Posted by & filed under Business Analytics.

Business Week Online

Description: A generation ago, quants turned finance upside down. Now they’re mapping out ad campaigns and building new businesses from mountains of personal data

Source: BusinessWeek

Date: 1/23/2006


Discussion Questions:

  1. What has math got to do with IT?

Posted by & filed under Social Networks.










Description: These sites are very important to the success, and can lead to the failure, of business activities, events, promotions, etc.

Word-of-mouth communication, while not easily controlled by organizations, is facilitated greatly through such special interest groups.

The business reasons users gave for visiting the social-networking sites are “professional networking with colleagues,” “learning about colleagues,” “research,” “setting up a meeting,” and “sales prospecting.”

Still, social-networking carries security risks. It’s being exploited by attackers to spread malware or trick victims into visiting sites loaded with malware, points out Jose Nazario, network security researcher at security firm Arbor Networks. Micro-blogging site Twitter, for example, has been a vehicle for distributing malware, including a recent bot that merged MSN Messenger link spam with Twitter to get users to download malware, he notes.

Source: PC World

Date: 11/2/2008


Discussion Questions:

1. How might organizations use social networks to their advantage?

2. Why do people from within organizations join social networks?

3. Networks whose primary objective is to facilitate business are called:

a. Public networks.

b. Private networks.

c. Social network.

d. Enterprise social networks.

4. According to the article, Social Networks Go To Work, what percentage of respondents say they access social-networking sites once per day or more for business purposes:

a. One-third.

b. One-half.

c. One-fourth.

d. Zero.

5. Social networks carry increased security risks from:

a. Malware distribution.

b. File sharing with anonymous sources.

c. Terrorist activity.

d. Trade secret violations.

e. All of the above.

6. Social computing is an implementation of:

a. Blogs.

b. Wikis.

c. Web 2.0 technologies.

d. Enterprise 2.0.

e. Business processes.

7. Linkedin, Facebook, Twitter, and YouTube are examples of popular:

a. Social network services.

b. Social networks.

c. Public networks.

d. Private networks.

e. Enterprise social networks.

8. Social networks are used within organizations primarily for:

a.    cost control

b.    monitoring employee productivity

c.    professional networking with colleagues

d.    promoting organizational goals

Posted by & filed under Social Computing, Social Networks, Video.

Description: 3:18 minutes. Video about the advantages of using social networks to gather market data in substantially less expensive, more traditional methods such as surveys, interviews, etc. The Gen Y population of consumers is projected to be much bigger than even the Baby Boomers and the social networks is a major source of communication.

Source: YouTube Video

Date: 5/28/2008


Discussion Questions:

  1. How can social networks be used to conduct market research? 
  2. What are the advantages of doing so? 
  3. What are the disadvantages?

Posted by & filed under Social Networks, Wireless.








Description: Article focus is on how IT facilitates fan enthusiasm & provides the peripheral support to stadiums and arenas. IT is important for survival even of sports teams.  IT facilitates following a favorite team, but it also provides a huge source of revenue for sports is big business; college & professional.

Source: Evan Hansen, Tech Republic

Date: 10/22/2004


Discussion Questions:

  1. How does IT fuel the business of “sports?”

Posted by & filed under Slide Show, Social Computing, Social Networks.








Description: Just like social life offline, online social networks grow organically as they connect more people together. But as social networks come to be seen as a new venue for advertising spending, media companies have elbowed in on the action and gobbled up some of the most popular sites. So far, the growth in social networks hasn’t slowed.

Source: E.C. Hoffman III, BusinessWeek


Discussion Questions:

  1. How might social network sites be considered & utilized as knowledge management tools?

Posted by & filed under Social Computing, Social Networks.







Description: MSNBC article with discussion about how difficult it is to remove information once it is spread onto the internet.  Many recruiters and HR staff members are using sites such as Facebook as a way to screen applicants & to determine decision making capability and judgment. Job candidates who maintain personal sites on Facebook or MySpace are learning — sometimes the hard way — that the image they present to their friends on the Internet may not be best suited for landing the position they’re seeking. Although many employers are too old to qualify as members of the Facebook Generation, they’re becoming increasingly savvy about using social networking sites in their hiring due diligence. That has both job candidates and human resources professionals debating the ethics and effectiveness of snooping on the Web for the kind of information that may not come up in a job interview.

Source: Wei Du,

Date: 8/14/2007


Discussion Questions:

1. What can be done to fix something that is incorrect about you that is present on the Internet?

2. Social networking sites can:

a. assist human resources efforts in recruiting

b. invade personal privacy

c. become basis for litigation

d. ruin careers

3. Social networks are:

a. negative upon employee productivity

b. Web sites that allow anyone to build a homepage for free

c. Highly influential on politics and public opinion

d. expensive to maintain

4. MySpace, Facebook, Twitter, and Bebo are examples of:

a. virtual communities

b. web sites

c. social networks

d. homepages

Posted by & filed under Social Computing, Social Networks.









Description: Employers, including law firms, frequently do Google searches as part of due diligence checks on prospective employees. According to a December survey by the Ponemon Institute, a privacy research organization, roughly half of U.S. hiring officials use the Internet in vetting job applications. About one-third of the searches yielded content used to deny a job, the survey said. The legal hiring market is very competitive. What could tip the balance is the appearance that a candidate is a lightning rod for controversy, said Mark Rasch, a Washington lawyer and consultant who specializes in Internet issues.

The trend has even spawned a new service, ReputationDefender, whose mission is to search for damaging content online and destroy it on behalf of clients. Generally, the law exempts site operators from liability for the content posted by others, though it does not prevent them from removing offensive items.

Source: Ellen Nakashima, Washington Post

Date: 3/7/2007


Discussion Questions:

  1. What can be done when erroneous information, or information we prefer be hidden, shows up online?

Posted by & filed under Social Computing, Social Networks, Web 2.0.








Description: Discusses the pros and cons of developing a social networking site.  Is it good for business?  It is unavoidable and can definitely be good for business, but it must be managed to be effective.

Source: Ryan Singel, Wired Magazine

Date: 2/18/2009


Discussion Questions:

1. What can be learned as described in this article?  Are social network sites really good for business?

2. Social network:

a. searchable content

b. indicates ways individuals are connected

c. evolution in human social interaction

d. views social relationships in terms of nodes & ties

e. all of the above

3. Mapping & measuring of relationships & flows between people, etc.:

a. social network service

b. social network analysis

c. social network tools

d. social network theory

4. Changing the media & advertising industries:

a. Digg

b. Friendster

c. YouTube

d. Flickr

Posted by & filed under Social Computing, Social Networks, Web 2.0.










Description: Link to Forbes article on social networking sites that connect tens of millions of cybersurfers. Naturally, marketers want to capitalize on the phenomenon with their own virtual neighborhoods.


Date: 5/8/2006


Discussion Questions:

  1. What does the author mean when referring to “their space” and what is the symbolism in the title?

Posted by & filed under IT Infrastructure, No Discussion Questions, Supply Chain Management.







Description: Micromuse Inc. (Nasdaq: MUSE), the leading provider of business and service assurance software, today announced that Mary Kay Inc., one of the largest direct sellers of skin care and color cosmetics in the world, has selected to implement the Netcool(R) suite across its complex IT environment to help streamline critical enterprise IT management and support operations.

Source: Business Wire

Date: 11/18/2002