James T. Foggie

  • Although a bit dated, I found this article to be an interesting read. The author provides a detailed account
    on how Facebook using its massive amount of user data to create marketing competitive […]

    • Good article James. Even I have seen this several times that if I am looking for a particular product to purchase on internet, I start seeing the advertisements for the same product while I am browsing my facebook page.

    • Thanks for sharing! Every click we made on the internet is being tracked. Professor mentioned briefly in class about Affinity analysis. I did some search online, affinity analysis is used to determine what advertisements should show up on user’s facebook page. Affinity analysis is a data analysis and data mining technique that discovers co-occurrence relationships among activities performed by (or recorded about) specific individuals or groups. In addition, Facebook calculates affinity score by looking at explicit actions that users take, and factoring in 1) the strength of the action, 2) how close the person who took the action was to you, and 3) how long ago they took the action.

  • This is GREAT info. I will definitely begin utilizing the ‘+___________’ option when registering on sites. It will be interesting to see just how many companies are selling email info out there on the open market!


  • Adam,
    Thank you for this post. I actually read your post and the article earlier this week but am just now getting around to commenting. I thought the interview with Marquis Montgomery was excellent. His ability to share experiences on the use of Splunk in his workplace was valuable. Since other big data tools were previously used within his…[Read more]

  • In chapter 1 of the “Big Data Analytics Using Splunk” text (Zadrozny and Kodali), the authors mention Hadoop, an open source software framework “that has the biggest name recognition in the big data world” (at the […]

    • Thanks for sharing James. I heard about Hadoop before as well. One of the downsides is that it is one such platform wherein only large business that generates big data can utilize its functions. It cannot efficiently perform in small data environments. It also lack preventive measures, like fo example the security measures are always disabled by default, so if the person responsible for data analytics does not know that, it’s an issue. It is also entirely built on Java. Now don’t get me wrong Java is the most widely used programming languages, but it has also been reported that cyber criminals can easily exploit the frameworks built on it.

  • As we (society) continue to grow in our dependence on technology and connectivity, end users must evolve in our ability to safeguard ourselves from cyber criminal attacks. I am not sure the common users are educating themselves to the vulnerabilities that exist. It seems creating personal resiliency and backup plans would lessen the impact of…[Read more]

  • Great post. Very good information for all of us in the ITACS program. Thank you.

  • In this article discusses ways credit unions should proactively approach potential cyber attacks.

    Having been associated with credit unions for several decades, the one thing I noticed is that their overall […]

  • On Thursday, Feb 23 I attended a webinar  facilitated by ACL which was entitled: “How two city auditors transformed their department”. The 60-minute overview was hosted by Nonie Dalton, ACL Senior Product Mana […]

  • All good, sound measures for mitigating the risk of fraud. Ultimately, c-level executives will be tasked with factoring in the strategic objectives of the company and how fraud impacts them. A thorough risk assessment should determine a company’s risk tolerance. Then the challenge is to invest the proper amount of money to reduce or eliminate…[Read more]

  • Thanks for this post!

    In completing the lab this week I found it very interesting how ACL makes data analytics easier for the end user. If you work in IT for an extended period of time, you will experience numerous evolutions within technology. I can recall when relational databases became the ‘new’, ‘hot’ data structure in IT (in comparison…[Read more]

  • Companies have to walk the fine line between incurring expense and protection from cyber breaches. In-depth risk assessments should be conducted to provide corporations with information to be able to make sound strategic plans with respect to securing their information (and the information of their customers). The other challenge companies face…[Read more]

  • James T. Foggie‘s profile was updated 1 month, 2 weeks ago

  • I find big data and data analytics to be a fascinating subject. During my search on the topic I came across this presentation (Fraud Detection and Mitigation: Network Analysis (part 1 & 2)) by Deloitte’s Scott M […]

  • After reading the text readings and reviewing the lecture slides from last week, the 2016 story of the Wells Fargo scandal came to mind.  I wondered which risk factors for fraud would be more prominent when […]

