{"id":237,"date":"2018-09-24T15:08:36","date_gmt":"2018-09-24T15:08:36","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/suny-osintrobus\/chapter\/trends-in-information-technology\/"},"modified":"2018-10-12T17:39:38","modified_gmt":"2018-10-12T17:39:38","slug":"trends-in-information-technology","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/suny-herkimer-osintrobus\/chapter\/trends-in-information-technology\/","title":{"raw":"Trends in Information Technology","rendered":"Trends in Information Technology"},"content":{"raw":"<ol id=\"fs-idm253289984\" start=\"6\">\r\n \t<li>What are the leading trends in information technology?<\/li>\r\n<\/ol>\r\n<p id=\"fs-idm238796768\">Information technology is a continually evolving field. The fast pace and amount of change, coupled with IT\u2019s broad reach, make it especially challenging to isolate industry trends. From the time we write this chapter to the time you read it\u2014as little as six months\u2014new trends will appear, and those that seemed important may fade. However, some trends that are reshaping today\u2019s IT landscape are digital forensics, the shift to a distributed workforce, and the increasing use of grid computing.<\/p>\r\n\r\n<div id=\"fs-idm251198816\" class=\"bc-section section\">\r\n<h3>Cyber Sleuthing: A New Style of Crime Busting<\/h3>\r\n<p id=\"fs-idm243986368\">What helped investigators bring suit against <span class=\"no-emphasis\">Enron<\/span>, <span class=\"no-emphasis\">Merck<\/span>\u2019s Vioxx medication, and the BTK serial killer? Digital evidence taken from an individual\u2019s computer or corporate network\u2014web pages, pictures, documents, and e-mails are part of a relatively new science called <em>digital forensics.<\/em> Digital-forensics software safeguards electronic evidence used in investigations by creating a duplicate of a hard drive that an investigator can search by keyword, file type, or access date. Digital forensics is also evolving into areas such as cloud computing and blockchain technology. For instance, it is estimated that as much as 3.9 million of the original 21 million bitcoins are \u201clost\u201d on hard drives confined to landfills and flash drives located in the back of old office desks.[footnote]Patrick Watson, \u201cWhy Bitcoin Has Inflation Risk,\u201d Equities.com, https:\/\/www.equities.com, January 13, 2018.[\/footnote]<\/p>\r\n<p id=\"fs-idm250843856\">But nowadays digital sleuthing is not limited to law enforcement. Companies such as <span class=\"no-emphasis\">Walmart<\/span>, <span class=\"no-emphasis\">Target<\/span>, and <span class=\"no-emphasis\">American Express<\/span> have their own secret in-house digital forensics teams. And what if you\u2019re in New York and need to seize a hard drive in Hong Kong? No problem. Over 75 members of the Fortune 500 now use technology that allows them to search hard drives remotely over their corporate networks. Digital forensics makes it possible to track down those who steal corporate data and intellectual property. <span class=\"no-emphasis\">Broadcom<\/span>, a semiconductor chip designer, used computer forensics to investigate and apprehend former employees who were attempting to steal trade secrets. In the process, <span class=\"no-emphasis\">Broadcom<\/span> gathered incriminating e-mails, including deleted documents, that gave it solid evidence to use the 2013 <span class=\"no-emphasis\">Federal Computer Fraud and Abuse Act<\/span> to stop the former employees from starting up a rival firm.[footnote]Kaveh Waddell, \u201cCSI: Walmart,\u201d The Atlantic, https:\/\/www.theatlantic.com, April 3, 2017; Dave Smith, \u201cComputer Fraud and Abuse Act 2013: New CFAA Draft Aims to Expand, Not Reform, the \u2018Worst Law in Technology\u2019,\u201d International Business Times, http:\/\/www.ibtimes.com, March 28, 2013.[\/footnote]<\/p>\r\n<p id=\"fs-idm253175040\">However, there is a downside to having these advanced capabilities. If this kind of software falls into the wrong hands, sophisticated hackers could access corporate networks and individual computers as easily as taking candy from a baby\u2014and the victims would not even know it was happening. In an age of corporate wrongdoing, sexual predators, and computer porn, your hard drive will tell investigators everything they need to know about your behavior and interests, good and bad. Cybersleuthing means we are all potential targets of digital forensics. As evidenced by the huge increase in identity theft, personal privacy\u2014once an unassailable right\u2014is no longer as sacred as it once was.<\/p>\r\n\r\n<div id=\"fs-idm251774800\" class=\"ethics-in-practice\">\r\n<div><\/div>\r\n<div>\r\n<div class=\"textbox shaded\">\r\n<div id=\"fs-idm251198816\" class=\"bc-section section\">\r\n<div id=\"fs-idm251774800\" class=\"ethics-in-practice\">\r\n<h3>ethics in practice<\/h3>\r\n<div><strong>Unearthing Your Secrets<\/strong><\/div>\r\n<p id=\"fs-idm251880688\">Cybercrimes in our technologically driven world are on the increase\u2014identity theft, pornography, and sexual predator victim access, to name a few. The FBI\u2019s computer analysis response team confirms their caseload includes 800 cases reported <em>per day<\/em> in 2017. To keep up with the changing world we live in, law enforcement, corporations, and government agencies have turned to new crime-fighting tools, one of the most effective being digital forensics.<\/p>\r\n<p id=\"fs-idm247727184\">The leader in this technology is Guidance Software, founded in 1997 to develop solutions that search, identify, recover, and deliver digital information in a forensically sound and cost-effective manner. Headquartered in Pasadena, California, the company employs 391 people at offices and training facilities in Chicago, Illinois; Washington, DC; San Francisco, California; Houston, Texas; New York City; and Brazil, England, and Singapore. The company\u2019s more than 20,000 high-profile clients include leading police agencies, government investigation and law enforcement agencies, and Fortune 1000 corporations in the financial service, insurance, high-tech and consulting, health care, and utility industries.<\/p>\r\n<p id=\"fs-idm246336832\">Guidance Software\u2019s suite of EnCase\u00ae solutions is the first computer forensics tool able to provide world-class electronic investigative capabilities for large-scale complex investigations. Law enforcement officers, government\/corporate investigators, and consultants around the world can now benefit from computer forensics that exceed anything previously available. The software offers an investigative infrastructure that provides network-enabled investigations, enterprise-wide integration with other security technologies, and powerful search and collection tools. With EnCase, clients can conduct digital investigations, handle large-scale data collection needs, and respond to external attacks.<\/p>\r\n<p id=\"fs-idm242300768\">Notably, the company\u2019s software was used by law enforcement in the Casey Anthony murder case and the Sony PlayStation security breach, and was used to examine data retrieved by the U.S. special forces in the Osama bin Laden raid.<\/p>\r\n<p id=\"fs-idm247764048\">Guidance Software also helps reduce corporate and personal liability when investigating computer-related fraud, intellectual property theft, and employee misconduct. It protects against network threats such as hackers, worms, and viruses and hidden threats such as malicious code.<\/p>\r\nIn response to increases in the number and scope of discovery requests, Guidance Software developed its eDiscovery Suite. The software package dramatically improves the practice of large-scale discovery\u2014the identification, collection, cataloging, and saving of evidence\u2014required in almost every major legal case these days. eDiscovery integrates with other litigation-support software to significantly decrease the time for corporations to accomplish these tasks. At the same time, it improves regulatory compliance and reduces disruption. The result is many millions of dollars in cost savings. In late 2017, Guidance Software was acquired by OpenText, an enterprise information management company that employs more than 10,000 people worldwide.\r\n<p id=\"fs-idm249538064\">Sources: FBI website, https:\/\/www.fbi.gov, accessed January 15, 2018; Guidance Software website, https:\/\/www.guidancesoftware.com, accessed January 15, 2018; OpenText website, https:\/\/www.opentext.com, accessed January 15, 2018; \u201cCasey Anthony: The Computer Forensics,\u201d <em>The State v Casey Anthony website<\/em>, https:\/\/statevcasey.wordpress.com, July 18, 2011; Declan McCullagh, \u201cFinding Treasures in Bin Laden Computers,\u201d <em>CBS News<\/em>, https:\/\/www.cbsnews.com, May 6, 2011; Evan Narcisse, \u201c Who\u2019s Cleaning Up the PSN Debacle for Sony?