20 June 2014

MIS750_5: Mobile (Smart) Phones, Mobile Phones Every Time


Ever been to a restaurant, either with friends or your own family nowadays, and when everybody starts staring at their mobile phones?
Yes? No?
Yes, mostly yes.
Mobile phones are in fact an important part of modern life. We somehow have to admit this very fact. However, during mealtime, especially so at the restaurants, there should be some of etiquette on using mobile phones, if possible.
Firstly maybe nobody should be allowed to look at a phone during dinner. The phone must be placed facedown, you can look at it but never touched. Not even a minute to check the email.
Definitely not Facebook, especially if you want to 'hipsterly' snap the photo of the food or selfie your ownself and upload it via your Facebook (or Instagram) to get as many likes.
What about when going to the toilet? Yes, using your phone is permissible, else like me I still bring the car magazines.
If during the dinner conversation to need to check some facts when suddenly you are out of ideas, then 'googling' Google might be permissible, but not encouraged.
What about Twitter? Especially you want to find out what actually happened to Spain in the FIFA World Cup, when it was the former champion which the first to pack their bags and did not survive the first round. Maybe a yes.


Sources:
New York Times, Wikipedia, Information Technology for Management 6th Edition

19 June 2014

MIS750_4: Alien Software

Ever watched the blockbuster movie called “Independence Day” (ID4) recently shown in Astro, starring Will Smith? In the movie, an alien mothership enters Earth's orbit and deploys several dozen saucer-shaped destroyer spacecraft, each about 24 km wide in circumference.

However, a MIT graduate computer geek devises a plan and introduced a computer virus and disrupted the force fields of the destroyers, and the aliens were defeated. In a not related circumstances in Chapter 9 of MIS750, there is a topic on Information Security and the many types of software attacks including the term alien software.

Among the types of alien software for humans like us are as follows:
  1. Pestware: Clandestine software that uses up valuable system resources and can report on your Web surfing habits and other personal information.
  2. Adware: Designed to help popup advertisements appear on your screen.
  3. Spyware: Software that gathers user information through the user’s Internet connection without their knowledge.
  4. Spamware: Designed to use your computer as a launch pad for spammers.
  5. Spam: Unsolicited e-mail, usually for purposes of advertising.
  6. Cookies: Small amount of information that Web sites store on your computer, temporarily or more-or-less permanently.
Back to ID4, during the movie screening, back in mid 90s the audiences (in America) were standing up in cinemas to cheer the trailer, which showed such US landmarks as the Empire State Building and the White House being obliterated by giant flying saucers. The truth was, ID4 was never going to be anything else but a massive box-office hit of over US$800 million.
However, once you've got past the “too much” explosions and the astonishing amount of vehicular, architectural, and airborne carnage, ID4 is basically a boy's own adventure with soap opera elements that has an entire species of technically superior aliens bested in all departments by good old Uncle Sam (an American) and his can-do (Amerika Boleh) spirit.

Sources:
New York Times, IMDB, BBC1, Wikipedia, Information Technology for Management 6th Edition

MIS750_3: Strategy on Targeted Advertising

In MIS750 Chapter 7, we are exposed to a topic on “IT Strategy & Planning”.

