Case Study

Summary:

Read The CEO of Starbucks and the Practice of Ethical Leadership and complete the questions at the end of the case study.

  1. Creating Community:  Did Johnson use Starbucks’ shared values as the cornerstone of his decision making after the arrests?  Did his decision to close all Starbucks stores for unconscious bias training and to create a new “Third Space Policy” align with Starbucks’ mission and goals?  Did his handling of the incident promote positive relationships between employees and customers? Did it encourage a sense of connectedness and shared values?
  2. Encouraging Ethical Conduct:  Did Johnson openly acknowledge that his decision was based in ethics and morality?  Did his apology and actions promote awareness of an ethical issue? Did it create a positive or negative difference in the communities Starbucks serves? Did it make a positive or negative difference for Starbucks employees and customers?
  3. Showing Discipline in One’s Role:  Does Johnson explicitly accept responsibility for the incident and provide direction for a course correction? Does he identify ways to collaborate with others when necessary?  Does he show he understands what his role is in fixing this problem?
  4. Clarifying Culture:  Did Johnson clarify his values and the company’s values in his apology and with his subsequent actions?  Did Johnson’s apology and follow-up actions uphold Starbucks’ mission and core values? Did he identify gaps between stated and actual values?  Did Johnson’s apology help Starbucks employees figure out if their personal values align with the company’s?
  5. Designing Ethical Systems:  Did Johnson’s actions have impact beyond Starbucks?  Did they sent a precedent for other companies to follow? Did his apology create a conversation about unconscious bias in the workplace? How do his apology and the subsequent follow-up actions compare to other companies and CEOs that have faced similar problems?

ITM Capstone – Discussion 1

Question: 

How can one distinguish between an organizational weakness and a threat to the organization? 

Post should be 250 words. Add at least one reference in APA format.

MS-ACCESS

INSTRUCTIONS ON THIS LINK

https://github.com/stefanbund/CIS-3100/tree/master/GA%202%20project%20materials%2C%20access

Enterprise risk management/ research paper

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Disaster recovery

Read the following article: “6 small math errors…

” http://www.cracked.com/article_19623_6-small-math-errors-that-caused-huge-disasters.html

Summarize / thoughts. For each error, please use a bullet and answer A. and B. A. Summarize in your own words each of the 6 errors that were due to math. Do not quote the text rather summarize the problem in your own words showing a complete understanding of the problem. Then, B. include your own thoughts on the error. Your response should be a series of bullets (e.g. a dot, diamond, or dash), with each bullet having an A) and a B). (24 points total possible). • First Error (#6) in article A. your summary of the error B. your thoughts about the error • Second Error (#5) in article A. your summary of the error B. your thoughts about the error

New URL / summarize / avoided. Find an article online that is specific to one additional major problem that is the result of a “small” error. A. Copy and paste the URL into your submission, for the first part of answering #3. B. Next, summarize in your own words the problem. C. Lastly, explain (again, in your own words) how this problem could have been avoided. Explain/provide detail – a general summary is not enough. Your response should be the three parts, A., B., and C. (8 points total possible).

Reflecting on all of these small errors that resulted in major problems (the link assigned, plus the one you used in #3), explain why you believe these may correlate ISM 310. Why the emphasis on the correct requirements? Explain clearly at a minimum, one solid example of why accurate requirements are so important to ISM 310. Be as specific as possible. Please do not provide a generic answer. (example of a generic answer would be “attention to detail is important to avoid making a huge mistake”). Your response will be a few sentences being very specific to ISM 310. To answer this, you may need to read ahead just a little understand what ISM is all about

IT Security Policy Enforcement

 

The enforcement of an organizations IT security policies typically begins when the hard work of creating the policy and providing initial security awareness is done.  How an organizations implements compliance depends largely on their governance and management structure & policies.  Chapter 14 discusses legal considerations organizations should consider when enforcing security policies.  

1.  How can an organization use monitoring to enforce security policies?

2. What legal implications maybe encountered when an organizations attempts to enforce their security policies?

3. What is the significant difference between automated and manual policy enforcement?

4. What are some “best” practices YOU recommend for enforcing an organizations security policies?

week-15

 

Write a paper on a mushroom dataset that you analyze. You cannot collaborate with team members on the final project and you can chose to change the Mushroom dataset . In the paper be sure to include

1. Mushroom Dataset description

2. Exploratory data analysis

3. Machine Learning question – regression vs classification or unsupervised learning?

Operational Excellence Discussion

Discussion : 

Here is an assessment on Leadership Style. Please take this assessment and provide an analysis of the results. How does this relate to you? How does your style impact the technological tools that you will use as a leader? How would you use your style to lead your organization? 

Assessing Your Leadership Style.doc 

It should be at least 300 words in length and you must extensively cite reliable sources, both as references at the end and as corresponding in-text citations (formatted according to APA standards). Attach your completed document to your primary posting. Make sure you discuss your particular results.