Journal Article: Organizational behavior.

Journal Article:  ORAGANIZATIONAL BEHAVIOR

Your submission must include the following information in the following format: 

DEFINITION: a brief definition of the key term – (the definition should come from the article) 

SUMMARY: Summarize the article in your own words- this should be in the 150-200-word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research, or findings regarding the key term. 

REFERENCE: The source for the analysis must be listed at the bottom of the submission – APA format required. Use only peer-reviewed journal articles for these assignments. Refrain from using blogs, .com’s, or other unreliable internet sources. Be sure to use the headers (Definition, Summary, Discussion, Reference) in your submission to ensure that all aspects of the assignment are completed as required. Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment. Further, any flagged documents will result in zero points for the assignment. Flagged documents mean that an attempt at plagiarism exists, or manipulation of the Turnitin process has been attempted. This is unacceptable conduct and will not be tolerated.

Need practical connection in 1 and half hour

Dissertation seminar

Students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where you will demonstrate how this course research has connected and put into practice within your own career. 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. (Include references). 

Locating a Missing Child

Below is the assignment/ instructions

You can either write a paper or submit  a powerpoint presentation

Locating a Missing Child: 

A 15-year-old girl left for school in the morning but never returned home. Her mother knows she never left home without her iPhone. She was also wearing her Apple Watch 6. 

Information we know:

  • The girl was present in school that day but did not return home at the usual time.
  • The young girl has a Facebook and an Instagram account and uses them to communicate with her friends daily. 
  • She posts photos and messages frequently in Facebook when she is able and the last photo she posted was two hours ago.
  • The family mobile account is with Verizon.
  • When her parents spoke with the girl’s friends, they were told she had recently ‘friended’ a new boy who had asked her to ‘meet up’.
  • There are video cameras in the school hallways and around the school grounds, and many of the local businesses also have digital cameras

Software -7b

 Discuss one type of systems that may require software safety cases, and explain why safety cases are required for your proposed system ? 

Cloud Computing

 Provide a reflection of at least 500 words (2 pages double spaced excluding Title and Reference pages) that summarizes what you feel are the most important or interesting concepts you have learned so far in this Cloud Computing course.  Would be good to include an insight as to whether the learning was new to you or reinforced knowledge that you already had. 

Ethical Behavior and Laws in the Use of Information Technology

Laws and regulations created by Congress are designed to protect society from itself. Law abiding citizens generally follow the law, but not everyone believes in this approach. There are laws meant to punish hackers for crimes against companies and people. Are these laws effective, and does the punishment fit the crime?

Write a 4–6-page paper outlining one law that is effective and working. Use current statistics as justification for effectiveness. Find another law that is not working effectively. Again, use statistics or other research to show lack of effectiveness. Make a recommendation on a law that could bridge a gap in covering a new hacking method or ID theft. Include relevant information such as punishments for crime types. Address whether punishments are harsh enough to deter hacking. Research can be done using your favorite search engine. Use the Library as needed for research. Cite your resources and use APA formatting throughout.

Cybersecurity Issues for Business Travelers

This week, you will “shadow” the head of Resort Operations (RO) at a Travel Security meeting attended by the company’s senior managers and executives. The focus of this meeting will be: Cybersecurity Issues for Business Travelers. The company is particularly concerned about potential identity theft and phishing attacks (including “spear phishing” and “whaling”) that could allow hackers to steal login credentials and other information. One of the outcomes of this meeting will be recommendations for improvements and/or changes to the company’s guidance to employees, managers, and executives regarding use of laptops, cell phones, and other mobile devices to access company email and databases while traveling.  

Resort Operations is involved in this meeting since the majority of employees who travel on company business work for RO. The head of RO, R. Rose Padgett, has asked you to review the Read Ahead package (see below) and then prepare a position paper for her use during this meeting. Since she, like other executives, is very busy, she has asked you to limit this paper to no more than 2 pages and 5 key points. She has also asked that you list and cite the resources used so that she can have a senior staffer can fact check your work. (APA format citations are preferred.)

Note: a “position” paper is used by staff to inform an executive and assist in preparations for meetings with other executives. The position paper should be written in the third person and usually has three parts:

    (a) statement of the issue(s) — clear and concise

    (b) the position to be taken on the issues (intentions, beliefs, attitudes)

    (c) recommendations which restate key points and provide suggested resolutions or actions.

Read Ahead Package

The read ahead package for this meeting includes the following resources:

1. https://www.cisa.gov/sites/default/files/publications/Cybersecurity-While-Traveling-Tip-Sheet-122019-508.pdf

2. https://resources.infosecinstitute.com/30-cybersecurity-tips-for-travelers/#gref

3. https://www.redzonetech.net/blog/13-mobile-device-security-tips-foreign-business-travelers-china/

4. https://www.cnbc.com/2016/09/21/travelers-beware-that-free-charging-station-could-hack-your-phone.html

DA Week 13

In 600-700 words

Topic:  You are the IT manager of a large corporation. You are planning to use Python to develop statistical models to aid in analyzing your sales data. You are preparing a report for management. Here are the basic requirements for your report: 

Include references

  • Briefly describe your company
  • Briefly describe Python
  • Give an overview of Machine Learning
  • Report on:’
    • Implementation plans
    • Technical training
    • Python libraries required
    • How Python will be used
    • Types of reports that will be produced

Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment.

  

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

Exp19_Excel_Ch09_CapAssessment_Tips

 

Exp19_Excel_Ch09_CapAssessment_Tips

 

98% Marked 

Please Use your file      

1

Start   Excel. Download and open the file named Exp19_Excel_Ch09_Cap_Assessment_Tips.xlsx.   Grader has automatically added your last name to the beginning of the   filename.
 

