(eBook PDF) Management Information Systems by Heather Gray 2024 Scribd Download
(eBook PDF) Management Information Systems by Heather Gray 2024 Scribd Download
com
https://ebooksecure.com/product/ebook-pdf-
management-information-systems-by-heather-gray/
http://ebooksecure.com/product/ebook-pdf-management-information-
systems-for-the-information-9th/
ebooksecure.com
https://ebooksecure.com/download/mis8-management-information-systems-
ebook-pdf/
ebooksecure.com
https://ebooksecure.com/download/mis-9-management-information-systems-
ebook-pdf-2/
ebooksecure.com
http://ebooksecure.com/product/ebook-pdf-management-information-
systems-4th-edition-by-r-kelly-rainer/
ebooksecure.com
(Original PDF) The Strategic Management of Information
Systems 4th
http://ebooksecure.com/product/original-pdf-the-strategic-management-
of-information-systems-4th/
ebooksecure.com
http://ebooksecure.com/product/ebook-pdf-management-information-
systems-managing-the-digital-firm-15th/
ebooksecure.com
http://ebooksecure.com/product/ebook-pdf-management-information-
systems-managing-the-digital-firm-14th-edition-by-kenneth-c-laudon/
ebooksecure.com
http://ebooksecure.com/product/ebook-pdf-information-systems-project-
management-a-process-approach-edition-2-0-2/
ebooksecure.com
http://ebooksecure.com/product/ebook-pdf-information-systems-project-
management-a-process-approach-edition-2-0/
ebooksecure.com
Management
information
systems
First Australasian Edition
Gray
Issa
Pye
Troshani
Rainer
Prince
Watson
CONTENTS
vi Contents
SUMMARY 143 CHAPTER 7 Information security 205
Chapter glossary 143 OPENING CASE > Small businesses in danger 206
Discussion questions 145
7.1 Introduction to information security 208
Problem-solving activities 145
Collaboration exercise 147 7.2 Unintentional threats to information systems 211
7.3 Deliberate threats to information systems 214
CLOSING CASE 1 > Managing information flow 147
It’s about business acktivists ‘Anonymous’ attack
H
CLOSING CASE 2 > Marriott’s corporate Australian government websites 218
portal 149
It’s about business elbourne IT: an Australian
M
internet success219
CHAPTER 5 Business intelligence 153
7.4 What organisations are doing to protect
OPENING CASE > Farmer wants an app 154 information resources 222
5.1 Managers and decision making 157 7.5 Information security controls 224
5.2 What is business intelligence? 161 It’s about business SaaS and Cancer Council SA 224
IT’S ABOUT BUSINESS Virgin
Australia’s BI
SUMMARY 236
performance 162
Chapter glossary 237
IT’S ABOUT BUSINESS Usinganalytics to save Discussion questions 239
Grevy’s zebra 164 Problem-solving activities 240
5.3 Business intelligence applications for data Collaboration exercise 240
analysis 165
CLOSING CASE 1 > An inside look at the Australian
5.4 B
usiness intelligence applications for government’s cyber security
presenting results167 plans 240
IT’S ABOUT BUSINESS Australiancardiologists CLOSING CASE 2 > Compliance 242
using GIS technology170
5.5 B
usiness intelligence in action: corporate CHAPTER 8 Social computing 249
performance management 171
OPENING CASE > La Casa Ristorante’s Twitter dream 250
SUMMARY 173 8.1 Web 2.0 253
Chapter glossary 173
8.2 Fundamentals of social computing in business 261
Discussion questions 174
8.3 Social computing in business: shopping 263
Problem-solving activities 174
Collaboration exercise 175 IT’S ABOUT BUSINESS Pinterest 264
8.4 Social computing in business: marketing 269
CLOSING CASE 1 > Procter & Gamble uses analytics
in novel ways 175 IT’S ABOUT BUSINESS How tweeting has grown
our wine business 270
CLOSING CASE 2 > North East Water 176
IT’S ABOUT BUSINESS Buying a vehicle takes work! 272
8.5 S
ocial computing in business: customer
CHAPTER 6 Ethics and privacy 181
relationship management274
OPENING CASE > Big brother watching you work 182
8.6 S
ocial computing in business: human
6.1 Ethical issues 184 resource management277
IT’S ABOUT BUSINESS Know thy customer 186 IT’S ABOUT BUSINESS So you want to find a job 277
6.2 Privacy 189 8.7 Crowdsourcing 280
IT’S ABOUT BUSINESS AFP and Australians’ IT’S ABOUT BUSINESS Scientific
discoveries via
private data 192 crowdsourcing and online
SUMMARY 196 gamers281
Chapter glossary 196 SUMMARY 283
Discussion questions 197 Chapter glossary 285
Problem-solving activities 197 Discussion questions 285
Collaboration exercise 197 Problem-solving activities 286
CLOSING CASE 1 > Dunedin City Council blocks Collaboration exercise 286
hate site 198 CLOSING CASE 1 > Facebook commerce 286
CLOSING CASE 2 > Google and China 199 CLOSING CASE 2 > Tourism Australia’s social strategy 289
Contents vii
CHAPTER 9 E-business and e-commerce 295 Discussion questions 367
OPENING CASE > Matt Barrie’s Freelancer.com 296 Problem-solving activities 367
Collaboration exercise 368
IT’S ABOUT BUSINESS 298
9.1 Overview of e-business and e-commerce 299 CLOSING CASE 1 > A paperless airport 368
9.2 Business-to-consumer (B2C) electronic CLOSING CASE 2 > The battle for the mobile wallet 369
commerce 306
IT’S ABOUT BUSINESS David Jones building an CHAPTER 11 Information systems within the
online shopping presence 307 organisation 375
IT’S ABOUT BUSINESS What to do about customer OPENING CASE > Hog’s Breath Cafe and Imagatec 376
‘showrooming’ practices? 312 11.1 Transaction processing systems 377
IT’S ABOUT BUSINESS New Zealander starting a 11.2 Functional area information systems 379
wildfire313
11.3 Enterprise resource planning systems 386
9.3 Business-to-business (B2B) electronic
IT’S ABOUT BUSINESS BurraFoods expansion
commerce 315
required revamped ERP
9.4 Ethical and legal issues in e-business 317 solution386
SUMMARY 321 11.4 Reports 390
Chapter glossary 322 SUMMARY 393
Discussion questions 323 Chapter glossary 393
Problem-solving activities 324 Discussion questions 394
Collaboration exercise 325 Problem-solving activities 394
CLOSING CASE 1 > The new virtual economy of Collaboration exercise 394
Bitcoin 325 CLOSING CASE 1 > Information systems helping
CLOSING CASE 2 > Two Australians on the ‘up farmers manage emissions 395
and up’ 327 CLOSING CASE 2 > Hilton embraces collaboration
with information technology
CHAPTER 10 W
ireless, mobile computing partners 396
and mobile commerce 333
OPENING CASE> obile technology changing IT
M CHAPTER 12 Extending the organisation to
service delivery in Queensland’s customers 401
outback 334 OPENING CASE > usiness consultant CRM in
B
10.1 Wireless technologies 336 the cloud 402
10.2 W
ireless computer networks and internet 12.1 Defining customer relationship management 404
access342 IT’S ABOUT BUSINESS 7-Eleven
social media
IT’S ABOUT BUSINESS Near-field communications strategy406
helps travellers in Japan 343 12.2 O
perational customer relationship
IT’S ABOUT BUSINESS Free municipal wi-fi in management systems408
Brisbane parks 346 IT’S ABOUT BUSINESS Tweetfor immediate
IT’S PERSONAL Wireless and mobile 351 customer service409
10.3 Mobile computing and mobile commerce 352 IT’S ABOUT BUSINESS GoogleHelpout: real time
customer relationship
IT’S ABOUT BUSINESS Xero to hero — floating on
support412
a NZ cloud 354
12.3 A
nalytical customer relationship management
IT’S ABOUT BUSINESS Eco IT in Aus — animal
systems414
telemetry data collection 356
12.4 O
ther types of customer relationship
10.4 Pervasive computing 357
management systems416
IT’S ABOUT BUSINESS BP uses wireless
IT’S ABOUT BUSINESS CRM risk/return 418
technologies358
IT’S ABOUT BUSINESS Brazil uses smart meters 361 SUMMARY 420
Chapter glossary 420
10.5 Wireless security 363
Discussion questions 421
SUMMARY 365 Problem-solving activities 421
Chapter glossary 366 Collaboration exercise 421
viii Contents
CLOSING CASE 1 > Competitive advantage using a CHAPTER 14 Acquiring information systems
concierge app 422 and applications 453
CLOSING CASE 2 > British Gymnastics 423 OPENING CASE > L earning from the Queensland
Health payroll fiasco 454
CHAPTER 13 Extending the organisation 14.1 Planning for and justifying IT applications 456
along the supply chain 429 14.2 Strategies for acquiring IT applications 460
OPENING CASE > T he Kimberly Clark Australia 14.3 The traditional systems development life cycle 465
supply chain story 430 IT’S ABOUT BUSINESS Atlassianhelps manage
13.1 Supply chains 431 large software projects 466
13.2 Supply chain management 433 IT’S ABOUT BUSINESS Virgin
Australia’s
IT’S ABOUT BUSINESS Energizer
supply chain reservation system471
and technology434 14.4 A
lternative methods and tools for systems
IT’S ABOUT BUSINESS Airbusmoves to a smart development472
supply chain 437 IT’S ABOUT BUSINESS GEHealthcare switches
13.3 Information technology support for supply from Waterfall to Agile 474
chain management438 14.5 Vendor and software selection 477
IT’S ABOUT BUSINESS Concreteideas for SUMMARY 481
sustainable business441 Chapter glossary 482
SUMMARY 444 Discussion questions 483
Chapter glossary 444 Problem-solving activities 483
Discussion questions 445 Collaboration exercise 483
Problem-solving activities 445 CLOSING CASE 1 > Tweak or trash? 484
Collaboration exercise 445
CLOSING CASE 2 > Smart technology in Western
CLOSING CASE 1 > The computer that could cut Australia information
fatality rates for truckies 445 security group 485
CLOSING CASE 2 > Information technology Acknowledgements 489
helps Cannondale Endnotes 491
manage its complex Index 495
supply chain 446
Contents ix
Preface
To me, this is not an information age. It’s an age of networked intelligence; it’s an age of
vast promise.
