Business process redesign

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

Course Reflection

  

Summative Discussion Board

Review and reflect on the knowledge that you have gained from this course. Based on your review and reflection, write at least 3 paragraphs that address the following:

  • How will you continue to grow your  skills in quantitative analysis?
  • How has this course changed your  perception of use of the quantitative method for dissertation research?
  • What approaches could have yielded  additional valuable information? 

The main post should include at least 1 reference to research sources, and all sources should be cited using APA format.

Topics Discussed in this Course

IBM SPSS tool 

Quantitative research

Categorical Variablke Analysis 

Survey Analaysis

Variable and types of variance

Measure of Central tendency and spread

Parametric and Non parametric tests

Chi Square Analysis and cross tabs 

Corelation and Regression Analysis and Effect Size

Linear Regression Analysis

Quantitative literature review

overall process of developing new software

Discussion: This week we discuss the overall process of developing new software.  Please also note the differences between software development and methods.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Course Assignment (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 At this stage of the course, you are fully aware that information security plays a critical role in the business continuity plan. Describe with examples, the various layers of security that are critical to your security plan policy.   

 Reading – Chapters 17, 18, and 19 of the following text: Wallace, M., & Webber, L. (2018). The disaster recovery handbook: a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. New York, NY: AMACOM. ISBN-13: 978-0814438763 

Term paper

please  read the instructions thoroughly.

My paper topic is:

Ethical Uses of Cryptology in Computers and Information Technology 

written assignment

 

Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

RM DISCUSSION-3

After reading this week’s article (Attached the Article Caste Study), and any other relevant research you locate, please discuss the following in your main post:.

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic

 

Discussion should be between 250-to-300 words.  And 2 Replies

Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO)

 Time: 36 hours 

Case Study and Lab work

Case Study 3.1

-Complete 3.4

Southwest Border Apprehensions and Unemployment 

Write a Summary Analysis of the problems and answers

Writing Requirements 

3-4 pages in length

APA formatting 

LAB 3

Chapter 4 

Problems 43 and 44 (Tableau table is optional , Create an excel chart in the line of the tableau chart

The Assignment must be an APA formatted paper with embedded excel files.

week 6

 In order to prevent common web-based attacks such as cross-site scripting (XSS), Cross-Site Request Forgery (CSRF), and SQL injections, organizations need the right tools to detect and prevent these issues before code goes to production. Both Dynamic Application Security Testing (DAST) and Static application security testing (SAST) tools are often integrated into an organization’s CI/CD pipeline to scan for vulnerabilities. For this week’s assignment, discuss the differences between DAST and SAST. Include any pros and cons for each type, how organizations can benefit, examples of what issues can be found, and any specific tools in your response. Your assignment should be 2-3 pages in length, with two or more references in APA Format cited in your response.