\u201d <em>Time,<\/em> http:\/\/techland.time.com, May 4, 2011.<\/p>\r\n\r\n<div id=\"fs-idm254303184\">\r\n<div><strong>Critical Thinking Questions<\/strong><\/div>\r\n<ol>\r\n \t<li>How is Guidance Software responding to and helping to manage changes in our technology-driven world?<\/li>\r\n \t<li>What other types of forensics software do you foresee a need for in the future? Do you think there are ethical issues in using forensics software, and why?<\/li>\r\n \t<li>What are the benefits and risks of Guidance Software being acquired by a larger company?<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<span style=\"color: #6c64ad;font-size: 1em;font-weight: 600\">The Distributed Workforce<\/span><\/div>\r\n<\/div>\r\n<\/div>\r\n<div id=\"fs-idm257083376\" class=\"bc-section section\">\r\n<p id=\"fs-idm247771680\">Insurance company <span class=\"no-emphasis\">Aetna<\/span> shuttered 2.7 million square feet of office space, saving the company $78 million, while <span class=\"no-emphasis\">American Express<\/span> estimates it saved between $10 to $15 million dollars per year by expanding its distributed workforce. Was this a sign that these company were in trouble? Far from it. Instead of maintaining expensive offices in multiple locations, they sent employees home to work and adopted a new model for employees: the distributed workforce. Employees have no permanent office space and work from home or on the road. The shift to virtual workers has been a huge success, and not only do companies save on their personnel and related costs, but they also have happier, more productive employees.<\/p>\r\n<p id=\"fs-idm255375312\"><span class=\"no-emphasis\">Aetna<\/span> and <span class=\"no-emphasis\">American Express<\/span> are not alone in recognizing the benefits of distributed workers, especially in companies that depend on knowledge workers. Work Design Collaborative LLC in Prescott, Arizona, estimates that about 12 percent of all workers in the United States fall into this category, and in urban areas the number could be as high as 15 percent. There are estimates that this trend could eventually reach 40 percent over the next decade, as long commutes, high gas costs, and better connecting tools and technologies make this an attractive option for many workers who like the flexibility of not working in an office.[footnote]\u201cRemote Work is \u2018the New Normal,\u2019\u201d Fast Company, https:\/\/www.fastcompany.com, February 28, 2018.[\/footnote] Already, employees use the internet to conduct video-conferenced meetings and collaborate on teams that span the globe. On the downside, working from home can also mean being available 24\/7\u2014although most workers consider the trade-off well worth it.<\/p>\r\nAccording to recent statistics, close to four million U.S. workers work from home at least half of the time. Remote workers continue to be recruited by companies of all sizes, including <span class=\"no-emphasis\">Amazon<\/span>, <span class=\"no-emphasis\">Dell<\/span>, <span class=\"no-emphasis\">Salesforce<\/span>, and others.[footnote]Michael Guta, \u201c3.9 Million Americans\u2014including Freelancers\u2014Now Work from Home at Least Half the Week,\u201d Small Business Trends, https:\/\/smallbiztrends.com, April 2, 2018.[\/footnote] Intel has a successful virtual-work program that has been popular with working parents. \u201cTechnology allows working remotely to be completely invisible,\u201d says Laura Dionne, the company\u2019s director of supply-chain transformation. At <span class=\"no-emphasis\">Boeing<\/span>, thousands of employees participate in the virtual-work program, and it has been a critical factor in attracting and retaining younger workers. Almost half of <span class=\"no-emphasis\">Sun Microsystems<\/span>\u2019 employees are \u201clocation-independent,\u201d reducing real estate costs by $300 million. Additional benefits for Sun are higher productivity from these workers and the ability to hire the best talent. \u201cOur people working these remote schedules are the happiest employees we have, and they have the lowest attrition rates,\u201d says Bill MacGowan, senior vice president for human resources at Sun. \u201cWould I rather settle on someone mediocre in the Bay Area, or get the best person in the country who is willing to work remotely?\u201d[footnote]Andrea Loubier, \u201cBenefits of Telecommuting for the Future of Work,\u201d Forbes, https:\/\/www.forbes.com, July 20, 2017; Michelle Conlin, \u201cThe Easiest Commute of All,\u201d Business Week, December 12, 2005, p. 78.[\/footnote]\r\n\r\n<\/div>\r\n<div id=\"fs-idm250589936\" class=\"bc-section section\">\r\n<h3>Grid and Cloud Computing Offer Powerful Solutions<\/h3>\r\n<p id=\"fs-idm256494928\">How can smaller companies that occasionally need to perform difficult and large-scale computational tasks find a way to accomplish their projects? They can turn to <em>grid<\/em> or <strong>cloud computing<\/strong>, also called <em>utility computing<\/em> or <em>peer-to-peer computing.<\/em> Cloud and grid technology provides a way to divide the job into many smaller tasks and distribute them to a virtual supercomputer consisting of many small computers linked into a common network. Combining multiple desktop machines results in computing power that exceeds supercomputer speeds. A hardware and software infrastructure clusters and integrates computers and applications from multiple sources, harnessing unused power in existing PCs and networks. This structure distributes computational resources but maintains central control of the process. A central server acts as a team leader and traffic monitor. The controlling cluster server divides a task into subtasks, assigns the work to computers on the grid with surplus processing power, combines the results, and moves on to the next task until the job is finished. <strong><a class=\"autogenerated-content\" href=\"#fs-idm254475168\">(Figure)<\/a><\/strong> shows how typical grid and cloud setups work, and the differences between the two.<\/p>\r\n\r\n<div id=\"fs-idm254475168\" class=\"scaled-down\">\r\n\r\n[caption id=\"\" align=\"aligncenter\" width=\"1701\"]<img src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3654\/2018\/09\/24150835\/IntroBus-C13-M13-009.png\" alt=\"In grid computing, a task is sent to a control server, then bounced back and forth between servers around the globe. With cloud computing, multiple devices, such as laptops, cell phones, networks, all connect to a single cloud source.\" width=\"1701\" height=\"651\" \/> <strong>Exhibit 13.9<\/strong> How Grid and Cloud Computing Work (Attribution: Copyright Rice University, OpenStax, under CC BY 4.0 license.)[\/caption]\r\n\r\n<\/div>\r\n<p id=\"fs-idm251654240\">With utility computing, any company\u2014large or small\u2014can access the software and computer capacity on an as-needed basis. One of the big advantages of cloud computing is that companies can update their inventory in real time across their entire organization. For example, suppose you are an appliance retailer and have several outlets throughout the Midwest. If you have one model of a <span class=\"no-emphasis\">Whirlpool<\/span> washing machine in your Des Moines, Iowa, store, and a salesperson in your Chicago location can sell that model in Chicago, the sale can be accomplished pretty easily. They can finalize the sale, create the shipping instructions, and update the inventory record automatically\u2014and the Chicago consumer\u2019s needs will be met.[footnote]Paul Trujillo, \u201c5 Reasons Small Businesses Need the Cloud,\u201d B2C Community, https:\/\/www.business2community.com, January 30, 2018.[\/footnote]<\/p>\r\n<p id=\"fs-idm251222400\"><span class=\"no-emphasis\">Amazon<\/span>, <span class=\"no-emphasis\">Google<\/span>, <span class=\"no-emphasis\">IBM<\/span>, <span class=\"no-emphasis\">Salesforce.com<\/span>, <span class=\"no-emphasis\">Oracle<\/span>, and <span class=\"no-emphasis\">Hewlett-Packard Enterprise<\/span> are among the companies providing as-needed cloud and grid services. Although cloud and grid computing appears similar to outsourcing or on-demand software from ASPs, it has two key differences:<\/p>\r\n\r\n<ul id=\"fs-idm254529968\">\r\n \t<li>Pricing is set per-use, whereas outsourcing involves fixed-price contracts.<\/li>\r\n \t<li>Cloud and grid computing goes beyond hosted software and includes computer and networking equipment as well as services.<\/li>\r\n<\/ul>\r\n<p id=\"fs-idm249713920\">The cloud and grids provide a very cost-effective way to provide computing power for complex projects in areas such as weather research and financial and biomedical modeling. Because the computing infrastructure already exists\u2014they tap into computer capacity that is otherwise unused\u2014the cost is quite low. The increased interest in cloud and grid technology will continue to contribute to high growth.