innovation

Watch this video about Joseph Shumpeter’s concept of Creative Destruction https://www.youtube.com/watch?v=Ns_92Tdmkhc . For example, many think that the introduction of self-driving cars will disrupt the job market for drivers. 

Use at least three sources.Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace. 

Write 500 words in essay format not in bulleted, numbered or other list format. 

Physical securrity Discussion 6(500 words and references)

 10 threats choose 5:

  

a. Internal theft or diversion

b. Armed attack

c. Hostage incident

d. Burglary

e. Civil disturbance

f. Auto theft

g. Sabotage

h. Employee pilferage

i. Kidnapping

j. Robbery

he course textbook outlined the top ten security threats to an organization. For this assignment, write at least 500 words discussing the following:

  • Out of the ten threats list the five you think are most important
  • Describe and define each of these five threat areas as to their significance
  • Provide strategies you would have implemented to improve these areas to reduce risk and vulnerability

Assignment Requirements

Please provide and discuss the above

  • Each paragraph must have at least four complete sentences
  • You also need to respond to at least two (2) classmates’ posts (150-word each)
  • There should be no personal pronouns in your initial discussion post.
  • Your initial post is due by Wednesday before 1159pm
  • You should have a minimum of three credible in-text citations (Not at the end of your paragraphs)
  • All requirements must be met, and proper grammar, spelling, and punctuation must be correct.
  • Please also ensure you use the Discussion Board Header; you can find this template in the Getting Started folder.
  • No contractions should be used, or any conjunctions at the beginning of a sentence.
  • Failure to follow each instruction will negatively affect your grades.

Paper

 

Chapter 2 Paper: Discuss why the IT organizational structure is an important concept to understand.  Also, discuss the role of IT in the overall business strategy. (Information Technology and Organizational Learning Textbook)

The above submission should be one page in length and adhere to APA formatting standards.

Written Essay2

For this assignment, submit a 5-6 page paper that addresses the following questions as complete as possible.

  1. What is Information Security Governance?
  2. What are some of the common organizational roles involved in Security Governance?
  3. What documentation is associated with Security Governance?
  4. What are some of the policies use within the Information Security Governance process?
  5. What are some of the measures, metrics, and methods to ensure governance compliance?

Title page and References pages do not count towards the total.  No abstract or table of contents is required, but please observe all other aspects of the APA guidelines with regard to spacing, page number, margins, headings, fonts and reference citations

At least 4 valid references must be supplied.  Wikipedia and Techopedia are not allowed.

Data analytics

 Research on the difference between Data Analytics and Data Science and describe in your words. Find 15 or more analytics / data science related job titles and write one sentence about the primary job responsibility of each of them. The post should be 500 words or more 

week two discussion

 how business processes as services can improve efficiency. This discussion is about business process as a service and security.  

Instructions:

 Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. 

Assignment

  

1.[13]  The oral arguments before the Supreme Court concerning the Communications Decency Act (CDA) focused extensively on determining the most appropriate analogy for cyberspace.  Arguments were presented that compared the Internet to a library, to television, and to a public place such as a street corner or park.

(a)   Why are these comparisons important?  Briefly explain the differences between libraries, television, and public places with respect to First Amendment protection.

 (b)   For each of these three analogies (library, television, and public place), describe one significant way in which the Internet is similar and one significant way in which it is different.  Explain the relevance of each of these similarities and differences to the issue of regulation of the Internet.

2.[12]   Veterinarians implant computer chips into pets and farm animals to identify them if they get lost. Some people suggest doing so for children. Discuss the privacy implications of this proposal and answer the following questions:

a. What are the risks?

b. Do the benefits outweigh the risks? If yes, in what way? If not, why not?

c. Do parents have the right to have the chips implanted in their young children?  Why or why not?

                d. If there was a bill in Congress to require ID chips in children under the age of 5, would you support it? Why or why not?

3. [10] a. Two approaches to the problem of protecting personal information are (a) the free market view and (b) the consumer protection view.  How do these points of view differ on the issue of a company disclosing personal information about its customers?  How do they differ on the issue of errors in the data about an individual that is distributed by a credit bureau?

        b. Briefly describe what an “opt-in” policy is and an “opt-out” policy is. Let’s say you were filling out a survey for an online magazine.  Give an example of what you’d see that would distinguish an opt-in from an opt-out policy.

4. [15]  a. Briefly describe the difference between negative and positive rights (liberties and claim rights). Give an example of a negative right and a positive right.

     b. Explain the DMCA (Digital Millennium Copyright Act). What are its two main provisions? 

c. How are the Napster and Grokster copyright cases similar, and how are they different?

d. Explain the difference between deontological theories of ethics and utilitarian theories of ethics

Notes :   

Answer all questions in detail (At least 15 lines AND no more than 50 lines for each answer – including sub sections). Provide your justification based on earlier cases or other supporting material.  Structure and presentation of your answers will affect the points. (Cite your references in the body of the answers if needed)