9

Click here to load reader

MIS5101 Week 13 Security Privacy Data Mining

Embed Size (px)

DESCRIPTION

Slides from week 13 of MIS5101: Business Intelligence taught by Prof. Steven L. Johnson at Temple University Fox School of Business.

Citation preview

Page 1: MIS5101 Week 13 Security Privacy Data Mining

P R O F . S T E V E N L . J O H N S O N T w i t t e r : @ S t e v e n L J o h n s o n

http://stevenljohnson.org

http://community.mis.temple.edu/mis5101fall10/

MIS5101: Business Intelligence Week 13 – Security, Privacy and Data Mining

Page 2: MIS5101 Week 13 Security Privacy Data Mining

Today’s Agenda

  Case Discussion

  Group Project Discussion

  Final Exam Review

  Reading + Blog Discussion

  Student Evaluation Forms

  Group Project Work

Page 3: MIS5101 Week 13 Security Privacy Data Mining

Case Analysis Discussion Questions

 What business is deCODE in?  Why Iceland?  Why was the database project opposed?  What could deCODE have done differently?

 What does IFA/ShopSense propose to do?  What can they learn from deCODE?  What are expert advice do you agree with? Which

do you disagree with?

Page 4: MIS5101 Week 13 Security Privacy Data Mining

100 Second Reflection

1.  What was your favorite case study this semester? Why? •  Balancing Access with Accuracy for Infant HIV Diagnostics in

Tanzania •  SKOLAR, M.D.: Is There a Business for Web-Based

Information for Doctors? •  Intermountain Health Care •  Global Knowledge Management at Danone •  Data.gov •  In-Vitro Fertilization (IVF): Outcomes Measurement •  deCODE Genetics: Hunting for Genes to Develop Drugs •  Dark Side of Customer Analytics

2.  Any other comments?

Page 5: MIS5101 Week 13 Security Privacy Data Mining

Group Project Presentations

  Convince an audience making project funding decision:   (A) What business problem are you solving?   (B) How do you propose solving it?   (C) How will the solution provide business value?

  Format   9-12 minutes + 2-4 minutes for questions

  Evaluation forms   Content: Clear description of business problem   Content: Effective justification of business value   Content: Convincing discussion of project feasibility   Presentation: Delivery and pacing   Presentation: Connection with audience   Overall Impression: Assessment of project

Page 6: MIS5101 Week 13 Security Privacy Data Mining

Exam Review: Format

  Take-home: 5PM posted to class website, 8PM due via email

  Open-note: no outside assistance or Internet assistance   4 short answer questions (~ 60% of grade (4 x 15% each)

  Multiple bullet point answer or up to 1 paragraph answer   Ex.: “What are 3 pros and 3 cons of giving ad-hoc SQL query access?

  1 essay question (~ 40% of grade)   Multi-part question or more involved question with a multi-

paragraph answer required   Pick from 2 or 3 choices   Ex.: “Temple University is looking for new revenue streams. They

want your advice: should they offer to sell marketers the list of student email addresses? Why or why not?”

Page 7: MIS5101 Week 13 Security Privacy Data Mining

Reading

  Why I'm releasing my genetic data online   Agree or disagree?

Page 8: MIS5101 Week 13 Security Privacy Data Mining

Blog Discussion

  Personal backups and disaster recovery   Cloud computing   Device proliferation   Role of operating systems

Page 9: MIS5101 Week 13 Security Privacy Data Mining

P R O F . S T E V E N L . J O H N S O N E M A I L : S T E V E N @ T E M P L E . E D U

T w i t t e r : @ S t e v e n L J o h n s o n http://stevenljohnson.org

http://community.mis.temple.edu/mis5001fall10johnson/

For More Information