MIS5001 Week 13 Technology Dependence


Published on

Slides from week 13 of MIS5001: Management Information Systems taught by Prof. Steven L. Johnson at Temple University Fox School of Business.

Published in: Education, Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

MIS5001 Week 13 Technology Dependence

  1. 1. P R O F . S T E V E N L . J O H N S O N T w i t t e r : @ S t e v e n L J o h n s o n http://stevenljohnson.org http://community.mis.temple.edu/mis5001fall10johnson/ Week 13 –Technology Dependence MIS5001: Management Information Systems
  2. 2. Today’s Agenda   Announcements   Case Discussion   Group Project Presentation Review   Exam Review   Blog and Reading Discussion   Student Feedback Forms   Project Work Time
  3. 3. Case Study Discussion   Describe the security breach experienced by Sunnylake. Why do you think this breach occurred? What would you have done to prevent it?   What do you think Sunnylake should do now? Would you make the same recommendation to your manager if all of your office was locked out of its computer systems?   What was the underlying cause of the collapse of the CareGroup system?   Does the reason a network fails change the nature of the response? For example, in what ways is Sunnylake’s response helped or hindered by receiving a ransom notice? Do you think CareGroup would have reaction differently if they had coincidently received a threatening message?
  4. 4. 100-Second Reflection 1.  What was your favorite case study of the year? Why? 2.  What do you have more questions about? 3.  Any other comments?
  5. 5. Group Project Presentations   Convince an audience making project funding decision:   (A) What business problem are you solving?   (B) How do you propose solving it?   (C) How will the solution provide business value?   Format   15-17 minutes + 3-5 minutes for questions   Evaluation forms   Content: Clear description of business problem   Content: Effective justification of business value   Content: Convincing discussion of project feasibility   Presentation: Delivery and pacing   Presentation: Connection with audience   Overall Impression: Assessment of project
  6. 6. Exam Review: Format   Take-home: 5PM posted to class website, 8PM due via email   Open-note: no outside assistance or Internet assistance   4 short answer questions   Multiple bullet point answer or up to 1 paragraph answer   ~ 60% of grade (4 x 15% each)   Example: “What are 3 examples of a good time to fly a kite? What are 3 times when it is a bad idea?”   1 essay question   multi-part question or more involved question   mutli-paragraph answer required   pick from 2 or 3 choices   ~ 40% of grade   Example: “Yahoo! is losing money on email data storage. They want your advice: should they start charging users for email? Why or why not? “
  7. 7. Blog and Reading Recap   Personal backup and disaster recovery   Incident management in the age of compliance   Prevention – Detection – Response   “...being prepared for incidents via an incident response plan is likely to be one of the most cost-effective security measures an organization takes”   Legal requirements for response
  8. 8. P R O F . S T E V E N L . J O H N S O N E M A I L : S T E V E N @ T E M P L E . E D U T w i t t e r : @ S t e v e n L J o h n s o n http://stevenljohnson.org http://community.mis.temple.edu/mis5001fall10johnson/ For More Information