SlideShare a Scribd company logo
1 of 11
Page 3 of 3
Managing Information and Technology: Finding New Ways to
Learn and Link-
This chapter addresses technology and how technology is
constantly changing the way we do business. To understand how
technology impacts our personal and business lives, it is
important to have the basic understanding of a computer,
software, and networks. The computer has hardware. These are
physicalcomponents used to collect, input, store, and process
data to be distributed as information. Examples include hard
drives, printers, keyboards, modems, and routers.
Software gives the computer instructions. There are two types
of software:
1. Systems software is the operating system. An example would
be Microsoft Windows.
2. Application software provides the user with the desired task.
Examples are Microsoft Word, Excel, and PowerPoint.
In today’s world, networks are used to share information and
communicate. The Internet is the largest network in the world.
The World Wide Web provides information and service for
business, education, and personal needs. When employees work
from their home, they have access to their company’s server.
This is an intranet connection that only specific employees have
access to, depending on their job. The extranet is controlled by
the company and limits the usage to suppliers and customers.
An example would be a company that allows people to shop and
buy their products.
The “cloud” is a form of computing that goes beyond the
company’s firewall to store data and run applications. The main
advantage in using cloud computing is that it does not take up
space on the hard drive. The cloud accesses a vast array of
computing recourses without a big expense. It creates an easy
way to share files and programs. A good example of cloud usage
is the New York Times using Amazon’s cloud to offer
subscribers the ability to locate and view articles from over
seven decades.
Technology allows for better decision making. The data
compiled by companies are stored in a database and are stored
in files of relative data in an organized logical system. After the
firm creates the database, it is then converted into information
that is available to help make better decisions. For example,
before a sales employee makes his/her sales call, he/she can
simply review a customer’s profile and make a plan for success.
It is clear to see that investing has many tools that can be used
to make better choices. There are risk factors that go along with
investing. The key is to have a set goal to work toward and to
obtain your needs. Depending on where a person is in life, age
and other variables determine different needs.
Having a better understanding of computers, software, and
networks helps us in the real world. Technology aids in our
decision making processes. As discussed, technology can be
used when investing. There are many software programs that
can enhance investing decisions, as well as websites that are
used to trade stocks.
CASE STUDY
Hubway: Boston’s Online Bike-Sharing System
If you’ve ever lived in a city, you know that getting around can
be a challenge. Traffic jams, overflowing parking lots, crammed
subway cars, drivers who plow through puddles that spray water
on pedestrians—all of these may be enough to make you pack
your bags and head for the suburbs. A company in Boston is
trying to change that, using a fleet of bicycles and the Internet.
Hubway (sponsored by New Balance and operated by Alta
Bicycle Share) is Boston’s recently established bike-sharing
system that features 60 stations, 600 bicycles, and an interactive
component that allows urban consumers to borrow a bike at one
location with the swipe of a credit card—and return it to another
destination. On a Hubway bike, you can pedal to the gym or the
grocery store; commute to work; or visit a friend across town.
You can grab an available bike spur of the moment by swiping
your credit card at one of the kiosk stations, giving you a 24-
hour or three-day membership. Or you can sign up for an annual
membership online; within a week, Hubway will mail you a
station key with a printed code. The cost of membership
includes unlimited rides that are less than 30 minutes, with
additional fees for longer rides.
Hubway operates entirely in the realm of e-commerce,
marketing to consumers and conducting transactions completely
online. “There is no store or counter to get a key,” says
Hubway’s Brogan Graham, who bears the title of Hype Master.
“You put in your information online and we mail you a key.”
The touch screens at the bike stations are solar-powered,
offering access 24 hours a day, 7 days a week, meaning that
bike riders may rent a bike at any time without the assistance of
another human being. General Manager Scott Mullen points to
the efficiency of this operating system, as opposed to the
“unwieldiness” of staffing each station with a Hubway
representative, which he claims “would be a 1.0 solution to a
2.0 problem.” Customer service does exist, however. If you
cruise into a station with a flat tire or broken chain, you just hit
the red “mechanic” button, which will secure the bike without
letting someone else unwittingly take it out on the road. A
Hubway mechanic will retrieve the bike and repair it. An app
called Spot Cycle identifies the locations of different stations,
including whether or not bikes are available at a specific
station.
Hubway relies on the communication function of the Internet to
provide current information to its customers. Consumers get
station updates and marketing messages through social media
sites, such as Facebook and Twitter; for example, if a station’s
Internet connection isn’t working properly, Hubway will alert
consumers via social media—including an estimated time for
the station to go live. On its Facebook page, some Hubway
members post suggestions for improvement (like which stations
need more bikes on a regular basis) while others receive kudos
for bicycling achievements (such as the first member to reach
250,000 rides). “We leverage the Internet,” says Scott Mullen.
Hubway’s typical customers tend to be those who are the most
tech savvy about swiping credit cards at kiosks, using touch
