Business Intelligence

 

 Decision modeling with spreadsheets is regarded as clearly the most popular end-user modeling tool. Explain vividly why this is so, i.e., why a spreadsheet is so conducive to the development of Decision Support Systems (DSS). In your discussion, please include what a spreadsheet is, what a spreadsheet add-in means, and how can a spreadsheet add-ins help in DSS creation and use?

Additionally, post some examples or find a related topic on the Internet and comment on it in the discussion post.

Reference: Sharda, R., Delen, Dursun, and Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support. 11th Edition. By PEARSON Education. Inc. ISBN-13: 978-0-13-519201-6

Discussions and research paper: InfoTech In A Global Economy (ITS-832-51) and Enterprise Risk Management – ITS835

Discussion 1:

subject name: InfoTech In A Global Economy (ITS-832-51)

Chapter 7 – A Comparative Analysis of Tools  and Technologies for Policy Making

word count: 300+

Text book: Janssen, M., Wimmer, M. A., & Deljoo, A. (Eds.). (2015). Policy practice and digital science:  Integrating complex systems, social simulation and public administration in policy research (Vol. 10). Springer. (Included through library subscription) 

Things to be included in the discussion:

Address the four sections below. Your contributions should be in your own words; quote very sparingly.

1. CHAPTER SUMMARY: Summarize chapter presented during the week. Identify the main point (as in “What’s your point?”), thesis, or conclusion of the key ideas presented in the chapter.

2. SUPPORT: Do research outside of the book and demonstrate that you have in a very obvious way. This refers to research beyond the material presented in the textbook. Show something you have discovered from your own research. Be sure this is obvious and adds value beyond what is contained in the chapter itself. 

3. EVALUATION: Apply the concepts from the appropriate chapter. Hint: Be sure to use specific terms and models directly from the textbook in analyzing the material presented and include the page in the citation.

4. SOURCES: Include citations with your sources. Use APA style citations and references. 

————————-

Discussion2: 

subject name: Enterprise Risk Management – ITS835

word count:300+

Chapters 26 through 29 presented four mini-case studies on ERM and risk. Each one presented a slightly different risk scenario. Starting with chapter 29, assume that you have been asked to advise the Akawini management team on how they should promote and monitor the transformation of risk management in their business.

To complete this assignment, you must do the following:

As indicated above, assume that you have been asked to advise the Akawini (chapter 29) management team on how they should promote and monitor the transformation of risk management in their business. What performance measures would you recommend that use so that they can monitor progress and performance? Choose one other of the chapters from this week and recommend ERM measures that the organization should implement as well to monitor risks outlined in that chapter. 

Textbook(s) Required:

Fraser, J., Simkins, B., & Narvaez, K. (2014). Implementing enterprise risk management: Case studies and best practices. John Wiley & Sons

———————————

Assignment 3: Individual research paper: Annotated Bibliography – ERM

subject name: Enterprise Risk Management – ITS835

No.of pages: 4

Your paper will be an annotated bibliography, explicitly focusing on implementing Enterprise Risk

Management (ERM). Choose a “theme” (i.e., ERM in Healthcare, Financial sector, Technology, higher

education, manufacturing., etc.) and make sure that all your resource relates to your theme.

Your paper must be in correct APA format, and will need to include at least seven (7) resources, ALL of

which must:

1) Be current. Published within the last five years.

2) Be peer-reviewed.

I expect you to use your own words and follow the APA and use citations and references.

Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations

are to be evaluative and critical. Give enough information for the reader to decide if the selection is

interesting enough to read the paper, and also how you perceive the paper. Don’t go skimpy on these

annotations, but DO NOT write too much here. Quality is far more valuable than quantity. This exercise is

for each of you to demonstrate that you can identify, categorize, and digest multiple research papers.

