Categories
Information system

Discussion Module 13

 

Elon-Musk donated $10 million to a foundation called the Future of Life Institute.  The institute published an open letter from an impressive array of AI experts who call for careful research into how humanity can reap the benefits of AI “while avoiding its pitfalls.”  Go online and find out about the institute’s initiatives.  What are its primary goals?  How can humans establish and maintain careful oversight of the work carried out by robots?  How valid are Elon Musk, Bill Gates, and Stephen Hawking’s concerns?  What other concerns should the public bear in mind as the technological revolution advances?

Sources:  Future of Life Institute.  http://futureoflife.org

Categories
Information system

INFO TECH Discussion

 After you have read Chapter 5 and listened to the Chapter 5 lecture read Case Study 5-2 Boeing 787 Dreamliner. Answer question 4.  If you were the program manager, what would you have done differently to avoid the problems faced by the Dreamliner program? 

Categories
Information system

CS – Action Learning

  Assessment Instructions

If you have not yet done so, read the Integrated Action Learning Project description linked in the Resources under the Required Resources heading.

For this assessment, complete a self-assessment narrative, develop a lifelong learning and development plan for a selected IT profession, and write a summary that describes action learning. Self-Assessment

Your self-assessment should represent a thorough assessment of what you offer when it comes to your project, as well as how personal factors might affect the success of your project. The result of your self-assessment should be a one- to two-page narrative that describes you as the person who is at the center of the integrated action learning project. If others were to read your narrative, they should be able to get an idea of who you are, what kind of leader you are, and how you fit into the overall project. You may want to consider personal aspects such as the following: Relevant work experience. Coursework in this program. Career goals. Special training or education. Strengths and weaknesses. Beliefs about leadership. Beliefs about change. Beliefs about communication. Beliefs about lifelong learning. Additional information that may affect the success of your project. Lifelong Learning and Professional Development Plan

Lifelong learning is the key to your continued growth and success within your IT profession. Look over the list below of possible ways to continue your professional development and lifelong learning. This list is not exhaustive. How do you plan to continue your learning and development after you graduate from this program? Why do you see it as important? Develop a lifelong learning and professional development plan for a selected IT profession. Take ownership for one’s own personal and professional status and growth. Define personal professional goals that support lifelong productivity and satisfaction. Regularly self-assess personal growth and challenges to achieving personal goals. Achieve development planned to reach personal goals. Seek out mentors to support and challenge future growth and development. Be active in professional organizations and groups. Pursue additional education and possibly higher degrees (Davis & Beyerlein, 2005). Action Learning

How would you define “action learning”? As the person in charge of your IAL project, what is your role in the action learning process? Consider the following, and write a summary in which you describe “action learning” and the role a project leader plays in it. Communication: How have you used business communication and tools in developing the project proposal? Decision Tools: What IT tools have you used in developing the proposal and in collaborating during the planning process? Collaboration: Reflect on the role of collaboration in developing your proposal. Who did you work with to accomplish the planning in the environment, and how did your connection with them help shape your proposal? How has feedback from your site supervisor or critical friend contributed to the development of your proposal? Reflective Learning: Consider the value that your educational and personal background brought to the process. (See your self-assessment.) How has your learning process in your program at Capella contributed to your approach to developing your final project proposal? How have other aspects of your background helped or potentially hindered your work on this proposal? What lessons have you learned from this process that you would apply to future planning pursuits in your field? Reference ==> Attached ( ExpertProfile090905 ) 

Davis, D. C., & Beyerlein, S. W. (2005). Development and use of an expert profile. Retrieved from http://www.ee.uidaho.edu/ee/power/jlaw/COURSES/CAPSTONE/F05DEVELOPMENT/RESOURCES/ExpertProfile090905.pdf

Categories
Information system

Verifying Integrity of a Download

 

Verifying Integrity of a Download

In this assignment you will verify that a file you download has not been changed during download.

Go to the site https://www.openoffice.org/download/index.html.

Note that there two download options: “Download full installation” and “Download language pack.”

