SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
P R O F . S T E V E N L . J O H N S O N
T w i t t e r : @ S t e v e n L J o h n s o n
http://stevenljohnson.org
http://community.mis.temple.edu/mis5001fall10johnson/
Week 13 –Technology Dependence
MIS5001: Management Information Systems
Today’s Agenda
  Announcements
  Case Discussion
  Group Project Presentation Review
  Exam Review
  Blog and Reading Discussion
  Student Feedback Forms
  Project Work Time
Case Study Discussion
  Describe the security breach experienced by Sunnylake.
Why do you think this breach occurred? What would you
have done to prevent it?
  What do you think Sunnylake should do now? Would you
make the same recommendation to your manager if all of
your office was locked out of its computer systems?
  What was the underlying cause of the collapse of the
CareGroup system?
  Does the reason a network fails change the nature of the
response? For example, in what ways is Sunnylake’s
response helped or hindered by receiving a ransom notice?
Do you think CareGroup would have reaction differently if
they had coincidently received a threatening message?
100-Second Reflection
1.  What was your favorite case study of the year?
Why?
2.  What do you have more questions about?
3.  Any other comments?
Group Project Presentations
  Convince an audience making project funding decision:
  (A) What business problem are you solving?
  (B) How do you propose solving it?
  (C) How will the solution provide business value?
  Format
  15-17 minutes + 3-5 minutes for questions
  Evaluation forms
  Content: Clear description of business problem
  Content: Effective justification of business value
  Content: Convincing discussion of project feasibility
  Presentation: Delivery and pacing
  Presentation: Connection with audience
  Overall Impression: Assessment of project
Exam Review: Format
  Take-home: 5PM posted to class website, 8PM due via email
  Open-note: no outside assistance or Internet assistance
  4 short answer questions
  Multiple bullet point answer or up to 1 paragraph answer
  ~ 60% of grade (4 x 15% each)
  Example: “What are 3 examples of a good time to fly a kite? What are 3
times when it is a bad idea?”
  1 essay question
  multi-part question or more involved question
  mutli-paragraph answer required
  pick from 2 or 3 choices
  ~ 40% of grade
  Example: “Yahoo! is losing money on email data storage. They want your
advice: should they start charging users for email? Why or why not? “
Blog and Reading Recap
  Personal backup and disaster recovery
  Incident management in the age of compliance
  Prevention – Detection – Response
  “...being prepared for incidents via an incident response plan is
likely to be one of the most cost-effective security measures an
organization takes”
  Legal requirements for response
P R O F . S T E V E N L . J O H N S O N
E M A I L : S T E V E N @ T E M P L E . E D U
T w i t t e r : @ S t e v e n L J o h n s o n
http://stevenljohnson.org
http://community.mis.temple.edu/mis5001fall10johnson/
For More Information

Mais conteúdo relacionado

Semelhante a MIS5001 Week 13 Technology Dependence

e-learning Reality Check: Keynote Durham University 2009
e-learning Reality Check: Keynote Durham University 2009e-learning Reality Check: Keynote Durham University 2009
e-learning Reality Check: Keynote Durham University 2009
andyramsden
 
College of Nursing presentation August 20, 2013
College of Nursing presentation August 20, 2013College of Nursing presentation August 20, 2013
College of Nursing presentation August 20, 2013
Jim Wentworth
 
Using Technology To Increase Engagement In Larger Courses
Using Technology To Increase Engagement In Larger CoursesUsing Technology To Increase Engagement In Larger Courses
Using Technology To Increase Engagement In Larger Courses
Mark Laumakis
 
CRJ104- Introduction to SecurityFinalDue 1159 pm EST We
CRJ104- Introduction to SecurityFinalDue  1159 pm EST WeCRJ104- Introduction to SecurityFinalDue  1159 pm EST We
CRJ104- Introduction to SecurityFinalDue 1159 pm EST We
MargenePurnell14
 
