3 Papers. (Cloud)(Ethical Hacking)(12 hours)

Please include references with sources(Web link) in APA format. NO PLAGARISM Please

1st Writing Assignment

(250 – 300 words)

Explain your thoughts on the future of IoT(Internet of Things) and the security implications. Why do you believe it is important to secure these devices as they become more common in our lives and our businesses?

Please include references with sources(Web Link) in APA format. NO PLAGARISM

2nd Writing Assignment

(200-250 words)

In a few short paragraphs, explain which cloud services you use (Google, Amazon, iCloud, Verizon, Microsoft One, Dropbox, etc) and what type of information you store (docs, photos, music, other files?). How much space do you have and what does this cost per month?

Please include references with sources(Web link) in APA format. NO PLAGARISM

3rd Research Assignment

(200-250 words)

For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).

Please include references with sources(Web link) in APA format. NO PLAGARISM

biw1

Find information about IBM Watson’s activities in the healthcare field. Write a report.

Ethics, Law and Cybersecurity

Instructions:  There are three (3) topic areas listed below that are designed to measure your knowledge level specific to learning outcome (LO 1) shown in your course syllabus. You must select any two of these topic areas and provide appropriate responses in essay form. In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our textBe sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.    

For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. 

You should type your responses directly under the appropriate question. Be sure to include your name on your quiz. Only the first two (2) questions with answers will be graded.  Include your name in the document filename. Your completed quiz must be uploaded into the appropriate eCollege Dropbox, no later than 11:59pm on the due date.

  1. Define and describe in your words the key technological developments of each of the four phases in the evolution of cybertechnology. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses (knowledge)
  2. Access Don Gotterbarn’s arguments for the claim that computer ethics is, at bottom, a field whose primary concern should focus on moral responsibility issues for computer professionals.  Do you agree with his position?  Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses (knowledge)
  3. Identify a current ethical issue involving the use of a recent or emerging technology.  Apply the three-step process in the “comprehensive framework” (or strategy for Approaching Moral Issues in Cybertechnology) that was described in Section 1.6.  Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses (knowledge)

discussion 07/17

 In discussing Organizational Excellence, let’s start with an analysis of your organization or one with which you are familiar. Take the Organizational Diagnosis Questionnaire that is found aboveProvide a detailed analysis of what is working and what is not working. 

400 words.

Need one Response to each below discussion-computing

Please read the each discussion post and provide one response for each discussion in 75 to 100 words

Discussion Post 1:

 

BPaaS comprises of an integration of all processes as conducted by businesses hence enabling commercial enterprises achieve economy and efficiency in conducting business operations. With the shift to cloud computing, organizations are adopting automation of their operations to reduce on the overall cost of hardware, software amongst other resources. The implication of BPaaS on organizational operation include reduced cost of business transaction, minimal risks as well as enabling organizations achieve scalability in utilization of cloud computing infrastructure (Schwarzbach, 2016). For this reason, organizations could continue adopting BPaaS to increase their overall productivity in their operations.

BPaaS could be centrally managed by organizations unlike with other standalone applications. As an integration of all critical business processes such as payroll processing, e-commerce amongst other process, it would be possible for organizations to manage all processes at a single entry point. As a composition of multiple application, it would be relatively easier for enterprises to monitor the performance of BPaaS unlike when individual applications are used in managing business processes. As such, the risk reduction aspect is incorporated to BPaaS by reducing the multiple vulnerability points to organizational operations. BPaaS enables enterprises to have access to a skilled workforce and expertise who have knowledge in application development.  It is hence possible for organizations to seek immediate support from expertise who have knowledge on BPaaS operations. In comparison, to other traditional applications it hence becomes possible for enterprises to reduce the risks of operating BPaaS in the event of failure. It is possible to incorporate new design processes and implement further security measures to the operation of BPaaS by the help of these experts and professionals in the cloud computing platform (Duipmans& Pires, 2012)

BPaaS offers a platform for facilitating social collaborations, web analytics, business process management, security governance, compliances and risk management (Babu, 2013). The effective running of business operations requires business to adopt a comprehensive and a streamlined approach that facilitate efficient service delivery. It hence becomes possible that with the integration of BPaaS, organizations would have it easy having efficient business processing. Risk of business failure due to unstructured business process is hence not possible with the incorporation of BPaaS for business operations.  There is multifunctional capabilities usually associated with the BPaaS. The multifunctional capability hence offers opportunities for organization to adopt flexibility in their operations an attribute that is not present in many applications.  Also, before the full integration of BPaaS by most enterprises, there is usually a trial period upon which organizations should test their business processes in line with the BPaaS. The trial period as offered by most BPaaS service provider is set to make organizations familiarize themselves with the functioning of BPaaS (Babu 2013). As such it hence becomes relatively easy for organizations to use BPaaS with full knowledge on its capability hence minimizing risks of failure due to lack of knowledge and interoperability of BPaaS.

Discussion Post 2:

 

Business Process as a Service (BPaaS) is a type of outsourcing model that outsources cloud-based services to businesses and commercial organizations. Companies or business organizations can increase the agility of their business processes by using BPaaS services. BPaaS provides these companies with some valuable emerging technologies to implement and deploy their business processes. It will definitely reduce the cost related to labor by increasing automation. BPaaS outsources cloud services that can be accessed from the Internet because it is an Internet-based technology. One of the accepted definitions of cloud computing is a model for enabling convenient and on-demand network access to a shared group of configurable computing resources that can be Quickly provision and launch with minimal effort from management or service provider interaction. The core elements of BPaaS are security and privacy and can be achieved by designing some robust business processes in the Cloud. Businesses, organizations or any customer can meet their rapidly growing and changing business needs with the help of BPaaS. BPaaS is defined as a collection of activities that takes one or more types of inputs and creates an output that is of value to the customer. “Automation” will improve operational efficiency and reduce errors, but management middleware of business processes has no tools to quantitatively track these business metrics. (Woitsch & Utz (2015, October))

There are many benefits to the increasing popularity of BPaaS. It is a type of cloud services with almost all cloud services that give business organizations the peace of mind of reducing risks and improving the speed of commercialization. Cloud services store information on servers and hardware that an organization does not control. These external servers have strict security measures that prevent any form of a data breach. They typically require the most powerful firewalls, access credentials, and security protocols to ensure business managers are comfortable storing critical information on their servers. The data is stored in a central repository managed 24/7 by internet security experts. Vendors also perform a threat assessment analysis for each cloud application launched by the company. They constantly work to ensure that the security measures implemented are stronger and more effective. According to KPMG Managing Director Randall Wiele, aside from this, there are many other benefits to focus on avoiding the capital, not only on underlying capabilities but also on constantly updating services. (Barton & Seel (2014).

Now, the business environment or the one-day process changes each new business investment carries a risk, however, BpaaS helps to reduce this risk as a team of professionals with extensive experience in new technologies and processes will be implemented to carry out these activities. Therefore, such an experience could reduce the risks that can come with new systems or growths. As of today, more and more organizations are realizing the benefits of BPaaS or other cloud services to reduce their exposure to risk and are committing to this innovative business approach.

Business Process as a service is intended to automate any business process of a company through cloud services. These cloud services make use of the infrastructure, an application that contains the logic and other details related to the cloud, and these services work collectively. “These cloud services that include software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS) are therefore dependent on related services. Another description of BPaaS is that it is a way to automate BPM with the help of very particular software for the business. (Accorsi (2011, July).)

IT Software for Business

1st question

Contextual Information:

· There are two wide used methodologies to manage a software development life cycle: Agile and Scrum. Create a Word Document briefly describing their differences. (word count 500 words).

2nd question

The table below shows the historical data of the Average Closing Price (2005-2020.) Estimate the annual variation of crude oil prices (in %). Use the equation be-low. Draw a line chart showing the evolution of the annual variation and add a trend line and describe its type (positive, negative, neutral). There are 2 historical minimum values reached in 2008 and 2020; relate those minimum values to socio-economic events and include them as labels in the chart. Also read: Software Engineering Methodologies

image1.jpg

  

Year

Average

  

Closing

  

Price

 

2020

38.78

 

2019

56.99

 

2018

65.23

 

2017

50.80

 

2016

43.29

 

2015

48.66

 

2014

93.17

 

2013

97.98

 

2012

94.05

 

2011

94.88

 

2010

79.48

 

2009

61.95

 

2008

99.67

 

2007

72.34

 

2006

66.05

 

2005

56.64

    

· You should submit the spreadsheet used to estimate the annual Change (%)

3rd question

Calculate the annual payment for a loan with an annual constant interest rate of 2%, 35-year duration, a present value of €145,000 and a future value of 0. You should submit the spreadsheet used to estimate the annual payment.

IT communication relationship Leadership development

* APA Format

* Plagiarism-Free

* Refer Textbook attached.

* Answered words should be more than 750 words.

Answer the questions by going through the Textbook and answer each question reasonably.

  

Review chapter 5 of the text.

Q1. What are the recommendations for improving business-IT communication?

Q2. Do you agree with the list?

  

Review chapter 4 in the text.

Q3. Discuss only one of the building block required for a strong business-IT relationship?

  

Review chapter 6 in the text.

Based on your reading, in your own words:

Q4. Discuss the value proposition in investing in IT Leadership development?

Q5. What do you consider are the qualities of good IT Leadership?

  

Review chapter 7 in the text.

Q6. In your own words, discuss the recommendations for creating an effective shared services.