—Don Tapscott
Information systems are at the forefront of business innovation in the Asia–Pacific region.
In today’s dynamic digital business environment, rapid advances in information systems
mean that change will be the only constant. Information systems are transforming the
world into a very small place and are contributing to increased global competition. As
a result, Australian and New Zealand organisations are constantly searching for ways
to gain a competitive advantage by achieving operational excellence; developing new
products, services and business models; providing superb customer service; and improving
decision-making capabilities.
Although immersed in technology, many first-year students initially struggle to see the
relevance of information systems to their future professions. We wrote this resource to
specifically cater for the needs of business students from all majors who will soon embark
on professional careers, with three goals in mind:
1 to enable students to be immediately successful when joining an organisation
2 to help students understand the importance of information systems for individuals,
organisations and society as a whole
3 to empower students to become informed users of any given organisation’s
information systems.
To accomplish these goals, we aim to provide the essential, relevant knowledge students
require to understand how to become adaptable business professionals and effectively use
information systems in their careers.
Management Information Systems, First Australasian Edition is interwoven with
contemporary themes such as business ethics and culture, green IT, cloud computing,
IT risk and security, and the impact of social media on e-commerce. We have provided
a platform for students to develop their strategic thinking skills along with frequent
opportunities to practise developing systems that support and improve businesses’
organisational processes.
Our resource draws on diverse, vivid examples from large corporations, small- and
medium-sized enterprises, and government and not-for-profit sectors in Australia and
New Zealand. Through our series of ‘IT’s About Business’ case studies in every chapter,
we provide a strong pedagogical balance of grounding theory and real-world applica‑
tions. We have adopted a cross-functional approach that considers the perspectives of all
majors within the business degree, with extensive hands-on exercises to encourage crea
tive thinking, problem solving and industry best practice.
Critically, we recognise that despite the increasingly automated nature of modern
workplaces, people continue to play a crucial role in systems.
We would like to extend a most sincere thank you to the scores of business information
systems academics whose invaluable advice helped shape our manuscript. Special thanks
go to Lubna Alam (University of Canberra), Christine Bruff (University of Newcastle),
Peter Clutterbuck (University of Queensland), Paul Darbyshire (Victoria University),
Kristy de Salas (University of Tasmania), Rohan Genrich (University of Southern
Queensland), Marta Indulska (University of Queensland), Dale MacKrell (University of
Canberra), Matthew Mansour (Macquarie University), Nigel Martin (Australian National
University), Peter Radoll (University of Canberra) and Jian Yang (Macquarie University)
for their time and consultation at the conception of the project. We would also like to
thank Marie van der Klooster in addition to our other academic colleagues who authored
the comprehensive resources that a ccompany the text.
Our appreciation goes to the John Wiley & Sons team for their contribution to this
book: Terry Burkitt (Publishing Editor), Kylie Challenor (Managing Content Editor),
Tara Seeto (Publishing Assistant), Catherine Spedding (Content Editor), Renee Bryon
(Copyright and Image Research Supervisor), Delia Sala (Graphic Designer), Tony Dwyer
x Preface
(Production Controller), Rebecca Cam (Digital Content Editor) and Beth Klan (Editorial
Assistant).
We hope you will enjoy our active approach in Management Information Systems, First
Australasian Edition. We are confident your learning experience will position you as a
highly valued future employee within a broad range of professions as you form a deeper
understanding of ‘what’s in IT for you’.
Heather Gray
Tomayess Issa
Graeme Pye
Indrit Troshani
July 2014
Preface xi
About the authors
Heather Gray
Dr Heather Gray’s research interests include using emerging technologies to bridge
the digital divide in developing countries. Dr Gray is also actively pursuing the use of
technology in online delivery of tertiary courses. She has experience with teaching large
classes in an online environment where she is responsible for designing and delivering
subjects for Open Universities Australia where some subjects have thousands of
students. Dr Gray has published her learning and teaching research as book chapters and
journal articles.
Dr Gray’s industry background includes short- and long-term contracts with
governments in Queensland and South Korea, as well as Australian national and
international corporations in roles that included business systems analysis, project
management and business process coaching. With a keen interest in online education
supported by social networking and cloud computing tools, she uses innovative
approaches in learning and teaching that saw her ranked in the top 20 ‘UniJobs Lecturers
of the Year’ in 2012. By keeping business and education capacity building at the forefront
of her learning and teaching approaches, Dr Gray is focussed on supporting and enabling
the development of business leaders for the future.
As the Outreach and Internationalisation Project Officer in Griffith Sciences for the
Griffith School of Information and Communication Technology, Dr Gray is involved in
the development of education research and programs, staff development and curriculum
design in the Australasian region. She is also heavily involved in the development of
online education courses and programs that bring together a scaffolded approach to
learning and teaching to enable students to engage with real world tools, technologies and
problem solving. As a digital divide researcher she explores technology leapfrogging and
mobile technology use in business and education in the Australasian region, bringing this
knowledge into her educational learning and teaching approaches.
Tomayess Issa
Dr Tomayess Issa is a Senior Lecturer at the School of Information Systems at Curtin
University, Australia. Tomayess completed her doctoral research in web development and
human factors. As an academic, she is also interested in establishing teaching methods and
styles to enhance students’ learning experiences and resolve problems that students face.
Dr Issa is a Conference and Program Co-Chair of the IADIS International Conference on
Internet Technologies and Society and IADIS International Conference on International
Higher Education.
Furthermore she initiated the IADIS conference for Sustainability, Green IT and
Education. Currently, she conducts research locally and globally in information systems,
human-computer interaction, usability, social networking, teaching and learning,
sustainability, green IT, and cloud computing.
Dr Issa has participated in conferences and published her work in several peer-reviewed
journals, books, book chapters, papers and research reports. Dr Issa is a Project Leader in
the International Research Network (IRNet-EU, 2014–2016) for study and development of
new tools and methods for advanced pedagogical science in the field of ICT instruments,
e-learning and intercultural competences.
Graeme Pye
Dr Graeme Pye received his PhD in information systems security analysis and modelling
in 2009 and has been a Lecturer with the School of Information and Business Analytics,
Deakin University, Victoria, Australia, since 2004. His research is widely published and
focuses primarily on security analysis and modelling of systems, and is continuing to
investigate the security and risk aspects of Australian critical infrastructure systems, their
resilience, and the human and social networking relationships associated with emergency
management and disaster recovery. Dr Pye is also interested in information warfare;
Indrit Troshani
Dr Indrit Troshani is a Senior Lecturer at the University of Adelaide Business School.
He holds a PhD (Computer Science) from Edith Cowan University (Western Australia)
and an MSc (Computer-based Information Systems) from the University of Sunderland
(UK). Dr Troshani teaches accounting information systems to both undergraduate and
postgraduate students. He also teaches information systems, internet commerce and
electronic commerce.
Dr Troshani is an active researcher and his research interests include information
technology adoption and diffusion (e.g. digital business reporting, mobile technology in
healthcare and e-health, public sector adoption of social media, green IS/IT), accounting
information systems, and social construction of technology. His work has been published
in several journals including Information Technology & People, Electronic Markets, Journal
of Computer Information Systems, Journal of Engineering and Technology Management,
European Journal of Innovation Management, and Industrial Management & Data S ystems.
Dr Troshani has also provided consulting services in his areas of expertise to various
public and private sector organisations on an adhoc basis.
Applications at a glance xv
How to use this resource
region using information systems to solve a business problem. The contract price negotiated for the design and implementation of the new payroll
system was $6.19 million. It was to be delivered in July 2008, the same month that
the support for the existing payroll system was scheduled to expire.
focus on multinational corporations. In contrast, our chapter of the project at hand. What is even more alarming is that according to the original
project documentation, a timeframe of only two weeks was allocated to determine
the business requirements and solution scope of the complex payroll project.
The cases add an entrepreneurial flavour to each chapter for loyal customers for their business partners. With 75 per cent of New Zealand
households being active members of the FlyBuys program, transactional
information is systematically recorded at point-of-sale (POS) terminals when
customers use their FlyBuys card. This gives Loyalty New Zealand access to
students considering their own start-up business. rapidly growing, vast amounts of customer behaviour data. Loyalty New Zealand
is currently using big data to enhance the benefits and the value customers get
by using their cards. Big data refers to vast amounts of generally unstructured
and distributed customer information collected from various sources such as
transactional histories, customer feedback and surveys, social media applications,
mobile device activity and software logs which can be processed by using special
application software in order to obtain new insight concerning customer behaviour.
Using SAS software, Loyalty New Zealand are enhancing their ability to better
understand their customers by way of profiling, segmenting and analysing data in
order to target customers with meaningful offers and campaigns that aim at providing
the right offer to the right consumer at the right time. With SAS, Loyalty New Zealand
now can develop, scale and launch campaigns within a single day which is almost
20 times faster than before. Specifically, Loyalty New Zealand now has many new
capabilities, including the ability to carry out highly targeted campaigns, the ability
to model behavioural propensity of consumers and the ability to profile them on
the basis of the geographical area of residence and proximity to business outlets.