<\/p>\r\n\r\n<div class=\"textbox key-takeaways\">\r\n<h3>Key Takeaways<\/h3>\r\n<div id=\"fs-idm251916128\" class=\"concept-check\">\r\n<ol id=\"fs-idm244476800\">\r\n \t<li>How are companies and other organizations using digital forensics to obtain critical information?<\/li>\r\n \t<li>Why do companies find that productivity rises when they offer employees the option of joining the virtual workforce?<\/li>\r\n \t<li>What advantages do grid and cloud computing offer a company? What are some of the downsides to using this method?<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<div id=\"fs-idm238800448\" class=\"section-summary\">\r\n<h3>Summary of Learning Outcomes<\/h3>\r\n<ol id=\"fs-idm238791136\" start=\"6\">\r\n \t<li>What are the leading trends in information technology?<\/li>\r\n<\/ol>\r\n<p id=\"fs-idm247696176\">IT is a dynamic industry, and companies must stay current on the latest trends to identify ones that help them maintain their competitive edge, such as digital forensics, the distributed workforce, and grid computing. With digital forensics techniques, corporations, government agencies, attorneys, and lawmakers can obtain evidence from computers and corporate networks\u2014web pages, pictures, documents, and e-mails. Many knowledge workers now work remotely rather than from an office. Companies adopting the distributed workforce model gain many benefits, such as cost savings, more satisfied and productive employees, and increased employee retention. Cloud computing harnesses the power of computers, online software, and data storage to create a virtual computing environment that is invisible to the user. A company can access the cloud on an as-needed basis instead of investing in its own supercomputer equipment. Outsourcing a portion of the company\u2019s computing needs provides additional flexibility and cost advantages. Companies can also set up internal grids.<\/p>\r\n\r\n<\/div>\r\n<div id=\"fs-idm244218688\" class=\"prep-workplace\">\r\n<h3>Preparing for Tomorrow\u2019s Workplace Skills<\/h3>\r\n<ol id=\"fs-idm250636160\">\r\n \t<li>How has information technology changed your life? Describe at least three areas (both personal and school- or work-related) where having access to better information has improved your decisions. Are there any negative effects? What steps can you take to manage information better? (Information, Technology)<\/li>\r\n \t<li>Visit or conduct a phone interview with a local small-business owner about the different ways her or his firm uses information technology. Prepare a brief report on your findings that includes the hardware and software used, how it was selected, benefits of technology for the company, and any problems in implementing or using it. (Interpersonal, Information)<\/li>\r\n \t<li>Your school wants to automate the class-registration process. Prepare a memo to the dean of information systems describing an integrated information system that would help a student choose and register for courses. Make a list of the different groups that should be involved and questions to ask during the planning process. Include a graphic representation of the system that shows how the data become useful information. Indicate the information a student needs to choose courses and its sources. Explain how several types of management support systems could help students make better course decisions. Include ways the school could use the information it collects from this system. Have several students present their plans to the class, which will take the role of university management in evaluating them. (Resources, Systems, Technology)<\/li>\r\n \t<li>You recently joined the IT staff of a midsized consumer products firm. After a malicious virus destroys some critical files, you realize that the company lacks a security strategy and policies. Outline the steps you\u2019d take to develop a program to protect data and the types of policies you\u2019d recommend. How would you present the plan to management and employees to encourage acceptance? (Resources, Technology)<\/li>\r\n \t<li><strong>Team Activity<\/strong> Should companies outsource IT? Some executives believe that IT is too important to outsource and that application service providers don\u2019t have a future. Yet spending for ASP subscriptions, MSPs, and other forms of IT outsourcing such as cloud computing continue to grow. What\u2019s your position? Divide the class into groups designated \u201cfor\u201d or \u201cagainst\u201d outsourcing and\/or ASPs. Have them research the current status of ASPs using publications such as <em>CIO<\/em> and <em>Computerworld<\/em> and websites such as Enterprise Apps Today, http:\/\/www.enterpriseappstoday.com. (Interpersonal, Information)<\/li>\r\n<\/ol>\r\n<\/div>\r\n<div id=\"fs-idm239620256\" class=\"ethics-activity\">\r\n<h3>Ethics Activity<\/h3>\r\n<p id=\"fs-idm251562800\">As the owner of a small but growing business, you are concerned about employees misusing company computers for personal matters. Not only does this cost the company in terms of employee productivity, but it also ties up bandwidth that may be required for company operations and exposes the firm\u2019s networks to increased risks of attacks from viruses, spyware, and other malicious programs. Installing e-mail monitoring and web security and filtering software programs would allow you to track e-mail and internet use, develop use policies, block access to inappropriate sites, and limit the time employees can conduct personal online business. At the same time, the software will protect your IT networks from many types of security concerns, from viruses to internet fraud. You are concerned, however, that employees will take offense and consider such software an invasion of privacy.<\/p>\r\n<p id=\"fs-idm249757488\">Using a web search tool, locate articles about this topic and then write responses to the following questions. Be sure to support your arguments and cite your sources.<\/p>\r\n<p id=\"fs-idm251358848\"><strong>Ethical Dilemma:<\/strong> Should you purchase employee-monitoring software for your company, and on what do you base your decision? If you install the software, do you have an obligation to tell employees about it? Explain your answers and suggest ways to help employees understand your rationale.<\/p>\r\n<p id=\"fs-idm238756864\">Sources: KC Agu, \u201c6 Software Tools for Monitoring Employee Productivity,\u201d <em>Huffington Post<\/em>, https:\/\/www.huffingtonpost.com, December 6, 2017; Marissa Lang, \u201cElectronic Tracking Spurs Workplace Privacy Debate,\u201d <em>Government Technology<\/em>, http:\/\/www.govtech.com, October 18, 2017; Mike Rogoway, \u201cJive\u2019s Buyer Responds to Employee Anxiety over Workplace Monitoring Tool,\u201d <em>The Oregonian,<\/em> http:\/\/www.oregonlive.com.<\/p>\r\n\r\n<\/div>\r\n<div id=\"fs-idm252382768\" class=\"working-net\">\r\n<h3>Working the Net<\/h3>\r\n<ol id=\"fs-idm248998848\">\r\n \t<li>Enterprise resource planning is a major category of business software. Visit the site of one of the following companies: SAP (<strong>http:\/\/www.sap.com<\/strong>), or Oracle (<strong>http:\/\/www.oracle.com<\/strong>). Prepare a short presentation for the class about the company\u2019s ERP product offerings and capabilities. Include examples of how companies use the ERP software. What are the latest trends in ERP?<\/li>\r\n \t<li>What can intranets and enterprise portals accomplish for a company? Find out by using such resources as Brint.com\u2019s Intranet Portal, <strong>http:\/\/www.brint.com\/Intranets.htm<\/strong>. Look for case studies that show how companies apply this technology. Summarize the different features an intranet or enterprise portal provides.<\/li>\r\n \t<li>Learn more about the CERT Coordination Center (CERT\/CC), which serves as a center of internet security expertise. Explore its website,<strong> https:\/\/www.cert.org\/index.cfm<\/strong>. What are the latest statistics on incidents reported, vulnerabilities, security alerts, security notes, mail messages, and hotline calls? What other useful information does the site provide to help a company protect IT assets?<\/li>\r\n \t<li>Research the latest developments in computer security at <em>Computerworld<\/em>\u2019s site, <strong>http:\/\/computerworld.com\/<\/strong>. What types of information can you find here? Pick one of the categories in this area (Cybercrime, Encryption, Disaster Recovery, Firewalls, Hacking, Privacy, Security Holes, Vhttp:\/\/computerworld.com\/securitytopics\/securityiruses and Worms, and VPN), and summarize your findings.