Information Systems in Organizations

Class Reader

Anti-Hacker Executive Order: 5 Concerns

http://www.govinfosecurity.com/anti-hacker-executive-order-5-concerns-a-8072

This article talks about how President Obama plans to deal with what he called a “national emergency”.  This emergency is the result of the ongoing problem that computer hackers are causing by disrupting U.S. businesses and government agencies. To help fight against this issue, the President has signed an Executive Order which will allow government agencies to block or seize the assets of such perpetrators. Although this seems fair and just, many questions and concerns arise from some security experts. These concerns include: the legality of evidence gathering, finding where these attacks are truly coming from, where the “intelligence” is coming from and the possible negative reactions that some countries may have if the U.S. were to impose sanctions on them.

As former Dept. of Justice official Mark Rasch calls it, “This is essentially a cold cyberwar – we’re treating cyber-attacks like any other type of attack and reserving our right to respond with sanctions”

Questions:

Are we heading into this “war” too fast or has this emergency gone on long enough? Any ideas on how to stop these attacks?

If another country is allegedly behind such attacks should our government get involved in this cyberwar by way of sanctions or are the possible economic consequences too unpredictable?

Since most of the government’s cyber attack intelligence comes from the private sector, can we truly rely on this information to make judgement, what can be done to have more reliable information?

5 security questions you should be asking about the Apple Watch

http://www.infoworld.com/article/2909555/security/5-security-questions-you-should-be-asking-about-the-apple-watch.html

My class reader will discuss the security of your mobile devices. I came across an article that discusses security experts concerns with the soon to be released Apple Watch. Security experts already have a problem with Apple, as there is an app that can turn your Iphone into a bugging device. (http://www.csoonline.com/article/2880753/mobile-security/new-ios-spy-app-listens-in-to-conversations.html) There is an app that when downloaded on to your phone, the hacker can record all conversations near the phone. This was believed to be designed to eavesdrop on political figures, foreign dignitaries and industrial competition. Apple is aware of the app and in the latest version of Ios8 it will appear as a downloaded app, however if you are using an earlier IOS there is no way to know that app is on your phone. As for the watch, it must be in close proximity to your Iphone in order to work. Security experts are concerned, there is 2 points of possible entry. One being the wifi connection and the second is the bluetooth. The third question for Apple is are all of the 3rd party Apps trustworthy. Another issue is many work places are now banning smartphones in areas with confidential information. I work for a mortgage company and have access to many celebrities private information and it is strictly forbidden to have any phone with a camera on it on your desk. Lastly security experts believe the watch will allow more vulnerability to hackers gaining access to Iphones. I own an Iphone, so I found this interesting and I also researched if Android has similar issues and they do. (https://blogs.mcafee.com/consumer/major-browser-vulnerability-found-on-android)

Questions:

1. Do you have personal info on your phone, that would be upsetting if it got out? for example Credit Card info, etc?
2. Do you feel safe that your info is protected?
3. Does this make you any more or less interested in purchasing an Apple Watch?

GM Uses GIS to Increase Sales

http://techpageone.dell.com/business/how-gm-uses-big-data-to-generate-sales/

General Motors (GM) is using big data analytics, specifically Geographic Information Systems (GIS), to assist in making business decisions. Geographic information systems create, store and analyze data that pertains to geographic information. For example, GM uses the ArcGIS system by ESRI which tells GM where their customers live, how far they are willing to drive to purchase a vehicle, and if two dealerships are overlapping geographically regarding their customer bases. GM knows who buys their luxury brands and where they live which allows GM to figure out where to put dealerships that can fulfill those specific wants and needs. The ArcGIS also helps GM to better market its brand through ads. “By feeding detailed demographic and spatial data to marketing, the automaker can then direct its ad spend to the right areas.” General Motors uses GIS to better fulfill their customers’ needs, to cut down on wasted spending, and ultimately to increase sales.

 Discussion Questions:

 1: Do you think that the use of GIS is an invasion of consumers privacy?

2: Do you think GIS benefits just GM, or do you think there are benefits to the consumer as well?

Video Technology in Retail World

http://www.forbes.com/sites/avigilon/2014/11/14/retail-and-business-intelligence-how-video-technology-can-impact-the-bottom-line/

In order to stay ahead in the competitive retail world, retail stores must emphasize the use of business intelligence to succeed in the marketplace. In this article, through the HD video cameras and special analysis software retail stores are able to mine data from video and use it to analyze consumer behaviors and shopping patterns.

One of the methods is synthesizing data to generate heat maps of where most traffic occurs, allowing stores to learn where to properly place merchandise and displays to better meet consumers needs. Through video analytics, retailers are able to learn about the patterns shoppers use to navigate through out the store, gather data for future marketing campaigns, as well as prevent shoplifting.

 

1. Do you see video analytics as a valuable tool for retailers to implement in order to gain insights into its customer shopping habits and patterns?

 

2. Do you think that using video analytics in retail stores can cause privacy concerns for the shoppers?

 

3. Do you think using digital data for business intelligence purpose really has an impact on the stores performance and success? And do you see more retail stores use this analytic software in the future to gain competitive advantage?

Hololens and Conference Calls

Many people use conference calling on a daily basis. It is only recently that we have been able to do video conference calling as well. But how much better would it be for us to be able to have virtual conference calling? Microsoft has announced their newest project known as HoloLens which will be a virtual reality. This will allow people “the ability to work within [their] most idealized context. Users will now be able to provide their own personalized setting during their sell of a new product, or the next big idea that they are trying to bring to their company. HoloLens will bring to life the perfect setting for different people. This could be the future of conference calling.

 

http://www.informationweek.com/strategic-cio/it-strategy/microsoft-hololens-could-make-conference-calls-really-fun/a/d-id/1318965?

