{"title":"Standard Bank: The Agile Transformation","authors":"K. Johnston, T. Gill","doi":"10.28945/3923","DOIUrl":"https://doi.org/10.28945/3923","url":null,"abstract":"Josef Langerman, Head of IT Transformation for Standard Bank, reflected on the extraordinary transformation that his organization’s IT group had recently experienced. Over the past three years, Standard Bank’s IT group had changed from the relatively well accepted systems development lifecycle/waterfall model to a revolutionary large scale agile approach. The results had been gratifying. But it left a question unanswered. Now that things were starting to stabilize, what should be the next steps? The 154-year-old Standard Bank was the largest banking group in Africa, and the 5 largest company headquartered in South Africa. The bank offered a range of corporate, business and personal banking as well as financial services. Its 49,000 employees served over 15 million customers, in 20 countries across the continent of Africa, as well as other countries scattered around the globe.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116965184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SiteWit Corporation: SQL or NoSQL that is the Question","authors":"D. Berndt, Ricardo Lasa, J. McCart","doi":"10.28945/3908","DOIUrl":"https://doi.org/10.28945/3908","url":null,"abstract":"This teaching case focuses on a start-up company in the Web analytics and online advertising space, which faces a database scaling challenge. The case covers the rapidly emerging NoSQL database products that can be used to implement very large distributed databases. These are exciting times in the database marketplace, with a flock of new companies offering scalable database systems for the cloud. These products challenge existing relational database vendors that have come to dominate the market. The case outlines four potential solutions and asks students to make a choice or suggest a different alternative to meet database scaling goals.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124586100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Elder, Nicole Jacobson, Natalie Remsen, Kim Wilmath
{"title":"Behind Enemy Lines","authors":"J. Elder, Nicole Jacobson, Natalie Remsen, Kim Wilmath","doi":"10.28945/3928","DOIUrl":"https://doi.org/10.28945/3928","url":null,"abstract":"In case you happen to be planning to know how to obtain Behind Enemy Lines eBooks, you need to go thorough study on popular search engines like google together with the keywords and phrases download John R. Hibbing PDF eBooks in order for you personally to only get PDF formatted books to download which are safer and virus-free you will discover an array of sites catering to your demands. The majority of these web sites possess a enormous collection of PDF eBooks which you are able to use to your advantage.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"141 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taufeeq Mohammed, Utkarsh Shrivastava, Ashish K. Das, Q. Nguyen
{"title":"Grandon.com Got Hacked!","authors":"Taufeeq Mohammed, Utkarsh Shrivastava, Ashish K. Das, Q. Nguyen","doi":"10.28945/3914","DOIUrl":"https://doi.org/10.28945/3914","url":null,"abstract":"Dr. T. Grandon Gill, a Professor in the Information Systems and Decision Sciences Department at the University of South Florida, was traveling with his family in England when he received a strange phone message. Not being able to respond, he ignored it until—a couple of days later—he was notified that access to his personal website had been suspended (see Exhibit 1). Grandon.com had, once again, been hacked--for the 7 time.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114066179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Employing Dynamic Logic in Cybersecurity","authors":"T. Gill, Bernardo Rodrigues","doi":"10.28945/3915","DOIUrl":"https://doi.org/10.28945/3915","url":null,"abstract":"Dr. Leonid Perlovsky, distinguished physicist and cognitive scientist, pondered this question, which could have a significant impact on his research direction in the years to come. Over the past few decades, he had developed and refined algorithms for distinguishing objects in images, an approach that had found its way into various classified U.S. Department of Defense (DoD) applications. Now he was looking for new potential opportunities to see his research applied, allowing it to evolve further. One of the most interesting aspects of Perlovsky’s approach was that it was very similar to that taken by the human brain in processing sensory information. It began with a very vague model of what might or might not be present in the data being examined. Through successive iterations, analogous to the layers of processing used in human sensory systems, the patterns in the data corresponding to objects would grow more and more distinct until, finally, they became recognizable. Unlike most statistical techniques, this approach— termed “dynamic logic” by Perlovsky—did not require that a model be specified in advance. As such, it was well suited for contexts that required discovery.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123958890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cybersecurity Executive DBA?","authors":"Utkarsh Shrivastava, Taufeeq Mohammed","doi":"10.28945/3925","DOIUrl":"https://doi.org/10.28945/3925","url":null,"abstract":"Grandon Gill, Academic Director of the Doctorate of Business Administration Program (DBA) at the University of South Florida’s (USF) Muma College of Business pondered the email he had just sent to Moez Limayem, the dean of the college (see Exhibit 1). In that email, he had raised the possibility of developing a version of the college’s highly successful DBA program specifically targeting cybersecurity professionals. He also noted the possibility of funding from the National Science Foundation (NSF) to help cover the costs of launching the program.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LifeInsure: Choosing a PAS to Manage and Maintain Their Product Lifecycle","authors":"Kaasiefa Gasant, J. V. Belle","doi":"10.28945/3921","DOIUrl":"https://doi.org/10.28945/3921","url":null,"abstract":"","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Hoecker, D. Bernal, Alex Brito, Arda Ergonen, Richard Stiftinger
{"title":"These Models Need Enterprise Data Management!","authors":"J. Hoecker, D. Bernal, Alex Brito, Arda Ergonen, Richard Stiftinger","doi":"10.28945/3651","DOIUrl":"https://doi.org/10.28945/3651","url":null,"abstract":"After 28 years of public service, the Information Technology Bureau Chief for the Southwest Florida Water Management District (SWFWMD), Dr. Steven Dicks, was still passionate about serving the public. By first focusing on the needs of people in the District, Dr. Dicks was able to objectively observe the many aspects of operations for which he was responsible. His observations led him to believe that the use of technology within his organization wasn’t as effective and efficient as he knew it could be.","PeriodicalId":202502,"journal":{"name":"J. Inf. Technol. Educ. Discuss. Cases","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130499261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}