SlideShare a Scribd company logo
Week 13 –Technology Dependence
 MIS5001: Management Information Systems

          PROF. STEVEN L. JOHNSON
            Twitter: @StevenLJohnson
             http://stevenljohnson.org
Today’s Agenda

 Announcements
   Group presentations

   IT Awards

   Final exam

 Case Discussion


 Blog and Reading Discussion
 Project Work Time
Exam Review: Format

 Exam topic review to be distributed next week.
 Take-home: Tues. May 8.
   5PM posted to class website, 8PM due via email

 Open-note: no outside assistance or Internet assistance
 4 short answer questions
   Multiple bullet point answer or up to 1 paragraph answer
   ~ 60% of grade (4 x 15% each)
   Example: “What are 3 examples of a good time to fly a kite? What are 3
     times when it is a bad idea?”
 1 essay question
   pick from 2 or 3 choices
   multi-part question or more involved question; multi-paragraph answer
     required
   ~ 40% of grade
   Example: “Yahoo! is losing money on email data storage. They want your
     advice: should they start charging users for email? Why or why not? “
Case Study Discussion

 Describe the security breach experienced by Sunnylake. Why do
  you think this breach occurred? What would you have done to
  prevent it?
 What do you think Sunnylake should do now? Would you make
  the same recommendation to your manager if all of your office
  was locked out of its computer systems?
 What was the underlying cause of the collapse of the CareGroup
  system?
 Does the reason a network fails change the nature of the
  response? For example, in what ways is Sunnylake’s response
  helped or hindered by receiving a ransom notice? Do you think
  CareGroup would have reaction differently if they had
  coincidently received a threatening message?
100-Second Reflection

1. What was your favorite case study of the year?
   Why?
2. What was your least favorite case study of the year?
   Why?
3. Any other questions or comments?


    Google, STARS, Cisco, Volkswagen, Apple /
     Amazon eReading, Kodak
    TopCoder, Been Googled, Cognizant, Wyeth,
     Hackers / CareGroup
Blog and Reading Recap

 Personal backup and disaster recovery


 Incident management in the age of compliance
   Prevention – Detection – Response

   “...being prepared for incidents via an incident response plan is
    likely to be one of the most cost-effective security measures an
    organization takes”
   Legal requirements for response
For More Information

         PROF. STEVEN L. JOHNSON
            EMAIL: STEVEN@TEMPLE.EDU
             Twitter: @StevenLJohnson
              http://stevenljohnson.org


http://community.mis.temple.edu/mis5001fall10johnson/

More Related Content

Viewers also liked

Technology adoption
Technology adoptionTechnology adoption
Technology adoption17somya
 
Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)
Pew Research Center's Internet & American Life Project
 
Technology absorption & diffusion
Technology absorption & diffusionTechnology absorption & diffusion
Technology absorption & diffusion
VijayKrKhurana
 
Baby Boomers and Digital Technology
Baby Boomers and Digital TechnologyBaby Boomers and Digital Technology
Baby Boomers and Digital Technology
Pew Research Center's Internet & American Life Project
 
Technology+forecasting
Technology+forecastingTechnology+forecasting
Technology+forecastingshitalbharti20
 
Lecture 5 - Technology diffusion and technology transfer
Lecture 5 - Technology diffusion and technology transferLecture 5 - Technology diffusion and technology transfer
Lecture 5 - Technology diffusion and technology transferUNU.MERIT
 
TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...
TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...
TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...
Hansa Edirisinghe
 
Methods or Techniques of Technology Forecasting
Methods or Techniques of Technology ForecastingMethods or Techniques of Technology Forecasting
Methods or Techniques of Technology ForecastingHarinadh Karimikonda
 

Viewers also liked (8)

Technology adoption
Technology adoptionTechnology adoption
Technology adoption
 
Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)
 
Technology absorption & diffusion
Technology absorption & diffusionTechnology absorption & diffusion
Technology absorption & diffusion
 
Baby Boomers and Digital Technology
Baby Boomers and Digital TechnologyBaby Boomers and Digital Technology
Baby Boomers and Digital Technology
 
Technology+forecasting
Technology+forecastingTechnology+forecasting
Technology+forecasting
 
Lecture 5 - Technology diffusion and technology transfer
Lecture 5 - Technology diffusion and technology transferLecture 5 - Technology diffusion and technology transfer
Lecture 5 - Technology diffusion and technology transfer
 
TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...
TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...
TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...
 
