Organizational strategy, Organizational culture.

  Write an 8-10-page paper on an organization of your choice  The organizational analysis will contain the following sections: 

  • Introduction of the organization, including history and background. 
  • Organizational strategy. 
  • Organizational design and your assessment of effectiveness. 
  • Organizational culture. 
  • Conclusion and what you would change about the selected organization for improvement.

NOTE: Paper should be in APA Format with in-text citation.( double-spaced, and have uniform 1-inch margins in 12-point Times New Roman font )  

Information history

As a recent graduate, you just landed a job at a career counseling agency. As part of this role, you are given a project to update the resources that are provided to job seekers, including career reference brochures that help individuals understand the career development, lifelong learning opportunities/expectations, and basic requirements to obtain a job in their field.

Your main deliverable for this project will be the written material to be used in the pamphlets. Since you are not a subject matter expert in these areas, you need to use your research skills to find the information needed and cite the sources properly. Just like in the workplace, you are not required to produce the brochure itself; you will research and prepare the content to provide to the graphic design team.

Directions

To complete your Portfolio Project, you will need to: 

⦁ Choose a career or job title to research for this pamphlet – a good tip here is to choose a job or career that you’re interested in pursuing for your future to not only apply the research to your own life but also to make it more interesting for you!

⦁ Conduct research from reputable and reliable sources to create written materials that will guide job seekers in their pathway to a career. 

⦁ You will create three (3) 250-word written paragraphs to be included in the pamphlet on these topics:

⦁ Basic requirements needed to obtain the job: What is required to be considered for this job? Any specific degrees, certificates, experience, etc.?

⦁ Career development opportunities for this job: What does the ‘roadmap’ for this career look like? What are responsibilities that can grow within this field, and what other job titles can come after this one? If this job is one point on the career roadmap, what other milestones can come after it? For instance, a career progression or development path for a nurse might be a Certified Nursing Assistant (CNA), then Licensed Practicing Nurse (LPN) and then Registered Nurse (RN). 

⦁ Lifelong learning opportunities/expectations for this job: What are professional organizations that an individual in this career path can join? What learning opportunities exist to keep their content knowledge up to date and accurate? What expectations for lifelong learning are set within this field, such as CEU (Continuing Education Units) and/or re-certification requirements?

Requirements and Formatting

Your three (3) content paragraphs should be a minimum of 250 words each. Across all three content paragraphs you must use four (4) total different sources from the Virtual Library, research, coursework in your program of study, and other credible resources to help support your answers. Be sure that you appropriately cite your resources within the written research (parenthetical citation) as well as with a full APA reference citation page.

Your Portfolio Project must be formatted as follows:

⦁ APA formatting, including reference page

⦁ Times New Roman or Arial 12-point font

⦁ 1-inch margins

⦁ Clearly define your work for each content area: Basic Job Requirements, Career Development, and Lifelong Learning Opportunities

mad discussion

 The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week. 

article

 

Read the attached PDF article entitled, “How Blockchain Technology Can Benefit Marketing: Six Pending Areas Research Areas”.

The six pending research areas mentioned in the article are:

1) Fosters disintermediation

2) Aids in combatting click fraud,

3) Reinforces trust and transparency,

4) Enables enhanced privacy protection,

4) empowers security, and

6) Enables creative loyalty programs.

After reading the article in full, select on of the mentioned six areas of research and write an article reflection minimum 8-9 maximum page paper identifying the following;

1) Describe and provide the overall research area mentioned in the article in a synopsis

2) What did the article state in how Blockchain can benefit that marketing area overall?

3) What further research did the article recommend?

4) What do you think can be the approach to further research the topic? What approach would you recommend to take and what type of research method would make sense?

5) What is an example of a company that you believe would benefit from this type of research and why?

6) Outside of Blockchain, what other piece of marketing technology can help this area?

7) What do you recommend is the best way to approach for a company to implement this area of research into their company?

Paper must be 12Pt. Font, Times New Roman, Double Spaced, with title page and reference page. Minimum of 3 references, to include the article required. The title page and references page do NOT count towards the minimum.

cloud computing

Research Paper:  Find a peer reviewed article in the following databases provided by the UC Library and write a 500-word paper reviewing the literature concerning one of this week’s topics, e.g. Virtualization, or Securing the Cloud.

Select only scholarly peer reviewed articles and papers.

Must use the following databases for your research:

  • ACM Digital Library
  • IEEE/IET Electronic Library
  • SAGE Premier 

URL: https://ucumberlands.libguides.com/security

Hide Details

Assignment

 

  • BITCOIN – In case you have not watched the explanationHide Details

    https://www.khanacademy.org/economics-finance-domain/core-finance/money-and-banking/bitcoin/v/bitcoin-what-is-it

  • ItemReading AssignmentAttached Files:
  • ItemComputing a Digital SignatureWhat is a Digital Signature?

    There are two things that you have to prove when you are signing a document:

    1. Your identity
    2. The integrity of the document
    3. Let us see how we can achieve these two requirements in the digital world. The first thing we are going to do is to guarantee that a document is authentic. I think we have the process to ensure that a document has not changed in transmission or in storage. Hashing the document will produce a hash value that is unique to the document. Using SHA-1, when we hash a document, we’ll compute a 160-bit hash value. This is sometimes called a message digest.

      We now have a message or file, a hash value that can be used to prove the authenticity of the message or file. Now, what we are going to do is encrypt the hash value with the private key of the owner of the document. The document and the encrypted hashed value of the message or file are transmitted.

      The recipient receives the document and the encrypted hash value. Remember, WE ARE NOT WORRIED ABOUT CONFIDENTIALITY HERE. The first thing the recipient does is decrypt the ENCRYPTED HASH VALUE using the public key of the owner of the document. How would we know if the decryption is successful? The recipient computes the SHA-1 (Hash value) of the original message. If the decryption is successful, the computed has value and the decrypted value will be the same. If these values are not the same, there are two possibilities – the public key does not belong to the original sender or the message was changed

      We have just validated the identity of the sender and also the document was not changed

  • ItemTLS/SSLTLS/SSL

    Now I am going to explain how TLS/SSL works.

    The user connects to the secure web site by typing say https://www.chase.com (Links to an external site.).

    There are a TCP SYN exchange and then the CLIENT sends the CLIENT HELLO

    The client sends a client hello message with the protocol version, the client random, and a list of cipher suites.

    The SERVER returns its CIPHER SUITE (details about the security protocols it supports), ITS CERtifiCATE and A SERVER HELLO and a SERVERHELLODONE

    In reply to the client hello message, the server sends a message containing the server’s SSL certificate, the server’s chosen cipher suite, and the “server random,” another random string of bytes that’s generated by the server.

    The client verifies the server’s SSL certificate with the certificate authority that issued it. Remember each browser has a list of CA preinstalled. This confirms that the server is who it says it is, and that the client is interacting with the actual owner of the domain.

    The client sends one more random string of bytes, the “premaster secret.” The premaster secret is encrypted with the public key and can only be decrypted with the private key by the server. (The client gets the public key from the server’s SSL certificate.)

    The server decrypts the premaster secret using its private key

    Both client and server generate session keys from the client random, the server random, and the premaster secret. They should arrive at the same results.

    The client sends a “finished” message that is encrypted with a session key.

    The server sends a “finished” message encrypted with a session key.

    The handshake is completed and now messages can be sent using the session keys.

  • ItemQuantum TheoryQuantum Physics – Here is an interesting quote: “If you think you understand Quantum Physics, you do not understand Quantum Physics” – Richard Feynman – Noble Price Winner in Physics

    Quantum Physics describes the smallest particles in our universe – molecules, atoms and, protons, neutrons and so on. Well, you and everything around you are Quantum Physics.

