7

Click here to load reader

Week 12 - Technology Dependence

Embed Size (px)

DESCRIPTION

Week 12 of MIS5001 Information Technology Management course taught by Prof. Johnson at Temple U. Fox School of Business.

Citation preview

Page 1: Week 12 - Technology Dependence

P R O F . S T E V E N L . J O H N S O NT w i t t e r : @ S t e v e n L J o h n s o n

h t t p : / / s t e v e n l j o h n s o n . o r g

Week 13 –Technology DependenceMIS5001: Management Information Systems

Page 2: Week 12 - Technology Dependence

Today’s Agenda

Announcements

Group presentations

IT Awards

Final exam

Case Discussion

Blog and Reading Discussion

Project Work Time

Page 3: Week 12 - Technology Dependence

Exam Review: Format

Exam topic review to be distributed next week. Take-home: Tues. May 8.

5PM posted to class website, 8PM due via email

Open-note: no outside assistance or Internet assistance 4 short answer questions Multiple bullet point answer or up to 1 paragraph answer ~ 60% of grade (4 x 15% each) Example: “What are 3 examples of a good time to fly a kite? What are 3

times when it is a bad idea?”

1 essay question pick from 2 or 3 choices multi-part question or more involved question; multi-paragraph answer

required ~ 40% of grade Example: “Yahoo! is losing money on email data storage. They want your

advice: should they start charging users for email? Why or why not? “

Page 4: Week 12 - Technology Dependence

Case Study Discussion

Describe the security breach experienced by Sunnylake. Why do you think this breach occurred? What would you have done to prevent it?

What do you think Sunnylake should do now? Would you make the same recommendation to your manager if all of your office was locked out of its computer systems?

What was the underlying cause of the collapse of the CareGroup system?

Does the reason a network fails change the nature of the response? For example, in what ways is Sunnylake’s response helped or hindered by receiving a ransom notice? Do you think CareGroup would have reaction differently if they had coincidently received a threatening message?

Page 5: Week 12 - Technology Dependence

100-Second Reflection

1. What was your favorite case study of the year? Why?

2. What was your least favorite case study of the year? Why?

3. Any other questions or comments?

Google, STARS, Cisco, Volkswagen, Apple / Amazon eReading, Kodak

TopCoder, Been Googled, Cognizant, Wyeth, Hackers / CareGroup

Page 6: Week 12 - Technology Dependence

Blog and Reading Recap

Personal backup and disaster recovery

Incident management in the age of compliance

Prevention – Detection – Response

“...being prepared for incidents via an incident response plan is likely to be one of the most cost-effective security measures an organization takes”

Legal requirements for response

Page 7: Week 12 - Technology Dependence

P R O F . S T E V E N L . J O H N S O NE M A I L : S T E V E N @ T E M P L E . E D U

T w i t t e r : @ S t e v e n L J o h n s o n

h t t p : / / s t e v e n l j o h n s o n . o r g

h t t p : / / c o m m u n i t y . m i s . t e m p l e . e d u / m i s 5 0 0 1 f a l l 1 0 j o h n s o n /

For More Information