Every resource you choose must be peer-reviewed. That means the paper must have undergone a formal

peer review before being published in a journal or presented at a conference. You must ensure that your

resources have undergone rigorous reviews. In most cases, you can find out the review process for a

conference or journal by visiting the appropriate web site. Do not merely assume that a resource is peerreviewed – check it out. I expect about three pages (Around half page for each article)

Here are a few URLs with additional information: (I strongly suggest that you look at these. Really.)

https://owl.english.purdue.edu/owl/resource/614/03/ (Please see the Sample APA Annotation)

https://sites.umuc.edu/library/libhow/bibliography_apa.cfm

https://www.bethel.edu/library/research/apa-annobib-sixth.pdf

http://libguides.enc.edu/writing_basics/annotatedbib/apa <<<< Check out the "Rules! rules! rules!"

section

http://guides.library.cornell.edu/annotatedbibliography

Textbook(s) Required:

Fraser, J., Simkins, B., & Narvaez, K. (2014). Implementing enterprise risk management: Case studies and best practices. John Wiley & Sons

———————–

Additional details for all the above discussions & assignments:

Student should complete all required portions of the discussion assignment. Assignment strongly demonstrates graduate-level proficiency in organization, grammar, and style Assignment is well written, and ideas are well developed and explained. Demonstrates strong writing skills. Student paid close attention to spelling and punctuation. Sentences and paragraphs are grammatically correct. Proper use of APA formatting. Properly and explicitly cited outside resources. Reference list matches citations and Plagiarism check required. 

===================================================

please provide the 3 assignments in separate documents

Leadership and Management

Based on Week-3’s journal articles that focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

1) How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 

2) When thinking about data analytics, how does transformational leadership assist with building good data structures?

The submission should meet the following requirements:

  •  Minimum of 2 pages in length (not including title page or references)
  • 1 inch margin throughout
  • Single spaced
  • Maximum of 3 to 4 bullet points
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A referenced to a minimum of 3 peer-reviewed journal articles (not blogs and Wikipedia)
  • The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Note: This written assignment is a REQUIRED ASSIGNMENT it is worth one-hundred (100) points.  You are   required to answer the questions as stated in the assignment question in order to obtain credit for the assignment by the due date.  If you do not complete the assignment by the due date, you will receive a zero (0) for this assignment.  Your work will be compared to other’s work for plagiarism, so please note that copying other people’s responses will not be tolerated.

Group project work

Please can someone help me to write my own part of these project. I highlighted my names with red color to identify my own part of the question.

Week 6

 

In this assignment, you will learn more about management methodology by interviewing a CIO or other IT leader and writing an article. Be sure to arrange for the interview and prepare your questions in advance so you are able to write your article. 

Interview a CIO or IT leader.

Write 8 to 10 questions to ask about improving organizational culture; organizational maturity; the IT team; and relationship development between the IT team and other areas of the organization, including finance, marketing, and operations.

Write a 1.5-page article that could be published in a trade magazine summarizing your interview and what you learned.

Discussion: Multilayer User Access Control

 

Learning Objectives and Outcomes

  • Identify what implementation method(s) can be used to incorporate multilayer access control
  • Describe and how each method benefits multilayered access control.

Assignment Requirements

Read the worksheet named “Multilayer User Access Control” and address the following:

Using what you have learned about building a multilayer access control system, identify what implementation method(s) can be used and how each method benefits multilayered access control.

Data Analyzation and Visualization

 

Complete the “Forensic Designs Assessments” Exercise located at the following link:

Data Representation

(1). FORENSIC DESIGN ASSESSMENTS

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the data representation choices:

  1. Start by identifying all the charts and their types
  2. How suitable do you think the chart type choice(s) are to display the data? If they are not, what do you think they should have been?
  3. Are the marks and, especially, the attributes appropriately assigned and accurately portrayed?
  4. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  5. Are there any data values/statistics presented in table/raw form that maybe could have benefited from a more visual representation?

Network Security Week

 

Final Project

The project must be a Word document that is 4-5 pages (double-spaced) on a cybersecurity topic of your choice.  I will run it through SafeAssign and Turnitin so make sure it is your own work.  If I get any assignments that have a 25% similarity rate or higher, it will get a zero.  Write your own work!!

labor market

Discuss in 500 words your opinion on  what you think of the disruptive capacity of the gig economy on the labor market. Include at least 3 quotes enclosed in quotation marks and cited in-line by reference to a list at the end.