Please follow the instructions

2. Use the knowledge and skills you gained while working on the WileyPlus SAP ERP simulation assignments, the EBeer SCM simulation exercises, and the course material to answer the following:                                                                    (approximately 1 page            Total 5 points)

1) What are the advantages and disadvantages of implementing and using ERP systems?                                                                                                                            (2 points)

2) What are the challenges that organizations face when managing supply chain dynamics and the related business processes? Explain how you propose to address these issues by the use of enterprise systems.                                                                           (3 points)

 

3. Based on the CAIS article “Tutorial: Big Data Analytics” Watson (2014) that we discussed in class:                                                                            (approximately 1 page Total 5 points)

1)    Explain briefly the main business objectives of big data analytics and the main challenges and risks involved.                                                                                            (2 points)

2)    Describe briefly how you would apply big data analytics to a private or government organization to gain the objectives discussed above.  Use your experience of SAP Lumira exercises to explain how you would use data visualization techniques.  (3 points)

hector

 

reply to the students response in 150 words minimum and provide 1 reference

question

Jason works for a car rental agency. Part of his religious observance is to pray several times per day.  He approaches Supervisor Jan with a request for two additional 10-minute breaks per day in order to engage in prayer.

Student response

 

In analyzing this case the federal statues and/or theories of law that are applicable in this matter is Title VII of the civil right act of 1964. The definition of religion in the context of the federal statues includes “all aspects of religious observance and practice, as well as belief.” (page 544). Even though religion is a protected class under title VII there are some specifications and/or limits on the accommodation of this class when it comes to employment. According to Bennett-Alexander, D. & Hartman L. P. (2019) “Unlike the other categories included in Title VII, there is not an absolute prohibition against discrimination on the basis of religion. Rather, under Title VII, we see for the first time a category that has built into it a duty to reasonably accommodate the employee’s religious conflict unless to do so would cause the employer undue hardship.”(Page 541) A reasonable accommodation in relation to this situation refers to; after an employee/s notifies the employer the need for a religious accommodation, the employer is obligated to accommodate the religious practice. In terms of undue hardship,  an employer has the right to refuse to accommodate if it causes “more than de minimis cost” and the employer can prove this. Some examples that may cause undue hardships include; Violating a seniority system, causing lack of the necessity’s of staffing, compromising health and or security, or costing the employer more than a minimal amount. Another statute that is also applicable to this case is the United States constitution’s 1st amendment free exercise clause. The First Amendment states; “The Free Exercise Clause reserves the right of America Citizens to accept any religious belief and engage in religious rituals. Free-exercise clauses of state constitutions which protected religious opinion, expression of opinion and practice were all expressly protected by the Free Exercise Clause.” In doing more research I have found that the Free-Exercise Clause and the Establishment Clause may be contradicting because the establishment clause prohibits the government from making any law “respecting an establishment of religion” which seems very interesting. 

The legal issues that exist in this case is that Jason took it upon himself to approach his co-workers in the lunch room everyday with bible versus while asking them to join him in reading the bible keeping in mind that there is a no-solicitation policy. After several employees complaining, the supervisor told Jason to cease this practice, Jason told her it was part of his religious observance. Even though Jason has the right to practice his religion he does not have the right to continue to harass his co workers every day with bible verses and asking him to join him in reading the bible. Also highlighting that the retail department store has a no-solicitation policy and even though Jason may feel like he is exercising his religious freedom he may be imposing other’s religious beliefs by soliciting his own. The elements of the law is that although Jason has the right to practice his religion he is doing so by causing undue hardship to the employer; Therefore he may be in violation of the no solicitation policy and could be subject to termination.  This is a hypothetical, who knows how the others are feeling and or what they believe, but respect has to be exercised at all times. Reasonable accommodation can come into play in this scenario by finding other solution for Jason to continue his practice, which may be limited but the effort may go a long way. Based off this case it doesn’t seem like Jason expressed his religious belief and expressed an need for an accommodation to conduct this practice. At this point due to receiving multiple complaints from other employers, this seems to be causing undue hardship to the company if these employees decide to quit; therefore it could cause lack of necessities of staffing, the cost seems far more greater here than the reasonable accommodation.