Methods or Techniques of Technology Forecasting
Methods or Techniques of Technology ForecastingMethods or Techniques of Technology Forecasting
Methods or Techniques of Technology Forecasting
 

Similar to Week 12 - Technology Dependence

MIS5101 Week 13 Security Privacy Data Mining
MIS5101 Week 13 Security Privacy Data MiningMIS5101 Week 13 Security Privacy Data Mining
MIS5101 Week 13 Security Privacy Data Mining
Steven Johnson
 
Decoding Culture: Beyond the Fluff and Back to Business
Decoding Culture: Beyond the Fluff and Back to BusinessDecoding Culture: Beyond the Fluff and Back to Business
Decoding Culture: Beyond the Fluff and Back to Business
Jeff Gallimore
 
NM TIE Presentation on PD Ecosystems
NM TIE Presentation on PD EcosystemsNM TIE Presentation on PD Ecosystems
NM TIE Presentation on PD Ecosystems
Julia Parra
 
Tech Support Is Reference
Tech Support Is ReferenceTech Support Is Reference
Tech Support Is Reference
Mary Kelly
 
MIS5001 Week 7 Intro to BI
MIS5001 Week 7 Intro to BIMIS5001 Week 7 Intro to BI
MIS5001 Week 7 Intro to BI
Steven Johnson
 
Tin Can Learning Design – Andrew Downes
Tin Can Learning Design – Andrew DownesTin Can Learning Design – Andrew Downes
Tin Can Learning Design – Andrew Downes
Epic
 
Prepared by Assoc. Prof. Nalin Sharda Moderated by Dr. .docx
Prepared by Assoc. Prof. Nalin Sharda    Moderated by Dr. .docxPrepared by Assoc. Prof. Nalin Sharda    Moderated by Dr. .docx
Prepared by Assoc. Prof. Nalin Sharda Moderated by Dr. .docx
harrisonhoward80223
 
How to become a better listener | Talent Connect 2016
How to become a better listener | Talent Connect 2016How to become a better listener | Talent Connect 2016
How to become a better listener | Talent Connect 2016
LinkedIn Talent Solutions
 
Integrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS EducationIntegrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS Education
Greg Friese
 
Week 5 Enterprise Priority Setting
Week 5 Enterprise Priority SettingWeek 5 Enterprise Priority Setting
Week 5 Enterprise Priority Setting
Steven Johnson
 
Student well-being discussion document
Student well-being discussion documentStudent well-being discussion document
Student well-being discussion document
Mark Kehoe
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
Walmart Super Center
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
Walmart Super Center
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
Walmart Super Center
 
Dean R Berry Coping with Information Overload
Dean R Berry Coping with Information OverloadDean R Berry Coping with Information Overload
Dean R Berry Coping with Information Overload
Riverside County Office of Education
 
e-learning Reality Check: Keynote Durham University 2009
e-learning Reality Check: Keynote Durham University 2009e-learning Reality Check: Keynote Durham University 2009
e-learning Reality Check: Keynote Durham University 2009andyramsden
 
Presentation Learning Tree
Presentation Learning TreePresentation Learning Tree
Presentation Learning Tree
Karl Kapp
 
Plagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesPlagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front Lines
Turnitin User Experience Team
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Beth Sallay
 

Similar to Week 12 - Technology Dependence (20)

MIS5101 Week 13 Security Privacy Data Mining
MIS5101 Week 13 Security Privacy Data MiningMIS5101 Week 13 Security Privacy Data Mining
MIS5101 Week 13 Security Privacy Data Mining
 
