Problem 8- Org behavior

1. Evaluate variable-pay programs in terms of their impact on motivation and productivity. 

2. Please discuss one of the drawbacks to a piece-rate plan.

Text-

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

Question 3

please answer below questions(Plagiarism applies) 

  1. What is a data model?
  2. What is a high-level conceptual data model?
  3. What is an entity? An attribute? A relationship?
  4. List and briefly describe the common record-based logical data models.

Tech Project

Joshua Tree Technology is a technology firm based in Boston, MA, focusing on technology software, implementation, delivery, and research & development. By 2001, it had become one of the world’s largest multinational corporations and was one of the “Big Five” technology consulting firms. A Fortune Global 500 company, it reported revenues of $50.53 billion in 2021. Joshua Tree Technology’s current clients include 91 Fortune Global 100 and more than three-quarters of the Fortune Global 500. 

Project 1: JTT is opening a new office in London. As a project manager, you have been assigned to lead this effort. The office space is secured and ready for 300 employees. Your job is to create a plan for the technological implementation of the opening of this office. Staff will need access to our global database. We have network access throughout the building. We need a plan to determine how to execute this move. The plan should include a timeline, budget, and personnel. Again remember…this building is empty. 

Project 2: JTT needs to develop a new website. As a project manager, you must develop a plan to create and deploy the new website. The plan should include a timeline, budget, mock-ups, style guide, and personnel. Also, please indicate any research you have conducted on our competitors 

or

15-25 page paper on one of the following topics:

  • Simulation of Gaming with Financial Service
  • Intelligent Vehicle Transportation System
  • Wireless surveillance technologies 
  • Technology and Sports Medicine
  • Biometric Security Systems

Paper

 PLease use your won words and define the below and please site the references.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software. 

6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?

Advanced Programming Languages

 

SELECT A TOPIC: 

 Functional Programming 

 Introduction 

  • Based on the literature sources, provide a background of the research problem to be explored. Elaborate on the impact of the problem and why your research is important to pursue. Indicate what the goal of the research will be
  • Problem statement
    •  In this section, present a concise statement of a research-worthy problem to be addressed (i.e., why the work should be undertaken – don’t state “it was a requirement of the professor”). Follow the statement of the problem with a well-supported discussion of its scope and nature. The discussion of the problem should include: what the problem is, why it is a problem, how the problem evolved or developed, and the issues and events leading to the problem. Your problem statement must be clear, concise, to the point and able to be articulated in no more than three sentences. 
  • Relevance and significance 
    •  This section provides the necessary support for both the problem statement of your study. Consider the following questions and support your discussion by citing the research literature:  Why is there a problem? What groups or individuals are affected?  How far-ranging is the problem and how great is its impact? What’s the benefit of solving the problem?  
  • Research questions
    •  In this section you will define the research questions you expect to answer in your finding / results / conclusion sections. The research question(s) must be directly related to the problem statement and introduce the reader to their respective relationships. The answers to the research question(s) as elaborated in Chapter 3 need to be either qualitative or quantitative. In this section, the research questions should be numbered 
  • Barriers and Issues
    •  In this section, identify how the problem is inherently difficult to solve. You should also show how the solution you propose are difficult to obtain (unlike a book report). You should show the study you propose is of adequate difficulty to warrant a successful grade assignment.  

Format – APA 

medterm

INSTRUCTIONS INSTRUCTIONS
1. When answering each question, each answer should be complete and respond to all facets of the question. State your assumptions if needed. Your writing style will be evaluated (points will be deducted for writing errors).2. The format of your answers should be the following:

  • Each answer shall be no longer than 2 pages
  • Use single space
  • Use an 11- or 12-point sans-serif font (Arial, Helvetica, or Calibri which is preferred)
  • Use 1-inch margins

3. The deliverable must be APA compliant and include at least two credible references for each question. Place your reference list at the end of each question. No references to wikis, blogs and other unreliable sources are accepted.4. All five answers must be original and in your own words. This means that you should not include quoted material in your answers. I want to know what YOU know!
Questions (ANSWER EACH OF THESE QUESTIONS)

