J. Inf. Technol. Educ. Discuss. Cases最新文献

筛选
英文 中文
Standard Bank: The Agile Transformation 标准银行:敏捷转型
J. Inf. Technol. Educ. Discuss. Cases Pub Date : 2017-12-22 DOI: 10.28945/3923
K. Johnston, T. Gill
{"title":"Standard Bank: The Agile Transformation","authors":"K. Johnston, T. Gill","doi":"10.28945/3923","DOIUrl":"https://doi.org/10.28945/3923","url":null,"abstract":"Josef Langerman, Head of IT Transformation for Standard Bank, reflected on the extraordinary transformation that his organization’s IT group had recently experienced. Over the past three years, Standard Bank’s IT group had changed from the relatively well accepted systems development lifecycle/waterfall model to a revolutionary large scale agile approach. The results had been gratifying. But it left a question unanswered. Now that things were starting to stabilize, what should be the next steps? The 154-year-old Standard Bank was the largest banking group in Africa, and the 5 largest company headquartered in South Africa. The bank offered a range of corporate, business and personal banking as well as financial services. Its 49,000 employees served over 15 million customers, in 20 countries across the continent of Africa, as well as other countries scattered around the globe.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116965184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SiteWit Corporation: SQL or NoSQL that is the Question SiteWit公司:SQL还是NoSQL,这是个问题
J. Inf. Technol. Educ. Discuss. Cases Pub Date : 2017-12-22 DOI: 10.28945/3908
D. Berndt, Ricardo Lasa, J. McCart
{"title":"SiteWit Corporation: SQL or NoSQL that is the Question","authors":"D. Berndt, Ricardo Lasa, J. McCart","doi":"10.28945/3908","DOIUrl":"https://doi.org/10.28945/3908","url":null,"abstract":"This teaching case focuses on a start-up company in the Web analytics and online advertising space, which faces a database scaling challenge. The case covers the rapidly emerging NoSQL database products that can be used to implement very large distributed databases. These are exciting times in the database marketplace, with a flock of new companies offering scalable database systems for the cloud. These products challenge existing relational database vendors that have come to dominate the market. The case outlines four potential solutions and asks students to make a choice or suggest a different alternative to meet database scaling goals.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124586100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Behind Enemy Lines 敌后
J. Inf. Technol. Educ. Discuss. Cases Pub Date : 2017-12-22 DOI: 10.28945/3928
J. Elder, Nicole Jacobson, Natalie Remsen, Kim Wilmath
{"title":"Behind Enemy Lines","authors":"J. Elder, Nicole Jacobson, Natalie Remsen, Kim Wilmath","doi":"10.28945/3928","DOIUrl":"https://doi.org/10.28945/3928","url":null,"abstract":"In case you happen to be planning to know how to obtain Behind Enemy Lines eBooks, you need to go thorough study on popular search engines like google together with the keywords and phrases download John R. Hibbing PDF eBooks in order for you personally to only get PDF formatted books to download which are safer and virus-free you will discover an array of sites catering to your demands. The majority of these web sites possess a enormous collection of PDF eBooks which you are able to use to your advantage.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"141 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grandon.com Got Hacked! Grandon.com被黑了!
