Operational Excellence

 APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used. All references should be from the years 2010 to present day.

1. Give two examples of technologies that have had a big effect on globalization. Use at least three unique references. Length: 4-5 paragraphs. 

2. What are some of the advantages of globalization? Use at least three unique references. Length: 4-5 paragraphs.

3. What is a code of ethics? What is one advantage and one disadvantage of a code of ethics? Use at least three unique references. Length: 4-5 paragraphs.

4. Give an example of how NORA could be used to identify an individual. Use at least three unique references. Length: 4-5 paragraphs.

Ghostware

It is essential to determine how unintended software is installed on user systems with only marginal adherence to policies. By understanding the process, a security professional can better ensure that only software built to acceptable standards is installed and maintained on systems under their purview.

Using an Internet search engine, identify three sources of unintended software that could be installed on a user’s machine.

In a 500- to 750-word essay, describe the type and risks of the executable programs and adware to the user. Explain why this is legal. Then, share your personal experience related to what happens when software has negative, unintended side effects from unanticipated installation. Who is to blame, the software developer or user? It might be perfectly okay legally when there is no malice aforethought, but how would you explain this when humans are considered as God’s image bearer? How would you relate it to human value and dignity?

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Need Response 2 to below discussion-IT cloud

Please read the below discussion and provide the response in 75 to 100 words for each discussion post

Post1#

 

The education industry has been selected for this discussion. The clouding technology trend is increasing in the modern world. Companies prefer the use of cloud computing technology for saving their data and services and all the work performed on a day to day basis. But, when we look forward to the use of this technology in the education industry, in higher educational institutions there are some risks and confusion associated with it. The decision making of technology is on the basis of three main factors. If technology is able to meet those requirements then it is good to use otherwise it requires some changes. The three main factors are data security, customization, and lastly financial ties. These are well explained below:

            Data security and control: the decision-makers hesitate with the use of cloud computing technology as the data security and control is provided to them via on-premises computer systems structure and server rooms. From these rooms, the decision-makers can save, edit, or delete the data very easily without the requirement of the extra efforts. When a service is provided by a third party then it is always considered as it can be breached and the staff can lose control over it. The person using technology has to share the access key as the same space would have used but the whole college staff and students are also allowed to save on it to make the data secure. Companies like Microsoft spend $1billion on data security. “Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent” (Chaudhary, 2018).

Customization: the customization of cloud computing technology is very difficult. The staff members are less prone to changes and thus feel happy to use old methods. The companies producing clouding technology have considered one and developed SaaS but everywhere demand is different depending upon the structure of the institution. The old traditional way of decision making is much cheaper and time-saving in comparison to cloud computing technology. “A systematic review of these heterogeneous contributions, which provide a coherent taxonomy, can be considered interesting for HEIs to identify opportunities to use CC in its own context” (Qasem, 2019).

Financials: the cloud computing is a cost-consuming technology that disturbs the financial structure of the company when they think fit. The main decision that institutes have to take is about deciding the use of information that is already saved in the servers. The institutes decide the usage of cloud technology when they suffer from the lack of storage of large amounts of data. The movement of such data is very difficult. There can be compatibility issues also which institutes might suffer from the service provider companies. “With these inclusions, the model is appropriate and relevant in explaining users’ adoption and usage behavior of social media” (Dumpit, 2017).

Post2#

 

The public cloud provides many advantages over on-site virtualization, including cost savings, fast deployments, increased efficiency, scalability and flexibility, or the ability to shift budgets from capital spending to operational spending. Every organization has its own reason to dump VMware to the cloud, but few can disagree. 
In terms of cloud, higher education is also a long way behind other sectors. But slowly but surely the tide turns, and further institutions move from the cloud to the cloud. Globally, organizations are also under financial pressure but little money is available to build new and established programs. Therefore, cloud computing is mostly an understanding framework for enabling new services without needing significant hardware , software and infrastructure investments.

