current emerging technologies research

 

TOPIC: Write an original research report consisting of one of the following topic areas: 1) Traditional Hierarchy organization; 2) Holacratic organizations 3) Virtual Organizations, 4) Network Organizations, 5) Spin-out Organizations, 6) Ambidextrous Organizations, 7) Front-Back Organizations, 8) Sense and Response Organizations.

1.    The final Research Report has a due date of 4/15/2018.

2.    This assignment is worth 100 points (20% of the course grade).

3.    The assignment must be submitted via the associated assignment queue located in Moodle.

4.    Each student submission will be checked for plagiarism. Warning… Turnitin has a very good historical memory and is capable of accessing reports from both internal and external resources (i.e. Universities, Governments, etc.) including those originally written in non-English languages.

5.    Only one submission attempt is permitted – BE SURE BEFORE YOU HIT ENTER. Plagiarism will result in a grade of zero (non-negotiable) for the assignment and may results in other university actions. The department chairperson will be notified of the violation. Additional CU penalties may be applicable. Please see class syllabus for additional details.

6.    Acceptable file formats for submissions include Microsoft Word (doc, docx) or Adobe Acrobat (PDF). No other formats are acceptable.

7.    The research paper must be at least 2,500 words supported by evidence (citations from peer-reviewed sources).  

8.    A minimum of four (4) peer-reviewed journal citations are required.

9.    Formatting should be double-spaced, one-inch boarders, no extra space for headings, no extra white space, no more than two levels of heading, page numbers, front and back matter (do not count for page count).

10.Extra white space use to enhance page count will negatively affect student grade.

11.Focus for the research paper:

a.     Describe, compare / contrast, and evaluate two (2) organizational types as previously listed.  Supporting evidence must be provided via Case Studies found in peer-reviewed journals (URLs, technical journals, and internet articles are NOT permitted).

b.    The implementation of the first organizational type you selected from previously listed, that was essentially successful

c.     The implementation of the first organizational type you selected from previously listed, that had significant “challenges”

d.     The implementation of the second organizational type you selected from previously listed, that was essentially successful

e.     The implementation of the second organizational type you selected from previously listed, that had significant “challenges”

f.      Perform a comparative analysis of items “b”, “c”, “d”, and “e” as above.

g.     Be sure to include your analysis, synthesis, and  evaluation of the two organizational types selected. Student submissions must be anchor  in peer reviewed literature.Opinions are not evidence and this do not count…

12.As a graduate student, you are expected to be proficient in the use of the English language. Errors in grammar, spelling, or syntax will affect student grade. As your professor, I will not provide remedial help for writing problems. If you are unable to write clearly and correctly, I urge you to contact the program office for sources of remedial help.

13.Please refer to the BA634 class syllabus for additional details.

Some students have asked for a sample or recommended outline. While I cannot provide samples of previous work, I have provided a general outline that you may refer to. The outline below may only be used as a very general guide and is “NOT” a subject that can be selected. Also, keep in mind the research paper needs to be scholarly and derived from peer-reviewed literature. Citations are required.

The following outline (unrelated to the subject matter of the research report) may help in your understanding of the research report via analysis & synthesis.

1)    Introduction:

a)    Introduce the 2 DB implementations plans. Add history and relative significance of each consumer and DB products.

b)    One implementation should be a database that was essentially successful.

c)    The second implementation should be a database that had significant “challenges”.

d)    What type of research papers was used (case study, empirical, etc.)?

2)    Describe, compare/contrast, and evaluate two (2) database – ANALYSIS

a)    What is the problem driving the implementation? What is ‘going wrong’ or what ‘problem’ was expected to be addressed?

b)    What were the implementation  requirements

i)      Expectations

ii)    Project requirements

iii)  DB requirements

iv)  Planed resources & time expectations

c)    What were the risks and impact if the implementation failed?

3)    Provide a SYNTHESIS of the 2-implementation plans. 

a)    What specific issues addressed by article X were also addressed in article Y, and how do they compare?

b)    What issues addressed by article X (or Y) may have been addressed by an alternate solution?

4)    Findings

a)    What does your evidence show?

5)    Conclusions

a)    What make one DB implementation a success and the other have significant challenges?

b)    What mitigating factors were, or should have been, considered?