J. Inf. Technol. Educ. Discuss. Cases Pub Date : 2017-12-22 DOI: 10.28945/3914
Taufeeq Mohammed, Utkarsh Shrivastava, Ashish K. Das, Q. Nguyen
{"title":"Grandon.com Got Hacked!","authors":"Taufeeq Mohammed, Utkarsh Shrivastava, Ashish K. Das, Q. Nguyen","doi":"10.28945/3914","DOIUrl":"https://doi.org/10.28945/3914","url":null,"abstract":"Dr. T. Grandon Gill, a Professor in the Information Systems and Decision Sciences Department at the University of South Florida, was traveling with his family in England when he received a strange phone message. Not being able to respond, he ignored it until—a couple of days later—he was notified that access to his personal website had been suspended (see Exhibit 1). Grandon.com had, once again, been hacked--for the 7 time.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114066179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Employing Dynamic Logic in Cybersecurity 动态逻辑在网络安全中的应用
J. Inf. Technol. Educ. Discuss. Cases Pub Date : 2017-12-22 DOI: 10.28945/3915
T. Gill, Bernardo Rodrigues
{"title":"Employing Dynamic Logic in Cybersecurity","authors":"T. Gill, Bernardo Rodrigues","doi":"10.28945/3915","DOIUrl":"https://doi.org/10.28945/3915","url":null,"abstract":"Dr. Leonid Perlovsky, distinguished physicist and cognitive scientist, pondered this question, which could have a significant impact on his research direction in the years to come. Over the past few decades, he had developed and refined algorithms for distinguishing objects in images, an approach that had found its way into various classified U.S. Department of Defense (DoD) applications. Now he was looking for new potential opportunities to see his research applied, allowing it to evolve further. One of the most interesting aspects of Perlovsky’s approach was that it was very similar to that taken by the human brain in processing sensory information. It began with a very vague model of what might or might not be present in the data being examined. Through successive iterations, analogous to the layers of processing used in human sensory systems, the patterns in the data corresponding to objects would grow more and more distinct until, finally, they became recognizable. Unlike most statistical techniques, this approach— termed “dynamic logic” by Perlovsky—did not require that a model be specified in advance. As such, it was well suited for contexts that required discovery.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123958890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Digitally Enabled Strategic Sourcing Process to Mitigate Risk 数字化战略采购流程降低风险
J. Inf. Technol. Educ. Discuss. Cases Pub Date : 2017-12-22 DOI: 10.28945/3912
Kim Cupido, Jean-Paul Van Belle
{"title":"A Digitally Enabled Strategic Sourcing Process to Mitigate Risk","authors":"Kim Cupido, Jean-Paul Van Belle","doi":"10.28945/3912","DOIUrl":"https://doi.org/10.28945/3912","url":null,"abstract":"(ICT4D); by","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129913928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtualization Footprint: Why Re-Invest? 虚拟化足迹:为什么要重新投资?
J. Inf. Technol. Educ. Discuss. Cases Pub Date : 2017-12-22 DOI: 10.28945/3922
Marc Thomas, Jean-Paul Van Belle
{"title":"Virtualization Footprint: Why Re-Invest?","authors":"Marc Thomas, Jean-Paul Van Belle","doi":"10.28945/3922","DOIUrl":"https://doi.org/10.28945/3922","url":null,"abstract":"","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116422319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cybersecurity Executive DBA? 网络安全执行DBA?
J. Inf. Technol. Educ. Discuss. Cases Pub Date : 2017-12-22 DOI: 10.28945/3925
Utkarsh Shrivastava, Taufeeq Mohammed
{"title":"A Cybersecurity Executive DBA?","authors":"Utkarsh Shrivastava, Taufeeq Mohammed","doi":"10.28945/3925","DOIUrl":"https://doi.org/10.28945/3925","url":null,"abstract":"Grandon Gill, Academic Director of the Doctorate of Business Administration Program (DBA) at the University of South Florida’s (USF) Muma College of Business pondered the email he had just sent to Moez Limayem, the dean of the college (see Exhibit 1). In that email, he had raised the possibility of developing a version of the college’s highly successful DBA program specifically targeting cybersecurity professionals. He also noted the possibility of funding from the National Science Foundation (NSF) to help cover the costs of launching the program.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LifeInsure: Choosing a PAS to Manage and Maintain Their Product Lifecycle 人寿保险:选择一个PAS来管理和维护他们的产品生命周期
J. Inf. Technol. Educ. Discuss. Cases Pub Date : 2017-12-22 DOI: 10.28945/3921
Kaasiefa Gasant, J. V. Belle
{"title":"LifeInsure: Choosing a PAS to Manage and Maintain Their Product Lifecycle","authors":"Kaasiefa Gasant, J. V. Belle","doi":"10.28945/3921","DOIUrl":"https://doi.org/10.28945/3921","url":null,"abstract":"","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
These Models Need Enterprise Data Management! 这些模型需要企业数据管理!
J. Inf. Technol. Educ. Discuss. Cases Pub Date : 2017-01-26 DOI: 10.28945/3651
J. Hoecker, D. Bernal, Alex Brito, Arda Ergonen, Richard Stiftinger
{"title":"These Models Need Enterprise Data Management!","authors":"J. Hoecker, D. Bernal, Alex Brito, Arda Ergonen, Richard Stiftinger","doi":"10.28945/3651","DOIUrl":"https://doi.org/10.28945/3651","url":null,"abstract":"After 28 years of public service, the Information Technology Bureau Chief for the Southwest Florida Water Management District (SWFWMD), Dr. Steven Dicks, was still passionate about serving the public. By first focusing on the needs of people in the District, Dr. Dicks was able to objectively observe the many aspects of operations for which he was responsible. His observations led him to believe that the use of technology within his organization wasn’t as effective and efficient as he knew it could be.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130499261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信