Information Technology

organizational behavior case

organizational behavior case

Questions for “Motivation at Bald Eagle Software”

1. Applying the concepts from the motivation theories, what would you say motivates Hank? What about Martin? What about Olga?

2. Will Martin’s efforts to make Hank more productive be successful? Why or why not? What do you believe will happen to Hank?

3. If you were Martin, what would you have done differently, if anything?

4. Do you have thoughts about how Hank’s interactions with his co-workers may be impacting their work (positively or negatively)?

organizational behavior case Read More »

I want article outline: Digital Competence for teachers and learners

I want article outline: Digital Competence for teachers and learners

the article is about the rapid expansion of technology and how it has affected the learning process. So now teachers have to cope with this change and should acquire some digital competencies or literacies in order to implement them into the classroom and make language learning more appealing to the students. So, what are these digital competencies and how can teachers acquire them. And what are they for learners too.

Am writing a journal article to be published. In this case write an article outline for the article on digital competence for language teachers and learners

I want article outline: Digital Competence for teachers and learners Read More »

Influence of Technology on Confidentiality

Influence of Technology on Confidentiality


 

Post by Day 4 an explanation of two ways technology might influence confidentiality. Then explain how technology might influence compliance with HIPAA or FERPA (whichever is most relevant to your specialization). Finally, describe an ethical situation involving technology and explain a strategy you might use to address this situation.

Be specific and include reference to the week’s Learning Resources in your response.

 

Required Resources

Note: To access this week’s required library resources, please click on the link to the Course Readings List, found in the Course Materials section of your Syllabus.

Readings

  • Fisher, C. B. (2017). Decoding the ethics code: A practical guide for psychologists (4th ed). California: Sage Publications, Inc.
  • Bersoff, D. N. (2008). HIPAA: Federal regulation of healthcare records. In D. Bersoff, (Ed.), Ethical conflicts in psychology (4th ed.).(pp. 543–545). Washington, DC: American Psychological Association.
    Retrieved from the Walden Library databases.
  • U.S. Department of Education. (n.d.). Family Educational Rights and Privacy Act (FERPA). Retrieved from http://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html
  • U.S. Department of Health & Human Services. (n. d.). Understanding health information privacy.Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/understanding/index.html

Media

Influence of Technology on Confidentiality Read More »

IT security question

IT security question

everything is below. see the attachments . write in simple sentences ““““““`

write about an important security knowledge concept or skill on each topic.  Explain each item and its importance in with specific examples (about 150-200 words for each topic). Check grammar and spelling before submission.

Chapter 4: Planning for Security

Chapter 5: Risk Management

Chapter 6: Security Technology: Access Control, Firewalls, and VPNs

IT security question Read More »

Write and a 2 page paper evaluating your experience implementing mitigation and preparedness strategies

Write and a 2 page paper evaluating your experience implementing mitigation and preparedness strategies

Studies suggest that game-based learning can serve as a useful educational tool for teaching new concepts and ideas to various populations. For this assignment students will play the “Stop Disasters Game” and answer the questions asked below. The specific instructions for this assignment are as follows: Step 1: Go to the Stop Disaster Game website at: http://www.stopdisastersgame.org/en/playgame.html

Step 2: Play one of the 5 scenarios using the “Medium Difficulty” level.

Step 3: Write down what your mission is for the game. *You will need this for your evaluation of the game*

Step 4: Take a screen capture (CTRL + PrtScn, then paste into Word Doc) of your final score as proof you completed the game. Turn this in as the first page of your report. Step 5: Write and a 2 page paper (double-spaced, 12 pt. Times New Roman, 1 inch margins) evaluating your experience implementing mitigation and preparedness strategies for the particular disaster scenario you played.

All detailed instructions are available on the attached file.This assignment is going through a plagiarism checker software (turnitin). So please make sure that it is a plagiarism free work. If any question come up, please let me know!

Write and a 2 page paper evaluating your experience implementing mitigation and preparedness strategies Read More »

Proposal: Section 2: Needs Assessment Plan

Proposal: Section 2: Needs Assessment Plan

The Needs Assessment Plan should be 2–3 pages in addition to the needs assessment examples to be placed in Appendix B.

Using the module Learning Resources as a guide, select two informal and one formal method or strategy for gathering data (needs/ideas). At least one method should use quantitative measures that require the input of numbers or a graduated scale.

This approach to gathering data from several perspectives in the field will strengthen your findings. Examples of approaches might include: A formal survey, a formal interview, a formal observation, formal anecdotal evidence such as test records, informal conversations, informal interview, checklists, etc.

