Capstone business intelligence

 EVERY Question should have at least 300 or more words for sure.

1)   You are a member of the Human Resource Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the system development team to create a communications plan for the project.  He would like to meet with you in two hours to review your thoughts on the KEY OBJECTIVES OF THE COMMUNICATIONS PLAN.  What should those objectives be?
 

2) Discuss the team dynamics for a highly effective or ineffective team of which you were a member. Can you explain why the team performed so well or so poorly?

3) From Chapter 12, page 379 WEB-BASED CASE STUDY, THE FUTURE OF LIFE INSTITUTE.  Read the case and answer all questions (20 points).
Elon-Musk donated $10 million to a foundation called the Future of Life Institute.  The institute published an open letter from an impressive array of AI experts who call for careful research into how humanity can reap the benefits of AI “while avoiding its pitfalls.”  Go online and find out about the institute’s initiatives.  What are its primary goals?  How can humans establish and maintain careful oversight of the work carried out by robots?  How valid are Elon Musk, Bill Gates, and Stephen Hawking’s concerns?  What ethical concerns should the public bear in mind as the technological revolution advances?
Sources:  Future of Life Institute.  http://futureoflife.org

4) QUESTION: How would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI?

5) QUESTION: Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.

6)  How can one distinguish between an organizational weakness and a threat to the organization?

(IT and Organization Learning)

  • Review the section on the definitions of maturity stages and dimension variables in the CEO Technology Best Practices Arc.  Define each of the maturity stages and performance dimensions.  What are the key concepts from each section? 

Complete the assignment using narrative paragraphs and explain your thoughts and findings in detail. Adhere to APA format requirements and do not use lists or bullets. Use Times New Roman 12 font, double-spaced. Include a coversheet with your name, class ID and the title of the assignment. Your submission needs to be at least one page in length. The coversheet, figures, tables, and reference list doesn’t count toward the page count. Post the assignment as one MS Word document by the due date in the syllabus. Do not submit any other format such as PDF. Please provide and cite two references IAW APA.

analysis

 

Key Terms:

  • Building Rapport in Negotiation
  • Integrative Negotiation
  • Distributive Negotiation
  • Concessions in Relation to Negotiation

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format.

Discussion-8

 In the final discussion posting please describe what components of cryptography impacted you the most.

Clash of the Titan Methodologies!

  1. Select one of the three scenarios studied for assignment 7.1. 
  2. How would the situation and conclusions change if that scenario were approach from one of the two other methodological approaches than it was.

450 words with intext references and 3 main references

Business Intelligence – Discuss the difficulties in measuring the intelligence of machines.

Please complete Chapter 2 – discussion question #1 & exercises 4, 5, and 15 (limit to one page of analysis for question 15)

Discussion question 1 – Discuss the difficulties in measuring the intelligence of machines. 

Exercise 4 – In 2017, McKinsey & Company created a five-part video
titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed.
 

Exercise 5 – Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report. 

Exercise 15 – Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product. 

Assignment and Discussion

 

Week 9 – Discussion

In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability. 

 

Internet Research – Wk 9

For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

 

Week 9 Discussion – The Remote Worker

 In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network.  How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution?  Respond to two other learners by the end of the week. 

   

Week 9 Assignment

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

Discussion

 

There have been many books and opinion pieces writ-ten about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented?