1. P R O F . S T E V E N L . J O H N S O N
T w i t t e r : @ S t e v e n L J o h n s o n
http://stevenljohnson.org
http://community.mis.temple.edu/mis5001fall10johnson/
Week 13 –Technology Dependence
MIS5001: Management Information Systems
2. Today’s Agenda
Announcements
Case Discussion
Group Project Presentation Review
Exam Review
Blog and Reading Discussion
Student Feedback Forms
Project Work Time
3. Case Study Discussion
Describe the security breach experienced by Sunnylake.
Why do you think this breach occurred? What would you
have done to prevent it?
What do you think Sunnylake should do now? Would you
make the same recommendation to your manager if all of
your office was locked out of its computer systems?
What was the underlying cause of the collapse of the
CareGroup system?
Does the reason a network fails change the nature of the
response? For example, in what ways is Sunnylake’s
response helped or hindered by receiving a ransom notice?
Do you think CareGroup would have reaction differently if
they had coincidently received a threatening message?
4. 100-Second Reflection
1. What was your favorite case study of the year?
Why?
2. What do you have more questions about?
3. Any other comments?
5. Group Project Presentations
Convince an audience making project funding decision:
(A) What business problem are you solving?
(B) How do you propose solving it?
(C) How will the solution provide business value?
Format
15-17 minutes + 3-5 minutes for questions
Evaluation forms
Content: Clear description of business problem
Content: Effective justification of business value
Content: Convincing discussion of project feasibility
Presentation: Delivery and pacing
Presentation: Connection with audience
Overall Impression: Assessment of project
6. Exam Review: Format
Take-home: 5PM posted to class website, 8PM due via email
Open-note: no outside assistance or Internet assistance
4 short answer questions
Multiple bullet point answer or up to 1 paragraph answer
~ 60% of grade (4 x 15% each)
Example: “What are 3 examples of a good time to fly a kite? What are 3
times when it is a bad idea?”
1 essay question
multi-part question or more involved question
mutli-paragraph answer required
pick from 2 or 3 choices
~ 40% of grade
Example: “Yahoo! is losing money on email data storage. They want your
advice: should they start charging users for email? Why or why not? “
7. Blog and Reading Recap
Personal backup and disaster recovery
Incident management in the age of compliance
Prevention – Detection – Response
“...being prepared for incidents via an incident response plan is
likely to be one of the most cost-effective security measures an
organization takes”
Legal requirements for response
8. P R O F . S T E V E N L . J O H N S O N
E M A I L : S T E V E N @ T E M P L E . E D U
T w i t t e r : @ S t e v e n L J o h n s o n
http://stevenljohnson.org
http://community.mis.temple.edu/mis5001fall10johnson/
For More Information