The Institute for Business and Information Technology (IBIT) Report is based on rigorous vendor neutral academic research. Each report provides actionable knowledge to industry, is reviewed by our industry editorial board, and focuses on an topic important to our industry partners.
Geospatial data produced by geographic information systems (GIS) play a central role in domestic economic and governmental activities. Publicly shared geographic information detailing locations and make-up of critical infrastructure have recently become a concern. This report outlines the unique opportunities, history, and threats of GIS, and how to effectively handle information security risks associated with public GIS data.
While oversight of cybersecurity risk management should be a regular agenda item for boards of directors, many boards do not have the knowledge or experience to address it. This IBIT Report is a call to action for boards, urging them to think more carefully about their investment of time and attention in securing their information assets. For boards just starting out as well as those already attempting to deal with this issue, the authors detail the steps to define roles and responsibilities, influence corporate culture, develop processes, and establish partnerships.
Show Me The Way To Go Home
The introduction of ride-sharing platforms such as Uber and Lyft have dramatically transformed the traditional licensed livery industry. However, their entry has not been without major controversy and debate on proper legal oversight, the impact on consumer safety, and overall benefit to the larger society. This IBIT report examines this tradeoff by first exploring the growth of the “sharing economy,” its benefits, and as its perceived threats to existing business models. It then focuses on an important social benefit that can come from this new service: the extent to which Uber has led to reductions in alcohol-related motor vehicle deaths. The report shows that alcohol-related motor vehicle deaths fell by up to 5.6% in California after the introduction of Uber X.
Is Government IT Spending Worth It?
Are tax dollars spent on information technologies (IT) worth it? Recent news of notable IT failures in the public sector, including a troubled launch of the Federal Health Insurance Marketplace (Healthcare.gov) in 2013, cast doubts on the government’s ability to manage large-scale IT investments. This report details how much return state governments in the U.S. can generate on IT investments that create greater efficiency. The research shows that, on average, a $1 increase in the budget of state chief information officers (CIO) leads to a $4.05 decrease in current expenses and capital depreciations.
Data—facts and statistics that are collected and used for reference or analysis—is far from a boring group of information bits. The most promising journalism start-ups of recent years focus on data journalism, the practice of finding stories in numbers and using numbers to tell stories. This is great news, because marketing in 2015 is all about content, and content creation requires presenting stories and information in a way that’s engaging to the reader. This report will help business leaders apply the data journalism model to content strategy and marketing campaigns.
This report describes the case of Campbell Soup Company’s (CSC) IT-driven organizational transformation at a key inflection point – the successful transition to a new service management operating model. Like similar transformations at other well-established organizations, this effort required an ambitious reinvention of its operating model. There were various drivers for the change, including lower cost and higher service quality, but a key result was the Information Technology function’s emergence as a critical strategic partner for the business. This is reflected in IT’s emerging role as a demand-shaping, instead of an order-taking, operation. This report reflects on the success of the initiative, as well as identifies areas for further gains with key lessons for other IT organizations facing similar internal and external pressures.
Building a Next Generation, Creative Urban Workforce for the Information Economy: Temple University’s Urban Apps & Maps Studios
The transition of many US cities from an economy focused on manufacturing to one focused on digital and information technology has contributed to the decline of many inner-city neighborhoods. The impact of this change has not been evenly distributed across the labor market and the disparity has affected urban, minority communities disproportionately. Philadelphia is an example of this imbalance. In response to this problem, Temple University launched an interdisciplinary, university-wide initiative in 2012 called Urban Apps & Maps Studios Program. The program’s goal is to cultivate design-based and civic minded start-ups that will foster sustainable economic renewal in the North Philadelphia neighborhoods surrounding Temple University. This IBIT report details the drivers of the economic decline and impact on Philadelphia, the origination and development of the program, examples of the program’s success, and the program’s potential and applicability to other urban communities.
Sports enthusiasts are likely familiar with the growing importance of analytics in sports franchise operations. Sports teams use analytics in a wide range of activities, including game management, player development, marketing, and finance. As a result, sports are becoming a proving ground for tomorrow’s business analytics technologies. This IBIT Report provides a history and the current state of analytics and big data in sports. It includes two case studies that detail specific applications, their value, and the potential benefits to other industries. Also, the report outlines lessons learned to assist readers in applying these techniques to their own organization or field.
This IBIT Report describes how the field of information security has evolved from establishing barriers to prevent unauthorized entry to identifying threats from within a company’s own defenses. The ever-increasing sophistication of hackers’ use of malicious software (malware) to elude perimeter security and operate over extended periods creates new challenges for the IT organization. These “Advanced Persistent Threats” require new approaches and frameworks. To protect against the barbarians inside the gate, the author recommends four transformative steps to achieve more robust enterprise security. Everyone concerned about the safety of their organization’s information assets will want to take note of these recommendations.
Please click here to see previous reports.
© 2013 Institute for Business and Information Technology, Fox School of Business, Temple University, Philadelphia, PA 19122, USA. All rights reserved. ISSN 1938-1271.