NewsWeek – Hunting the Hackers

Posted by & filed under IT Security.

       Description: Yahoo was under attack, the first of several in one week that would dramatically expose cyberspace’s dirty secret: though the Internet is an amazing creation that has boosted our economy and provided lots of cheeky Super Bowl ads, it is still a work in progress that can be knocked silly with… Read more »

CIO – Mistakes: Strategic Planning Don’ts (and Dos)

Posted by & filed under IT Planning.

      Description: article about common mistakes related to strategic planning by IT professionals.  Source: Derek Slater, CIO Magazine Date: 6/1/2002 Link: Discussion Questions: 1. Discuss the importance of IT-business alignment for CIOs. 2. IT initiatives may fail if: a. IT is not aligned to the overall business strategy b. CIO is not a… Read more »

YouTube Video – The Cost, The Risk, The Value

Posted by & filed under IT Governance, Video.

Description: 7:36 minutes. YouTube video about the “governance,” or management, of information.  Many companies govern “money, finances, risks.”   This video presents argument about need for special, specific, different attention to the importance of controlling these assets; a context for what needs to be done. Source: YouTube Date: 10/23/2008 Link: Discussion Questions: What is different about this… Read more »

IT Governance Institute – IT Governance Trends

Posted by & filed under IT Governance.

           Description: Whitepaper from IT Governance Institute, providing a discussion of IT governance trends by a panel of experts. The IT Governance Institute (ITGI) was established in 1998 to advance international thinking and standards in directing and controlling an enterprise’s information technology. ITGI developed Control Objectives for Information and related Technology (COBIT), now… Read more »

Complex HRIS Issues – Con-Way Homepage

Posted by & filed under HRIS.

     Description: Link to Con-Way homepage to support Opening Case.  Example of Human Resource Information Systems (HRIS). Source: Con-Way Date: 2010 Link: Discussion Questions: Describe how Con-Way uses HRIS.

Computer World – J.P. Morgan Harnesses Power with Grid Computing System

Posted by & filed under Grid Computing.

                     Description: Considered one of the largest grid computing projects in the world, J.P. Morgan Chase Investment Bank’s pioneering effort to combine seven separate financial risk management systems to share computing power is on target to lower costs while increasing flexibility and service to internal customers.  Grid… Read more »

YouTube Video – Pushing Green Technology

Posted by & filed under Green Technologies, Video.

Description: Video describing innovative approaches to making technology less harmful to the environment. Source: YouTube Date: Link:  Discussion Questions: 1. What are some of the benefits of green technology?  2. Examples can be appropriate disposal of obsolete equipment; technology that will not emit dangerous elements into the environment.  3. Efficient utilization by using power save… Read more »

YouTube Video – New Face of Cyber Crime

Posted by & filed under Fraud, Video.

Description: YouTube video for discussion about system vulnerabilities that organizations may know nothing about and that is the modern day organized crime. Source: Fredric Golding, YouTube Date: 1/7/2008 Link: Discussion Questions: How has the Internet increased our vulnerability to criminal activities?

YouTube Video – Cyber Crime Growing Global Threat

Posted by & filed under Fraud, Video.

Description: 3:47 minutes.  Cyber crime is pervasiveness, and it is one of the “safest” forms of crime because criminals are invisible. Source: YouTube Date: 6/9/2008 Link:  Discussion Questions: How has the Internet increased our vulnerability to criminal activities?  Has overall criminal activities increased or just assumed a new perspective?