 

Discussion Questions:

1. Companies are always trying to enhance their ways of communication. Do you think they could benefit from using HoloLens when it is released? If so, how? If not, why is that?

2. Could HoloLens possibly take over conference calling entirely?

3. Would HoloLens only be beneficial to Conference calling or is there another way it could be used?

 

E-Commerce and Social Media

Twitter is taking advantage of the emerging trend of E-Commerce but adding a “buy button” and now a new feature called Twitter Offers.  Twitter Offers allows users to add the offer to their debit or credit card and then can redeem the offer when shopping at the companies online store or brick and mortar store.  Users wont have to have any physical coupons, the offer is saved on their card when they shop at the store.  The Twitter Offers dal is available to marketers that purchase the a “promoted tweet” to have the tweet show up in user’s timelines.

 

Article:  http://www.entrepreneur.com/article/240307

 

Discussion Questions:

1)  Do you think this new trend of E-Commerce will catch on with other social media outlets? And how do you think users of twitter will respond to this new feature?

2)  When do you think it would be smart for a company to buy into using this feature?

Retail Stores for E-Commerce

E-Commerce is the new marketplace with many benefits such as ease of access, but there are also some disadvantages to e-commerce. For example a consumer buying clothes from a website is not able to try them on before making the purchase. This article looks at a possible solution to this problems. It explains how giving customers the chance to have a hands on experience with a product can be beneficial for e-commerce businesses.

Article:     http://www.entrepreneur.com/article/239690

Discussion Questions:

Do you think combining e-commerce with brick and mortar stores is an effective way for e-commerce companies to increase their sells?

What are some possible reasons why an e-eCommerce company might not want to invest in a retail store?

Innovation in the Private Transportation Industry

This article explains how the “black car” transportation start-up Uber, grew into a disruptive innovation. Through the use of technology, Uber has distinguished itself from the traditional private transportation system by solving many of the issues that customers are frequently facing. Some of the specific benefits of using Uber’s services include: Convenient payment transactions, reduced waiting times, interactive driver rating systems, and increased customer service. Uber now provides service on a global level and continues to grow every day.

Article:  https://growthhackers.com/companies/uber/

Questions for discussion:

1. Do you believe that a service like Uber could diminish the traditional taxi/private transportation system? Will current taxi companies be forced to incorporate new information systems or technology?

2. What are some possible issues/pitfalls of the technology or service models of Uber?

3. Are there any other specific industries that could benefit from a similar service model and information system used by Uber?

Can Snail Mail turn into the Holy Grail?

Can snail mail evolve into the Holy Grail?  The USPS faces many challenges from a perceived decline in necessity to competitors such Amazon, Google, and Fed Ex.  Does the USPS have the right tools and resources to compete with their digitally advanced competitors or will their steady decline lead to demise.  Well the truth of the matter is that the USPS has the technology to compete with initiatives such as drone deliveries and 24/7 delivery lockers, but they face challenges that many government agencies face when it comes to being competitive.  They lack great funding and ultimately decisions regarding its success are made from political standpoints as opposed to business perspectives. Take a look at this article and look at how the USPS has the technology advancements to compete in today’s world but face challenges.

http://resources.idgenterprise.com/original/AST-0136185_CWD_2014_December.pdf (pgs.12-19)

 

The USPS has great minds with the technical knowledge comparable to those in Silicon Valley.  Postal workers cell phones are already being replaced with Mobile Delivery Devices that allow packages to be tracked in real time at any given point.  Imagine that a business owner would know exactly when a customer’s package arrives and can then instantly send an electronic communication to the customer with a receipt and possibly a coupon. These Mobile Delivery Devices are also equipped to allow carriers to adjust their course to the fastest and most productive routes.  Is it possible that we can all receive our mail before noon?  There is an influx of data and technology prevalent within the USPS that can reinvigorate its perception and lead to sustainability but will the normal government obstacles prevent its evolution?

 

Discussion questions?

  1. Do you think the USPS can be competitive with technology leaders such as Amazon and Google?
  2. With advancements in technology can the USPs change their “snail mail” perception?

Fighting Cyber Attacks with the Zero-Trust Model

http://www.computerworld.com/article/2851517/network-security-needs-big-data.html

In our rapidly evolving digital age, we have come to know that security is a big issue. In the last year, 60% of organizations targeted fell victim to a cyber attack. These breaches are a prominent side effect of our growing digital age but we should be working to make sure this risk is minimized. One option to improving our security situation is the Zero-Trust Model (ZTM). While older models worked to “trust but verify” data coming in, the ZTM works under the assumption that every file is a potential threat and works to inspect it. ZTM also says companies should be analyzing internal network traffic and giving employees very limited access to the network. So far, many organizations have jumped on board with at least a few of ZTM’s main concepts.

However, “ZTM will generate enormous volumes of real-time data, the analysis of which will have IT managers drowning in log files, vulnerability scan reports, alerts, reports and more.” This means a large amount of big data analytics will be needed to assist in gaining a more comprehensive view of the company’s security landscape. Furthermore, big data will be changing the nature of computer network security, ” including network monitoring, the authentication and authorization of users, identity management, fraud detection, and systems of governance, risk and compliance. Big data will also change the nature of the security controls, such as conventional firewalls, anti-malware and data loss prevention.”

Finally, in the upcoming years, data analysis tools will be evolving to further advance the capabilities of security models, meaning there is great opportunity for companies, new and old, to come out and introduce new products.

Questions to Consider:

1. There are obvious gains to adopting ZTM, but what are the risks? Risks associated with big data?

2. Why have companies been victimized in the first place? Should they try to improve already existing measures or implement new ones before applying the stricter ZTM concepts?