Overview of Management of Information Systems with emphasis in the importance of knowing both business and IT sides and integration between people, technology and organization. Problem solving approach and change. Dr. Jose G. Lepervanche
Technology, Organizations, and People – Integration of Technology, Organizations, and People in MIS. – https://youtu.be/tptupm9gsn8
Here is our Global Information Systems FSCJ Library Guide developed with FSCJ Deerwood Library. Is is an integration of videos and extra resources used in our courses plus additional resources provided by the library. We piloted this library guide in the ISM4011 summer online courses. We are now sharing it with new ISM4011 courses.
This is the link: http://guides.fscj.edu/GlobalIS
The library also developed our Global Management library guide http://guides.fscj.edu/global_management
Hardware, Software, & Networks | Dr. Jose G. Lepervanche | #DrJoseWhiteboards
User: n/a – Added: 1/25/17
This is a microlecture of a Hardware, Software, and Networks class we did in our hybrid class. We are testing these short videos for the benefit of our online students. It is not the complete class interaction we had building this board. It gives you a glimpse of topics covered.
Management functions go well beyond traditional planning, organizing, leading, and controlling. #Management as part of #globalsysystems requires integration of people, #communications, teamwork, evaluation, and feedback. #Leadership skills are needed for leaders, managers, and taskers. #StrategicManagement skills are needed for #Vision, #Mission, and #Goals. #ProjectManagement skills are needed to allocate people, time, and money. #Information is needed for #businessintelligence and #competitiveadvantage. #TechnologyManagement is needed to drive change and innovation. #Environmental issues #sustainability and #socialresponsibility are needed to embrace #GlobalManagement. #drjosecampus #drjosewhiteboards
See the sequence of slides we use in F2F classes via Flickr
The Americas Information Ramp. Access to databases. Business plan presentation.
Video link: https://youtu.be/UesgRQ9VIQg?list=PL50C28AC61EBA2883
Welcome Video to Technology Management courses.
Welcome to our Technology Management Laboratory. During several years I have been doing these videos to introduce our curses about business and technology courses. I believe that several of these courses are in the middle line between businesses and information technology.
Introduction to Technology Management laboratory is an overview of both business and technology sides of management. It is an overview of the importance of people, organization, and technology in globalization. It also mentions Business Intelligence, Strategic Management, Project Management and Innovation. We continue with Social Media and Mobile Devices to finish with the next generation of leaders and social responsibility. How can be apply these topics in our current discussions?
Video Link: https://youtu.be/FZiiwWbc5KI
As we continue our learning journey in our Business Intelligence course, we are producing new videos or microlectures that are covering specific topics and current trends. In the mean time, we are sharing some of our videos that cover one or several topics related to our course. This one is about Information Security that we are covering in several modules. I have mark the minutes of different parts in case you want to advance and watch a particular topic. Big data and data mining is covered as we mention the importance of extracting useful data.
CyberChronicles – Information Security Best Practices Overview | Dr. Jose G Lepervanche
Video link: CyberChronicles – Information Security Best Practices Overview
CyberChronicles – Information Security Best Practices Overview | Dr. Jose G. Lepervanche
Overview of best practices in Information Security including the importance of security policies, vulnerability assessments, testing, cryptography, authentication, legislation, regulations, moral, ethics, and individual responsibility. #InformationSecurity #CyberSecurity
Learning Online Laboratory. Best practices in Information Security
You should explore topics in more detail. Advance video to area that you want to watch.
(1:59) Security Policies. Information overload. Big data. Communicate policies.
(3:38) Vulnerability Assessment. Know strengths and weaknesses. Identify and prioritize.
(11:03) Viruses, malware, adware.
(12:38) Moral and Ethics
(14:19) Individual Responsibility
Read current online resources to find trends and updated information about these topics. Participate in active discussions in online forums.
Standard YouTube License