Documente Academic
Documente Profesional
Documente Cultură
INNOVATIONS IN
TEACHING & RESEARCH
11/16/16
M.P.Gupta
IIT Delhi
Agenda
2
Researc
h
Teachin
g
High Impact
Cartoons
Macro/ Global
issues
Latest news
Open evaluation
Validation
Open internet
Research paper
Term project
11/16/16
Research
High Impact
Macro/ Global issues
Open evaluation
Validation
11/16/16
What is research?
Research
6
Deductive (top-down)
Inductive (bottom-up
Aimed at testing a
theory
Generation of a new
theory from data
Associated with
quantitative research
Focus on new
phenomenon or
different perspective
Associated with
qualitative research
(grounded theory)
11/16/16
Surveys
Laboratory experiments
Simulation
Mathematical modelling
Structured equation
modelling
Statistical analysis
Econometrics
Triangulation
The word triangulation
has 2 meanings
Quantitativ
e
Qualitative
Others
Triangulati
on
The key idea is to look at the same topic but from different
angles
It is relatively common for qualitative researchers to use
the second form of triangulation, less so the first
Perhaps one of the best ways to triangulate qualitative and
quantitative methods is to involve multiple researchers who
10
Overview of Qualitative Research
have
the required expertise
Relevant Research
Scientific research
Emphasis on meeting
scientific standards such
as validity and reliability
Subject to academic peer
review
Published in academic
journals
Theoretical contribution
Relevant to business
practitioners
Emphasis on being of
practical immediate
relevant to practice
Published in consulting
reports or industry
magazines
Practical contribution
12
13
11/16/16
Study Design
14
Research question
(0)
Research Objective
(s)
Research
Methodology
1.
2.
3.
To device a mechanism
(tool/
instrument)
to
measure the current status
of
an
organizations
information
security
management practices
Qualitative (semi-structured
interviews)
Qualitative (semi-structured
interviews) and Quantitative
(questionnaire survey)
11/16/16
15
11/16/16
Hypothesis
16
statement of prediction
Usually a hypothesis
(prediction) goes with
another hypothesis (null) i.e.
other possible outcome
H (null)=s a result of
employee training program,
there will either be no
significant difference in
employee absenteeism or
there will be a
statement of prediction
Usually a hypothesis
(prediction) goes with
another hypothesis (null) i.e.
other possible outcome
H (null)=s a result of
employee training program,
there will either be no
significant difference in
11/16/16
employee
absenteeism or
Two-tailed hypothesis
17
18
11/16/16
19
11/16/16
Teaching
20
11/16/16
21
11/16/16
22
11/16/16
23
11/16/16
24
11/16/16
25
11/16/16
26
11/16/16
27
11/16/16
28
11/16/16
29
11/16/16
30
11/16/16
31
11/16/16
11/16/16
London 2012 will be the sixth Olympic Games for Atos Origin, the Worldwide IT Partner of the
International Olympic Committee (IOC),
In Beijing, Atos Origin securely processed 60 per cent more competition data than in Athens,
totalling 1.5 million messages.
Atos Origin in conjunction with the other technology partners and the London Organising
Committee of the Olympic and Paralympic Games (LOCOG), is leading the integration of the
technology infrastructure and systems to ensure huge volumes of data can be processed and
delivered on demand to commentators, journalists, TV viewers and website visitors.
Evaluating the use of new technologies, such as virtualisation, so that the London 2012 Games
use less energy and hardware than in Beijing. Remote INFO, a service which provides access to
the London 2012 intranet could also be used to help reduce the seven million sheets of paper that
were printed in Beijing by providing the competition schedules and results directly to the
journalists computers.
Implemented a new solution, designed together with the IOC, the Olympic Data Feed - to
consolidate all data feeds to the newswires, websites and London 2012 intranet into a single
solution to provide a more sustainable and efficient service.
We are expecting to increase access to the Commentator Information Systems from outside the
host city, enabling journalists to access the rich information from the offices in their home
countries to reduce costs and the carbon footprint."
34
11/16/16
35
36
The major banks have already set aside more than 8.5bn
for the mis-selling of the insurance.
Cont..
37
Hester, RBS might have been able to avoid its computer crisis if more had
been spent on upgrading existing systems rather than on developing new
applications.
