Sunday, April 26, 2009

Chapter 7: Monitoring Employees in Networks: Unethical or Good Business?

1. Should managers monitor employee email and internet usage? Why or why not?

Yes, I do think they should monitor employee email or internet usage because it can impact the company’s success. Many employees take advantage of the internet accessibility at work and spend more time on the internet than deems necessary. Although it can be looked at as “big brother,” the company pays their employees to do work and provides these services because they are necessary for the work environment. The company needs to do what is best for its success and if they need to monitor their employees than they have every right to do so.

2. Describe an effective e-mail and Web use policy for a company?

An effective e-mail and Web use policy for a company would comprise of a detailed description of what employees are allowed and prohibited from doing while at work. This policy should allow employees at least 30 minutes a day for personal use. The company can also provide certain computers designated for personal use that their employees can have access to so that when off company time they can use these computers. This may prevent the company from being vulnerable to viruses and hackers because they can be connected to different networks/servers.. The policy can also allow employees to use the internet and e-mail for personal use when on lunch, break or off company time. It is important for the firm to make the work place comfortable and prevent it from feeling like they have no rights. This is why I feel the firm should try to accommodate personal e-mail and internet usage because some employees have very little time and emergencies may arise where they need to use these services.

Article Chapter 8: Finjan Stops Malware at the Gateway

George, R. (2009). Finjan Stops Malware At The Gateway. Information Week, March 16, 2009, 42-43

Firewalls and virus engines are increasingly useless as hackers, spyware developers and crimeware groups figure out how to avoid enterprise IT shops. Finajan is trying to tackle this problem by developing SP-6100 a midrange secure gateway appliance. This allows real-time behavioral analysis to thwart spyware developers who have figured out the inner workings of traditional URL filters and spyware engines. The Sp-6100 run on IBM server hardware and takes URL and signature-based protection to the next level by actually executing the code of the site you’re visiting in a sandbox in real time.
For example, a site may be deemed safe by a traditional URL filter, but a detailed behavioral check by Finjan might reveal an attempt to write to our registry. Finajan also has the ability to scan for and block sites that are attempting to exploit specific Windows or Internet Explorer vulnerabilities.
I chose this article because it related to chapter eight and is a security feature that can be purchased by a firm in order to protect itself from malware. I also chose this article because it describes a new appliance that can be used in sync with McAfee, Kaspersky, Sophos and Websense which are signature based URL and virus filters. I have McAfee and my laptop was infected with several viruses. So this is an indication that firewalls and virus engines are becoming useless and there is a need for better security appliances that users can subscribe too.

Sunday, April 19, 2009

Ch. 6 Article: Should the President have the Power to Unplug?

Hoover, N.J. (2008) Should The President Have the Power to Unplug? Information Week, 19.

The U.S. government is considering significant changes to federal cybersecurity regulations. The bill would give the president explicit power to turn off computer networks in the interest of national security. The bill and related legislation came after the Defense Department said it spent $100 million in just six months fighting cyberattacks. The White House nears the completion of a national cybersecurity review. The major attack on the Internet’s root DNS servers, are targeted at federal networks, which would make it necessary for the president to order a shutdown of significant networks. Some attacks have been addressed by blocking certain IP’s. Unfortunately this doesn’t always address all cyberattacks.
This article relates to this chapter because it relates to data mining. The U.S. government uses some type of data mining to view what goes on in the cyber world. The book addressed the issue that data mining encounters privacy issues. The government needs to have business intelligence so that it can protect the U.S. citizens but this can also become intrusive. It is difficult to have the right balance because people have different perspectives on this issue.

Chapter 5: Case Study Thermos vs. ResortCom

Compare Thermo’s experience with an application software provider with the experience of ResortCom.

Thermo’s had an easier time implementing the software whereas ResortCom came across some problems which delayed the implementation of its CRM system.

Why do you think Thermos had an easier time with a hosted software service than ResortCom? What management, organization and technology factors account for the difference?

Thermos moved to a hosted on-demand service provided by Oracle Corporation. They used Oracle E-Business, Oracle Warehouse Management, Oracle Order Management and Oracle Financials. The implementation process went smoothly because Thermos decided to use the services Oracle provided and adopted Oracles business process. They didn’t change the on-demand service to make it work with their current business process. As a result Thermos didn’t have any problems implemented Oracle and were able to see improvement within the Business.
ResortCom International’s experience with an application service provider didn’t go so well. They decided to use a hosted on-demand CRM system from RightNow Technologies. Although it appeared that this CRM system met most of their needs the system implementation process did not go smoothly. This was a result of ResortCom International’s request for automated features within the system. RightNow Technologies had to customize the software so that it met ResortCom International’s needs which became problematic.

If your company was considering using an application service provider, what management, organization, and technology factors should be addressed when making your decision?

If my company was considering the use of a service provider I would address the following:
i. Look into renting vs. buying IT assets
ii. Market demand for the firms services (inventory the services the company currently provides, survey the groups to see if the services you currently offer are meeting the needs of each group)
iii. Analyze the company’s business strategy and try to asses what new services and capabilities may be required.
iv. Asses what technology competitors offer to customers, suppliers and employees.

Sunday, April 12, 2009

Article: As Satyam Seeks Buyer, Customers Seek Exit: Fraud Fallout

This article was from the magazine Information Week: Paul McDougall. As Satyam Seeks Buyer, Customers Seek Exit. Information Week, Issue 1,223 , pg 24.

This article discusses the scandal that Satyam is currently undergoing due to the companies Chairman Ramalinga Raju unethical behavior. Ramalinga admitted to falsifying the company's cash position by as much as one billion dollars. They also overstated their quarterly earning and revenue. The company is also under investigation for submitting fake employee numbers and other data.
Satyam is an Indian IT outsourcer that provides services to some U.S. companies such as: Selective Insurance Group, SanDisk, Caterpillar and State Farm. They provide IT staff requirements for these companies that need IT project assistance such as the buildout of an ERP system. Due to the scandal they are facing some of their current customers are unhappy with their services because Satyam has not been able to complete projects due to their financial difficulty. The companies I briefly mentioned that currently have contracts with this company are looking to terminate their contracts.
The company is seeking new ownership in hope of distancing themselves from the scandal. They are looking for an investor to take a 51% stake in the company. Some of the interested investors are: Larsen & Turbo and IBM.
This article relates to our topic which will be discussed this week which is on Ethical and Social Issues in Information Systems. The company Satyam is in trouble right now because upper management made unethical decisions. As a result they have not only affected the company but their customers as well. The companies which relied and trusted them as a company were lied to and now their projects are not complete and the companies are in a bind with Satyam which can't deliver what they promised. The book discusses some recent cases that demonstrate failed ethical judgement by senior management. The repercussions of these decisions affected a lot of people who trusted these companies.
When establishing a company you design monitoring policies in order to prevent what Satyam is currently undergoing. Although this is supposed protect the integrity of the company it doesn't control the acts that human beings take. Information systems can be used to track a lot of things within a company but one thing it can't do is control human behaviors.

Case Study Ch. 3: Blockbuster vs. Netflix

1. What is Blockbuster's business model? How successful has it been?

Blockbuster has divided its core capabilities into two divisions. The first division focuses on the online target customer and the second division focuses on the "in -store" customer. Their decision to keep the two as its own entity has benefited the company because they require different distribution channels. Although Blockbuster entered the online business knowing that Netflix had a large amount of the market share they have successfully acquired some of the market share in a short period of time. Blockbuster is in a good position because it can target both online and offline customers. Their ability to get online customers to visit their rental stores will also increase their share in the rental industry.

2. What industry and technology forces have challenged that business model? What problems have they created?

The industry and technology forces that have challenged Blockbuster's business model are the companies that have entered the industry, such as Movielink and CinemaNow. Another force that has affected the company is the change in technology. Their target customer has the ability to purchase movies using a cable company. This has created some problems within the rental industry because their market share is affected when customers have the ability to rent through their cable company. Another major problem that may arise in the near future due to the different forms that movies are being viewed. Their is discussion that DVDs may become obsolete and if this occurs Blockbuster needs to have the infrastructure in place to make the right changes.

5. Do you think Blockbuster or Netflix will succeed in the future? Explain your answer.

I believe both companies will succeed if they are capable of keeping up with the change in technology. They need to have the ability to foresee and plan for the changes that will take place as the technology continues to advance. In order for both companies to succeed they need to focus in their core capabilities and invest the time and money to keep that market share.

A little bit about me ...

Hi my name is Rosali Garcia and I currently reside in Camarillo. I work for a Biotechnology company called Life Technologies (formerly Invitrogen). I work in the Tissue Culture department and work with Hybridoma and cancer cell lines. This is my last quarter :) and I will graduate this Spring with a dual Master's degree in Biotechnology and Business Administration. I enjoy working out and spending time with my family and friends!