• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Management Information Systems

7th edition

  • Home
  • Blog
    • Categories
      • Business Information Systems
      • Business Intelligence
      • Databases
      • Decision Support/Expert Systems
      • Functions and Supply Chains
      • Global Systems
      • Hardware
      • Networks & Telecommunications
      • Security
      • Software
      • Strategic Uses
      • Systems Acquisition
      • Systems Planning/Development
      • Web-Enabled Enterprise
      • Uncategorized
  • Textbook Information
    • Textbook Ordering
    • Textbook Details
    • Table of Contents
    • Textbook History
  • Contact
  • About
    • About the Blog
    • Dr. Kenneth J. Sousa
    • Dr. Effy Oz

Security

Guard Your Smart Phone Like Your Wallet!

April 20, 2016 By Kenneth Sousa

How would you feel if someone stole your wallet or purse? Some of your emotions would probably include anger, frustration, being violated, and maybe feeling helpless. Now you have to call your bank and credit card providers to cancel your credit/ATM/debit cards, order a new driver’s license, and … [Read more...] about Guard Your Smart Phone Like Your Wallet!

Filed Under: Networks & Telecommunications, Security Tagged With: identity theft, network, Technology Hacking, Technology Security Breach

Tips for Surviving a Teddy Bear Attack

February 19, 2016 By Kenneth Sousa

Gremlins (1984) might become a reality—kind of. In the movie a child adopts a pet that resembles a big eyed cross between a small dog and a teddy bear. He is warned to never feed his pet after midnight and never let it touch water. He soon learns that these two vices turn the adorable little animal … [Read more...] about Tips for Surviving a Teddy Bear Attack

Filed Under: Networks & Telecommunications, Security Tagged With: API, application programming interfaces, Technology Hacking, technology security

Bitcoins: Trust, Security and Competition in the Horizon

January 26, 2016 By Kenneth Sousa

In "Bitcoin or BitConcerned", I discussed some concerns about the fast-rising currency site Bitcoin.  I know that there have been several articles about people that have lived on Bitcoins ... for a 24 hours, a week or longer.  Giving (or attempting) to give the new initiative some credibility in … [Read more...] about Bitcoins: Trust, Security and Competition in the Horizon

Filed Under: Networks & Telecommunications, Security, Strategic Uses

Tech Thoughts for 2016 — Security

January 15, 2016 By Kenneth Sousa

Kept you guessing on the last thought?  Well here it is ... the continuation of Tech Thoughts for 2016.  The first blog in this series can be viewed by clicking here. 5. Security anxiety will consume organizations. Now that you have read the first four, this one should not be very … [Read more...] about Tech Thoughts for 2016 — Security

Filed Under: Networks & Telecommunications, Security Tagged With: Technology Hacking, Technology Security Breach

Disruptive Innovation or Progress?

January 8, 2014 By Kenneth Sousa

When I teach the general computer class for our students, there is always the discussion in a strategy chapter that defines disruptive innovation (or technology).  Some students, from the beginning of time, think that many of the terms we teach have no relevance.  However, disruptive technology is … [Read more...] about Disruptive Innovation or Progress?

Filed Under: Networks & Telecommunications, Security, Strategic Uses, Web-Enabled Enterprise

Primary Sidebar

Latest Posts

Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part III)

Now that we have completed the first two periods of the artificial intelligence discussion, now for … [Read More...] about Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part III)

Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part II)

I hope you enjoyed the "first period" of this blog article. If you have not read it, you can click … [Read More...] about Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part II)

Artificial Intelligence – The Challenge of Earned Intelligence and Technology Integration

Artificial intelligence is on the train track.  The wave has begun in the arena.  It cannot be … [Read More...] about Artificial Intelligence – The Challenge of Earned Intelligence and Technology Integration

Tweets by kensousa

Copyright © 2025 · Kenneth J. Sousa, PhD.