-
James T. Foggie wrote a new post on the site MIS5208 Spring 2017 7 years, 6 months ago
The Daily IQ 2.0, the platform is being offered which aims to put the power of big data into the hands of its Small & Medium-Sized Enterprise (SMEs) customers in Australia. This article illustrates the need to […]
-
James T. Foggie posted a new activity comment 7 years, 6 months ago
I can’t help to think of the old saying “two wrongs don’t make a ‘right’!” A very good point was made about retaliating against the wrong person/entity. I can see where a retaliating victim could quickly become the criminal if an unsuspecting person becomes the ‘new victim’. The home intrusion analogy was very effective in illustrating the…[Read more]
-
James T. Foggie wrote a new post on the site MIS5208 Spring 2017 7 years, 6 months ago
Predictive Analytics is a major topic within my company. Along with Cloud and DevOps IT concepts, predictive analytics are viewed as a key component to gaining competitive advantage in the core markets in which t […]
-
James T. Foggie wrote a new post on the site MIS5208 Spring 2017 7 years, 7 months ago
In the world of Big Data Analytics, Pixels seem to be a significant ‘player’ with respect to analytics. Marketers use pixels to help them gather relevant data about web page visitors which allow them to better sha […]
-
James: thanks for posting this, as I mentioned in a prior post, I was a little concerned when Facebook started posting ads for the exact items I was recently searching for, and I just imagined it was all based on cookies. This was a good “intro to pixels” article. If I am reading this right, it would be safe to say that a conversion pixel tracks when a customer completes and action on the site, an optimization pixel tracks all of my “movements” (or clicks) on the site, and a data collection pixel categorizes me as a consumer based off the combination of the conversion and optimization pixels’ data?
-
-
James T. Foggie commented on the post, , on the site 7 years, 7 months ago
Very interesting article. I can remember not too long ago when my primary physician longed for the day when information could be interconnected to handle logical decision making (artificial intelligence) with respect to patient analysis. She also longed for an integrated billing and scheduling system that could process all patient data required…[Read more]
-
James T. Foggie commented on the post, Why I Always Tug on the ATM, on the site 7 years, 7 months ago
Blake, this a nice reminder that the threat of fraud exist at convenient ATM locations. I try to stick to using ATMs in local WaWa convenience stores; and I often give the unit a slight ‘tug’ to test the stability of the device. I first read an article on scimming some years ago. Having had my check card breached two years ago, I have also…[Read more]
-
James T. Foggie wrote a new post on the site MIS5208 Spring 2017 7 years, 7 months ago
Although a bit dated, I found this article to be an interesting read. The author provides a detailed account
on how Facebook using its massive amount of user data to create marketing competitive […]-
Good article James. Even I have seen this several times that if I am looking for a particular product to purchase on internet, I start seeing the advertisements for the same product while I am browsing my facebook page.
-
Thanks for sharing! Every click we made on the internet is being tracked. Professor mentioned briefly in class about Affinity analysis. I did some search online, affinity analysis is used to determine what advertisements should show up on user’s facebook page. Affinity analysis is a data analysis and data mining technique that discovers co-occurrence relationships among activities performed by (or recorded about) specific individuals or groups. In addition, Facebook calculates affinity score by looking at explicit actions that users take, and factoring in 1) the strength of the action, 2) how close the person who took the action was to you, and 3) how long ago they took the action.
-
-
James T. Foggie commented on the post, Gmail Hack to identify email id leaks to spammers, on the site 7 years, 7 months ago
This is GREAT info. I will definitely begin utilizing the ‘+___________’ option when registering on sites. It will be interesting to see just how many companies are selling email info out there on the open market!
Thanks!
