Category: Information Systems

Case Study

Read the Case Study and answer the “Discussion Points” in a clear but concise way. Be sure to reference all sources cited and use APA formatting throughout.

I prefer you to upload your file in a .docx format – but if you don’t have MS Word- please convert the file to PDF and upload.

Refer to the Case Study Rubrics for more detailed criteria.

Discussion 6

 Include at least 250 words in your reply.  Indicate at least one source or reference in your original post.  Discuss ways organizations have built a CSIRT. What are the components to building an effective and successful CSIRT team? 

Need 600+ Words With No Plagiarism And 2+ Scholarly References

What do you think were the critical factors that fueled the need for IT governance? In what ways did ISO affect the standards for network security?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience

Research Paper Week 6 Info

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

Be approximately 2-4 pages in length, not including the required cover page and reference page.

Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Code Galore

 Review the included ISACA built risk case.  You will need to complete the tasks identified in the later part of these slides labeled To Do.  Re-evaluate the probability and risk level for all of the rows in table 2.  When you make your decision on the new probability rating, you will need to justify this with one to two articles.  When you identify the new risk level, you will need to identify two to three articles as examples or sources to justify the changes.  Don’t just move it up or down, use current news and trends with similar companies to justify why you moved or even kept it the same.  For each item, run a Quantitative or Qualitative risk analysis for a proposed mitigation.  In other words, find a fix for each item and put a price tag with it.  Decide what items are in budget and make your choice.  You will add three new columns to table 2, one will be a proposed mitigation plan with budget and risk level from the FAIR methodology, and the second column will be if your risk decision (accept, mitigate, transfer, avoid).  Submit the completed spreadsheet to the submission item in this week.  You will also need to answer the 10 discussion questions at the end of the slides and submit those with your spreadsheet, either as a second page with answers in the cells or as separate document. 

Enterprise Risk

 the approach Intuit uses to measure the effectiveness of their ERM, and the process the City of Edmonton employed to develop and deploy their ERM. You are an ERM consultant, retained by Intuit to re-implement their ERM. They have decided to start over and develop a new ERM for their current organization. Would you recommend that the base their new ERM on PM2 Risk Scorecard or ISO 31000? Explain why you would choose one over the other. 

Week 3 Metacognition Forum

  

Explain whether or not you feel as if your low confluence affects your learning ability in a negative way. Do you think there is a way to improve this area? Explain.

Review the descriptions of each steps of metacognition in of Chapter 3 of the textbook

Complete the Interactive activity (above) and think about how you move from one step to another.

Reflect: Metacognitive activities, such as this discussion and the Metacognitive Forums, can help you reflect on your own learning and develop higher-order thinking.

For this discussion, reflect on the type of student you currently are regarding your study techniques, quiz preparation, and daily engagement in the course. Also, think about your progress as an intentional learner by considering each metacognitive step: mulling, connecting, rehearsing, attending, expressing, assessing, reflecting, and revisiting.

Write: In your initial discussion board post answer the following questions in complete sentences:

Which step(s) do you use with ease? Describe how you use them.

Which step(s) do you find challenging and that you tend to avoid? Explain why these steps are challenging for you.

Describe three strategies that you could apply to improve your learning, thinking, and overall performance as a student.

Your initial post should be a minimum of 250 words.

Protfolio Project IT

Select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence.  In this paper, perform the following activities:

  • Name the organization and briefly describe what good or service they sell and where they operate.
  • Note how they are a differentiator in the market.
  • Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).
  • Explain what actions the company took to achieve operational excellence.

The above submission should be three pages in length excluding cover page or the references.  There should be at least three APA approved references to support your work. 

Info Security 4

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. You should have at least two scholarly sources supporting your write-up.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 

Information Governance

Chapter 12 From the chapter reading, we learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

Q1: With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation?

Chapter 13 According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis.  When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research that social media differ greatly from e-mail use due to its maturity and stability. (Franks & Smallwood, 2013).  

Q2: Please identify and clearly state what the difference is?

Should also include 2 replies to each question. So a total of 6 responses