Category: Information Systems

Safe Harbor Provisions Under HIPAA

  

Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format. 

Do not submit attachments.

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one full sentence (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. 

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.

Human/Computer Unit 4

 

Keep a humancomputer interface (HCI) journal with your weekly observations of HCI issues that pertain to you, your work, your family, and your friends. Be sure to document your journal in chronological order.

Some examples of items you might wish to document could include any type of computer system that you directly or indirectly interact with, such as the following:

  • ATMs
  • Tollbooths
  • Self-serve checkouts
  • Automated soap dispensers

Your journal should meet the following requirements:

  • Title page
  • Four or more journal entries that include the following:
    • Date
    • Title of entry
    • Description and thoughts on the interaction
  • A summary of 23 pages that discusses the following:
    • Your overall experiences
    • Items you think could be improved
    • Things you would like to see more automated
    • How the systems could be improved
  • At least 3 references in an APA-formatted reference page. These references should be cited in your summary, and your book may be used as one of your references.

Follow APA guidelines for the journal summary. You can format your journal entries in any format that is readable. If you are in any doubt about your chosen format, consult your instructor.

The following are two sample journal entries. Note that these two example topics (restroom automation and Web banking) may not be used in your journal.

July 15: Restrooms

This entry is specifically regarding the restrooms at the shopping mall. The mall has made some excellent strides toward accessibility in the restrooms, utilizing automatic flushing toilets, soap dispensers, and water faucets. These are easy-to-use systems. The user needs only to wave a hand in front of the sensor or move away from the toilet, and the systems will automatically perform their intended actions. One item that appears to be missing is automatic paper towel dispensers. The manual paper towel dispensers are located at what would be considered an average height, and they use a handle that must be pushed down multiple times to dispense paper towels. In an automated restroom, an automatic paper towel dispenser would provide a better experience and cause less confusion when a user has received automatic service for all of his or her other needs.

July 18: Online Savings Bank Account Setup

I have an online bank that I use for savings, and the bank just recently made changes to its Web site. When I went to the main bank Web site, I was first asked to enter my user ID. Because this was my first time using the new Web site, I had to do some authentication using an access code that was e-mailed to me. As soon as I provided my user ID, the Web site informed me that, because this was my first time accessing the user-friendly Web site, I would need to follow three easy steps as part of the setup. The Web site also provides a tollfree number for customer service, seven days per week, from 8:00am11:30pm. I pressed Continue to start the three steps. The first step was to authenticate my identity, so I provided my access code, Social Security number, and date of birth. The items tabbed nicely from one item to the next and showed a picture of where the digital access code was located. Step two asked me to create security credentials. It included a new password, and then I had to answer several security questions that will be alternately asked when I log in to my account. The final step shows me my answered questions in a nonediting mode, asks me to review my security information, and informs me that an incorrect answer to a security question will lock me out of my account. Clicking Add now will take me to a Consumer Information page that asks me to check a box to confirm that I have read and agreed to the Account Disclosure, Electronic Disclosure and Consent Agreement, and Internet Banking Agreement. Clicking Continue brings me to a screen showing my account name and balance. The new interface is much easier to navigate because it has tabs along the top for all of the relevant transactions that I would want to do. The log off option is easily accessible.

Java Program

 

One of the most useful features of any programming language is recursion and control structures, decisions and loops. Recursion and loop structures allow programs to repeat actions without duplicating code. This console application focuses on your understanding of object oriented programming, control structures, and arrays.

Create an application that manipulates a billboard sign. Use the following guidelines:

Main Program:

  • The main program must create an object of Billboard class (see below for details).
  • The main program must include a menu to allow a user to select a function of the Billboard object.
  • The menu must repeat (using a loop) until the user exits the program.
  • The application must exit upon user request.

Billboard Class:

  • The program must include a Billboard class (separate from the main program class) that is able to store and display the text for the completed Billboard advertisement.
  • The Billboard class must include variables for data input.
  • The Billboard class must allow the user to define a custom message.
  • The Billboard class must include 3-4 predefined messages that can be set as the message in the billboard.
  • Add one method of your choice that can be used to manipulate the message in some way, such as reversing the text or capitalizing the letters.

