Strategic Plans

Describe how a strategic plan for information technology can differ across organizations. 

Provide a real-world example. 

  1. In your first paragraph describe how a strategic plan for information technology can differ across organizations. Use examples in your description.
  2. In your second paragraph, use the example in the posting and discuss how an information technology strategic plan for a global company may differ than for a national (US) company.
  3. In the third paragraph, provide a real-world example, based upon the examples used in the first post.

Compare Unions In Public Versus Private Organizations

Unions play a role in both private and public organizations in the United States.  During the country’s height in manufacturing, unions were predominant in many organizations such as steel mills, auto manufacturers, etc. The 1960s began to show a rise in union activity and membership in public organizations. It was noted that there were dissimilarities in collective bargaining between public-sector and private sector organizations.

Week 10 Assignment

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • 1. Who is likely to attack your site?
  • 2. When are attacks likely to occur?
  • 3. What sort of attacks might take place?
  • 4. How can you best minimize attacks and protect the integrity of your site?

Write you answer using a WORD DOCUMENT in about 300-350 words. Use your own words. Note your safe assign score. Score must be less than 15 to get full grade.

I need a essay on moodle, isims and their integration

I need a essay on moodle, this must include what is it, how it was started and a brutal critique on it. This should have the pros and cons of moodle.

This essay is also based on isims, this must include what is it, how it was started and a brutal critique on it. This should have the pros and cons of Isims.

The essay should include how these systems are integrated.

R

 

Assessment  002 R Analysis and Report (maximum 3000 words)

In this assignment you are going to simulate data from an area chosen by yourself. It can be cyber related, healthcare, industrial, financial/credit card fraud, commerce – anything. However, run your ideas past me first before diving in. If you recall from the dplyr tutorials we were able to simulate small amounts of data based on several dataframes. We then linked the data we required using join() commands, etc. We then obtained summaries of the data and could use ggplot2 to highlight trends, etc.  

  1. Carefully, choose your domain. Give a rationale for simulating it.
  2. Define your data frames, generate them using sample_n and/or other commands. There is a package called charlatan you may find useful for generating personal names and other values. About 4-5 dataframes will suffice.
  3. Think about seeding trends and patterns in your simulated data that you can “detect” later.
  4. Use dplyr to extract the columns you need from the dataframes.
  5. Use some sort of analysis such as summaries to get statistics on your data. Break it down by a category variable such as e.g. time, gender, fraudulent V normal, etc.
  6. In the write-up, I will expect to see an introduction section, methods, and then sections for Simulation of data and transforming data, Analysis of data; marks for plots should of course be in the Analysis section.

Part 1: Analysis of the Data (70 marks)

You will need to develop R code to support your analysis, use dplyr where possible to get the numeric answers. Regarding ggplot2, be careful as to what type of plot you use and how you use them as you have many records and want the charts to be readable. You should place the R code in an appendix at back of the report (it will not add to word count).  Section each piece of code with # comments and screenshots of outputs.

  • Simulation of data (20 marks)
  • Transforming data (10 marks)
  • Analysis of data and plots (20 marks)
  • Write-up of the data analysis (similar format of my R tutorials) (20 marks)

Part 2: Scale-up Report (30 marks)

The second part will involve writing a report. Now assuming your Part 1 was an initial study for your organisation, what are the issues when you scale it up and start using it in practice?

  • Discussion of Cyber security, big data issues, and GDPR issues (20 marks)
  • Structure of report, neatness, references. Applies to both Part 1 and Part 2 (10 marks)

Penalties: Do not go over word limit of 3,000 (other than ±10%) as loss of marks will occur according to the university guidance on penalties.

Output: Submit PDF electronic copy to Canvas before the deadline, along with a file containing your R code. The data should be generated from the R code, so do not submit any data.

Data Security Assignment

 Write an essay of at least 450 words discussing discussing IAM in a federated cloud application. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

Cyber security 4050

 I have one full course for cyber security. There are 16 weeks and have to do the discussion papers and response and final week. Please do placed your bid after reading the attachment.   

writing

Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

Use at least three sources.   Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Week Research Paper 3 – Info tech

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.