Business Process Redesign

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Recovery Plan

This is an individual project Select a company below.1. using the attached template, prepare a Disaster Recovery Plan.  Instructions are on the first page of the  Disaster Recovery template.2. prepare a diagram of your disaster recovery solution.List of Companies:

  • Time Warner 
  • Aetna 
  • American Express
  • Nike
  • Macys
  • Toys R Us
  • Computershare
  • DirectTV 
  • UPS
  • Johnson & Johnson 
  • Fidelity Investments 

Post your disaster recovery plan and diagram of your disaster recovery solution in PDF’s in the Discussion Board.Grading – 25 Points broken down as follows:- 20 Points – Contents of Disaster Recovery Plan-   5 Points – Disaster Recovery Solution Diagram

Assignment and Discussion

 

Week 10 – Discussion

Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?

Writing Assignment – Wk 10

Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs. 

Week-10 Discussion

 In no less than 250 words, describe a hacking tool that is used to gain access to a network.  Explain how the tool is used, how it works and how a netwoprk administrator can prevent this tool from access the network 

 

Week 10 Assignment

  • 10.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?

implement a “prototype” database system application / ERD diagram for an eCommerce social-network system

 

The goal of the project is to implement a “prototype” database system application / ERD diagram for an eCommerce social-network system called UCOnline where users can explore information about books/music/software, rate your purchase, identify purchase price and see ratings of their friends.

 The project will require you to complete the assignment individually. Below you will find the ERD deliverable requirements. There are two parts to the assignment. You must create a diagram using a diagramming tool AND provide a written text-based document explaining your relationship mapping (systems analysis use case document). The assignment is worth 350 points. See rubric for grading scheme. 

BUSINESS REQUIREMENTS ACROSS ALL ASSIGNMENTS

You will work with book/music/media information, user information, ratings of books, and users’ social network

  • Each book has an id, title, publication date, publisher, ISBN, functional category, page count, price (publisher), and product description
  • There are 3 categories of book: fiction, non-fiction, and specialty
  • There are 2 categories of music: digital and media-based
  • An author can write one or more books.
  • A musician can be a solo artist, part of a group, or both
  • An author can also be associated with one or more publishers.
  • A musician/group/act can be associated with one or more music houses
  • An author’s book can have one or more editions.
  • A song and or album can have more than one version/edition (i.e. EP, LP, CD, DVD etc)
  • A publisher can have many authors and many books.
  • A record company can have many artists associated and many albums associated with it. 
  • A record company can also be the publishing company (i.e. self-publishing)
  • Many ISBNs can also be associated with a given publisher but only one ISBN per form of medium (ie the ISBN is the PK no matter what).
  • An author can write many books.
  • An artist can write many songs, albums etc.

UCOnline needs to keep track of user ratings for each item sold in the online store (e.g., 1-5 and 1 for ‘Dislike’, to 5, for ‘Awesome!’).

A particular user rates a particular item at a given time.

A user CANNOT rate the same multiple times unless there are multiple editions of the item. Each edition can be rated separately.

Each user who submits a rating will be identified by a unique id and has a name, gender, age, and location. Nothing is anonymous.

There is also a social network between users. Users can send communication requests (i.e. instant messages/emails) to other users. Such requests can be accepted or ignored. Once accepted, the two users are considered ‘book buddies.’ If ignored, the user can send the request again. We want to add a store when the requests were sent (timestamp), the result of the requests and when the request was answered (timestamp).

discussion-10

 

discuss the scope of a cloud computing audit for your business.

 Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Portfolio Project

 

This week select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence. 

In this paper, perform the following activities:

  • Name the organization and briefly describe what good or service they sell and where they operate.
  • Note how they are a differentiator in the market.
  • Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).
  • Explain what actions the company took to achieve operational excellence.

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work. 

Discussion Week 1 Strat plan

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

Please make your initial post should have 500 words and the post will do at least TWO of the following:

  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Web Technologies, Use of Social Media in Business

Overview:

Congratulations! You have been hired as the IT manager at the local hospital; the job

you applied for in the previous unit. Part of your 60-90-day plan is preparing a presentation for the executive board.

Instructions:

Your IT director asked you to prepare a 5-6-page PowerPoint presentation where you

explain the following concepts:

1) The functionality of various web technologies: HTML, XML, XHTML, CSS, etc.

And how they could be used to improve the Hospital’s website?

2) Your hospital is currently ranked as second in your region, how can better use of

social media as part of the hospital’s web strategies improve its position?

3) Part of the low-ranking came from a breach on the hospital’s website.

a. How can we remediate this from happening again?

b. Why are we not safe and immune from online annoyances such as spam and adware?

c. How can we further secure our system from malware?

Requirements:

• This assignment is a PowerPoint presentation consisting of 5-6 slides, using APA

formatting and citations.

• Include two references.

Be sure to read the criteria by which your work will be evaluated before you write

and again after you write.