screens, and maximizing services via the company’s website
and social media accounts. But its marketers emphasize the fact
that Hubway’s system is easy to use. Most people need only to
“use the system once to understand it because it is so intuitive,”
remarks Marketing Director Mary McLaughlin.
Whether we’re talking about e-commerce or traditional
commerce, the numbers don’t lie. Hubway began with a goal of
attracting 3,000 members and launching 100,000 rides during its
first year of business. In fact, the company hit the 100,000-ride
target in less than 11 weeks and topped 250,000 trips in 6
months. On one sample day, more than 2,500 station-to-station
rides were recorded. By year’s end, 3,700 members had signed
on. With this kind of success, Hubway has already planned
expansion into more Boston neighborhoods, as well as adjacent
towns like Cambridge and Brookline—with the near-term goal
of doubling the number of stations and increasing the number of
bikes to 1,000. Riding is “cool and fun,” says Brogan Graham.
“It’s a great way to explore a new city.”
Sources: Company website, www.thehubway.com, accessed
June 26, 2012; Eric Moskowitz, “Hubway Bike-Sharing Program
Is on a Roll,” Boston.com, June 3, 2012,
http://articles.boston.com; Jonathan Simmons, “On Biking:
Learning to Love Hubway,” Boston.com, May 22, 2012,
http://articles.boston.com.
Critical Thinking Questions
Using information from the case, answer the following
questions (1 & 2).
1. How has Hubway incorporated core e-business concepts in its
operations? (Include at least a 200-word response)
2. How has Hubway used social media platforms like Facebook
and Twitter to its advantage? (Include at least a 200-word
response)
1. Discuss the difference between criminal intelligence and
business intelligence and the difference between business
intelligence and institutional espionage.
Your response should be a minimum of 300 words in length.
2. Briefly define the various types of investigations conducted
by security and protective services and the statues that govern
the conduct of investigative agents. In your opinion, which type
of investigation is conducted the most by security and
protective service agencies in your community? Include a
detailed discussion of how you reached your conclusion.
Your response should be a minimum of 300 words in length.
General Overview
When people hear the term investigation the first thing that
comes to mind is what they saw on a dramatized crime show or
TV program. In actuality there are several types of
investigations. There are human resource investigations that
investigate issues related to employee backgrounds, workplace
violence, employment discrimination, worker compensation,
sexual harassment, sexual abuse, substance abuse, and wrongful
termination. There are also personal injury and property damage
investigations, and criminal investigations which include
undercover investigations. Another aspect of criminal
investigations is business crime investigations which involves
investigations concerning crimes committed against businesses
by employees (e.g., fraud and embezzlement), crimes committed
against businesses by outsiders (e.g., arson and robbery), and
crimes committed by individuals on behalf of businesses (e.g.,
tax evasion and commercial bribery).
Information collected in investigations is derived from various
sources which “include physical evidence, specialized
databases, victims, witnesses, suspects, records, informants, and
the Internet” (Ortmeier, 2013, p. 212). Once information is
gathered it is then analyzed. The analysis of physical evidence
is associated with forensic science and criminalistics. Such
analyses are traditionally conducted in the laboratory. DNA
testing is one of several analysis techniques used by forensic
scientists. Other techniques include psychological profiling,
anthropological strategies, forensic accounting, biology,
chemistry, ballistics testing, and many more. Every
investigation is governed by a code of conduct. Both private and
public law enforcement and security agencies are governed by
investigative statutes which govern overt and covert
investigative techniques
(e.g., the Omnibus Crime Control and Safe Streets Act of 1968
and the
Employee Polygraph Protection Act of 1988). While the fourth
amendment to the
Constitution only restricts government conduct, private and
nongovernment employees may also have an expectation of
privacy if their employers knowingly or knowingly create an
expectation of privacy among their employees.
Intelligence operations are not limited to criminal
investigations. They also include business intelligence
operations, which is also known as competitive intelligence.
This form of intelligence is designed to assist businesses in
controlling losses that result from competition. Business
intelligence is a legitimate and ethical activity. Both internal
and external sources can be accessed to obtain information
about competing organizations strategies such as sales
promotions, employee recruitment, pricing, distribution center
strategies, and advertising.
Criminal intelligence is used to protect against actual criminal
activity and possible threats of criminal activity, such as
industrial espionage. An extension of criminal intelligence is
national intelligence which focuses on collecting information
about foreign entities viewed as potential threats to the nation.
Counterespionage strategies prevent espionage using covert and
overt strategies which “involves application of appropriate
physical, personnel, and information security measures as well
as a thorough investigation of all actual intent to security
breaches” (Ortmeier, 2013, pp.220-221).
Documentation of incidents, interviews, accidents,
investigations or criminal activity is instrumental in assisting
security personnel in addressing security issues. Such
documentation is useful in the development of reports (contact,
incident, narrative, and organization – specific) which are one
of the most important outcomes associated with investigations.
To maximize the usefulness of reports, reports must be well
organized, grammatically sound, clear and concise, free of
