MIS 5402 – Prof. Min-Seok Pang

Session 2-1 – IT Risk Management

Links to Jan 14 Video Clips

Recommended Readings and Debate presentation slides

IVK Incident Explanation – Richard Nornhold.pdf

IVK Debate – Disclosure – Shiva Smith.pdf

IVK Debate – Non-Disclosure – Eisha Moore.pdf

Break Industry’s Bottlenecks – Jennifer Rawding.pdf

Platforms and the New Rules of Strategy – Xiaotao Pu.pdf

The Great Decoupling – Poonam Nangalia.pdf

Sign-Up for Presentations and Participation for Jan 14

For Jan 14, we will need presenters and debaters as follows. Please sign up! It is a first-come-first-serve. A presenter or a debater will get a waiver for one reading brief and participation credits.

When signing up, please mention which article you’d like to present or which role you’d like to play. If you don’t mention it, your sign-up will not count.

Presentations of a Recommended Reading

Presentation of IT Adventures Ch. 10 and 11

  • I am looking for someone with technology smart who can translate technical terms and jargons in IT Adventures Ch 10 and 11 to the classmates with business smart.

Debaters

  • One debater who will argue that IVK should disclose the incidents in IT Adventures Ch 10. (I prefer someone who has experiences or backgrounds in legal.)
  • Another debater who will argue that IVK should NOT disclose the incidents. (I prefer someone with technology smart.)

Session #2-1 – IT Risk Management – In-Class Discussion Questions

  • If you were Mr. Barton, how would you explain the situation in Chapter 10 to your CEO, Mr. Carl Williams, in English?
  • If you were Mr. Barton, how would you explain the situation in Chapter 10 to Wall Street analysts you’re scheduled to meet today?
  • What do we know for sure? What are the things that we are not sure?
  • Did an attacker or attackers intrude inside of IVK’s systems?
  • Why do you think this happened? If the security upgrade project was funded and completed, could IVK have prevented this completely?
  • What are the roles of board of directors in a business?
  • What would happen if a CIO or IT managers receive no adult supervision or control? What if he/she can handle IT in any way he/she wants?
  • What should be among the preventative policies and procedures for a failure due to personal devices?
  • What are the three recovery options that IVK IT group is considering?
  • What are the reasons to disclose the security incidents? What would be the reasons not to disclose?
  • Why has Mr. Williams decided to do nothing and not to disclose the incident? What was his thinking?