-
James T. Foggie commented on the post, Spunk for Security: It's In the Data, Says CedarCrestone Architect, on the site 7 years, 7 months ago
Adam,
Thank you for this post. I actually read your post and the article earlier this week but am just now getting around to commenting. I thought the interview with Marquis Montgomery was excellent. His ability to share experiences on the use of Splunk in his workplace was valuable. Since other big data tools were previously used within his…[Read more] -
James T. Foggie wrote a new post on the site MIS5208 Spring 2017 7 years, 7 months ago
In chapter 1 of the “Big Data Analytics Using Splunk” text (Zadrozny and Kodali), the authors mention Hadoop, an open source software framework “that has the biggest name recognition in the big data world” (at the […]
-
Thanks for sharing James. I heard about Hadoop before as well. One of the downsides is that it is one such platform wherein only large business that generates big data can utilize its functions. It cannot efficiently perform in small data environments. It also lack preventive measures, like fo example the security measures are always disabled by default, so if the person responsible for data analytics does not know that, it’s an issue. It is also entirely built on Java. Now don’t get me wrong Java is the most widely used programming languages, but it has also been reported that cyber criminals can easily exploit the frameworks built on it.
-
-
James T. Foggie commented on the post, Progress Report for Week Ending, March 15, on the site 7 years, 7 months ago
As we (society) continue to grow in our dependence on technology and connectivity, end users must evolve in our ability to safeguard ourselves from cyber criminal attacks. I am not sure the common users are educating themselves to the vulnerabilities that exist. It seems creating personal resiliency and backup plans would lessen the impact of…[Read more]
-
James T. Foggie commented on the post, Progress Report for Week Ending, February 23, on the site 7 years, 8 months ago
Great post. Very good information for all of us in the ITACS program. Thank you.
-
James T. Foggie wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
In this article discusses ways credit unions should proactively approach potential cyber attacks.
Having been associated with credit unions for several decades, the one thing I noticed is that their overall […]
-
James T. Foggie wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
On Thursday, Feb 23 I attended a webinar facilitated by ACL which was entitled: “How two city auditors transformed their department”. The 60-minute overview was hosted by Nonie Dalton, ACL Senior Product Mana […]
-
James T. Foggie commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 7 years, 8 months ago
All good, sound measures for mitigating the risk of fraud. Ultimately, c-level executives will be tasked with factoring in the strategic objectives of the company and how fraud impacts them. A thorough risk assessment should determine a company’s risk tolerance. Then the challenge is to invest the proper amount of money to reduce or eliminate…[Read more]
-
James T. Foggie commented on the post, Why use ACL to detect fraud, on the site 7 years, 8 months ago
Thanks for this post!
In completing the lab this week I found it very interesting how ACL makes data analytics easier for the end user. If you work in IT for an extended period of time, you will experience numerous evolutions within technology. I can recall when relational databases became the ‘new’, ‘hot’ data structure in IT (in comparison…[Read more]
-
James T. Foggie commented on the post, Big Investors Aware of Cyber Threats but Often Unprepared, on the site 7 years, 8 months ago
Companies have to walk the fine line between incurring expense and protection from cyber breaches. In-depth risk assessments should be conducted to provide corporations with information to be able to make sound strategic plans with respect to securing their information (and the information of their customers). The other challenge companies face…[Read more]
-
James T. Foggie's profile was updated 7 years, 8 months ago
-
James T. Foggie wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
I find big data and data analytics to be a fascinating subject. During my search on the topic I came across this presentation (Fraud Detection and Mitigation: Network Analysis (part 1 & 2)) by Deloitte’s Scott M […]
-
James T. Foggie wrote a new post on the site MIS5208 Spring 2017 7 years, 9 months ago
After reading the text readings and reviewing the lecture slides from last week, the 2016 story of the Wells Fargo scandal came to mind. I wondered which risk factors for fraud would be more prominent when […]
-
Nice shared. Wells Fargo comes to my mind which is the last year scandal due to lack of internal control. As most of us know, Wells Fargo has recently disclosed that a large scale fraud has taken place within the company, which resulted in 5,300 employees being fired or about 2% of its workforce. Employees incentivized to open new accounts, such as credit and debit cards, simply started making up customers or adding accounts to existing customers without their consent.The banking giant has fired almost two percent of its entire global workforce for falsely opening accounts for customers in order to game compensation systems. They will also pay a fine of $185 million to the Consumer Financial Protection Board.
-
- Load More