Tuesday, March 27, 2012

Mar 27 (Ch 16): Integrating Wireless Technology in Business

Wireless technologies are transforming how we live, work, and play. Handheld devices are continuing to offer additional functionality and cellular networks are advancing rapidly in their increased speed and throughput abilities. These enabling technologies are fueling widespread adoption and creation of new and innovative ways to perform business.

LEARNING OUTCOMES

16.1 Explain the business benefits of using wireless technology.
Business benefits to using wireless technology include:
• Increase productivity
• Speed delivery to market
• Reduce operating costs
• Have universal access to information and applications
• Automate business processes
• Create user convenience and timeliness
• Ability to conduct business 24x7x365

16.2 Discuss the wireless trends that benefit consumers and businesses.
• Social Networking Gets Mobilized. Mobility is added to existing Internet business models, services and behaviors, driving traffic for wireless operators. Social networking applications initially are preloaded on many mobile devices sold and later become downloadable.
• Mobile TV. Per-view or per-minute pricing for “sneaking,” a consumer tendency to watch key minutes of a sports event or drama while engaged in another activity. Sneaking leads to more regular viewing, and within 3-5 years, mobile TV will become an indispensable service.
• Multi-Function Devices Become Cheaper and More Versatile. Intense competition and margin pressure will continue in the handset market, forcing prices of third-generation (3G) handsets below $90 and making them affordable for a wide range of users.
• Location-Based Services: GPS is the location technology of choice for the wireless industry. Handset manufacturers will continue to push GPS-enabled handsets as the technology evolves from popular in-car satellite navigation systems to a broadly accepted feature in wireless phones.
• Mobile Advertising. Major brands are shifting from basic SMS marketing to more sophisticated multimedia advertising.
• Wireless Providers Move into Home Entertainment. Mobile makes headway against fixed broadband operators, who have dominated Internet and cheaper voice service provision in the home. Wi-Fi will remains the primary wireless access technology.
• Wireless Security. There is a monumental need to put strong security measures in place. This could be the year that hackers really start paying attention to millions of wireless devices, the growth in mobile data usage and vulnerable points between mobile and fixed networks.
• Enterprise Mobility. Corporations switch from phones to mobile computers for transactions, data collection and messaging for a wide variety of employees. Many voice communications processes, such as order placement and delivery notifications, dispatch operations and remote asset monitoring, continue to shift to wireless data to increase information access and field transaction volume across organizations. Many corporations will completely replace their cellular handsets with a combined voice/data device or a data-only device.



Business Driven Technology (Customized WMU Edition)
Baltzan & Phillips.

Mar 27 (Ch 15): Creating Collaborative Partnerships

Collaboration allows people, teams, and organizations to leverage and build upon the ideas and talents of staff, suppliers, customers, and business partners. It involves a unique set of business challenges that:
• Include complex interactions between people who may be in different locations and desire to work across function and discipline areas
• Require flexibility in work process and the ability to involve others quickly and easily
• Create and share information rapidly and effortlessly within a team

Increasingly, organizations are extending their focus from internal operations like planning and scheduling, enterprise resource planning and sales force automation, toward operations beyond their own four walls with external customers and suppliers. This chapter focuses on the need for collaboration, the technology that supports collaboration, and collaboration trends.

LEARNING OUTCOMES

15.1 Identify the different ways in which companies collaborate using technology.
Companies must be able to collaborate. Without collaboration companies simply would have a very difficult time operating. Companies collaborate in a number of ways including document ex¬change, shared whiteboards, discussion forums, and email.

15.2 Compare the different categories of collaboration technologies.
Collaboration technologies fall into one of two categories:
1. Unstructured collaboration (sometimes referred to as information collaboration) includes document ex¬change, shared whiteboards, discussion forums, and email.
2. Structured collaboration (or process collaboration) involves shared participation in business processes such as workflow in which knowledge is hardcoded as rules.

