• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Management Information Systems

7th edition

  • Home
  • Blog
    • Categories
      • Business Information Systems
      • Business Intelligence
      • Databases
      • Decision Support/Expert Systems
      • Functions and Supply Chains
      • Global Systems
      • Hardware
      • Networks & Telecommunications
      • Security
      • Software
      • Strategic Uses
      • Systems Acquisition
      • Systems Planning/Development
      • Web-Enabled Enterprise
      • Uncategorized
  • Textbook Information
    • Textbook Ordering
    • Textbook Details
    • Table of Contents
    • Textbook History
  • Contact
  • About
    • About the Blog
    • Dr. Kenneth J. Sousa
    • Dr. Effy Oz

Kenneth Sousa

What Does Big Data Know About You?

April 13, 2016 By Kenneth Sousa

Did you know that when a customer uses a loyalty card, your every purchase is being relentlessly analyzed by the retailer who is scheming ways to vacuum even more money out of your wallet? Let’s start this post with a story about big data and its data collection by the retailer … [Read more...] about What Does Big Data Know About You?

Filed Under: Databases Tagged With: Big Data, database management, database management system, primary key, Target

ATMs — All Technology (does) Matter?!

March 16, 2016 By Kenneth Sousa

For those of us that were born before 1980, we remember that all banking transactions were done with a teller in a "brick and mortar" bank. Then, around late 1970s ... BAMM! ... the automated teller machine was invented.  The first models could not even dispense individual currency bills, but … [Read more...] about ATMs — All Technology (does) Matter?!

Filed Under: Business Information Systems, Hardware, Networks & Telecommunications, Strategic Uses Tagged With: ATM, banking, competitive advantage, disruptive technology, ICT

Will the Smartphone Control Humans?

February 29, 2016 By Kenneth Sousa

In the era of driver-less cars, fitness meters on our bodies, and GPS tracking, how about altering our mind and body rather than just tracking us? When you read the headline, you probably thought to yourself ... "OK, I already know that.  My phone is never more than arms-length away from me."  … [Read more...] about Will the Smartphone Control Humans?

Filed Under: Hardware, Software, Strategic Uses Tagged With: influence, smartphones, Technology Adoption

Tips for Surviving a Teddy Bear Attack

February 19, 2016 By Kenneth Sousa

Gremlins (1984) might become a reality—kind of. In the movie a child adopts a pet that resembles a big eyed cross between a small dog and a teddy bear. He is warned to never feed his pet after midnight and never let it touch water. He soon learns that these two vices turn the adorable little animal … [Read more...] about Tips for Surviving a Teddy Bear Attack

Filed Under: Networks & Telecommunications, Security Tagged With: API, application programming interfaces, Technology Hacking, technology security

Politics and Hershey Chocolate, Smartphones are Here!

February 1, 2016 By Kenneth Sousa

Chocolate is one of the most popular items that people enjoy eating.  Total sales of chocolate in the United States is approximately $20B with per capita consumption of chocolate is about 12 pounds per year.  So what does this have to do with smartphones? Mobile Phone Adoption Well, a new report … [Read more...] about Politics and Hershey Chocolate, Smartphones are Here!

Filed Under: Hardware, Strategic Uses, Web-Enabled Enterprise Tagged With: adoption, chocolate, consumer, smartphone

Bitcoins: Trust, Security and Competition in the Horizon

January 26, 2016 By Kenneth Sousa

In "Bitcoin or BitConcerned", I discussed some concerns about the fast-rising currency site Bitcoin.  I know that there have been several articles about people that have lived on Bitcoins ... for a 24 hours, a week or longer.  Giving (or attempting) to give the new initiative some credibility in … [Read more...] about Bitcoins: Trust, Security and Competition in the Horizon

Filed Under: Networks & Telecommunications, Security, Strategic Uses

Tech Thoughts for 2016 — Security

January 15, 2016 By Kenneth Sousa

Kept you guessing on the last thought?  Well here it is ... the continuation of Tech Thoughts for 2016.  The first blog in this series can be viewed by clicking here. 5. Security anxiety will consume organizations. Now that you have read the first four, this one should not be very … [Read more...] about Tech Thoughts for 2016 — Security

Filed Under: Networks & Telecommunications, Security Tagged With: Technology Hacking, Technology Security Breach

Tech Thoughts for 2016 — Sensible Data & IoT

January 8, 2016 By Kenneth Sousa

Kept you guessing on the next two thoughts?  Well here is the continuation of Tech Thoughts for 2016.  Now for the next two.  The first blog in the series can be viewed by clicking here. 3. Big data will become sensible data to pan for gold. The term "big data" has become such a phenomenon.  I … [Read more...] about Tech Thoughts for 2016 — Sensible Data & IoT

Filed Under: Business Information Systems, Databases, Hardware, Strategic Uses

Tech Thoughts for 2016 — Content & VDoC

January 4, 2016 By Kenneth Sousa

Those of us born before 1985 have seen the rapid escalation of technology advancement.  The smartphone, that you take for granted in your purse or pocket, provides more access to data to you  now than CEOs and the President of the United States had in 1985.  Electricity reached 90% of US households … [Read more...] about Tech Thoughts for 2016 — Content & VDoC

Filed Under: Business Information Systems, Databases, Hardware, Strategic Uses

Technology Disruption Cuts the Razor Blade Strategy

September 15, 2015 By Kenneth Sousa

In business schools, we teach various concepts that are important.  Recently, a former student contacted me about a new venture idea. After listening to him discuss the specifics of the business model, I could not help but think of Porter's Five Forces concepts; specifically supplier/customer … [Read more...] about Technology Disruption Cuts the Razor Blade Strategy

Filed Under: Strategic Uses Tagged With: IT Strategy

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Go to Next Page »

Primary Sidebar

Latest Posts

Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part III)

Now that we have completed the first two periods of the artificial intelligence discussion, now for … [Read More...] about Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part III)

Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part II)

I hope you enjoyed the "first period" of this blog article. If you have not read it, you can click … [Read More...] about Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part II)

Artificial Intelligence – The Challenge of Earned Intelligence and Technology Integration

Artificial intelligence is on the train track.  The wave has begun in the arena.  It cannot be … [Read More...] about Artificial Intelligence – The Challenge of Earned Intelligence and Technology Integration

Tweets by kensousa

Copyright © 2025 · Kenneth J. Sousa, PhD.