    In typical computers, we transform data to 0 and 1. This is done using high voltage and low voltage. We then use a series of logic. Remember the AND, OR, NOT, XOR that we discussed earlier. Yes, with theses Logical gates, we can compute and solve complex problems.

    This is excellent however, as we discussed in the section on Complex problems, when we deal with exponential complex problems, traditional computing can become unsolvable because of the time it will take to solve them. Remember, the complexity of RSA – factoring a number into in primes.

    In quantum computing, the basic computational unit is a Qubit. Think of them as our classical bits – o and 1. Qubit are much more powerful than bits. Here is the big kicker – a qubit can be in both zero state and one state at the same time. States of a qubit is represented using “ket 0” and “ket 1” notation its written as |0> and |1> and the basic measured state is just like classical 0 and 1.

    A qubit can be an electron with spin, a photon with polarization, impurity spins, trapped ions, neutral atom, semiconducting circuits. The explanation of these terms is beyond the scope of tis course. You may want to read about them.

    This looks difficult but the main point that we need to keep in mind is that the single qubit at any time can be in a super position of |0> and |1> and “it can be expressed as where a and b are amplitude (proportional to probabilities) of qubit being measured to 0 and 1 respectively and a² + b² =1.” A qubit can be in super position of two states, and once it is measured it will return one of the two states based on the probabilities of each state. Measuring a qubit itself influences the system, measurement of a qubit is similar to a gate which affect the state of the qubit.

    Let’s try two states,  00, 01, 10, 11 but the qubits can be in super position of all for states at the same time. This should be represented as:

    a|00> + b|01> + c|10> + d|11>

    For two qubits, we need 4 probabilities/amplitude (a, b, c, d), if we have three qubits we will need 8. So if we have n qubits, we will need 2^n numbers to represent the overall state of that quantum system. With small increase in the number of qubits, we can create systems which can represent enormous states, and this is dissimilar to classical computers.

    Well, I know this is complex and unfamiliar to you, I am going to leave you with the basics. Now, let’s define Quantum Algorithm.

    Quantum algorithm is a step-by-step procedure, where each of the steps can be performed on a quantum computer and this will involve quantum properties like, superposition and entanglement.

    Two popular algorithms that have been developed already are SHOR’s and Grover’s algorithms.

    SHOR Algorithm – Shor’s algorithm for integer factorization is one of the most famous one because of its implication in cryptography. The details are beyond the scope of this course

    Grover’s algorithm is also well known and used for searching an unstructured database or an unordered list.

    IBM Q is an industry-first initiative to build commercially available universal quantum computers for business and science. IBM Q Experience allows us to run quantum algorithms either using online composer or using its python library for free. The number of qubits in these systems are relatively small but will increase rapidly for sure.

    https://www.ibm.com/quantum-computing/

  • ItemQuantum Videohttps://www.youtube.com/watch?v=u1XXjWr5frE
  • AssignmentFinal Exam – NOTE THE DEADLINEFor the final exam – you are  going to explain the differences between Symmetrical and Asymmetrical encryption in a 10 minutes video. Use your favorite Video Capture software (Screen-Cast-to-Matic) and create a 5-slide powerpoint.
    Rubric
    Correctness of content – 50%
    Presentation – 50%

Discussion

Discussion 4 – What is the role of NLP in text mining? Discuss the capabilities and limitations of NLP in the context of text mining.

Internet Exercise 7 – Go to kdnuggets.com. Explore the sections on applications as well as software. Find names of at least three additional packages for data mining and text mining.

Needs to be APA 7 formatted

APA Sources *

*Full PDF *

https://apastyle.apa.org/products/publication-manual-7th-edition-introduction.pdf?_ga=2.183019553.642115030.1600870599-379008561.1600870599

Sample Paper 

https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_sample_paper.html

*APA 6 vs APA 7 *

https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_changes_7th_edition.html