RBS is among four banks to have reached an agreement with the Financial
Services Authority over interest rate swap mis-selling, but has not yet
quantified the cost of any compensation for customers.
A dirty great big, state of the art IT system is what a retail bank
sells to its customers, where on earth is the competition in having
a Lloyds subsidiary capitalised by Lloyds and running on Lloyds IT
systems with former Lloyds management and a preposterous
fiction that it is not Lloyds at all but another competing bank.
11/16/16
39
11/16/16
40
CAN I FORCE
NATWEST TO COVER
ANY PENALTIES?
The crisis-hit bank has so
far refused to confirm
specifically whether it
will compensate
customers if they are hit
with late payment fees
from third parties through no fault of their
own.
Our banking
correspondent explains
customers' rights when it
comes to getting justice
from financial services
firms.
11/16/16
It launched a system - GetCash - that would allow people to take cash from an ATM
without using their cash card, by making a request on their handset.
They are sent a six digit pin number, after making the request, which can be entered at
a cash machine.
The aim, the bank said, was to help people who may have lost or forgotten their card or
those who want to leave their wallet at home.
It was made available to around two and-a-half million customers who already have the
banking app on their phone - on iPhone, Android or BlackBerry Smartphones, and on
the iPad.
The launch comment from Ben Green, head of mobile at NatWest and RBS, well now
have a sense or irony: 'We've heard countless stories from customers who've left their
wallet behind, or parents who need a quick way to send money
across to their children
11/16/16
immediately.'
A Manager Was sitting on his desk and waiting for the day to end. He wanted to leave
early as he had some personal engagement.
Suddenly he saw a notification mail from Governance tool he was managing, informing
him about cancellation of some governance document. He was surprised to see the
notification, as he was not supposed to get the notification. He also had admin right, he
checked the tool and he found that he is not supposed to get the notifications as per
configuration.
Suddenly his phone start ringing outlook wasbombardedwith emails and he found that
everyone in the client side is getting the notification.
It was reported as incident. CEO also got the notification, he asked CIO what is it for. CIO
asked technology team and Technology Team Service Manager asked the Manager to
explain.
As root cause analysis was done, it was found that while changing the Work flow a
developers has selected the group everyone and saved the work flow. As he saved the
work flow, notification was triggered to everyone as configured. That was a Human Error,
but due to this error , everybody was worried and an escalation occurred.
A message was put in intranet for this incident, but due to all this Manager was not able
to fulfil his personal commitment which was very important for him.
11/16/16
46
But this success of Indian BPO companies was marred by a few scandals in
2005.
In April 2005 some workers on the payrolls of MphasiS BFL Pune, garnered
Personal Identification Numbers (PIN) and net passwords from the U.S.
Citibank customers and drew money from their accounts.
This incident made a serious dent in the credibility of the Indian BPO
industry. Experts realised that the security factor could make or break the
industry.
Hence, the Indian call centers and other BPOs agreed to create a
centralised information bank. The information bank would maintain records
of educational, occupational and credit histories of employees and enable
employers to conduct employee background checks.
11/16/16
NORA
47
NORA
48
NORA
49
9/11 case: For the case of Atta, NORA would have identified
that he at one point shared a home address with two other
9/11 terrorists, Khalid Al-Midhar and Salem
Alhazmi.
11/16/16
50
Anonymous Entity
Resolution
That is, by using one-way hashes, you can look across various
databases for a match without actually pooling all the data and
making it available to all.
BySean O'Hare
6:02PM BST 03 May 2011
51
ofSBA's intl
The original Swiss idea was that the rate should mirror
what the foreign client would pay in witholding tax back
home. If the UK signs the agreement it would receive the
tax revenue without the identity of the client being
revealed," he added.
Continental Can
Outsourcing Contact between CSC & EPA
Software Bomb at Revelon
11/16/16
http://www.nytimes.com/1990/10/25/business/company-news-rev
lon-accuses-a-supplier-of-sabotaging-its-software.html
53
11/16/16
54
Filed in California Superior Court in Santa Clara County, the suit charged
breach of contract, trespassing, interference and other violations.
Revlon
55
Logisticon, which was established in 1974, had a contract to supply Revlon with
software to manage inventory.
