QUANTITATIVE Journal Article

 You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research  piece.  I suggest choosing a topic that is at least in the same family  as your expected dissertation topic so that you can start viewing what  is out there.  There are no hard word counts or page requirements as  long as you cover the basic guidelines.  You must submit original work,  however,  and a paper that returns as a large percentage of copy/paste  to other sources will not be accepted.  (Safe Assign will be used to  track/monitor your submission for plagiarism. Submissions with a Safe  Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide  context for the research article.  What led the author(s) to write the  piece? What key concepts were explored? Were there weaknesses in prior  research that led the author to the current hypothesis or research  question?
  • Methodology:  Describe  how the data was gathered and analyzed.  What research questions or  hypotheses were the researcher trying to explore? What statistical  analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate  the article in terms of significance, research methods, readability and  the implications of the results.  Does the piece lead into further  study? Are there different methods you would have chosen based on what  you read? What are the strengths and weaknesses of the article in terms  of statistical analysis and application? (This is where a large part of  the rubric is covered.) 
  • References  

Problem Based Learning

 

The Context of the Problem

Large technology projects, whether the development of new technologies or upgrading current systems or software applications, can be costly. In larger organizations, a million-dollar (or more) project is not unusual. Once a project is rolled out to production, it is important to evaluate the performance of the project. This is generally a comparison of the anticipated benefits used in making the decision to move forward with the project versus the actual performance of the systems of software once in use. Various methods may be used to evaluate the performance; however, it is important to develop a broad set of standards for making an assessment of the systems or software.

The Problem

Your organization has made a very large investment in the purchase of infrastructure or development of an in-house software application. As examples, the network infrastructure has had a hardware refresh, business analysis data tools have been implemented, or a new customer resource management software tool has been implemented. Your team must assess the performance of the newly launched technology. You will be providing the various stakeholders (user community, project managers, and senior leadership) with the plan to be used for conducting the performance assessment, including the process of collecting performance data, analysis methods, and an explanation of the appropriateness of the methods to be used (the data may be concocted or gathered from a representative system).

As you work through the problem, be sure to focus on reaching these learning outcomes:

  1. Optimize organizational processes using data analysis.
  2. Assess the potential of various software to enhance organizational performance.
  3. Evaluate applications for the potential to improve collaboration, sharing, and lowering cost.
  4. Manage application development to lower cost and improve quality and customer satisfaction.
  5. Maximize the return on organizational technology investments.
  6. Develop application policies and procedures consistent with the Virtuous Business Model.
  7. Assess the challenges, technologies, and system approach issues in developing and deploying applications.

 

Instructions for Deliverable

 

Plan of Action

 Generate a Plan of Action for the team members to follow.

  1. Conduct a team member self-assessment of background experience and skills for the identified measures that will need to be observed.
  2. As a team, review each member’s responses to the self-assessment and determine best fits. If a lack of comprehension in a specific measure is identified, come to a consensus on the best team member to research the measurement attributes.
  3. Develop a team strategy for assigning measurement tasks.
  4. Make sure there is a team lead and that each team member understands their role in the project.

Assignment Question

This is a required assignment, worth 45 points, and must be submitted by the due date.
Review the Grading Rubric before completing this assignment.Research a scholarly paper or professional video on “Business Systems” and reflect on only one of the following:topics:

  • “Systems Perspective”: What is a System Perspective?
  • “System Types”: Describe a type of systems that exists in an Business.
  • “Enterprise System”: Identify a type of enterprise system.
  • “Data Driven System”: Describe a data-driven system.

NOTE:
You must copy and paste the topic (“Systems Perspective” or “System Types” or “Enterprise System” or “Data Driven System”) at the start of your paper to provide a context for your answer.
This paper must be between 250-300 words on what caught your eye and reflect on what you read. 
Do not add extraneous text that does not address the question – do not add an introduction or conclusion.
Do not copy and paste text from the referenced resource.You must provide at least one APA reference for your resource and corresponding in-text citations..
You must provide the referenced resource URL/DOI in the APA reference.
Do not use the Textbook as a referenced resource.

Paper

  1-You will first identify an organization, an important IT system or application used within the organization, and potential security risks and threats to the system.  

2-  Building upon the work in Part 1, you will now investigate technologies, policies or practices that will help mitigate the security threats and risks that were identified in part I project.

  

 Word document of your project. Submit only ONE FILE for part 1 and 2.

 (12-13 pages). Please use APA style. 

PowerPoint presentation of your project (5-6 pages). 

Homework

  

Louis V. Gerstner, Jr., former CEO and Chairman of the Board of IBM, stated, “Computers are magnificent tools for the realization of our dreams, but no machine can replace the human spark of spirit, compassion, love, and understanding” (Reynolds, 2019, p. 263).

A solid ethical framework is crucial for companies involved in the design and development of software and IT systems. At the very least, companies involved in these endeavors want to avoid poor sales and bad press from bugs or poor design. However, much more is at stake. Companies face potentially massive criminal and legal liability exposures if they make subpar or unethically designed products and services available to the public. Software bugs or poor design within computer systems can produce financially damaging occurrences and could lead to property destruction or even fatalities.

To complete this assignment, use the Internet or the Strayer library to locate an example of poor IT design or software errors that led to personal or corporate financial or property loss or to a fatal accident.

Write a 3–5 page paper that addresses the following items:

1. Identify and describe the software design flaw, glitch, or error. Summarize the resulting impact of the failure.

2. Determine if the failure was a result of poor quality or an ethical requirement deficiency. Provide recommendations that you feel would have prevented the failure.

3. Explain who, in your opinion, should be held accountable for the incident and why.

4. Identify the corrective actions that were put in place by the organization after the incident.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. The Strayer University Library has many excellent resources.

program

1>>

Give an example of a class and an example of an object. Describe what a class is, what an object is, and how they are related. Use your examples to illustrate the descriptions. (300 words)

2>>

Attached programming assignment

Discussion Response 300 words and 1 references.

Please review below post and provide a response to this: 

The HIPAA rules assist to protect the privacy and confidentiality of patients’ health care information while effectively preventing fraud as well as discriminating activities. It enables people to protect themselves as well as their privacy from unauthorized disclosure as well as misuse by third parties (Hordern, 2016). Compliance with these Regulations is important in that the confidentiality of PHI-personal health information, credit card information as well as other sensitive information such as lab results, social security numbers, medical history, etc. is covered.

     The violations of a HIPAA have serious implications, which cost agencies millions of dollars each year. Breaches frequently classified may arise from poor knowledge or insufficient training for employees to handle health confidential data (Swede et al., 2019). The employees occasionally misuse both paper documents and digital records for medical information that may be readily available to outside users and hackers. Outdated technology, as well as applications, could also contribute to data leakage as well as hacker vulnerability, since these breaches may contribute to millions of dollars in data leakages.

Potential Solutions

     To maintain compliance with HIPAA rules, an organization’s primary responsibility is to educate and train its personnel on the handling of sensitive information. Hard and soft copies of different documents must be securely protected as well as selectively accessed to specific personnel, who are trained in safe handling. Applications utilized to process and store data must be updated on a regular basis, as well as active anti-virus as well as anti-malware systems must be in place to prevent cybersecurity assaults on these mission-critical systems. The needs for patient permission with signature, as well as the restriction of an authorization to release data, are both essential for the safe management of data. Best practices for the disposal of documents must be developed to ensure the data may not be disposed of incorrectly.

     HIPAA safety standards require that health services use appropriate measures to guarantee the safety of health information to secure electronic health records (Swede et al., 2019). Electronic patient data with strong safe identification as well as access control must be secure. One of the measures will be to monitor the dark web to instantly detect breaches, install firewalls to protect the health organization, cloud computing, as well as secure a network of the organization.

Electronic health information includes a wide range of patient information as well as diagnostic data. Unauthorized access to electronic health records may be prevented using these methods. Identifying types of firewalls and encryption methods may provide the best and most effective privacy protection techniques.

References

Hordern, V. (2016). Data protection compliance in the age of digital health. European Journal of Health Law, 23(3), 248–264. https://doi.org/10.1163/15718093-12341393

Swede, M. J., PhD., Scovetta, V., PhD., & Eugene-Colin, M. (2019). Protecting patient data is the new scope of practice: A recommended cybersecurity curricula for healthcare students to prepare for this challenge. Journal of Allied Health, 48(2), 148-155.