Posted by & filed under Fraud, Video.

Description: 3:47 minutes.  Cyber crime is pervasiveness, and it is one of the “safest” forms of crime because criminals are invisible.

Source: YouTube

Date: 6/9/2008

Link: http://www.youtube.com/watch?v=ZHmFiueQm5A

 Discussion Questions:

  1. How has the Internet increased our vulnerability to criminal activities?  Has overall criminal activities increased or just assumed a new perspective?

Posted by & filed under IT Investment, IT Projects.

 

 

 

 

 

 

 

Description: Whitepaper on the topic of project failure & whys of it all; what can be done to overcome what are really common mistakes. Projects seldom fail because of the technology.  Rather, it is more often management of the project, lack of senior level support, improper funding. This is a good time to reinforce the high percentage (85%) of IT projects fail.

Source: Al Neimat, The PROJECT PERFECT White Paper Collection

Date: 10/24/2005

Link: http://www.projectperfect.com.au/downloads/Info/info_it_projects_fail.pdf

 Discussion Questions:

  1. Discuss the reasons presented in the whitepaper. 
  2. Give examples from your personal experiences. 
  3. Search online to find the “Top 10 IT Project Failures.” 
  4. What is common to all? 
  5. What could have been avoided & how?

Posted by & filed under Supply Chain Management.

 

 

 

 

 

Description: Link to Wikipedia for SCM definition & clarification.  Discuss how SCM can be a competitive advantage for organizations when used most effectively.  What is the main goal of SCM?  To reduce uncertainty, variability, & risks; to increase control in the supply chain to improve inventory levels, cycle time, business processes & customer service to increase profitability & competitiveness.  Efficient & effective supply chains are critical to survival of most organizations; heavily dependent upon IS.  What are some examples of successful supply chain partnerships?  Consider Wal-Mart.

Source: Wikipedia

Date: 11/29/2010

Link: http://en.wikipedia.org/wiki/Supply_chain_management

 Discussion Questions:

1. Describe SCM & give examples.

2. Efficient management of the supply chain end-to-end process:

a. ERP

b. CRM

c. SCM

d. DSS

 3. Main goal of modern SCM:

a. reduce cost

b. reduce uncertainty, variability & risks

c. increase control in the supply chain

d. increase profitability & competitiveness

e. all of the above

 4. SCM software:

a. concentrates upon improving decision making, optimization & analysis

b. needed to support specific segments of manufacturing, inventory control & scheduling

c. may support digital supply chains

d. all of the above

e. none of the above

Posted by & filed under Knowledge Management.

 

 

 

 

 

Description:  Link to Wikipedia for Knowledge Management definition & clarification.  What are the pros & cons associated with implementing KM systems?  What recommendations do you have for management to increase KM implementation success?  Employees must be given incentive for their knowledge to participate in KM.  KM systems will break down silos & allow for the knowledge to be managed effectively & efficiently; access is key.

Source:  Wikipedia

Date: 8/30/2010

Link:  http://en.wikipedia.org/wiki/Knowledge_management_systems

 Discussion Questions:

1. Define KM & relate it to knowledge & intellectual capital.  

2. What are the major benefits of KM to a company?

3. Process that helps organizations to identify, select, organize, disseminate, and transfer important information & expertise within the organization in an unstructured way:

a. CRM

b. SCM

c. KM

d. ERP

 4. Employee incentives are common when promoting implementation of:

a. SCM

b. CRM

c. KM

d. DSS

 5. Knowledge is also:

a. intellectual capital

b. intellectual assets

c. critical to the ongoing success of an organization

d. all of the above

Posted by & filed under Electronic Surveillance.

 

 

 

Description:  AT&T is teaming with TeleNav to beef up its enterprise global positioning system services, and it is offering a service that enables companies to track and monitor their vehicle fleets with embedded units.  The carrier said it was offering TeleNav Vehicle Tracker as part of its enterprise mobility services. Once installed, the hardwired or embedded GPS unit doesn’t require any driver interaction, and it provides real-time tracking information to a Web-based management console.

Source: Marin Perez, InfoWeek

Date: 12/9/2008

Link: http://www.informationweek.com/news/personal_tech/gps/showArticle.jhtml?articleID=212300510

 Discussion Questions:

  1. Should employees and customers be advised when a GPS is utilized?

Posted by & filed under Electronic Surveillance, Slide Show.

 

 

 

 

 

 

 

 

Description: Business Week article for further discussion about surveillance innovations.  Starting with the first stone tools used thousands of years ago, technology has always had its pros and cons. Stones could grind corn — or split skulls. Such is the case with many of the sensors now being developed to protect civilized people from modern barbarians: terrorists.

Source: BusinessWeek

Date: 8/2005

Link: http://images.businessweek.com/ss/05/07/surveillance/index_01.htm

 Discussion Questions:

  1. Does technology really make us safer?

Posted by & filed under Electronic Surveillance.

 

 

Description: Discussion of the pros & cons of higher security levels.  Tomorrow’s surveillance technology may be considerably more effective, but each uptick in protection will typically come at the cost of more intrusion into the privacy of ordinary people. For now, the public seems to find that trade-off acceptable, so scientists around the world have intensified efforts to perfect the art of surveillance, hoping to catch villains before they strike. 

Research laboratories envision tools that could identify and track just about every person, anywhere – and sound alarms when the systems encounter hazardous objects or chemical compounds. Many such ideas seem to leap from the pages of science fiction: An artificial nose in doorways and corridors sniffs out faint traces of explosives on someone’s hair. Tiny sensors floating in reservoirs detect a deadly microbe and radio a warning. Smart cameras ID people at a distance by the way they walk or the shape of their ears. And a little chemical lab analyzes the sweat, body odor, and skin flakes in the human thermal plume — the halo of heat that surrounds each person.

Source: BusinessWeek

Date: 8/8/2005

Link: http://www.businessweek.com/magazine/content/05_32/b3946001_mz001.htm

 Discussion Questions:

1.  At what price should security come?

2.  Security that reduces risks of physical and property damage may:

a.  increase costs of a firm

b.  reduce the rights of the people

c.  prohibit world trade

d.  reduce cultural exchanges

 

3.  Artificial noses in doorways and corridors and sensors can:

a.  sniff out faint traces of explosives on someone’s hair

b.  sound alarms when hazardous objects or chemical compounds are
encountered

c.  ID people from a distance by the way they walk, or the shape of their ears

d. analyze body heat halos

e.  all of the above

 

4.  Tomorrow’s surveillance equipment will be:

a.  more invasive

b.  more effective

c.  much more cost effective

d.  more discrete

Posted by & filed under Business Intelligence.

 

 

Description:  A “dashboard” pulls up everything the CEO needs to run the show, or rather what they need to assess performance, tool to identify where adjustment is necessary, who is performing and who isn’t.  This article is about how the concept of the dashboard began.

Source: BusinessWeek

Date: 2/13/2006

Link: http://www.businessweek.com/magazine/content/06_07/b3971083.htm

 Discussion Questions:

  1. What are the advantages of dashboards?  Describe the strategic considerations.