According to the lawsuit and to both parties, Revlon complained that the software
was not performing up to expectations, and on Oct. 9 said it would withold a
$180,000 payment on half of a two-part contract.
Revlon also told Logisticon that it would cancel the other half of the agreement,
valued at $600,000.
A few days later, at around 2:30 A.M., Eastern time, on Oct. 16, Logisticon gained
access to Revlon's computers over the telephone and activated commands that
disabled the software it supplied.
Revlon said Logisticon had activated viruses that unbeknownst to Revlon had been
planted in the software, making Revlon's data incomprehensible. Logisticon's
Response
Donald J. Gallagher, Logisticon's president, said today that the company did not use
any viruses and that it did not destroy any Revlon data, although Revlon could not
gain access to the data when the software was disabled.
Mr. Gallagher added that while some bugs ought to be expected in complex
computer programs, Revlon was still using the software without paying for it.
He also said the cosmetics company was exaggerating the11/16/16
extent of the damage,
since Revlon had manual backup systems that could be used when computer
Revlon..
56
11/16/16
The case covered 315 layoffs at a St. Louis plant, and 43 of the company's
other 45 plants might be affected.
11/16/16
58
A suit on behalf of employees at a Los Angeles plant was won by the employees; a suit filed on
behalf of Pittsburgh employees is still in litigation. Judge Sarokin said in his ruling that there was no
need to hear the other cases against Continental, based in Norwalk, Conn.
''What the judge has said is that this should end all the cases everywhere,'' said Robert Plotkin, a
lawyer for the workers. ''This is not a case of a class-action suit where plaintiffs each have a claim
to $10. What we're talking here is, you have many former employees who have individual claims
worth in excess of $100,000.''
Douglas G. Eakeley, who represented Continental Can, did not respond to telephone calls seeking
comment. Layoffs at Issue
The pensions in question were special ''magic number'' pensions negotiated in 1977 by the United
Steelworkers union for employees subject to periodic layoffs. They were intended to protect
employees with long years of service who had not yet reached normal retirement age.
Lawyers for the workers have maintained that Continental management adopted a secret plan to
prevent employees from vesting in the costly pensions by laying them off before they became
eligible. The judge agreed with that argument.
A Federal pension law, called the Employee Retirement Income Security Act, prohibits employers
from taking any action against workers for the purpose of interfering with their pensions.
''For a corporation of this magnitude to engage in a complex, secret and deliberate scheme to deny
its workers bargained-for pension benefits raises questions of corporate morality, ethics and
decency which far transcend the factual and legal issues posed by this matter,'' the judge said.
Mr. Plotkin said the ruling should convince the company to quit dragging the suit on, but that he
was not counting on it. ''Continental's continued efforts to avoid its obligations to those employees
any way it can are deplorable,'' he said.
11/16/16
Company lawyers had argued there was no secret plan in place, and that even if there were, the
Those India employees then had distributors pay local vendors, which
didn't provide anything to Oracle. The payments were covered up with
bogus invoices.
Oracle India secured a $3.9 million deal with India's Ministry of IT in May
2006.
2 months later, one of those same Oracle India employees created and
provided to the distributor eight invoices for payments to purported
third-party vendors ranging from $110,000 to $396,000.
11/16/16
Apple vs Samsung
60
11/16/16
American Apparel Inc., which manufactures Army uniforms in Alabama, has laid off
150 workers as a result of going head-to-head with Unicor for government contracts.
With some exceptions, Unicor gets first dibs on federal contracts over private
companies as long as its bid is comparable in price, quantity and delivery. In other
words: If Unicor wants a contract, it gets it.
And that makes Wilson and other small business owners angry.
Wilson has been competing with Unicor for 20 years. He's an executive at American
Apparel Inc., an Alabama company that makes military uniforms. (It is not affiliated
with the international retailer of the same name.) He has gone head-to-head with
Unicor on just about every product his company makes -- and said he has laid off 150
people over the years as a result.
"We pay employees $9 on average," Wilson said. "They get full medical insurance,
401(k) plans and paid vacation. Yet we're competing against a federal program that
doesn't pay any of that."
Unicor, also known as Federal Prison Industries, is part of the U.S. Bureau of Prisons.
