You are here:

Journal of Information Technology Education: Discussion Cases

Jan 26, 2017 Volume 6, Number 1


Grandon Gill

Search this issue

Table of Contents

Number of articles: 12


    Jay Hoecker, Debbie Bernal, Alex Brito, Arda Ergonen & Richard Stiftinger

    The current data management systems for the life cycle of scientific models needed an upgrade. What technology platform offered the best option for an Enterprise Data Management system? More

    View Abstract

    Robert Hammond

    Should Syniverse, a company whose principal business involved routing text messages between telecom carriers, re-think its business? Rob Hammond, product executive for enterprise products, wonders ... More

    View Abstract

    Troy Montgomery

    Determining how a corporate real estate organization estimated its project costs was a big decision that impacted budgets, customers, and the bottom line. What recommendations should be made for... More

    View Abstract
  4. SiteWit Corporation: SQL or NoSQL? That is the Question!

    Don Berndt, Ricardo Lasa & James McCart

    Ricardo Lasa, CEO and co-founder of SiteWit Corporation, and his team faced a critical technology challenge in scaling the core database systems to meet rapidly escalating data volumes. Should he... More

    View Abstract
  5. LifeInsure: Choosing a PAS to Manage and Maintain Their Product Lifecycle

    Jean-Paul Van Belle & Kaasiefa Gasant

    Joseph Bromer, Head of IT Solutions Delivery at LifeInsure Emerging Markets, deliberated on a challenge that he had just been given. TIBCO, a vendor supporting ObjectStar, notified LifeInsure that ... More

    View Abstract
  6. Virtualization Footprint: Why Re-Invest?

    Marc Thomas & Jean-Paul Van Belle

    Mark Dumas, a Systems Specialist at a Telecommunications Company located in South Africa needed to make decisions regarding the current virtualized infrastructure platform. These decisions also... More

    View Abstract
  7. Standard Bank: The Agile Transformation

    Kevin Johnston & Grandon Gill

    South Africa\u2019s largest bank has recently completed a transformation from traditional systems development to the scaled agile framework. The individual leading the transformation is now... More

    View Abstract
  8. A Digitally Enabled Strategic Sourcing Process to Mitigate Risk

    Kim Cupido & Jean-Paul Van Belle

    A South African insurance company is considering how to automate the process of handling home insurance repair claims in order to make the process more efficient and improve the customer experience... More

    View Abstract
  9. A Cybersecurity Executive DBA?

    Utkarsh Shrivastava & Taufeeq Mohammed

    After the successful launch of a DBA program for working executives, the program’s academic director ponders whether or not there might be an opportunity to create a cybersecurity doctoral program ... More

    View Abstract
  10. Got Hacked!

    Taufeeq Mohammed, Utkarsh Shrivastava, Ashish Das & Quynh Nguyen

    A professor in information systems discovers that his personal website has been hacked. Even worse, his ISP has suspended his site because the defacement included a PayPal phishing scheme. This is ... More

    View Abstract
  11. Employing Dynamic Logic in Cybersecurity

    Grandon Gill & Bernardo Rodrigues

    A physicist who studies the human brain has adapted dynamic logic, a machine learning algorithm he developed, to run on a test database of network traffic. The algorithm has proven surprisingly... More

    View Abstract
  12. Behind Enemy Lines

    Jonathan Elder, Nicole Jacobson, Natalie Remsen & Kim Wilmath

    A client of a security services firm has received an email from the dark web demanding a ransom or it will start selling data it has stolen from the client. The client as asked for the firm\u2019s ... More

    View Abstract