Information Governance Discussion

 Question:

We learn from our readings that the use of mobile devices in our society today has indeed become ubiquitous. In addition, CTIA asserted that over 326 million mobile devices were in use within The United States as of December 2012 – an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continues growth. From this research, it’s evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors in our chapter reading. In consideration with this revelation, identify and name these factors, and provide a brief discussion about them.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

No Plagiarism*******

References****** 

Assignment

APA Paper:  Research and discuss 2 mobile apps that you find useful in your own personal or professional lives. Discuss the functionality and usefulness along with any improvements that you would recommend. The paper must be 2 pages (at least 500 words) and add the APA Title Page and References page (4 pages total). Use 2 peer reviewed references.

mmm

Complete Exercise questions 1 through 4 found at the end of Chapter 13, CPM 4e. You must select a project that is available online or in print from a news source within 6 months prior to the due date for this assignment. Provide an active link or an image of the source (including date) as evidence and place it as an appendix to your responses to the exercise questions. Use a question-response format for this assignment. Provide in-text citation of all references. Use APA writing style. Turn-it-In will be used to screen this assignment for authenticity. Point allocation will be as follows: Source of project provided and within 6 months prior to the due date for the assignment – PASS/FAIL screen for the assignment. Question 1 – 20 points (ensure that you develop a complete list of as many potential contracted items as possible) Question 2 – 20 points (ensure that you properly cite the reference used to baseline or template your RFI). Question 3 – 20 points (ensure that your ideas are tailored to the project) Question 4 – 20 points (ensure that you explain why the chosen contract is used AND why others were rejected)

Disaster and recovery planning

Describe at least three advantages and three disadvantages of outsourcing an IR process.

2. The difference between a policy and a law is that ignorance of a policy is an acceptable defense. For a policy to become enforceable, what are the five criteria it must meet?

IT Strat Plan – Wk3

Q1. 275 words

 Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist in the next ten years? Why or why not? 

Q2. Research paper: 5 pages

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

 

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Readings:

 

Chapter 4, “Digital Systems and the Design of Work” pp. 83-98

Harris, W. J. (2018). Technology adoption by global virtual teams: Developing a cohesive approach. SAM Advanced Management Journal, 83(1), 4-21.

Chapter 5, “Information Systems and Digital Transformation”  pp. 109-121

Strutynska, I., Kozbur, G., Dmytrotsa, L., Sorokivska, O., & Melnyk, L. (2019). Influence of digital technology on roadmap development for digital business transformation. 2019 9th International Conference on Advanced Computer Information Technologies (ACIT), 333-337. Retrieved from https://doi.org/10.1109/ACITT.2019.8780056

Risk management project part 1

 This project is divided into several parts, each with a deliverable. The first four parts are drafts. These documents should resemble business reports in that they are organized by headings, include source citations (if any), be readable, and be free from typos and grammatical errors. However, they are not final, polished reports .Please see the attached requirements.

Project Part 1: Risk Management Plan Outline and Research

For the first part of the assigned project, you will create a partial draft of the risk management plan. To do so, follow these steps:

  1. Research risk management plans.
  2. Create an outline for a basic risk management plan with anticipated section headings (as indicated in this numbered list). This plan will include a qualitative risk assessment, which is addressed later in the project.
  3. Write an introduction to the plan by explaining its purpose and importance.
  4. Define the scope and boundaries of the plan.
  5. Research and summarize compliance laws and regulations that pertain to the organization. Keep track of sources you use for citation purposes.
  6. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk management.
  7. Develop a proposed schedule for the risk management planning process.
  8. Create a draft risk management plan detailing the information above. Format the plan similar to a professional business report and cite any sources you used.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 4–6 pages 

emerging

 Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals? 

Discussion paragraphs on Topic : Secure Internet of Things

You will use the following workshop activities completed in class to help you write your complete draft of your discussion section:

  • Activity: Discussion, Para. 1
  • Activity: Discussion, Para. 2
  • Activity: Discussion, Para. 3
  •                                                              References
  • Azka & Revathi, S. (2017). Protocols for secure internet of things. Journal of Education and Engineering, 7(2), 20. https://doi.org/10.5815/ijeme.2017.02.03
  • Poulter, A. J., Ossont, S. J., & Cox, S. J. (2020). Enabling the secure use of dynamic identity for the internet of things—Using the secure remote update protocol (SRUP). Future Internet, 12(8), 138. https://doi.org/10.3390/fi12080138
  • Prasad, G. S., Lal Chhagan, Sharma, L., Sharma, D. P., Gupta, D., Saucedo, J. A. M., & Kose, U. (2020). Reliable and secure data transfer in IoT networks. Wireless Networks, 26(8), 5689-5702.https://doi.org/10.1007/s11276-019-02036-0