Learning Log 5: The Five Authors

In this activity, each of the students was tasked to look for 5 authors (can be fictional or non-fictional) and research on the lessons regarding strategic management. I have chosen the following authors and works: The Prince (Niccolo Machiavelli) Atlas Shrugged (Ayn Rand) The Wealth of Nations (Adam Smith) The Greatest Salesman in the World […]

Learning Log 4 – Industry Life Cycle

We continued our discussion on Industry Life cycle. There are 4 stages: Introduction Growth Maturity Decline We then classified the current stage of the companies we are comparing: Apple and Samsung. We classified Apple in the Maturity stage while Samsung in the Growth stage. We followed a framework defining the aspects of each stage such […]

Learning Log 3 – Porter’s Generic Strategies

We started the discussion by defining what competitive advantage is. Competitive advantage is defined as “an advantage over competitors gained by offering consumers greater value, either by means of lower prices or by providing greater benefits and service that justifies higher prices” There are two types of competitive advantage that we discussed: Low Cost – […]

Learning Log 2 – PESTLE Analysis

The PESTLE analysis is used to analyze whether the industry you want to invest in is feasible and sustainable in a particular place. At was I thought doing the PESTLE analysis is very easy since you are just going to list down all impacts on the business based on: Political, Economical, Social, Technological, Legal and […]

Learning Log 1 – Perspectives

This is the first time that I am taking the Strategic Management course. This course is usually taken by business students (in MBA) or even IT students since a lot of their subjects are business-related. All I know about Strategic Management is that it is a high-level subject where the management plans the direction of […]

MSORMAN Final Paper

I have finally submitted my final paper in MSORMAN. We were asked to create a paper following a template of an application of a best practice. I have chosen ISO 27000, which is a standard used to check security policies and controls implemented in an organization. I defined ISO 27000 in the start of my […]

MSPOLIS – Policy Report on Property, Privacy and Ethics

One of the major presentations/requirements in the IS Policy class is the presentation about policy creation for a specific topic. I chose the topic on Property, Privacy and Ethics since it overlaps with information security. My presentation is divided into 3 topics. Overview The terms asset, privacy and ethics are defined. Privacy effects of vulnerability […]

Learning Log 2 MSPOLIS

Learning Log # 2 Justin David Pineda MSPOLIS So far, I have started to learn how to answer case studies in an ‘acceptable’ manner. I am also trained to express my thoughts in class and defend the group’s answers. This is somehow new to me because in the technical world I just sit at my […]

PCI-DSS and Vulnerability Management

Last August 1, 2015, I presented about a known security standard for credit cards. The Payment Card Industry Data Security Standard (PCI-DSS) is a standard used to protect data of merchants and banks that utilize the credit card facility. There are 12 requirements of PCI-DSS. I focused my presentation on the vulnerability management side since […]

Meeting 7: July 18 Shanghai Bell revised and Integration Engineering

The exercise that we did 2 meetings ago was returned. I didn’t expect I will get a good grade. Thanks for the resources and lessons, Sir Fiel! 🙂 We presented the revised draft of our Shanghai Bell. We nailed the objective and problem statement. It’s the first time in class that a group was able […]