15.3 Define the fundamental concepts of a knowledge management system.
Knowledge management involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions.

15.4 Provide an example of a content management system along with its business purpose.
A content management system (CMS) provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment. The CMS marketplace is complex, incorporating document management, collaboration and versioning tools, digital asset management, and web content management. One example is www.vignette.com.

15.5 Evaluate the advantages of using a workflow management system.
Many workflow management systems allow the opportunity to measure and analyze the execution of a process. Workflow systems integrate with other organizational systems, such as document management systems and database management systems.

15.6 Explain how Groupware can benefit a business.
Groupware is software that supports team interaction and dynamics including calendaring, scheduling, and videoconferencing. Organizations can use this technology to communicate, cooperate, coordinate, solve problems, compete, or negotiate.



Business Driven Technology (Customized WMU Edition)
Baltzan & Phillips.

Tuesday, March 20, 2012

Mar 20 (Project 8): Information Security and Ethics

(Team - 75 pts) Casebook (pp 99-100)
Team presentations will be during class time on Apr 17.

Information Security Project: 2010/2011 CSI Computer Crime and Security Survey Analysis

Casebook (pp 99-100)
2010/2011 CSI Computer Crime and Security Survey
(You will be required to register for a free account to access the report. If you experience difficulties, please see your instructor.)

Project Objective
The Computer Crime and Security Survey is conducted by the Computer Security Institute (CSI) with the participation of the San Francisco Federal Bureau of Investigation’s Computer Intrusion Squad (FBI). The survey is the longest-running continuous survey in the information security field. This survey results are based on the responses of computer security practitioners in U.S. corporations, government agencies, financial institutions, medical institutions and universities. The survey addresses the major issues considered in earlier CSI/FBI surveys, thus allowing us to analyze important computer security trends. The long-term trends considered include:
(a) unauthorized use of computer systems;
(b) the number of incidents from outside, as well as inside, an organization;
(c) types of attacks or misuse detected, and;
(d) actions taken in response to computer intrusions.

Your next step is to follow the instructions below to work on the Information Security project. Your instructor will inform you where the 2010/2011 CSI Computer Crime and Security Survey file is posted so that you can print or access it. Each team will research and report on a separate topic related to information security:.

Parameters

This is a team project - Each team will be required to give a 8-10 minute presentation (2-3 minutes from each person) in class on your assigned topic (too long and too short are equally bad). Remember, you will be presenting technical information to a general audience.
Discuss the current trends for your assigned topic, based on the information within the CSI reports, and speculate on future trends and directions. You may wish to consult additional sources. Support your claims with credible information.
All team members must contribute equally to the presentation. All team members receive the same grade.

Your talk must include some form of visual reinforcement, but choose the medium carefully (PowerPoint, Web pages, handouts, etc.). Remember, a great PowerPoint presentation can (and should) enhance the program (not be the program). A poor (or over done) one can ruin it.
A laptop (WinXP with Internet access, MS Office, etc.) and projector will be provided. You may also use your own laptop if you prefer.
You do not need to dress up, but please remove caps, sunglasses, etc.
There is no written report required; only an in-class presentation

Teams (same as previous projects):

Team 1: Brigido A., John L., Brytny M., James W.
(Topic – Security Budgeting)
Figure 17 (Percentage of Security Budget for Security),
Figure 20 (Percentage of Security Budget Spent on Various Components)

Team 2: Anthony B., Daphne D., Christopher P., Thomas S.
(Topic – Outsourcing and Cyber Insurance):
Figure 18 (Percentage of Security Outsourced),
Figure 19 (Cloud Computing)

Team 3: Andrea F., Kyle P., Ryan P., Bradley T.
(Topic – Cybersecurity Breaches):
Figure 6 (Experienced Security Incidents),
Figure 11 (Percentage of Losses due to Insiders),
Figure 12 (Percentage of Losses that are Direct Expenses)

