Organization leader and decision making – Discussion

Note : Please answer below 3 questions and APA 7 format 

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss what ethical leadership is and how it impacts the organizational culture.
  2. What are the various dimensions of ethical leadership?
  3. Note some failures in ethical leadership, please find an example, explain the failure and note possible solutions to fix the issue with leadership.

Please be sure to answer all the questions above in the initial post.Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations. 

 Required Reading

Optional Resources:Chapter 5 Journal articles

Dissertation Topic Proposal

The attached document is my dissertation topic, please make the required changes to the document to met the following feedback.

Feedback:

 

This is an interesting topic, but I am not sure what you are trying to accomplish in this research. Are you saying biometric authentication has not been implemented to mitigate social engineering and you want to implement one?

You stated, “The purpose of implementing biometric authentication is that it can aid in reducing password vulnerability, secure log process in the system, and enhance conveniences like quick log in using fingerprint and reduce desk help cost which comes with a call for passwords.”

You also stated, “The research will also tent to protect the availability, confidentiality, and integrity of enterprise valuable assets. The implementation of biometric authentication will ensure confidentiality, authentication of data, data entity authentication, and availability. Biometric authentication should be oriented to the internet to analyze the security gap for any given generic application in the system.”

 Are you planning to create an implementation project with biometrics to measure increase protection? If so, how will you implement? How will you measure? Provide clarifying information for the department and resubmit 

Please review and clarify what the goal of this study is. 

Questions

Information Systems for Business and Beyond Questions:

  • Chapter 9 – study questions 1-10, Exercise 3 &4. 

Information Technology and Organizational Learning Assignment:

  • Chapter 7 – Review the section on dealing with multiple locations and outsourcing.  Review figure 7.2 and note how virtual team communications further reiterates the importance of this model.

Homework

Culture is an ongoing negotiation of learned patterns of beliefs, attitudes, values, and behaviors.

List some of your personal, social, and cultural identities.  Are there any of these that are interrelated?  In what way? For your cultural identities, which ones are dominant and which ones are nondominant? How does a person navigate between two cultural identities? 

How does your personal, social, and cultural identities impact you as a communicator and as a listener?

Java Assignment

Look at the file for complete instructions. You are basically making 3 java programs to get an intended outcome. Each program has instructions. 

Python

Explain the pycache, include, lib and scripts folders in Python Programming(When creating projects)

5

 

Instructions 

Please watch this video: https://youtu.be/ctij93rBmsM which is an hour long video on anti-forensics.

Instructions

Now that you have watched the video – please complete this assignment. 

1. What did you learn?
2. Did you learn anything that surprised you such as “I didn’t know I could use this technique to try to hide data?!”
3. Please list at least four different ways that a bad actor may try to obfuscate their tracks.
4. Once you have identified four different ways that a bad actor may try to evade scrutiny, please identify how you might be able to uncover those techniques.

5s week 11 assignment PL

In 500 words

Video Link: https://time.com/5168202/russia-troll-internet-research-agency/

Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Include References, do not copy paste strictly.

POST 400 WORDS NEED TOMORROW BEFORE 2PM EST

This is a juxtaposition discussion question. Choose a side. If you choose the green side, find resources support your response (remember to explore YouTube).  You must also argue against the RED side. If you choose the red side, find sources to help support your position…but you also argue against the GREEN side.  This is a complicated topic this week, so be sure to be thorough in your exploration of all the many facets. 

wk 13 fn

What future developments will we see for blockchain applications? Provide at least 2-3 examples.