Customised recommendations can also be provided in real time to customers based
on continuously evolving individual product preferences. For example, recurring
patterns of purchases of baby products could be indicative of a new baby in the family
QUESTIONS of the cardholder, which can be used as a basis to offer types of complementary
1 Given that The Nook’s customers are university-aged Homo conexus users baby products or even information related to relevant promotional campaigns of
of technology, do you think it will be possible for them to be successful businesses that are partners of Loyalty New Zealand in the cardholder’s geographical
moving into the future without a strong IT strategy? area of residence. Recurring patterns of past purchases can also be used as a basis to
anticipate the types of products or services that customers might be likely to purchase
2 If ‘informed users’ provide more value to a company, can the same be said
of ‘informed customers’?
72 Managment information systems | First Australasian edition
Organisations refer to their MIS functional area by several names, including the MIS
department, the information systems department, the information technology department
and the information services department. Regardless of the name, however, this functional
area deals with the planning for — and the development, management and use of — IT
tools to help people perform all of the tasks The Nook
related is a small cocktail
to information bar that
processing opened
and man- questions about technology. They have
agement. IT relates to any computer-based tool in 2005 after its
that people useowners,
to workMalakai and Abbie,
with information teamed up with your IT lecturer and designed
graduated from
and to support the information and information-processing university.
needs Throughout
of an organisation. questions to go along with the topics you
An IS collects, processes, stores, analyses their college years,
and disseminates they DJedfor
information together
a specifiand
c will be learning about in your information
purpose. In fact, the purpose of ISs is to get the right information to the right people at the and
earned business degrees in management systems course.
right time in the right amount and in the right marketing, respectively.
format. Because ISs are They decided
intended to put
to supply This apprenticeship is designed to
their collective
useful information, we need to differentiate between knowledge
information and twotogether and open
closely related accomplish two things. First, it will give
terms: data and knowledge (see figure 1.4). their own venue in Paddington, Sydney. Malakai and Abbie the benefit of learning
Data items refer to an elementary description The Nook of things, events,
has been veryactivities and trans-
successful. technology in a class that was not offered
actions that are recorded, classified and storedHowever,
but are not theorganised to convey
pair realise any specifi
that they can nowc when they were in university. Second, it
meaning. Data items can be numbers, letters, be fimore
gures,successful
sounds and byimages. Examples
collecting, of
analysing will give you the benefit of applying the
data items are a collection of numbers (e.g.and 3.11,using
2.96,the3.95,
data1.99,
that2.08) and characters
is available to textbook knowledge you learn to the real
(e.g. B, A, C, A, B, D, F, C). them. To do this, they need to upgrade world.
their infrastructure. This is the perfect time As this chapter states, your generation is
to upgrade everything because they have considered Homo conexus. This constant
recently closed for renovation. connectivity has to play a role in
Information technology (IT) was not even the restructuring of The Nook.
part of their degree structure when they were It is your job to help Malakai
in university, so they have not used much (if and Abbie understand exactly
The Nook
any) technology in their bar. While they are how this will look. As you read
considering its use as they restructure, they through the chapters, you
are not sure how much and in what ways will be provided with some
they should pursue the use of IT. discussion questions to help
To help them with the use of IT in The Nook, you consider the impact of
ISs on The Nook.
When you graduate, either you will start your own business or you will go to
focusing on ‘The Nook’, a small Sydney cocktail bar run by
university graduates Malakai and Abbie. The Nook needs
work for an organisation, whether it is public sector, private sector, for profit, or not for
profit. Your organisation will have to survive and compete in an environment that has
been radically changed by information technology. This environment is global, mas-
Information
sively interconnected, intensely competitive, 24/7/365, real time, rapidly changing and
applications of IT to
standard business and management reporting. Xero can
automatically import bank statements from thousands
of banks globally, including the major banks in the USA,
UK, New Zealand and Australia.
case is accompanied
accounting software product designed specifically for
to let you run your practice on the cloud’, said Xero’s
small to medium sized businesses under a subscription
managing director Chris Ridd. The company is shaping
based model (often referred to as ‘SaaS’, Software as a
as a serious threat to QuickBooks’ and MYOB’s market
by a series of critical
Service). Xero CEO and founder Rod Drury describes the leading positions. Companies have reported hundreds of successful data-warehousing applications. For
cloud‐based business as ‘a global company that started example, you can read client success stories and case studies at the websites of vendors
Sources: Sydney Morning Herald (2013), ‘Xero value cracks $NZ2b mark’,
in New Zealand’. The company spent its first five years in such as Oracle (www.oracle.com) and Mark Gurry and Associates (www.mga.com.
www.smh.com.au/business/xero‐value‐cracks‐nz2b‐mark‐20130704‐2pd75.
New Zealand, which was a highly effective strategy as it au). For a more detailed discussion,
that had visit the Data Warehouse Institute Australia (tdwi.
thinking questions.
html; H McKenzie (2013), ‘Xero: a billion‐dollar software company
enabled Xero to gradually build a strong product while org/australia).
five years in stealth at the bottom of the planet’, The benefits
Pandodaily, of data warehousing include the following.
pandodaily.
com/2013/05/01/xero‐a‐billion‐dollar‐software‐company‐that‐had‐five‐years‐
flying under the radar of its main competitors. • End users can access needed data quickly and easily via web browsers because these
in‐stealth‐at‐the‐bottom‐of‐the‐planet; C Fitzsimmons (2013), ‘Stuart McLean
In October 2009 Xero was celebrating 12 000 customers, data are located in one place.
goes from Google to hero to Xero’, Business Review Weekly, www.
• End users can conduct extensive analysis with data in ways that may not have been pos-
brw.com.au/p/tech‐gadgets/stuart_mclean_goes_from_google_hero_
but they now have over 200 000 customers worldwide,
w8FY4THYCU7LccKp5WWwdP;sible before. (2013), ‘How Xero added 120
S Macpherson
surpassing the billion dollar mark in March 2013 with 000 customers in three years’, Box Free IT, boxfreeit.com.au/2013/03/29/how‐
• End users can obtain a consolidated view of organisational data.
its value eventually rising above $NZ2 billion later that xero‐added‐120000‐customers‐three‐years; www.xero.com/au.
These benefits can improve business knowledge, provide competitive advantage,
year. This rapid, exponential growth can be attributed
enhance customer service and satisfaction, facilitate decision making and streamline busi-
to an audacious market entry strategy which had at its QUESTIONS
ness processes. IT’s About Business demonstrates the benefits of data warehousing to the
core the goal to make accountants and bookkeepers an 1 How do the add‐onAustralian
apps differ from mobile
tourism apps?
business.
endorsement channel for the software. Xero executed 2 What are the advantages of a mobile accounting
perfectly on this plan — up to 60 per cent of Xero package such as Xero?
IT’S ABOUT BUSINESS
licenses are sold through this channel. 3 What add‐on apps should small businesses use?
According to its website, Xero is ‘an easy‐to‐use How data warehousing is supporting tourism
4 How could these add‐on apps improve small business
but powerful online accounting platform designed growth and profitability? business in Australia
the ATDW and the ATBW offer a cost-effective solution
for tourism business owners and operators, enhancing
the dissemination of tourism information electronically
Location‐based applications and services and online exposure by way of a rich and flexible content
M‐commerce B2C applications include location‐based services and location‐based appli in a central data warehouse that can be easily used to
cations. Location‐based mobile commerce is called location‐based commerce (or populate their websites. Presently, the ATDW includes
L‐commerce). over 33 000 tourism product listings that can be published
Location‐based services provide information that is specific to a given location. For across ATDW’s multi-channel partner distribution network.
example, a mobile user can (1) request the nearest business or service, such as an ATM Tourism business owners can experience a number of
or a restaurant; (2) receive alerts, such as a warning of a traffic jam or an accident; and benefits when they join the ATDW, including:20
(3) find a friend. Wireless carriers can provide location‐based services such as locating • enhanced cost-effective online marketing including
taxis, service personnel, doctors and rental equipment; tracking objects such as packages content dissemination through state, territory and
Tourism Australia sponsored websites
354 Managment information systems | First Australasian edition • efficient content distribution as business information
is supplied once to the ATDW and distributed to
The AustralianTourism Data Warehouse (ATDW) is
multiple partners
Australia’s national distribution platform for tourism
• the ATDW offers tourism business owners
c10WirelessMobileComputingAndMobileCommerce.indd 354 information16 that supports the growth of30/04/14
the tourism
12:07 AM
opportunities for information quality control
industry in Australia.17 ATDW was originally developed in
2001 as a joint effort ofTourism Australia and other state • increased exposure of tourism business through
and territory tourism organisations. It is a centralised licensed tourism distributors and through inclusion in
the most comprehensive tourism data warehouse in
storage and distribution facility for tourism products and
Australia
information. Data stored in the ATDW include tourist
attractions and destinations, events and guided tours, • effective and efficient participation in state and federal
sponsored tourism campaign initiatives.
accommodation and transportation18 using nationally
agreed data formatting standards.Tourism business In October 2013, ATDW also offered the Tourism e-Kit,21
owners and operators, wholesalers, retailers and which offers an online training course and educational
distributors can access ATDW and use it for their booking resource for Australian tourism businesses focusing on
the benefits of joining the ATDW and being online.
systems and websites. In 2013 the AustralianTourism
Booking Widget (ATBW)19 was launched by ATDW. It was
developed specifically for SMEs operating in the tourism QUESTIONS
industry that do not have online booking capabilities in 1 Why is it so important for tourism businesses to
order to enable them to enter the online tourism market integrate data in the ATDW?
supporting real-time online bookings and online payments 2 What are some potential disadvantages of
other members of the website — potentially including disgruntled customers or unethical from consumers and customer support services.Together, consolidating tourism data into one data warehouse?
competitors — to post notes on the firm’s Facebook wall or comment on what the firm
has posted.
