Enterprise risk management

The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

OR_Assignment_3

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

   A minimum of five peer-reviewed journal articles.

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

Imoprtance of strategic IT planning 4

Research Paper: Blockchain

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

  • Be approximately 3 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Cryptography-Milestone2

In the second milestone writing assignment, you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page. 

Security governance

 

Security governance must be enforced at all levels of an organization. But many still do not understand quite what security governance is, what is its main objective, and how it should be integrated within existing structures in an organization.

In your own words briefly state (a) what  governance is from a security perspective, (b) it’s main objective, and (c) how should it be integrated into an organization. Please state your answer in 2 page paper in APA format.  Include citations and sources in APA style.

object oriented programming java

 

Simulate the functioning of a network interface. An interface has a MAC address (a String). Computers (threads) send ethernet frames to the network interface input which is a waiting queue. Computers send frames every 1 second. Each frame contains a message and a destination address.

The network interface controller (thread) gets the frame from the queue and checks if the destination address is the same with the network card address. If they are they are different the packet is dropped. If they are the same the controller displays on the screen “Frame with message was accepted. Every 5 seconds the controller outputs on the screen statistics : how many frames were accepted, how many were dropped.

In main test the program with 100 computers, each sending 10 frames and a network interface card. Solve the concurrent access to shared resources using objects lock, wait and notify.

WS&F

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 3 – Prepare a two-page paper (double-spaced) that describes the device or system you will investigate and the intended tool you plan to use to conduct your forensics investigation. The interim paper should be in the form of an Executive Summary. Be sure to provide references in APA format. 

Blockchain IT Assignment

 Please read “R3: Putting the ‘Fin’ Back into Fintech” case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1.How does Fintech compare to regular banking? 

2. Discuss R3 and its distributed ledger technology mission.

3. What are some of the applications of cords and strategies of growing and expanding?

4. What are some of the emerging markets that Fintech has impacted?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page. Click the assignment link to compare your work to the rubric before submitting it. Click the same link to submit your assignment.

IT Project Management Topic

 

Instructions

For this assignment, your group will write an issue paper on a project management topic. The paper has to be APA style, 4-6 pages long, including references.

The paper will provide an intellectual treatment of a Project Management-relevant topic. Specific paper topics will be decided in consultation. Therefore, check with me early to discuss your ideas.

I will provide feedback on one intermediate version of the group project if the group so desires. My assessment and feedback of these versions do not count towards your grade.

My topic is the issues with the Project Management Triad of Scope, Cost, and Time and how it is no longer adequate. Explain what the PM triad is and how it is used in 3 pages. Use one page to briefly explain the issues including issues with the quality of deliverables, issues with customer service, and how it ignores end-user adoption.