Page 3 of 3
Managing Information and Technology: Finding New Ways to Learn and Link-
This chapter addresses technology and how technology is constantly changing the way we do business. To understand how technology impacts our personal and business lives, it is important to have the basic understanding of a computer, software, and networks. The computer has hardware. These are physicalcomponents used to collect, input, store, and process data to be distributed as information. Examples include hard drives, printers, keyboards, modems, and routers.
Software gives the computer instructions. There are two types of software:
1. Systems software is the operating system. An example would be Microsoft Windows.
2. Application software provides the user with the desired task. Examples are Microsoft Word, Excel, and PowerPoint.
In today’s world, networks are used to share information and communicate. The Internet is the largest network in the world. The World Wide Web provides information and service for business, education, and personal needs. When employees work from their home, they have access to their company’s server. This is an intranet connection that only specific employees have access to, depending on their job. The extranet is controlled by the company and limits the usage to suppliers and customers. An example would be a company that allows people to shop and buy their products.
The “cloud” is a form of computing that goes beyond the company’s firewall to store data and run applications. The main advantage in using cloud computing is that it does not take up space on the hard drive. The cloud accesses a vast array of computing recourses without a big expense. It creates an easy way to share files and programs. A good example of cloud usage is the New York Times using Amazon’s cloud to offer subscribers the ability to locate and view articles from over seven decades.
Technology allows for better decision making. The data compiled by companies are stored in a database and are stored in files of relative data in an organized logical system. After the firm creates the database, it is then converted into information that is available to help make better decisions. For example, before a sales employee makes his/her sales call, he/she can simply review a customer’s profile and make a plan for success.
It is clear to see that investing has many tools that can be used to make better choices. There are risk factors that go along with investing. The key is to have a set goal to work toward and to obtain your needs. Depending on where a person is in life, age and other variables determine different needs.
Having a better understanding of computers, software, and networks helps us in the real world. Technology aids in our decision making processes. As discussed, technology can be used when investing. There are many software programs that can enhance investing decisions, as well as websites that are used to trade stocks.
CASE STUDY
Hubway: B.
Page 3 of 3Managing Information and Technology Finding New Wa.docx
1. Page 3 of 3
Managing Information and Technology: Finding New Ways to
Learn and Link-
This chapter addresses technology and how technology is
constantly changing the way we do business. To understand how
technology impacts our personal and business lives, it is
important to have the basic understanding of a computer,
software, and networks. The computer has hardware. These are
physicalcomponents used to collect, input, store, and process
data to be distributed as information. Examples include hard
drives, printers, keyboards, modems, and routers.
Software gives the computer instructions. There are two types
of software:
1. Systems software is the operating system. An example would
be Microsoft Windows.
2. Application software provides the user with the desired task.
Examples are Microsoft Word, Excel, and PowerPoint.
In today’s world, networks are used to share information and
communicate. The Internet is the largest network in the world.
The World Wide Web provides information and service for
business, education, and personal needs. When employees work
from their home, they have access to their company’s server.
This is an intranet connection that only specific employees have
access to, depending on their job. The extranet is controlled by
the company and limits the usage to suppliers and customers.
An example would be a company that allows people to shop and
buy their products.
The “cloud” is a form of computing that goes beyond the
2. company’s firewall to store data and run applications. The main
advantage in using cloud computing is that it does not take up
space on the hard drive. The cloud accesses a vast array of
computing recourses without a big expense. It creates an easy
way to share files and programs. A good example of cloud usage
is the New York Times using Amazon’s cloud to offer
subscribers the ability to locate and view articles from over
seven decades.
Technology allows for better decision making. The data
compiled by companies are stored in a database and are stored
in files of relative data in an organized logical system. After the
firm creates the database, it is then converted into information
that is available to help make better decisions. For example,
before a sales employee makes his/her sales call, he/she can
simply review a customer’s profile and make a plan for success.
It is clear to see that investing has many tools that can be used
to make better choices. There are risk factors that go along with
investing. The key is to have a set goal to work toward and to
obtain your needs. Depending on where a person is in life, age
and other variables determine different needs.