Decoding Culture: Beyond the Fluff and Back to Business
Decoding Culture: Beyond the Fluff and Back to BusinessDecoding Culture: Beyond the Fluff and Back to Business
Decoding Culture: Beyond the Fluff and Back to Business
 
NM TIE Presentation on PD Ecosystems
NM TIE Presentation on PD EcosystemsNM TIE Presentation on PD Ecosystems
NM TIE Presentation on PD Ecosystems
 
Tech Support Is Reference
Tech Support Is ReferenceTech Support Is Reference
Tech Support Is Reference
 
MIS5001 Week 7 Intro to BI
MIS5001 Week 7 Intro to BIMIS5001 Week 7 Intro to BI
MIS5001 Week 7 Intro to BI
 
Tin Can Learning Design – Andrew Downes
Tin Can Learning Design – Andrew DownesTin Can Learning Design – Andrew Downes
Tin Can Learning Design – Andrew Downes
 
Prepared by Assoc. Prof. Nalin Sharda Moderated by Dr. .docx
Prepared by Assoc. Prof. Nalin Sharda    Moderated by Dr. .docxPrepared by Assoc. Prof. Nalin Sharda    Moderated by Dr. .docx
Prepared by Assoc. Prof. Nalin Sharda Moderated by Dr. .docx
 
How to become a better listener | Talent Connect 2016
How to become a better listener | Talent Connect 2016How to become a better listener | Talent Connect 2016
How to become a better listener | Talent Connect 2016
 
Integrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS EducationIntegrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS Education
 
Week 5 Enterprise Priority Setting
Week 5 Enterprise Priority SettingWeek 5 Enterprise Priority Setting
Week 5 Enterprise Priority Setting
 
LP3.docx
LP3.docxLP3.docx
LP3.docx
 
Student well-being discussion document
Student well-being discussion documentStudent well-being discussion document
Student well-being discussion document
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
 
Dean R Berry Coping with Information Overload
Dean R Berry Coping with Information OverloadDean R Berry Coping with Information Overload
Dean R Berry Coping with Information Overload
 
e-learning Reality Check: Keynote Durham University 2009
e-learning Reality Check: Keynote Durham University 2009e-learning Reality Check: Keynote Durham University 2009
e-learning Reality Check: Keynote Durham University 2009
 
Presentation Learning Tree
Presentation Learning TreePresentation Learning Tree
Presentation Learning Tree
 
Plagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesPlagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front Lines
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
 

More from Steven Johnson

Brief observations on social media
Brief observations on social media Brief observations on social media
Brief observations on social media
Steven Johnson
 
Week 11 - Globalization
Week 11 - GlobalizationWeek 11 - Globalization
Week 11 - Globalization
Steven Johnson
 
Week 10 Knowledge Management
Week 10 Knowledge ManagementWeek 10 Knowledge Management
Week 10 Knowledge Management
Steven Johnson
 
Week 9 - Drowning in Data
Week 9 - Drowning in DataWeek 9 - Drowning in Data
Week 9 - Drowning in Data
Steven Johnson
 
Week 8 - Crowdsourcing
Week 8  - CrowdsourcingWeek 8  - Crowdsourcing
Week 8 - Crowdsourcing
Steven Johnson
 
Week 7 - Digital Disruption
Week 7 - Digital DisruptionWeek 7 - Digital Disruption
Week 7 - Digital Disruption
Steven Johnson
 
Week 6 - Technology Innovation
Week 6 - Technology InnovationWeek 6 - Technology Innovation
Week 6 - Technology Innovation
Steven Johnson
 
IT Management Week 4 - Enterprise Applications
IT Management Week 4 - Enterprise ApplicationsIT Management Week 4 - Enterprise Applications
IT Management Week 4 - Enterprise Applications
Steven Johnson
 
Week 3 - Systems Thinking
Week 3 - Systems ThinkingWeek 3 - Systems Thinking
Week 3 - Systems Thinking
Steven Johnson
 