It’s more the cloud hype and confusion that generated a certain amount of fear, ambiguity, and doubt and thus slowed progress. Some vendors also use interchangeably the words “hosted solution” and “SaaS,” contributing to misunderstanding between institutions. Moreover, not all suppliers have done great work to show to organizations that they are more capable of handling the service than they can. The concept of cloud and the advantages it can offer for organisations to move forward must be clarified clearly by providers.
While only a few factors prevent the adoption of on-demand model delivery for business applications , it is necessary for vendors to consider and build strategies for overcoming these factors:

Institutions are concerned about security and lack of control:
“Institutions have long been familiar with the on-premise delivery model for most applications, because it is the legacy of software and because of their need to have control over their data and information” (Johal, 2015).
The reasons for institutional respect for hosts or SaaS delivery models are most frequently stated. The greatest obstacle in implementing on-demand applications has therefore emerged to resolve corporate security issues. Vendors deliver solutions through protected data centres, often using numerous firewalls and backup procedures to guarantee that data and information are never lost. Many suppliers possess the ability to hire data protection specialists, although most institutions do not.

Institutions with unique needs may have concerns about flexibility:
The ability to adjust company applications on demand to suit individual institutional needs is still obvious. Institutions have specific processes and specifications that technology vendors must meet. As many of these criteria have already been addressed by some vendors, the performance today is primarily determined by the ability of a vendor to provide better quality and reliability at lower cost. That’s where SaaS joins. A request service can help an institution provide students and faculty with better experience and save time , money and energy.
“Some institutions may argue that it reduces the freedom and flexibility to customize the application to meet their specific needs. However, it would be wise for institutions to avoid customization because it is costly to maintain, and institutions hardly ever see a return on investment (ROI)” (Johal, 2015).

Large investments have already been made in on-premise delivery models:
On-demand offerings continue to be relatively new on the technology market , particularly among higher education vendors. Some vendors like Salesforce.com have a strong reputation and all types of software solutions have a SaaS option. But several institutions are also reluctant to adapt to on-demand models. In the past, early technology adopters have made substantial investments in its on-site data centers and IT infrastructure due to the lack of distribution options available.

Risk Assessment Paper

15 pages 

All of the main instructions are attached to the additional materials section. Just to make sure there is a Table of Content Executive Summary and Reference section along with citations in APA format. 

Discussion

Write at least 500 words analyzing a subject you find in this  article (https://www.911.gov/pdf/OEC_Fact_Sheet_Cyber_Risks_NG911.pdf) related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

Business Intelligence – End-of-Chapter questions

Chapter 3 – Discussion question #1, #2, #3, #4 &
                     Exercise #12

Chapter 4 – Discussion question #1, #2, #3, #4 & #5 &
                     Exercise #1

– Each answer must be at least 125 words

– 2 references apa format

– no plagiarism

week 6

 

This week’s journal article focuses on attribution theory and how it  influences the implementation of innovation technologies. Two types of  employee attributions are noted in the article (intentionality and  deceptive intentionality), please review these concepts and answer the  following questions:

Provide a high-level overview/ summary of the case study

Note how constructive intentionality impacts innovation implementations

Find another article that adds to the overall findings of the case  and note how attribution-based perspective enhances successful  innovation implementations. Please be explicit and detailed in answering  this question.

Be sure to use the UC Library for scholarly research. Google Scholar  is also a great source for research. Please be sure that journal  articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover  page, an introduction, a body with fully developed content, and a  conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to  transition thoughts. Don’t forget that the grade also includes the  quality of writing.

Internet Security

Write a fully developed paper in which you:

on Internet Security 

  1. Compose an executive summary highlighting the paper’s contents and reasoning for your chosen topic.
  2. Conduct a SWOT analysis by analyzing the strengths, weaknesses, application opportunities, and threats from competitors of the chosen topic.
  3. Evaluate the current ethical and legal concerns surrounding your topic.
  4. Select one ethical or legal concern surrounding your topic, take a position on the issue, and provide rationale.
  5. Analyze the improvements over the last two years to your communication technology topic, and suggest an improvement based on its current usage.
  6. Predict the future role of the communication technology you’ve selected for both personal and commercial use.
  7. Create a diagram that illustrates the communication structure of your chosen technology in Visio or its open source alternative software. Note:The graphically depicted solution is not included in the required page length.
  8. Use at least eight quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

3 page APA compliant paper, NO PLAGIARISM – Organ Leader & Decision Making

3 page APA compliant paper, NO PLAGIARISM – Organ Leader & Decision Making – A minimum of five peer-reviewed journal articles.

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.