Project Part 1

  

Purpose

This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a formal risk management plan for an organization.

Required Source Information and Tools

The following tools and resources that will be needed to complete this project:

  • Course textbook
  • Internet access for research

Deliverables

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provide critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

The project is structured as follows:

  

Project Part

Deliverable

 

Project   Part 1

Task   1: Risk Management Plan

Task   2: Risk Assessment Plan

Task   3: Risk Mitigation Plan 

Submission Requirements

All project submissions should follow this format:

  • Format:      Microsoft Word or compatible
  • Font:      Arial, 10-point, double-space
  • Citation      Style: Your school’s preferred style guide
  • Minimum 2      pages per task

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

Project Part 1

Project Part 1 Task 1: Risk Management Plan

For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, you must:

  1. Develop and      provide an introduction to the plan by explaining its purpose and      importance. 
  2. Create an outline      for the completed risk management plan. 
  3. Define the scope      and boundaries of the plan. 
  4. Research and      summarize compliance laws and regulations that pertain to the      organization. 
  5. Identify the key      roles and responsibilities of individuals and departments within the      organization as they pertain to risk management. 
  6. Develop a proposed      schedule for the risk management planning process.
  7. Create a professional      report detailing the information above as an initial draft of the risk      management plan. 

Write an initial draft of the risk management plan as detailed in the instructions above. Your plan should be made using a standard word processor format compatible with Microsoft Word. 

Evaluation Criteria and Rubrics

  • Did the student      demonstrate an understanding of the competencies covered in the course      thus far?
  • Did the student      include all important components of a risk management plan in the outline?
  • Did the student      demonstrate good research, reasoning, and decision-making skills in identifying      key components and compliance laws and regulations?
  • Did the student      create a professional, well-developed draft with proper grammar, spelling,      and punctuation?

  

  

Analyzing and visualization data – Research paper

Use the internet to research and find one example of a data visualization each for categorical data, time-series data, and spatial data. Discuss the data set and the following topics.

How effective is the visualization? Why?

What elements would you modify?

Does the example reveal the tool used ( PowerBI, R, Tableau, Qlikview….? What problem is the visualization addressing? 

Your research paper should be at least 2 pages (600 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

Discussion: Security Breach Evaluation

 

Learning Objectives and Outcomes

  • Analyze the given case study on security breach.
  • Recommend controls to avoid an enterprise security breach.

Assignment Requirements

Read the attached text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.

Transformational leadership and knowledge and knowledge sharing within an organization.

This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations? How does this impact data management within organizations? 

How does servant leadership assist with transferring knowledge in an organization? 

When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts

Signature Assignment

  • Assignment Requirements: Integration: One Piece of a Large Puzzle. 

Refer back to the Marseille Urban Planning Project article you read in the Week 1 Content folder within your course Documents and Resources. In this article, you can visually see how multiple departments came together using Esri’s CityEngine tool to create and implement an urban plan to restructure a city within a matter of months.

To complete this assignment, choose a large public works project, such as the construction of a new high school. For the public works project you can select any project – this could be a local project or a hypothetical situation (adding a city park, expanding a freeway, creating more housing, building a new commercial complex, adding a neighborhood school, building out a train system, etc.). 

Write a two page paper, using the newest APA formatting edition within a Microsoft Word Document, that identifies two phases that can be independent projects. Discuss each phase and discuss how each phase is an independent project and what makes them independent projects.  Specifically, state how each project meets the definition of a project, and describe the product, service, or result of each project, and why it is temporary.

“Artificial Intelligence for Cancer Detection”

 Topic : “Artificial Intelligence for Cancer Detection” •

 Types of essays – Explanatory – describes a contemporary issue: Example – Encryption & Foreign Travel 

– Analytical – evaluates a topic or issue, e.g., the pros and cons of encrypting the HDD on your laptop.

 – Argumentative – takes a position or makes a claim about a topic or issue and persuades the reader of the validity, e.g., all laptop HDDs should be encrypted. • 

Structure 

– Title Page (Name, Class Name & Number, Class Assignment, Title of Paper, Student Name & ID, Date) 

– Table of Contents 

– Opening paragraph – introduce the topic or issue to be covered. 

– Body – one or more paragraphs that cover the points to be made, discussing both the pro’s and con’s of both sides of the issue 

– Closing paragraph/Results – summarize the results, findings, or conclusions. Use critical thinking to develop new insights. Note, the conclusion is not just a regurgitation of the facts.

 – References (references due not count in length.

 **The Essay must address the following areas** 

1. A description of the technology being addressed 

2. Why this technology was chosen 

3. A brief history of the technology

4. Positive Impacts of the technology 

5. Negative Impacts of the Technology 

6. What is the Future of this Technology (where does it go from here)? 

7. References 

Student in the course will write an approximately 1000-word essay (4 ½ to 5 pages of written text not including front and back matter) addressing the impact of computing on individuals, organizations, and/or society in general. The topic selected for the essay must elaborate on how computer technology in general, or how a specific technology has affected lifestyles, the economy, the environment, politics, etc., and must be currently relevant.  

Project: One important Information technologies trend impacting you at your workspace.

Project: Information technologies trend impacting you at your workspace.

** Consider your own experiences in the challenging and changing world of technology. Then select one of the information technology or information system trends which have impacted you in the workplace. 

 *** Put together a Five to Six page summary explaining the trend. 

  ** Define the trend by locating at least three articles to support it, and then explain the trend as you experienced it in the workplace. 

  Feel free to utilize resources to further support your experience. 

** The advancement of technologies in business is changing the world of work. 

  Incorporating the new technology and software into the business environment to remain competitive continues to be a challenge for organizations. The impact of the advances has also had a profound impact on workers.

** NO TITLE PAGE. The main focus is the trend and your experience. 

  This is an original work and should not include any copy/paste from the Web. 

  Plagiarism, no matter the circumstance, will result in the failure of this assignment. 

  Ensure your citations are correct and that your work is original.

4-1 Discussion: Patents

After learning about the process an organization follows in obtaining a patent for an e-commerce business, answer the following question: How can internet patents be used to protect, or safeguard, numerous businesses practices on the internet? Explain using specific examples.

When responding to your peers’ posts, reflect on how patent infringement affects cyberspace and e-commerce. One area of focus could be the gray areas created by recent court rulings. 

Assignment #019

1. Describe the importance of databases and database management systems in managing organizational data and information
2. provide the types and some examples of database management systems
3. address the advantages and disadvantages of using a DBMS.

Fireboy and Watergirl: Online on the App Store

Fireboy and Watergirl are an exciting series of adventure games developed by Oslo Albet and Jan Villanueva. 

Fire, Water, Forest, Ice, Light, Wind, and Crystal, seven brand new temples for the official Fireboy and Watergirl series. 

In each temple the boy and girl must run and jump between fire and water, you should know that Fireboy is immune to fire, so he can step freely in pools of boiling lava, but he must be careful from stepping into the water. 

Watergirl is resistant to pools of water but gets hurt when stepping in the lava. 

Let us join with two main characters on the journey to remote, dangerous temples, to seek unimaginable wealth. 

The temple is full of sparkling diamonds waiting to be discovered only by the bravest. 

Solve the puzzles, beat the times, and collect all the diamonds! 

What are you waiting for? 

Update Fireboy and Watergirl full series.

Use the W-A-S-D keys to control the Watergirl.

Use the Arrow keys to control the Fireboy.