Week 2 MIS5001 Information Technology Management
Week 2 MIS5001 Information Technology ManagementWeek 2 MIS5001 Information Technology Management
Week 2 MIS5001 Information Technology Management
Steven Johnson
 
Week 1 of MIS5001: Information Technology Management
Week 1 of MIS5001: Information Technology ManagementWeek 1 of MIS5001: Information Technology Management
Week 1 of MIS5001: Information Technology Management
Steven Johnson
 
WordCamp Philly 2011: Gamification for a Funtastic User Experience
WordCamp Philly 2011: Gamification for a Funtastic User ExperienceWordCamp Philly 2011: Gamification for a Funtastic User Experience
WordCamp Philly 2011: Gamification for a Funtastic User Experience
Steven Johnson
 
Successful Social Media for Non-Profits
Successful Social Media for Non-ProfitsSuccessful Social Media for Non-Profits
Successful Social Media for Non-Profits
Steven Johnson
 
MIS5001 Week 12 Technology Innovation
MIS5001 Week 12 Technology InnovationMIS5001 Week 12 Technology Innovation
MIS5001 Week 12 Technology Innovation
Steven Johnson
 
Week 11 Drowning in Data
Week 11 Drowning in DataWeek 11 Drowning in Data
Week 11 Drowning in Data
Steven Johnson
 
MIS5001 week 10 Crowdsourcing
MIS5001 week 10 CrowdsourcingMIS5001 week 10 Crowdsourcing
MIS5001 week 10 Crowdsourcing
Steven Johnson
 
MIS5101 WK10 Outcome Measures
MIS5101 WK10 Outcome MeasuresMIS5101 WK10 Outcome Measures
MIS5101 WK10 Outcome Measures
Steven Johnson
 
MIS5001 Week 9 Globalization
MIS5001 Week 9  GlobalizationMIS5001 Week 9  Globalization
MIS5001 Week 9 Globalization
Steven Johnson
 
MIS5001 Week 9 Globalization
MIS5001 Week 9  GlobalizationMIS5001 Week 9  Globalization
MIS5001 Week 9 Globalization
Steven Johnson
 

More from Steven Johnson (20)

Brief observations on social media
Brief observations on social media Brief observations on social media
Brief observations on social media
 
30 Nov 2012
30 Nov 201230 Nov 2012
30 Nov 2012
 
Week 11 - Globalization
Week 11 - GlobalizationWeek 11 - Globalization
Week 11 - Globalization
 
Week 10 Knowledge Management
Week 10 Knowledge ManagementWeek 10 Knowledge Management
Week 10 Knowledge Management
 
Week 9 - Drowning in Data
Week 9 - Drowning in DataWeek 9 - Drowning in Data
Week 9 - Drowning in Data
 
Week 8 - Crowdsourcing
Week 8  - CrowdsourcingWeek 8  - Crowdsourcing
Week 8 - Crowdsourcing
 
Week 7 - Digital Disruption
Week 7 - Digital DisruptionWeek 7 - Digital Disruption
Week 7 - Digital Disruption
 
Week 6 - Technology Innovation
Week 6 - Technology InnovationWeek 6 - Technology Innovation
Week 6 - Technology Innovation
 
IT Management Week 4 - Enterprise Applications
IT Management Week 4 - Enterprise ApplicationsIT Management Week 4 - Enterprise Applications
IT Management Week 4 - Enterprise Applications
 
Week 3 - Systems Thinking
Week 3 - Systems ThinkingWeek 3 - Systems Thinking
Week 3 - Systems Thinking
 
Week 2 MIS5001 Information Technology Management
Week 2 MIS5001 Information Technology ManagementWeek 2 MIS5001 Information Technology Management
Week 2 MIS5001 Information Technology Management
 
Week 1 of MIS5001: Information Technology Management
Week 1 of MIS5001: Information Technology ManagementWeek 1 of MIS5001: Information Technology Management
Week 1 of MIS5001: Information Technology Management
 