It has been preparing inmates for jobs after they get out since
1934.
11/16/16
The program has 83 factories and makes goods in seven industries -- apparel being
62
McConnell, one of the top Republicans on Capitol Hill, issued a public statement urging Unicor to back off. The
next day, it did.
With 100 employees, Mansh said Ashland is Olive Hill's largest employer. And he said losing the Air Force contract
would have shut the factory down.
"That's 100 people buying groceries. We use trucking companies in the town, buy parts and light bulbs there
every day," he said. "That's all lost when prisons take away contracts."
Unicor is not required to pay its workers minimum wage and instead pays inmates 23 cents to $1.15 an hour. It
doesn't have health insurance costs. It also doesn't shell out federal, state or local taxes.
Advocates for private sector companies are loudly campaigning for reform of Unicor's preferential status.
Unemployment has been over 8% for nearly four years "and there's a federal program tanking our industry," said
Kurt Courtney, director of government relations at the American Apparel and Footwear Association. "The only way
for workers to get jobs back is to go to prison. There's got to be a better way to do this."
In 2008, Congress amended the law to limit Unicor's advantage for certain kinds of Pentagon contracts. Now a bill
in the House supported by 28 lawmakers from both parties would go further and require Unicor to compete across
the board. The bill also provides alternative ways for training inmates, who would instead work for charities,
religious organizations, local governments or school districts.
"We know that in the recovery, many new jobs are coming out of small businesses," said Rep. Bill Huizenga, a
Michigan Republican who introduced the bill. "It makes no sense to strangle them in the cradle."
Huizenga expects a similar bill to be introduced in the Senate in the coming months.
Unicor doesn't agree with the criticism. According to spokeswoman Julie Rozier, inmates working for Unicor are
24% less likely to reoffend and 14% more likely to be employed long-term upon release. She also noted that over
40% of Unicor's supplies were purchased from small businesses in 2011.
She cited the unique costs associated with operating within a prison. For example, Unicor employs more
supervisors than a private sector firm would, and security lockdowns disrupt production.
Businesses aren't buying it. John Palatiello, president of the Business Coalition for Fair Competition, said his
organization of businesses and taxpayer groups is sympathetic to Unicor's goals. But they shouldn't be
11/16/16
April 17,
2009
63
The court found on Friday that the men the three founders, Frederik Neij,
Gottfrid Svartholm Warg and Peter Sunde, as well as Carl Lundstrom, who
provided financing had aided copyright infringement by operating the
site, which provides links to thousands of songs, films, video games and
other material, and helps users download them.
They were each sentenced to a year in prison and were also ordered to pay
30 million kronor (about $3.6 million), in damages to leading entertainment
companies.
Pirate Bay is one of the largest so-called Bit Torrent trackers, which
facilitate downloads of large digital files by enlisting the help of other
computers.
The defendants had maintained that they were innocent because they did
not actually host any of the copyrighted material on their servers.
11/16/16
64
Internet users and media companies have been following the case closely because of the size of
Pirate Bay it is estimated to have more than 20 million users worldwide and the defiant stance of
its operators. The trial this winter took place amid a carnival atmosphere in Stockholm, with bands
playing outside the courtroom and Twitterers tweeting away.
John Kennedy, chief executive of the International Federation of the Phonographic Industry, one of the
groups that had supported the case against Pirate Bay, said the decision sent a strong message
about the importance of copyright.
We are satisfied that the court has clearly said that what they were doing was wrong, Mr. Kennedy
said.
In the near term, the decision may have little effect on the day-to-day operations of Pirate Bay; the
defendants have vowed to continue running the service as they appeal.
Mr. Kennedy said music and movie industry groups planned to file additional litigation to try to get the
site shut down. He said that while he expected the defendants to hand over the baton to others,
that might be more difficult.
Over the last decade, media companies have won a series of court victories around the world against
file-sharing services like Napster, Kazaa and Grokster.
But unauthorized copying remains a big problem, in particular for the record business. The music
industry federation estimates that 95 percent of music downloads involve pirated work.
Mark Mulligan, an analyst atForrester Research, said the decision Friday would not result in a
meaningful decrease in piracy. Internet users are turning to new ways to share music, including
streaming and messaging services, which are harder for copyright owners and enforcement officials
to detect.
