ITM Capstone

 You are a member of the Human Resource Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the system development team to create a communications plan for the project.  He would like to meet with you in two hours to review your thoughts on the KEY OBJECTIVES OF THE COMMUNICATIONS PLAN.  What should those objectives be? 

Access control Assignment 8

Discuss the best practices for access control for information systems and how implemented by business.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

Organizational Leadership and Decision Making 6

Discussions

1. Review chapter 21 in the course text. In your own words, discuss the future of information delivery.

2. What are some of the information you learned in this class? What topics did you find challenging?

Case Study

1. Read the Project Management at Genex Fuels Case Study on pages 333 to 335 in the textbook. Answer the Discussion Questions at the end of the Case Study.

References must be provided individually at the end of every question.

Case Study- Assignment

Please go through the Attachment for the case study and provide a 2-3 page report, analyze the case between the FBI and Apple. There is a lot of information on this so you will need to review what you have learned so far in this course as well as perform external research. Here are several links as a starting point:

· https://en.wikipedia.org/wiki/FBI%E2%80%93Apple_encryption_dispute

· https://en.wikipedia.org/wiki/2015_San_Bernardino_attack 

· https://www.nytimes.com/2016/02/18/technology/apple-timothy-cook-fbi-san-bernardino.html

· https://mashable.com/2016/02/19/apple-fbi-san-bernadino-iphone/

· https://www.digitaltrends.com/mobile/apple-encryption-court-order-news/

Your report should address the following sections: 

1. Imaging an i0S device – Provide a refresher on how you would handle the imaging of the device and prevent a potential third party from accessing the device (e.g. via Apple iCloud) in order to frustrate your efforts. 

2. Accessing a Locked iOS Device – After you have done your research on the case and the challenges the FBI faced please summarize the methods and challenges used in this regard. 

3. Challenges of an Encrypted iOS Device – You have learned that Apple does a very good job with its encryption. Can you review your notes as well as the research about this case then summarize known barriers when trying to access encrypted data? 

4. Other Methods of Access – Let’s assume you are unable to unlock the access. Are there other methods that you could consider gaining valuable forensic evidence? Do you know what attempts the FEBI tried in this case study? How reliable are these methods and are they admissible in court? 

5. Final recommendations – Now that you have researched and analyzed this case, think of how you would have approached this case if you were attempting to unlock the iPhone. Include a step-by-step plan that you would have employed to access the data. Support your plan with academic research that points to its viability. You do not need to test your solution, nor does it need to necessarily be correct as there’s no way to know for sure. However, it must be logical, well-reasoned, and supported by evidence. 

casestudy_0613

 
Answer this question: Are today’s ClOs responsible for figuring out how to handle the total digitization of their enterprises? What is their strength in directing this endeavor?  

study material pdf attached 

Please refer the word document and do the work in the same format 4 pages

week 2 Discussion -1 Business intelligence

Create a discussion thread (with your name) and answer the following question:

Discussion 1 (Chapter 3):

Check out this website called The 25 Best Data Visualizations of 2019. Select one data visualization example that appeals to you the most. Using your own words, answer the following questions:

  • Why do you think it was identified as one of the 25 best?
  • How many dimensions of information were captured?
  • Do you find the data useful?
  • What do you like most about it?
  • What do you like least?

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations

Website Link:

https://visme.co/blog/best-data-visualizations/

APT

In 80 words or more discuss and give an real life example of an Advanced Persistent Threat (APT) event.

HIPAA Training Presentation

Assignment Content

Background: You have been asked to present information to hospital staff on the structure of the law within federal agencies in healthcare in the U.S. Additionally, you will need to define terms associated with Health IT.

Create a 10- to 12-slide multimedia-rich PowerPoint® presentation with speaker notes that is designed to train hospital staff on the appropriate measures associated with HIPAA compliance in the hospital setting. Include the following in your presentation:

  • An overview of HIPAA and the purpose of the training
  • Health IT definitions, including, but not limited to, the following:
  • Business associate
  • Covered entity
  • Privacy
  • Security
  • Protected health information
  • The types and responsibilities of healthcare providers as described in HIPAA
  • Employee responsibilities outlined in HIPAA
  • Penalties associated with breach and/or violation of HIPAA
  • What to do in the event of a suspected breach

Submit your presentation.

f-paper

 The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (1-2 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately 5-8 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles from the UC library to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Dissertation summary

Question 1)  Locate a dissertation on any topic by searching the ProQuest library database. Read the literature review section. Provide a one paragraph summary of the literature review.  

Question 2)  

Students will create a draft topic approval to submit to the course professor for review and feedback before submitting the request to your academic departments during Week 3.

For this assignment provide:
1. Proposed Topic: 100 – 150 words 2. A scholarly source that supports the need for the research.3. Why are you passionate about this topic of research (200 words)