unnecessary jargon, and include crucial information (e.g., how
the report writer was involved in the incident, details about
what happened, information about all the parties involved,
statements from the involved parties, descriptions of the scene
where the incident occurred, descriptions of evidence, damage
or theft, and any actions conducted by personnel on the scene).
There are some distinctions and exceptions to general security
management principles, and loss prevention philosophies and
practices. For example, banking and financial institutions are
susceptible to threats and loss of assets in physical and digital
environments. Funds can now be transferred electronically
without any paper trails. In addition, the types of financial
institutions are as diverse as the way funds move across these
entities. In 1968 the Bank Protection Act was passed by the
U.S. Congress to assist in reducing the vulnerability of financial
institutions. However, the act only established minimal
guidelines and is not effective in controlling technological
threats to financial assets.
High profile cases involving the murder of court personnel
walking to work and even the murder of court personnel and law
enforcement in the perceived security of their homes by
defendants in the cases they were associated with exemplifies
the need for courthouse and courtroom security. To respond to
these increase threats many courthouses and courtrooms have
increased security measures such as metal detectors, state-of-
the-art surveillance systems, security glass, secured and covered
entrances and parking decks for court personnel, and the use of
sheriff deputies as courthouse and courtroom security.
Educational institutions also require unique security
preparations. It was once believed that schools were safe havens
into which the threats from the outside world could not
penetrate. However, recent events in which children at schools
have become the victims of murder at the hands of lone gunman
and/or have died as a result of natural disasters that have
impacted schools critically exemplify the need for special
security measures at educational institutions.
Violent crime, sexual assaults, homicides, thefts, gang and drug
activity, and many other threats to institutional security exist
across all levels of education. However, the age of the students,
structure of the facilities, the number and characteristics of
staff, and the access of members of the community very across
all levels of education. Thus, different criteria must be
considered for elementary and secondary schools and colleges
and universities. Many states have created safe-school zone.
The federal government has created informational material such
as a guide entitled Threats Assessments in Schools published by
the U.S. Secret Service. Agencies have also developed
informational pages on their websites concerning school safety.
Legislation like the Crime Awareness And Campus Security Act
of 1990, also known as the Clery Act, have been established and
require post-secondary institutions to gather and post the
current crime statistics so that students, parents, faculty and
staff all were on the status of crime on their campuses. College
and university informational guides also include sections about
safety security measures available at their featured colleges and
universities.
Healthcare facilities also have unique security concerns.
Security must be maintained in order for healthcare facilities to
function. There are numerous international, federal, state, and
local requirements that mandate the provision of a secure
healthcare environment. Healthcare security covers many facets
such as facilities, personnel, equipment and supplies, service
provision, records, and mobile healthcare units.
Hospitality security, entertainment security, disaster recovery,
and executive protection are other areas which require specific
security considerations. For example, the hospitality industry
has invested significant amounts of money into making its
establishments attractive to its guests. However, in so doing
many internal controls were not established. We can all think of
people we know who have come home from a hotel with linen,
dishes, and other items that were not intended for guests take
home in their suitcases. In addition to loss of assets, the
hospitality industry is also susceptible to accidents, fires, and
natural disasters.
To respond to these unique threats to security key control, alarm
systems, security cameras, and the employment of security
personnel are usually implemented.
The entertainment industry (sporting events, recreation areas
and their components, racetracks, movies and music, ships and
boats, casinos) also has its set of unique threats to security that
are associated with the size of the venue, the openness of the
venue facilities, and the number of people that attend the
events.
Disaster recovery is a specialty area in the field of security
management that focuses on managing organization-related
disasters (damages that result from natural and environmental
disasters) to ensure that services are restored quickly and
customers are not loss due to dissatisfaction with the services
provided during disaster recovery efforts.
Lastly, protection of executives, citizens, and political leaders
is a continual challenge. Incidences of executive kidnapping
continue to increase abroad. Acts of terrorism against citizens is
on the rise in the United States, and political leaders are more at
risk of being injured or killed by gunfire during public
appearances and at their private residences. Therefore, it is
important that effective executive protection programs include
1) risk assessments that accurately identify threats, the
likelihood of the threat being realized, and assessment of the
damage that would result if the threat was realized; 2) advanced
procedures that implement security arrangements before, during,
and after the executive travels; and 3) protective operations
which involve the accompanying of the executive by executive
detection personnel who are equipped and ready to use counter
surveillance and defensive tactics to protect the executive.

More Related Content

Similar to Page 3 of 3Managing Information and Technology Finding New Wa.docx

CaseStudy m KEY TERMS behavior controls (p. 84) mobile.docx
CaseStudy m KEY TERMS behavior controls (p. 84) mobile.docxCaseStudy m KEY TERMS behavior controls (p. 84) mobile.docx
CaseStudy m KEY TERMS behavior controls (p. 84) mobile.docx
troutmanboris
 

Similar to Page 3 of 3Managing Information and Technology Finding New Wa.docx (11)

E commerce
E commerceE commerce
E commerce
 
Deep dive on digital governance
Deep dive on digital governanceDeep dive on digital governance
Deep dive on digital governance
 
ch 4.pptx
ch 4.pptxch 4.pptx
ch 4.pptx
 
Internet, wireless technologies build bridge to customer engagement
Internet, wireless technologies build bridge to customer engagementInternet, wireless technologies build bridge to customer engagement
Internet, wireless technologies build bridge to customer engagement
 
Social network enterprises - Techno Global
Social network enterprises - Techno GlobalSocial network enterprises - Techno Global
Social network enterprises - Techno Global
 
Digital Engineering: Top Three Imperatives for Banks and Financial Services C...
Digital Engineering: Top Three Imperatives for Banks and Financial Services C...Digital Engineering: Top Three Imperatives for Banks and Financial Services C...
Digital Engineering: Top Three Imperatives for Banks and Financial Services C...
 
E commerce
E commerceE commerce
E commerce
 
Custom Paper Writing Service.. Online assignment writing service.
Custom Paper Writing Service.. Online assignment writing service.Custom Paper Writing Service.. Online assignment writing service.
Custom Paper Writing Service.. Online assignment writing service.
 
CaseStudy m KEY TERMS behavior controls (p. 84) mobile.docx
CaseStudy m KEY TERMS behavior controls (p. 84) mobile.docxCaseStudy m KEY TERMS behavior controls (p. 84) mobile.docx
CaseStudy m KEY TERMS behavior controls (p. 84) mobile.docx
 
Internet marketing project_report
Internet marketing project_reportInternet marketing project_report
Internet marketing project_report
 
Cxo cockpit customer newsletter - october 2013
Cxo cockpit customer newsletter - october 2013Cxo cockpit customer newsletter - october 2013
Cxo cockpit customer newsletter - october 2013
 

More from alfred4lewis58146

For this assignment, select a human service organization from .docx
For this assignment, select a human service organization from .docxFor this assignment, select a human service organization from .docx
For this assignment, select a human service organization from .docx
alfred4lewis58146
 
For this assignment, download the A6 code pack. This zip fil.docx
For this assignment, download the A6 code pack. This zip fil.docxFor this assignment, download the A6 code pack. This zip fil.docx
For this assignment, download the A6 code pack. This zip fil.docx
alfred4lewis58146
 
For the shortanswer questions,you will need to respo.docx
For the shortanswer questions,you will need to respo.docxFor the shortanswer questions,you will need to respo.docx
For the shortanswer questions,you will need to respo.docx
alfred4lewis58146
 
For the project, you will be expected to apply the key concepts of p.docx
For the project, you will be expected to apply the key concepts of p.docxFor the project, you will be expected to apply the key concepts of p.docx
For the project, you will be expected to apply the key concepts of p.docx
alfred4lewis58146
 
For the past several weeks you have addressed several different area.docx
For the past several weeks you have addressed several different area.docxFor the past several weeks you have addressed several different area.docx
For the past several weeks you have addressed several different area.docx
alfred4lewis58146
 

More from alfred4lewis58146 (20)

For this assignment, students will need to observe the activities th.docx
For this assignment, students will need to observe the activities th.docxFor this assignment, students will need to observe the activities th.docx
For this assignment, students will need to observe the activities th.docx
 
For this assignment, select a human service organization from .docx
For this assignment, select a human service organization from .docxFor this assignment, select a human service organization from .docx
For this assignment, select a human service organization from .docx
 
For this Assignment, read the case study for Claudia and find tw.docx
For this Assignment, read the case study for Claudia and find tw.docxFor this Assignment, read the case study for Claudia and find tw.docx
For this Assignment, read the case study for Claudia and find tw.docx
 
For this assignment, download the A6 code pack. This zip fil.docx
For this assignment, download the A6 code pack. This zip fil.docxFor this assignment, download the A6 code pack. This zip fil.docx
For this assignment, download the A6 code pack. This zip fil.docx
 
For this assignment, create infographic using the Canva website..docx
For this assignment, create infographic using the Canva website..docxFor this assignment, create infographic using the Canva website..docx
For this assignment, create infographic using the Canva website..docx
 
For this assignment, compare  California during the Great Depression.docx
For this assignment, compare  California during the Great Depression.docxFor this assignment, compare  California during the Great Depression.docx
For this assignment, compare  California during the Great Depression.docx
 
For this assignment, create a 10- to 12-slide presentation in Mi.docx
For this assignment, create a 10- to 12-slide presentation in Mi.docxFor this assignment, create a 10- to 12-slide presentation in Mi.docx
For this assignment, create a 10- to 12-slide presentation in Mi.docx
 
For this assignment, begin by reading chapters 12-15 in Dr. Bells t.docx
For this assignment, begin by reading chapters 12-15 in Dr. Bells t.docxFor this assignment, begin by reading chapters 12-15 in Dr. Bells t.docx
For this assignment, begin by reading chapters 12-15 in Dr. Bells t.docx
 
For this assignment, assume you are the new Secretary of Homelan.docx
For this assignment, assume you are the new Secretary of Homelan.docxFor this assignment, assume you are the new Secretary of Homelan.docx
For this assignment, assume you are the new Secretary of Homelan.docx
 
For this assignment, address the following promptsIntroductor.docx
For this assignment, address the following promptsIntroductor.docxFor this assignment, address the following promptsIntroductor.docx
For this assignment, address the following promptsIntroductor.docx
 
For this assignment, analyze the play by focusing on one of the .docx
For this assignment, analyze the play by focusing on one of the .docxFor this assignment, analyze the play by focusing on one of the .docx
For this assignment, analyze the play by focusing on one of the .docx
 
For this assignment I would like you to answer these questions.docx
For this assignment I would like you to answer these questions.docxFor this assignment I would like you to answer these questions.docx
For this assignment I would like you to answer these questions.docx
 
For the Weekly Reports I need 2 reports. For the First two weeks the.docx
For the Weekly Reports I need 2 reports. For the First two weeks the.docxFor the Weekly Reports I need 2 reports. For the First two weeks the.docx
For the Weekly Reports I need 2 reports. For the First two weeks the.docx
 
For the shortanswer questions,you will need to respo.docx
For the shortanswer questions,you will need to respo.docxFor the shortanswer questions,you will need to respo.docx
For the shortanswer questions,you will need to respo.docx
 
For the sake of argument (this essay in particular), lets prete.docx
For the sake of argument (this essay in particular), lets prete.docxFor the sake of argument (this essay in particular), lets prete.docx
For the sake of argument (this essay in particular), lets prete.docx
 
For the proposal, each student must describe an interface they a.docx
For the proposal, each student must describe an interface they a.docxFor the proposal, each student must describe an interface they a.docx
For the proposal, each student must describe an interface they a.docx
 
For the project, you will be expected to apply the key concepts of p.docx
For the project, you will be expected to apply the key concepts of p.docxFor the project, you will be expected to apply the key concepts of p.docx
For the project, you will be expected to apply the key concepts of p.docx
 
For the past several weeks you have addressed several different area.docx
For the past several weeks you have addressed several different area.docxFor the past several weeks you have addressed several different area.docx
For the past several weeks you have addressed several different area.docx
 
For the Mash it Up assignment, we experimented with different ways t.docx
For the Mash it Up assignment, we experimented with different ways t.docxFor the Mash it Up assignment, we experimented with different ways t.docx
For the Mash it Up assignment, we experimented with different ways t.docx
 
For the first time in modern history, the world is experiencing a he.docx
For the first time in modern history, the world is experiencing a he.docxFor the first time in modern history, the world is experiencing a he.docx
For the first time in modern history, the world is experiencing a he.docx
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell Tolls
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 