11/16/16
France
65
11/16/16
STOPPING online piracy is like playing the worlds largest game of Whac-AMole. Hit one, countless others appear. Quickly. And the mallet is heavy and
slow.
YouTube, which is owned by Google, offers a free tool to the movie studios and
television networks called Content ID. When a studio legitimately uploads a
clip from a copyrighted film to YouTube, the Google tool automatically finds
and blocks copies of the product.
To get around this roadblock, some YouTube users started placing copyrighted
videos inside a still photo of a cat that appears to be watching an old JVC
television set. The Content ID algorithm has a difficult time seeing that the
video is violating any copyright rules; it just sees a cat watching TV.
Sure, its annoying for those who want to watch the video, but it works.
(Obviously, its more than annoying for the company whose product is being
pirated.)
11/16/16
67
68
11/16/16
The key to success of this policy lies in its effective implementation. Identify
challenges in the operationalization of this policy
incentives and subsidies will be needed to support Small and Medium
Enterprises for accessing the technology to make their systems secure
Telecom MinisterMr Kapil Sibalstatement, "We need a global pact on issue of
security. That's fundamental to this interconnected world being a successful
story in this 21st century,"
11/16/16
70
11/16/16
Analyse various aspects of National Crisis management
Plan
71
Analyse the need for Information Sharing and Analysis Centre and testing
and certification labs
11/16/16
72
11/16/16
73
11/16/16
Minor scheme
74
No question paper
You choose any topic of BI (other than one you wrote in
Minor-1)
Develop knowledge on this by advance reading of
news/articles/reports/
cases covering its variety of aspects
In Minor-2 you will get answer sheet to write about the same
In Major Test, we follow same pattern. Here you will be required to
continue writing beyond what you covered in Minor-2
Purpose of this scheme is to allow develop deep insight on a
topic of BI.
And enable to convert this knowledge into a piece of write-up for
intelligent readers.
11/16/16
75
11/16/16
76
11/16/16
77
11/16/16
Research
78
11/16/16
Project Overview
79
Objective
To understand the current status of Indian electronics market
To analyze the economic and strategic rationale behind the need for
building the indigenous semiconductor manufacturing base
Examine the drivers and the challenges of the Indian semiconductor
manufacturing industry
Recommendations to overcome the challenges and to build a
semiconductor manufacturing ecosystem
Methodology
Secondary research Research papers and Books on Semiconductor
Manufacturing Industry.
Primary research Survey conducted among the experts from
Semiconductor Industry
Learning that India can apply from the East Asian model of
Semiconductor
Research
Gaps Industry growth
Limited India specific information about Indigenous Foundries
Limited expert advice
11/16/16
Introduction to
Semiconductor Industry
80
higher
the
R&D/Sales
today,
however,
chip
80-90%.
This
requires
very
Types of Chips
Memory
Microprocessors
Commodity Integrated
11/16/16 Circuit
Complex System on Chip
IBM
was the first to build its highly
vertically integrated system
In order to make them, one had to create a
captive
subsidiary
within
a
systems
company and design the system and the
semiconductors within that system at
the same time
Hitachi, Fujitsu, NEC and Toshiba
Intel is one important example of the IDM
model
These companies do not make the final
system, but provide all elements in the
semiconductor device used in the system.
Samsung, Intel, Texas
The foundry model also ushered in the era of
semiconductor industry outsourcing, off
shoring and full-scale globalization
These practices and strategies have allowed
semiconductor
companies
to
split
manufacturing processes into multiple
stages with each stage being performed in
the most efficient and cost-effective
way
11/16/16
Foundries: TSMC, UMC,
82
Power of
Buyers
Power of
Suppliers
Pressure on chip
makers to come
up
with
something new,
better,
faster
and cheaper
Competitive
Rivalry
Threat of
New Entrants
The result is an
industry
that
continually
produces
cutting-edge
technology
Availability
of
Substitutes
IPR protection; Companies produce
similar products at lower prices
Company that spends on R&D will
11/16/16
strive to recoup the costs
Balance the
about $7 billion per year and increasing at 22% rate. By
Current Account
2020, Indias semiconductor import bill is expected to $70
billion.
