• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Management Information Systems

7th edition

  • Home
  • Blog
    • Categories
      • Business Information Systems
      • Business Intelligence
      • Databases
      • Decision Support/Expert Systems
      • Functions and Supply Chains
      • Global Systems
      • Hardware
      • Networks & Telecommunications
      • Security
      • Software
      • Strategic Uses
      • Systems Acquisition
      • Systems Planning/Development
      • Web-Enabled Enterprise
      • Uncategorized
  • Textbook Information
    • Textbook Ordering
    • Textbook Details
    • Table of Contents
    • Textbook History
  • Contact
  • About
    • About the Blog
    • Dr. Kenneth J. Sousa
    • Dr. Effy Oz

Technology Hacking

Guard Your Smart Phone Like Your Wallet!

April 20, 2016 By Kenneth Sousa

How would you feel if someone stole your wallet or purse? Some of your emotions would probably include anger, frustration, being violated, and maybe feeling helpless. Now you have to call your bank and credit card providers to cancel your credit/ATM/debit cards, order a new driver’s license, and … [Read more...] about Guard Your Smart Phone Like Your Wallet!

Filed Under: Networks & Telecommunications, Security Tagged With: identity theft, network, Technology Hacking, Technology Security Breach

Tips for Surviving a Teddy Bear Attack

February 19, 2016 By Kenneth Sousa

Gremlins (1984) might become a reality—kind of. In the movie a child adopts a pet that resembles a big eyed cross between a small dog and a teddy bear. He is warned to never feed his pet after midnight and never let it touch water. He soon learns that these two vices turn the adorable little animal … [Read more...] about Tips for Surviving a Teddy Bear Attack

Filed Under: Networks & Telecommunications, Security Tagged With: API, application programming interfaces, Technology Hacking, technology security

Tech Thoughts for 2016 — Security

January 15, 2016 By Kenneth Sousa

Kept you guessing on the last thought?  Well here it is ... the continuation of Tech Thoughts for 2016.  The first blog in this series can be viewed by clicking here. 5. Security anxiety will consume organizations. Now that you have read the first four, this one should not be very … [Read more...] about Tech Thoughts for 2016 — Security

Filed Under: Networks & Telecommunications, Security Tagged With: Technology Hacking, Technology Security Breach

Primary Sidebar

Latest Posts

Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part III)

Now that we have completed the first two periods of the artificial intelligence discussion, now for … [Read More...] about Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part III)

Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part II)

I hope you enjoyed the "first period" of this blog article. If you have not read it, you can click … [Read More...] about Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part II)

Artificial Intelligence – The Challenge of Earned Intelligence and Technology Integration

Artificial intelligence is on the train track.  The wave has begun in the arena.  It cannot be … [Read More...] about Artificial Intelligence – The Challenge of Earned Intelligence and Technology Integration

Tweets by kensousa

Copyright © 2025 · Kenneth J. Sousa, PhD.