.
Topic – Risk management & Initiatives in finance industry it should relate with Information Governance and try to focus on security & privacy initiatives, Accessibility like IAM roles and Information Integrity within them.
Your team will conduct a literature review in Information Governance
You can also conduct a literature review on information governance and how it is applied to an Information Technology organization.
You are to review the literature on Information Governance planning and discuss problems and gaps that have been identified in the literature. You will expand on the issue and how researchers have attempted to examine that issue by collecting data – you are NOT collecting data, just reporting on how researchers did their collection.
As you read the literature, it will become apparent that there are multiple issues, pick one issue that stands out in the literature and agree on that as a Team to address that.
Cover:
Include the names of those who participated in the project
Table of contents:
Use a Microsoft Enabled Table of Contents feature.
Background:
Describe the issue, discuss the problem, and elaborate on any previous attempts to examine that issue.
Research Questions:
In your identified problem area that you are discussing, what were the research questions that were asked?
Methodology:
What approach did the researcher use, qualitative, quantitative, survey, case study? Describe the population that was chosen.
Data Analysis:
What were some of the findings, for example, if there were any hypotheses asked, were they supported?
Conclusions:
What was the conclusion of any data collections, e.g., were research questions answered, were hypotheses supported?
Discussion:
Here you can expand on the research and what the big picture means, how do the results found in the literature review help organizations in the Information
Technology strategy planning. What do you see as long-term impacts and what further research could be done in the field?
References:
Include at least ten scholarly references in APA format.
What kind of information do you think a small business or organization would organize into a database?
Related Diversification. Related Diversification is the most popular distinction between the different types of diversification and is made with regard to how close the field of diversification is to the field of the existing business activities. Related Diversification occurs when a company adds to or expands its existing line of production or markets. For this assignment, consider your own company or one that you know well. Assume your company opted to pursue a strategy of related diversification and respond to the following questions.
Submission Details:
References:
Professor feedback:
Please review the submission guidelines. Also, review APA for propper formating and Reference Page. Your source material does not meet standards.
Write about a project that you accomplished. Explain what needed to be done, how it got done, who worked on the project, how long did it take, how much it cost, and what were the risks involved in the project. (Review Chapter 1).
The following question needs to be completed in two hours ? could always use you for future work alot of future work if this assignment is done correctly ?
Think about a software development project that has been conducted for a hospital. The product being developed is a frontend web portal and backend software that processes the patient data resides in the hospital database. The name of the frontend web portal is MyHealth. Patients will see their test results, diagnosis reports, prescriptions, past, and upcoming reservation information in MyHealth portal. They will also have the opportunity of chatting with their doctors. Answer the questions below based on this information.
What kind of technologies/methods should be used to ensure that the patients’ privacy will be guaranteed?
Review the top 10 web application security risk (https://owasp.org/www-project-top-ten/). Select 2 of them and explain the potential impact of those on privacy.
Describe security practices that fall into the “Requirements” phase of the SDLC? Explain the projection of these practices in the upcoming phase of the SDLC.
In two to three paragraphs of prose (i.e., sentences, not bullet lists) using APA style citations if needed, summarize and interact with the content that was covered this week in class. In your summary, you should highlight the major topics, theories, practices, and knowledge that were covered. Your summary should also interact with the material through personal observations, reflections, and applications to the field of study. In particular, highlight what surprised, enlightened, or otherwise engaged you. Make sure to include at least one thing that you’re still confused about or ask a question about the content or the field. In other words, you should think and write critically not just about what was presented but also what you have learned through the session. Questions asked here will be summarized and answered anonymously in the next class.
I have a powerpoint slides(attached) that needs to be referenced along with an additional references(can be online), and the question: “Why is it important to understand business requirements and constraints, and applications before designing a network for an organization?” should be answered in less than a page
What are the benefits and challenges associated with public and private blockchain and which has the most potential for application in human resource management?
References
1. Chapter 3 of Blockchain for Business
2.Berke, A. (2017, March 7). How safe are Blockchains? IT depends
Part 1: Security Threats
Phishing is one example of a security threat to pretty much anyone. Phishing is where a message, usually an email or text, is sent to you and it may look like a legitimate company/bank reaching out to you. These messages usually include a link, and these links can have malware embedded in them. They may also be asking for personal information. (Borges, 2021)
To minimize/prevent this threat include changing passwords regularly, not clicking on suspicious links, and installing firewalls. (Simister, 2021)
Part 2: Mobile devices
Desktops tend to be more secure compared to mobile devices (tablets, smartphones, laptops, etc.) because of their stationary position making them easier to guard, and also because they tend to be on one source of the internet (rather it be Wi-Fi or cable). (Editor, 2019)
The practices I use to protect the security of my mobile devices is to keep software updated, I keep fingerprint/code locks on my phone, and try to avoid any unsecured networks.
References:
Borges, E. (April 07, 2021). Ten Common Network Security Threats Explained. Retrieved on 7/11/22 from 10 Popular Common Network Security Threats Explained (securitytrails.com) (Links to an external site.)
Simister, A. (August 6, 2021) 10 Ways to Prevent Phishing Attacks. Retrieved on 7/11/22 from 10 Ways to Prevent Phishing Attacks (lepide.com) (Links to an external site.)
Editor, (October 16, 2019) Computers for a small business: Laptop vs. desktop. Retrieved on 7/11/22 from Computers for a small business: Laptop vs. desktop (techadvisory.org)
What property does “Row, Row, Row Your Boat” and “Frere Jacques” have in common?
Would any tune work just as well? Suggest one as a test case.