<\/li>\r\n \t<li>How can someone steal your identity? Using information at the Federal Trade Commission\u2019s central website for information about identity theft, https:\/\/www.consumer.ftc.gov\/features\/feature-0014-identity-theft, compile a list of the ways thieves can access key information to use your identity. What steps should you take if you\u2019ve been a victim of identity theft? Summarize key provisions of federal laws dealing with this crime and the laws in your state.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<div id=\"fs-idm256563424\" class=\"critical-thinking\">\r\n<h3>Creative Thinking Case<\/h3>\r\n<div id=\"fs-idm248759648\" class=\"bc-section section\">\r\n<h4>Novartis\u2019s Prescription for Invoice Processing<\/h4>\r\n<p id=\"fs-idm250969536\">What do you do when you have more than 600 business units operating through 360 independent affiliates in 140 countries around the world\u2014processing complex invoices in various languages and currencies? You seek out the best technology solution to make the job easier.<\/p>\r\n<p id=\"fs-idm251721264\">At global pharmaceutical giant Novartis, the IT department is a strategic resource, a community of 2,000 people serving 63,000 customers in 200 locations and 25 data centers. Because most of the company\u2019s invoices come from international suppliers, they have differences in design, language, taxes, and currency. Consequently, many ended up as \u201cquery items\u201d requiring manual resolution by Novartis accounting staff\u2014which delayed payments and made those invoices extremely costly to process. In fact, finance personnel spent so much of their time resolving queried invoices that other work suffered. A solution was badly needed.<\/p>\r\n<p id=\"fs-idm249034400\">To maximize its investment, Novartis needed a flexible solution that would meet its current and future needs and function in other business departments in a variety of geographic locations. It should provide fast, accurate document capture and multi-language support, and should extend to other types of information\u2014such as faxes and electronic data\u2014in addition to paper documents. Finally, in order to obtain financing for the project, return on investment (ROI) was required within nine months of project implementation.<\/p>\r\n<p id=\"fs-idm253202112\">Input<em>Accel<\/em> for Invoices from EMC\/Captiva was the answer. The software extracts data from paper documents, applies intelligent document recognition (IDR) technology to convert them to digital images, and sends relevant data to enterprise resource planning, accounts payable (A\/P), and other back-end management systems. The specialized Input<em>Accel<\/em> server manages output by recognizing and avoiding holdups in the workflow process. It also ensures if a server goes offline, others will carry on functioning, thus avoiding downtime.<\/p>\r\n<p id=\"fs-idm248556416\">Now Novartis scans incoming invoices at a centrally located site, and the images are transmitted to the Input<em>Accel<\/em> for Invoices server for image improvement. Invoice data is then extracted and validated against supplier information. Most invoices are transferred directly for payment, with relatively few invoices requiring transfer to one of three accounts payable clerks who deal with queries manually. Novartis is a global leader in research and development of products that improve health issues. Input<em>Accel<\/em> was selected by Novartis to be part of its accounting system.<\/p>\r\n<p id=\"fs-idm250351104\">Thanks to IT, overall efficiency has increased, processing errors are reduced, and accounting personnel can use their time and expert knowledge for more meaningful tasks than resolving invoice errors. For Novartis, it is \u201cmission accomplished.\u201d<\/p>\r\n\r\n<div id=\"fs-idm249694496\">\r\n<div>Critical Thinking Questions<\/div>\r\n<ol>\r\n \t<li>What factors contributed to Novartis\u2019s invoice processing being so complex?<\/li>\r\n \t<li>How did IT help the company solve that problem?<\/li>\r\n \t<li>What other uses and functions does Input<em>Accel<\/em> serve, and how will this be useful to Novartis over the long term? (You may want to visit the EMC\/Captiva website, <strong>https:\/\/www.emc.com<\/strong>, for more information on Input<em>Accel<\/em>\u2019s capabilities.)<\/li>\r\n<\/ol>\r\n<\/div>\r\n<p id=\"fs-idm251420704\">Sources: \u201cOpenText Acquires EMC Enterprise Division,\u201d <em>MetaSource<\/em>, http:\/\/www.metasource.com, September 20, 2016; Novartis corporate website, http:\/\/www.novartis.com, March 20, 2006; \u201cProcessing Invoices From Around the World,\u201d <em>ECM Connection,<\/em> https:\/\/www.ecmconnection, February 2, 2006; Kathryn Balint, \u201cCaptiva\u2019s Paper Chase Paying Off,\u201d <em>San Diego Union-Tribune,<\/em> December 9, 2005, pp. C1, C5.<\/p>\r\n\r\n<\/div>\r\n<\/div>\r\n<div id=\"fs-idm251858704\" class=\"hot-links\">\r\n<h3>Hot Links Address Book<\/h3>\r\n<ol id=\"fs-idm243986960\">\r\n \t<li>If you want to know the definition of a computer term or more about a particular topic, Webopedia has the answer: <strong>http:\/\/www.webopedia.com<\/strong>.<\/li>\r\n \t<li>Can\u2019t tell a LAN from a WAN? Learn more about networking at Lifewire\u2019s Internet &amp; Networking pages, <strong>https:\/\/www.lifewire.com<\/strong>.<\/li>\r\n \t<li>To find out if that e-mail alerting you to another virus threat is real or a hoax, check out the latest information at <strong>http:\/\/www.snopes.com<\/strong>.<\/li>\r\n \t<li>How can you \u201cinoculate\u201d your computer against viruses? Symantec\u2019s Security Center has the latest details on virus threats and security issues: <strong>http:\/\/www.symantec.com<\/strong>.<\/li>\r\n \t<li>The CIO digital magazine offers helpful articles that provide a good introduction to key IT topics: <strong>http:\/\/www.cio.com<\/strong>.<\/li>\r\n \t<li>Curious about how companies are using on-demand grid computing? Read the Grid FAQ at the Grid Computing Technology Centre, <strong>http:\/\/www.gridcomputing.com<\/strong>, and then check out some of the many links to other resources.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<div class=\"textbox shaded\">\r\n<h3>Glossary<\/h3>\r\n<dl id=\"fs-idm239412064\">\r\n \t<dt>cloud computing<\/dt>\r\n \t<dd id=\"fs-idm239290208\">A general term for the delivery of hosted services over the internet.<\/dd>\r\n<\/dl>\r\n<\/div>","rendered":"<ol id=\"fs-idm253289984\" start=\"6\">\n<li>What are the leading trends in information technology?<\/li>\n<\/ol>\n<p id=\"fs-idm238796768\">Information technology is a continually evolving field. The fast pace and amount of change, coupled with IT\u2019s broad reach, make it especially challenging to isolate industry trends. From the time we write this chapter to the time you read it\u2014as little as six months\u2014new trends will appear, and those that seemed important may fade. However, some trends that are reshaping today\u2019s IT landscape are digital forensics, the shift to a distributed workforce, and the increasing use of grid computing.<\/p>\n<div id=\"fs-idm251198816\" class=\"bc-section section\">\n<h3>Cyber Sleuthing: A New Style of Crime Busting<\/h3>\n<p id=\"fs-idm243986368\">What helped investigators bring suit against <span class=\"no-emphasis\">Enron<\/span>, <span class=\"no-emphasis\">Merck<\/span>\u2019s Vioxx medication, and the BTK serial killer? Digital evidence taken from an individual\u2019s computer or corporate network\u2014web pages, pictures, documents, and e-mails are part of a relatively new science called <em>digital forensics.<\/em> Digital-forensics software safeguards electronic evidence used in investigations by creating a duplicate of a hard drive that an investigator can search by keyword, file type, or access date. Digital forensics is also evolving into areas such as cloud computing and blockchain technology. For instance, it is estimated that as much as 3.9 million of the original 21 million bitcoins are \u201clost\u201d on hard drives confined to landfills and flash drives located in the back of old office desks.<a class=\"footnote\" title=\"Patrick Watson, \u201cWhy Bitcoin Has Inflation Risk,\u201d Equities.com, https:\/\/www.equities.com, January 13, 2018.