+1(316)4441378

+44-141-628-6690

Archive for the ‘Information Systems’ Category

HR/Blockchain

 

Remember to review the syllabus expectations for initial discussion posts and peer replies!

Discuss the following questions: 1. What are the benefits and challenges associated with public and private blockchain and which has the most potential for application in human resource management? 2. What are Smart Contracts and how might they be applied in human resource management? 3. How might Blockchain technology impact labor relations and employee safety? You are required to cite this weeks assigned readings in your paper. You may also cite prior week's reading assignments and external sources if you wish.

Use the following headings to organize your paper: Introduction, Question 1, Question 2, Question 3, Conclusion, References.

Submit your paper as a Word attachment in the discussion forum. I provide feedback within the paper and will not grade your post unless you submit it as an attachment. Your response to the discussion

Research Based Position Paper


Prepare an 8 page APA style paper using the resources you have read in this course and at least 3 additional peer reviewed resources. Follow the writing requirements for this course. Include an introduction and conclusion in the paper. This paper should address the following questions:

(1) Does Blockchain technology have the potential to cause the paradigm shift in business practices that many experts are predicting? Explain why or why not.  Support your answer with research.

(2) Is there evidence to suggest that Blockchain technology will change the way HR is practiced? If there is, discuss that evidence. If there is not, what issues exist that impede its adoption?

(3) Which functions of human resource management could be most impacted by Blockchain technology? How might the HR functions change? Support your answer with research.

Course writing requirements:

  • References MUST be cited within your paper in APA format. Your re

Case Study 2

    

Case Study 2: Implementation Strategies 


Your proposed information system is still a contender. The executives, however, are asking whether it is too limited to prevent the shadow IT projects that continue to take place throughout the organization. They believe that you have considered what the organization does now, but how will your system adapt to new products and processes? Read IQMS (2015) for a concrete example of what they mean. 


Youll have to quell their fears, so its time for another memo. 

Please focus on these points: 


Use the template below but incorporate the following questions.


1. Identify any significant changes that your organization might reasonably make in its product offerings in the next 3 years. Explain the competitive benefits of this change.

2. Explain how your information system addresses or can adapt to the introduction of these

Project Management Discussion

 describe an IT or similar business project you have done or are currently doing. In your discussion, provide information on the following:

1.  What is that project? Provide complete description. Consider using PPM.

2.  What was the scoop, deliverable, and results of the project?

3.  What constraints did you experience and how did you handle them?

4.  If you had to do the same project again, what changes will you recommend?


Read and respond to at least 2 of your classmates posts. Read posting/discussion requirements.

Please use APA throughout in your main post and responses to other posts.

Below are additional suggestions on how to respond to your classmates discussions:

Ask a probing question, substantiated with additional background information, evidence or research.

Share an insight from having read your colleagues postings, synthesizing the information to provide new perspectives.

<

Discussion – 2 Paragraphs And 2 References

The approach Intuit uses to measure the effectiveness of their ERM, and chapter 15 presented the process the City of Edmonton employed to develop and deploy their ERM. You are an ERM consultant, retained by Intuit to re-implement their ERM. They have decided to start over and develop a new ERM for their current organization. Would you recommend that the base their new ERM on PM2 Risk Scorecard or ISO 31000? Explain why you would choose one over the other. 

Assignment 1

3-4 pages with references


1.  What is the difference between statistical randomness and unpredictability?

2.  List important design considerations for a stream cipher.

3.  Why is it not desirable to reuse a stream cipher key?

4. What primitive operations are used in RC4?

The Storytelling Techniques

Data representation is the act displaying the visual form of your data. The process of identifying the most effective and appropriate solution for representing our data is unquestionably the most important feature of our visualization design. Working on this layer involves making decisions that cut across the artistic and scientific foundations of the field.Here we find ourselves face-to-face with the demands of achieving that ideal harmony of form and function that was outlined in Chapter 6, Data Representation. We need to achieve the elegance of a design that aesthetically suits our intent and the functional behavior required to fulfill the effective imparting of information.According to Kirk 2016, in order to dissect the importance of data representation, we are going to "look at it from both theoretical and pragmatic perspectives." Choose three of the storytelling techniques (Pages 161 - 209) in which data is presented and stories are being interpreted. Discuss the importan

CMGT/433: Cyber Security – Cybersecurity Awareness Campaign

 Assignment Content

  1. As a final project requirement, the executive staff requested recommendations to address the following:
    • Strategy for staff awareness
    • Strategy for ongoing security maintenance
    • The best way to get the message across is to have a solid mission statement to share with the organization. You decide to create an awareness campaign for the organization to address the executive staff member's request. Your campaign consists of the following three items:
    • Mission statement
    • Poster campaign
    • Message to organization via the intranet
    • Create an approximate 90-word security policy mission statement for Dayton Soft Products.
      Develop a poster campaign consisting of 3 posters for security awareness to display in the workplace and to distribute virtually. Each poster must include the security policy mission s

Wireless And Remote Connnectivity

 Your company, "Security Consultants Incorporated" has been engaged to perform a wireless and remote connectivity assessment and deliver a proposal for Sanford University.  

A Summary of the challenge is attached: Preview the document

Your proposal should include:

  • Cover page
  • Brief overview (two paragraph max) of the problem or current state.
  • Proposed Network design Diagram
  • Proposed Design description and reasoning one to two pages
  • Implementation approach one to two pages
  • Equipment pricing and implementation costs one page
  • References one page

The paper should be double spaced and 12pt. font. This does not include a cover or reference page.

APA format is

Week 6

  

Question 1:

Review chapter 10 of the course text.  In your own words, discuss the actions that could lead to the development of effective risk management capabilities. 

Note: Your initial post will be your answer to the Question and is to be 250 300 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

References: 

McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson. 

Question 2:

Read the Nationstate Case Study on pages 160-164 in the textbook. Answer Discussion Questions 1-2 at the end of the Case Study. Your responses must be complete, detailed and in APA format.   

Discussion Questions