But, if the company turns off the feature that lets others write on its wall, people ChApter 3 | Data and knowledge management 95
may wonder what the company is afraid of. The company will also be eliminating its
opportunity to have great customer conversations take place, perhaps marketing the firm’s
products and services better than it could do. Further, the company could delete posts, but
that only encourages the post author to scream louder about being censored. c03DataAndKnowledgeManagement.indd 95 29/04/14 10:22 AM
Another risk is the 20–80 rule of thumb, which posits that a minority of individuals
(20 per cent) contribute most of the content (80 per cent) to blogs, wikis, social computing
websites and so on. For example, in an analysis of thousands of submissions over a three‐
Before you go on…
week time frame to news voting site Digg, the Wall Street Journal reported that one‐third
of the stories that made it to Digg’s homepage were submitted by 30 contributors (out of
900 000 registered members). Other risks of social computing include:
• information security concerns
• invasion of privacy
These end-of-section reviews prompt students to pause and test their
BEfOrE • violation of intellectual property and copyright
yOU gO ON . . .
1 Differentiate between
• employees’ reluctance to participate
• data leakage of personal information or corporate strategic information
• poor or biased quality of users’ generated content
understanding of concepts before moving on to the next section.
electronic commerce • cyberbullying/cyberstalking and employee harassment.
and social commerce. Consider Rosetta Stone (www.rosettastone.com), which produces software for
2 Describe the potential language translation. To get the most mileage possible out of social computing, Rosetta
benefits of social Stone has a strategy to control its customer interaction on Facebook. The strategy involves
commerce to both human intervention and software to help monitor the firm’s Facebook presence.
customers and Specifically, the software helps to monitor wall posts and respond to them constructively.
vendors. Fans of facebook.com/RosettaStone who post questions on its wall are likely to get a
3 Why are companies so prompt answer because the Facebook page is integrated with customer service software
worried about negative from Parature (www.parature.com). The software scans wall posts and flags those Apply the Concept
posts on social that require a company response, as opposed to those that represent fans of the company Background
networking sites? Link talking among themselves. Rosetta Stone customer service representatives are also able to This chapter has described many theories and pointed out that information
your answer to the post responses to the wall that are logged in the Parature issue tracking database. overload is a very real problem today. The amount of data we can now collect is
capabilities of social Companies are engaged in many types of social commerce activities, which include amazing. Did you know that even your Facebook posts and tweets are data? What
computing. shopping, advertising, market research, customer relationship management, human about organisational data? Soon mobile commerce will allow companies to store
4 Describe several risks resource management and crowdsourcing. In the next sections of this chapter, you will GPS location, demographic data and purchase data to create customer profiles
associated with social learn about each social commerce activity. that will provide tonnes of digital data. Businesses will be able to use this in ways
computing. Other software such as HootSuite enables managing all your social networking from a that we cannot even imagine today. Companies like IBM, Oracle, SAP and SAS are
single web location. leading the way into this world by designing software to help manage this data.
Activity
Go to YouTube and search for ‘IBM why data matters’.
QUESTIONS Deliverable
As a consumer, how do you feel about your own privacy given that businesses
1 Would it be reasonable for The Nook to allow their patrons to easily post
collect massive amounts of data on your spending habits? How much is too much?
comments about bands, drinks, food and so on their website? What if
At what point would you like to disconnect? Could you? Do you think that people
someone said something negative?
in general have become too dependent on data? Could businesses go back to
2 Social computing comes with many risks as noted here in the text. operating with less knowledge?
What additional risks would be associated with alcohol sales and
Imagine that you were asked to provide a report about this issue to your local
social media?
member of parliament explaining the direction we are going and whether it is a
3 What if one of The Nook’s customers tagged a photo (on The Nook’s social
good thing or not.
media page) of someone else who appeared extremely intoxicated? On the
drive home, the intoxicated customer was in an accident but the breath
test indicated a blood alcohol level within the legal limit. Should the
content on The Nook’s social site be available for use in court against the
consumer who caused the accident? The business didn’t tag the photo or
authorise the tag. Is The Nook liable? QUESTIONS
1 How could IT help The Nook comply with
be described as legal requirements
a fairytale ending toand
thissocial
rapid growth Sources: S Mitra (2012), ‘From New Zealand to Silicon Valley: Victoria
responsibilities surrounding the the
salebusiness
of alcohol? Ransom’s Wildfire journey’, 29 March, www.sramanamitra.com; J Constin
story, was sold to Google in July 2012. (2012), ‘Google acquires Wildfire, will now sell Facebook and Twitter
262 Managment information systems | First Australasian edition 2 Drinks and music never become obsolete,
Since the right?
company’s How could
acquisition byThe Nook’s
Google, lack has
Victoria marketing’, TechCrunch, 31 July, techcrunch.com; V Ransom (2011),
of IT create the environment that makes
assumed them
the role appear obsolete?
of Director of Product Management for
‘Victoria Ransom, founder and CEO of Wildfire’, Inc., 3 August, www.inc.
com; Ernst & Young, ‘Announcing the 2011 Ernst &Young Entrepreneur of
3 The sheer number of possibilities
Wildfire. are creating overload for Malakai and the Year finalists’, www.ey.com.
Abbie before they even adopt any specific IT. How can technology be used
c08SocialComputing.indd 262 29/04/14 9:38 PM
to help them make a decision about the IT they choose to adopt?
The second major issue confronting e‐commerce is order fulfilment, which can create
BEfOrE problems for e-tailers as well. Any time a company sells directly to customers, it is involved
2.2 Competitive advantage
yOU gO ON . . .andinstrategic
various order fulfilment activities. It must perform the following activities: quickly find
the products to be shipped; pack them; arrange for the packages to be delivered speedily
information systems
1 Describe electronic to the customer’s door; collect the money from every customer, either in advance, by
storefronts
A competitive strategy is a statement that identifiesand COD,toorcompete,
malls. approach
a business’s by individual
its invoice; and handle the return of unwanted or defective products.
goals and the plans and policies that2will be required
Discuss to carry
various It is very
typesout those goals. 24 A difficult
strategy, to accomplish these activities both effectively and efficiently in B2C,
in general, can apply to a desired outcome,
of onlinesuchservices,
as gaining because
market share.
such A acompetitive
company has to ship small packages to many customers and do it quickly. For
strategy focuses on achieving a desired asoutcome this reason,
when competitors want
cyberbanking, to prevent companies
you involved in B2C activities often experience difficulties in their
from reaching your goal. Therefore, when securities
you createtrading, job
a competitive supplyyou
strategy, chains.
must plan
searches,
your own moves, but you must also anticipate andtravel In addition
counter your competitors’ moves.to providing customers with the products they ordered and doing it on
Through its competitive strategy, anservices
organisationand so time,advantage
on.a competitive
seeks order fulfilment
in the provides all related customer services. For example, the customer
industry in which it operates. That 3is, Discuss
it seeks online must receive
to outperform its competitors in a assembly
critical and operation instructions for a new appliance. In addition, if the
measure such as cost, quality, and time-to-market.
advertising, its Competitive customer
methods advantage helpsis not happy with a product, an exchange or return must be arranged. (Visit
a com-
pany function profitably within its market
and and www.fedex.com.au
generate larger-than-average
its benefits. profits. to see how returns are handled via FedEx.)
students actively engaged with the course material. Reading c02OrganisationalStrategyCompetitiveAdvantageAndInformationSystems.indd 51 Apply the Concept
Background
29/04/14 6:16 PM
At this point in your ‘buying’ career, you have probably bought something
activity. These are a hands-on opportunity for students to some pop-up ads promoting products when you search for certain items.
Another thing that has changed is that companies now want you to do their
advertising for them. The text refers to this as viral marketing.
immediately apply what they have learned. Each feature has the Activity
Go online and source a company that has effectively implemented a viral
marketing campaign. Now imagine that you work for a restaurant that also has a
Deliverable
and deliverable (various tasks for students to complete as they marketing collateral.
172 Managment information systems | First Australasian edition FOR THE MIS MAJOR
The MIS function is responsible for the most fundamental information systems in
organisations: the transaction processing systems. The TPSs provide the data for
c05BusinessIntelligence.indd 172 30/04/14 10:10 AM
the databases. In turn, all other information systems use these data. MIS personnel
develop applications that support all levels of the organisation (from clerical to
executive) and all functional areas. The applications also enable the firm to do
business with its partners.
SUMMARY SUMMARY
1 explain the purpose of transaction processing > ERP systems integrate organisational resources,
resources, they make organisations more flexible, Out‐of‐the routine reports are called ad‐hoc (on‐
1 Compare and contrast the two major types of 4 explain the impact that networks have had on demand) reports. For example, a chief financial officer
agile and adaptive. The organisations can therefore
networks. business and everyday life for each of the six major might want to monitor cash flow and cash on hand.
react quickly to changing business conditions and
The two major types of networks are local area categories of network applications. capitalise on new business opportunities. Exception reports include only information that falls
networks (LANs) and wide area networks (WANs). > Discovery involves browsing and information > ERP systems provide essential information on outside certain threshold standards. An exception
LANs encompass a limited geographic area and are retrieval, and provides users the ability to view business performance across functional areas. report might identify only those cases where sales fell
usually composed of one communications medium. information in databases, download it and/ This information significantly improves managers’ outside an established threshold — for example, more
In contrast, WANs encompass a broad geographical or process it. Discovery tools include search ability to make better, more timely decisions. than 20 per cent short of the quota.
area and are usually composed of multiple engines, directories and portals. Discovery tools
communications media. enable business users to efficiently find needed >>> CHAPTer gLOSSArY
2 Describe the wireline communications media and information. ad-hoc (on-demand) reports Non-routine reports that computer-integrated manufacturing (CIM) An
often contain special information that is not included in information system that integrates various automated
channels. > Networks provide fast, inexpensive
routine reports. factory systems; also called digital manufacturing.