Remember that you will NOT conduct the needs assessment; this is only a proposal or plan.

  • Design three processes for gathering data or evidence of needs. Each process must include all of the following:
  • Provide the name of the process (e.g., Likert Survey, Semantic Differential Scale, Checklist, etc.)
  • Explain the type of instrument or activity (e.g., formal or informal)
  • Explain the key purpose for the assessment instrument or activity. For example, identify the top three concerns of stakeholders or describe the concepts measured by the needs assessment instrument.
  • Describe the processes to be used for assessment of reliability and validity of the instrument(s) (test-retest reliability, internal consistency, validity, etc.)
  • List guiding questions of the instrument or activity (Include a minimum of five and maximum of ten questions.)
  • Describe the process of how the instrument or activity will be disseminated and collected, and where the raw data will be maintained (e.g., Online Survey Monkey, handout, e-mail, maintained in a confidential folder on your personal computer, etc.)
  • Explain how the data will be analyzed (e.g., descriptive statistics (frequency, mode, median, mean, etc.) or explain the data to measure each variable in the study.
  • Explain how the findings will be reported (e.g., handout at staff meeting, e-mail, conversations, etc.)

Your proposal should utilize reference citations. Please refer to the APA manual (6th ed.) for appropriate guidelines to support scholarly discourse.

I HAVE ATTACHED SECTION 1 FROM MY FIRST ASSIGNMENT SO THAT YOU KNOW WHERE I’M GOING. THANKS.

Proposal: Section 2: Needs Assessment Plan Read More »

Legal and Ethical Issues in Information Security

Legal and Ethical Issues in Information Security

 

 

What ethical issues do IT professionals face on a daily basis, in the US. The company i work at has clients and users in multiple countries across the world, from India ,China, and across Europe. and one of the major issues we have to deal with are cyber-security laws and ethics in these other countries. How could some countries laws or ethics conflict to those within the USA? Do you find any other countries laws or practices are more effective than our own?

Legal and Ethical Issues in Information Security Read More »

Literature Review #2

Literature Review #2

 

Literature Review:

Description: Current Article Jan 2018 to present 40 points. Original Copy of article attached(Scanned) 20 points 1 page Summary of Article – 60 points( Grammar/Sentence Structure – 20 points, Article make connection to course – 20 points, APA citation – 20 points.

Literature Review #2 Read More »

Applying positive habits

Applying positive habits

This week’s assignment offers you the opportunity to think of developing study habits that can guide success in your studies and in your career. You read about how to take notes and process information in Ch. 3 of P.O.W.E.R. Learning.

Next, Ch. 7, reinforces some of this information as you read about how to better use technology and sort through information.

Imagine now that you are working part-time at the university’s student resource center. It is your turn to provide advice to a student who is asking for help.

Refer to the Applying Positive Habits instructions for assignment details. You’ll be able to choose the format for your assignment–either an e-mail for a written assignment or a pamphlet for a visual approach. Either assignment you choose is designed to offer you a real-life situation where you’re trying your best to explain what you know and have learned.

Applying positive habits Read More »

Discussion

Discussion

Read a discussion post below, and critique their selection by confirming what points they chose to select their topic and three things they may include to further defend their choice.

200 words

Discussion Post:

Leveraging emerging technologies is significant in career of accountants. The emerging reality is that accountants have to know about technologies — ones they use along with planning for ones they are about to use. Because:

1.Automation has become a trend, and if we don’t make changes, our traditional work will be replaced.

2.There is no denying the risk of using new technologies, but there are also many opportunities.

3.Cloud-based accounting and Software as a Service will still a big part of the changing dynamics for the accounting profession. Adoption of cloud-based solutions in the finance function continues to rise, according to surveys conducted for the 2017 Benchmarking the Accounting and Financial Function report. (Kevin Keystone) Most people don’t concerned about moving sensitive financial or customer data to the cloud. They also report finding cost savings, simplified information sharing and better team collaboration using the cloud.

4. Usage of blockchain technology is increasing, it brings more opportunity. It’s all about greater efficiency, visibility and lowering compliance costs without intermediaries.(Jon Baron)

5.Convergence of big data and artificial intelligence is a tendency. More and more futurists are talking about how the next evolution of big data will involve automation, machine learning and artificial intelligence.

Discussion Read More »

Critical Thinking: Malware

Critical Thinking: Malware

Critical Thinking: Malware

Assignment Details:

In an essay, answer the following questions based on the readings from this module:

Provide information from your readings to support your statements.

Deliverables:

Your essay should be 4-5 pages in length, incorporating at least two academic resources from the Library in addition to the case study. Cite all sources using Saudi Electronic University academic writing standards and APA style guidelines found in the Library, citing references as appropriate.

