Information Systems Business and Beyond

students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of at least 2 pages, double spaced of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. The assignment is worth 100 points. 

Requirements:

· Provide a minimum two (2) page, double spaced reflection paper. Include a coversheet with your name, title and class ID as a minimum.

· Use proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

· Coversheet, reference list, figures and tables don’t count toward the two (2) page count.

· Share a personal connection that identifies specific knowledge and theories from this course. 

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

· You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

ASN 4

The article focus on transformational leadership and knowledge and knowledge sharing within an organization, please answer the following questions:

  • How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  • How does servant leadership assist with transferring knowledge in an organization?
  • When thinking about data analytics, how does transformational leadership assist with building good data structures?

 

Please be sure that journal articles are peer-reviewed( Google scholar) 

The paper should meet the following requirements:

4 pages in length (not including title page or references)

APA guidelines must be followed.  The paper must include an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles(published within the last five years)

The writing should be clear and concise.  Headings should be used to transition thoughts. 

Intrusion detection and fire safety.

  

ISOL 634 – Physical Security

Final Exam

Due: June 25, 2020 200 pts.

This final exam will be a scenario similar to the midterm project, but with a focus on the concepts learned in the second half of the textbook, with a special focus on intrusion detection and fire safety.

Scenario: The location is a courthouse, a government building with offices, records, and rooms for criminal and civil law proceedings. This courthouse is a very large, two-story building with one main entrance and dozens of small, private entrances. All sorts of people use this building, including professionals, civilians, and a security force. For each of these three groups of people, consider what physical space they are using. 

The first type of physical space includes offices for processing records requests related to criminal and civil proceedings. There are file rooms for physical records as well as computer systems for electronic filing, storage, and processing. There are both public areas for citizens making requests and private areas for the civil servants working with private records.

The second type of physical space includes courtrooms of various sizes and private rooms for meeting and negotiating. These spaces also have public and private areas. 

The third type of physical space includes large public areas used for informal gathering or waiting, a cafeteria with coffee machines, and the public restrooms.

There are public hours of operation, like 8 a.m. to 5 p.m., but professionals might be in the building very early or stay very late, and there are on-sight security personnel always. 

Also in this building is a built-in security force that includes bailiffs and police charged with keeping the building secure. They have already established the building design, access control, surveillance, and lighting.

Part I:

Your assignment is to focus first on alarms and intrusion detection. Using especially chapter 23 from the textbook, choose where to use intrusion detection systems and which systems to use.

· Perimeter Protection—what types of intrusion detection systems would you use on doors and windows? Will you use different types based on the type of physical space? Explain and justify your choices.

· Area Protection—what types of intrusion detection will you use and where? Explain and justify your choices.

· The above alarms might be more for after-hours or for unpopulated areas. What about alarms for populated areas, like panic alarms? Explain and justify your choices.

· How will you use the security staff to monitor and respond to intrusion or duress?

· Besides the security staff, who will be responsible for turning on or off the sensors or using the alarms?

Part II:

Now, focus on fire prevention, detection, and response. Use especially chapter 22 from the textbook.

· Discuss the fire classification most likely for this type of physical space. 

· Where would you put fire alarms? What maintenance is required for fire detection alarms?

· Would you use sprinklers? If so, where and why? Where would you locate fire extinguishers? What kind would you use and why?

· Discuss the maintenance required for any systems used for fire safety, and using the fire safety inspection section as a guide, discuss special areas of concern for fire safety in this type of location.

Order # 12529

Title: Network Protocols

Paper type Essay

Paper format APA

Course level Undergraduate

Subject Area Other (Not listed)

# pages 1   ( or 300 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

For this assessment, create and describe the information flow of an OSI model.

To begin, select a generic work environment, such as any office that would use a phone system, to use as an example to describe how this is done.

Also, complete the practice labs provided in the Virtual Resource Portal activity for this assessment. Use these labs and the Internet to gather the information necessary to create your own analogy essay of the flow of information through the OSI model. Your analogy will include network protocols and compare these against the OSI model.

Then, complete the following:

1.Create an OSI model for a generic work environment. You can use Microsoft Word to do this.

2.Write a report that addresses the following, based on the OSI model you created. ◦Provide an explanation of at least three different network protocols used in the OSI model.

◦Explain the purpose and role of at least three of the network protocols you identify.

◦Describe the importance of the work performed by the network protocols you identify. This may include how well they do with network security. Examples include TCP/IP traffic and port security.

◦Apply the concepts from the practice lab activities for this assessment.

Additional Requirements

•Written communication: Written communication is free of errors that detract from the overall message.

•APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.

•Font and font size: Times New Roman, 12 point.

Course Assignment (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 At this stage of the course, you are fully aware that information security plays a critical role in the business continuity plan. Describe with examples, the various layers of security that are critical to your security plan policy.   

 Reading – Chapters 17, 18, and 19 of the following text: Wallace, M., & Webber, L. (2018). The disaster recovery handbook: a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. New York, NY: AMACOM. ISBN-13: 978-0814438763 

portfolio project (information governance)

  

Scenario:

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Requirements:

The paper should include at a minimum of the following sections:

a. Title page

b. Executive Summary (Abstract)

c. Body

i. Introduction (including industry discussion – 1-2 pages)

ii. Annotated Bibliography (2-3 pages)

iii. Literature review (2-3 pages)

iv. Program and technology recommendations, including:

1. Metrics

2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.

3. Regulatory, security, and privacy compliance expectations for your company

4. Email and social media strategy

5. Cloud Computing strategy

d. Conclusion

e. References

2. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.

3. Must cite at least 10 references and 5 must be from peer reviewed scholarly journals (accessible from the UC Library).

This paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 8 pages in length (double-spaced), excluding the title page and references.

Milestones:

· Week 3 – Introduction Section – A 1-2 page paper describing the industry chosen and potential resources to be used. 25 pts.

· Week 6 – Develop a full annotated bibliography (2-3 pages).  25 pts.

· Week 12 – Develop the literature review (2-3 pages). 25 pts.

· Week 15 – Completed final research paper (all milestones combined together and include the last sections as discussed in the list above). 50 pts.

Learning Culture Through Fables

 Find a fable from a culture other than your own  (No American fables or fairy tales). Post a link to the fable. Write a short summary of the fable that identifies the values taught by the fable. Write a couple of paragraphs that explain why you believe these values are being taught in this fable and why these values might be important to this culture.  

300-350 words

Upload Assignment: Homework 1

Download and Install the R Programming tool (Cran), Python, and MySQL for Excel software onto your PC. Verify successful installation by attaching ONLY the screenshots to display your completion of each software installation (3 total screenshots).

Also, please summarize in a short paragraph how the installation went for you. What problems, if any, did you have and how were they solved? What things went right for you during the installation?