  1. When making decisions about how to acquire hardware, software, or any other components of the IT Infrastructure, consideration is given to the following four (4) characteristics of an IT infrastructure:
  • Dependable
  • Manageable
  • Adaptable
  • Affordable

Evaluate cloud computing in relation to each of these four (4) criteria. (20 points)
2.The Department of Homeland Security (DHS) consists of both Operational Components and Support components. These entities are: Cybersecurity and Infrastructure Security Agency (CISA); Federal Emergency Management Agency (FEMA); Federal Law Enforcement Training Center (FLETC); Transportation Security Administration (TSA); U.S. Citizenship and Immigration Services (USCIS); U.S. Coast Guard (USCG); U.S. Customs and Border Protection (CBP); U.S. Immigration and Customs Enforcement (ICE); U.S. Secret Service (USSS); Countering Weapons of Mass Destruction Office; Management Directorate; Office of Intelligence and Analysis; Office of Operations Coordination; Science and Technology DirectorateThe DHS strategic plan states: “The Nation faces a complex threat landscape with enemies and adversaries who are constantly evolving. Accordingly, the Department will build on the considerable progress since its formation and lead homeland security initiatives across this Nation and the globe that meet the threats of today and the future. The Department’s dedicated operators and personnel will safeguard against threats both foreign and domestic, respond to national emergencies and contingencies, and preserve the Nation’s prosperity and economic security.”Define and explain data warehousing in detail and describe how it could be used in the DHS. (20 poiints)
3. Describe how applying big data technology to social media can be useful for:(1) a chain of fitness centers,(2) a large government agency,(3) a multinational fashion retail company, and(4) a global online university.Finally, summarize the negative aspects of applying social media data in this way and identify ways to mitigate these concerns. (20 points)
4. Identify and describe four technologies developed and/or advanced by Google and explain how it impacts society positively and negatively. At least one technology must be related to networks and at least one should be related to mobile technology. Indicate which technology is related to networks and which relates to mobile technology. (20 points)
5. You have just been hired to work in a brand-new family grocery/bakery store in Adelphi, Maryland. You know the value of information systems and want to convince the owner (who knows only how to manage a grocery/bakery store) that technology can help the business. List at least four (4) business-related competitive strategies (not technologies) that will address the potential risks an organization may encounter as it strives to maintain or improve its position in the marketplace. Also, for each competitive strategy you identify, give an IT technology example that can apply to support that strategy. (20 points) 

discussion

Write an essay of atleast 500 words on what you would like to learn for future study in this course.

Write in essay format, not outline or bulleted.

Use the five paragraph format. Each paragraph must have at least five sentences. You need to refer to 3 sources and include them in the references.

operational excellence

 This week select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence.  In this paper, perform the following activities:

  • Name the organization and briefly describe what good or service they sell and where they operate.
  • Note how they are a differentiator in the market.
  • Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).
  • Explain what actions the company took to achieve operational excellence.

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work. 

Research paper abstract summary – The roles of the Network Administrators to detect malicious activity

Research paper abstract summary – The roles of the Network Administrators to detect malicious activity

Subject: Business Network Systems Management

Topic:  The roles of the Network Administrators to detect malicious activity

This topic must be very specific and CAN NOT BE too broad otherwise it will be returned back.

Add brief 1 paragraph an abstract summary (600-800 words) of what you would like to say about that topic (i.e., ) and add 2-3 reference on 2nd page.

Subject book used: The Practice of System and Network Administration, Volume 1 3rd edition.

Important*****:

OLD Topic: The Roles of System Administrator on Cyber Security

Professor Note: Topic is too broad. Please narrow down the topic and resubmit (-50). 

Topic is on an appropriate subject. A general discussion of what roles SAs can do on Cyber Security is much, much, much too broad to cover in 7-10 pages.

Operational Excellence

  • Define the IT organizational structure and how the IT organizational structure impacts culture and change management practices.  Additionally, how does the organizational structure impact competitive advantage?
  • How do you define operational excellence?  What factors are involved in achieving operational excellence?  Who (within an organization) is responsible for operational excellence and why is this important?