Having a better understanding of computers, software, and
networks helps us in the real world. Technology aids in our
decision making processes. As discussed, technology can be
used when investing. There are many software programs that
can enhance investing decisions, as well as websites that are
used to trade stocks.
CASE STUDY
Hubway: Boston’s Online Bike-Sharing System
If you’ve ever lived in a city, you know that getting around can
be a challenge. Traffic jams, overflowing parking lots, crammed
subway cars, drivers who plow through puddles that spray water
on pedestrians—all of these may be enough to make you pack
3. your bags and head for the suburbs. A company in Boston is
trying to change that, using a fleet of bicycles and the Internet.
Hubway (sponsored by New Balance and operated by Alta
Bicycle Share) is Boston’s recently established bike-sharing
system that features 60 stations, 600 bicycles, and an interactive
component that allows urban consumers to borrow a bike at one
location with the swipe of a credit card—and return it to another
destination. On a Hubway bike, you can pedal to the gym or the
grocery store; commute to work; or visit a friend across town.
You can grab an available bike spur of the moment by swiping
your credit card at one of the kiosk stations, giving you a 24-
hour or three-day membership. Or you can sign up for an annual
membership online; within a week, Hubway will mail you a
station key with a printed code. The cost of membership
includes unlimited rides that are less than 30 minutes, with
additional fees for longer rides.
Hubway operates entirely in the realm of e-commerce,
marketing to consumers and conducting transactions completely
online. “There is no store or counter to get a key,” says
Hubway’s Brogan Graham, who bears the title of Hype Master.
“You put in your information online and we mail you a key.”
The touch screens at the bike stations are solar-powered,
offering access 24 hours a day, 7 days a week, meaning that
bike riders may rent a bike at any time without the assistance of
another human being. General Manager Scott Mullen points to
the efficiency of this operating system, as opposed to the
“unwieldiness” of staffing each station with a Hubway
representative, which he claims “would be a 1.0 solution to a
2.0 problem.” Customer service does exist, however. If you
cruise into a station with a flat tire or broken chain, you just hit
the red “mechanic” button, which will secure the bike without
letting someone else unwittingly take it out on the road. A
Hubway mechanic will retrieve the bike and repair it. An app
called Spot Cycle identifies the locations of different stations,
4. including whether or not bikes are available at a specific
station.
Hubway relies on the communication function of the Internet to
provide current information to its customers. Consumers get
station updates and marketing messages through social media
sites, such as Facebook and Twitter; for example, if a station’s
Internet connection isn’t working properly, Hubway will alert
consumers via social media—including an estimated time for
the station to go live. On its Facebook page, some Hubway
members post suggestions for improvement (like which stations
need more bikes on a regular basis) while others receive kudos
for bicycling achievements (such as the first member to reach
250,000 rides). “We leverage the Internet,” says Scott Mullen.
Hubway’s typical customers tend to be those who are the most
tech savvy about swiping credit cards at kiosks, using touch
screens, and maximizing services via the company’s website
and social media accounts. But its marketers emphasize the fact
that Hubway’s system is easy to use. Most people need only to
“use the system once to understand it because it is so intuitive,”
remarks Marketing Director Mary McLaughlin.
Whether we’re talking about e-commerce or traditional
commerce, the numbers don’t lie. Hubway began with a goal of
attracting 3,000 members and launching 100,000 rides during its
first year of business. In fact, the company hit the 100,000-ride
target in less than 11 weeks and topped 250,000 trips in 6
months. On one sample day, more than 2,500 station-to-station
rides were recorded. By year’s end, 3,700 members had signed
on. With this kind of success, Hubway has already planned
expansion into more Boston neighborhoods, as well as adjacent
towns like Cambridge and Brookline—with the near-term goal
of doubling the number of stations and increasing the number of
bikes to 1,000. Riding is “cool and fun,” says Brogan Graham.
“It’s a great way to explore a new city.”
5. Sources: Company website, www.thehubway.com, accessed
June 26, 2012; Eric Moskowitz, “Hubway Bike-Sharing Program
Is on a Roll,” Boston.com, June 3, 2012,
http://articles.boston.com; Jonathan Simmons, “On Biking:
Learning to Love Hubway,” Boston.com, May 22, 2012,
http://articles.boston.com.
