Discussion

Subject:  InfoTech Import in Strat Plan 

 

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

 At least one scholarly source should be used in the initial discussion thread. Use proper APA citations and references in your post. 

7

 Before an organization decides to purchase a SaaS application, they need to review the legal and regulatory concerns before entering into any agreement with a service provider. Addressing and understanding issues around data privacy, security, ownership, and business continuity can help to avoid unexpected problems in the future. For this week’s assignment, research and include four (4) issues or considerations that organizations need to evaluate before entering into any agreement. Discuss why the issue is important and include examples of what could happen if the issue was not properly addressed by the vendor. Your assignment should be 3 pages in length, with two or more references in APA Format cited in your response.

 

Ethuics and Cyberlaw and Security

  

Ethics, Law and Cybersecurity

Instructions:  There are two topic areas listed below that are designed to measure your knowledge level specific to learning outcome (LO 6) shown in your course syllabus.  Provide appropriate responses in essay form.  In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate.

Pay attention to what you are being asked to do . For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text.  Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. 

You should type your responses directly under the appropriate question.. Do well.

  1. Strong arguments can be given as      to why encryption tools are needed to safeguard communications in      cyberspace, yet these tools can be used by terrorists and criminals to      protect their communications in cyberspace. (a) In the wake of      September 11, can a case be made for not allowing ordinary users to employ      strong encryption tools in Internet communications? (b) Can we      still claim to live in a free society if plans for government interception      of email communications, as provided for in the Homeland Security Act (http://fl1.findlaw.com/news.findlaw.com/hdocs/docs/terrorism/hsa2002.pdf), are be      implemented?  Please elaborate (beyond a yes or no answer) and      provide your “theoretical” rationale in support of your responses. (comprehension)
  2. Is the expression “ethical hacker”      an oxymoron?  (a) Do you agree that some individuals should be      allowed to be “certified” as hackers to work on behalf of industry or for      the interest of other organizations?  (b) Do the kinds of      activities permitted by certified hackers in the CEH program raise any      moral issues?  Explain. Please elaborate (beyond a yes or no      answer) and provide your “theoretical” rationale in support of your      responses.

Grading Rubric for Quizzes

Grading criterion                                                                                          Unit Points           Total Points

Uploaded to correct Dropbox                                                                            2                            2

Submitted on time                                                                                            15                          15

Document Filename: 

Your Last Name,first and middle initial with correct quiz number                   5                            5

(Example only: Creider_RD_q1)

Rationally expressed opinions, experiences (personal or observed),                  8

arguments and premises (where appropriate) to support responses 

(did not simply restate/summarize author/textbook

Clearly presented classical ethics theories relative to topic                                8

Included ‘URL’ for appropriate verifiable current event                                 12                          28

(i.e., example of topic being discussed WITH EXPLANATION)

NOTE: Must be less than 4 years old

Grammatically correct and appropriate tone                                10

(professional, non offensive language)

Typographically correct                                                               10                     20

        

Included full citations as needed                                                    3

Used correct APA format                                                               7                     10

Addressed each item within selected topic area                           20                     20

        

Maximum grade                                                                         100                   100

NOTE: POINTS WILL BE DEDUCTED FROM TOTAL ASSIGNMENT GRADE IF EACH QUESTION YOU SELECTED IS NOT INCLUDED IMMEDIATELY BEFORE EACH ANSWER.

(PLEASE WRITE BOTH QUESTION PAPERS USING WORD DOCUMENTS AS INSTRUCTED USING THE GRADING RUBRIC.)

password standard

 

Write a password standard for CSI documenting your password recommendations.  Your paper should look like a real policy document and not an academic paper.

At the end of the standard, cite one reference for your recommendations.  Remember in this exercise that CSI appears to be challenging the old-school 8-character complex password rule.  If you wish to challenge that rule yourself, or reinforce that rule and continue to use it, you need to supply at least one reference, and more would make for a more effective argument.  Your citation does not need to be in any formal citation style.  Ensure that your citation is good enough to find the reference.

This must be an original work.  Do not rely on publicly available templates to fill in.  Because this is a concise and focused paper, some matching will be detected by the SafeAssign tool.  It is common for subject headers to match previous submissions. You may get a match score in the 30% range.  Don’t worry about that.  I’ll be looking for original work in the body of the paper.  Bottom line – you’re a creator, not an editor.

Read examples of password standards online.  Some organizations may call them password policies, which is confusing, but that ‘policy’ will focus on specifics on how to put a proper password together.  You also will find some authoritative recommendations from NIST (National Institute of Standards and Technology).  Happy Googling.

Perform a Vulnerability Assessment of your place of employment or living area. (Security)

Vulnerability Assessment

Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA.

Please refer the attached template document for preparing the assessment.

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. 

Capstone business intelligence

 EVERY Question should have at least 300 or more words for sure.

1)   You are a member of the Human Resource Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the system development team to create a communications plan for the project.  He would like to meet with you in two hours to review your thoughts on the KEY OBJECTIVES OF THE COMMUNICATIONS PLAN.  What should those objectives be?
 

2) Discuss the team dynamics for a highly effective or ineffective team of which you were a member. Can you explain why the team performed so well or so poorly?

3) From Chapter 12, page 379 WEB-BASED CASE STUDY, THE FUTURE OF LIFE INSTITUTE.  Read the case and answer all questions (20 points).
Elon-Musk donated $10 million to a foundation called the Future of Life Institute.  The institute published an open letter from an impressive array of AI experts who call for careful research into how humanity can reap the benefits of AI “while avoiding its pitfalls.”  Go online and find out about the institute’s initiatives.  What are its primary goals?  How can humans establish and maintain careful oversight of the work carried out by robots?  How valid are Elon Musk, Bill Gates, and Stephen Hawking’s concerns?  What ethical concerns should the public bear in mind as the technological revolution advances?
Sources:  Future of Life Institute.  http://futureoflife.org

4) QUESTION: How would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI?

5) QUESTION: Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.

6)  How can one distinguish between an organizational weakness and a threat to the organization?

Research paper – Organizational leader and decision making

 Note: Please make sure read the question properly and No plagiarism and No grammar mistakes and APA 7 format. 

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. 

References to write:

 Required Reading:

Optional Resources: Chapter 3 & 4 Journal articles

Protection of Private Information

Discuss the importance of protecting an individual’s private information. What protections are located within the Health Insurance Portability and Accountability Act? Family Educational Rights and Privacy Act? What rules are in place to protect consumers’ financial information? Be sure to include references and citations to support your findings.