\" id=\"return-footnote-237-1\" href=\"#footnote-237-1\" aria-label=\"Footnote 1\"><sup class=\"footnote\">[1]<\/sup><\/a><\/p>\n<p id=\"fs-idm250843856\">But nowadays digital sleuthing is not limited to law enforcement. Companies such as <span class=\"no-emphasis\">Walmart<\/span>, <span class=\"no-emphasis\">Target<\/span>, and <span class=\"no-emphasis\">American Express<\/span> have their own secret in-house digital forensics teams. And what if you\u2019re in New York and need to seize a hard drive in Hong Kong? No problem. Over 75 members of the Fortune 500 now use technology that allows them to search hard drives remotely over their corporate networks. Digital forensics makes it possible to track down those who steal corporate data and intellectual property. <span class=\"no-emphasis\">Broadcom<\/span>, a semiconductor chip designer, used computer forensics to investigate and apprehend former employees who were attempting to steal trade secrets. In the process, <span class=\"no-emphasis\">Broadcom<\/span> gathered incriminating e-mails, including deleted documents, that gave it solid evidence to use the 2013 <span class=\"no-emphasis\">Federal Computer Fraud and Abuse Act<\/span> to stop the former employees from starting up a rival firm.<a class=\"footnote\" title=\"Kaveh Waddell, \u201cCSI: Walmart,\u201d The Atlantic, https:\/\/www.theatlantic.com, April 3, 2017; Dave Smith, \u201cComputer Fraud and Abuse Act 2013: New CFAA Draft Aims to Expand, Not Reform, the \u2018Worst Law in Technology\u2019,\u201d International Business Times, http:\/\/www.ibtimes.com, March 28, 2013.\" id=\"return-footnote-237-2\" href=\"#footnote-237-2\" aria-label=\"Footnote 2\"><sup class=\"footnote\">[2]<\/sup><\/a><\/p>\n<p id=\"fs-idm253175040\">However, there is a downside to having these advanced capabilities. If this kind of software falls into the wrong hands, sophisticated hackers could access corporate networks and individual computers as easily as taking candy from a baby\u2014and the victims would not even know it was happening. In an age of corporate wrongdoing, sexual predators, and computer porn, your hard drive will tell investigators everything they need to know about your behavior and interests, good and bad. Cybersleuthing means we are all potential targets of digital forensics. As evidenced by the huge increase in identity theft, personal privacy\u2014once an unassailable right\u2014is no longer as sacred as it once was.<\/p>\n<div id=\"fs-idm251774800\" class=\"ethics-in-practice\">\n<div><\/div>\n<div>\n<div class=\"textbox shaded\">\n<div id=\"fs-idm251198816\" class=\"bc-section section\">\n<div id=\"fs-idm251774800\" class=\"ethics-in-practice\">\n<h3>ethics in practice<\/h3>\n<div><strong>Unearthing Your Secrets<\/strong><\/div>\n<p id=\"fs-idm251880688\">Cybercrimes in our technologically driven world are on the increase\u2014identity theft, pornography, and sexual predator victim access, to name a few. The FBI\u2019s computer analysis response team confirms their caseload includes 800 cases reported <em>per day<\/em> in 2017. To keep up with the changing world we live in, law enforcement, corporations, and government agencies have turned to new crime-fighting tools, one of the most effective being digital forensics.<\/p>\n<p id=\"fs-idm247727184\">The leader in this technology is Guidance Software, founded in 1997 to develop solutions that search, identify, recover, and deliver digital information in a forensically sound and cost-effective manner. Headquartered in Pasadena, California, the company employs 391 people at offices and training facilities in Chicago, Illinois; Washington, DC; San Francisco, California; Houston, Texas; New York City; and Brazil, England, and Singapore. The company\u2019s more than 20,000 high-profile clients include leading police agencies, government investigation and law enforcement agencies, and Fortune 1000 corporations in the financial service, insurance, high-tech and consulting, health care, and utility industries.<\/p>\n<p id=\"fs-idm246336832\">Guidance Software\u2019s suite of EnCase\u00ae solutions is the first computer forensics tool able to provide world-class electronic investigative capabilities for large-scale complex investigations. Law enforcement officers, government\/corporate investigators, and consultants around the world can now benefit from computer forensics that exceed anything previously available. The software offers an investigative infrastructure that provides network-enabled investigations, enterprise-wide integration with other security technologies, and powerful search and collection tools. With EnCase, clients can conduct digital investigations, handle large-scale data collection needs, and respond to external attacks.<\/p>\n<p id=\"fs-idm242300768\">Notably, the company\u2019s software was used by law enforcement in the Casey Anthony murder case and the Sony PlayStation security breach, and was used to examine data retrieved by the U.S. special forces in the Osama bin Laden raid.<\/p>\n<p id=\"fs-idm247764048\">Guidance Software also helps reduce corporate and personal liability when investigating computer-related fraud, intellectual property theft, and employee misconduct. It protects against network threats such as hackers, worms, and viruses and hidden threats such as malicious code.<\/p>\n<p>In response to increases in the number and scope of discovery requests, Guidance Software developed its eDiscovery Suite. The software package dramatically improves the practice of large-scale discovery\u2014the identification, collection, cataloging, and saving of evidence\u2014required in almost every major legal case these days. eDiscovery integrates with other litigation-support software to significantly decrease the time for corporations to accomplish these tasks. At the same time, it improves regulatory compliance and reduces disruption. The result is many millions of dollars in cost savings. In late 2017, Guidance Software was acquired by OpenText, an enterprise information management company that employs more than 10,000 people worldwide.<\/p>\n<p id=\"fs-idm249538064\">Sources: FBI website, https:\/\/www.fbi.gov, accessed January 15, 2018; Guidance Software website, https:\/\/www.guidancesoftware.com, accessed January 15, 2018; OpenText website, https:\/\/www.opentext.com, accessed January 15, 2018; \u201cCasey Anthony: The Computer Forensics,\u201d <em>The State v Casey Anthony website<\/em>, https:\/\/statevcasey.wordpress.com, July 18, 2011; Declan McCullagh, \u201cFinding Treasures in Bin Laden Computers,\u201d <em>CBS News<\/em>, https:\/\/www.cbsnews.com, May 6, 2011; Evan Narcisse, \u201c Who\u2019s Cleaning Up the PSN Debacle for Sony?\u201d <em>Time,<\/em> http:\/\/techland.time.com, May 4, 2011.<\/p>\n<div id=\"fs-idm254303184\">\n<div><strong>Critical Thinking Questions<\/strong><\/div>\n<ol>\n<li>How is Guidance Software responding to and helping to manage changes in our technology-driven world?<\/li>\n<li>What other types of forensics software do you foresee a need for in the future? Do you think there are ethical issues in using forensics software, and why?<\/li>\n<li>What are the benefits and risks of Guidance Software being acquired by a larger company?<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><span style=\"color: #6c64ad;font-size: 1em;font-weight: 600\">The Distributed Workforce<\/span><\/div>\n<\/div>\n<\/div>\n<div id=\"fs-idm257083376\" class=\"bc-section section\">\n<p id=\"fs-idm247771680\">Insurance company <span class=\"no-emphasis\">Aetna<\/span> shuttered 2.7 million square feet of office space, saving the company $78 million, while <span class=\"no-emphasis\">American Express<\/span> estimates it saved between $10 to $15 million dollars per year by expanding its distributed workforce. Was this a sign that these company were in trouble? Far from it. Instead of maintaining expensive offices in multiple locations, they sent employees home to work and adopted a new model for employees: the distributed workforce. Employees have no permanent office space and work from home or on the road. The shift to virtual workers has been a huge success, and not only do companies save on their personnel and related costs, but they also have happier, more productive employees.<\/p>\n<p id=\"fs-idm255375312\"><span class=\"no-emphasis\">Aetna<\/span> and <span class=\"no-emphasis\">American Express<\/span> are not alone in recognizing the benefits of distributed workers, especially in companies that depend on knowledge workers. Work Design Collaborative LLC in Prescott, Arizona, estimates that about 12 percent of all workers in the United States fall into this category, and in urban areas the number could be as high as 15 percent. There are estimates that this trend could eventually reach 40 percent over the next decade, as long commutes, high gas costs, and better connecting tools and technologies make this an attractive option for many workers who like the flexibility of not working in an office.<a class=\"footnote\" title=\"\u201cRemote Work is \u2018the New Normal,\u2019\u201d Fast Company, https:\/\/www.fastcompany.com, February 28, 2018.