Monday, September 26, 2011

Brad Pitt's Moneyball Movie and General Petraeus' Counter-insu

We saw Brad Pitt's Moneyball on Saturday. It is a great movie. Brad Pitt and Phillip Peter Hoffman turn in excellent performances. Also, Chris Pratt plays another role besides that goofy shoeshine guy on NBC's Parks and Recreation. The whole movie reminded me of Gen. Petraeus' Counter Insurgency Field Manual for the U.S. Army: the challenger in a conflict must be powerful enough to present an asymmetric threat, but the defender must be nimble enough neutralize the asymmetric threat. (cf. von Clausewitz's "mathematics of a firefight").

Thursday, September 30, 2010

Wagner's MBA Law of U.S. Presidential Elections

Wagner's MBA Law of U.S. Presidential Elections: When voters are given what amounts to a binary choice between two candidates, the better looking, younger, and more photogenic candidate tends to win the election. This law has been true in every modern U.S. Presidential Election since Dewey v. Truman in 1948 with the possible exception of Ford v. Carter in 1976. Hence, policy platforms and the content of speeches don't ultimately win elections. Looks matter in print, broadcast, and social media!

Wednesday, September 1, 2010

Wagner's MBA Fundamental Law of Motivation

Wagner's MBA Fundamental Law of Motivation: People tend to do what they want to do, especially over long periods of time and if they are not impeded. For example, when people state they wish to do this or that, a long time has elapsed, and they have made only insignificant progress toward their goal, one can assume that either are misleading you or exaggerating their desire to complete their goal.

Tuesday, July 13, 2010

Accounting Related LinkedIn Networks

LinkedIn is a bit awkward to use as a networking tool and has recently started to copy some of the more usable elements of Facebook. Still, it does have its uses for keeping in touch with your business network.

Here are a few AICPA groups on LinkedIn.com worth checking out:

AICPA
AICPA Conferences
AICPA Trusted Business Advisor(sm) Solutions
CPA
Young CPA Network

All trademarks and service marks are the property of their respective owners.

Saturday, January 9, 2010

Free Cyber Security Training (Update)

Check out these Free Cyber Security Training certificates:

http://www.teexwmdcampus.com/main.k2/

Registration is required, but the courses are fully online and free through Texas Engineering Extension Service (TEEX) of the Texas A&M University System (TAMUS). It is unclear at this time how CE credits can be recorded.

IA General / Non-Technical

Information Security for Everyone
DHS Approved: TEI Course Number: AWR-175-W

Cyber Ethics
DHS Approved: TEI Course Number: AWR-174-W

Cyber Law and White Collar Crime
Under Review by DHS

IA Technical / IT Professional

Information Security Basics
DHS Approved: TEI Course Number: AWR-173-W

Secure Software
DHS Approved: TEI Course Number: AWR-178-W

Network Assurance
DHS Approved: TEI Course Number: AWR-138-W

Digital Forensics Basics
DHS Approved: TEI Course Number: AWR-139-W

IA for Business Professionals

Business Information Continuity
DHS Approved: TEI Course Number: AWR-176-W

Information Risk Management
DHS Approved: TEI Course Number: AWR-177-W

Cyber Incident Analysis and Response
DHS Approved: TEI Course Number: AWR-169-W

Monday, September 28, 2009

Free Cyber Security Training Certificates

Check out these Free Cyber Security Training certificates:

https://www.act-online.net/

Registration is required, but the courses are fully online and free. CEUs are available through the University of Memphis for a small processing fee.

IA General / Non-Technical

Information Security for Everyone
DHS Approved: TEI Course Number: AWR-175-W

Cyber Ethics
DHS Approved: TEI Course Number: AWR-174-W

Cyber Law and White Collar Crime
Under Review by DHS

IA Technical / IT Professional

Information Security Basics
DHS Approved: TEI Course Number: AWR-173-W

Secure Software
DHS Approved: TEI Course Number: AWR-178-W

Network Assurance
DHS Approved: TEI Course Number: AWR-138-W

Digital Forensics Basics
DHS Approved: TEI Course Number: AWR-139-W

IA for Business Professionals

Business Information Continuity
DHS Approved: TEI Course Number: AWR-176-W

Information Risk Management
DHS Approved: TEI Course Number: AWR-177-W

Cyber Incident Analysis and Response
Under Review by DHS

Friday, September 25, 2009

Should Employers "Stalk" Employees on Facebook?

Herein lies the problem... Nearly anything that you discuss or post anywhere could be taken out of context by someone and used to "stalk" you. On social networking sites, the term "stalk" means to hunt for information that would harm someone and harass them with it. Isn't that what businesses are doing when the look at social networking sites to perform background checks?

For example, say that you mention in the lunch room that you and your family had a great time at Disneyworld; this information gets around the company and your boss thinks you don't need a raise right now, because you can afford to go to Disneyworld.

Now, add Facebook to the mix. You or one of your family members mention on Facebook that you had fun in Disneyworld. Everyone is able to snoop around and find the pictures, etc. The problem is not that you used Facebook; the problem is that people in your company may not understand how to properly use social networking sites. Hence, just because you took your family to Disneyworld doesn't mean you don't need a raise.

Facebook is not the problem, but it does make it easier for the company to stalk employees and misuse information. That same information could be obtained by eavesdropping in the lunch room or driving by an employee's house and looking through the windows.

The problem is sharing information with people at work in general and not necessarily through Facebook. Social networking may accelerate dysfunctional processes already present within an organization. Of course, who wants to work for a company that operates like that?