Session:13 Using Technology to Manage Information
Working the Net
Introduction to Business | Leadership Development – Micro-Learning Session
Rice University 2020 | Michael Laverty, Colorado State University Global Chris Littel, North Carolina State University| https://openstax.org/details/books/introduction-business
- Enterprise resource planning is a major category of business software. Visit the site of one of the following companies: SAP (http://www.sap.com), or Oracle (http://www.oracle.com). Prepare a short presentation for the class about the company’s ERP product offerings and capabilities. Include examples of how companies use the ERP software. What are the latest trends in ERP?
- What can intranets and enterprise portals accomplish for a company? Find out by using such resources as Brint.com’s Intranet Portal, http://www.brint.com/Intranets.htm. Look for case studies that show how companies apply this technology. Summarize the different features an intranet or enterprise portal provides.
- Learn more about the CERT Coordination Center (CERT/CC), which serves as a center of internet security expertise. Explore its website, https://www.cert.org/index.cfm. What are the latest statistics on incidents reported, vulnerabilities, security alerts, security notes, mail messages, and hotline calls? What other useful information does the site provide to help a company protect IT assets?
- Research the latest developments in computer security at Computerworld’s site, http://computerworld.com/. What types of information can you find here? Pick one of the categories in this area (Cybercrime, Encryption, Disaster Recovery, Firewalls, Hacking, Privacy, Security Holes, Viruses and Worms, and VPN), and summarize your findings.
- How can someone steal your identity? Using information at the Federal Trade Commission’s central website for information about identity theft, https://www.consumer.ftc.gov/features/feature-0014-identity-theft, compile a list of the ways thieves can access key information to use your identity. What steps should you take if you’ve been a victim of identity theft? Summarize key provisions of federal laws dealing with this crime and the laws in your state.