One case that I felt was on point with this scenario is Chalmers V. Tulon Company of Richmond (Page 565). “The supervisory employee sued for religious discrimination and failure to accommodate after being terminated for sending employees letter at home about their personal and religious lives. One employee received the letter while at home ill on leave after delivering a baby out of wedlock, and the other employee’s wife opened the letter and became distraught because she thought their reference in the letter meant her husband was having an affair. The court held that there was no duty to accommodate the terminated employee’s religious practice of sending such letters.” The comparison between these two cases/scenarios is that both Jason and Chalmers took it upon themselves to practice their religion and impose on other’s without asking for an accommodation first and harassing co workers with their practices and beliefs. In both cases it seems as though that upper management is not going to accommodate due to the fact that they are practicing their religion on others with no permission and are in turn violating policies themselves. The difference between the two cases is that Chalmers seem to be more aggressive in sending criticizing letters to her co workers pertaining to their personal lives that does not align to her religion. Jason was not as aggressive as he was approaching others with bible versus and asking them to join in reading although it is still not right to do as he was also imposing on other’s beliefs and personal space. I feel that both of these individuals have invaded privacy and damaged work relationships which in turn cause more harm than a benefit to an organization. 

The actions that supervisor Jan could take is to ask him to stop and highlight the no solicitation policy as well as educating him on his rights, the reasonable accommodation and undue hardship. The immediate assumption is that Jason is correct he does have the right to practice his own religion as he pleases but this is where Jan could come in and explain that they could talk through some possible accommodations but if these recommendations are not realistic than he will need to stop. One idea that came to mind is asking co workers if they are comfortable with this practice and those who are, Jason could then continue to approach those individuals while avoiding those who are not comfortable. If this continues to become an issue she would then need to explain the undue hardship it may be causing the company and the other employees. If for some reason Jason refuses to stop, Jan has the right to terminate because this is not only causing lack of necessities of staffing by making others quit but it is also violating other employee’s beliefs and privacy. Jan must exhaust all ideas and accommodations for Jason before making the decision to terminate. 

REFERENCES

Bennett-Alexander, D. & Hartman, L.P, (2019) Employment Law for Business. New York: McGraw-Hill Education.

First Amendment. (n.d) Retrieved from https://www.law.cornell.edu/wex/first_amendment.

HW

First homework :

MLA STYLE 

MY MAJOR IS COMPUTER ENGINEERING SO YOU CAN DO THE HOMEWORK 

Your Future Career: Data, Information, Hardware and Software

Section I

Describe the data and information utilized in your future career. You may visit with anyone you know that is currently working in your future career. You can also search for credible websites and don’t forget to take a look at electronic scholarly journal articles. 

 

  1. Briefly summarize your future career. 
  2. Summarize (describe) the data, aka “facts”, that are collected and input into a computer system.
  3. Summarize (describe) the information, aka “output” (processed data).

 

Reminder: information is processed data (information is data that is endowed with relevance and importance, where data are the mere facts).

Section II

Summarize the type of hardware and software you will likely use (personally) in your future career. 

For example:

  • Laptop?
  • Desktop?
  • Smartphone?
  • Tablet?
  • Input devices?
  • Output devices?
  • What are you required to carry with you?
  • What are you required to have in your car? 
  • What are you required to have at home? 
  • Other technology? 

Also include the names of common software applications used in your future career and their purpose.  

Formatting (and other important directions):

  • A minimum of 250 words per section (titles, page numbers, your name, etc. do not count towards the minimum number of words) 
  • Use MS Word
  • Use Times New Roman font, 12 pt. and 1″ inch margins (top, bottom, left and right)
  • Use single spacing
  • Insert a page break between sections
  • Cite your credible resources using APA format

 

Second homework :

Assignment #6: Choosing Technology to Meet a Need

Identify a need where technology can help (school, work, hobby, etc.).

Go shopping (online) – don’t buy anything, you’re just looking around!

Add hardware and software to the shopping cart that you feel will meet the need(s) you have identified.

Describe, in your own words, why you believe the hardware and software in your shopping cart will meet your need(s).

You should address why the processor, primary storage (RAM / Memory), secondary storage (e.g., hard drive, optical drive, flash memory, etc.) and video (or other output devices) will meet the identified need. 

Describe why you selected the apps/application/software, along with any other deciding factor (e.g., input devices, size, weight, etc.).

In summary, your paper is to have three sections:

Section 1:  A paragraph stating your need. 

Section 2:  A copy of your shopping cart (don’t worry about formatting, I should be able to decipher it).

Section 3:  In your words, state why you believe the hardware and software you have chosen in section (2) will meet the need you identified in section (1). Be sure to include any additional factors you included as part of your decision (e.g., input devices, size, weight, etc.).