Essay about kindnessChoose any three consecutive days. During th.docx
Essay about kindnessChoose any three consecutive days. During th.docxEssay about kindnessChoose any three consecutive days. During th.docx
Essay about kindnessChoose any three consecutive days. During th.docx
SALU18
 
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docxPROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
woodruffeloisa
 
CYBERSECURITY IN CALIFORNIA HEALTH CARE COMPANY1CYBERSECURIT.docx
CYBERSECURITY IN CALIFORNIA HEALTH CARE COMPANY1CYBERSECURIT.docxCYBERSECURITY IN CALIFORNIA HEALTH CARE COMPANY1CYBERSECURIT.docx
CYBERSECURITY IN CALIFORNIA HEALTH CARE COMPANY1CYBERSECURIT.docx
alanrgibson41217
 
Responses to Other Students Respond to at least 2 of your fellow .docx
Responses to Other Students Respond to at least 2 of your fellow .docxResponses to Other Students Respond to at least 2 of your fellow .docx
Responses to Other Students Respond to at least 2 of your fellow .docx
ronak56
 

Semelhante a MIS5001 Week 13 Technology Dependence (20)

e-learning Reality Check: Keynote Durham University 2009
e-learning Reality Check: Keynote Durham University 2009e-learning Reality Check: Keynote Durham University 2009
e-learning Reality Check: Keynote Durham University 2009
 
NM TIE Presentation on PD Ecosystems
NM TIE Presentation on PD EcosystemsNM TIE Presentation on PD Ecosystems
NM TIE Presentation on PD Ecosystems
 
College of Nursing presentation August 20, 2013
College of Nursing presentation August 20, 2013College of Nursing presentation August 20, 2013
College of Nursing presentation August 20, 2013
 
How to conduct a social network analysis: A tool for empowering teams and wor...
How to conduct a social network analysis: A tool for empowering teams and wor...How to conduct a social network analysis: A tool for empowering teams and wor...
How to conduct a social network analysis: A tool for empowering teams and wor...
 
Great Gatsby Essay Prompts. Online assignment writing service.
Great Gatsby Essay Prompts. Online assignment writing service.Great Gatsby Essay Prompts. Online assignment writing service.
Great Gatsby Essay Prompts. Online assignment writing service.
 
Using Technology To Increase Engagement In Larger Courses
Using Technology To Increase Engagement In Larger CoursesUsing Technology To Increase Engagement In Larger Courses
Using Technology To Increase Engagement In Larger Courses
 
Plagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesPlagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front Lines
 
CRJ104- Introduction to SecurityFinalDue 1159 pm EST We
CRJ104- Introduction to SecurityFinalDue  1159 pm EST WeCRJ104- Introduction to SecurityFinalDue  1159 pm EST We
CRJ104- Introduction to SecurityFinalDue 1159 pm EST We
 
Technology and.pdf
Technology and.pdfTechnology and.pdf
Technology and.pdf
 
Essay about kindnessChoose any three consecutive days. During th.docx
Essay about kindnessChoose any three consecutive days. During th.docxEssay about kindnessChoose any three consecutive days. During th.docx
Essay about kindnessChoose any three consecutive days. During th.docx
 
Measured Steps: An Exploratory Study in Mulitmodal Literacy and Learning
Measured  Steps: An Exploratory Study in Mulitmodal Literacy and LearningMeasured  Steps: An Exploratory Study in Mulitmodal Literacy and Learning
Measured Steps: An Exploratory Study in Mulitmodal Literacy and Learning
 
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docxPROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
 
SLTCC2017 2.1 Engaging technologies for in class comments, questions and feed...
SLTCC2017 2.1 Engaging technologies for in class comments, questions and feed...SLTCC2017 2.1 Engaging technologies for in class comments, questions and feed...
SLTCC2017 2.1 Engaging technologies for in class comments, questions and feed...
 
