IT

Information technology

$8.00

Read the Starbucks’ case study. This case study uses Porter’s Value Chain and Five Forces models and a SWOT (strengths-weaknesses-opportunities) analysis to develop strategic recommendations. On page 7 of the Starbuck’s case study there are 10 recommendations. Choose 3 of the recommendations and identify how IT could be used as part of the implementation of that recommendation. Research in the library how other companies have done something similar for each of your 3 recommendations. Your paper should be at least 3 pages, not counting the title and reference pages. The paper must include at least 3 references from peer-reviewed articles in academic journals. Make sure you have in-text citations and a reference page. You can include additional references from websites and books. The rubric for this assignment can be viewed when clicking on the assignment link.

IT infrastructure and business capabilities

$2.00

Explain the connection between IT infrastructure and business capabilities.

Your response should be at least 75 words in length.

2. Distinguish between Web 2.0 and Web 3.0 technologies for organizations.

Your response should be at least 75 words in length.

3. Provide an example of a cloud-based software service and discuss the advantages of using this service.

Mass transit systems

$4.00

Unit V Article Critique

In airports and mass transit systems around the world, nations are now using new technologies to study the behavior of traveling passengers. Security personnel typically review cameras and monitor the behavior patterns of people to include body language, facial expressions, and erratic behavior. Several software applications and advanced biometric applications are currently being field tested or used in various environments. Some of this technology can detect heart rate, breathing, HLS 3306, Homeland Security Technology 3

eye movement, body temperature, etc. Utilizing the CSU Online Library, search for and select a resource such as an article, white paper, or research study that discusses new or emerging behavioral profiling technology or technology used to collect physiological data as a homeland security measure. The resource you choose for this article critique must come from the CSU Online Library. Ensure the resource is no more than 5 years old. Provide a synopsis of the resource, and identify the purpose of the technology. What aspects of behavioral profiling technology are discussed? Is the technology experimental or mainstream? Explain the application of the technology as a tool in homeland security efforts. What is the expected return on investment (ROI) of the technology? What are the strengths and weaknesses of the technology?

Information technology problems

$3.00

The paper must include:

A summarization of the entire research project
What you set out to do (purpose)
What you did (methods)

What you found (results)
A a critical evaluation of the research project, future research suggestions, and recommendations.

2 pages

Information technology problems

$3.00

A discussion and evaluation of the conflicting results

A discussion of the unexpected findings
A discussion on how the findings answer your research questions, address the hypotheses or propositions
An explanation of the implication of your findings (why they are important and how they affect our understanding of the research problem).

The paper must following the formatting guidelines in The Publication Manual of the American Psychological

IT System in Health Facilities

$12.00

Assignment 1: Critical Factors in Implementing an IT System in Health Facilities

Due Week 6 and worth 300 points

Write a six to eight (6–8) page paper in which you:

Provide at least three (3) various reasons why some health care organizations have been reluctant to implement electronic medical records.

Discuss the essential manner in which the Health Insurance Portability and Accountability Act (HIPAA) impacts patient’s medical records.
Determine the main advantages and disadvantages of the adoption of The HITECH (the Health Information Technology for Economic and Clinical Health) Act for health care professionals. Next, suggest one (1) strategy that the medical staff members could use in order to mitigate the main disadvantages in question.
Review the typical workflow processes within health organizations, and decide the single most significant process that the health organization must eliminate in order to improve the service. Provide a rationale to support your response.
Analyze the primary ways in which the key federal initiatives impact the standards of health care information for patient privacy, safety, and confidentially.

Information technology problems

$3.00

Include the results of study
Include figures and tables along showing visual comparisons

Include narrative text (not bullet points) describing the comparisons

The paper must following the formatting guidelines in The Publication Manual of the American Psychological Association (2010), (6th ed., 7th printing), and contain scholarly references. 2 pages without cover and

Automotive accidents

$2.00

Discussion 2

Prompt1:

In your own words explain Reason’s swiss cheese model. Give an example of this model’s implementation in any industry.

OR

Prompt2:

What are some of the factors that affect vigilance. Which one do you think is the most detrimental and why? What would you do to remedy this problem?

Your main post must be at least 200 words.

Business-IT communication

$2.00

Review chapter 5 (Page: 60) of the course text.

What are the recommendation for improving business-IT communication?
Do you agree with the list?

Information Systems for Business

$2.00

To facilitate cultural assimilation, IT and non-IT must become more integrated. What are some strategies to implement to allow this type of interaction to occur? (should be atleast 300 words))

Please feel free to write on your own if you don’t find anything in text books.

Course: Operational Excellence

Text boooks:

Bourgeous, D., Smith, J., Wang. S., Mortati, J. (2019). Information Systems for Business and Beyond.