\" id=\"return-footnote-237-3\" href=\"#footnote-237-3\" aria-label=\"Footnote 3\"><sup class=\"footnote\">[3]<\/sup><\/a> Already, employees use the internet to conduct video-conferenced meetings and collaborate on teams that span the globe. On the downside, working from home can also mean being available 24\/7\u2014although most workers consider the trade-off well worth it.<\/p>\n<p>According to recent statistics, close to four million U.S. workers work from home at least half of the time. Remote workers continue to be recruited by companies of all sizes, including <span class=\"no-emphasis\">Amazon<\/span>, <span class=\"no-emphasis\">Dell<\/span>, <span class=\"no-emphasis\">Salesforce<\/span>, and others.<a class=\"footnote\" title=\"Michael Guta, \u201c3.9 Million Americans\u2014including Freelancers\u2014Now Work from Home at Least Half the Week,\u201d Small Business Trends, https:\/\/smallbiztrends.com, April 2, 2018.\" id=\"return-footnote-237-4\" href=\"#footnote-237-4\" aria-label=\"Footnote 4\"><sup class=\"footnote\">[4]<\/sup><\/a> Intel has a successful virtual-work program that has been popular with working parents. \u201cTechnology allows working remotely to be completely invisible,\u201d says Laura Dionne, the company\u2019s director of supply-chain transformation. At <span class=\"no-emphasis\">Boeing<\/span>, thousands of employees participate in the virtual-work program, and it has been a critical factor in attracting and retaining younger workers. Almost half of <span class=\"no-emphasis\">Sun Microsystems<\/span>\u2019 employees are \u201clocation-independent,\u201d reducing real estate costs by $300 million. Additional benefits for Sun are higher productivity from these workers and the ability to hire the best talent. \u201cOur people working these remote schedules are the happiest employees we have, and they have the lowest attrition rates,\u201d says Bill MacGowan, senior vice president for human resources at Sun. \u201cWould I rather settle on someone mediocre in the Bay Area, or get the best person in the country who is willing to work remotely?\u201d<a class=\"footnote\" title=\"Andrea Loubier, \u201cBenefits of Telecommuting for the Future of Work,\u201d Forbes, https:\/\/www.forbes.com, July 20, 2017; Michelle Conlin, \u201cThe Easiest Commute of All,\u201d Business Week, December 12, 2005, p. 78.\" id=\"return-footnote-237-5\" href=\"#footnote-237-5\" aria-label=\"Footnote 5\"><sup class=\"footnote\">[5]<\/sup><\/a><\/p>\n<\/div>\n<div id=\"fs-idm250589936\" class=\"bc-section section\">\n<h3>Grid and Cloud Computing Offer Powerful Solutions<\/h3>\n<p id=\"fs-idm256494928\">How can smaller companies that occasionally need to perform difficult and large-scale computational tasks find a way to accomplish their projects? They can turn to <em>grid<\/em> or <strong>cloud computing<\/strong>, also called <em>utility computing<\/em> or <em>peer-to-peer computing.<\/em> Cloud and grid technology provides a way to divide the job into many smaller tasks and distribute them to a virtual supercomputer consisting of many small computers linked into a common network. Combining multiple desktop machines results in computing power that exceeds supercomputer speeds. A hardware and software infrastructure clusters and integrates computers and applications from multiple sources, harnessing unused power in existing PCs and networks. This structure distributes computational resources but maintains central control of the process. A central server acts as a team leader and traffic monitor. The controlling cluster server divides a task into subtasks, assigns the work to computers on the grid with surplus processing power, combines the results, and moves on to the next task until the job is finished. <strong><a class=\"autogenerated-content\" href=\"#fs-idm254475168\">(Figure)<\/a><\/strong> shows how typical grid and cloud setups work, and the differences between the two.<\/p>\n<div id=\"fs-idm254475168\" class=\"scaled-down\">\n<div style=\"width: 1711px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3654\/2018\/09\/24150835\/IntroBus-C13-M13-009.png\" alt=\"In grid computing, a task is sent to a control server, then bounced back and forth between servers around the globe. With cloud computing, multiple devices, such as laptops, cell phones, networks, all connect to a single cloud source.\" width=\"1701\" height=\"651\" \/><\/p>\n<p class=\"wp-caption-text\"><strong>Exhibit 13.9<\/strong> How Grid and Cloud Computing Work (Attribution: Copyright Rice University, OpenStax, under CC BY 4.0 license.)<\/p>\n<\/div>\n<\/div>\n<p id=\"fs-idm251654240\">With utility computing, any company\u2014large or small\u2014can access the software and computer capacity on an as-needed basis. One of the big advantages of cloud computing is that companies can update their inventory in real time across their entire organization. For example, suppose you are an appliance retailer and have several outlets throughout the Midwest. If you have one model of a <span class=\"no-emphasis\">Whirlpool<\/span> washing machine in your Des Moines, Iowa, store, and a salesperson in your Chicago location can sell that model in Chicago, the sale can be accomplished pretty easily. They can finalize the sale, create the shipping instructions, and update the inventory record automatically\u2014and the Chicago consumer\u2019s needs will be met.<a class=\"footnote\" title=\"Paul Trujillo, \u201c5 Reasons Small Businesses Need the Cloud,\u201d B2C Community, https:\/\/www.business2community.com, January 30, 2018.\" id=\"return-footnote-237-6\" href=\"#footnote-237-6\" aria-label=\"Footnote 6\"><sup class=\"footnote\">[6]<\/sup><\/a><\/p>\n<p id=\"fs-idm251222400\"><span class=\"no-emphasis\">Amazon<\/span>, <span class=\"no-emphasis\">Google<\/span>, <span class=\"no-emphasis\">IBM<\/span>, <span class=\"no-emphasis\">Salesforce.com<\/span>, <span class=\"no-emphasis\">Oracle<\/span>, and <span class=\"no-emphasis\">Hewlett-Packard Enterprise<\/span> are among the companies providing as-needed cloud and grid services. Although cloud and grid computing appears similar to outsourcing or on-demand software from ASPs, it has two key differences:<\/p>\n<ul id=\"fs-idm254529968\">\n<li>Pricing is set per-use, whereas outsourcing involves fixed-price contracts.<\/li>\n<li>Cloud and grid computing goes beyond hosted software and includes computer and networking equipment as well as services.<\/li>\n<\/ul>\n<p id=\"fs-idm249713920\">The cloud and grids provide a very cost-effective way to provide computing power for complex projects in areas such as weather research and financial and biomedical modeling. Because the computing infrastructure already exists\u2014they tap into computer capacity that is otherwise unused\u2014the cost is quite low. The increased interest in cloud and grid technology will continue to contribute to high growth.<\/p>\n<div class=\"textbox key-takeaways\">\n<h3>Key Takeaways<\/h3>\n<div id=\"fs-idm251916128\" class=\"concept-check\">\n<ol id=\"fs-idm244476800\">\n<li>How are companies and other organizations using digital forensics to obtain critical information?<\/li>\n<li>Why do companies find that productivity rises when they offer employees the option of joining the virtual workforce?<\/li>\n<li>What advantages do grid and cloud computing offer a company? What are some of the downsides to using this method?<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"fs-idm238800448\" class=\"section-summary\">\n<h3>Summary of Learning Outcomes<\/h3>\n<ol id=\"fs-idm238791136\" start=\"6\">\n<li>What are the leading trends in information technology?<\/li>\n<\/ol>\n<p id=\"fs-idm247696176\">IT is a dynamic industry, and companies must stay current on the latest trends to identify ones that help them maintain their competitive edge, such as digital forensics, the distributed workforce, and grid computing. With digital forensics techniques, corporations, government agencies, attorneys, and lawmakers can obtain evidence from computers and corporate networks\u2014web pages, pictures, documents, and e-mails. Many knowledge workers now work remotely rather than from an office. Companies adopting the distributed workforce model gain many benefits, such as cost savings, more satisfied and productive employees, and increased employee retention. Cloud computing harnesses the power of computers, online software, and data storage to create a virtual computing environment that is invisible to the user. A company can access the cloud on an as-needed basis instead of investing in its own supercomputer equipment. Outsourcing a portion of the company\u2019s computing needs provides additional flexibility and cost advantages. Companies can also set up internal grids.