Twisted-pair wire, the most prevalent form of communications, via email, call centres,
drill-down reports Reports that show a greater level of
communications wiring, consists of strands of copper chat rooms, voice communications and batch processing Transaction processing system (TPS)
detail than is included in routine reports.
wire twisted in pairs. It is relatively inexpensive to blogs. Communications tools provide business that processes data in batches at fixed periodic intervals.
enterprise application integration (eAI) system A system
purchase, widely available and easy to work with. users with a seamless interface among team comparative reports Reports that compare performances that integrates existing systems by providing layers of
However, it is relatively slow for transmitting data, it members, colleagues, business partners and of different business units or times. software that connect applications together.
is subject to interference from other electrical sources customers.
and it can be easily tapped by unintended receivers. > Collaboration refers to mutual efforts by two or ChAPTer 11 | Information systems within the organisation 393
Coaxial cable consists of insulated copper wire. It is more entities (individuals, groups, or companies)
much less susceptible to electrical interference than who work together to accomplish tasks.
is twisted-pair wire and it can carry much more data. Collaboration is enabled by workflow systems. c11InformationSystemsWithinTheOrganisation.indd 393 30/04/14 12:00 AM
However, coaxial cable is more expensive and more Collaboration tools enable business users to
difficult to work with than twisted-pair wire. It is also collaborate with colleagues, business partners and
somewhat inflexible. customers.
Fibre-optic cables consist of thousands of very thin > E-learning refers to learning supported by the web.
filaments of glass fibres that transmit information via Distance learning refers to any learning situation in
light pulses generated by lasers. Fibre-optic cables which teachers and students do not meet face-to-
are significantly smaller and lighter than traditional face. E-learning provides tools for business users
cable media. They also can transmit far more data, to enable their lifelong learning.
and they provide greater security from interference > Online universities offer online courses in which
and tapping. Fibre-optic cable is often used as the students take classes via the internet at home
backbone for a network, whereas twisted-pair wire or an off-site location. Online universities make
and coaxial cable connect the backbone to individual it possible for students to obtain degrees while
devices on the network. working full time, thus increasing their value to
3 Describe the most common methods for accessing their organisations.
the internet. > Telecommuting is the process whereby knowledge
Common methods for connecting to the internet workers are able to work anywhere and anytime.
include dial-up, DSL, cable modem, satellite, wireless Telecommuting provides flexibility for employees,
and fibre to the premises. with many benefits and some drawbacks.
activities
>>> PrObleM‐SOlViNg aCTiViTieS
takes concrete actions against risks, such as another packet.
implementing controls and developing a disaster virtual private networkor (VpN)
1 A critical problem is assessing how far a company is 4 Enter www.biometricsinstitute.org/ www.A private network that
recovery plan. uses a public network (usually the internet) to securely
legally obligated to go in order to secure personal alltrustnetworks.com and other vendors of biometrics.
risk transference
is no suchAthing process in which the organisation connect
data. Because there as perfect Find the devices theyusers
makeby using
that can encryption.
be used to
security (i.e.,transfers the riskmore
by using
that other
can bemeans
done),to compensate
A site
Network that
hackan
2011.will suffer harm by a threat.
information
that
b Is there any way for a company to know if its CLoSIng CASe 1 >
problem? Are some organisations dealing with the
security measures are sufficient? Can you devise a
problem better than others? An inside look at the Australian government’s cyber security plans
method for any organisation to determine if its
security measures are sufficient? 6 Investigate the Sony Playstation Network hack that It is no longer an option to be complacent about From governments to religious organisations, global
securing computer networks. There is growing evidence enterprises to small business owners, everyone has
2 Assume that the daily probability of a major occurred in April 2011. that groups such as Anonymous, state‐based actors been a victim of these types of attacks. The motives of
earthquake in Brisbane is .07 per cent. The chance of a What type of attack was it? and individuals are intent on stealing valuable data or attackers range from a self‐deluded intention of doing
causing disruption to computer‐based services. good for society, to monetary or political gain or for no
your computer centre being damaged during such a b Was the success of the attack because of
quake is 5 per cent. If the centre is damaged, the technology problems at Sony, management 240 Managment information systems | First Australasian edition
average estimated damage will be $4 million. problems at Sony, or a combination of both?
a Calculate the expected loss in dollars. Provide specific examples to support your answer.
b An insurance agent is willing to insure your facility c Which Sony controls failed?
c07InformationSecurity.indd 240 29/04/14 6:26 AM
Database activity
Database Tools tab above the ribbon and click on the
This means being able to see some parts of a database
relationship map.
but not others. Hence, the way people select parts of a
1 Download and open the Ch 06 NetSimple database
database to see is closely connected to privacy and security
from www.johnwiley.com.au/highered/rainer/ausnz/
considerations. Discussion questions 1 and 2 at the end of
studentresources. It has one table with the same
this activity go into this connection more deeply.
practise their Access skills while using concepts learned in the chapter. Each In this activity, which you will find online, you will learn
how to filter and sort an Access table to zero in on
violates the normalisation rules you learned in
Chapter 3. However, this ‘flat file’ data structure is
1
Other documents randomly have
different content
back; accordingly, on the following morning, he was seen coming along the
beach alone, "and when he had arrived within good gun-shot, they
commenced firing at him; without changing his pace, he continued to
advance, and drawing his cutlass, called out to Paine to stop firing and he
would make peace with him; Paine, however, continued to fire, and, at the
third or fourth discharge, Comstock fell lifeless upon his face, a ball having
pierced his heart. Fearing that he might not be quite dead, and perhaps would
get up again, Paine ran up to him with an axe, and cut off the back of his
neck. He was buried close to the tent, in the manner he had often expressed a
wish to be, with all his clothes on, and his cutlass hung to his side. Upon first
landing, he had fixed upon a site for a town, and amongst other public
buildings that he contemplated erecting, was a church, for which he had
selected what he considered an eligible situation.
"The natives were all the time so very friendly, that we were not in the
least afraid of them. A great many of them came to our tent every day, and
some of them were there day and night, eating, drinking, and sleeping with
us. Paine had a girl that he brought from another islet, who did not like to
stay with us, and would run away whenever she got an opportunity; he fired
muskets at her several times, and at last, used to keep her by putting her in
irons.
A few days after the ship ran away, some of the natives, who had been at
the tent, stole from us a number of tools. Paine gave four or five of our
people muskets without cartridges, and sent them to the natives, a great
many of whom were assembled not far off, for the stolen articles. The
natives refused to give them up, and soon began to throw stones at our
people, who, knowing that they had not the means of resisting, began to
retreat; the natives pursued them, throwing stones, and one of the party,
Rowland Jones, either fell or was knocked down by his pursuers, who came
up immediately afterwards and killed him. When the party returned to the
tent, Paine, who had taken the command after Comstock's death, ordered all
the muskets brought to him, and locked them up. We were all in or about the
tent, when a few hours afterwards the natives came there as usual, but in
greater numbers. After they had been there a little while, some one
remarked, 'I am afraid they are going to kill us; they have all got spears, or
stones, or sticks in their hands.' Upon this, Paine said he believed we were
all taken, but that he was safe. The words were scarcely out of his mouth,
when the natives commenced the massacre, knocking our people on the head
with stones and clubs, and sticking spears in them. An old man and his wife
laid hold of me, one on each side, and led me a little way off in the bushes,
where, I thought they were going to kill me, but where they only held me
fast and protected me from the violence of several who came and wanted to
kill me. I saw two of the natives lead Paine off a little way, and thought they
were going to save his life; but they proceeded only a few yards, when one
of them took up a stone and struck him on the head; he attempted to run, but
a second blow brought him down, and they immediately afterwards killed
him. Oliver, I did not see; but the natives told me that he ran a short distance,
when he was overtaken and killed in the bushes. A Sandwich Islander that
was with us, got to the water, and was overtaken and killed there."
"Oh, yes, and children too. The women seemed to take as active a part as
the men. I saw one old woman run a spear in the back of one man, who was
held by two natives, with a degree of violence that seemed far beyond her
strength. I thought that all but myself were killed until the following
evening. I had been taken to the islet where your schooner is anchored, and
where all the chiefs were assembled, when they brought Huzzy, to show me
that there was one living besides myself. After an interview of a few hours,
Huzzy was taken away to live with Lugoma, who had saved his life, and I
was taken to live with the old man who had saved mine. He was so very
poor that I scarcely ever got enough to eat of the coarsest native food. I had
to labour very hard, although I suffered constantly from hunger, which soon
made me weak and extremely wretched. At last, the high chief took
compassion upon me, and made me live with him; after which, I had always
plenty to eat, and was at liberty to work or not, as I pleased. He was very
kind to me in every respect. They have always brought Huzzy to me, or
taken me to see him once a fortnight, or once a month, and suffered us to
pass the day together."
