Research paper and discussion

 Part 1: Research paper(7-10 pages).

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. 

This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives. In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction – What is an ERM?
  • Why Should an Organization Implement an ERM Application?
  • What are some Key Challenges and Solutions to Implementing an ERM?
  • What is Important for an Effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework/application.
  • Conclusion – Final thoughts/future research/recommendation

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism

Part 2: Discussion (500 words) & 2 responses

The article on IRB this week discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the University’s institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article.  

Please answer the following questions in your main post:

  • What are the main issues that the article addresses?
  • What is the Common Rule?
  • How is this issue related to information systems and digital privacy?

Misleading Graphs

 1 page

For this discussion, you are to choose one graph, and complete these steps based on the graph you chose:

Steps

  • State the graph you chose.
  • Discuss how you interpreted the graph when you first saw it.
    • What did it tell you about the data represented?
    • Did you find it confusing?
  • Now, study the graph. Use your understanding of the topics Graphs, Pie Charts, and Bar Charts to interpret what is being presented.
  • Compare your first impression with your second more informed interpretation and answer the following:
    • Is the information presented in a biased way (that is, is it misleading?)
    • What information is being misinterpreted here? How?
    • What type of graph was used and was it used correctly?
    • How could you correct the graph so that it more accurately represents the data?
  • Discuss why someone might intentionally use a graph to mislead?

transformational leadership

 

This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

  1. How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  2. How does servant leadership assist with transferring knowledge in an organization?
  3. When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Discussion

Answer the following questions:

1) Explain the use of a Flasher Box

2) Why would the investigator be considered with EEPROM?

3) Explain the important points in evaluating dates and times on a device?

Your response to the DQ must be a minimum of 400 words. You must provide references for your response (APA format). You will need to reply to two (2) other fellow student’s posts (See the syllabus). The

Data management paper

This needed within 8 hours. It a computer assignment with lots of queries and tables. Only experienced writer needed to do this within 7 hours.

Support and Software Deployment

Please respond to the following:

  • Your software has gone live and is in the production environment. The project gets handed over to the IT support team. Research support after software deployment. What are some of the challenges that can happen?

2nd Paper Operational Excellence

Prepare a Paper that describes the assigned company.  –   Intel

  Intel

a. Technological advances of the organization that makes the product or service viable. (2 pages)

i. What technology advances are key to this company?

ii. What is the physical layout of the company’s facilities? Does this impact their use of technology?

Total 2 Pages and 2 slides of ppt 

Due with in 12 hours

Discuss Malware

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. What is malware? 
    1. Discuss at least five types, describing each.
    2. Discuss what they are and what they do.
    3. Discuss a notable instance of each type
  2. What impact can malware have on an organization
  3. How can an organization reduce risks associated with malware?  (Hint: talk about appropriate types of policies, procedures, and the use of technology)
  4. What is software piracy or license violations?
    1. What can an organization do to avoid it?
    2. What are the potential consequences of it?
    3. What relationship does it have with malware?

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

Strategic IT Exam

 

Question 1 of 20 5.0 Points
Viruses that attach themselves to files with certain extensions, such as .doc or .exe., are __________ viruses.
 

A. boot sector
B. file infector
C. file destroyer
D. file command
 

Question 2 of 20 5.0 Points
According to the CSI/FBI Cyber Crime Survey, __________ of organizations conduct routine and ongoing security audits.
A. 25 percent or less
B. 50 percent
C. 75 percent
D. nearly 90 percent
 

Question 3 of 20 5.0 Points
 __________ invented the movable-type printing press that accelerated  the amount and kind of information that was available to populations.
A. Johann Gutenberg
B. Phil Zimmerman
C. William (Bill) Gates
D. Tim Burners-Lee
 

Question 4 of 20 5.0 Points
Which of the following is NOT an example of a computer crime as listed in the textbook?
A. Data diddling
B. Salami slicing
C. Piggybacking
D. Cold calling
 

Question 5 of 20 5.0 Points
One common way to gain access to a password-protected system is to use a __________ approach.
A. back-door
B. “sneak peek”
C. brute-force
D. social engineering
 

Question 6 of 20 5.0 Points
Persons who plant viruses are called:
A. computer hackers.
B. cyberterrorists.
C. vandals.
D. predators.
 

Question 7 of 20 5.0 Points
A mechanism using a digital signature to prove that a message did, in fact, originate from the claimed sender is called:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. integrity.
 

Question 8 of 20 5.0 Points
The global reach of computer networks has raised concerns over:
A. copyrights.
B. privacy.
C. security.
D. All of the above
 

Question 9 of 20 5.0 Points
 __________ is a type of software for securing information systems by  allowing only specific users access to specific computers, applications,  or data.
A. Access control software
B. Computer security software
C. Application restriction software
D. Data protection software
 

Question 10 of 20 5.0 Points
encryption software allows users to ensure:
A. authentication.
B. privacy/confidentiality.
C. nonrepudiation.
D. All of the above
 

Question 11 of 20 5.0 Points
The slang term for stolen software is:
A. hackerware.
B. warez.
C. vaporware.
D. discountware.
 

Question 12 of 20 5.0 Points
__________ are the least used security technology.
A. Passwords
B. Biometrics
C. Encrypted files
D. Firewalls
 

Question 13 of 20 5.0 Points
The Computer Fraud and Abuse Act of 1986 prohibited:
A. stealing or compromising data about national defense and foreign relations.
B. breaking into any electronic communications service.
C. monitoring voice communications.
D. stealing trade secrets.
 

Question 14 of 20 5.0 Points
 A(n) __________ is an ongoing planning process involving risk  assessment, risk reduction planning, and plan implementation as well as  ongoing monitoring.
A. information systems security plan
B. disaster recovery plan
C. infrastructure management
D. risk assessment plan
 

Question 15 of 20 5.0 Points
Crimes committed against telephone company computers are an example of:
A. phreaking.
B. spoofing.
C. social engineering.
D. data diddling.
 

Question 16 of 20 5.0 Points
ECPA is an acronym that refers to the:
A. Electronic Controls Privacy Act.
B. Electronic Communications Privacy Act.
C. E-Commerce Customer Protection Association.
D. Electric Computer Protection Agency.
 

Question 17 of 20 5.0 Points
To execute denial of service attacks, intruders often use __________ computers.
A. zombie
B. monster
C. robot
D. android
 

Question 18 of 20 5.0 Points
Examples of the ethical conundrum include all EXCEPT:
A. using computer time at work to read personal e-mail.
B. organizations compiling personal information about shopping habits.
C. the government regulating computer crimes.
D. using technology to rearrange photographs.
 

Question 19 of 20 5.0 Points
Futurist author Alvin Toffler describes three “waves of change.” The third, and biggest, wave of change to occur is the:
A. Information Age.
B. Industrial Revolution.
C. Agriculture and Handwork Age.
D. Modern Age.
 

Question 20 of 20 5.0 Points
 Some spam e-mail includes __________, which are attempts to trick  financial account and credit card holders into giving away their  authorization information.
A. freaking
B. tricking
C. phishing
D. luring