Selfdependence
Critical
information
infrastructure
security
Energy
Conservation
and alternative
sources
Platform for
scientific
innovation and
R&D
based
industries
Telecom
products
Information
technology and
office
automation
Consumer
Electronics
Others(Industri
al, Automotive
and others)
Drivers
Challenges
Indian government has fallen far
behind China and Taiwan in
encouraging the development of a
vibrant electronics sector. There
have been limited government
incentives.
The country is noted for the sore
absence of
Angel fund investors,
Efficient power supply,
Clean water for fab units,
Poor
waste
management,
warehousing,
and
road
network infrastructures.
For global companies, the Indian
market is still too small to
warrant setting up a fab.
Our
continuing
reliance
on
imports is impeding growth of
domestic manufacturing
The high cost of developing
11/16/16
products
including
duties,
86
11/16/16
Source: ESDM DOIT report; IC Economics
11/16/16
Source: ISA - FROST & SULLIVAN 2010 12 India Semiconductor
already
in
11/16/16
foundries.
The first one being Jaypee Group. It has partnered
with IBM, which will provide the technology.
The second bid is from Hindustan Semiconductor
11/16/16
Manufacturing Corp., a U.S. company.
It has
partnered with the Geneva-based chip maker
fabrication plants.
MNCs from US, Europe and Japan invested in the form of FDIs
Singapore developed skilled labour and expertise from these
companies and have come up with many small and medium sized
companies
Malaysia, Thailand, Philippines, China started with low value adding
services like IC packaging. Eventually these countries entered IC
fabrication
11/16/16
Process innovation
Diffusion management
Competitive focus
Product
Process
Competitive tools
Cost; quality
Resource leverage
Firms
Firms;
92
Government
research
institutions;
consortia
Dynamic capabilities Product enhancement; R&D
Process
enhancement; Combinative
quality/time improvement
Strategic goals
Sustainable
competitive Temporary
advantage
Sources
of First-mover advantages
capabilities;
organizational
learning
advantage
Quality/tie enhancement
Fast followership
Limited competition
Accelerated
competitive
advantage
Institutional
Atomistic competition
framework
Lead countries
diffusion
Japan
11/16/16
Korea, Taiwan
within
consortia;
NPE Vision
To create a globally competitive electronics design and manufacturing
industry to
meet the country's needs and serve the international market
NPE Goals for 2020
1. Turnover of US$ 400 Billion; Chip design/ embedded software industry to US$ 55
Billion
2. Includes over 50 initiatives to create an overall ecosystem to make electronics
manufacturing globally competitive.
Preferential Market Access (PMA)
Reimbursement of Countervailing
Government procurement
duty/excise for capital equipment
Survey Results(1/5)
94
Entry
Barrier
11/16/16
Survey Results(2/5)
95
Infrastructure
issues
11/16/16
Survey Results(3/5)
96
Focus Strategy
11/16/16
Survey Results(4/5)
97
11/16/16
Survey Results(5/5)
98
Ecosystem
11/16/16
Key Recommendations
Provide avenues for seed and VC funding (Government and private)
99
11/16/16
Conclusion
100
References
101
References
102
11/16/16
103
11/16/16
104
11/16/16
Quantitative Analysis
105
11/16/16
Quantification of Data
Age
1
2
3
4
5
=
=
=
=
=
1
2
3
4
5
Political Affiliation
Region of Country
Sex
Male = 1
Female = 2
Democrat = 1
Republican = 2
Independent = 3
West = 1
Midwest = 2
South = 3
Northeast = 4
Figure 14.1
ATTEND
Abbreviated Variable
Name
Numerical Label
Never
Less than once a year
About once or twice a year
Several times a year
About once a month
2-3 times a month
Nearly every week
Every week
Several times a week
Dont know, No answer
Definition of the
Variable
Variable
Attributes
Univariate Analysis
Example: Gender
Distributions
Figure 14.3
Figure 14.4
Central Tendency
Average An ambiguous term generally suggesting typical
or normal a central tendency [examples: mean, median,
mode]
100, 94, 88, 91, 75, 61, 93, 82, 70, 88, 71,
88
Figure 14.5
Figure 14.6
Bivariate Analysis