<\/p>\n<\/div>\n<div id=\"fs-idm244218688\" class=\"prep-workplace\">\n<h3>Preparing for Tomorrow\u2019s Workplace Skills<\/h3>\n<ol id=\"fs-idm250636160\">\n<li>How has information technology changed your life? Describe at least three areas (both personal and school- or work-related) where having access to better information has improved your decisions. Are there any negative effects? What steps can you take to manage information better? (Information, Technology)<\/li>\n<li>Visit or conduct a phone interview with a local small-business owner about the different ways her or his firm uses information technology. Prepare a brief report on your findings that includes the hardware and software used, how it was selected, benefits of technology for the company, and any problems in implementing or using it. (Interpersonal, Information)<\/li>\n<li>Your school wants to automate the class-registration process. Prepare a memo to the dean of information systems describing an integrated information system that would help a student choose and register for courses. Make a list of the different groups that should be involved and questions to ask during the planning process. Include a graphic representation of the system that shows how the data become useful information. Indicate the information a student needs to choose courses and its sources. Explain how several types of management support systems could help students make better course decisions. Include ways the school could use the information it collects from this system. Have several students present their plans to the class, which will take the role of university management in evaluating them. (Resources, Systems, Technology)<\/li>\n<li>You recently joined the IT staff of a midsized consumer products firm. After a malicious virus destroys some critical files, you realize that the company lacks a security strategy and policies. Outline the steps you\u2019d take to develop a program to protect data and the types of policies you\u2019d recommend. How would you present the plan to management and employees to encourage acceptance? (Resources, Technology)<\/li>\n<li><strong>Team Activity<\/strong> Should companies outsource IT? Some executives believe that IT is too important to outsource and that application service providers don\u2019t have a future. Yet spending for ASP subscriptions, MSPs, and other forms of IT outsourcing such as cloud computing continue to grow. What\u2019s your position? Divide the class into groups designated \u201cfor\u201d or \u201cagainst\u201d outsourcing and\/or ASPs. Have them research the current status of ASPs using publications such as <em>CIO<\/em> and <em>Computerworld<\/em> and websites such as Enterprise Apps Today, http:\/\/www.enterpriseappstoday.com. (Interpersonal, Information)<\/li>\n<\/ol>\n<\/div>\n<div id=\"fs-idm239620256\" class=\"ethics-activity\">\n<h3>Ethics Activity<\/h3>\n<p id=\"fs-idm251562800\">As the owner of a small but growing business, you are concerned about employees misusing company computers for personal matters. Not only does this cost the company in terms of employee productivity, but it also ties up bandwidth that may be required for company operations and exposes the firm\u2019s networks to increased risks of attacks from viruses, spyware, and other malicious programs. Installing e-mail monitoring and web security and filtering software programs would allow you to track e-mail and internet use, develop use policies, block access to inappropriate sites, and limit the time employees can conduct personal online business. At the same time, the software will protect your IT networks from many types of security concerns, from viruses to internet fraud. You are concerned, however, that employees will take offense and consider such software an invasion of privacy.<\/p>\n<p id=\"fs-idm249757488\">Using a web search tool, locate articles about this topic and then write responses to the following questions. Be sure to support your arguments and cite your sources.<\/p>\n<p id=\"fs-idm251358848\"><strong>Ethical Dilemma:<\/strong> Should you purchase employee-monitoring software for your company, and on what do you base your decision? If you install the software, do you have an obligation to tell employees about it? Explain your answers and suggest ways to help employees understand your rationale.<\/p>\n<p id=\"fs-idm238756864\">Sources: KC Agu, \u201c6 Software Tools for Monitoring Employee Productivity,\u201d <em>Huffington Post<\/em>, https:\/\/www.huffingtonpost.com, December 6, 2017; Marissa Lang, \u201cElectronic Tracking Spurs Workplace Privacy Debate,\u201d <em>Government Technology<\/em>, http:\/\/www.govtech.com, October 18, 2017; Mike Rogoway, \u201cJive\u2019s Buyer Responds to Employee Anxiety over Workplace Monitoring Tool,\u201d <em>The Oregonian,<\/em> http:\/\/www.oregonlive.com.<\/p>\n<\/div>\n<div id=\"fs-idm252382768\" class=\"working-net\">\n<h3>Working the Net<\/h3>\n<ol id=\"fs-idm248998848\">\n<li>Enterprise resource planning is a major category of business software. Visit the site of one of the following companies: SAP (<strong>http:\/\/www.sap.com<\/strong>), or Oracle (<strong>http:\/\/www.oracle.com<\/strong>). Prepare a short presentation for the class about the company\u2019s ERP product offerings and capabilities. Include examples of how companies use the ERP software. What are the latest trends in ERP?<\/li>\n<li>What can intranets and enterprise portals accomplish for a company? Find out by using such resources as Brint.com\u2019s Intranet Portal, <strong>http:\/\/www.brint.com\/Intranets.htm<\/strong>. Look for case studies that show how companies apply this technology. Summarize the different features an intranet or enterprise portal provides.<\/li>\n<li>Learn more about the CERT Coordination Center (CERT\/CC), which serves as a center of internet security expertise. Explore its website,<strong> https:\/\/www.cert.org\/index.cfm<\/strong>. What are the latest statistics on incidents reported, vulnerabilities, security alerts, security notes, mail messages, and hotline calls? What other useful information does the site provide to help a company protect IT assets?<\/li>\n<li>Research the latest developments in computer security at <em>Computerworld<\/em>\u2019s site, <strong>http:\/\/computerworld.com\/<\/strong>. What types of information can you find here? Pick one of the categories in this area (Cybercrime, Encryption, Disaster Recovery, Firewalls, Hacking, Privacy, Security Holes, Vhttp:\/\/computerworld.com\/securitytopics\/securityiruses and Worms, and VPN), and summarize your findings.<\/li>\n<li>How can someone steal your identity? Using information at the Federal Trade Commission\u2019s central website for information about identity theft, https:\/\/www.consumer.ftc.gov\/features\/feature-0014-identity-theft, compile a list of the ways thieves can access key information to use your identity. What steps should you take if you\u2019ve been a victim of identity theft? Summarize key provisions of federal laws dealing with this crime and the laws in your state.<\/li>\n<\/ol>\n<\/div>\n<div id=\"fs-idm256563424\" class=\"critical-thinking\">\n<h3>Creative Thinking Case<\/h3>\n<div id=\"fs-idm248759648\" class=\"bc-section section\">\n<h4>Novartis\u2019s Prescription for Invoice Processing<\/h4>\n<p id=\"fs-idm250969536\">What do you do when you have more than 600 business units operating through 360 independent affiliates in 140 countries around the world\u2014processing complex invoices in various languages and currencies? You seek out the best technology solution to make the job easier.<\/p>\n<p id=\"fs-idm251721264\">At global pharmaceutical giant Novartis, the IT department is a strategic resource, a community of 2,000 people serving 63,000 customers in 200 locations and 25 data centers. Because most of the company\u2019s invoices come from international suppliers, they have differences in design, language, taxes, and currency. Consequently, many ended up as \u201cquery items\u201d requiring manual resolution by Novartis accounting staff\u2014which delayed payments and made those invoices extremely costly to process. In fact, finance personnel spent so much of their time resolving queried invoices that other work suffered. A solution was badly needed.<\/p>\n<p id=\"fs-idm249034400\">To maximize its investment, Novartis needed a flexible solution that would meet its current and future needs and function in other business departments in a variety of geographic locations. It should provide fast, accurate document capture and multi-language support, and should extend to other types of information\u2014such as faxes and electronic data\u2014in addition to paper documents. Finally, in order to obtain financing for the project, return on investment (ROI) was required within nine months of project implementation.