MGMT205 - Management Information Systems (Contemporary Issues in MIS)

Jun 9, 2024

MGMT205 - Management Information Systems

Lecture on Contemporary Issues in MIS

Introduction

  • Final Lecture: Covers three major issues in MIS.
    • Passwords
    • Artificial Intelligence (AI)
    • Big Data
    • Ethical issues surrounding AI and Big Data

Passwords

The Uncertain Future of Password Use

  • Good Password Criteria:

    • Difficult for humans to guess
    • Use a mix of uppercase, lowercase characters, numerals, and special characters
    • Avoid common words and recognizable phrases
  • Password Comparisons:

    • Password 1: UprootCapitalrj9u3, &KCapitalP
      • Advantages: Difficult to guess, conforms to established rules, no dictionary words
      • Disadvantages: Difficult to remember, not user-friendly
    • Password 2: Private Password
      • Advantages: Easy to remember, easy to use
      • Disadvantages: Appears weak, but length contributes strength
  • Length Matters:

    • The longer the password, the more secure it is
    • Example Passwords Test:
      • Password 1: 10 characters - Strong online (19.24 million centuries to hack online) but weak offline (1 week with massive array)
      • Password 2: 16 characters - Extremely strong online and offline
      • Password 3: Combining complexity and length - 1.41 100 million centuries to crack
  • 10 Rules for Secure Password Use:

    1. Use passphrases (multiple words)
    2. Include mix of characters
    3. Length of up to 16 characters
    4. Avoid easy-to-research facts
    5. Avoid reusing passwords
    6. Do not write passwords physically
    7. Never share passwords
    8. Change passwords regularly
    9. Memorize frequently used passwords
    10. Record passwords securely (password-protected electronic document recommended)
  • Risks with Password Managers:

    • Trust issues: Free software might sell data
    • Preferred method: Use Microsoft Word, encrypted and password-protected document
  • Two-Factor Authentication (2FA):

    • Added layer of security beyond passwords
    • Requires a second login process (e.g., code sent to smartphone)
  • Problems with Passwords:

    • Users reuse and simplify passwords because creating complex, unique passwords is cumbersome
    • Users think they are not targeted by hackers
    • Users carelessly handle password security
    • Companies sometimes mishandle user data

Artificial Intelligence

Overview

  • AI Definition:

    • Building smart machines capable of performing tasks requiring human intelligence
    • Deep learning and natural language understanding
  • Applications of AI:

    • Ranging from simple to complex tasks (e.g., playing chess to self-driving cars)
    • Voice input, autonomous vehicles, automated tasks
    • Enhances business efficiency and decision-making
  • Impact on Jobs:

    • AI performs tasks at greater scale and speed than humans
    • Potentially puts human jobs at risk

Big Data

Should We Be Concerned?

  • Definition Revisit:

    • Massive volumes of diverse data generated by businesses
  • Privacy Concerns:

    • Data Collection by Companies (e.g., Facebook, Google, Apple)
      • Ubiquity of smartphones allows detailed data collection
      • Collected data includes location, activities, preferences
      • Companies use this data for profiling and predicting consumer behavior
  • Cases of Privacy Intrusion:

    • Facebook caught turning on user cameras secretly
    • App developers capturing more data than necessary
  • Ethical Considerations:

    • Transparency about data collection processes
    • User awareness and control over their data
    • Ethical use and protection of data collected

Conclusion

  • Emphasis on privacy, ethics, and future trends in MIS
  • Encouragement to be vigilant about data and security

Final Assignment Reminder

  • One assignment remains before the end of the course

Closing Remarks

  • Thanks and best wishes for the future