IT
knowledge management
This week we focus on the knowledge management cycle noted in Figure 5.3 in the Information Technology and Organizational Learning textbook(Attached). Note the various aspects of knowledge management, continuous innovation, and competitive advantage and how they integrate with one another.
Your response should be 250-300 words. Respond to two postings provided by your classmates.
Information technology
As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again.
Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to present a summary of what the organization should do to prevent this from happening again. Create a PowerPoint presentation of your summary. In your PowerPoint presentation, you should include the components listed below.
Explain the goal of information security in relation to mobile devices.
Information Governance strategies
Information Governance
Read the Information Governance Initiative (I am attaching this) within various organizational strategies and respond to the following questions:
What is Information Governance?
How do Information Governance strategies impact accountability and compliance? Give specific examples from the five Information Governance organization examples provided in the reading.
What are some of the design strategies used in implementing an information governance plan? What are the challenges associated with these strategies?
How would you incorporate Information Governance topics into your IT Information Management plan?
Analytics and Business Intelligence
Go to SalesForce website (Links to an external site.) and review the Analytics and Business Intelligence tools. Explain how each of the apps you selected could help identify or address the following:
Trends and Issues
Market Demands
Competitive Advantages
Potential Constraints or Concerns
Customer Lifetime Value
Guidelines
Cite all of your sources using current APA format.
Rubric
MGMT 422 1.3 Module Review Rubric
MGMT 422 1.3 Module Review Rubric
Collaboration information system
In this final assignment, you will develop a paper that reviews some of the main topics covered in the course. Compose an essay to address the elements listed below.
Identify the components of an information system (IS) using the five-component framework, and provide a brief summary of each.
Explain Porter’s five forces model.
Management IS (MIS) incorporate software and hardware technologies to provide useful information for decision-making. Explain each of the following IS, and use at least one example in each to support your discussion:
a collaboration information system,
a database management system,
a content management system,
a knowledge management/expert system,
a customer relationship management system,
an enterprise resource planning system,
a social media IS,
a business intelligence/decision support system, and
an enterprise IS.
Identify and discuss one technical and one human safeguard to protect against IS security threats.
There are several processes that can be used to develop IS and applications such as systems development life cycle (SDLC) and scrum (agile development). Provide a brief description of SDLC and scrum, and then discuss at least one similarity and one difference between SDLC and scrum
Sum up your paper by discussing the importance of MIS.
Information security risks and mitigation tactics
Discuss strategic analysis decisions in the next five years, what we need to watch out for in the information technology (IT) field, and how these decisions will impact the overall company.
Examine potential changes in IT related to innovation and organizational processes.
List and describe internal (online) information security risks and mitigation tactics and how they will affect decision-making strategies.
List and describe external (building) information security risks and mitigation tactics and how they will affect decision-making strategies.
Your scholarly activity submission must be at least three pages in length. You are required to use the two attached sources and at least one outside source to support your explanation. All sources used must be referenced; paraphrased and quoted material must have accompanying citations