Here Lay's narrative ended. Huzzy told us, that during his residence with
Lugoma, his time had been spent principally on the water, going with him in
his canoe, which required two to work it. Lugoma was a great fisherman,
and distinguished amongst the chiefs for his industry and enterprising
character. He would always have enough to eat, if he had to steal it. When
Huzzy would complain to him of the hard and laborious life that he led,
Lugoma would always reply, that if he would eat he must work. There seems
to be no doubt, that the natives saved the lives of these young men from no
other motive than that of making them slaves, and availing themselves of the
advantage of their labour.
The chief persisted in his desire to leave us, saying he was still afraid I
would kill him; and as I had no object in taking him with me against his will,
I consented to his departure, presenting him with some seeds, the culture of
which I caused to be explained to him, as also the value of the fruit. Our
return on board was welcomed by every body. We had now accomplished
the object of our visit, and the islands were altogether so void of interest,
except for their novel formation, and the singular habits of the natives, that
we were well content to leave them and return to some other place more
congenial to the feelings of civilized men. Before we left, however, we
wished to see the chiefs, and after representing the impropriety of their
conduct toward the white men who had sought an asylum upon their islands,
point out the course they must in future pursue towards such as might again
visit them. On the morning of December the first, none of the chiefs or
people residing upon the islet abreast of us having returned, the mother of
the high chief was directed to send for her son to come back, and bring with
him the rest of the chiefs, without delay. I made a visit to the chief's village,
where I found but few inhabitants, most of whom were women and children.
It was situated on the side of the island opposite to us, and bordering upon
the inland sea. It was not extensive, but a beautiful and romantic spot; the
grove of cocoa-nut and bread-fruit trees, through which were scattered the
huts of the natives, ran about a hundred yards back from the inland sea to a
wild thicket that passes through the centre of the islet, in length two or three
hundred yards. Here I found the largest canoe that I had yet seen. It was
large enough to carry fifty men, but being old, leaked so badly, that the high
chief was compelled to leave it behind, in his flight, with all the rest.
Near the high chief's hut, we came to consecrated ground. It was the
place of burial for the royal dead. It was but a small space, comprehended
within the circumference of a few yards, and at the head of each grave stood
a cocoa-nut tree, bound round with dry leaves,—a mark that prohibited the
use of the fruit. We were accompanied by a son of the high chief, a child
about twelve years old, who desired us not to tread on the graves of his
ancestors. Two graves were pointed out, as those of chiefs, who had been
highly distinguished, beside which stood the aged trunks of cocoa-nut trees,
that indicated the period of their demise to have been very distant. At one of
the huts we saw a domestic fowl, which, when I expressed a wish to
purchase, the chief's son, whose name was Ladro, immediately presented
me. We afterwards saw a number of others running wild in the thickets. They
were small, and looked like what is called the bantam. The natives never eat
them, giving, as the reason for it, that they are not cleanly in their food. On
our return, Lay took me to a place, where, after the massacre, he had buried
a Spanish dollar. It was still there, and he took it with him as a memento of
his captivity. We passed several springs of water, to which the women are
banished at a certain period.
We met with a native, whom Lay knew, and who, assuming the native
dress, went through the violent motions and gestures of a Mulgrave man,
engaged in battle. It was an indescribable mixture of the frightful and
ludicrous. I was apprehensive that it would offend the native: but he laughed
with us at the representation, and said, it was very good. On the following
morning, December the second, we were disappointed in not seeing the
chiefs. The captain went again to the high chief's mother, who made some
excuse for their not appearing, and declared, that they would positively be up
that night by moonlight. He told her to send to them again, and say, if they
were not there on the morrow, he would go after them, and the consequence
might be serious. The old woman seemed very much alarmed at hearing
such language, and promised a faithful compliance on the part of her son. It
had the desired effect, as on the following morning, December the third, the
chiefs all presented themselves on the shore, near our anchorage. The
captain, taking Lay and Huzzy with him, went on shore to meet them. They
told him, by way of opening the interview, that they were in his power, and
ready to obey all his commands. He required of them to restore a whale boat
that belonged to the Globe, a swivel, they had taken from the white men, and
Lay's musket, to all of which they cheerfully assented. He then gave them, as
a proof of his friendship, some cotton handkerchiefs, axes, and a variety of
other articles, of much more value to them than those he had taken. He told
them, that white men would never come there to hurt them, and that they
must always be kind and friendly to them, whenever ships should hereafter
visit their island. That, if other white men should ever be similarly situated
to those they had killed, they must take care of them, and at some future time
they would be rewarded for it. They promised faithfully to do all that they
were told, and regretted having killed our countrymen. We gave them a pair
of pigs, male and female, which we told them to take great care of, and
increase the number as much as possible, forbidding them, on pain of our
displeasure, to kill any until we should again return, which might be at no
very distant period, although it was uncertain when. The surgeon's grave was
made a sacred spot by the high chief, and every thing about it was to be held
in the same reverence as the burial-place of his forefathers. The high chief
was instructed, through the interpreters, in the manner of cultivating the
fruits and vegetables, the seeds of which we had given him in great variety.
Some we planted, and all was to be under his especial care. The use of the
various kinds was explained to him, as well as their importance to ships, that
might visit his islands, which would give him in return for them, axes, or
whatever else was most valuable to him.
As soon as the shower was over, which lasted for two or three hours,
Lugoma went out, and employed himself busily collecting and breaking up
dry wood, and arranging his ovens of stones, that all might be in readiness to
cook the fish as soon they were taken out of the water. There was a
considerable shoal extending out from the shore, opposite to his huts, upon
which the fish, in their migrations along the islets came in great numbers. At
the outer edge of this shoal he had sunk, a few feet below the surface of the
water, a long line of cocoa-nut leaves, which were dry, and of a reddish
colour. One end of the line of leaves was taken to the shore, and made fast,
where there was a pen, built of stone. The line was then taken round upon
the shoal semi-circularly, encompassing a considerable portion of it, and the
space between the other end of the line and the shore left quite open. When a
school of fish is seen, the natives intercept them, driving them through this
open space, and, pressing forward, finally into the stone pen, from which
they are taken with nets. After all the arrangements were made, Lugoma and
another native, waded out beyond the line of leaves, to watch the schools of
fish, but, unfortunately, he allowed them all to escape; and, as well as
ourselves, seemed to be a good deal disappointed with his bad success. What
appeared to be most remarkable about this method of catching fish, is that,
after they are inclosed, they will not pass under the cocoa-nut leaves,
although there is a depth of several feet water between them and the bottom.
Lugoma took me to the place where he had planted the water-melon seeds, I
gave him at the time of our parting. He had cleared and mellowed the ground
with care, preparatory to planting the seeds, which were already up, and
looked thrifty. I bestowed upon him a great deal of praise, and planted a
variety of other seeds, of fruit and vegetables, of which he promised to have
an abundant supply for me, when I should again return. When night came,
and the hour of repose was at hand, I was perplexed with the difficulty of
providing for our security against surprise or treachery, without giving
Lugoma reason to suppose that we did not confide in his friendship, which I
knew he would infer, from any particular watchfulness on our part. I did not
believe that we had reason to apprehend danger from Lugoma or any one
else, but as we were exposed to it, and had the means of security, I was
determined not to run any risk. Three of the men were sent to sleep in the
boat, anchored off a short distance from the shore, and which Lugoma was
told no one must approach. The rest were directed to bring their arms on
shore, and keep a lookout through the night, in rotation. When the
arrangement was made, and we had all lain down, except the man that was
standing sentry, Lugoma saw him, and asked, if there was not room enough
for him to lay down. We answered evasively several times, with a view to
satisfy the uneasiness he expressed, lest he should be thought wanting in any
respect in hospitality; but were at last obliged to tell him, that the man was
keeping watch, to see that no one came to hurt us. His mortification was
evident, as he remarked, in reply, that no one would come to his island to
hurt us. We expressed our full confidence in his friendship, giving him the
further information, that it was our custom always to have some one on the
look-out. Lugoma arranged mats upon the floors of his huts for us all, and
invited me to lay down on one side of him, having his wife and daughter on
the other side. It blew and rained hard all night, but the morning was clear
and pleasant. We set off on a visit to an islet a few miles beyond that of
Lugoma. He offered to go with us, and dive for a large shell-fish, found
there; but as we could not take him, without incommoding ourselves, we
declined his company. The islet was so uninteresting, as hardly to repay us
for the trouble of going to it. It was covered with a thick growth of hard red
wood, common to most of the low islands, and wild bup. We soon took our
departure from it, and returned to Lugoma's islet, at an early hour of the day.
For the first time, at the Mulgraves', I observed, in one of Lugoma's huts,
a drum, resembling those of Nooaheeva, but of small dimensions. I supposed
it was an instrument of music, and in compliance with my request, Lugoma
readily consented to play on it. Calling his daughter to him, he bade her
thump upon it with her hands, whilst he sung, in time with the music, a few
short lines, throwing himself in a variety of attitudes, alternately extending
one arm, with great vigour, and drawing the other to his breast. Upon
inquiring what was the subject of his song, he told me, through Huzzy, that it
was the massacre of the white men,—a rudeness, I did not expect,—even
from the untutored Lugoma. I declined any further display of his musical
powers. When we were preparing to return on board, Lugoma came to me
several times, saying, that I might just as well cut his throat, as to lake Huzzy
away from him. "I have no one," said he, with a distressed look, "that is
equally capable of assisting me, to work my canoe, and now, he is going
away with his musket, my enemies can come and kill me." Finding, at last,
that he could not prevail upon us to leave Huzzy, he said, we must bring him
back very soon. That, if we were long absent, we should not find him living.