Critical Thinking Questions
Using information from the case, answer the following
questions (1 & 2).
1. How has Hubway incorporated core e-business concepts in its
operations? (Include at least a 200-word response)
2. How has Hubway used social media platforms like Facebook
and Twitter to its advantage? (Include at least a 200-word
response)
1. Discuss the difference between criminal intelligence and
business intelligence and the difference between business
intelligence and institutional espionage.
Your response should be a minimum of 300 words in length.
2. Briefly define the various types of investigations conducted
by security and protective services and the statues that govern
the conduct of investigative agents. In your opinion, which type
of investigation is conducted the most by security and
protective service agencies in your community? Include a
detailed discussion of how you reached your conclusion.
Your response should be a minimum of 300 words in length.
General Overview
When people hear the term investigation the first thing that
comes to mind is what they saw on a dramatized crime show or
TV program. In actuality there are several types of
investigations. There are human resource investigations that
6. investigate issues related to employee backgrounds, workplace
violence, employment discrimination, worker compensation,
sexual harassment, sexual abuse, substance abuse, and wrongful
termination. There are also personal injury and property damage
investigations, and criminal investigations which include
undercover investigations. Another aspect of criminal
investigations is business crime investigations which involves
investigations concerning crimes committed against businesses
by employees (e.g., fraud and embezzlement), crimes committed
against businesses by outsiders (e.g., arson and robbery), and
crimes committed by individuals on behalf of businesses (e.g.,
tax evasion and commercial bribery).
Information collected in investigations is derived from various
sources which “include physical evidence, specialized
databases, victims, witnesses, suspects, records, informants, and
the Internet” (Ortmeier, 2013, p. 212). Once information is
gathered it is then analyzed. The analysis of physical evidence
is associated with forensic science and criminalistics. Such
analyses are traditionally conducted in the laboratory. DNA
testing is one of several analysis techniques used by forensic
scientists. Other techniques include psychological profiling,
anthropological strategies, forensic accounting, biology,
chemistry, ballistics testing, and many more. Every
investigation is governed by a code of conduct. Both private and
public law enforcement and security agencies are governed by
investigative statutes which govern overt and covert
investigative techniques
(e.g., the Omnibus Crime Control and Safe Streets Act of 1968
and the
Employee Polygraph Protection Act of 1988). While the fourth
amendment to the
Constitution only restricts government conduct, private and
7. nongovernment employees may also have an expectation of
privacy if their employers knowingly or knowingly create an
expectation of privacy among their employees.
Intelligence operations are not limited to criminal
investigations. They also include business intelligence
operations, which is also known as competitive intelligence.
This form of intelligence is designed to assist businesses in
controlling losses that result from competition. Business
intelligence is a legitimate and ethical activity. Both internal
and external sources can be accessed to obtain information
about competing organizations strategies such as sales
promotions, employee recruitment, pricing, distribution center
strategies, and advertising.
Criminal intelligence is used to protect against actual criminal
activity and possible threats of criminal activity, such as
industrial espionage. An extension of criminal intelligence is
national intelligence which focuses on collecting information
about foreign entities viewed as potential threats to the nation.
Counterespionage strategies prevent espionage using covert and
overt strategies which “involves application of appropriate
physical, personnel, and information security measures as well
as a thorough investigation of all actual intent to security
breaches” (Ortmeier, 2013, pp.220-221).
Documentation of incidents, interviews, accidents,
investigations or criminal activity is instrumental in assisting
security personnel in addressing security issues. Such
documentation is useful in the development of reports (contact,
incident, narrative, and organization – specific) which are one
of the most important outcomes associated with investigations.
To maximize the usefulness of reports, reports must be well
organized, grammatically sound, clear and concise, free of
unnecessary jargon, and include crucial information (e.g., how
the report writer was involved in the incident, details about
8. what happened, information about all the parties involved,
statements from the involved parties, descriptions of the scene
where the incident occurred, descriptions of evidence, damage
or theft, and any actions conducted by personnel on the scene).
There are some distinctions and exceptions to general security
management principles, and loss prevention philosophies and
practices. For example, banking and financial institutions are
susceptible to threats and loss of assets in physical and digital
environments. Funds can now be transferred electronically
without any paper trails. In addition, the types of financial
institutions are as diverse as the way funds move across these
entities. In 1968 the Bank Protection Act was passed by the
U.S. Congress to assist in reducing the vulnerability of financial
institutions. However, the act only established minimal
guidelines and is not effective in controlling technological
threats to financial assets.
High profile cases involving the murder of court personnel
walking to work and even the murder of court personnel and law
enforcement in the perceived security of their homes by
defendants in the cases they were associated with exemplifies
the need for courthouse and courtroom security. To respond to
these increase threats many courthouses and courtrooms have
increased security measures such as metal detectors, state-of-
the-art surveillance systems, security glass, secured and covered
entrances and parking decks for court personnel, and the use of
sheriff deputies as courthouse and courtroom security.
Educational institutions also require unique security
preparations. It was once believed that schools were safe havens
into which the threats from the outside world could not
penetrate. However, recent events in which children at schools
have become the victims of murder at the hands of lone gunman
and/or have died as a result of natural disasters that have
impacted schools critically exemplify the need for special
9. security measures at educational institutions.
Violent crime, sexual assaults, homicides, thefts, gang and drug
activity, and many other threats to institutional security exist
across all levels of education. However, the age of the students,
structure of the facilities, the number and characteristics of
staff, and the access of members of the community very across
all levels of education. Thus, different criteria must be
considered for elementary and secondary schools and colleges
and universities. Many states have created safe-school zone.
The federal government has created informational material such
as a guide entitled Threats Assessments in Schools published by
the U.S. Secret Service. Agencies have also developed
informational pages on their websites concerning school safety.
Legislation like the Crime Awareness And Campus Security Act
of 1990, also known as the Clery Act, have been established and
require post-secondary institutions to gather and post the
current crime statistics so that students, parents, faculty and
staff all were on the status of crime on their campuses. College
and university informational guides also include sections about
safety security measures available at their featured colleges and
universities.
Healthcare facilities also have unique security concerns.
Security must be maintained in order for healthcare facilities to
function. There are numerous international, federal, state, and
local requirements that mandate the provision of a secure
healthcare environment. Healthcare security covers many facets
such as facilities, personnel, equipment and supplies, service
provision, records, and mobile healthcare units.
Hospitality security, entertainment security, disaster recovery,
and executive protection are other areas which require specific
security considerations. For example, the hospitality industry
has invested significant amounts of money into making its
establishments attractive to its guests. However, in so doing
10. many internal controls were not established. We can all think of
people we know who have come home from a hotel with linen,
dishes, and other items that were not intended for guests take
home in their suitcases. In addition to loss of assets, the
hospitality industry is also susceptible to accidents, fires, and
natural disasters.
To respond to these unique threats to security key control, alarm
systems, security cameras, and the employment of security
personnel are usually implemented.
The entertainment industry (sporting events, recreation areas
and their components, racetracks, movies and music, ships and
boats, casinos) also has its set of unique threats to security that
are associated with the size of the venue, the openness of the
venue facilities, and the number of people that attend the
events.
Disaster recovery is a specialty area in the field of security
management that focuses on managing organization-related
disasters (damages that result from natural and environmental
disasters) to ensure that services are restored quickly and
customers are not loss due to dissatisfaction with the services
provided during disaster recovery efforts.
Lastly, protection of executives, citizens, and political leaders
is a continual challenge. Incidences of executive kidnapping
continue to increase abroad. Acts of terrorism against citizens is
on the rise in the United States, and political leaders are more at
risk of being injured or killed by gunfire during public
appearances and at their private residences. Therefore, it is
important that effective executive protection programs include
1) risk assessments that accurately identify threats, the
likelihood of the threat being realized, and assessment of the
damage that would result if the threat was realized; 2) advanced
procedures that implement security arrangements before, during,
11. and after the executive travels; and 3) protective operations
which involve the accompanying of the executive by executive
detection personnel who are equipped and ready to use counter
surveillance and defensive tactics to protect the executive.