Information Technology and Organizational Learning

$4.00

Review the strategic integration section. Note what strategic integration is and how it ties to the implementation of technology within an organization.

Review the information technology roles and responsibilities section. Note how IT is divided based on operations and why this is important to understand within an organization.

Two essays each for two sections (should be two pages, one page for each essay)

Course: Operational Excellence

Text book: Langer, A. M. (2018). Information Technology and Organizational Learning. 3rd edition. Taylor &

Engineering concepts

$3.00

I’m working on a Engineering exercise and need support.

Provide a 500 word (or 2 pages double spaced) minimum reflection. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment.

Note: The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Organizations and enterprises

$12.00

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

For your week 6 research paper, please address the following in a properly formatted research paper:

Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.

Management information systems

$4.00

In this unit, you have learned about management information systems (MIS) and the importance of it. For this assignment, compose a paper that discusses the key differences between data, information, information technology (IT), and information systems (IS). Your paper should address the components listed below.

Define what is meant by information.
Define what is meant by data.

Create two matrices (one for data and one for information) that illustrate the key differences between information and data, place the matrices into your paper, and briefly discuss the differences in one or two paragraphs. Each matrix should contain characteristics and/or facts about the subjects (data and information) that show how they are different.
Define IT.

Define IS.

Using the five-component model as an example, discuss some differences between IT and IS.

Comprehensive online documentation

$2.00

Choose one of the following question to answer:

Share an example of an online help system that you think is written and organized exceptionally well. Explain what makes this example of online help writing so great.

Share an example of an online help system that you think is written and organized exceptionally poorly. Explain what makes this example of online help writing so bad

knowledge management

$2.00

This week we focus on the knowledge management cycle noted in Figure 5.3 in the Information Technology and Organizational Learning textbook(Attached). Note the various aspects of knowledge management, continuous innovation, and competitive advantage and how they integrate with one another.

Your response should be 250-300 words. Respond to two postings provided by your classmates.

Information technology

$10.00

As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again.

Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again. Create a PowerPoint presentation of your summary. In your PowerPoint presentation, you should include the components listed below.

Explain the goal of information security in relation to mobile devices.

Information Governance strategies

$4.00

Information Governance

Read the Information Governance Initiative (I am attaching this) within various organizational strategies and respond to the following questions:

What is Information Governance?

How do Information Governance strategies impact accountability and compliance? Give specific examples from the five Information Governance organization examples provided in the reading.
What are some of the design strategies used in implementing an information governance plan? What are the challenges associated with these strategies?
How would you incorporate Information Governance topics into your IT Information Management plan?

Analytics and Business Intelligence

Go to SalesForce website (Links to an external site.) and review the Analytics and Business Intelligence tools. Explain how each of the apps you selected could help identify or address the following:

Trends and Issues
Market Demands
Competitive Advantages
Potential Constraints or Concerns

Customer Lifetime Value
Guidelines

Cite all of your sources using current APA format.

Rubric

MGMT 422 1.3 Module Review Rubric

MGMT 422 1.3 Module Review Rubric

Collaboration information system

$8.00

In this final assignment, you will develop a paper that reviews some of the main topics covered in the course. Compose an essay to address the elements listed below.
Identify the components of an information system (IS) using the five-component framework, and provide a brief summary of each.
Explain Porter’s five forces model.

Management IS (MIS) incorporate software and hardware technologies to provide useful information for decision-making. Explain each of the following IS, and use at least one example in each to support your discussion:
a collaboration information system,

a database management system,
a content management system,

a knowledge management/expert system,
a customer relationship management system,

an enterprise resource planning system,
a social media IS,
a business intelligence/decision support system, and

an enterprise IS.

Identify and discuss one technical and one human safeguard to protect against IS security threats.
There are several processes that can be used to develop IS and applications such as systems development life cycle (SDLC) and scrum (agile development). Provide a brief description of SDLC and scrum, and then discuss at least one similarity and one difference between SDLC and scrum
Sum up your paper by discussing the importance of MIS.

Information security risks and mitigation tactics

$12.00

Discuss strategic analysis decisions in the next five years, what we need to watch out for in the information technology (IT) field, and how these decisions will impact the overall company.
Examine potential changes in IT related to innovation and organizational processes.

List and describe internal (online) information security risks and mitigation tactics and how they will affect decision-making strategies.

List and describe external (building) information security risks and mitigation tactics and how they will affect decision-making strategies.

Your scholarly activity submission must be at least three pages in length. You are required to use the two attached sources and at least one outside source to support your explanation. All sources used must be referenced; paraphrased and quoted material must have accompanying citations

Scroll to Top