WordCamp Philly 2011: Gamification for a Funtastic User Experience
WordCamp Philly 2011: Gamification for a Funtastic User ExperienceWordCamp Philly 2011: Gamification for a Funtastic User Experience
WordCamp Philly 2011: Gamification for a Funtastic User Experience
 
Successful Social Media for Non-Profits
Successful Social Media for Non-ProfitsSuccessful Social Media for Non-Profits
Successful Social Media for Non-Profits
 
MIS5001 Week 12 Technology Innovation
MIS5001 Week 12 Technology InnovationMIS5001 Week 12 Technology Innovation
MIS5001 Week 12 Technology Innovation
 
Week 11 Drowning in Data
Week 11 Drowning in DataWeek 11 Drowning in Data
Week 11 Drowning in Data
 
MIS5001 week 10 Crowdsourcing
MIS5001 week 10 CrowdsourcingMIS5001 week 10 Crowdsourcing
MIS5001 week 10 Crowdsourcing
 
MIS5101 WK10 Outcome Measures
MIS5101 WK10 Outcome MeasuresMIS5101 WK10 Outcome Measures
MIS5101 WK10 Outcome Measures
 
MIS5001 Week 9 Globalization
MIS5001 Week 9  GlobalizationMIS5001 Week 9  Globalization
MIS5001 Week 9 Globalization
 
MIS5001 Week 9 Globalization
MIS5001 Week 9  GlobalizationMIS5001 Week 9  Globalization
MIS5001 Week 9 Globalization
 

Recently uploaded

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

Week 12 - Technology Dependence

  • 1. Week 13 –Technology Dependence MIS5001: Management Information Systems PROF. STEVEN L. JOHNSON Twitter: @StevenLJohnson http://stevenljohnson.org
  • 2. Today’s Agenda  Announcements  Group presentations  IT Awards  Final exam  Case Discussion  Blog and Reading Discussion  Project Work Time
  • 3. Exam Review: Format  Exam topic review to be distributed next week.  Take-home: Tues. May 8.  5PM posted to class website, 8PM due via email  Open-note: no outside assistance or Internet assistance  4 short answer questions  Multiple bullet point answer or up to 1 paragraph answer  ~ 60% of grade (4 x 15% each)  Example: “What are 3 examples of a good time to fly a kite? What are 3 times when it is a bad idea?”  1 essay question  pick from 2 or 3 choices  multi-part question or more involved question; multi-paragraph answer required  ~ 40% of grade  Example: “Yahoo! is losing money on email data storage. They want your advice: should they start charging users for email? Why or why not? “
  • 4. Case Study Discussion  Describe the security breach experienced by Sunnylake. Why do you think this breach occurred? What would you have done to prevent it?  What do you think Sunnylake should do now? Would you make the same recommendation to your manager if all of your office was locked out of its computer systems?  What was the underlying cause of the collapse of the CareGroup system?  Does the reason a network fails change the nature of the response? For example, in what ways is Sunnylake’s response helped or hindered by receiving a ransom notice? Do you think CareGroup would have reaction differently if they had coincidently received a threatening message?
  • 5. 100-Second Reflection 1. What was your favorite case study of the year? Why? 2. What was your least favorite case study of the year? Why? 3. Any other questions or comments?  Google, STARS, Cisco, Volkswagen, Apple / Amazon eReading, Kodak  TopCoder, Been Googled, Cognizant, Wyeth, Hackers / CareGroup
  • 6. Blog and Reading Recap  Personal backup and disaster recovery  Incident management in the age of compliance  Prevention – Detection – Response  “...being prepared for incidents via an incident response plan is likely to be one of the most cost-effective security measures an organization takes”  Legal requirements for response
  • 7. For More Information PROF. STEVEN L. JOHNSON EMAIL: STEVEN@TEMPLE.EDU Twitter: @StevenLJohnson http://stevenljohnson.org http://community.mis.temple.edu/mis5001fall10johnson/