Page 3 of 3Managing Information and Technology Finding New Wa.docx

  • 1. Page 3 of 3 Managing Information and Technology: Finding New Ways to Learn and Link- This chapter addresses technology and how technology is constantly changing the way we do business. To understand how technology impacts our personal and business lives, it is important to have the basic understanding of a computer, software, and networks. The computer has hardware. These are physicalcomponents used to collect, input, store, and process data to be distributed as information. Examples include hard drives, printers, keyboards, modems, and routers. Software gives the computer instructions. There are two types of software: 1. Systems software is the operating system. An example would be Microsoft Windows. 2. Application software provides the user with the desired task. Examples are Microsoft Word, Excel, and PowerPoint. In today’s world, networks are used to share information and communicate. The Internet is the largest network in the world. The World Wide Web provides information and service for business, education, and personal needs. When employees work from their home, they have access to their company’s server. This is an intranet connection that only specific employees have access to, depending on their job. The extranet is controlled by the company and limits the usage to suppliers and customers. An example would be a company that allows people to shop and buy their products. The “cloud” is a form of computing that goes beyond the
  • 2. company’s firewall to store data and run applications. The main advantage in using cloud computing is that it does not take up space on the hard drive. The cloud accesses a vast array of computing recourses without a big expense. It creates an easy way to share files and programs. A good example of cloud usage is the New York Times using Amazon’s cloud to offer subscribers the ability to locate and view articles from over seven decades. Technology allows for better decision making. The data compiled by companies are stored in a database and are stored in files of relative data in an organized logical system. After the firm creates the database, it is then converted into information that is available to help make better decisions. For example, before a sales employee makes his/her sales call, he/she can simply review a customer’s profile and make a plan for success. It is clear to see that investing has many tools that can be used to make better choices. There are risk factors that go along with investing. The key is to have a set goal to work toward and to obtain your needs. Depending on where a person is in life, age and other variables determine different needs. Having a better understanding of computers, software, and networks helps us in the real world. Technology aids in our decision making processes. As discussed, technology can be used when investing. There are many software programs that can enhance investing decisions, as well as websites that are used to trade stocks. CASE STUDY Hubway: Boston’s Online Bike-Sharing System If you’ve ever lived in a city, you know that getting around can be a challenge. Traffic jams, overflowing parking lots, crammed subway cars, drivers who plow through puddles that spray water on pedestrians—all of these may be enough to make you pack
  • 3. your bags and head for the suburbs. A company in Boston is trying to change that, using a fleet of bicycles and the Internet. Hubway (sponsored by New Balance and operated by Alta Bicycle Share) is Boston’s recently established bike-sharing system that features 60 stations, 600 bicycles, and an interactive component that allows urban consumers to borrow a bike at one location with the swipe of a credit card—and return it to another destination. On a Hubway bike, you can pedal to the gym or the grocery store; commute to work; or visit a friend across town. You can grab an available bike spur of the moment by swiping your credit card at one of the kiosk stations, giving you a 24- hour or three-day membership. Or you can sign up for an annual membership online; within a week, Hubway will mail you a station key with a printed code. The cost of membership includes unlimited rides that are less than 30 minutes, with additional fees for longer rides. Hubway operates entirely in the realm of e-commerce, marketing to consumers and conducting transactions completely online. “There is no store or counter to get a key,” says Hubway’s Brogan Graham, who bears the title of Hype Master. “You put in your information online and we mail you a key.” The touch screens at the bike stations are solar-powered, offering access 24 hours a day, 7 days a week, meaning that bike riders may rent a bike at any time without the assistance of another human being. General Manager Scott Mullen points to the efficiency of this operating system, as opposed to the “unwieldiness” of staffing each station with a Hubway representative, which he claims “would be a 1.0 solution to a 2.0 problem.” Customer service does exist, however. If you cruise into a station with a flat tire or broken chain, you just hit the red “mechanic” button, which will secure the bike without letting someone else unwittingly take it out on the road. A Hubway mechanic will retrieve the bike and repair it. An app called Spot Cycle identifies the locations of different stations,