He said, that we must bring him clothes, like ours; guns and axes; and that
we should share the government of his islet with him, promising to have an
abundant supply for us, of all the fruits and vegetables we had planted.
When he and the old women had taken an affectionate leave of Huzzy,
he requested me to take two or three females in my boat, with their baskets
of fish, which were intended as a present to the high chief, and land them
upon the islet where he lived. We consented to do so, and, after landing
them, arrived on board late in the afternoon, the schooner having run down
to the Globe's anchorage, where she was now lying.
The captain went on shore, and at two, P.M., December the eighth,
returned on board with the high chief, and two others. They were shown
every thing about the deck, but without awakening much apparent curiosity.
We then beat to quarters, and let them see what a formidable appearance we
made, arrayed for battle,—an appearance, truly ridiculous to one accustomed
to the imposing effect of a fine ship of war, and calculated to excite our
risibility, notwithstanding the seeming gravity we assumed for the occasion.
The captain asked the high chief, if he did not wish to hear one of the cannon
fired, to which he answered evasively, unwilling, I suppose, to acknowledge
his fears, as he had been a great warrior in his time. The captain then told
him, that he would have one of them fired, if he was not afraid, which
brought the chief to a confession, that he dared not hear it. The chiefs
brought a number of presents for the Tamon,[10] as they called the captain,
consisting principally of mats.
It was late in the evening when we got underway, at the Mulgraves, for
the last time. We had surveyed all that part of the islands intervening
between our first anchorage and the Globe's landing, and now steered to the
eastward by the bearings we had previously taken. Squalls of wind and
heavy rain coming on, we soon lost sight of the land. The loud roaring of the
surf, off the extreme north-eastern point, as well as the heavy swell that set
in immediately afterwards, apprised us that we had cleared the group. The
land was in sight from the mast-head, in the morning, when we ran down for
the eastern end of the island, where we had first anchored, and at a
convenient distance run along upon the weather side, taking hearings at the
end of every base of three or four miles. Near the centre of the windward
part of the group we passed a wide opening into the inland sea, not far from
which was a reef of considerable extent, where a very high surf was
breaking. Within a short distance of the reef, we saw the bottom plainly in
ten fathoms water. There was no place on the weather side of the islands,
where it was possible to land with any degree of safety. After passing the
extreme northern point we steered off, with the trending of the land W. by S.;
and, at sun-down, were up with the island, from whence I had taken Lay,
having sailed nearly round the group. Here we hove to for the night.
The group of Mulgrave Islands, as they are called, form a circular chain
of narrow strips of land, which are no where more than half a mile wide,
inclosing within the circle an inland sea, one hundred and forty miles in
circumference, filled with shoals and reefs of coral. It is every where
bounded on the sea-side, by a bank of coral, that protects it from the violence
of the ocean. This bank generally extends but a short distance from the
shore, when it goes off into unfathomable water. At the chief's islet, where
we buried the surgeon, it was wider than at any other place about the group,
being upwards of a cable's length, which, for a low coral island, may be
considered good anchorage. The whole circle is broken alternately into
clumps, a few feet above the water, of level and low coral reefs, some of
which are above high-water mark, and some sufficiently low to afford a
passage for boats. The clumps vary in length, but none of them are more
than two miles long, without an interruption of a dry or drowned reef. They
are covered with a thick growth of bushes, and trees of small size, except
where the cocoa-nut and bread-fruit trees rear their tall heads, and wide-
spreading branches. Wherever these grow, the underwood disappears, and
the place has the appearance of an old forest, cleared for a pleasure ground,
where a few trees have been left standing, for the advantage of their shade.
The bread-fruit tree is of two kinds. One is the same as that, which is
found at the Society, Sandwich, and many other islands of the Pacific. This
has no seed, and can only be produced by cuttings from the tree, or shoots,
that spring up from the roots. The other kind is seminal, and very much
superior to the first. It was not the bread-fruit season, when we were at the
Mulgraves, and much to our regret, we could not obtain any of the seeds of
this rare and valuable plant. This tree, in general, attains a size considerably
larger than that of the common bread-fruit. The leaf of the bread-fruit tree
strongly resembles that of the fig, and any one, who has seen the latter,
would immediately recognise it, by the resemblance, and the fine rich
foliage it bears, when growing luxuriantly. This is by far the most important
production of the Mulgrave Islands. When the fruit is not blasted, as
sometimes happens, there is a great plenty for the inhabitants. It lasts,
however, only for a few weeks; and it is to be presumed, that the natives
have no way of preserving it, in a dried or baked state, as is practised with
many of the South Sea Islanders, none having been seen by us during our
stay. The cocoa-nut tree is next in value to the natives. Of this food there is
an ample supply, unless the fruit is blasted. When the bread-fruit and cocoa-
nut, both fail in the same year, the natives experience great distress, and are
reduced to the necessity of living upon a fruit, they call bup. It is commonly
used by the poorest people, and in small quantities by the chiefs at all times.
It grows upon almost all the islands in the West Pacific; but, when wild, is
much inferior to that growing on the trees, which have a clear open space
around them.
Lay lived upon the wild bup for a considerable time after the massacre,
when residing with the poor old man, who saved his life, and before the high
chief took compassion on him. It has a sweet taste, like the juice of a green
corn-stalk. Bread-fruit, cocoa-nuts, and bup, is the only food of the
inhabitants of the Mulgrave Islands, except at the season of the year, when
great numbers of fish are taken. The industrious and enterprising have an
abundant supply at that period; but it is only whilst the season lasts, as they
are not in the practice of preserving them. The bup-tree is the most
remarkable of all the vegetable productions of the Mulgrave Islands. To
shipwrecked seamen, it might be the means of sustaining life, when no other
food could be found, and, as it is a never-failing resource, it ought to be
generally known amongst those, who navigate the Pacific Ocean. The tree
generally grows from twenty to thirty feet high,—sometimes singly, but
more frequently in small clusters. The diameter of the body rarely exceeds
six inches. It has a hard thick bark, but the wood is spongy, like that of the
cocoa-nut tree. It stands on from half a dozen to a dozen roots or prongs, by
which it is propped up two or three feet from the ground. The fruit is an
exact resemblance of a pine-apple. Its smell, when ripe, is at first agreeable,
but, so powerful, that it soon becomes offensive. The taste of the ripe fruit
has much the same effect—agreeable at first, like a mellow, sweet apple, but
cloying and nauseous to the stomach, when taken in any quantity. The ripe
fruit is never eaten by the natives of the Mulgraves. When green, it is not
considered in a state to be eaten, until a beard, which grows out alongside of
the stem, has acquired a length of four or five inches. It may then be taken
from the tree, and eaten raw, or roasted between hot stones. The soft part of
the seeds (if I may so call them) is alone palatable, the other part being hard
and tough. The manner of eating it is, to twist the soft part off with the teeth,
whereby the juice is expressed. There was but little about the islands that
would excite the interest of either the botanist or naturalist. We saw but few
flowers or plants. The islands were swarming with a species of small rat, that
had a tuft of hair upon its tail. The natives spoke of them as being very
troublesome. By throwing a small quantity of food upon the ground, near
one of the huts, dozens of them could be collected together in a few
moments.
When one of the natives is sick, the friends collect at the hut, where he is
lying, and chant over him, to appease the offended spirit that has afflicted
him. The same prescription is given for all diseases, which is a tea, made
from an herb found upon the island. If death takes place, the friends of the
deceased assemble, and mourn over the body, keeping it until it becomes
very offensive. Frequently, in the midst of their most bitter mourning and
lamentation, some of the mourners will intentionally say or do something
calculated to excite mirth, when they all burst out into immoderate laughter,
as if their mourning were the affectation of children, and as soon as the
humorous excitement has passed over, again relapse into their mournful
strain of howling and chaunting. When the body can be kept no longer, and
the day of interment arrives, the grave is dug, and the corpse taken upon
sticks, and carried to it by the friends of the deceased, followed by a large
concourse, who move along without order, and some one occasionally
breaks in upon their solemnity by a humorous trick, which gives rise to
others, and sets them all laughing. This is soon again succeeded by
mourning. The body is lowered into the grave, and covered up, when a little
canoe, with a sail to it, and laden with small pieces of cocoa-nut or other
food, having been previously prepared, is taken to the sea-shore on the
leeward part of the island, and sent off, with a fair wind, to bear far away
from the island the spirit of the deceased, that it may not afterwards disturb
the living. This ceremony is considered indispensably necessary, and is
never neglected. At the head of the grave a cocoa-nut is planted, the tree that
springs from which, is held sacred, and its fruits never eaten, in times of the
greatest famine. Their burial places are usually a short distance back of the
houses, and the females are strictly prohibited from going to them.
Their marriages are conducted with but little ceremony. If a man fancies
a female for his wife, he makes the proposal to her, which, if agreeable, he
applies to her friends. They meet, and hold a consultation, as to the propriety
of the match, and decide whether it shall take place. If the man's suit is
denied, nothing more is said on the subject. When united, they are said to be
very faithful, and jealous of each other's chastity. Lay or Huzzy related an
occurrence, that took place during their residence on the islands, which
shows how keenly a sense of injury is felt by them, and that jealousy
sometimes inspires them with the most ferocious and deadly revenge. A
young man had taken a young woman for a wife, whom he supposed to be a
virgin. In a very short time after she went to live with him, however, it was
evident that she was pregnant, and before the period which nature has
prescribed had elapsed, gave birth to a child. The indignant husband took the
infant from its mother's arms, and in her presence dashed its head upon a
stone in front of his hut. It was an act for which, under other circumstances,
he would have suffered death, by a custom of the islands, forbidding the
destroying of human life; and, as the female was of superior rank to the man,
being the daughter of a chief, it was believed that he would be punished. Her
friends were loud in their calls for justice upon the offender, until a council
of the chiefs was called, and the matter brought before them.