In short, strategy is the direction of an organisation to achieve competitive advantage by allocating its resources for growth especially within a challenging environment. The organisation will then need to develop a strategy of performing activities differently than its competitors.
This includes making radical changes to the business processes for producing or distributing products and services innovatively which sometimes the fundamental structure of the industry.
For example Facebook has recently announced two major changes to its advertising policy that will let it track users across the web while giving them access to the advertising profiles created by the social network of their likes and interests. The site creates profiles in order to sell targeted adverts tailored to the individual but has never before let users view or edit the information in those files.
In addition to Facebook users, other web browsing activities outside of Facebook will also be added to this profile through the Facebook ‘Like’ button. Even if individuals do not click this on third-party sites it still registers their presence if they are logged into Facebook in the same browsing session.
Similar buttons from Twitter and Google have identical abilities, but this is the first time Facebook has chosen to utilise this wealth of data. If users don’t want to be tracked in this way then they can opt out via the Digital Advertising Alliance or for mobile browsing adjust their settings on their handset.
The strategy adopted by Facebook is via “targeted advertising” that the aim to make it clearer to individuals why they were seeing certain ads. It is anticipated that although Facebook is giving people more control over what sort of adverts they see they’re also becoming more aggressive regarding the types of data they collect.
Targeted advertising is a type of advertising whereby advertisements are placed so as to reach consumers based on various traits such as demographics, psychographics, behavioural variables such as product purchase history.
Most targeted new media advertising such as the one by Facebook uses second-order proxies for targeting, such as tracking online or mobile web activities of consumers, associating historical webpage consumer demographics with new consumer web page access, using a search word as the basis for implied interest, or contextual advertising.
A conducted a study on targeted advertising in 2009 revealed that targeted advertising has secured an average of 2.7 times more revenue per ad as non-targeted "run of network" advertising.
Sources:
New York Times, Wikipedia, Information Technology for Management 6th Edition

07 June 2014

MIS750_2: How to Steal a UAV?


I confessed that I’m a kind of a movie buff, especially if the movies or TV series are with a spy-thriller genre, the intelligent ones off course ...

In my last MIS750 blog entry, I did mention about the UAV. This time I wanted to elucidate a little more with regard to this wonderful piece of high technology and how actually MIS works in practice.

In Chapter 5 of MIS750, we learned a bit about what is called as the Enterprise Information Systems (EIS). An example of the deployment of EIS is by the United States (US) Military to enhance communications by allowing quick dispersal of combat intelligence and connecting support applications with tactical applications.
In the recent and on-going ‘24:Live Another Day’ shown every Tuesday 10.00 pm on AXN, the tv series plot is about a group of terrorist who managed to capture 10 drones (UAV) that belongs to the US Military and wanted to launch attacks at designated targets in London as possibly creating catastrophic disasters.
Actually at first the plot seems strange enough, as how a group of terrorist could hijacked sophisticated US Military drones. However,  the fact is, this has been done before by Iran in December 2011. Iran’s cyber warfare unit stationed near a city of Kashmar managed to brought  a US Military  drone down with minimum damage. 

According to one report, the drone was captured by jamming both satellite and land-originated control signals to the UAV, followed up by a GPS spoofing attack that fed the UAV false GPS data to make it land in Iran at what the drone thought was its home base in Afghanistan.

There is also an unconfirmed news that the very same drone technology is said to have undergone reverse engineering, fully decoded and was being smuggled from Iran to China via a supposedly safe route i.e. MH370 flight, and the rest is history (yet to be uncovered).

A typical US Military drone like the MQ-9 Reaper and RQ-170 Sentinel (the model captured by Iran) posses highly advanced avionics and complex mechanical systems technology to perform in any airspace environment.  These drones are equipped with precise and independent inertial position information for navigation, targeting and attitude reference. The drone power plant for example was designed for low size, weight and power consumption operating across the spectrum of rugged military environments.

For the US Military the EIS workload is largely handled by their Defense Information Systems Agency (DISA). The DISA provides, operates, and assures command and control, information sharing capabilities, and a globally accessible enterprise information infrastructure in direct support to the US national interests.

As for the case of mobilizing the drones, the DISA provides support to engineer, develop, maintain, and operate a global net-centric enterprise in direct support to joint and coalition across the full spectrum of the drones’ operations. This includes designing and implementing a high-capacity, strategic communication network to ensure reliable communications and less dependency on satellite communications and tactical microwave links, which had limited bandwidth capacity and other limitations including possibly exposed to hostile cyber warfare attacks similar to what Iran has done in 2011.

Al Buraq: Through the Scientific Lenses

(17:1) Glory be to Him, Who transported His Servant one night from the Masjid-i-Haram to the distant Temple, whose surroundings We have bles...