  The Excel workbook contains circular references. When you open the file, an   error message displays. This error will be resolved as part of the project

2

The   Tip Left column in the Friday worksheet contains a fill color and number   formatting. You want to fill these formats to the other daily worksheets.
 

  Group the Friday through Monday worksheets, staring with the Friday   worksheet. Fill the format only for the range E5:E24.

3

Now   you want to insert column totals for the five worksheets simultaneously.
 

  With the worksheets still grouped, insert SUM functions in the range B25:E25   and apply the Totals cell style. Ungroup the worksheets.

4

The   Week worksheet is designed to be a summary sheet. You want to insert a   hyperlink to the Total heading in the Monday worksheet.
 

  On the Week worksheet, in cell A5, insert a hyperlink to cell A25 in the   Monday worksheet with the ScreenTip text Monday’s Totals. Test the hyperlink to   ensure it works correctly.

5

In   cell A6 on the Week worksheet, insert a hyperlink to cell A25 in the Tuesday   worksheet with the ScreenTip text Tuesday’s Totals. Test the hyperlink to   ensure it works correctly.

6

In   cell A7, insert a hyperlink to cell A25 in the Wednesday worksheet with the   ScreenTip text Wednesday’s Totals. Test the hyperlink to ensure it works   correctly.

7

In   cell A8, insert a hyperlink to cell A25 in the Thursday worksheet with the   ScreenTip text Thursday’s Totals. Test the hyperlink to ensure it works   correctly.

8

In   cell A9, insert a hyperlink to cell A25 in the Friday worksheet with the   ScreenTip text Friday’s Totals. Test the hyperlink to ensure it works   correctly.

9

Now,   you are ready to insert references to cells in the individual worksheets.   First, you will insert a reference to Monday’s Food Total.
 

  In cell B5 on the Week worksheet, insert a formula with a 3-D reference to   cell B25 in the Monday worksheet. Copy the formula to the range C5:E5.

10

The   next formula will display the totals for Tuesday.
 

  In cell B6, insert a formula with a 3-D reference to cell B25 in the Tuesday   worksheet. Copy the formula to the range C6:E6.

11

In   cell B7, insert a formula with a 3-D reference to cell B25 in the Wednesday   worksheet. Copy the formula to the range C7:E7.

12

In   cell B8, insert a formula with a 3-D reference to cell B25 in the Thursday   worksheet. Copy the formula to the range C8:E8.

13

In   cell B9, insert a formula with a 3-D reference to cell B25 in the Friday   worksheet. Copy the formula to the range C9:E9.

14

Now   you want to use a function with a 3-D reference to calculate the totals.
 

  In cell B10 on the Week worksheet, insert the SUM function with a 3-D   reference to calculate the total Food purchases (cell B25) for the five days.   Copy the function to the range C10:E10.

15

The   servers are required to share a portion of their tips with the Beverage   Worker and Assistants. The rates are stored in another file.
 

  Open the Exp_Excel_Ch09_Cap_Assessment_Rates.xlsx   workbook. Go back to the Exp_Excel_Ch09_Cap_Assessment_Tips.xlsx   workbook. In cell F5 of the Week worksheet, insert a link to the Beverage   Worker Tip Rate (cell C4 in the Rates workbook) and multiply the rate by the   Monday Drinks (cell C5). Copy the formula to the range F6:F9.

16

Next,   you will calculate the tips for the assistant.
 

  In cell G5 in the Tips workbook, insert a link to the Assistant Tip Rate   (cell C5 in the Rates workbook) and multiply the rate by the Monday Subtotal   (cell D5). Copy the formula to the range G6:G9. Close the Rates workbook.
 

  Note: The tip is a monetary value in the Week worksheet. It should be   formatted for Accounting Number Format.

17

You   noticed a circular error when you first opened the Tips workbook. Now you   will find and correct it.
 

  On the Week worksheet, check for errors and correct the formula with the   circular reference. 

18

You   want to create a validation rule to prevent the user from accidentally   entering a negative value. For now, you will create a validation in the   Friday worksheet.
 

  Select the range E5:E24 in the Friday worksheet, create a validation rule to   allow a decimal value greater than or equal to zero. Enter the input message   title Tip and   the input message Enter the amount of tip. (including the   period). Use the Stop alert with the error alert title Invalid Number and the error   alert message   The tip must be zero or more. (including the period). Test the   data validation by attempting to enter -20 in cell E5 and then cancel the change.

19

Now   you will copy the validation settings to the other daily worksheets.
 

  Copy the range E5:E24 in the Friday worksheet. Group the Monday through   Thursday worksheets, select the range E5:E24, and use Paste Special   Validation to copy the validation settings.

20

You   want to unlock data-entry cells so that the user can change the tips in the   daily worksheets.
 

  Group the Monday through Friday worksheets. Select the ranges E5:E24 and   unlock these cells.

21

Create   footer with your name on the left side, the sheet name code in the center,   and the file name code on the right side of all worksheets.

22

Now   that you unlocked data-entry cells, you are ready to protect the worksheets   to prevent users from changing data in other cells. Individually, protect   each sheet using the default allowances without a password.

23

Mark   the workbook as final.
 

  Note: Mark as Final is not available in Excel for Mac. Instead, use Always   Open Read-Only on the Review tab.

24

Save   and close Exp19_Excel_Ch09_Cap_Assessment_Tips.xlsx.   Exit Excel. Submit the file as directed.