Critical Thinking: Malware Read More »

I need powerpoint 12 Slides

I need powerpoint 12 Slides

IT Strategy and Governance topic of your choice: 1 or 2 than make your slides with Example and IT strategy ,put one Video has related with your topic , make sure when you choice 1 or 2 make all requirements

1.Example of successful or innovative IT strategy that you can quantitatively and show worked out and under what circumstances this could work or be tailored for others.

2.Example of IT strategy or governance failure and what they could have done better/instead.

I need powerpoint 12 Slides Read More »

Discussion Q

Discussion Q

 

PLEASE DO PART ONE FOR NOW 150-200WORDS

WILL SEND THE RESPONSE (PART 20 LATER ON 100WORDS

Please note that this assignment is TWO PARTS. The First part is due 24 hours from now. The second part will be after submitting the first part to my school website and see my classmate writing, then will make a direct response to at least 2 different students’ initial posts 24 hours from submitting the first part.

INSTRUCTIONS:

Watch the video Lecture 9 – How to Raise Money (Marc Andreessen, Ron Conway, Parker Conrad)

http://startupclass.samaltman.com/

The First part, write a 150- 200-word discussion post as follows:

1. What 2 key ideas did you learn from the videos?
2. Formulate 2 questions that you would like answered by your classmate or points you would like clarified.

Due date: 24 hours from now.

NOTE: Once you complete this work, I will submit it to my school website.

The second part, I can see my classmate writing in order to make a direct response to at least 2 different students’ initial posts as follows:

1.Write a 50-75-word reaction to the post that is either a reaction to the post or an answer to one or both questions the student asked.

2.Provide references if appropriate for your answers, and make the answers meaningful, not trivial.

Due date: 48 hours from now, which is 24 hours from the submission date.

Discussion Q Read More »

Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks. (atleast 250 words)

Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks. (atleast 250 words)

course: cloud computing

text books:

Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.

Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.

Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks. (atleast 250 words) Read More »

The Impact of Globalization on Digital Governance

The Impact of Globalization on Digital Governance

350-word response in which you address the following questions: Why has the United States, despite its wealth, fallen behind several other countries in the application of internet ICTs?

Digital Governance: New Technologies for Improving Public Service and Participation

Milakovich, M. E. (2012).

The Impact of Globalization on Digital Governance Read More »

Discuss what it is and how organizations use balanced scorecards. Discuss any alternative methods organizations use instead of the balanced scorecard and why they would use these methods over the balanced scorecard.

Discuss what it is and how organizations use balanced scorecards. Discuss any alternative methods organizations use instead of the balanced scorecard and why they would use these methods over the balanced scorecard.

Course: Operational Excellence

Text Books:

Bourgeous, D., Smith, J., Wang. S., Mortati, J. (2019). Information Systems for Business and Beyond.

https://opentextbook.site/informationsystems2019/

Langer, A. M. (2018). Information Technology and Organizational Learning. 3rd edition. Taylor & Francis Group, LLC. ISBN: 978-1-4987-7575-5 

Discuss what it is and how organizations use balanced scorecards. Discuss any alternative methods organizations use instead of the balanced scorecard and why they would use these methods over the balanced scorecard. Read More »

Propose a topic for Network Security Engineer

Propose a topic for Network Security Engineer

Dissertation Topic

Provide a 100 word description of your topic supported by references that demonstrate the Gap in the Research that you will address.

Propose a topic for Network Security Engineer in a 100 word description. Choose an article from the below journals. What is the research questions and the article that supports this gap. Attach the supporting article as well.

Journal of Cryptology

Software and systems Modeling

Journal of Systems and Software

Journal of information systems management

Propose a topic for Network Security Engineer Read More »

Internet of Things benefits organizations (public sector, private sector, for-profit, or not-for-profit).

Internet of Things benefits organizations (public sector, private sector, for-profit, or not-for-profit).

(1) Analyze two examples of how the Internet of Things benefits organizations (public sector, private sector, for-profit, or not-for-profit). (2) Analyze two specific business uses of Internet of Things and RFID technology.

– APA Format

– Minimum 6 Peer-reviewed Sources

– Times New Roman, Font Size 12

– 3 to 4 Pages, Double Spacing

Questions:

  1. Analyze two examples of how the Internet of Things benefits organizations (public sector, private sector, for-profit, or not-for-profit).
  2. Analyze two specific business uses of Internet of Things and RFID technology.

Internet of Things benefits organizations (public sector, private sector, for-profit, or not-for-profit). Read More »

Scroll to Top