SyncSession Assignment!.

 

In order to maximize the time we have in the first syncSession please complete the following activities prior to the meeting time:

Reading Assignment:

  • Trochim/Donnelly: Ch 1-1d,1-1c,1-1f, and 3-2

Assignment:

A document titled “Evaluating Data Elements” is available to you in Document Sharing. This document provides a summary of a dissertation study conducted by an alumnus of UoF. Review the summary of the research and the adaptation of the survey instrument that was developed for the study.

For this SyncSession assignment, you will assess the data collection instrument. First, select one of the three research questions identified. Using the survey map provided, identify the data being collected to measure the variables identified for that research question. For each variable associated with the research question, summarize the information about the data being collected in the following table:

Construct Variable                 Variable                              Variable                     Data Type 

Example                                 Instructor Ranking              Dependent              Ordinal

Student Satisfaction    

       After summarizing this information, write a short assessment (3-4 pages) answering the following questions about validity and reliability:

  • Do the questions fit the variables being studied?
  • Do the options provide appropriate measures of the variables?
  • Can the options skew the responses?
  • Does the instrument accurately measure the variables?
  • Will the instrument yield the same results if used again under the same circumstances?

week 9 discussion NS

In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network.  How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution?  Respond to two other learners by the end of the week. 

Information Systems Business and Beyond

  • Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as times goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

Complete the assignment using narrative paragraphs and explain your thoughts and findings in detail. Adhere to APA format requirements and do not use lists or bullets. Use Times New Roman 12 font, double-spaced. Include a coversheet with your name, class ID and the title of the assignment. Your submission needs to be at least one pages in length. The coversheet, figures, tables, and reference list doesn’t count toward the page count. Post the assignment as one MS Word document by the due date in the syllabus. Do not submit any other format such as PDF. Please provide and cite two references IAW APA.

Discussion : 15 hours time limit

 

Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 10  (Jamsa, 2013).

Chapter 10 topics:

  • Define and describe business continuity.
  • Define and describe disaster recovery.
  • Discuss pros and cons of cloud-based backup operations.
  • Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks.
  • Create a DRP for a company with which you are familiar.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  The initial post is due by Wednesday at 11:59 pm ET.  You must engage on at least three separate days (by Wednesday for the first post and two additional days of peer engagement).  Do not wait until Sunday to engage with peers, this should be an active conversation with your peers.  When replying to peers be sure to engage with substantial posts that add to the conversation.  

paper

 

QUALITATIVE Journal Submit Article Reviews Here

You will review both quantitative and qualitative research. The topic is up to you as long as you choose a peer-reviewed, academic research piece. I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there. There are no hard word counts or page requirements as long as you cover the basic guidelines. You must submit original work, however, and a paper that returns as a large percentage of copy/paste to other sources will not be accepted. (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.)

Please use APA formatting and include the following information:

 

QUANTITATIVE Journal Article Review – SUBMIT HERE

You will review both quantitative and qualitative research. The topic is up to you as long as you choose a peer-reviewed, academic research piece. I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there. There are no hard word counts or page requirements as long as you cover the basic guidelines. You must submit original work, however, and a paper that returns as a large percentage of copy/paste to other sources will not be accepted. (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.)

Please use APA formatting and include the following information:

  • Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results: What were the major findings from the study? Were there any limitations?
  • Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
  • References
  • Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results: What were the major findings from the study? Were there any limitations?
  • Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
  • References

Case Project – N/W Sec Plan

Need 15-20 pages of work with Network Diagrams and detailed discussion on it, making recommendations, addressing and justifying recommendations for a specific case scenario

600 discussion on the organizational leadership (Description box has more info)

1. Organizational performance is the fifth aspect of the model, reflect on the question, do certain leadership behaviors improve and sustain performance at the individual, group, and organizational level?  Please explain your response.

2. There were two types of innovation addressed  (product and process innovation), please note your own personal definition of these concepts and offer an example of both.

Wk 5 – HIPAA Compliance Planning

4 Part Assignment
1.Write a 1- to 2-page high-level executive summary of the legal and regulatory compliance requirements for Health Coverage Associates executives. The summary should provide

2.Write a 1- to 2-page concise outline of the contents of the security management plan.
3.Compile a 1-to 2-page list of at least 10 of the CIS controls that provide key alignment with the administrative (policies), physical (secured facilities), and technical safeguards required under HIPAA to protect against the attacks listed above. Include corresponding NIST controls mapped to the selected CIS controls.   
4. Write a 1- to 2-page concise outline of the contents of the security management plan.
 

Assignment Content

  1. Your company is a security service contractor that consults with businesses in the U.S. that require assistance in complying with HIPAA. You advertise a proven track record in providing information program security management, information security governance programs, risk management programs, and regulatory and compliance recommendations. You identify vulnerabilities, threats, and risks for clients with the end goal of securing and protecting applications and systems within their organization.

    Your client is Health Coverage Associates, a health insurance exchange in California and a healthcare covered entity. The Patient Protection and Affordable Care Act (ACA) enables individuals and small businesses to purchase health insurance at federally subsidized rates. In the past 6 months, they have experienced:

    • A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client protected health information (PHI) that allowed access to PHI stored within the database
    • An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized to have access to the PHI
    • An unauthorized access to client accounts through cracking of weak passwords via the company’s website login
    • Health Coverage Associates would like you to develop a security management plan that would address the required safeguards to protect the confidentiality, integrity, and availability of sensitive data from the attacks listed above and protect their assets from the vulnerabilities that allowed the attacks to occur. 

      Write a 1- to 2-page high-level executive summary of the legal and regulatory compliance requirements for Health Coverage Associates executives. The summary should provide

    • Accurate information on the HIPAA requirements for securing PHI
    • FISMA and HIPAA requirements for a security plan
    • Scope of the work you will perform to meet the Health Coverage Associates’ requests
    • Compile a 1-to 2-page list of at least 10 of the CIS controls that provide key alignment with the administrative (policies), physical (secured facilities), and technical safeguards required under HIPAA to protect against the attacks listed above. Include corresponding NIST controls mapped to the selected CIS controls.

      Write a 1- to 2-page concise outline of the contents of the security management plan. Include

    • Policies Health Coverage Associates will need to manage, protect, and provide access to PHI
    • The recommended risk management framework Health Coverage Associates should adopt
    • Key elements Health Coverage Associates should include in its plan of actions and milestones
    • Cite all sources using APA guidelines.

      Submit your assignment.