Discussion

 1. Explain why it is useful to describe group work in terms of the time/place framework.

2. Describe the kinds of support that groupware can pro-vide to decision makers. 

discussion 10/16

 discuss the challenges of writing the recovery plan from the perspective of your current or previous employer’s work environment.   

 400 words.

case study 6

Read The Case of Plant Relocation and complete the questions at the end of the case study.

https://www.scu.edu/ethics/focus-areas/business-ethics/resources/the-case-of-plant-relocation/

Kindly answer to the question at the end.

Pros and cons of each country and ethical challenges.

C programming – Basic

Develop a C (or C++) program that reads an unsigned number in some base and outputs the

equivalent value in BCD.

Your program must require a single command line argument, the name of an input file. This

input file will consist of any number of lines, each falling into one of three varieties:

1. Comment – These lines always start with an asterisk (‘*’) and should be completely

ignored.

2. Blank line – Used to visually organize the input file and should be completely ignored.

3. Data line – These are the ones your program will process and are described below.

Data lines will all have exactly two items separated by a single space character:

1. an input base (2 through 16) and

2. an input value in that base whose decimal equivalent will never be more than 6 digits

For each Data line from the input file, you must output:

1. the line number of the input file this data line is on (starting the file with line 1… same as

a text editor would show)

2. a colon followed by a space

3. the BCD equivalent of the input value , four bits at a time with one space between each

set of bits. Remember the decimal values will not exceed 6 digits, so the BCD value will

never exceed 24 bits, not including whitespace between 4-bit sets. NEVER print any

leading bit sets that contain only zeros…

a. eg, instead of 0000 0101 0000 1000, you would print 0101 0000 1000

b. only exception is if the value itself is zero, as in the example below

Example input file Expected output to console

* a first example

2 011000

8 70

7 0

11 3A

* This is long

10 123456

Results

2: 0010 0100

4: 0101 0110

5: 0000

6: 0100 0011

9: 0001 0010 0011 0100 0101 0110

Week 4 Research Paper: ERM Strategy

 The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion 2

For your initial post, consider the following scenario.

After internal security issues nearly ruined the business, an organization is looking to hire a new chief information officer (CIO) to institute a new governance design. In addition, the new CIO will need to decide whether to use an acceleration or containment strategy to address user computing.

For this interactive assignment, you will take on the role of a perspective candidate for the CIO position and propose to the executives of the organization a governance design that you would implement. In a separate document, create a diagram that depicts your governance design and attach it to the initial post. Within the initial post, explain the role of information systems governance in business and why the CIO role has become so important. Explain the strategy you would use as the CIO to support user computing (i.e., acceleration or containment) and provide a rationale for why you selected one over the other. In addition, explain the governance design you created and would implement as the CIO of the organization. Provide at least three implementation examples to support your design selection and user computing rationale

Your initial post should be a minimum of 300 words.

Research paper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

paper

 

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.