BIT 2016-2017 Web resources

Web Resources

The following shows the suggested reference material which will be useful on the business IT module.

Some of these links appear in the notes but extra material is included here to supplement the notes. Click on the links to explore the information:

Data Flows
Name / Web Address
Insight.com / http://uk.insight.com/en-gb/business
Microsoft.com / https://business.microsoft.com/en-gb
Financial Analysis
Name / Web Address
spreadsheets: / http://www.gcflearnfree.org/excel2010/
SWOT Analysis
Name / Web Address
SWOT analysis / https://www.mindtools.com/pages/article/newTMC_05.htm
Network Analysis / Project Management
Name / Web Address
Association of Project Management / http://www.apm.org.uk/WhatIsPM
Implementing BIT
Name / Web Address
Change Management / http://www.themanager.org/Knowledgebase/Management/Change.htm
Tom Peters (Management Guru) / http://www.tompeters.com/
E-commerce
Name / Web Address
Information about business models with e-commerce / http://firstmonday.org/ojs/index.php/fm/article/view/624/545
BBC News feeds relating to business: / http://feeds.bbci.co.uk/news/business/rss.xml?edition=uk
E-commerce benefits / http://www.business2community.com/ecommerce/7-benefits-of-ecommerce-for-retailers-01273130#oPZocHXdDdyijY8u.97
E-commerce times: / http://www.ecommercetimes.com/
Legal Frameworks
Name / Web Address
The Data Protection Act 1998
A very detailed breakdown of the 1998 act. /
http://www.legislation.gov.uk/ukpga/1998/29/contents
The Information Commissioner web site: / https://ico.org.uk/
Computer Misuse Act 1990 / http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev1.shtml
[Accessed: 19th October 2016]
and updated: (look at the Police and Justice Act 2006)
http://complianceandprivacy.com/News-Eversheds-e80-Computer-misuse-act.html
and: http://www.newlawjournal.co.uk/content/cyber-crime
The Regulation of Investigatory Powers (RIPA) Act 2000 / http://www.legislation.gov.uk/ukpga/2000/23/contents
The Display Screen Equipment Regulations 1992 / http://www.hse.gov.uk/pubns/indg36.pdf
Health and Safety Executive / http://www.hse.gov.uk/index.htm
Social Aspects of IT
Name / Web Address
Healthy Computing / http://www.healthycomputing.com/
Repetitive Strain Injury
Information contained at the HSE web site: / http://www.hse.gov.uk/pubns/indg171.pdf

[Sites accessed: 19th October 2016]

Printable version

Further resources...part two

The following books would also be useful to use on this module:

Books
Name
Evans, P. & Wurster, T. S. (2000)
Blown to Bits: How the New Economics of Information Transforms Strategy.
New York: Harvard Business School.
Handy, C. (1993)
Understanding Organizations.
4th edn. London: Penguin.
Paul, D., Yeates, D., & Cadle, J. (2010)
Business Analysis.
2nd edn. Swindon: BCS.
Porter, M. E. (2004)
Competitive Advantage: Creating and Sustaining Superior Performance.
New York: Free Press.

updated 19th October 2016

Further resources...part three

Please click on the links below to access some video clips relevant to this module:

Video clips
Security / Social aspects of ICT
Security:
Identity Theft 1
(1 mins, 46 secs) / Social aspects of ICT:
Repetitive Strain Injury - Does it Exist?
(2 mins, 15 secs)
Identity Theft 2
(2 mins, 17 secs) / Stress in the workplace
(2 mins, 06 secs)
Spam
(2 mins, 26 secs) / Teleworking - Is it suitable for everyone?
(1 mins, 54 secs)
Computer Viruses
(3 mins, 07 secs) / Teleworking - Using ict to work from home
(3 mins, 34 secs)

ckd 19th October 2016

Page 6 Date last saved: 19/10/2016