Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

Like this? Share it with your network


MIS5001 Week 13 Technology Dependence

Uploaded on

Slides from week 13 of MIS5001: Management Information Systems taught by Prof. Steven L. Johnson at Temple University Fox School of Business.

Slides from week 13 of MIS5001: Management Information Systems taught by Prof. Steven L. Johnson at Temple University Fox School of Business.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 206

http://community.mis.temple.edu 205
url_unknown 1

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. Week 13 –Technology Dependence MIS5001: Management Information Systems PROF. STEVEN L. JOHNSON Twitter: @StevenLJohnson http://stevenljohnson.org http://community.mis.temple.edu/mis5001fall10johnson/
  • 2. Today’s Agenda  Announcements  Case Discussion  Group Project Presentation Review  Exam Review  Blog and Reading Discussion  Student Feedback Forms  Project Work Time
  • 3. Case Study Discussion  Describe the security breach experienced by Sunnylake. Why do you think this breach occurred? What would you have done to prevent it?  What do you think Sunnylake should do now? Would you make the same recommendation to your manager if all of your office was locked out of its computer systems?  What was the underlying cause of the collapse of the CareGroup system?  Does the reason a network fails change the nature of the response? For example, in what ways is Sunnylake’s response helped or hindered by receiving a ransom notice? Do you think CareGroup would have reaction differently if they had coincidently received a threatening message?
  • 4. 100-Second Reflection1.  What was your favorite case study of the year? Why?2.  What do you have more questions about?3.  Any other comments?
  • 5. Group Project Presentations  Convince an audience making project funding decision:   (A) What business problem are you solving?   (B) How do you propose solving it?   (C) How will the solution provide business value?  Format   15-17 minutes + 3-5 minutes for questions  Evaluation forms   Content: Clear description of business problem   Content: Effective justification of business value   Content: Convincing discussion of project feasibility   Presentation: Delivery and pacing   Presentation: Connection with audience   Overall Impression: Assessment of project
  • 6. Exam Review: Format  Take-home: 5PM posted to class website, 8PM due via email  Open-note: no outside assistance or Internet assistance  4 short answer questions   Multiple bullet point answer or up to 1 paragraph answer   ~ 60% of grade (4 x 15% each)   Example: “What are 3 examples of a good time to fly a kite? What are 3 times when it is a bad idea?”  1 essay question   multi-part question or more involved question   mutli-paragraph answer required   pick from 2 or 3 choices   ~ 40% of grade   Example: “Yahoo! is losing money on email data storage. They want your advice: should they start charging users for email? Why or why not? “
  • 7. Blog and Reading Recap  Personal backup and disaster recovery  Incident management in the age of compliance   Prevention – Detection – Response   “...being prepared for incidents via an incident response plan is likely to be one of the most cost-effective security measures an organization takes”   Legal requirements for response
  • 8. For More Information PROF. STEVEN L. JOHNSON EMAIL: STEVEN@TEMPLE.EDU Twitter: @StevenLJohnson http://stevenljohnson.org http://community.mis.temple.edu/mis5001fall10johnson/