2 Discussions and 1 Case Study and 1 Weekly summary

Discussion 5.1

Many organizations are concerned about the rising cost of employee benefits and question their value to the organization and to the employees.  In your opinion, what benefits are of greatest value to employees? To the organization? Why?  What can management do to increase the value to the organization of the benefits provided to employees?

Discussion 5.2 

When OSHA was enacted in 1970, it was heralded as the most important new source of protection for the U.S. worker in the second half of the twentieth century. From the information in this chapter, what is your opinion about the effectiveness or the ineffectiveness of the act? Should it be expanded, or it should businesses have more freedom to determine safety standards for their workers?

Case Study 5.1 4 pages

There are two (2) case studies per chapter. You are to respond to one (1) case from Chapter 9 and one (1) case study from Chapter 10.

Chapter 9 – Managing Compensation: (Choose one case study)

Case Study 1 – Pay Decisions at performance Sport, pg. 377 and answer the questions

Case Study 2 – An In-N-Out Pay Strategy: Costa Vida’s Decision to Boost Pay. pg. 378 and answer the questions

Chapter 10 – Pay for Performance: Incentive Rewards (Choose one case study)

Case Study 1 – United States Auto Industry Back on Top…of CEO Pay, pg. 413 and answer the questions

Case Study 2 – Team Based Incentives: Not Your Usual Office, pg. 414 and answer the questions

Weekly Summary 5.1

Write 2 pages from the chapter 9 and chapter 10 attached PPT

Please read attached article and then write the paper

The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

concept

 

This week, you will complete your proof of concept and submit the report. This is the final report to management before the actual cloud deployment process begins.

Use the Proof-of-Concept Report Template to prepare a report that shows the steps and results for the proof of concept. In the template, you will see specific instructions. Delete the instruction text before you submit the project.

Your report should:

  • Be between five to seven pages (plus an appendix for screenshots, cover page, and table of contents)
  • Address the topics listed in the Proof-of-Concept Report Template
  • Include the following screenshots from the “Build a Virtual Private Cloud and Launch a Web Server” activity:
    • Start Lab page
    • AWS Management Console Name with your name visible from user drop-down
    • Task 1: Create Your VPC
    • Task 2: Create Additional Subnets
    • Task 3: Create a VPC Security Group
    • Task 4: Launch a Web Server Instance

IT security management

 Create a presentation (6-8 PowerPoint slides) describing how to use the SAMM v2  Toolkit to perform assessments, create a scorecard and roadmap. This presentation is to show senior leadership that how this model is applied to the  organization. The requirements for your presentation are: • Create a presentation to show senior leadership that how this model is applied to the  organization. I. Introduce and describe very briefly (for an executive briefing) i. How assessment worksheet questions and scoring are used. ii. How to use the SAMM V2 Toolkit to create these two (2) artifacts: I. Scorecard. II. Roadmaps II. Define each of the following seven (7) terms (provide a definition for , e.g. answer the  question “What is ___?”) and describe how they are used as the components in a  Maturity Level in your presentation: i. Objective, Activities, Results, Success Metrics, Costs, Personnel and Related  Levels • Requirements of the final product (e.g. page count, references, etc.): I. Presentation of 6 to 8 slides. II. At least 2 (and preferably more) APA V7 references and in-text V7 APA citations.- • Points: 100 • Unit objective/s assessed: I. Create SAMM scorecards and roadmaps II. Apply the SAMM maturity models 

Data base fundamental

 

Databases store, organize, collect, and retrieve data, and, given the amount of data some databases store, how they’re built can seem disjointed and confusing. To overcome these obstacles and make databases useful, computer scientists developed complex algorithms and database designs to create efficient and accessible databases. Relational databases are an example of this type of solution. They store data in tables that are related by different unique keys so that relevant data is stored together, but different data combinations can still be retrieved using the unique identifying keys.

