Imoprtance of strategic planning 1

Discussion:

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver? 

Note: Answer should be a minimum of 300 words and 2 APA format references

Case Study

 

Using the case study below, you will analyze an existing business problem, create a secure network topology, and write a security plan. Your written paper should be completed in word and consist of a Cover page, four to five-page written pages and a bibliography for cited references.

Case Study:

You are a consultant working with a dental office that has just merged with another dental practice. The original office housed three dentists, two dental assistants, and one receptionist in one location. With the merger, there are now five offices in different parts of the city, 15 dentists, 12 dental assistants, and five receptionists. Four of the dentists work in the offices but also are mobile in that they provide dental checkups to elderly patients in their homes or at the senior citizen centers, and to school children in the three inner-city elementary schools. The mobile dentists need to be able to send and receive patient records while they are out of the office. All the dentists and dental assistants must have real-time access to all patient records and daily schedules. The lead dentist has reminded you that they are required to meet HIPAA requirements for protecting patient information. You, as a telecommunications specialist, have been asked to design the telecommunications network to support this new multi-location practice. Others on the team will develop the applications and databases. Your task is to identify the requirements and design a network solution that will meet those requirements.

  1. Analyze the given case and provide a clear set of solutions for the network solution.
  2. Identify the information that is to be protected and the related security requirements.
  3. Identify the network components, security hardware, devices and equipment that would be involved in meeting the needs of the stationary offices and the mobile dentists.

Unit 2 Assignment 2 -Deliverable 1: Analyze the Business Problem

  1. Analyze the given case and provide a clear set of solutions for the network solution.
  2. Identify the information that is to be protected and the related security requirements.
  3. Identify the network components, security hardware, devices and equipment that would be involved in meeting the needs of the stationary offices and the mobile dentists.

Scoring Guide

Data mining

 

Discuss the advantages and disadvantages of using sampling to reduce the number of data objects that need to be displayed.

Would simple random sampling (without replacement) be a good approach to sampling? Why or why not?

Imoprtance of strategic IT planning 6

 Question:

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

  • Be approximately 2-3 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

10 pages

 Circuit City was an American consumer electronics company founded by Samuel Wurtzel in 1949. By 1990s, Circuit City became the second largest consumer electronics store in the United States with annual sales of $12 billion. On March 8 2009, Circuit City shutdown all its stores. On January 8th at the 2018 Consumer Electronics Show in Las Vegas, Circuit City CEO announced a comeback and relaunch of Circuit City into “a dynamic, a social-focused ecommerce site” and a new business strategy for its retail stores 12 . In this case study, assume that Circuit City hired you as the new chief information officer (CIO) to help relaunch the company into a global e-commerce multinational company. Create a PowerPoint presentation containing the IT strategic plan that will address Circuit City ecommerce initiatives. The following information should be covered in the documentation. 

´1. History of Circuit City

´2. What were the issues and challenges that caused the collapse of Circuit City in 2009?

´3. What are the issues and challenges with Circuit City 2018 latest e-commerce initiative?

´4. Discuss the major competitors in global e-commerce.

´5. How would IT deliver value to the business?

´6. Proposed the IT infrastructure required to support global e-commerce

´7. Proposed the IT budget for the e-commerce initiative

´8. Discuss the IT based risks associated with global e-commerce

´9. Discuss how IT can leverage innovative technologies such as social media, big data and business intelligence to provide value to the business

´10. Discuss the future or emerging technologies that would be leveraged to give Circuit City a competitive advantage.

Creating Company E-mail/WIFI/Internet Use Policies (Cyber Security)

Cybersecurity Planning and Management

Creating Company E-mail/WIFI/Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

Assignment on physical threat to IT

Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment.

Minimum of 300 words with 3 paragraphs.

D7

What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?

300 words and 3 reference in APA