  • 4. including whether or not bikes are available at a specific station. Hubway relies on the communication function of the Internet to provide current information to its customers. Consumers get station updates and marketing messages through social media sites, such as Facebook and Twitter; for example, if a station’s Internet connection isn’t working properly, Hubway will alert consumers via social media—including an estimated time for the station to go live. On its Facebook page, some Hubway members post suggestions for improvement (like which stations need more bikes on a regular basis) while others receive kudos for bicycling achievements (such as the first member to reach 250,000 rides). “We leverage the Internet,” says Scott Mullen. Hubway’s typical customers tend to be those who are the most tech savvy about swiping credit cards at kiosks, using touch screens, and maximizing services via the company’s website and social media accounts. But its marketers emphasize the fact that Hubway’s system is easy to use. Most people need only to “use the system once to understand it because it is so intuitive,” remarks Marketing Director Mary McLaughlin. Whether we’re talking about e-commerce or traditional commerce, the numbers don’t lie. Hubway began with a goal of attracting 3,000 members and launching 100,000 rides during its first year of business. In fact, the company hit the 100,000-ride target in less than 11 weeks and topped 250,000 trips in 6 months. On one sample day, more than 2,500 station-to-station rides were recorded. By year’s end, 3,700 members had signed on. With this kind of success, Hubway has already planned expansion into more Boston neighborhoods, as well as adjacent towns like Cambridge and Brookline—with the near-term goal of doubling the number of stations and increasing the number of bikes to 1,000. Riding is “cool and fun,” says Brogan Graham. “It’s a great way to explore a new city.”
  • 5. Sources: Company website, www.thehubway.com, accessed June 26, 2012; Eric Moskowitz, “Hubway Bike-Sharing Program Is on a Roll,” Boston.com, June 3, 2012, http://articles.boston.com; Jonathan Simmons, “On Biking: Learning to Love Hubway,” Boston.com, May 22, 2012, http://articles.boston.com. Critical Thinking Questions Using information from the case, answer the following questions (1 & 2). 1. How has Hubway incorporated core e-business concepts in its operations? (Include at least a 200-word response) 2. How has Hubway used social media platforms like Facebook and Twitter to its advantage? (Include at least a 200-word response) 1. Discuss the difference between criminal intelligence and business intelligence and the difference between business intelligence and institutional espionage. Your response should be a minimum of 300 words in length. 2. Briefly define the various types of investigations conducted by security and protective services and the statues that govern the conduct of investigative agents. In your opinion, which type of investigation is conducted the most by security and protective service agencies in your community? Include a detailed discussion of how you reached your conclusion. Your response should be a minimum of 300 words in length. General Overview When people hear the term investigation the first thing that comes to mind is what they saw on a dramatized crime show or TV program. In actuality there are several types of investigations. There are human resource investigations that
  • 6. investigate issues related to employee backgrounds, workplace violence, employment discrimination, worker compensation, sexual harassment, sexual abuse, substance abuse, and wrongful termination. There are also personal injury and property damage investigations, and criminal investigations which include undercover investigations. Another aspect of criminal investigations is business crime investigations which involves investigations concerning crimes committed against businesses by employees (e.g., fraud and embezzlement), crimes committed against businesses by outsiders (e.g., arson and robbery), and crimes committed by individuals on behalf of businesses (e.g., tax evasion and commercial bribery). Information collected in investigations is derived from various sources which “include physical evidence, specialized databases, victims, witnesses, suspects, records, informants, and the Internet” (Ortmeier, 2013, p. 212). Once information is gathered it is then analyzed. The analysis of physical evidence is associated with forensic science and criminalistics. Such analyses are traditionally conducted in the laboratory. DNA testing is one of several analysis techniques used by forensic scientists. Other techniques include psychological profiling, anthropological strategies, forensic accounting, biology, chemistry, ballistics testing, and many more. Every investigation is governed by a code of conduct. Both private and public law enforcement and security agencies are governed by investigative statutes which govern overt and covert investigative techniques (e.g., the Omnibus Crime Control and Safe Streets Act of 1968 and the Employee Polygraph Protection Act of 1988). While the fourth amendment to the Constitution only restricts government conduct, private and
  • 7. nongovernment employees may also have an expectation of privacy if their employers knowingly or knowingly create an expectation of privacy among their employees. Intelligence operations are not limited to criminal investigations. They also include business intelligence operations, which is also known as competitive intelligence. This form of intelligence is designed to assist businesses in controlling losses that result from competition. Business intelligence is a legitimate and ethical activity. Both internal and external sources can be accessed to obtain information about competing organizations strategies such as sales promotions, employee recruitment, pricing, distribution center strategies, and advertising. Criminal intelligence is used to protect against actual criminal activity and possible threats of criminal activity, such as industrial espionage. An extension of criminal intelligence is national intelligence which focuses on collecting information about foreign entities viewed as potential threats to the nation. Counterespionage strategies prevent espionage using covert and overt strategies which “involves application of appropriate physical, personnel, and information security measures as well as a thorough investigation of all actual intent to security breaches” (Ortmeier, 2013, pp.220-221). Documentation of incidents, interviews, accidents, investigations or criminal activity is instrumental in assisting security personnel in addressing security issues. Such documentation is useful in the development of reports (contact, incident, narrative, and organization – specific) which are one of the most important outcomes associated with investigations. To maximize the usefulness of reports, reports must be well organized, grammatically sound, clear and concise, free of unnecessary jargon, and include crucial information (e.g., how the report writer was involved in the incident, details about
  • 8. what happened, information about all the parties involved, statements from the involved parties, descriptions of the scene where the incident occurred, descriptions of evidence, damage or theft, and any actions conducted by personnel on the scene). There are some distinctions and exceptions to general security management principles, and loss prevention philosophies and practices. For example, banking and financial institutions are susceptible to threats and loss of assets in physical and digital environments. Funds can now be transferred electronically without any paper trails. In addition, the types of financial institutions are as diverse as the way funds move across these entities. In 1968 the Bank Protection Act was passed by the U.S. Congress to assist in reducing the vulnerability of financial institutions. However, the act only established minimal guidelines and is not effective in controlling technological threats to financial assets. High profile cases involving the murder of court personnel walking to work and even the murder of court personnel and law enforcement in the perceived security of their homes by defendants in the cases they were associated with exemplifies the need for courthouse and courtroom security. To respond to these increase threats many courthouses and courtrooms have increased security measures such as metal detectors, state-of- the-art surveillance systems, security glass, secured and covered entrances and parking decks for court personnel, and the use of sheriff deputies as courthouse and courtroom security. Educational institutions also require unique security preparations. It was once believed that schools were safe havens into which the threats from the outside world could not penetrate. However, recent events in which children at schools have become the victims of murder at the hands of lone gunman and/or have died as a result of natural disasters that have impacted schools critically exemplify the need for special
  • 9. security measures at educational institutions. Violent crime, sexual assaults, homicides, thefts, gang and drug activity, and many other threats to institutional security exist across all levels of education. However, the age of the students, structure of the facilities, the number and characteristics of staff, and the access of members of the community very across all levels of education. Thus, different criteria must be considered for elementary and secondary schools and colleges and universities. Many states have created safe-school zone. The federal government has created informational material such as a guide entitled Threats Assessments in Schools published by the U.S. Secret Service. Agencies have also developed informational pages on their websites concerning school safety. Legislation like the Crime Awareness And Campus Security Act of 1990, also known as the Clery Act, have been established and require post-secondary institutions to gather and post the current crime statistics so that students, parents, faculty and staff all were on the status of crime on their campuses. College and university informational guides also include sections about safety security measures available at their featured colleges and universities. Healthcare facilities also have unique security concerns. Security must be maintained in order for healthcare facilities to function. There are numerous international, federal, state, and local requirements that mandate the provision of a secure healthcare environment. Healthcare security covers many facets such as facilities, personnel, equipment and supplies, service provision, records, and mobile healthcare units. Hospitality security, entertainment security, disaster recovery, and executive protection are other areas which require specific security considerations. For example, the hospitality industry has invested significant amounts of money into making its establishments attractive to its guests. However, in so doing
  • 10. many internal controls were not established. We can all think of people we know who have come home from a hotel with linen, dishes, and other items that were not intended for guests take home in their suitcases. In addition to loss of assets, the hospitality industry is also susceptible to accidents, fires, and natural disasters. To respond to these unique threats to security key control, alarm systems, security cameras, and the employment of security personnel are usually implemented. The entertainment industry (sporting events, recreation areas and their components, racetracks, movies and music, ships and boats, casinos) also has its set of unique threats to security that are associated with the size of the venue, the openness of the venue facilities, and the number of people that attend the events. Disaster recovery is a specialty area in the field of security management that focuses on managing organization-related disasters (damages that result from natural and environmental disasters) to ensure that services are restored quickly and customers are not loss due to dissatisfaction with the services provided during disaster recovery efforts. Lastly, protection of executives, citizens, and political leaders is a continual challenge. Incidences of executive kidnapping continue to increase abroad. Acts of terrorism against citizens is on the rise in the United States, and political leaders are more at risk of being injured or killed by gunfire during public appearances and at their private residences. Therefore, it is important that effective executive protection programs include 1) risk assessments that accurately identify threats, the likelihood of the threat being realized, and assessment of the damage that would result if the threat was realized; 2) advanced procedures that implement security arrangements before, during,
  • 11. and after the executive travels; and 3) protective operations which involve the accompanying of the executive by executive detection personnel who are equipped and ready to use counter surveillance and defensive tactics to protect the executive.