After an investigation, the chiefs were satisfied, that the woman had
grossly imposed upon her husband, whom they suffered to depart without
censure. It is permitted to the men to have as many wives as they can get;
but as food is very scarce, and they find it difficult to support one, there are
few, even of the chiefs, who have more. The high chief was the only
exception to this remark at the time of our visit. He had six, one of whom
was a particular favourite.
Latuano, the high chief of the Mulgraves, was called the greatest warrior
that the islands had produced for a long time. He told us that in one of his
wars he was driven from his islands, and remained (I think) fourteen days at
sea in his canoe, most of the time out of sight of land. He steered for an
island, which, according to the tradition of his countrymen, lay to the west of
the Mulgraves, and, after a great deal of suffering, arrived there in safety.
The high chief of this isle (south Pedder's Island) received him with
kindness, and after he had visited thirteen different islands of the group,[11]
sent him back to the Mulgraves with a fleet of canoes, and a great many
men. He arrived there in safety, conquered his enemies, and at the time of
our visit was tributary to the chief of Pedder's Island, who had given him a
daughter or grand-daughter in marriage. They told us that every few years
the chief of Pedder's Island, who is very powerful and very wise, sends a
fleet of canoes to the Mulgraves, for tribute. Lay and Huzzy were to have
been sent to him, as also the Globe's whaleboat and swivel. I was
particularly struck with Latuanos' strong resemblance to General Bolivar.
His stature was about the same, and his face bore the same marks of care and
serious thought, when his attention was not awakened to any particular
thing; and, when animated by conversation, the same vivid expression
beamed from his fine features, and sparkling black eyes. I could not but
think, when I was looking at him, that if he and General Bolivar could be
placed near to each other, similarly dressed, it would be difficult to tell
which was the Indian chief, and which the patriot hero.
The men wear bunches of grass hanging down before and behind, such
as I have described at our first anchorage, being about the size and
appearance of a horse's tail. Those in most common use, were of a reddish
colour; but a few of them were white. The bark of which they are made is
taken from a long running vine. The boys go quite naked until they are ten or
twelve years old, when a dress similar to that of the men is put on them.
Their ornaments consist of shell bracelets and necklaces, and sometimes a
string of thorn is put round the head; flowers, when they can be obtained, are
often used instead of shells. Many of the men, and some of the women have
large slits in their ears, through which they put rolls of leaves from one to
two inches in diameter. The women wear beautiful white straw mats, of
elegant workmanship, about two feet square, and sometimes larger, bordered
round the edge, from one to two inches, with black diamond figures, worked
in with coloured straw, died with the husk of the cocoa-nut. They usually
wear two of these mats, one of which is behind and the other before, tied
round the waist with a beautiful round cord of braided straw. The ornaments
of the women are the same as those worn by the men. They have no manner
of worship. They acknowledge the existence of a Great Spirit whom they
call Kenneet, and who, they say, can make them sick and kill them: they
look for nothing good from him, and, so far as I could learn, have no idea of
rewards and punishments after death. They have a sort of conjurers amongst
them, for whose art they entertain great reverence, and in whom they place a
strict reliance. To them they apply in all cases of great emergency. Their art
consists in having a large bunch of straws, which they fold double and tie in
a great many different ways; if, after the straws are thus folded, doubled, and
tied, they can be drawn out without being in any manner entangled the one
with the other, the omen is propitious; but otherwise, the contemplated
undertaking is relinquished. On the following morning it is again resorted to,
and so on until success is promised. It must never be tried but in the
morning, and only once on the same day. The morning I took Lay from the
natives, the chiefs had recourse to this art before they would allow him to
speak to us; they were promised good fortune, otherwise he would have been
concealed from us. He who cannot perform the mysteries of this art, is not
allowed to drink from the same cup with him who can.
They had a great aversion to hearing us whistle, particularly in their
houses, and would invariably run up to any of our people when they were
whistling, and with a fearful look, beg them to stop; saying, it would bring
spirits about the house that would make them sick and kill them. If one of
them has wronged another who has died, or if they were enemies, he never
eats without throwing away a portion[13] of his food to appease the ghost
of the departed.
For the purpose of ascertaining what idea the high chief entertained of a
God, the captain asked him several questions, to which his answers were
vague and unsatisfactory. He thought he had conceived the right one, when
he asked the chief who he thought made it thunder. After a moment's
hesitation, he looked at the captain and replied, "I suppose you can make it
thunder." This was as satisfactory as any thing he could be made to express.
Thunder he believed was produced by the agency of a being superior to
himself, and the captain he conceived to be infinitely his superior.
Not long after the massacre of the white men, the natives were visited
by a disease that caused their limbs to swell, and produced great distress
amongst them; it was before unknown, and they ascribed it to Lay and
Huzzy, who, they believed, had the power to afflict them in that manner,
and had done it to be revenged for the death of their countrymen. They
finally charged them with it, and threatened to kill them, which, in all
probability they would have done, but for their superstitious fear of some
greater evil.
Their huts are not, generally, more than ten by fifteen feet, and from ten
to fifteen feet high. They are divided into two apartments, upper and lower;
the lower is open all round, without any thatching; the floor is raised a little
above the adjacent ground, and covered over with small pieces of the
cleanest and whitest coral that can be found. The rafters and small sticks
that are laid across them for the thatching, are secured by twine made from
the outer husk of cocoa-nut, with which the thatching is also secured. The
thatch is the leaves of palm or cocoa-nut. The ceiling of the lower room is
generally so low, that one must bend almost double to get into it, and if you
remain, it must be in a lying or sitting posture. The garret has a floor of
sticks thickly interwoven with leaves; it is higher than the ground floor, and
has an air of comfort. The natives keep their provisions in it, and all such
things as they would preserve from the rats. They also sleep there in wet
weather. In the floor, a hole is left just large enough for a person to crawl
through, and so far from the sides that the rats cannot get to it.
Their canoes display the greatest ingenuity, and I have no doubt, that in
a civilized country, they would be ranked amongst the rarest specimens of
human industry, unassisted but by the rudest implements. The model is
most singular, and differs from all that I have ever seen in use, either in the
European or American world. Its construction is so remarkable, and in
many respects so inconvenient, that it seems improbable the model should
have had its origin in any other cause than the want of suitable timber for a
more perfect structure. The depth of a Mulgrave canoe, of common size, is
four or five feet; its length from thirty to forty. It is so narrow that a man
can scarcely stand in it; perfectly flat on one side, and round on the other. It
is sharp at both ends. The mast is from twelve to twenty-five feet long, and
the sail, (a straw mat,) which is bent to a small yard, is very large in
proportion to the canoe. They always sail on the flat side, and have the mast
a little inclined forward. It is supported by shrouds and a guy at either end,
which is used at pleasure to give the mast its proper inclination. In beating
to windward, instead of tacking as we do, and presenting the other side of
the boat to the wind, they bring the other end of the boat to it, making that
the bow which was before the stern. Amidships there are several light spars
extending about ten feet over the round side, and four over the other. Across
these are smaller sticks, which are securely lashed above and below, and
over them is made a platform. Upon that part of it which extends over the
flat side, they have a small thatched cabin, in which they store whatever
they wish to preserve from getting wet, or would conceal from observation.
The other part of the platform is intended to keep the canoe from being
upset; and when hard pressed with carrying sail, several men will
sometimes get on it, to keep the canoe upright. They move through the
water with astonishing velocity, and, in turning to windward, no boats can
surpass them. Although the natives had no other tools to work with than
what they made of shells, previous to the visit of the Globe, every article of
their workmanship is neat, and as highly polished as though it had been
wrought with steel. In the construction of their canoes, the keel-stern and
sternpost are solid pieces of hard wood, upon which they are built up of
small pieces laid one above the other, and closely seized on with the line of
cocoa-husk. The seams are neither caulked or payed, and the canoe
consequently leaks so much as to require one man to bail constantly. The
steerage is very laborious; they have no rudder, and the only means by
which they steer, is with a long flat paddle held in the hands of the
helmsman. To steer a large canoe in blowing weather, requires the utmost
strength of six or eight men. Upon the outriggers or platforms, and along
the masts, they arrange their spears, which are always taken with them,
even upon the most ordinary occasions. The canoes are also always
ballasted with a quantity of round stones, weighing about a pound each,
which forms a material part of their armament. Our carpenter was several
days at work upon the canoe of the high chief, caulking and graving her.
When he had completed his work, the high chief, after expressing his
gratification, earnestly solicited the captain to leave him on the island; he
said that he would always provide him an abundance to eat, and that no one
should ever hurt him. This, according to the high chief's standard, was the
most ample reward that he could promise for useful services.
After we had given them the pigs, it was amusing to see with what
apparent pleasure they carried them about in their arms, nursing them with
as much care and tenderness, as though they had been children, whilst the
pigs, unused to such treatment, were kicking and scratching the naked
bodies of the poor natives, and squealing away most lustily. We had to
interfere to keep the pigs from being killed with kindness, and finally
prevailed upon the chief to forbid their being petted in this style. It is not
improbable that, in a few years, the whalers that may have occasion to
cruise, in the vicinity of these islands, will find an abundant supply. It is
hoped, however, that until they become numerous, no navigator who may
chance to touch there, will encourage the natives to diminish their number.
Amongst other presents made by the captain to the high chief, was a
battle-axe,—to him an article of the greatest value. He received it, however,
with reluctance, expressing his regret, that he had it not in his power to