Measuring the Value Added to the Business

  

Information systems are no longer being used only for data reporting. As information systems have become a major part of the business model—and IS budgets continue to rise because of increased investment in IT—there is also a growing need to understand the value of business systems. 

So what are the various models that are commonly used to help measure the value added to a business by information systems? 

Discussion 7

Kirk (2016) tells us that data adjustments affects what data is displayed and presentation adjustments affects how the data is displayed. Each of the adjustments involve specific features. Data adjustments include: Framing, Navigating, Animating, Sequencing, and Contributing. Presentation adjustments include: Focusing, Annotating, and Orientating. Select one feature and expand on it.

Reference

Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design. Thousand Oaks, CA: Sage Publications, Ltd. (Chapter – 7 Interactivity)

INSTRUCTIONS.

1. No Plagiarism at any cost .

2. The submission date is Thursday (06/18/20).

3. Atleast 3 references in APA format

Risk Management and Mitigation Planning

 

Assignment Content

  1. You are the new IT Project Manager for the organization you chose in Week 1, and the CFO is needing a risk assessment for migrating from SQL Server 2008 r2® database to SQL Server 2016. The migration will lead to the expansion of the cloud data centers worldwide.

    The CIO feels the risk is too high and wants you to develop an Information Guide Handout and Risk Information Sheet for upper management to describe the risks and management of the risks for the impending migration.

    Part A:
    Create a 1- page (does not include title or reference pages) Information Guide Handout to present to upper management, comparing risk management practices to use in the migration that includes:

    • How risk mitigation strategy planning can reduce the likelihood and/or impact of risks
    • How often risks will be reviewed, the process for review, and who will be involved
    • The roles and responsibilities for risk management
    • Adequate references to support your findings, information, and opinions
    • A recommendation for the best risk management practice for this migration
    • Part B:
      Using the sample shown below, create a 4- to 5- page (does not include title or reference pages) Microsoft® Excel® Risk Information Sheet for at least five potential risks which might be encountered during the conversion. At least three of the five risks you choose should be project-management related.

      Risk Information Sheet

    • Risk Description
    • Probability
    • Impact
    • Rationale
    • Risk Mitigation
    • Details/Outcome
      Please note the following:
    • The risk description should fully describe the risk.
    • The probability is the likelihood which the risk will occur (i.e., low, medium, or high).
    • The impact is how the organization will be affected if the risk does occur (i.e., low, medium, or high).
    • The rationale should explain the reasons for your probability and impact assessments.
    • The mitigation strategy should explain how each risk will be addressed.
    • There should be one risk information sheet for each risk identified.
    • Include APA-formatted citations when necessary.

DS HW-8

Write a research paper on the Credit Card Fraud Detection techniques with a focus on both supervised and unsupervised learning.

https://www.kaggle.com/merryyundi/credit-card-fraud-detection

https://www.kaggle.com/isaikumar/credit-card-fraud-detection-using-k-means-and-knn

The paper should have the following sections and discuss how these work:

Section 1: Data Exploration of the Credit Card Fraud Dataset

Section 2: Resampling for Imbalanced Data

Section 3: Logistic Regression

Section 4: Decision Tree Classifier

Section 5: Random Forest Classifier

Section 6: Voting Classifier

Section 7: K-means Clustering

What are some of the potential risks involved with cloud computing? Does the research and model in this article propose a viable solution to cloud-based risk management?

Article:

Mackita, M., Shin, S.-Y., & Choe, T.-Y. (2019). ERMOCTAVE: A Risk  Management Framework for IT Systems Which Adopt Cloud Computing. Future  Internet, 11(195), 1-21. Retrieved from https://doi.org/10.3390/fi11090195  

After reading the article this week, please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

 A substantive post will do  of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC  Library) that applies to the topic, along with additional information  about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial  discussion thread. Be sure to use information from your readings and  other sources from the UC Library. Use proper citations and references  in your post.

DQ

https://cointelegraph.com/bitcoin-for-beginners/what-is-bitcoin-wallets

After watching the video & reading the article provided in the content area.

  • Go ahead and set up a Bitcoin wallet. 
  • Describe and explain the process, you can also talk about any difficulties you have encountered.