    • Nice shared. Wells Fargo comes to my mind which is the last year scandal due to lack of internal control. As most of us know, Wells Fargo has recently disclosed that a large scale fraud has taken place within the company, which resulted in 5,300 employees being fired or about 2% of its workforce. Employees incentivized to open new accounts, such as credit and debit cards, simply started making up customers or adding accounts to existing customers without their consent.The banking giant has fired almost two percent of its entire global workforce for falsely opening accounts for customers in order to game compensation systems. They will also pay a fine of $185 million to the Consumer Financial Protection Board.

  • Blake, you hit the nail on the head! I especially think you comments apply to internal auditors. It is the job of our internal auditors to ensure that our IT units are in compliance with Sarbanes-Oxley requirements. The specific tasks of the internal auditor is to ensure that all business units can pass external SOX audits indicating 100%…[Read more]

  • Very interesting site for sure. Some of the items listed under the ‘initial detection of occupational fraud’ tab reminds me of a situation my wife encountered. My wife worked for a large credit union; she was the regional manager for the state of New Jersey. One of her branches had an issue which required an immediate audit of the branch. From…[Read more]

  • Professor,

    Are supposed to post our presentations on our class site?


    • James, that is entirely up to you. If you want to post your presentation you can do that. I will set this up so you can also add files to your posts. You can also share them via Google Drive, and then post the link here.

  • David, it is hard to say if a background check would have uncovered the potential problem. From the outside looking in, this was a person with a wife, a suburban home, 2 kids and big smile! I am not sure whether or not financial problems existed in the household. As for the drinking, I would describe him as a functioning alcoholic. It was until…[Read more]

  • While completing this week’s reading assignment, I could not help to recall an act of fraud that was committed by a good friend of mine. In chapter 2 of the ‘Computer-Aided Fraud, Prevention & Detection’ text, […]

    • This is a really compelling story – told first hand. This is a very common issue – gambling addiction. One compensating control for this type of fraud is to do periodic credit checks (annually) on high-value, high risk employees. Folks that get themselves into trouble like this usually have deteriorating credit scores.

    • James: great example and I am sorry to hear about your friend; that is an unfortunate series of events. Your friend, however, is a great example of what a “motivated” employee can do when the opportunity presents itself and the rationalization is there. I am sure that once he noticed he could get away with taking the money, it started as just borrowing it to help himself get out of a jam. A slippery slope and your story tells what usually happens next. This situation is why, in my opinion, employees are the strongest and weakest link in an organization. Like you said, here is a great guy who probably started off as a dedicated, model employee, and then several bad decisions later (that had nothing to do with work or his company) and he is exploiting a lack of controls for personal, criminal financial gain. It is incredibly difficult to mitigate this type of risk because the pattern, if there even is one, is so hard to detect. To professor Ferrara’s point, how many employers need to look deeper into employee evaluations, and not just for new hires? Furthermore, how does a company even begin to identify these people – what are the characteristics / requirements for this type of annual check outside of the type of position they hold? Do you think your friend would have been identified as a high risk, high value employee if his company had similar controls?

      • David, it is hard to say if a background check would have uncovered the potential problem. From the outside looking in, this was a person with a wife, a suburban home, 2 kids and big smile! I am not sure whether or not financial problems existed in the household. As for the drinking, I would describe him as a functioning alcoholic. It was until after the report of this case, did we (his friends) discover he had several DUIs which significantly impacted his ability to function in his career field. The personal demons definitely led to the ultimate crime of financial fraud.

  • James T. Foggie posted a new activity comment 2 months ago

    Hi everyone. my name is James Foggie. I am originally from Philadelphia. I currently reside in South Jersey and work in the central part of the state. I am an IT manager with over 20 year of experience, mainly in data center operations. I have a business undergraduate degree and a master’s degree in Management Information Science; both from T…[Read more]

  • Load More
Skip to toolbar