too much wordings -> boring presentation
      4. Lack of visual aids
      5. Lack of conclusions among slides, eg. key points / conclusion;
    3. Thus, point above leads low grading for final report presentation;
  3. Next-time improvement
    1. Fewer wordings with larger fonts;
    2. Visual Aids: eg. Five forces / SWOT /
    3. Conclusion among slides;
    4. Better ideas and wordings (summary of findings / SWOT / Porter 5 forces) collaboration by a leader
  4. Follow-ups
    1. Update wording in Alex’s works;
    2. Suggestions on summary of  findings -> Challenges;
    3. Add 2-3  questions to Q&A;
    4. Add tangible and intangible cost-benefits;
BIS3324 – Le7 (15/3/2016)

BIS3400 – Le6 (13Mar2016)

  1. Content
    1. Lecture 8 ppt
      1. Vulnerabilities and Limits
      2. Security
        1. Big Data
        2. Internet of Things (物聯網)
        3. Who should do what and who is responsible? how to secure “data”;
        4. Responsibilities:
          1. **IT employees:
            1. Responsible: old workflow replaced by technological workflow;
            2. how to plan / estimate procedures / how to deploy apps / provide tools; 
          2. Due: due diligence
        5. New Challenges in IT to monitor data? Server / data loss in Cloud? how to monitor data / server access?
        6. Portable devices: risk of losing large amount of data / offline data;
      3. Impact of People
        1. 5W1H approach to consider?
        2. Ethical: Should we do this (right / wrong)?
        3. Social: Change of behaviors? eg.? How robots change the daily life of elders?
    2. Most difficult among E/S/L/P: ethics? social?
      1. example: technology impact to society;
        1. moving to accuracy to speed;
        2. impact to legal monitoring since technology evolves;
        3. impact to behaviors? relationship among person? closer relationship?
        4. mindset: technology – dilemma – minimize impact to others
        5. Workplace surveillance – Social impact varies with technological changes and scope changes;
        6. CCTV / Firewall – tools – neither ethical / unethical -> but Action / Activities?
        7. Expectations:
          1. Opposing views: such as freedom of speech vs boundary of laws (restricting others / causing hurt to others);
          2. Marking scheme: Vulnerability (Limitations) of IS;
            1. Can / Cannot; should / should not;
          3. 6 principals of privacy;
          4. What are the security policies? How the policies are communicated? Policies -> Procedures -> Guidelines;
          5. Why BYOD? selection of cost? selection of convienent? Security issues of BYOD?
  2. Assignment
    1. Parallel run in Assessment 2 & Assessment 3;
      1. Assessment 2 – Submission PPT (7-15 slides of content) in ~22May;
        1. Intermediate review of Assignment 3;
        2. 20% total mark of this course;
        3. Mode of VIVA with 2 to 3 questions;
        4. Marking scheme in handbook;
      2. Assessment 3 – E/S/L/P
        1. new understanding
        2. enhancement after further readings
      3. Expectation:
        1. PLAN
        2. TOC
  3. References
    1. BCS statement about …”p.6 of PPT <WK8 PPT>”www.bcs.org/upload/pdf/conduct.pdf
    2. ACM statement about …”p.6 of PPT <WK8 PPT>”
  4. Follow-ups
    1. access audit for sensitive data / permission matrix / access procedures;
    2. Conditional wipe company data of BYOD;
    3. SSD 粉碎;
BIS3400 – Le6 (13Mar2016)