risks in cloud computing

  

Read the attached article and  please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk      management?

Make sure to write in proper format

  • Explain, define, or analyze the topic in detail
  • Provide an outside source (for example, an article from the UC Library) that applies to the      topic, along with additional information about the topic or the source      (please cite properly in APA 7)

Discussion 13 – Enterprise Risk Management – Initial post

In the last week of class, we are going to complete a reflection activity.

 This discussion topic is to be reflective and will be using your own words (500 words) and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the book.

Items to include in the initial thread: 

  • “Interesting Assignments” – What were some of the more interesting assignments to you? 
  • “Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings”
  • “Perspective” – How has this course changed your perspective? 
  • “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others? 

Assg

Optional Resources:

 Chapter 3 & 4 Journal articles

Task 1: total 1 page

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss what power in the context of leadership is and how it relates to bullying within organizations.  Also, note how this impacts productivity.
  2. Discuss what organizational culture is and how it impacts work productivity.  Also, note how organizational culture impacts the success of innovation implementation.
  3. How does culture impact leadership? Can culture be seen as a constraint on leadership?

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations.

Task 2: total 3 pages

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

Task 3 total 3 pages

https://opentextbook.site/informationsystems2019/

Essay Assignment 1: Review the strategic integration section.  Note what strategic integration is and how it ties to the implementation of technology within an organization.

Essay Assignment 2: Review the information technology roles and responsibilities section.  Note how IT is divided based on operations and why this is important to understand within an organization.

The above assignment should be two pages in length (one page for each question) and adhere to APA formatting standards.

**Remember the page length does not include the APA cover page or any references**

This assignment must be submitted by 11:59 PM on Sunday, September 13, 2020 (No Exceptions).  As per the syllabus, no late assignments will be accepted.

Please understand that Plagiarism will not be tolerated and will result in a zero grade. Please review the Academic Dishonesty Policy outlined in the syllabus and in your student handbook. 

cloud comp

 

Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.    

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Week 3 paper

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?

information security

  

Question 1

Answer each question in a paragraph that contains at least five sentences: Include the question and number your answers accordingly.

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Question 2

Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Question 3 

Do a bit of research on penetration testing techniques. Investigate and document the following

Five network penetration testing techniques

Advantages and disadvantages of each

One notable social engineering test

Possible negative implications of penetration testing

Please write between 250

Question 4 

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

Who is likely to attack your site?

When are attacks likely to occur?

What sort of attacks might take place?

How can you best minimize attacks and protect the integrity of your site?

Write between 250

Discussion 7

Stanford University medical researchers conducted a study on the correlation between the use of fertility drugs and ovarian cancer.  Their study, published in the American Journal of Epidemiology, concludes that the use of the fertility drugs, Pergonal and Serophene, may increase the risk of ovarian cancer by three times.  The lead author of the studies, Professor Alice Whittemore, stated, “Our finding in regard to fertility drugs is by no means certain.  It is based on very small numbers and is really very tenuous.”

FDA Commissioner David Kessler would like the infertility drug manufacturers to disclose the study findings and offer a warning on the drug packages.  He notes, “Even though the epidemiology study is still preliminary, women have a right to know what is known.  We’re not looking to make more of this than there is.”

If you were a manufacturer of one of the drugs, would you voluntarily disclose the study information?

IA week9 DB

 

Hello,

i need this paper by 10/21 afternoon.

Strictly No plagiarism please use your own words.

Describe two cryptographic applications and how they are used in Information System Security.

An initial post must be 300 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism