Discussion

Operations Security

IT Policy Compliance and Compliance Technologies

Discuss tracking, monitoring, and reporting of various compliance systems and explain the relevance of such compliance systems. 

Virtuous Business Model

What would your story look like if someone asked you to present the relation of the analytical view to its paradigm.

Analyze your story from the perspective of the Virtual Business Model.

400 words with 3 references. 

Disaster recovery plan assignment

Students will create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future.  The plan will follow the template/example provided.

 Student should request prior authorization of company to be addressed to ensure that all students are working on unique companies.

**Even though this is a technical document, for academic purposes, all sources should be cited and referenced.

case study

 

Pinto – Case Study 14.1 (516-517) – New Jersey Kills Hudson River Tunnel Project

Note if you already did this case study in a prior course you can instead complete another journal article review instead (on an article that you haven’t done a review on previously – be sure to relate it to a topic from the course).

This assignment involves that the student read the case study and answer all questions at the end of the case study in a 4-5 page paper. Your answers must include substantial support from at least two (2) scholarly journal articles on project management. See below for advice on how to find these journal articles. Refer to the course schedule matrix for due dates for all case assignments. All case study assignments are due at 11:59 p.m. EST (Sunday) on the assigned week.

This course requires that the student is able to conduct weekly online library research by utilizing UC’s Library (online) in order to locate scholarly journals such that the student can successfully complete weekly papers regarding cases and/or articles in project management, and such that the student can engage in the weekly assignments.  The following is one example of how to navigate iLearn and the online Library in order to conduct research:

Log onto your course on iLearn

Go to the home page for this course

Click on the “Library Resources” icon in the left-hand column of this webpage, This will open the Library webpage.

Under the search boxes for the UC Mega Search click the box to the left of the phrase Scholarly (Peer Reviewed) Articles. Then click the Search box.

This will give you a Basic Search page. Under the Search boxes click Advanced Search.

The Advanced Search will appear with three (3) search boxes.

In the first box type “project management”

Change the “Select a Field (optional)” selection to “SO Journal Source/Title”.

In the second box type any of your search terms (“scope”, monitoring”, etc.)

Change the “Select a Field (optional)” to “TX All Text”.

You can either add an additional search term in the third box or hit the blue Search button.

This will bring up a large selection of potential articles based upon your search parameters. You can narrow down your search by using additional search terms.

 Every paper typed in this course should be in APA formatting (title page, reference page, NO abstract page, in-text citations, running head, page numbers, Times New Roman 12 font, 1 inch margins, double-spacing, etc…).  Points will be deducted for papers that are not typed in APA formatting.  Also, every paper in this course needs to be based on research from a scholarly source that is retrieved from UC’s Library.  Your weekly research papers should include two sources, the textbook and the scholarly case/article that you found.  Papers that are not based on a scholarly source(s) will receive a grade of “0.”   

Discussion

 
After reading chapter 3, analyze the history of Caesar Cypher and its impact on cryptography. You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. 

E Documents

This week, you will continue building the components of your business requirements document for Hollywood Organic Co-op. Last week you outlined how to electronically move data around in an EDMS. This week, you will further analyze Hollywood Organic Co-op’s workflow process as the e-documents move through the life cycle, with a focus on the disposition of the documents.

Create a 2- to 3-page list in which you:

Define the policies to apply to documents so that document-related controls are audited, documents are retained or disposed of properly, and content important to the organization is protected.

Describe how documents are converted as they transition from one stage to another during their life cycles.

Explain how e-documents are treated as corporate records that must be retained according to legal requirements and corporate guidelines.

Recommend tools that are required to support disposing of information assets.

Legal Reg, Compliance, Invest Discussion

One and half page is fine

Managing Risk

Your company has decided to implement a human resource demographic portal.  Under the system envisioned, employees would be able to use an online internal web page to change various personal information items themselves, such as, address phone, etc.  In addition, the employees would be able to change limited payroll related items, such as 401k deduction percentages or amounts, optional United Way contributions, and the number of federal and state exemptions to be claimed. Along with thie portal would be the ability to view, download, and print current and YTD pay information, including the current paycheck and check “stub”.  

Under the current system, employees must go to the HR office to make any changes – there is no online access.

Your company already requires direct deposit for all employees, and under the new system, pay stubs would no longer be printed.  Employees would be able to do this as needed through the portal.

 There are many potential risks associated with this project

  1. Your task is to Identify as many risks as you can (4 is a minimum, but feel free to identify more risks if you so desire).
  2. Determine the relative likelihood of each risk occurring (lowmedium high)
  3. Propose at least one strategy for addressing each risk, and describe the strategy in terms of the 4 risk responses (Avoidance, Transference, Mitigation, or Acceptance).

Remember that sometimes, risks are acceptable and can be taken, so long they are identified and a strategy to address the risk is presented.  For example, driving a car is a risky venture, but to address that risk we have driver’s education (mitigation), manufacturing safety standards (mitigation), insurance (transference), and staying at home (avoidance). Driving an older, unsafe vehicle by an unlicensed and uninsured motorist could be considered acceptance,

.

Turn in as much as needed. (Sometimes less is more, sometimes more is more; it’s your call.)

Support your strategies as needed with external references, and make sure your answer directly address the potential risks with the  human resource demographic portal.

Practical Connection Paper

 

Assignment 2 – Practical Connection Paper

Develop a paper describing how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share how you could leverage the knowledge gained working as an IT consultant working for an organization of your choice.

Requirements:  Provide a 500-word (2 or more pages double spaced not counting the title and reference pages) paper.  The paper should include a title page, body pages, and reference page.  An abstract and introduction is not required for this assignment.  Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited.

Please refer to the attached text books for the