PLEC10

 

Answer each question in a paragraph that contains at least five sentences: Include the question and number your answers accordingly.

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Communicating Technology Concepts to Business Professionals

 Must post first.

Congratulations!  This week, your internship rotation takes you to the company’s IT Department where you’ve been asked to help prepare a short presentation for one of the company’s Brown Bag Lunch training events. This training event will be attended primarily by business professionals who have familiarity with information technology but at a very high level; the attendees use IT to perform their jobs on a daily basis.

For this 10 minute presentation, you should focus upon meeting the information needs of the attendees from the internal (business) organizations which are supported by the IT department. You should also anticipate questions which your audience might ask during the 10 minute Question & Answer period which follows your presentation. (When you write your peer critiques for this week — ask and then answer at least one question that you believe the audience is likely to ask.)

Choose one of the following articles to present to the attendees.

1. Selecting the Right Cloud Operating Model: Privacy and Data Security in the Cloud

2. Understanding Managed Services (focus on the benefits of Managed IT Services)

3. Shadow IT: Mitigating Security Risks

After reading the article, prepare a set of slides (talking points) with speaker notes in which you highlight key information about the article and why Padgett-Beale employees should “care” about the topic. Make the presentation relevant for Padgette-Beale by integrating information about its business operations (use the company profile, the weekly descriptions, and other readings in this course). At least one of your slides should address cybersecurity issues and concerns that arise in the context of your chosen article (use the CSCU textbook’s material and other course readings to help you identify these issues and concerns). 

You should have a title slide, a slide containing the article title & publication information, content slides, and a summary slide — 8 to 12 slides total. At the end of the presentation, include a Q&A slide followed by “backup” slide which has additional resources that the audience can consult for more information.

Each slide must have speaker notes (at least one paragraph). Watch out for jargon! Write in business appropriate language and/or plain English but do not speak down to your audience.

Use your UMGC student Office 365 subscription to access Power Point to create your slide deck.

Note: You should read / consult one or more of the resources under “Supplemental Readings” for additional information relevant to your chosen article.

 https://www.mcafee.com/blogs/consumer/family-safety/malware/ 

 https://us.norton.com/internetsecurity-malware-ransomware-5-dos-and-donts.html 

 http://www.itmanagerdaily.com/cloud-computing-101/ 

 https://www.govtech.com/computing/Why-Public-CIOs-Are-Attempting-to-Move-Shadow-IT-to-Shallow-IT.html 

 https://digitalguardian.com/blog/what-are-managed-security-services-why-organizations-hire-managed-security-service-providers 

  • Discussion Participation with Critiques and Follow-ups

Data mining

  You are a data mining consultant hired by your organization to implement a data mining process. What challenges does your organization face in ensuring that the data mining models are receiving clean data?

Your assignment must adhere to APA guidelines. There should be at least one scholarly source listed on the reference page. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. Your paper should be 2-3 pages in length.

User Training

What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?

Problem set(Planning the project)

 

It has been argued that without project management for very large projects, they are most certainly doomed to fail. Can the same be said for small projects? In this Discussion Board, you will explore this question and take it further by describing what tools and techniques you would still utilize to manage a small project.

The following Discussion Board research will assist you in determining each of these dimensions. Research at least 2 resources (which may include your textbook) to support your response.

What tools, techniques, and methods that you would traditionally use in a larger project would you still incorporate in managing a small project?

What do you envision the roles and responsibilities to be for smaller projects?

Describe the schedule change management process that you would implement for smaller projects and how this differs from what you might use for larger projects.

Include an introduction and conclusion to this topic. Be sure to include your references and citations, and format your submission in APA format.

appliancewarehouse case study 11

 Agile   Carlie Davis July 19, 2020 

  

Hi J,

Our lead developer was recently certified in Scrum, one of the agile methodologies, and would like to try to manage this project using scrum.

In order for her to do this, she needs us to rewrite the requirements list you previously created as user stories. Just to remind you, a user story looks like this:

As a < type of user >, I want < feature > so that I can < functionality >.

For example: As a taxi driver, I want directions so that I can quickly get to my next customer.

Please rewrite all of your requirements as user stories and I will pass it on to our development team.

Carlie

________

 Testing and Training   Carlie Davis July 20, 2020   

Hi J,

The developers have requested to view your testing plan for SIM. Can you give me a sample of the tests you are planning to run? Show me examples of the unit tests, integration tests, and system tests.

Also, have you developed the training plan? Who are you planning to train and what functionality are you planning to teach the different classes of users?

It’s all starting to come together now!

Carlie

_______

 Rollout   Carlie Davis July 21, 2020   

Hi J,

As we near the end of the development stage for SIM, I have implementation questions. How do you plan on rolling out the new SIM system? Which technique did you decide to use? Why do you think this the best technique? Please explain the rationale for your choices.

Carlie

Business Intellegence

 

Discussion Questions: 

1. Some say that analytics, in general, dehumanize manage-rial activities, and others say they do not. Discuss arguments for both points of view. 

2. What are some of the major privacy concerns in employing intelligent systems on mobile data?

3. Identify some cases of violations of user privacy from current literature and their impact on data science as a profession. 

Exercise: 

1.  Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork