Summary and Chart

 

Assignment Content

  1. Phoenix Fine Electronics would like you to brief them on your system recommendation.

    Create a chart in a Microsoft® program comparing how enterprise resource planning (ERP), customer relationship management (CRM), and business intelligence/decision support systems (BI/DSS) can help the business. Cite at least two sources within your chart. Compare the following information:

    • Elements of the system
    • How the system would support management
    • How the system would create a successful partnership between the business and IT
    • Write an executive summary of your recommendation for PFE’s C-level management. As a general guideline, executive summaries are typically 1 to 2 pages in length, at the 12-point font, and single-spaced. 

      Include the following in your summary:

    • An overview of the business needs and desired outcomes
    • The system comparison chart (from above)
    • Your system recommendation
    • The scope of the project
    • References

BI -Assignment week 6

Complete the following assignment in one MS word document:

Chapter 10 –discussion question #1-2 & exercise 1 & 7

Chapter 11- discussion question #1-4 & exercise 4

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

Recommendations and Global Considerations (Recent Twitter Hack)

This paper is on the Twitter hack that happened in July of this year.

Submit the Recommendations and Global Considerations portion of the final project. In this assignment, you will suggest relevant changes to the organization itself and changes to the ethical guidelines that could have prevented the incident. Standards external to the organization that may have helped prevent the incident should also be proposed. This assignment will also address international compliance standards and how they would have been relevant to the incident. The impact of the incident on global communication and commerce will be analyzed, as well as the impact on the global technology environment. 

Critical Elements (Headers):

For the below recommendation headers ensure to:

a) Propose relevant changes to the organization that may have prevented the incident. How would these changes have helped to prevent the occurrence?

b) Propose reasonable ethical guidelines that could have helped prevent the incident and that might help the organization preven tfuture incidents. Propose changes to the standards external to the organization that might have helped prevent the incident. This can include changes to regulations and regulatory and ethical standards that might exist today but did not exist or were not properly delivered at the time of theincident. Be sure to support your conclusion

Recommendations: Organizational Change

Recommendations: Ethical Guidelines

Recommendations: External Standards

For the below global consideration headers ensure to:

a) What international compliance standards (either at the time of the incident or today) would have been relevant to the incident, and how? If your company is not global, imagine that is.

b) Analyze the impact of the incident on global communication and commerce (again, if your organization is not global, imagine otherwise).In other words, what impact did (or would) the incident have on views and use of information technology and communication in global contexts?

c) Global Technology Environment: Based on your research and analysis of this case, determine the global legal and regulatory impacts this case had on the information technology overall. In other words, determine the relationship between this case and the global regulatory standards that are now in place, will be put in place shortly, or should be put in place as a result of this or related incident

Global Considerations: International Compliance

Global Considerations: Cultural Impacts

Global Considerations: Global Technology Environment

System Security Architecture

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (600 Words)

 

Consider the data flow “octopus,” as shown in Figure. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (600 Words)

If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?

Preview the document

Unit 5 Project Phase 5 (Chalk and Wire)

 

Unit 5 Project Downloadable InstructionsPreview the document

This final part of your project will utilize what you learned during  the previous phases of the project into a comprehensive paper describing  the entire project. 

A this point you should have completed the first four phases of your  project.  Now you must come up with a proposal in regards to delivering  these services to the 500 homes in your area.  Write up your findings  and your network recommendations along with the pricing you will use for  customers attaching to your network.  Split the cost up between  customers so that you can have a reasonable rate of return without  charging excessive rates for your services. 

Include this information while summarizing the previous project parts  in an APA formatted paper.  Make sure you do conduct some research as  well- you want to make sure you use  industry standard terms and  technology in your paper.