Formatting (and other important directions):

  • A minimum of 100 words for section (1)
  • A minimum of 250 words for section (3)
  • Note: titles, page numbers, your name, etc. do not count towards the minimum number of words requirement 
  • Use MS Word
  • Use Times New Roman font, 12 pt. and 1″ inch margins (top, bottom, left and right)
  • Use single spacing
  • Insert a page break between sections
  • Submit via MoodleISU

Websites that can help in this assignment:

Dell and Apple provide discounts to faculty, students and staff. Here is a link to ISU’s Purchasing Computer Pricing page.

http://www.isu.edu/purchase/ComputerPricing.shtml

You may choose “personal purchases” from either Apple or Dell or choose any other vendor/manufacturer (from this site or any other of your choosing).

The following are some links that should be helpful when choosing a processor, memory, hard drive, video, and optical drives (regardless of manufacturer).  Look for “help me choose” or similar link for each of the configurable items. You should be matching your choice on any configurable item to your needs.  Be sure to look at the “recommendation” links on the following sites or on any “help me choose” link.

Processor: http://www.dell.com/learn/us/en/19/help-me-choose/hmc-processor-lt-anav?

Memory: http://content.dell.com/us/en/home/d/help-me-choose/hmc-memory-consumer-anav.aspx

Hard Drive: http://content.dell.com/us/en/home/d/help-me-choose/hmc-hdd-desktop-consumer.aspx

SSD Hard Drives (Crucial Technology): http://www.crucial.com/usa/en/storage-ssd-buying-guide

SSD Hard Drives (Intel): http://www.intel.com/content/www/us/en/solid-state-drives/ssd-help-me-choose.html

Video: http://content.dell.com/us/en/home/d/help-me-choose/hmc-video-card-anav.aspx

Optical: http://content.dell.com/us/en/home/d/help-me-choose/hmc-optical-drives.aspx

How much storage capacity do I need? 

Assignment 1: Organizations – Business Process Redesign at the Small Business Administration

In a November 30, 2001 report to congressional requesters, the General Accounting Office (GAO) outlined the need for a thorough evaluation of the potential use of the software before developing and contracting for the loan monitoring system, the SBA needed. The SBA agreed to do so (see http://www.gao.gov/new.items/d02188.pdf).

In July 2004, Inc.com reported that … monitoring system that can help it oversee a portfolio of $45 billion in loans. Now it needs to lay out exactly how it is going to use it, says Senator Olympia Snowe, chair of the Senate Committee on Small Business and Entrepreneurship. In 2003, the Small Business Administration (SBA) awarded a contract to Dun & Bradstreet to provide the agency with a loan monitoring service to help it assess and manage risk associated with its borrowers and lenders. The GAO reviewed the service, at Senator Snowe’s request, and reported that the service was on par with those used by private sector lenders, but that the SBA did not have policies in place to use it to fulfill the agency’s needs. Snowe pushed the SBA to develop those policies.

SBA’s new Disaster Credit Management System (DCMS) was launched in November 2004 and faced its first critical test in the fall of 2005, when the nation was hit with some major hurricanes in 2005, including Katrina, the costliest hurricane with an estimated cost of $35 billion. SBA was (and still is) swamped with loan applications as is the Small Business Administration Disaster Credit Management System Support.

In July 2006, GAO issued a report evaluating the following:

  • Factors affecting SBA’s ability to provide timely disaster assistance
  • Actions SBA took after the disasters to improve its response to disaster victims (see Report GAO-06-860 at http://www.gao.gov/new.items/d06860.pdf)

Use the above links, the material in the textbook, Argosy University online databases, and the Web to address the following questions:

  1. What was wrong with the existing loan management system and why did SBA decide to replace it in 2004?
  2. In what other ways could the agency use information systems to improve the process of loan application, approval, and maintenance?
  3. Go to the SRA, Inc. Web site (http://www.sra.com/) and identify the features of the company’s software used by SBA (http://phx.corporate-ir.net/phoenix.zhtml?c=131092&p=irol-newsArticle&ID=616444&highlight=)What other features should SBA think of using?

Your response should be a 2–3 page Microsoft Word document, double spaced, and in 12 point Times New Roman or New Courier font. All written assignments and responses should follow APA rules for attributing sources. Be sure to cite the references you used.

risk assessment ..no turn it in issues

Technical Paper: Risk Assessment

Due Week 10 and worth 160 points

Technical Paper Diagram

 

Global Finance, Inc. Network Diagram

Above is the Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth.

 

GFI’s network has historically been fairly stable, and the company has not experienced many full scale network outages. GFI has hired three (3) network engineers to keep up with the network growth, as well as the bandwidth demand by the company employees and the clients. However, the company has not hired any security personnel who can take care of the operational security responsibility.

 

The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has experienced DoS network attacks twice this year, and its Oracle database and email servers had been down for a total of one (1) week as a result. The recovery process required GFI to utilize $25,000 to restore its operations to the normal operating baseline. GFI estimated the loss from these network attacks at more than $1,000,000, as well as lost customer confidence.

Write an eight to ten (8-10) page formal risk assessment proposal in which you:

  1. Describe the company network, interconnection, and communication environment.
  2. Assess risk based on the GFI, Inc. network diagram scenario. Note:Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will utilize this risk assessment to determine what actions to take; therefore, it must be comprehensive for the business leaders to make data-driven decisions.
    1. Defend your assumptions where pertinent information from the scenario isn’t available.
    2. Ascertain apparent security vulnerabilities, and analyze at least three (3) such vulnerabilities. Such analysis should entertain the possibility of faulty network design. Recommend mitigation processes and procedures for each of the identified vulnerabilities.
    3. Justify your cryptography recommendations, based on security concerns and requirements, data-driven decision-making, and objective opinions.
  3. Examine whether your risk assessment methodology is quantitative, qualitative, or a combination of these, and discuss the main reasons why you believe that the methodology that you utilized was the most appropriate.
  4. Explain the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration.
  5. Using Microsoft Visio or its open source equivalent, redraw the CFI diagram, depicted as a secure and risk-mitigating model. Note: The graphically depicted solution is not included in the required page length.
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an open source alternative such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

 

  • Evaluate an organization’s security policies and risk management procedures, and its ability to provide security countermeasures.
  • Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities.
  • Explain access control methods and attacks.
  • Describe the details and the importance of application security models and their implementation from a management perspective.
  • Evaluate and explain from a management perspective the industry-standard equipment, tools, and technologies organizations can employ to mitigate risks and thwart both internal and external attacks.
  • Use technology and information resources to research issues in security management.
  • Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.

Homework

Discuss one (1) project where you used a problem-solving approach to address what turned out to be common-cause variation, or where you used a process improvement approach to deal with a special cause.

If you do not have a personal experience that echoes either of these situations, you may use Internet to search for a case that reflects either of these situations.

Examples:

·                     one’s personal investment strategy since 2008

·                     reducing waiting times at the local hospital or emergency room

·                     reducing difficulties trying to connect to a Wi-Fi Internet provider

 Answer the following questions in the space provided below:

1.     Describe the experience in the project.

2.     What were the solutions used to address the problem?

3.     Was the case you described a special-cause or common-cause?

4.     Do you feel the solution or approach used appropriate for the cause?

5.     What would you do if you could do it again?

6.     What conclusions can you draw from the problem-solving or process-improvement techniques?

7.      

Note: You may create and / or make all necessary assumptions needed for the completion of this assignment. In your original work, you may use aspects of existing processes from either your current or a former place of employment. However, you must remove any and all identifying information that would enable someone to discern the organization(s) that you have used.

Deliverable 4 – Project Risk

 

Competency

Analyze approaches to project risk management techniques used to assess and control project risk.

Scenario Information

AYou are assuming the role of the project manager for a company called SuperPacks to provide a new backpack product with a built-in refrigeration pouch and radio module. Your customer for this project is the U.S. Army, Ground Forces and Special Operations. As the project manager for your team, you will be submitting to your manager a project management report.

Instructions

 

Risk Matrix

As a project manager for this company, you are to analyze the risks associated with the project. Risks should be identified and defined as cost, probability, impact, and mitigation plans for each risk. Below, you are to provide a risk assessment for the project based on the criteria and template provided.

  • Identify and name at least three risks and name them (risk name).
  • Determine the expected costs for each named risk.
  • Determine the risk probability for each named risk.
  • Include factored risk value (should automatically calculate using the Risk Assessment Matrix template).
  • Determine the risk impact to project (using the drop-down menu in the Risk Assessment Matrixtemplate).
  • Provide the Risk Mitigation Plan.
  • Provide the expected risk retire date (when the risk is no longer a risk).

    

Please help with my homework. I need a good grade! Please use the Risk Assessment Matrix template to do my homework! Thank you so much!

