MIS Assignments

 1) What are your overall impressions?
2) Describe what is meant by ERP systems.
3) Describe how the video relates to specific topics in the textbook.
4) Do you agree with what Dr. Word is proposing?
5) Could a possible minor in MIS be of benefit in your career?

Here is the video (copy and paste into your browser):

https://uhdmediasite.uhd.edu/Mediasite/Play/70bd29f9d1d14c0ca444cfa9c6bb36581d 

MAKE SURE there is no more than 25% plagiarism 

week-9

  

Week 10 (Final Paper Outline including at least ten references from the Annotated Bibliography — week 8 assignment)

Project Outline
 

This is Part III of 4 towards the Final Project.
 

Using APA format, create an outline (headers and 1-2 sentence description of content) for your paper. Make sure you pull info as your citations’ plan from your annotated bibliography. Submit an attachment to this assignment. 

Cloud Computing

 

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.

  • Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
  • Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements: The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 3 – 5 pages in length. The Title and Reference pages do not count towards the page count requirements.

Cloud Computing Research paper

  

Perform a search in Google or in the school’s online library database for four or five companies that have been victims of cloud-related security breaches AND/OR cloud providers that have been victims of security breaches.

Required:

Minimum 2500 words— (not including Title page, Abstract, TOC, and Reference page). Each group participant is required to write at least 500 words and to label which section below written about. Review items II through VI and each member chooses a topic to write about.

Include:

I. Company Name—Ancestry.com

type of company—

brief history—

Industry— 

Customers (consumer, business, or both)

II. Type of threat 

III. What or (who) caused the threat 

IV. How the threat was discovered

V. How the threat was resolved 

VI. Explain what and how you would have implemented to have prevented the intrusion. Use third person: eg. One may argue; It may be concluded.

VII. Known repercussions from the threat (monetary, reputation, brand, customer loss, etc).

Include:

· Title page with names of all group members

· Abstract

· Introduction

· Body

· Conclusion

· Reference page

· Minimum 8 references—DO NOT USE Wikipedia!

· USE APA 7.All in-text citations must be represented on the Reference page

· All papers will be checked for plagiarism in SafeAssign—ONLY SafeAssign at or below 20% will be accepted

5s week 10 assignment PL

Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, eliminates their jobs in a process called ‘ Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contractor under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship between BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Include references, do not copy paste. Use your own words.

want a case study asap

Do a case analysis of any one of the cases presented in Chapter 5 in the textbook (Chapple et. al.), pages 105 to 107. Make certain that your report covers all the major elements of the case. You should indicate clearly which case you have analyzed, the Private Sector, the Public Sector or the Critical Infrastructure.

Make sure to follow APA style. Please make sure your submission is 2 – 3 pages in length and meet the minimum APA formatting guidelines:

•    12-pt, Times New Roman font
•    Double-spaced
•    1” margins on all sides
•    Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.
•    Paraphrasing of content – Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally.
•    Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines. If you need guidance or a refresher on this, please visit: https://owl.english.purdue.edu/owl/resource/560/10/ (link is external) Be sure to include at least three reference sources.
•    In-text citations – If you need additional guidance, please visit: https://owl.english.purdue.edu/owl/resource/560/02/ (link is external)

Please read question in comment section

500 Words  

Related Diversification. Related Diversification is the most popular distinction between the different types of diversification and is made with regard to how close the field of diversification is to the field of the existing business activities. Related Diversification occurs when a company adds to or expands its existing line of production or markets. 

For this assignment, consider your own company or one that you know well. Assume your company opted to pursue a strategy of related diversification and respond to the following questions. 

  • What industries or product categories could if diversify into that would allow      it to achieve economies of scale?
  • Identify at least two or three such industries or product categories?
  • Describe the specific kinds of cost savings that might accrue from entry into each?
  • Incorporate our coursework (Thompson text and other material) from this week into your      above responses.

Your analysis should be 500 words or less.

Incorporate a minimum of at least one course (Thompson text) and one non-course scholarly/peer reviewed source in your paper.

All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, be double-spaced, and proper in-text citations using APA guidelines.

Need Plagiarism report.

Assignment

Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved.

Use your own words and do not copy  the work of another student.

In WORD document 

Youtube link:  https://www.youtube.com/watch?v=aeekxpX3YTU 

500 words 2 references

 

A tenet of telecommunications says the more people who acess a network, the more valuable the network becomes.  This is called Metcalfe’s Law.  Chapter nine examines different types of users on networks as it reviews an individuals need for access & how those needs can lead to risks.

1. How can the use of security policies reduce risk?

2.  How can a SAP reduce risk?  

3. Why are end-users considered the “weakest” link in regards to implementing security policies and controls?