In this assignment, you will explore these topics by creating a simple query to retrieve data, normalize a sample database, and design an entity relationship diagram (ERD). 

For further instruction, read the attach document.

R Tool Visualization

Review the attached file. Suzie has an issue. She can either move to NY or FL and needs to review some data that her agent gave her. The agent reviewed house prices and crime ratings for houses that Suzie would be interested in based on her selection criteria.  She wants to live in an area with lower crime but wants to know a few things:

  1. Is it more expensive or less expensive to live in FL or NY?
  2. Is the crime rate higher in FL or NY (Note a low score in crime means lower crime)?
  3. Is the crime rate higher in lower or higher house price areas?
  4. If you were Suzie, where would you move based on the questions above?

Using the R tool, show the data in the tool to answer each of the questions.  Also, show the data visualization to go along with the summary.

5. After you gave Suzie the answer above (to #4), she gave you some additional information that you need to consider: 

  a. She has $100,000 to put down for the house.

  b. If she moves to NY she will have a job earning $120,000 per year.

  c. If she moves to FL she will have a job earning $75,000 per year.

  d. She wants to know the following: 

      i. On average what location will she be able to pay off her house first based on average housing prices and income she will receive?

      ii. Where should she move and why?  Please show graphics and thoroughly explain your answer here based on the new information provided above.

Note: The screenshots should be copied and pasted and must be legible.  Only upload the word document.  Be sure to answer all of the questions above and number the answers.  Be sure to also explain the rationale for each answer and also ensure that there are visuals for each question above. Use at least two peer-reviewed sources to support your work.

CYBERLAWS & ETHICAL HACKING PROJECT

Project Part 3: SQL Injection Response

Scenario

Aim Higher College just learned that sensitive information has been stolen from a student information system and posted on the Web. After reviewing web server and database logs, the Aim Higher IT security team believes that the source of the problem is a SQL injection vulnerability. The vulnerability appears to exist in a web application used by students to register for courses. As part of the incident response report to be submitted to Aim Higher College’s management staff, your supervisor asks you to provide details about this type of vulnerability, how an attacker might exploit it, and methods of detection and removal.

Tasks

Research SQL injection attacks on the Internet to supplement your existing knowledge. Using the information you discovered during this research, in conjunction with what you learned in class, write an incident response report for Aim Higher College’s management detailing the following information:

-A non-technical description of SQL injection vulnerabilities intended for a college management audience.

-The threat that SQL injection poses to the college’s data. Include three possible scenarios that describe how an attacker might conduct this type of attack, the information that they may be able to obtain, and how they might use it maliciously.

-An implementation plan to fortify the college’s web applications against SQL injection attacks

-A monitoring plan that will provide:

-Early warning to developers and security administrators that a SQL injection vulnerability exists in a web application

-Detection of successful and unsuccessful attempts to conduct SQL injection attacks against college systems

Activity 6- Strategy Applied in PM

  1. After reviewing/reading Chapters 11 & 12 of the textbook, access UC’s online Library and conduct research within the “Business Source Premier (EBSCO Host)” search engine and locate a Project Management Journal article among the thousands of journal articles made available within the many years of publications the Library holds.  The Project Management Journal article should tie directly into at least one highlight from the assigned chapters (Chapters 11 &12) reading/review material for the week.  This weekly research paper should include at least 2 pages, but not more than 3 pages, in the narrative and it should be typed in APA formatting (title page, reference page, no abstract page, double-spacing, Times New Roman 12 font, 1 inch margins, in-text citations, etc…). 
    Your paper should contain the following headings:

    •      Introduction
    •      Summary of the article
    •      Relevant points made by the author
    •      Critique of the article
    •      Application of the concepts in the article

Text

Title: Project Management: The Managerial Process ISBN: 9781260238860 Authors: Clifford F. Gray, Erik W. Larson Publisher: McGraw-Hill Education Publication Date: 2020-01-09