Assignment

Imagine that you own a small, local clothing store along the Jersey Shore boardwalk and decide that you want to engage in e-Commerce.

 

Write a 4-5 page paper on the following:

 

    Identify the advantages and disadvantages of taking your small business online by performing a SWOT analysis. Include 2-4 items in each category.

    Because the Internet connects computers all over the world, any business that engages in e-Commerce instantly becomes an international business. The key issues that any company faces when it conducts international commerce include trust, culture, language, government, and infrastructure. Explain how you would address each of these issues.

    Businesses that operate on the Web must comply with the same laws and regulations that govern the operations of all businesses, but they face 2 additional complicating factors as they try to comply with the law. First, the Web extends a company’s reach beyond traditional boundaries. Second, the Web increases the speed and efficiency of business communications. Explain how you would overcome these complicating factors that come with e-Commerce in order to comply with the law.

    Law enforcement agencies have difficulty combating many types of online crime. Describe 2 online crimes prevalent in e-Commerce and what you would do to prevent these crimes.

 

Your assignment must:

 

    Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

    Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

The specific course learning outcomes associated with this assignment are:

 

    Identify the basic elements of the technology infrastructure used to conduct electronic business.

    Explain the basic communications and network concepts used in electronic commerce and the basic functioning of the Internet and the World Wide Web.

    Describe the critical legal and ethical issues related to electronic commerce.

 

    Use technology and information resources to research issues in fundamentals of e-business.

    Write clearly and concisely about fundamentals of e-business using proper writing mechanics.

 

Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric.

 

 

Points: 200

 

 

Assignment 1: Starting a Business Online, Part 1

 

Criteria

 

 

 

 

Unacceptable

Below 60% F

 

 

Meets Minimum Expectations

60-69% D

 

 

 

 

Fair

70-79% C

 

 

 

 

Proficient

80-89% B

 

 

 

 

Exemplary

90-100% A

 

1. Identify the advantages and disadvantages of taking your small business online by performing a SWOT analysis. Include 2-4 items in each category.

Weight: 25%

 

 

Did not submit or incompletely identified the advantages and disadvantages of taking your small business online by performing a SWOT analysis; did not include 2-4 items in each category.

 

 

Insufficiently identified the advantages and disadvantages of taking your small business online by performing a SWOT analysis; insufficiently included1- 2 items in each category.

 

 

 Partially identified the advantages and disadvantages of taking your small business online by performing a SWOT analysis; partially included 1-4 items in each category.

 

 

Satisfactorily identified the advantages and disadvantages of taking your small business online by performing a SWOT analysis; satisfactorily included 2-4 items in each category.

 

 

Thoroughly identified the advantages and disadvantages of taking your small business online by performing a SWOT analysis; thoroughly included 2-4 items in each category.

 

2. Explain how you would address each of the international commerce issues.

Weight: 25%

 

 

Did not submit or incompletely explained how you will address each of the international commerce issues.

 

 

Insufficiently explained how you will address each of the international commerce issues.

 

 

Partially explained how you will address each of the international commerce issues.

 

 

Satisfactorily explained how you will address each of the international commerce issues.

 

 

Thoroughly explained how you will address each of the international commerce issues.

 

3. Explain how you would overcome these complicating factors that come with e-Commerce in order to comply with the law.

Weight: 20%

 

 

Did not submit or incompletely explained how you would overcome these complicating factors that come with e-Commerce in order to comply with the law.

 

 

Insufficiently explained how you would overcome these complicating factors that come with e-Commerce in order to comply with the law.

 

 

Partially explained how you would overcome these complicating factors that come with e-Commerce in order to comply with the law.

 

 

Satisfactorily explained how you would overcome these complicating factors that come with e-Commerce in order to comply with the law.

 

 

Thoroughly explained how you would overcome these complicating factors that come with e-Commerce in order to comply with the law.

 

4. Describe 2 online crimes prevalent in e-Commerce and what you would do to prevent these crimes.

Weight: 20%

 

 

Did not submit or incompletely described 2 online crimes prevalent in e-Commerce and what you would do to prevent these crimes.

 

 

Insufficiently described 2 online crimes prevalent in e-Commerce and what you would do to prevent these crimes.

 

 

Partially described 2 online crimes prevalent in e-Commerce and what you would do to prevent these crimes.

 

 

Satisfactorily described 2 online crimes prevalent in e-Commerce and what you would do to prevent these crimes.

 

 

Thoroughly described 2 online crimes prevalent in e-Commerce and what you would do to prevent these crimes.

 

5. Clarity and writing mechanics

Weight: 10%

 

 

More than 8 errors present

 

 

7-8 errors present

 

 

5-6 errors present

 

 

3-4 errors present

 

 

0-2 errors present

MGMT440-1603B-02

You met with your department manager, a few of the stakeholders, and the sponsor last week to review the list of possible risks. They accepted most of your risks and agreed that the next step was the assessment. There was some confusion, however, over how that step should be completed. Apparently, a prior project manager did a poor job with risk assessment and felt that it was an unnecessary activity. This resulted in the project encountering several risks and always being in fire-fighting mode. Several of the stakeholders (who were impacted most by this mode) want a much more formal approach taken to risk assessment (as does the CEO).

Assignment Guidelines:

You have scheduled a risk assessment meeting for later this week. Create a pre read document for the meeting participants that will walk them through how you will run the meeting and what they should prepare in advance.

In your 3–4 page document, be sure to address the following:

  • Who will you involve? (number of people, roles, and project responsibilities)
  • How will you manage the group?
  • What is your process for assessing the risks? What techniques will you use?
  • Where will you start?

In preparation for the meeting and to help you focus on the upcoming task, review your list of risks. Practice the various techniques you will use by assessing at least 15 of your risks. Create a grid for this activity. Use a qualitative method to identify the high-priority and low-priority risks. Provide a rationale for your responses. Then, using a semi-quantitative method, create a risk score and probability/impact matrix for the remaining risks. The columns should be organized as follows:

  • Risk event
  • Probability
  • Rationale for probability
  • Impact
  • Rationale for impact
  • Next steps (describe what you need to do with this risk event next: nothing, further analysis, or determine actions)

Your submitted assignment (140points) must include the following:

  • A 3–4 page typed pre read document
  • A grid assessing the risks you had outlined in Unit 1 formatted to the requirements listed above

MIS 567 Research paper Outline For Madam-professor

 

MIS567 Research Project Final Paper Assignment: Topic Selection (ungraded, but required)

Review and research the possible topic choices. Choose your research paper topic and upload it via the Week 2 Dropbox titled “Topic Selection.” Your topic choice will be reviewed, and you will receive feedback and/or approval of your topic choice. You do not have to select one of the listed topics. If there is a healthcare information technology topic that you would like to write about that is not listed, let the instructor know. The appropriateness of the topic will be evaluated against the TCO(s) your paper is intended to address.

Possible Paper Topics

Assignment: You have been asked by the executive committee of your healthcare facility to write a report on the strategic implications of information technology for your firm in the next three years. The executive committee has identified a number of potential research topics.

For your convenience, below is a list of possible topics for you to consider. If you have any questions, do not hesitate to ask. If there is not a topic listed here that you would like to research and write about, contact your instructor so that the appropriateness (TCO[s] related, broad enough, etc.) of your topic can be assessed.

  • Electronic health record
  • Computer-based patient record (CPR)
  • E-health
  • E-commerce in healthcare
  • Implementing telemedicine
  • Clinical quality management
  • The use of personal digital assistants in healthcare

Corporate Applications

  • Clinical information systems
  • Enterprise systems in the healthcare setting
  • Clinical decision support systems
  • Expert systems
  • Artificial intelligence applications in healthcare
  • Implementing healthcare information systems
  • The use of the Internet in healthcare
  • Executive support systems
  • Transaction processing systems
  • Knowledge management systems
  • Groupware
  • Intranets

Research Paper Outline (Due Week 3)

Back to Top

Once you begin your research, you will need to create an outline describing how your paper will be presented. Your outline should include (but not be limited to) the following:

  1. Abstract
  2. Purpose of the Report
  3. Background of the Topic
  4. Discussion of Current Issues
  5. Recommendations based on research
  6. Attachments

Submit your outline in the Week 3 Dropbox titled “Outline.”

Week 3 due March 23—Research Project Draft Outline: Please post your outline for your final paper in the (graded) Final Paper Dropbox titled “Outline”.  (See grading rubric in Doc Sharing)  Again, do not forget the APA requirements.  The body of the paper should be your outline, in indented form or sentence-form, the purpose of which is to organize the information you are beginning to find in your research.  In-text citations are not required at this step (except for direct quotations).  Your reference section will include your initial references and any additional references you have used in developing the outline.