<\/p>\n<p id=\"fs-idm253202112\">Input<em>Accel<\/em> for Invoices from EMC\/Captiva was the answer. The software extracts data from paper documents, applies intelligent document recognition (IDR) technology to convert them to digital images, and sends relevant data to enterprise resource planning, accounts payable (A\/P), and other back-end management systems. The specialized Input<em>Accel<\/em> server manages output by recognizing and avoiding holdups in the workflow process. It also ensures if a server goes offline, others will carry on functioning, thus avoiding downtime.<\/p>\n<p id=\"fs-idm248556416\">Now Novartis scans incoming invoices at a centrally located site, and the images are transmitted to the Input<em>Accel<\/em> for Invoices server for image improvement. Invoice data is then extracted and validated against supplier information. Most invoices are transferred directly for payment, with relatively few invoices requiring transfer to one of three accounts payable clerks who deal with queries manually. Novartis is a global leader in research and development of products that improve health issues. Input<em>Accel<\/em> was selected by Novartis to be part of its accounting system.<\/p>\n<p id=\"fs-idm250351104\">Thanks to IT, overall efficiency has increased, processing errors are reduced, and accounting personnel can use their time and expert knowledge for more meaningful tasks than resolving invoice errors. For Novartis, it is \u201cmission accomplished.\u201d<\/p>\n<div id=\"fs-idm249694496\">\n<div>Critical Thinking Questions<\/div>\n<ol>\n<li>What factors contributed to Novartis\u2019s invoice processing being so complex?<\/li>\n<li>How did IT help the company solve that problem?<\/li>\n<li>What other uses and functions does Input<em>Accel<\/em> serve, and how will this be useful to Novartis over the long term? (You may want to visit the EMC\/Captiva website, <strong>https:\/\/www.emc.com<\/strong>, for more information on Input<em>Accel<\/em>\u2019s capabilities.)<\/li>\n<\/ol>\n<\/div>\n<p id=\"fs-idm251420704\">Sources: \u201cOpenText Acquires EMC Enterprise Division,\u201d <em>MetaSource<\/em>, http:\/\/www.metasource.com, September 20, 2016; Novartis corporate website, http:\/\/www.novartis.com, March 20, 2006; \u201cProcessing Invoices From Around the World,\u201d <em>ECM Connection,<\/em> https:\/\/www.ecmconnection, February 2, 2006; Kathryn Balint, \u201cCaptiva\u2019s Paper Chase Paying Off,\u201d <em>San Diego Union-Tribune,<\/em> December 9, 2005, pp. C1, C5.<\/p>\n<\/div>\n<\/div>\n<div id=\"fs-idm251858704\" class=\"hot-links\">\n<h3>Hot Links Address Book<\/h3>\n<ol id=\"fs-idm243986960\">\n<li>If you want to know the definition of a computer term or more about a particular topic, Webopedia has the answer: <strong>http:\/\/www.webopedia.com<\/strong>.<\/li>\n<li>Can\u2019t tell a LAN from a WAN? Learn more about networking at Lifewire\u2019s Internet &amp; Networking pages, <strong>https:\/\/www.lifewire.com<\/strong>.<\/li>\n<li>To find out if that e-mail alerting you to another virus threat is real or a hoax, check out the latest information at <strong>http:\/\/www.snopes.com<\/strong>.<\/li>\n<li>How can you \u201cinoculate\u201d your computer against viruses? Symantec\u2019s Security Center has the latest details on virus threats and security issues: <strong>http:\/\/www.symantec.com<\/strong>.<\/li>\n<li>The CIO digital magazine offers helpful articles that provide a good introduction to key IT topics: <strong>http:\/\/www.cio.com<\/strong>.<\/li>\n<li>Curious about how companies are using on-demand grid computing? Read the Grid FAQ at the Grid Computing Technology Centre, <strong>http:\/\/www.gridcomputing.com<\/strong>, and then check out some of the many links to other resources.<\/li>\n<\/ol>\n<\/div>\n<div class=\"textbox shaded\">\n<h3>Glossary<\/h3>\n<dl id=\"fs-idm239412064\">\n<dt>cloud computing<\/dt>\n<dd id=\"fs-idm239290208\">A general term for the delivery of hosted services over the internet.<\/dd>\n<\/dl>\n<\/div>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-237\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Shared previously<\/div><ul class=\"citation-list\"><li>Intro to Business. <strong>Authored by<\/strong>: Gitman, et. al. <strong>Provided by<\/strong>: OpenStax. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"http:\/\/cnx.org\/contents\/4e09771f-a8aa-40ce-9063-aa58cc24e77f@8.2\">http:\/\/cnx.org\/contents\/4e09771f-a8aa-40ce-9063-aa58cc24e77f@8.2<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY: Attribution<\/a><\/em>. <strong>License Terms<\/strong>: Download for free at http:\/\/cnx.org\/contents\/4e09771f-a8aa-40ce-9063-aa58cc24e77f@8.2<\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section><hr class=\"before-footnotes clear\" \/><div class=\"footnotes\"><ol><li id=\"footnote-237-1\">Patrick Watson, \u201cWhy Bitcoin Has Inflation Risk,\u201d Equities.com, https:\/\/www.equities.com, January 13, 2018. <a href=\"#return-footnote-237-1\" class=\"return-footnote\" aria-label=\"Return to footnote 1\">&crarr;<\/a><\/li><li id=\"footnote-237-2\">Kaveh Waddell, \u201cCSI: Walmart,\u201d The Atlantic, https:\/\/www.theatlantic.com, April 3, 2017; Dave Smith, \u201cComputer Fraud and Abuse Act 2013: New CFAA Draft Aims to Expand, Not Reform, the \u2018Worst Law in Technology\u2019,\u201d International Business Times, http:\/\/www.ibtimes.com, March 28, 2013. <a href=\"#return-footnote-237-2\" class=\"return-footnote\" aria-label=\"Return to footnote 2\">&crarr;<\/a><\/li><li id=\"footnote-237-3\">\u201cRemote Work is \u2018the New Normal,\u2019\u201d Fast Company, https:\/\/www.fastcompany.com, February 28, 2018. <a href=\"#return-footnote-237-3\" class=\"return-footnote\" aria-label=\"Return to footnote 3\">&crarr;<\/a><\/li><li id=\"footnote-237-4\">Michael Guta, \u201c3.9 Million Americans\u2014including Freelancers\u2014Now Work from Home at Least Half the Week,\u201d Small Business Trends, https:\/\/smallbiztrends.com, April 2, 2018. <a href=\"#return-footnote-237-4\" class=\"return-footnote\" aria-label=\"Return to footnote 4\">&crarr;<\/a><\/li><li id=\"footnote-237-5\">Andrea Loubier, \u201cBenefits of Telecommuting for the Future of Work,\u201d Forbes, https:\/\/www.forbes.com, July 20, 2017; Michelle Conlin, \u201cThe Easiest Commute of All,\u201d Business Week, December 12, 2005, p. 78. <a href=\"#return-footnote-237-5\" class=\"return-footnote\" aria-label=\"Return to footnote 5\">&crarr;<\/a><\/li><li id=\"footnote-237-6\">Paul Trujillo, \u201c5 Reasons Small Businesses Need the Cloud,\u201d B2C Community, https:\/\/www.business2community.com, January 30, 2018. <a href=\"#return-footnote-237-6\" class=\"return-footnote\" aria-label=\"Return to footnote 6\">&crarr;<\/a><\/li><\/ol><\/div>","protected":false},"author":5759,"menu_order":7,"template":"","meta":{"_candela_citation":"[{\"type\":\"cc\",\"description\":\"Intro to Business\",\"author\":\"Gitman, et. al\",\"organization\":\"OpenStax\",\"url\":\"http:\/\/cnx.org\/contents\/4e09771f-a8aa-40ce-9063-aa58cc24e77f@8.2\",\"project\":\"\",\"license\":\"cc-by\",\"license_terms\":\"Download for free at http:\/\/cnx.org\/contents\/4e09771f-a8aa-40ce-9063-aa58cc24e77f@8.2\"}]","CANDELA_OUTCOMES_GUID":"","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-237","chapter","type-chapter","status-publish","hentry"],"part":225,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/suny-herkimer-osintrobus\/wp-json\/pressbooks\/v2\/chapters\/237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/suny-herkimer-osintrobus\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/suny-herkimer-osintrobus\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-herkimer-osintrobus\/wp-json\/wp\/v2\/users\/5759"}],"version-history":[{"count":2,"href":"https:\/\/courses.lumenlearning.com\/suny-herkimer-osintrobus\/wp-json\/pressbooks\/v2\/chapters\/237\/revisions"}],"predecessor-version":[{"id":585,"href":"https:\/\/courses.lumenlearning.com\/suny-herkimer-osintrobus\/wp-json\/pressbooks\/v2\/chapters\/237\/revisions\/585"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/suny-herkimer-osintrobus\/wp-json\/pressbooks\/v2\/parts\/225"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/suny-herkimer-osintrobus\/wp-json\/pressbooks\/v2\/chapters\/237\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/suny-herkimer-osintrobus\/wp-json\/wp\/v2\/media?parent=237"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-herkimer-osintrobus\/wp-json\/pressbooks\/v2\/chapter-type?post=237"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-herkimer-osintrobus\/wp-json\/wp\/v2\/contributor?post=237"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-herkimer-osintrobus\/wp-json\/wp\/v2\/license?post=237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}