Team 4: Danielle H., Keith H., Kyle M., Benjamin W.
(Topic – Computer Attacks and Incidents)
Figure 8 (Number of Targeted Attacks),
Figures 9 and 10 (Types of Attacks Experienced by Percent of Respondents)

Team 5: Brian C., Callie L., Devin T., Christopher V.
(Topic – Security Technologies)
Figure 22 (Security Technologies Used),
 Figure 23 (Satisfaction with Security Technology)

Team 6: Jacob I., Jared L., Amanda P., Riley W., Curtis F.
(Topic – Security Audits and Security Awareness Training)
Figure 25 (Techniques Used to Evaluate Effectiveness of Information Security), Figure 26 (Techniques Used to Evaluate Effectiveness of Awareness Training)

Team 7: William K., Lauren M., Danielle R., Patrick S., Ryder S.
(Topic – Information Sharing):
Figure 13 (Actions Taken After an Incident),
Figure 14 (Reason for Not Reporting to Law Enforcement)

Team 8: Joshua B., Maggie B., Kali F., Elizabeth P., Justin S.
(Topic – Security Policy and Software Issues)
Figure 15 (How Would You Describe Your Information Security Policy),
Figure 16 (Software Development Process)

Mar 20 (Ch 14): Ebusiness

In the past few years, ebusiness seems to have permeated every aspect of daily life. In just a short time, both individuals and organizations have embraced Internet technologies to enhance productivity, maximize convenience, and improve com¬munications globally. This chapter focuses on the ebusiness processes changing the nature of the buyer-seller relationship, the role of information technology (IT), and organizational structures and tasks.

LEARNING OUTCOMES

14.1. Compare ecommerce and ebusiness.
Ecommerce is the buying and selling of goods and services over the Internet. Ecommerce refers only to online transactions. Ebusiness is the conducting of business on the Internet, not only buying and selling, but also serving customers and collaborating with business partners. The primary difference between ecommerce and ebusiness is that ebusiness also refers to online exchanges of information. For example, a manufacturer allows its suppliers to monitor production schedules or a financial institution allowing its customers to review their banking, credit card, and mortgage accounts.

14.2. Compare the four types of ebusiness models.
• Business-to-business (B2B) Applies to businesses buying from and selling to each other over the Internet.
• Business-to-consumer (B2C) Applies to any business that sells its products or services to consumers over the Internet.
• Consumer-to-business (C2B) Applies to any consumer that sells a product or service to a business over the Internet.
• Consumer-to-consumer (C2C) Applies to sites primarily offering goods and services to assist consumers interacting with each other over the Internet.

The primary difference between B2B and B2C are the customers; B2B customers are other businesses while B2C markets to consumers. Overall, B2B relations are more complex and have higher security needs; plus B2B is the dominant ebusiness force, representing 80 percent of all online business.

14.3. Describe the benefits and challenges associated with ebusiness.
Ebusiness is the conducting of business on the Internet, not only buying and selling, but also serving customers and collaborating with business partners. Ebusiness benefits include:
• Highly accessible
• Increased customer loyalty
• Improved information content
• Increased convenience
• Increased global reach
• Decreased cost

Ebusiness challenges include:
• Protecting consumers
• Leveraging existing systems
• Increasing liability
• Providing security
• Adhering to taxation rules

14.4. Explain the differences among eshops, emalls, and online auctions.
An eshop is a version of a retail store where customers can shop at any hour of the day without leaving their home or office. An emall consists of a number of eshops; it serves as a gateway through which a visitor can access other eshops. An online auction is a place where buyers and sellers come together to auction items and prices are determined dynamically.



Business Driven Technology (Customized WMU Edition)
Baltzan & Phillips.

Mar 20 (Ch 13): Creating Innovative Organizations

What do steamboats, transistor radios, and Intel’s 8088 processor all have in common? They are all disruptive technologies. Disruptive technologies redefine the competitive playing fields of their respective markets. Disruptive technologies tend to open new markets and destroy old ones. Sustaining technologies tend to provide us with better, faster, and cheaper products in established markets, but virtually never lead in markets opened by new and disruptive technologies.

