Category: Information Systems

3 Essay Questions

  

1. If you were going to start a new technology business, which of 

the emerging trends do you think would be the biggest 

opportunity? Do some original research to estimate the market 

size. 

2. What privacy concerns could be raised by collaborative 

technologies such as Waze?

3. Write up an example of how 10T might provide a business with 

a competitive advantage.

300 to 350 words each

need references for each answer under the answer

no plagiarism

DBM/380: Database Concepts

  

Assignment Content

  1.    The first and most important database-related decisions are whether to use a database at all and, if so, which database management system to use and why. Today there are dozens of database management systems available; however, some are better suited to specific business environments and applications than others.

    For this assignment, you will analyze a business scenario, compare the pros and cons of different database models and products, and recommend a specific product to meet the needs of the business scenario. You will provide the rationale for your recommendation in terms of the suitability and business benefit.

    Download and read the  document.

    Write a 2-page high-level, non-technical recommendation to present to the Brewster CEO.

    In your recommendation:

    • Analyze the company’s current system.
    • Describe the problems and challenges associated with the current system.
    • Explain the business benefit of moving from the current system to a single, shared database.
    • Compare and contrast at least four different database models, including the relational database model, in the context of the company’s business environment.
    • Suggest a specific RDBMS solution you believe would be most appropriate for the company.
    • List the benefits the company could expect to gain from implementing the recommended RDBMS.  
    • Cite at least two references.

      Format citations using APA format.

Inforamation Governance

Chapters 17/18 From our weekly chapter reading, digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained.  Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.

Q2: Looking forward, the authors concluded that, there is going to be a great need for collaboration between both internal and external stakeholders to develop governance policies and strategies to govern and control information assets over long periods of time, among other requirements.  For this to be achievable, the chapter has identified one most important consideration that must be met.  What is that consideration?  Identify, and provide a brief narrative to support your answer.

Chapters 17/18 From our weekly chapter reading, digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained.  Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.

Q2: Looking forward, the authors concluded that, there is going to be a great need for collaboration between both internal and external stakeholders to develop governance policies and strategies to govern and control information assets over long periods of time, among other requirements.  For this to be achievable, the chapter has identified one most important consideration that must be met.  What is that consideration?  Identify, and provide a brief narrative to support your answer.

Should also include 2 replies to each question

Week 7

  

Question 1:

After reading Chapter 12 in the course textbook – privacy and data quality must be managed properly managed in order to ensure a successful business model.  Discuss the recommendations that IT managers group collectively provided.

Note: Your initial post will be your answer to the Question and is to be 250 300 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

References: 

McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson. 

Question 2:

For your assignment – Search and find articles concerning Reported Malware Incidents. You may use Google Scholar or any news website. You could also include the following: any tools mentioned in the article that were used? What was the outcome of the situation? How could this issue could be prevented or mitigated?

Please, include at least 5 references for the topic as well as to support your views and your paper

Note: Your initial post will be your answer to the Question and is to be 750 800 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

Question 3:

What interest you the most concerning Digital Forensics?

Note: Your initial post will be your answer to the Question and is to be 250 300 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

References: 

Malin, Cameron, Casey, Eoghan, and Aquilina, James (2012). Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides. Syngress

US Versus GDPR

 

The EUs new  (GDPR) came into effect on 25 May 2018 and has wide-ranging consequences on a global scale.  It affects, any and all organizations trading with the European Union, both inside and outside its borders.

In the United States, as seen in this and other chapters, there are a number of regulations in place for data protection.  Does this mean that US companies are already compliant with GDPR requirements? 

In what respect are the GDPR regulation better or worse than the US regulations? What, if any, steps do US companies need to take to ensure that they comply with the GDPR regulation?

As always, support your work.

 All other aspects of APA (citations, list of references, correct spacing & formatting, etc.) are required to receive full credit 

Synthesis Paper Topic: Policy-Making And Its Subsequent Implementation Is Necessary To Deal With Societal Problems

Write a 1500 word paper discussing topic (Policy-making and its subsequent implementation is necessary to deal with societal problems). Your paper will be graded on content, structure, grammar, and APA formatting.  Use sufficient amount of references (15 minimum or roughly 3 per page).  Please use Times New Roman, Font 12, and double spaced.  Ensure your references are in a separate bibliography.  

Disaster Recovery: Develop A Disaster Recovery Plan

Question:

Your consulting team has been hired by a group of Nursing homes in Stuart Florida to Develop a Disaster Recovery Plan to be submitted to the executive board. Refer to the assignment directions attached to this discussion board. Dont forget as part of this exercise, you will be submitting a group power point (PPT) next week, summarizing plan.

Guideline is attached, please refer .pdf file

I want 2 pages writing focusing on: Identify Risk

Identify all possible risks associated to Florida

2-3 references

APA format

Discussion

 Defense-in-Depth, an IA concept refers to multiple layers of security controls placed throughout an IT system. Post a brief summary of examples of these types of controls in action and your experience with at least one of type of control. Illustrate whether or not you believe, in your experience, this approach is effective. Be sure to indicate in what domain your example occurs: 

 

  1. User domain – any user of our systems falls in this domain, whether inside or outside our organization
  2. Workstation domain – not just computers, but any device our users use
  3. LAN domain – each LAN and the devices that make a LAN work
  4. WAN domain – the system that links devices across long distances; typically this is the Internet which is used by most businesses
  5. LAN-to-WAN domain – the infrastructure and devices that connect our organization’s LANs to the WAN system
  6. Remote Access domain – the technologies used by our mobile and remote users to connect to their customary resources; can include VPN solutions and encryption technology
  7. System/Application domain – technologies used to actually conduct business functions, as opposed to making connections of various types

Cybersecurity And Risk Management

Consider your organization or another organization that has been affected by a cyber-attack. Feel free to research current events on this topic if you do not have personal experience with an organization who has been affected by a cyber-attack. Once you have selected an organization, answer the following questions:

  • Provide a brief summary of the organization you have selected.
  • What type of cyber-attack occurred?
  • How did the organization respond to the attack?
  • What were the impacts (or potential impacts) to the business?
  • What were the costs associated with the attack? If you do not have actual numbers, what types of costs were likely involved?
  • What did the organization do to mitigate the risk of future attacks? Did the organization change its processes or procedures?
  • As a business manager, what are some additional recommendations you would make to the organization, from a business perspective, to better defend itself in the future? What steps can the business take to better support the IT (information technology) departments security efforts? Explain.
  • Embed course material concepts, principles, and theories, which require supporting citations along with at least two scholarly peer reviewed references supporting your answer. Keep in mind that these scholarly references can be found in the Saudi Digital Library by conducting an advanced search specific to scholarly references.
  • Reply to at least two of your peers initial posts. These replies need to be substantial and constructive in nature. They should add to the content of the post and evaluate/analyze that posts answers. Normal course dialogue doesnt fulfill these two peer replies but is expected throughout the course. Keep in mind that within your initial post, answering all course questions is required.
  • Use Saudi Electronic University academic writing standards and APA style guidelines.

Be sure to support your statements with logic and argument, citing all sources referenced. Post your initial response early, and check back often to continue the discussion. 

Final Research

Evaluate the National disaster recovery effectiveness based on case studies from the text or recent news stories and make recommendations for improvements based on your research.  500 words, APA required, SafeAssign used. 

Text Book:  Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.