Opposing Shadow IT 2.0

Organizations do not always provide information systems that allow their staff to perform their responsibilities efficiently and effectively. Read the article, “Lifting the Veil Off Shadow IT.” Then, respond to the following:

  • Take a position favoring or opposing shadow IT.
  • If you are in favor, give one reason that shadow IT should be allowed. If you are not in favor, provide one way that the organization can reduce the risks of shadow IT.
    1000 words 

Decision Support system

 

1. Find examples of  an applications for each of the following: decision support systems (DSS), business intelligence (BI), and analytics. Summarize the applications in 300 words. Include a list of resources you used. (10 points) 

2. Identify the future of analytics in healthcare? What will it be used for and what are some expected outcomes. (300 words)

3. What role does and should IBM Watson play in healthcare? Are there significant findings that Watson assisted in obtaining?  (300 words)

 

How will artificial intelligence (AI) improve your business? What advise would you give managers and executives about using AI?  (300 words)

2. What are the major drivers of AI? Are there any impediments your organization needs to be aware of? Are there any reasons organizations should avoid using AI? (300 words)

3. Identify a voice recognition software and explain some of the applications. What type of processing is used for voice recognition? What are some of the issues still with voice recognition? (800 words).

The above assignments should be submitted in one-word document. Include an APA cover page and a reference page.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

AC – Discussion

 Discuss how Access Control takes into account human nature of their employees to protect the system. 

500 words

APA Format

Web Development, PHP and ASP Data Collection and Retrieval one page paragraph

 

  1. Identify the topic for this week.
  2. Find three high-quality sources of related information on the Internet. 
  3. Read your chosen high-quality sources of related information.
  4. state your three sources of information.
  5. DESCRIBE each of the three sources of information within a few sentences providing EXAMPLES.
  6. SUMMARIZE with three things about the topic that you want to remember forever.

Discussion : Global Wireless

We looked at networks in general; however, in this discussion we’re looking at wireless networks, mostly focusing on mobile networks.  Mobile networks in a global economy can be a challenge for multiple reasons.  First, governments in other countries control the mobile networks.  Second is the technology.  Mobile networks in other countries might not be as good as the mobile networks within the US.  As a global company, how can we deal with this?  With a big push for 5G, which has speeds well over 2Gbps, how does that change the way you do business?  What are some things you need to think about when it comes to doing business globally, using a wireless mobile network? 

note minimum of 250 words.  At least one scholarly source should be used 

SQL DATABASE SECURITY (CYBERSECURITY)

 For this week’s discussion, talk about why a database needs to be secured. In your initial post, answer at least two of the items in the bulleted list below:

  • Identify three actions that can be applied to a database environment to manage user access.
  • Is there such a thing as “overkill” with security? If so, how? (Provide an example)
  • Explain who should be in charge of making the security decisions for an organization’s database? Why?
  • Define and explain the difference between the authentication modes of at least two of the three database vendors mentioned in the chapter (SQL Server, MySQL, and Oracle).
  • Identify at least five best practices when adding and removing users.
  • Explain the principle of least privilege and how it should be applied within a database environment.

Discussion and Assignment

 

WEEK 7 – DISCUSSION

In no less than 250 words, describe the difference between a fat AP and a thin AP. What is needed to deploy a thin AP? Are there any security considerations to think about between the 2 different APs?

Week 7 – Discussion

Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email? If so, please share this experience. Explain what type of message it was and what you did to get rid of it.(250 words)

Week 7 Assignment

  • 7.1 What is the basic building block of an 802.11 WLAN?
  • 7.2 Define an extended service set.
  • 7.3 List and briefly define IEEE 802.11 services.
  • 7.4 Is a distribution system a wireless network?
  • 7.5 How is the concept of an association related to that of mobility?
  • 7.6 What security areas are addressed by IEEE 802.11i?
  • 7.7 Briefly describe the five IEEE 802.11i phases of operation.
  • 7.8 What is the difference between TKIP and CCMP?

Access control Assignment 8

Discuss the best practices for access control for information systems and how implemented by business.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

Querries

  

1. please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies (300 Word).

2. Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence?  Why or why not? (300 Word)

Health Informatics & Inform System – Assignment 6

Questions:

1.      Discuss the changes in home health devices over the past 10 years

2.       Research a mobile health app of your choice and discuss its potential impact on healthcare

3.       Discuss the pros and cons of using electronic communications between providers and patients

I expect 3 pages of fact-based material to answer these questions.

Paper should be APA formatted with citation.