LEARNING OUTCOMES

13.1 Compare disruptive and sustaining technologies.
Disruptive technology – a new way of doing things that initially does not meet the needs of existing customers
• Disruptive technologies redefine the competitive playing fields of their respective markets.
• Disruptive technologies tend to open new markets and destroy old ones.
• Disruptive technologies typically cut into the low end of the marketplace and eventually evolve to displace high-end competitors and their reigning technologies

Sustaining technology – produces an improved product customers are eager to buy, such as a faster car or larger hard drive
• Sustaining technologies tend to provide us with better, faster, and cheaper products in established markets
• Sustaining technologies virtually never lead in markets opened by new and disruptive technologies

13.2 Explain how the Internet caused disruption among businesses.
The Internet has completely disrupted the way businesses operate, employees communicate, and products are developed and sold. Here are a few examples:
• Travel site Expedia.com is now the biggest leisure-travel agency, with higher profit margins then even American Express.
• $35 billion annual online music downloads are wrecking the traditional music business.
• Dell increases profit margins while cutting prices by using the Internet to link suppliers and customers.
• eBay is one of the nation’s top 15 retailers.

13.3 Define the relationship between the Internet and the World Wide Web
The Internet is a global public network of computer networks that pass information from one to another using common computer protocols. The World Wide Web is a global hypertext system that uses the Internet as its transport mechanism. The World Wide Web operates on the Internet.

13.4 Describe the Internet’s impact on information along with how these changes are affecting businesses
The Internet has changed the way the world accesses, views, finds, and uses information.
• Easy to compile – searching for information on products, prices, customers, suppliers, and partners is faster and easier when using the Internet
• Increased richness – Businesses and customers can collect and track more detailed information when using the Internet
• Increased reach – Businesses can share information with numerous customers all over the world
• Improved content – Content and product description establish the common understanding between both parties to the transaction



Business Driven Technology (Customized WMU Edition)
Baltzan & Phillips.

Tuesday, March 13, 2012

Mar 13 (Chapter 12): Integrating the Organization

Organizations are anticipating that ebusiness will increase profitability, create competitive differentiation, and support innovative business practices. To achieve these goals, companies must evolve through distinct stages, from integrated processes to truly synchronized inter-enterprise communities. Getting ebusiness applications based on different technologies and with differing business models and data models to work together are key issues for 21st century organizations.

LEARNING OUTCOMES

12.1 Describe the role information plays in enterprise resource planning systems.
The primary purpose of an ERP is to collect, update, and maintain enterprisewide information. All of the functional departments access the same information when making decisions and solving problems.

12.2 Identify the primary forces driving the explosive growth of enterprise resource planning systems.
  • ERP is a logical solution to the mess of incompatible applications that had sprung up in most businesses
  • ERP addresses the need for global information sharing and reporting
  • ERP is used to avoid the pain and expense of fixing legacy systems

12.3 Explain the business value of integrating supply chain management, customer relationship management, and enterprise resource planning systems.

Most organizations piecemeal their applications together since no one vendor can respond to every organization’s needs; hence, customers purchase multiple applications from multiple vendors. For example, a single organization might choose its CRM components from Siebel, SCM from i2, financial from Oracle, and human resources from PeopleSoft. These applications must be integrated in order to gain an enterprisewide view of the information.



Business Driven Technology (Customized WMU Edition)
Baltzan & Phillips.

Mar 13 (Project 7): Business Reports through Web Queries

Project 7: Business Reports through Web Queries

(Individual - 60 pts) (due Nov 29)

» Casebook (pp 85-106)
» Business Reporting data

» Build an Excel spreadhheet as directed and submit to your instructor via email.



--------------------------------------------------------------------------------