Category: Information Systems

InfoTech Import In Start Plan Assignment 5

Course Name: InfoTech Import in Strat Plan

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. 

This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own IT careers.

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

  1. Use of proper APA formatting and citations. You should have at least two scholarly sources supporting your write-up.
  2. Share a personal connection that identifies specific knowledge and theories from this course.

Course Name: InfoTech Import in Strat Plan

Research Paper

 

Prepare an 8 page APA style paper using the resources you have read in this course and at least 3 additional peer reviewed resources. Follow the writing requirements for this course. Include an introduction and conclusion in the paper. This paper should address the following questions:

(1) Does Blockchain technology have the potential to cause the paradigm shift in business practices that many experts are predicting? Explain why or why not.  Support your answer with research.

(2) Is there evidence to suggest that Blockchain technology will change the way HR is practiced? If there is, discuss that evidence. If there is not, what issues exist that impede its adoption?

(3) Which functions of human resource management could be most impacted by Blockchain technology? How might the HR functions change? Support your answer with research.

Course writing requirements:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with ALL submissions (even initial discussion posts)
  • Provide the EXACT web link on the reference page citations for all online sources do not provide just the home page, but the EXACT LINK I check all sources
  • No abbreviations, no contractions write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

A Paragraph On Basic Components Of A Business Network

Choose one of the types of participants in basic components of a business network, and explain how you think the chosen participant type could effectively use assets in an enterprise blockchain environment to impact the organizations outcomes.

Then think of three questions youd like to ask other students and add these to the end of your thread. The questions should be taken from subject. Youre not trying to test each other, but you are trying to start a discussion. 

You must do the following:

1) Create a new thread. As indicated above, choose one of the types of participants, and explain how you think the chosen participant type could effectively use assets in an enterprise blockchain environment to impact the organizations outcomes. Then think of three questions youd like to ask other students and add these to the end of your thread. 

Information Technology Paper

  

 Please answer the following questions in a 2-page main body APA formatted document. Please make sure that there is a title and reference page. All references listed need to be cited in the document.  

1. Please make sure that you address the type of study and why you think this was used in this paper.?

2.How is this paper related to the topics in this course?

3.Do you agree with the authors conclusions?

Reserch

  

Prepare a short research paper of approximately 5 pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography.  Your paper must use APA formatting with the exception that tables and figures (if used) can be inserted at the appropriate location rather than added at the end.  Submit the paper in your assignment folder as a Word attachment with the following file name: yourlastnameSSB.doc

For example, a submission file would be called JonesSSB.doc

Alice, a high net worth customer, banks on-line at Super Secure Bank (SSB) and has agreed to use 3DES in communicating with SSB. One day, Alice received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that the bank manager, Bob, transferred the money out of Alice’s account and into an account of his own in an offshore bank. When reached via long distance in the Cayman Islands, Bob produced a message from Alice, properly encrypted with the agreed upon 3DES keys, saying: “Thanks for your many years of fine service, Bob. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. Signed, Alice.”

Alice filed suit against Bob, SSB and the government of the Cayman Islands, claiming that the message was a forgery, sent by Bob himself and asking for triple damages for pain and suffering.  Bob has responded by claiming that all procedures were followed properly and that Alice is filing a nuisance suit. You have been employed by SSB as a cryptographic expert to assist in the investigation of this matter, and will produce a report for the SSB Board of Directors, which will assist them in determining how to proceed in this matter.

Your report to the Board of Directors should address the following issues:

What can be determined from the facts as presented about whether Alice intended to make Bob a gift of $1,000,000?

Assuming SSB wishes to continue using only 3DES as its cryptographic system, what could SSB and Alice have done to protect against this controversy arising?

Would this controversy have arisen if SSB had been using AES rather than 3DES?

Your report should clearly address these issues, with sufficient detail and background to allow the cryptographically challenged Board of Directors to understand the issues involved and formulate plans for how to approach the immediate issue with Alice, and to continue business in the future, assuming that they want to continue using 3DES.

Please Note: It is not required in this paper to provide a detailed explanation of the 3DES encryption algorithm.

Measurable Values

 

Phoenix Fine Electronics would like more information about their system options and your recommendation. They are interested in learning how the strengths of the system can be turned into measurable values for the business upon implementation.

Modify the chart from the Week 2 assignment by adding the following:

  • Strengths and weaknesses of each system
  • The impact of the strength and weakness

Cite at least two sources in the additional columns in your chart

Write a business case for your recommendation. This business case will be revisited in Week 6. As a guideline, this section of the business case should be approximately 3 to 4 pages in length. Use the information from your executive summary and add the following information:

  • At least three measurable organizational values the new system will bring
  • The benefits of the value to the business
  • How these values will differentiate the business to customers
  • Risks of doing the project
  • Risks of not doing the project
  • The modified comparison chart (from above)
  • References

Submit your assignment.

Discussion

Topic:  Discuss the challenges that incident handlers face in identifying incidents when resources have been moved to a cloud environment.   

Follow up your discussion with a recent article discussing a company who has begun utilizing a cloud environment and what challenges they may face.  Make sure to cite the article.

DQ requirement: Note that the requirement is to post your initial response no later than Friday and you must post one additional post during the week (end of Sunday). I recommend your initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference.

Paper With 600 Words Min

  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus? 

Portfolio Project

 

Portfolio Project: This week select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence.  In this paper, perform the following activities:

  • Name the organization and briefly describe what good or service they sell and where they operate.
  • Note how they are a differentiator in the market.
  • Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).
  • Explain what actions the company took to achieve operational excellence.

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work. 

1 Page Summary & Power Point Slides -2

 Project Summary requirement

1. The projects summary should describe out the importance and value  of cloud computing, furthermore a clear of the internet in relation to  cloud computing.

2. The project summary should explain regards to the risks involved  in storing data on cloud. Should also explain on the tools that are  important in ensuring data on cloud is secure, it is significant for  security on cloud computing to be tested on whether it has the ability  to satisfy the security demand levels of the customer seeking cloud  services.

Project Power Point requirement

Power Point Presentation of at least 10 Slides (excluding Title,  Agenda, End       page) with topics described above in Project Summary  requirement.

Attached document has detailed information regarding deliverables.