Project Management

  1. Discuss the key components of human resource management. Pick at least four concepts from chapter nine and describe how these concepts interrelate to individual performance on a team.
  2. Review table 9.2 and select one of the dimensions listed, note why it was chosen and how you relate to this behavior. If you have a personal experience, please share.
  3. How do leaders select the best talent? What are some tools they can use to select the best-talent

Operations security

 

Please use the attached “Guidelines for Evaluating a Research Article” to answer the below questions.  Write a 2 – 3 page paper on:

  1. What is an Information Technology Project?  
  2. Identify & explain the major parts of a research paper.
  3. Explain the difference(s) between qualitative vs quantitative research methods.
  4. Why use Peer Reviewed journals?
  5. Why are keywords used during the Literature Review process?
  6. Why are project deliverables, limitations & deadlines an important aspect of project development?
  7. Why use/apply APA Basic Citation Stiles in YOUR writing assignments/research?
  8. Why is Academic Integrity important (see syllabus)?
  9. Explain the difference between plagiarism vs self-plagiarism?

Portfolio project

  • The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  
    The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.
    Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  
    There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.
    Conclude your paper with a detailed conclusion section which discusses both limitations and emerging concepts. 
    The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
    Your paper should meet the following requirements:

    • Be approximately seven to ten pages in length, not including the required cover page and reference page.
    • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

Cyber security planning and management – research

Select ONE ARTICLE from the following links and summarize the reading in your own words. 

Your summary should be 2-3 paragraphs in length and uploaded as a WORD DOCUMENT. 

There is an EXAMPLE attached to show you the format requirements. (Attached)

Plagiarism is unacceptable. 

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/ https://www.onlinesecurity.com/news–publications-page http://www.esecurityplanet.com/views http://netsecurity.about.com/

Practical Connection Assignment

   Legal Reg, Compliance, Invest : Provide a reflection of at least 500 words (or 2 pages double spaced) of  how the knowledge, skills, or theories in this course could be applied,  in a practical manner to your current work environment. If you are not  currently working, share times when you have or could observe these  theories and knowledge could be applied to an employment opportunity in  your field of study.  

Wireless Network……

 

First Section 

In a 350- to 500-word essay, address the 4 questions. 

Case study: A publicly traded home builder has hired you to install a new wireless network. The company currently has a wireless network that is a few years old. The problem with the current wireless network is that it was built using proprietary standards instead of 802.11. This current wireless network does not have an upgrade path to 802.11.

On the new wireless network, the corporate office wants a system that allows construction workers to enter progress reports into the system in order to stay up-to-date with all the different community building sites. Each community has a model home that will need Wi-Fi to connect back to the corporate office in order to enter these reports. The construction workers will be using iPads to enter the information. The company currently has 32 sites across the country that will need Wi-Fi. 

In each of these sites, there will be two sales employees that will need to have Wireless IP Phones so that customers can get in touch with them easily. The sales employees will also have laptops, as well as two sales kiosks that allow customers to browse the different options to choose from for their new home build. The kiosks will connect to the Internet, and when the customer chooses their options, the information will be entered into a database. Once the customer chooses the options they want, the sales person will pull up the report on their laptops to print for the construction workers. 

Directions: Looking at the current wireless network and what the home builder would like to accomplish with the new network, explain to the company why the current wireless network will have to be replaced before you can begin the project. The Chief Information Officer (CIO) has asked you to come up with a plan to implement this new wireless network. Include in your report:

1. A brief description of the problem with the current wireless network

2. The benefits of global/industry standards vs. proprietary standards

3. What types of problems exist with mixed standards 

4. A plan to correct the problems with the current wireless network

__________________________________________________________________________________

 Second section…. 

1. PROJECT SCOPE –

Project scope

2. FEASIBILITY STUDY –

Objectives of the Network:

1. Secure Service – What is the main objective of this network? 

2. Integration and Updates –What needs to be done to get the current network up-to-date?

3. Versatile Information Process –What does the network need to be able to do? For example, applications, devices, computers, laptops, etc. 

4. Collaboration – How will the network be used to collaborate with other offices? Other users in a different location?

5. Scalability – How will the network be able to adapt to change?

Intended Users –What type of mobility requirements, client device requirements, and signal coverage requirements are needed?

Design Assumptions – State the assumptions for unknown factors that could affect the project. 

Equipment Needs and Proposed Budget

computer forensics

“Forensic Labs and Certification” 

  • From the reading, outline the process of forensic lab accreditation and determine what a laboratory needs to do in order to fulfill the requirements. Identify an ASCLD accredited lab in your geographic location and conduct further research on this lab. Summarize the location and the type of lab.  Explain whether you believe lab certification is a requirement for law enforcement agencies and provide justification.