6)    Recommendations

a)    Future investigation

7)    Reference List  

Week 4 Discussion Board SafeAssign Check Instructions: Review the discussion question below. Type your discussion post into a MS Word document (.doc or.docx) . As part of the Week 4 Discussion Board assignment, you will submit a MS Word document (.doc or

Instructions:

  • Review the discussion question below.
  • Type your discussion post into a MS Word document (.doc or.docx) .
  • As part of the Week 4 Discussion Board assignment, you will submit a MS Word document (.doc or.docx) containing the exact contents of each discussion board post (e.g., if you post once, submit one document; if you post three times, submit three documents) using the provided assignment submission link.  The originality of each submitted document will be checked using the SafeAssign originality-checking tool.  The discussion board assignment will receive zero points if incomplete, inaccurate, insufficient, or no documents are uploaded to SafeAssign.
  • Click the Week 4 SafeAssign Check Link above to submit it through SafeAssign. 
  • Revise as needed.
  • Copy and paste the content in your MS Word document (.doc or.docx) into the discussion board using the Week 4 Discussion Board link below.  Do not attach the MS Word document to the discussion board.

Discussion Question:

  • After watching one video from the link below, create your own thread discussing at least three concepts presented in or that you learned from the video.

Videos:

week 9 case study

Click the link above to submit your assignment.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center. 
Instructors, training on how to grade is within the Instructor Center.

Assignment 4: Diversity of Approaches
Due Week 9 and worth 150 points

According to the textbook, there are at least two (2) approaches to the SDLC, two (2) approaches to software construction and modeling, and many techniques and models. The following could be possible reasons for such a diversity of approaches:

  • The field is young.
  • The technology changes quickly.
  • Different organizations have different needs.
  • There are many types of systems.
  • Developers have widely different backgrounds.

Write a two to three (2-3) page paper in which you:

  1. Analyze each reason listed above as a reason for a diversity of approaches to software construction and modeling, and give your opinion on whether or not each reason is valid.
  2. Propose at least one (1) additional reason why you believe such diversity of approaches exists. Provide support for your recommendation.
  3. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Analyze and present methods to initiate, specify, and prioritize information systems projects and determine various aspects of feasibility of these projects.
  • Use technology and information resources to research issues in systems analysis and design.
  • Write clearly and concisely about advanced systems analysis and design topics using proper writing mechanics and technical style conventions.

 

Click here to view the grading rubric for this assignment.

Info HW

Assignment #7: Acceptable Use Policy & Security Audit

Objective:

  1. Apply the standards for fair, responsible and acceptable use of information technology (e.g., computer systems, network, etc.) to your environment 
  2. Perform a security audit of your own computer. 

Part I: Acceptable Use Policy (AUP)

Brief narrative covering the following topics (at a minimum) as it applies to your technology environment (e.g., digital device, network, data, etc.): 
  • Scope (to whom the AUP applies)
  • The “owner” of the AUP (who is authorized to make changes to the policy)
  • Why have a policy / Intent of the policy / Purpose of the policy
  • Required conduct (behavior)
  • Unacceptable conduct (behavior)
  • Consequences / Sanctions for violations of the AUP

Sample AUP: http://nces.ed.gov/pubs2005/tech_suite/app_a.asp (a Google search for “acceptable use policy template” or “acceptable use policy samples” will link to may more examples).  ISU’s AUP: http://www2.isu.edu/policy/2000/2400-IT-Acceptable-Use.pdf

Part II: Security Audit 

Perform a security audit of your computer.
  • Are critical OS updates available? 
  • Are critical application updates for one or two of your core applications available? 
    • Note: MS Office is updated with Windows update
  • Is anti-virus software installed and up to date?
  • Are there user accounts for each person using the computer?
  • Are user accounts password protected?
  • Evaluate the security level of all user accounts. Are those listed as an “administrator” acceptable to you?
  • Is the firewall enabled?
  • Is the screen saver configured? Does the screen saver require a password to clear it? 
  • Are all your passwords (computer system and online) considered “strong?”

Create a table in MS Word (three columns).  List the items above in the first column (each major bullet point is a row/cell). Use the 2nd column to answer the question in the 1st column.  Use the third column to describe any action items to be taken after the semester ends (I’m not expecting you take actions now but this will serve as a reminder to do so as soon as possible after the semester ends).  However, I recommend you consider addressing any critical security updates as soon as possible. 

Note: Be sure you have a good external backup of important files before performing the security audit!

##

Submit one MS Word Document via MoodleISU that contains your answers to Part I and Part II.  

Please remember to: 

  • Insert a page break between part I and part II
  • Run spell and grammar checker
  • Use complete sentences
  • Points will be deducted for spelling and grammar errors.
  • Only place your full name in the top left corner of each page (no need to put the date, time, my name, the name of the class, etc. – just your name)

Management Information Systems

 

Week 5 Discussion Forum

Important Note: You need to participate in class discussions and activities each week. Your participation is an evidence that you are attending classes in order to continue to maintain your F1 visa status. Simply logging in and do nothing is not enough to meet this requirement. Consistent absence and lack of participation will result to automatic withdrawal from the course.

Each Week, topics for discussion will be found in the discussion area of the course. In-depth discussion is an essential part of online learning, and is also an important factor in your grade as well.

A minimum of three (3) posts is required for each week. Each post is required to be a significant post. Just agreeing or disagreeing with a student is not a post. Neither is asking a question.

  • Significant posts are at least 300 words and require some information from the text, academically reviewed papers, some significant commentary that requires knowledge of the subject matter, a web link to an article or other source in order to be accepted
  • Significant posts on all your responses to your classmates’ postings should be at least 150 words and require some information from the text, academically reviewed paper, some significant commentary that requires knowledge of the subject matter, a web link to an article or other source in order to be accepted.
  • Provide appropriate APA in-text citations and references.
  • You must participate in all discussion topics.

The instructor will determine if a post meets the criteria of a significant post.

Cutting and pasting an article is not a significant post.

The grading scale for discussion is as follows:

Original Discussion:

Your original post (direct response to the discussion topics/questions) is worth 20 points.

Participation (responding to your classmates’ postings):

       2 significant posts (5 points each) = 10 pts

      1 significant posts              = 5 pts.

       No significant posts           =  0 pts.

Each week stands on its own. Thus, you cannot make-up points from a previous week. Please make every effort to participate in all discussions.

 

Read Four (4) academically reviewed articles on Cyber Security and Risk Management and complete the following activities:

(Wikipedia articles will not be accepted. Professor will check originality of all posts).

1.     Summarize all four (4) articles in 300 words or more. Please use your own words. No copy-and-paste

2.     Base on your article review and the assigned reading, discuss the relationship between Cybersecurity and risk management.

3. As an IT manager, discuss how you will use the concepts discussed in the four articles in the management of IT risks within your company.

Please do not create your own link. Respond directly by clicking to my link.

Please use APA throughout. 

Post your initial response no later than day 5 (Friday September 29). Please note that initial post not completed on the due date will receive zero grade. See class syllabus for late assignment policies.

Between Friday (9/29) and Sunday (10/1), read and respond to at two (2) of your classmates. In your response to your classmates, consider comparing your articles to those of your classmates. Below are additional suggestions on how to respond to your classmates’ discussions:

· Ask a probing question, substantiated with additional background information, evidence or research.

· Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives.

· Offer and support an alternative perspective using readings from the classroom or from your own research.

· Validate an idea with your own experience and additional research.

· Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings.

· Expand on your colleagues’ postings by providing additional insights or contrasting perspectives based on readings and evidence.

Disaster Recovery Management

Read the article titled “9/11: Top lessons learned for disaster recovery,” from Computerworld.com, located at http://www.computerworld.com/s/article/9219867/9_11_Top_lessons_learned_for_disaster_recovery , and consider the effects the attacks of September 11, 2001, have had on technology recovery efforts.

Write a two to four (2-4) page paper in which you:

  1. Explain how the attacks affected risk management in organizations and have prompted an increased justification for recovery-based objectives, initiatives, and expenditures.
  2. Analyze the use of social media and other current methods of communication for emergency notifications during an incident or disaster situation.
  3. Determine whether or not organizations need to consider distanced geographic locations when preparing for backup operations / data centers, and determine the effects that recovery point objectives (RPO) and recovery time objectives (RTO) have on these decisions.
  4. Evaluate the use of cloud services as tools for recovery operations within an organization, and explain how they could increase or decrease the effectiveness of recovery operations. 
  5. Determine whether or not cloud services are ideal recovery options for organizations regardless of their size. Provide a rationale to support the answer.
  6. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Explain risk management in the context of information security.
  • Summarize the various types of disasters, response and recovery methods.
  • Compare and contrast the methods of disaster recovery and business continuity.
  • Explain and develop a business continuity plan to address unforeseen incidents.
  • Develop techniques for different disaster scenarios. 
  • Use technology and information resources to research issues in disaster recovery.
  • Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.
  • Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.

Incident Response

Imagine you have just taken over the manager position for your organization’s incident response team, after coming from another division in the company. Your first realization is that proper procedures, best practices, and sound technologies are not being utilized. You decide to revamp the team’s efforts.

Write a two to three (2-3) page paper in which you:

  1. Explicate the main efforts that would be included in the incident response efforts, including but not limited to personnel and team structure, tools and utilities, and proper procedures.
  2. Discuss in detail the role that an IDS / IPS would play in the IR efforts, and explain how these systems can assist in the event notification, determination, and escalation processes.
  3. Explain how the NIST SP800-61, Rev. 1 could assist the personnel in classifying incidents so each is identified appropriately and the proper incident-handling procedures are taken.
  4. Explain how the use of log management systems (e.g., Splunk) could be a legitimate and useful component of the IR efforts, and describe the potential issues that could arise if not utilized.5.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Summarize the various types of disasters, response and recovery methods.
  • Describe detection and decision-making capabilities in incident response. 
  • Use technology and information resources to research issues in disaster recovery.
  • Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.

Click here to view the grading rubric for this assignment.

Week 3 Discussion Board SafeAssign Check Instructions: Review the discussion question below. Write your discussion post. As part of the Week 3 Discussion Board assignment, you will submit a MS Word document (.doc or.docx) containing the exact contents of

Instructions:

  • Review the discussion question below.
  • Write your discussion post.
  • As part of the Week 3 Discussion Board assignment, you will submit a MS Word document (.doc or.docx) containing the exact contents of your initial discussion board post  using the provided assignment submission link.  The originality of each submitted document will be checked using the SafeAssign originality-checking tool.  The discussion board assignment will receive zero points if incomplete, inaccurate, insufficient, or no documents are uploaded to SafeAssign.
  • Click the Week 3 SafeAssign Check Link above to submit it through SafeAssign. 
  • Revise as needed.
  • Copy and paste the content in your MS Word document (.doc or.docx) into the discussion board using the Week 3 Discussion Board link below.  Do not attach the MS Word document to the discussion board.

Discussion Question:

  • After watching the video, Modern Disaster Recovery Workshop: Developing an IT Disaster Recovery Plan, each student will create their own thread discussing at least three concepts presented in or that you learned from the video. 

Video:

Watch Video

Modern Disaster Recovery Workshop: Developing an IT Disaster Recovery Plan
User: n/a – Added: 8/21/14

Alternative Gender Roles or Rites of Passage

Alternative Gender Roles or Rites of Passage

 

Choose either Option A or Option B. Formulate an initial post in which you address the points noted in the prompt for your chosen option

Option A: Supernumerary Genders
According to the textbook, gender is the social construct that is assigned and learned based on cultural concepts about the nature of sex differences and their place in social life. Pick one of the supernumerary genders discussed in the textbook (e.g., Two Spirits or hijra as discussed in section 5.3), and explain how these genders function within their respective societies.

Option B: Rites of Passage
A rite of passage is a ritual that helps mark a person’s transition from one status to another. All cultures have rites of passage to mark these important transitions. With that in mind, choose a rite of passage either from the textbook (see section 6.4) or from your own research. What is the function of this rite within the particular society? How do American rites of passage, such as those you have experienced personally, differ from other rites of passage (see section 6.4, Puberty Rituals)?

Your initial post should be at least 250 words in length. Support your claims with examples from the required materials and/or other scholarly sources, and properly cite any references. Cite your sources in the body of your post and provide a complete reference for each source used at the end of it, By Day 7, respond to at least two of your peers, including one who responded to the option you did not choose. Demonstrate your understanding of the topic by respectfully asking questions, raising new points for consideration, or requesting clarification from your fellow students.

 
     
   

week 5 plagiarism free paper

Assignment 3: VoIP Part 1 (Work Breakdown Structure)
Due Week 5 and worth 100 points

This assignment contains two (2) deliverables: a summary document to be delivered in a word processor document format and a Work Breakdown Structure (WBS) to be delivered in a project file.

Overview
As the project manager for an IT department, you have been assigned to manage the project of deploying a new VoIP phone system to the company’s campus. The campus consists of three (3) different buildings, each with twenty to fifty (20 to 50) workstations. The project must be completed in ninety (90) calendar days starting on November 1.

Deliverable 1: Summary (MS Word or open source equivalent)

1.     Write a one to two (1-2) page summary document in which you:

a.    Summarize the project requirements and other assumptions (e.g., budget, human resources, workload, environmental dependencies, etc.).

b.    Define a work breakdown structure and describe the methodology behind constructing one.

Deliverable 2: WBS (MS Project or open source equivalent)

2.    Use Microsoft Project to create a WBS which:

a.    Contains at least five (5) main tasks, one for each of the PMBOK® process areas.

b.    Contains at least sixty (60) line items distributed in ten (10) or more work packages.

c.    Contains Work Breakdown Structure Code for each task.

d.    Presents a duration estimate for each task which results in a duration estimate for the project not to exceed the requirements described in the overview.

Deliverable one (1) of your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Identify how project management improves the success of information technology projects.
  • Explain the relationship of the scope of a project to the work breakdown structure.
  • Use technology and information resources to research issues in IT project management.
  • Write clearly and concisely about issues in IT project management using proper writing mechanics and technical style conventions.

Click here to view the grading rubric for this assignment.