Vladyslav Boloban, Marya Gogoleva & Jasmine White

Customer Information Security

Our topic of investigation is the security of customer information from a business perspective, in terms of how a business keeps a customer’s information secure and weaknesses in those security systems that are susceptible to hacking. We will investigate the management of the technology used to support information security and what managers specifically can do to ensure information security within a business. Examples of how hackers affect businesses, how those businesses recover, and what leads to the hacking of confidential customer information will be explored. 

BUS 360 Management of Information Systems

Steven Schmidt

Banquet Room

10 AM – noon

Daniel Brock & Javonte Byrd

Computer Software and its Impact on Businesses

There are many different types of computer software that impact businesses in a lot of different ways. For this project we look at two main types of software and the sub-categories within these two types. The first software we are going to look at is application software. Within application software we look at general-purpose application programs and application-specific programs and how businesses have used them and how they have changed the way they operate. The other type of software we look at is system software. Within this we look at system management programs and system development programs and the impact that it has on businesses. Computer software is always changing and it has a significant impact on how businesses operate, so that is why we wanted to look at how businesses are using it to make how they operate more efficient. 

BUS 360 Management of Information Systems

Steven Schmidt

Banquet Room

10 AM – noon

Kallie Gardiepy, Taylor Kraal & Ciara Wainwright

Northwest Christian University and Technology

The purpose of this project is to identify how business students are affected by the use or lack of, technology at Northwest Christian University and how it can affect students in the business program. This project also explores different scholarly journals that report on results from researches conducted on the effects of technology for business students in both undergraduate and master degree programs. Stead Halstead is going to be a main resource in determining what type of technology is available to both undergraduate and master’s degree students at Northwest Christian University. 

BUS 360 Management of Information Systems

Steven Schmidt

Banquet Room

10 AM – noon

Ian Hawksford, Colin McManamon & Joseph Piper

Telecommunications in Global Business

Telecommunication is essential to success within global organizations. The ability to communicate across the world instantly is a major factor to success. Sharing data between different departments of an organization aids in making managerial decisions. “Telecommunications and network technologies are revolutionizing business and society. Business have become networked enterprises. The Internet, the Web, and intranets and extranets are networking business processes and employees together and connecting them to their customers, suppliers, and other business stakeholders.” (Marakas & O’Brien, 2012, p. 231).

Telecommunication is not limited to the internet but can involve intranets for organizations that need to keep their data secure. Governments and private research facilities stress the need for privacy and security. There is a clear advantage in the use of telecommunication. Organizations that neglect to invest in the advances in telecommunication fall behind swiftly. As we research the different avenues of telecommunication and the organizations that use them, we expect to discover a clear difference in the sheer size and profitability or success of these organizations.

Marakas, G. M., & O’Brien, J. A. (2012). Introduction to Information Systems (16th ed.). New York: McGraw-Hill/Irwin.

BUS 360 Management of Information Systems

Steven Schmidt

Banquet Room

10 AM – noon

Jeni Hoffert & Hannah Mack

EMV Chips in the Business World

Identity theft has become a major threat in our highly advanced world of technology. Magnetic strip credit cards have recently been replaced by a more advance technology created by Europay, MasterCard, and Visa, titled EMV Chips. They have become the new standard in today’s payment methods. The purpose of the new chips was increased security through every single transaction customers made. For every single transaction made, a code is created. The code will never be duplicated or used for another transaction, thus making it harder for theft to occur. The United States is one of the last countries to implement this new technology into its commerce. Businesses must now become EMV compatible, which means changing some of their business practices. The costs of the new technology, as well as, the burden of transitioning liability for businesses who do not choose to become compatible has caused discussion on whether this new technology is going to be effective. Some fraudulent people have already figured out how to create theft with the new chips. The businesses that do become EMV compatible strengthen their relationships with customers and build trust. Although theft and fraud cannot be removed completely from the world of commerce, these new chips can drastically reduce them, making it more difficult for criminals to break the law.

BUS 360 Management of Information Systems

Steven Schmidt

Banquet Room

10 AM – noon

Peter Lentz, Richard Nelson & Barton Peterson

Business Logistics of Then and Now: A Study from 1980 to Present

Radio Frequency Identification (RFID) is used in retail, transportation, electronic, manufacturing, and distribution facilities. First, our group thought that the RFID technology has been cost efficient to companies around the world. Secondly, Barton and Peter agreed to patrician the task of calling in and interviewing companies that do use RFID technology and companies that do not use RFIDs. Certain interview questions pertained to cost effect of the use of RFIDs. Thirdly, Richard was assigned with researching the data of cost savings of companies that do use compared to companies that do not use RFIDs. Finally, after the completion of the interview questions of the companies that use RFID and those that do not, we compiled both sets of data into two separate bar graphs to validate the question of is it cost effective.

BUS 360 Management of Information Systems

Steven Schmidt

Banquet Room

10 AM – Noon