Final Paper

 

  1. The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 
    Start your paper with an introductory paragraph.
    Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 
    Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.
    Prompt 3 “Government and Policies” (1-2 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place..
    Conclude your paper with a detailed conclusion section. 
    The paper needs to be approximately six to eight pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

    Your paper should meet these requirements: 

    • Be approximately six to eight pages in length, not including the required cover page and reference page.
    • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion – Gaps

You should have gathered and read information from a number of sources related to your topic. State your topic and problem you are addressing in your dissertation. What trends are you seeing in the research related to your topic? What gap in evidence have you identified so far?  

 Topic :  The Smart Phone as a Dangerous Technology  

APA format with references needed. 

500 words

One year reflection paper

  1. What have you learned about yourself over the past year?
  2. What did you learn about working in teams over the past year?
  3. What skills and abilities have you learned over the past year that has improved your abilities to solve problems?

template to be followed attached.

Refer to DBA course structure to write points on past year learned skills. 

1) Include points on PBL

2) ADP experience

3) marketing strategies

4) identifying problems and solutions

5) testing scenarios

Help Help

 

In this assignment, we will address risk tolerance and planning for risk. Project managers are responsible for collaborating with teams to create mitigation and contingency plans for certain risks in a project proposal. This assignment explores the differences between risks that can be mitigated and those that need to have a contingency plan. Risks are constant in any projects you will be on; understanding how to manage them will be a key factor to your success in the role of project manager.

In your Risk Management Plan (RMP), include the following:

  1. Risk analysis: Develop and provide support for the acceptable level of risk that your project is willing to absorb.

  1. Risk identification: Identify the project team members and stakeholders that are involved in the decision process and why each decision maker is critical to the process.

  1. Probability of Risk: Review the RAID log created in Topic 4. Rank each risk in one of three rankings: high, medium, or low, for both impact to the project if the risk is realized and the probability of the risk being realized during the project. Using this information, create a probability matrix to depict the different levels of risk and fill it out during the final step of this assignment.

  1. Risk response planning: Create a contingency or mitigation plan depending upon the risk levels identified. Any risks ranked as “medium” or “high” that lack a risk management plan will require justification as to why no plan is needed.

Submit your assignment using the following format as one Word document for this assignment:

  1. RMP

  1. Embed or insert the updated RAID log for the project as an appendix to the RMP

Prepare this assignment according to the guidelines found in the APA Style Guide

See attach Rubric and Topic 4 document that would help complete the assignment 100%

Marketing Strategies

This is the first of three papers that will lead you to, and be part of, your final paper.Using the approved company and product/service, you will answer the following questions:    

  • Who are the competitors in this space? 
  • What are the overarching benefits they have to offer the consumer? What do they offer that is different or attractive to the consumer?
  • What gap will you fill by offering your redefined or new product or service?

Paper length should be 3 to 4 pages in length using APA formatting and should include a cover page and reference page which are not included in the page count. Writing Assignments are due on day seven at 11:59 pm EST. See this reference for more details on APA style.

Organizational Profile and Access Management Case

Analysis of Threats to the Organization IT system

case study: BENEFIT RECOVERY SPECIALISTS: 274,837 PATIENTS

A hacker obtained the credentials of a Benefit Recovery Specialists’ employee to gain access to the insurer’s systems and deploy malware, breaching the data of 274,837 patients from several providers and payers that use BRSI for billing and collections services.

On April 30, BRSI discovered a malware incident on some of its servers and took those systems offline to remove the malicious software. An investigation confirmed a hacker accessed the systems using stolen employee credentials, which allowed the threat actor to either access or acquire some customer files for 10 days between April 20 and April 30. 

The compromised data included personal information from both current and former members of certain providers or health plans that leverage BRSI and could included dates of birth, provider names, diagnosis codes, policy identification numbers, dates of service and or procedure codes.

Social Security numbers may have been affected for a small subset of patients. 

Problem 1- Planning project

Part 1
Your book talks about the “Scope Triangle” or the Iron Triangle. 
Question 1: Your book addresses six areas that are part of the iron triangle – 

  1. Describe each of the areas included in the iron triangle
  2. Of the six which areas do you feel are the most important and why? 

Question 2: You are managing a project and your sponsor has given the following constraints:

  1. The project must be completed in 2 months
  2. The project must include 7 core pieces of scope
  3. The project must stay within 1 million dollars

What concerns do you have with the three constraints above and how do you proceed?

Part 2

Scope Creep – Discuss ways in which scope creep occurred on projects with which you have been associated.  Was the project manager able to reverse scope creep? Is it possible to reverse scope creep and what is the impact? How do you identify scope creep?

Text

Title: Effective Project Management 

ISBN: 9781119562801 

Authors: Robert K. Wysocki 

Publisher: Wiley 

Publication Date: 2019-05-07 

Edition: 8th Edition