Check Attachment!!!
InfoTech Import in Strat Plan (ITS-831)
Research Paper: Final Portfolio Project
Word count: 5-8 pages in length, not including the required cover page and reference page
The final portfolio project is a three-part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one scholarly source per prompt, in addition to your textbook (which means you’ll have at least 4 scholarly sources cited).
Start your paper with an introductory paragraph.
Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing.
Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?
Prompt 3 “Green Computing” (1-2 pages): One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link.
Conclude your paper with a detailed conclusion section.
The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
Your paper should meet the following requirements:
Be approximately 5-8 pages in length, not including the required cover page and reference page.
Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Reading resources:
1. Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons
plagiarism check required, APA7 format, include References, within 8hrs
MIS Assignments
View the following video on Information Security Concepts in LinkedIn Learning:
Information security concepts
https://www.linkedin.com/learning/cisa-cert-prep-5-information-asset-protection-for-is-auditors?u=74653834 ( if you have LinkedIn account)
or using the video in this Google Drive link:
https://drive.google.com/file/d/1Nh-BtPM5lUolb–Iok5bcchDedOsxQs-/view?usp=sharing
Provide discussion answers to the following statements below. The answers should be presented in complete sentences and the sentences should be more than just one or two word answers. Be descriptive.
1. Explain the three IS Concepts in the AIC Triad.
2. Explain, in your own words, the following terms:
2a. vulnerability
2b. threat
2c. exposure
3. Explain the difference between privacy and security.
Information Systems for Business and Beyond Questions
Information Systems for Business and Beyond Questions:
- Chapter 5 – study questions 1-9, Exercise 1 & 3
Information Technology and Organizational Learning Assignment:
- Chapter 5 – Review the Roles of Line Management and Social Network and Information Technology sections. Note the various roles in the organization and note the similarities and differences within each role. Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization.
The above submission should be one-page in length and adhere to APA formatting standards.
**Remember the APA cover page and the references (if required) do not count towards the page length**
Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment. The paper requirements for the two-pages applies to the second part of the assignment directly related to the Information Technology and Organizational Learning assignment.
Malware Protection Procedure Guide
Requirements:
§ Format: Microsoft Word (or compatible)
§ Font: Times New Roman, size 12, double-space
§ Citation Style: APA
§ Length: 3 pages
Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.
After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:
“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”
Consider the following questions:
1. What does “malware free” mean?
2. How can a user demonstrate that their computer or device is malware free?
3. What are the steps necessary to establish a malware-free computer or device?
4. How should Always Fresh verify that a client computer or device is compliant?
Tasks
Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:
1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.
2. Describe the process of:
a. Ensuring anti-malware software and data is up to date. Mandate daily updates.
b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.
3. Provide steps to follow any time malware is detected.
a. Immediate reaction—what to do with current work, leave the computer on or turn it off
b. Who to contact
c. What information to collect
The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.
Discussion 8 – info tech strat plan
In the last week of class, we are going to complete a reflection activity.
This discussion topic is to be reflective and will be using your own words (500 words)and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the book.
Items to include in the initial thread:
- “Interesting Assignments” – What were some of the more interesting assignments to you?
- “Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings”
- “Perspective” – How has this course changed your perspective?
- “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others?
Organization leader and decision making – Discussion
Note : Please answer below 3 questions and APA 7 format
After completing the reading this week, we reflect on a few key concepts this week:
- Discuss what ethical leadership is and how it impacts the organizational culture.
- What are the various dimensions of ethical leadership?
- Note some failures in ethical leadership, please find an example, explain the failure and note possible solutions to fix the issue with leadership.
Please be sure to answer all the questions above in the initial post.Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Expand on the topic, by adding additional thoughtful information
- Answer a question posted by another student in detail
- Share an applicable personal experience
- Provide an outside source
- Make an argument
At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.
Required Reading
- Chapter 5 in the text
- LE BA PHONG, LEI HUI, & THAN THANH SON. (2018). How Leadership and Trust in Leaders Foster Employees’ Behavior toward Knowledge Sharing. Social Behavior & Personality: An International Journal, 46(5), 705–720. https://doi.org/10.2224/sbp.6711http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=pbh&AN=129468910&site=eds-live&custid=s8501869&groupid=main&profile=eds_new
- CHANHOO SONG, KWANGSEO RYAN PARK, & SEUNG-WAN KANG. (2015). Servant Leadership and Team Performance: The Mediating Role of Knowledge-Sharing Climate. Social Behavior & Personality: An International Journal, 43(10), 1749–1760. https://doi.org/10.2224/sbp.2015.43.10.1749http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=pbh&AN=111059573&site=eds-live&custid=s8501869&groupid=main&profile=eds_new
Optional Resources:Chapter 5 Journal articles
- Journal Article 5.1:Bormann, K.C. and Rowold, J. (2016) ‘Ethical leadership’s potential and boundaries in organizational change: a moderated mediation model of employee silence,’ German Journal of Human Resource Management, 30(3–4): 225–245.
- Journal Article 5.2:Haney, A.B., Pope, J. and Arden, Z. (2018) ‘Making it personal: developing sustainability leaders in business,’ Organization & Environment. DOI: 10.1177/1086026618806201
1 page
I would like you to find an elegantly designed chart and tell me in 4 sentences (one paragraph) why you think it is elegant.
The quiz should be submitted in one page of a word document.
The top part should be a the screen shot of the design.
The explanation should be below.
5s week 2 assignment BS
in 300 words
Learning About OWASP
Visit the OWASP website.
Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP.
See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.
Safe Assign is software that verifies the originality of your work against on-line sources and other students.
Include references, do not copy paste.