paper 07/17

 

Continuing with your case project, research best practices using the readings from the course texts and external resources. 

Address the following topics in your paper:
– What are the current positive or negative impacts to business operations involving the IT management processes?

– How can Six Sigma or TQM benefit your organization?

– What change management processes are currently in place, or if there are no formal processes, what would you recommend?

– Conclude with your thoughts on how implementing IT process improvement and change management in your business would make a positive impact

Your paper must be 2-3 pages of content (not counting the cover page or references page), use the APA template, and include citations within your writing showing where your references are used. Use unique in-text headings for each question and do not just re-state the questions.

ETCM DISCUSSION-5

Discussion: Should be between 250-to-300 words. 

DUE DATE: Wednesday End of Day USA time (3 days from now)

Reply: I need 2 replies. Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO) 

DUE DATE: Saturday End of Day USA time (6 days from now)

Topic:

 

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.

Cloud Computing

Discuss, in your own words using 500 words or more, how business process as a service (BPaaS) reduces risk for commercial enterprises. 

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Required Practical Connection

  

Practical Connection Assignment

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Subject:

 Fall 2020 – Operations Security (ISOL-631-M30) – Full Term

Conflict Managment Paper 3

 

select one of the key terms listed below and conduct a search of Campbellsville University’s online Library resources to find 1 recent peer reviewed article (within the past 3 years) that closely relate to the concept. Your submission must include the following information in the following format:

Key Terms:

  • Ethical tactics in Negotiation 
  • Deceptive Tactics in Negotiation
  • Cultural influences to Negotiation
  • The Golden Rule

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

Assignment

This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

  1. What is your definition of AI?  Please explain.
  2. What is your opinion of AI, is the technology currently available? Why or why not?
  3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
  4. How is AI perceived as different in various industries and locations? Please explain.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Final Paper

  

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Requirements:

1. The paper should include at a minimum of the following sections:

a. Title page

b. Executive Summary (Abstract)

c. Body

i. Introduction

ii. Literature review

iii. Program and technology recommendations

d. Conclusion

e. References

2. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.

3. Must cite at least 10 references and 5 must be from peer reviewed scholarly journals (accessible from the UC Library).

4. This paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 10 to a maximum of 15 pages in length (double-spaced), excluding the title page and references.

Discussion Post

 

After completing the reading this week, please review table 1.2 in the text and review the distinction between leadership and management.  Then think about this in regard to how senior leaders versus senior managers lead change in an organization (especially when it comes to technical change in an organization).

This week please reflect on these concepts and answer the following questions:

  1. When implementing change in an organization, there are always culture issues that are faced, such as not accepting change, determine how differently this would be handled thinking about the management versus leadership constructs?
  2. When dealing with performing work, how is this implemented differently within the management versus leadership constructs?

Please be sure to answer all of the questions above in the initial post.

Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations.

Case scenario

 

Case scenario. An HU Investment Firm employee who had signed a non-disclosure agreement at the time of hire was identified as posting corporate protected information on the internet which has led to a loss of corporate income and trust of the companies that the corporation represents and does business with. The corporation has taken the incident to a Law firm in an attempt to lead to prosecution against the employee who has since been fired.

Write a Summary Report to the Prosecutor based on the case scenario and your work in previous units.

1. Applicable laws and policies that relate to cyber defense

2. Describe the major components of each pertaining to the storage and transmission of data.

3. Describe the responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues.

4. Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.

5. Support your report with documents that you have created previously, such as the Risk Assessment Report and the Mitigation Plan. 

Remember to use a professional writing style and support your statements with logical evidence. 

Wk 3 – Apply: DDOS

Assignment Content

  1. Imagine you are on a specialized team tasked with exploring network vulnerabilities in your company. The CEO of the company has read about similar companies being subjected to a Distributed Denial of Service (DDOS) and is very concerned. 

    Research the definition of a DDOS attack and how it can be prevented. If it cannot be prevented, describe the steps that may be required to remediate the DDOS attack, along with the potential business impacts caused by a DDOS attack.  

    Prepare a 10- to 12-slide multimedia-rich Microsoft® PowerPoint® boardroom presentation for the CEO. Include the following in your presentation:

    • Title slide
    • Definition of a DDOS attack
    • At least 2 methods (attack vectors) of DDOS attacks to include the threat agents’ (hackers) motivation for conducting a DDOS attack
    • Common prevention tools and/or processes to block a DDOS
    • Common detection tools to detect if a DDOS is occurring or has occurred.
    • Recommended methods for containing or eradicating the DDOS attack
    • Recommend methods for bringing the affected systems back online from a successful DDOS attack
    • Reference slide
    • Cite references to support your assignment.

      Format your citations according to APA guidelines.

      Presentation checklist:

    1. Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points 
    2. Consistent fonts and font sizes throughout the presentation 
    3. Use colors and background. No black and white presentations.  
    4. Include at least one references that are properly cited 
    5. Follow APA format (fonts, etc). 
    6. Include speaker notes for every slide except title and reference pages. 
    7. Did the use slides to convey ideas and handouts to communicate details?  
    8. Did the slides follow the golden rule of one idea per slide?.  
    9. Did the slide titles convey the key message of each slide? 
    10. Did the visual diagrams to convey the concepts in a simple, clear, and memorable way? 
    11. Can the charts be understood in less than 5 seconds? 
    12. Did the pictures add clarity to the message the slides  
    13. Did the presentation build curiosity in the audience by revealing information in stages?  
    14. Did the presentation repeat the agenda slide as a guidepost to review your points periodically? 
    15. Did the presentation minimize distractions for the audience by removing distracting backgrounds and attention diverting animations?  
    16. Are the slides clearly readable from the last row in the room?  
    17. Consistent fonts and font sizes throughout the presentation?

      In addition to the points above, I will be looking for speaker notes and be sure to include references. If you have not used speaker notes please research it on the Internet.