Completion Tasks:

  • Use comments in your code to demonstrate your understanding of each statement.
  • Make sure the program runs correctly before submission. (Your instructor is here to help!)
  • ZIP your project folder and submit the file to the portal for grading. (There is no Word document for this assignment.)

Enterprise Risk Management

Read Chapter 6 scenario, and address the following question, “What are the advantages of integrating ERM with strategy and strategy executions as described in this case,” and “What are LEGO Group’s four steps for developing its risk management?? 

Although you should use multiple references, the required course textbook must be the primarily reference source.

 

Security Assessment

 Assignment Content

Refer to NIST SP 800-53 (Rev. 4) [https://nvd.nist.gov/800-53] for the 18 candidate security control families and associated security controls.

Security Assessment must be incorporated into the Software Development Life Cycle (SDLC) in order to be a secure, integrated process. Testing of selected security controls ensures that applications meet business requirements, function as planned, and protect associated data securely from attack. A security assessment of the targeted environment identifies vulnerabilities that may cause a security breach and specifies the security controls that mitigate the vulnerabilities.

For this assignment, use the organization you choose.

Part I: Mapping Vulnerabilities to Security Controls

Choose 5 distinct security control families as specified in NIST SP 800-53 (Rev. 4) that are most applicable to your organizations known vulnerabilities.

Create a 1-page spreadsheet in Microsoft Excel that identifies the following criteria for each family:

Control ID

Control Name

Vulnerability

Recommended mitigation (refer to your Week 3 assignment; refine them for this mitigation)

Part II: Security Controls Testing

Provide a 2- to 3-page table in Microsoft Word including each family, and describe the testing procedure that will mitigate the vulnerability. Annotate whether the testing procedure is an interview, observation, technical test, or a combination.

Example of Security Controls Testing Table:

Part III: Penetration Testing and Vulnerability Scanning

Provide a 1-page description of penetration testing and vulnerability scanning processes.

Describe how they are used as part of the organizations testing and assessment strategy.

Format your citations according to APA guidelines.

Cyber Security Assignment

Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Googles Data Center may give you some ideas to write about for this assignment. 

InfoTech In GE: Question1

**** Need it by 01/09/2020 7 PM EST****

APA Format NEEDED

In-text Citations

NO PLAGIARISM

Subject: Information Technology in a Global Economy

Question 1: Need 2-3 paragraphs

There were several important themes in chapter 1. Here are a few quotes:

Policy-making and its subsequent implementation is necessary to deal with societal problems. (Janssen, 2015)

Policy-making is driven by the need to solve societal problems and should result in interventions to solve these societal problems.  (Janssen, 2015)

Examples of societal problems are unemployment, pollution, water quality, safety, criminality, well-being, health, and immigration.  (Janssen, 2015)

The author of chapter 1 discusses several developments that influence policy-making. 

Select one of the developments in chapter 1 and describe how that development can influence policy to solve a specific problem.

Chapter 1, Introduction to Policy-Making in the Digital Age in  Janssen, M., Wimmer, M. A., & Deljoo, A. (Eds.). (2015). Policy practice and digital science:  Integrating complex systems, social simulation and public administration in policy research (Vol. 10). Springer.

Disc -1 Info

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Big Data

 

This week’s reading centered around how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations. For this week’s research assignment, you are to search the Internet for other uses of Big Data in RADICAL platforms. Please pick an organization or two and discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities. Be sure to use the UC Library for scholarly research. Google Scholar is the 2nd best option to use for research.

Your paper should meet the following requirements:

Be approximately 3-5 pages in length, not including the required cover page and reference page.

Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations.  The UC Library is a great place to find resources.

Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Cyber Security Scenario Based Discussion

 

Chapter 1 provided a high-level overview of the need for a national framework for protecting critical infrastructure. For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure:

https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/

After reading chapter 1 and looking at the link above, write a discussion discussion.

Real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defenses [DODs] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation.