Description: Yahoo was under attack, the first of several in one week that would dramatically expose cyberspace’s dirty secret: though the Internet is an amazing creation that has boosted our economy and provided lots of cheeky Super Bowl ads, it is still a work in progress that can be knocked silly with… Read more »
Posts By: David Firth
Description: CIO.com article about common mistakes related to strategic planning by IT professionals. Source: Derek Slater, CIO Magazine Date: 6/1/2002 Link: http://www.cio.com/article/31106/Mistakes_Strategic_Planning_Don_ts_and_Dos_ Discussion Questions: 1. Discuss the importance of IT-business alignment for CIOs. 2. IT initiatives may fail if: a. IT is not aligned to the overall business strategy b. CIO is not a… Read more »
Description: 7:36 minutes. YouTube video about the “governance,” or management, of information. Many companies govern “money, finances, risks.” This video presents argument about need for special, specific, different attention to the importance of controlling these assets; a context for what needs to be done. Source: YouTube Date: 10/23/2008 Link: http://www.youtube.com/watch?v=QkmRL5uriGA Discussion Questions: What is different about this… Read more »
Description: Whitepaper from IT Governance Institute, providing a discussion of IT governance trends by a panel of experts. The IT Governance Institute (ITGI) was established in 1998 to advance international thinking and standards in directing and controlling an enterprise’s information technology. ITGI developed Control Objectives for Information and related Technology (COBIT), now… Read more »
Description: Link to Con-Way homepage to support Opening Case. Example of Human Resource Information Systems (HRIS). Source: Con-Way Date: 2010 Link: http://www.con-way.com/en/ Discussion Questions: Describe how Con-Way uses HRIS.
Description: Considered one of the largest grid computing projects in the world, J.P. Morgan Chase Investment Bank’s pioneering effort to combine seven separate financial risk management systems to share computing power is on target to lower costs while increasing flexibility and service to internal customers. Grid… Read more »
Description: Green computing is a mindset that asks how we can satisfy growing demand for network computing without putting undo stress on the environment. Data centers are commonly filled with large numbers of servers that require a tremendous amount of time and money to maintain. Dan Chu of… Read more »
Description: Video describing innovative approaches to making technology less harmful to the environment. Source: YouTube Date: Link: http://www.youtube.com/watch?v=2rVGqmcbMgU Discussion Questions: 1. What are some of the benefits of green technology? 2. Examples can be appropriate disposal of obsolete equipment; technology that will not emit dangerous elements into the environment. 3. Efficient utilization by using power save… Read more »
Description: YouTube video for discussion about system vulnerabilities that organizations may know nothing about and that is the modern day organized crime. Source: Fredric Golding, YouTube Date: 1/7/2008 Link: http://www.youtube.com/watch?v=-5zxOLZ5jXM&feature=related Discussion Questions: How has the Internet increased our vulnerability to criminal activities?
Description: 3:47 minutes. Cyber crime is pervasiveness, and it is one of the “safest” forms of crime because criminals are invisible. Source: YouTube Date: 6/9/2008 Link: http://www.youtube.com/watch?v=ZHmFiueQm5A Discussion Questions: How has the Internet increased our vulnerability to criminal activities? Has overall criminal activities increased or just assumed a new perspective?