CYBERSECURITY IN CALIFORNIA HEALTH CARE COMPANY1CYBERSECURIT.docx
CYBERSECURITY IN CALIFORNIA HEALTH CARE COMPANY1CYBERSECURIT.docxCYBERSECURITY IN CALIFORNIA HEALTH CARE COMPANY1CYBERSECURIT.docx
CYBERSECURITY IN CALIFORNIA HEALTH CARE COMPANY1CYBERSECURIT.docx
 
Responses to Other Students Respond to at least 2 of your fellow .docx
Responses to Other Students Respond to at least 2 of your fellow .docxResponses to Other Students Respond to at least 2 of your fellow .docx
Responses to Other Students Respond to at least 2 of your fellow .docx
 
OER10 Simshare Slides
OER10 Simshare SlidesOER10 Simshare Slides
OER10 Simshare Slides
 
OER10 Conference
OER10 ConferenceOER10 Conference
OER10 Conference
 
5 8 08 Live And Learn Campus Closure And Academic Continuity
5 8 08 Live And Learn Campus Closure And Academic Continuity5 8 08 Live And Learn Campus Closure And Academic Continuity
5 8 08 Live And Learn Campus Closure And Academic Continuity
 
How To Write An Analytical Essay On A Song
How To Write An Analytical Essay On A SongHow To Write An Analytical Essay On A Song
How To Write An Analytical Essay On A Song
 
Tin Can Learning Design – Andrew Downes
Tin Can Learning Design – Andrew DownesTin Can Learning Design – Andrew Downes
Tin Can Learning Design – Andrew Downes
 

Mais de Steven Johnson

Mais de Steven Johnson (20)

Brief observations on social media
Brief observations on social media Brief observations on social media
Brief observations on social media
 
30 Nov 2012
30 Nov 201230 Nov 2012
30 Nov 2012
 
Week 11 - Globalization
Week 11 - GlobalizationWeek 11 - Globalization
Week 11 - Globalization
 
Week 10 Knowledge Management
Week 10 Knowledge ManagementWeek 10 Knowledge Management
Week 10 Knowledge Management
 
Week 9 - Drowning in Data
Week 9 - Drowning in DataWeek 9 - Drowning in Data
Week 9 - Drowning in Data
 
Week 8 - Crowdsourcing
Week 8  - CrowdsourcingWeek 8  - Crowdsourcing
Week 8 - Crowdsourcing
 
Week 7 - Digital Disruption
Week 7 - Digital DisruptionWeek 7 - Digital Disruption
Week 7 - Digital Disruption
 
Week 6 - Technology Innovation
Week 6 - Technology InnovationWeek 6 - Technology Innovation
Week 6 - Technology Innovation
 
Week 5 Enterprise Priority Setting
Week 5 Enterprise Priority SettingWeek 5 Enterprise Priority Setting
Week 5 Enterprise Priority Setting
 
IT Management Week 4 - Enterprise Applications
IT Management Week 4 - Enterprise ApplicationsIT Management Week 4 - Enterprise Applications
IT Management Week 4 - Enterprise Applications
 
Week 3 - Systems Thinking
Week 3 - Systems ThinkingWeek 3 - Systems Thinking
Week 3 - Systems Thinking
 
Week 2 MIS5001 Information Technology Management
Week 2 MIS5001 Information Technology ManagementWeek 2 MIS5001 Information Technology Management
Week 2 MIS5001 Information Technology Management
 
Week 1 of MIS5001: Information Technology Management
Week 1 of MIS5001: Information Technology ManagementWeek 1 of MIS5001: Information Technology Management
Week 1 of MIS5001: Information Technology Management
 
WordCamp Philly 2011: Gamification for a Funtastic User Experience
WordCamp Philly 2011: Gamification for a Funtastic User ExperienceWordCamp Philly 2011: Gamification for a Funtastic User Experience
WordCamp Philly 2011: Gamification for a Funtastic User Experience
 
Successful Social Media for Non-Profits
Successful Social Media for Non-ProfitsSuccessful Social Media for Non-Profits
Successful Social Media for Non-Profits
 
MIS5001 Week 12 Technology Innovation
MIS5001 Week 12 Technology InnovationMIS5001 Week 12 Technology Innovation
MIS5001 Week 12 Technology Innovation
 
Week 11 Drowning in Data
Week 11 Drowning in DataWeek 11 Drowning in Data
Week 11 Drowning in Data
 
MIS5001 week 10 Crowdsourcing
MIS5001 week 10 CrowdsourcingMIS5001 week 10 Crowdsourcing
MIS5001 week 10 Crowdsourcing
 
MIS5101 WK10 Outcome Measures
MIS5101 WK10 Outcome MeasuresMIS5101 WK10 Outcome Measures
MIS5101 WK10 Outcome Measures
 
MIS5001 Week 9 Globalization
MIS5001 Week 9  GlobalizationMIS5001 Week 9  Globalization
MIS5001 Week 9 Globalization
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

MIS5001 Week 13 Technology Dependence

  • 1. P R O F . S T E V E N L . J O H N S O N T w i t t e r : @ S t e v e n L J o h n s o n http://stevenljohnson.org http://community.mis.temple.edu/mis5001fall10johnson/ Week 13 –Technology Dependence MIS5001: Management Information Systems
  • 2. Today’s Agenda   Announcements   Case Discussion   Group Project Presentation Review   Exam Review   Blog and Reading Discussion   Student Feedback Forms   Project Work Time
  • 3. Case Study Discussion   Describe the security breach experienced by Sunnylake. Why do you think this breach occurred? What would you have done to prevent it?   What do you think Sunnylake should do now? Would you make the same recommendation to your manager if all of your office was locked out of its computer systems?   What was the underlying cause of the collapse of the CareGroup system?   Does the reason a network fails change the nature of the response? For example, in what ways is Sunnylake’s response helped or hindered by receiving a ransom notice? Do you think CareGroup would have reaction differently if they had coincidently received a threatening message?
  • 4. 100-Second Reflection 1.  What was your favorite case study of the year? Why? 2.  What do you have more questions about? 3.  Any other comments?
  • 5. Group Project Presentations   Convince an audience making project funding decision:   (A) What business problem are you solving?   (B) How do you propose solving it?   (C) How will the solution provide business value?   Format   15-17 minutes + 3-5 minutes for questions   Evaluation forms   Content: Clear description of business problem   Content: Effective justification of business value   Content: Convincing discussion of project feasibility   Presentation: Delivery and pacing   Presentation: Connection with audience   Overall Impression: Assessment of project
  • 6. Exam Review: Format   Take-home: 5PM posted to class website, 8PM due via email   Open-note: no outside assistance or Internet assistance   4 short answer questions   Multiple bullet point answer or up to 1 paragraph answer   ~ 60% of grade (4 x 15% each)   Example: “What are 3 examples of a good time to fly a kite? What are 3 times when it is a bad idea?”   1 essay question   multi-part question or more involved question   mutli-paragraph answer required   pick from 2 or 3 choices   ~ 40% of grade   Example: “Yahoo! is losing money on email data storage. They want your advice: should they start charging users for email? Why or why not? “
  • 7. Blog and Reading Recap   Personal backup and disaster recovery   Incident management in the age of compliance   Prevention – Detection – Response   “...being prepared for incidents via an incident response plan is likely to be one of the most cost-effective security measures an organization takes”   Legal requirements for response
  • 8. P R O F . S T E V E N L . J O H N S O N E M A I L : S T E V E N @ T E M P L E . E D U T w i t t e r : @ S t e v e n L J o h n s o n http://stevenljohnson.org http://community.mis.temple.edu/mis5001fall10johnson/ For More Information