Overview of Management of Information Systems with emphasis in the importance of knowing both business and IT sides and integration between people, technology and organization. Problem solving approach and change. Dr. Jose G. Lepervanche
Technology, Organizations, and People – Integration of Technology, Organizations, and People in MIS. – https://youtu.be/tptupm9gsn8
Here is our Global Information Systems FSCJ Library Guide developed with FSCJ Deerwood Library. Is is an integration of videos and extra resources used in our courses plus additional resources provided by the library. We piloted this library guide in the ISM4011 summer online courses. We are now sharing it with new ISM4011 courses.
This is a microlecture of a Hardware, Software, and Networks class we did in our hybrid class. We are testing these short videos for the benefit of our online students. It is not the complete class interaction we had building this board. It gives you a glimpse of topics covered.
Welcome to our Technology Management Laboratory. During several years I have been doing these videos to introduce our curses about business and technology courses. I believe that several of these courses are in the middle line between businesses and information technology.
Introduction to Technology Management laboratory is an overview of both business and technology sides of management. It is an overview of the importance of people, organization, and technology in globalization. It also mentions Business Intelligence, Strategic Management, Project Management and Innovation. We continue with Social Media and Mobile Devices to finish with the next generation of leaders and social responsibility. How can be apply these topics in our current discussions?
As we continue our learning journey in our Business Intelligence course, we are producing new videos or microlectures that are covering specific topics and current trends. In the mean time, we are sharing some of our videos that cover one or several topics related to our course. This one is about Information Security that we are covering in several modules. I have mark the minutes of different parts in case you want to advance and watch a particular topic. Big data and data mining is covered as we mention the importance of extracting useful data.
CyberChronicles – Information Security Best Practices Overview | Dr. Jose G Lepervanche
Overview of best practices in Information Security including the importance of security policies, vulnerability assessments, testing, cryptography, authentication, legislation, regulations, moral, ethics, and individual responsibility. #InformationSecurity#CyberSecurity
Learning Online Laboratory. Best practices in Information Security
You should explore topics in more detail. Advance video to area that you want to watch.
(1:59) Security Policies. Information overload. Big data. Communicate policies.
(3:38) Vulnerability Assessment. Know strengths and weaknesses. Identify and prioritize.
(6:08) Cryptography.
(7:23) Authentication.
(11:03) Viruses, malware, adware.
(11:35) Legislation.
(12:38) Moral and Ethics
(14:19) Individual Responsibility
Read current online resources to find trends and updated information about these topics. Participate in active discussions in online forums.
“History of the internet” is an animated documentary explaining the inventions from time-sharing to filesharing, from Arpanet to Internet. The clip was made by Melih Bilgil — http://www.lonja.de
The history is told using the PICOL icons, which are available on picol.org. You can get news about this project on blog.picol.org
Innovative technologies have been used in global organizations to enhance performance. Technology Acceptance Model is used to explore current trends such as new media, web 2.0 tools, and other social media networks. (2010 International College Teaching and Learning Conference). Used in Technology Management courses.