Because you will work only with the hash values in this exercise, please download the smaller file for the sake of time (i.e., download the “language pack” file).

Use an online hash calculator to calculate the MD5 and SHA256 hashes for the downloaded file. You can use https://md5file.com/calculator.

Copy these values into a Word file. Take a screenshot.

Go back to the site https://www.openoffice.org/download/index.html.

Note that there are links for MD5 and SHA256 hashes of the files on the site.  Click on MD5 for Language Pack. Save it on your computer and open it with Notepad. Take a screenshot of the hash file showing the MD5 hash value.

Do the same for the SHA256 hash value.

Compare these hash values with the ones that you calculated when you downloaded the file. Are they the same?

                                                                                          What to Submit

Copy and paste the three screenshots of the hash values in a Word file. Label them “MD5 calculated,” “MD5 from the site,” etc.

In the Word file, include your answers to the following questions: What is your conclusion if the provided MD5 hash value is the same as the one you calculated? What is your conclusion if the provided MD5 hash value is different from the one you calculated? If the provided hash value is the same as the one you calculated, does that mean that this is absolutely the right file that delivers what it promises, or could it be malicious? Explain. How could a second hash value (such as SHA256, in this case) help to verify the integrity of the download? Explain.

Also, answer the following questions, reflecting on your experience with this assignment: What was the most challenging part of this activity? What was the most enjoyable part of this activity? Do you think you have a good understanding of how hash functions are used for checking the integrity of a download as a result of this activity? Why or why not?

Grading Rubric:

Max. Points

Screenshots of four hash values

20

Answers to questions about hash functions

60

Style

10

Answers to reflection questions

10

Total

100

Categories
Information system

Information Systems See Attachment

 Case Study 1: Transforming the Organization Due Week 5 and worth 175 points Congratulations! The executives are taking your information system proposal seriously. In fact, they think it has the potential to transform the way the organization works. The CIO asked you to read Connelly (2016) to think about what resources you’ll need to get your new information system up and running. Please also review the five case studies in (Basu 2015, p. 32-35) so you can recommend a change management pattern for your company to follow. Write a memo to the CIO that describes how to implement your information system into the organization. Please focus on these topics: 1. How much of the implementation work can you handle? What additional resources (people, information, time, money, etc.) will expedite the process so you don’t end up like Susie Jeffer? 2. Outline a change management strategy: What new equipment and software are necessary? What training and support will the staff need? How will the staff complete their work during the transition period? Do you anticipate other areas of resistance? 3. The CIO is very skeptical, so provide evidence that your assessment is accurate and complete. It can be difficult to admit to personal limitations! Your memo should be 3–5 pages long. References: Basu, K. K. (2015). The Leader’s Role in Managing Change: Five Cases of Technology-Enabled Business Transformation. Global Business & Organizational Excellence, 34(3), 28-42. doi:10.1002/joe.21602. Connelly, B., Dalton, T., Murphy, D., Rosales, D., Sudlow, D., & Havelka, D. (2016). Too Much of a Good Thing: User Leadership at TPAC. Information Systems Education Journal, 14(2), 34-42. CIS 500 – Information Systems for Decision-Making © 2017 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 500 Page 2 of 3 Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 175 Case Study 1: Transforming the Organization Criteria Unacceptable Below 70% F Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. How much of the implementation work are you able to handle? What additional resources (people, information, time, money, etc.) will expedite the process so you don’t end up like Susie Jeffer? Weight: 30% (52.5 points) Inadequate description of strengths and limitations, only described one or the other Limited identification of resources, unclear how resources will expedite process Inadequate connection to the case study Somewhat described strengths and limitations Reasonable resources connected to limitations, info on how process will be expedited Reasonable connection made to the case study Described professional strengths and limitations Identified additional resources needed based on limitations, described how process will be expedited Applied case study lessons learned Identified project risks and scope creep, offered advice on mitigating both Provided thorough understanding of the case study and applied lessons learned to the information system 2. Outline a change management strategy: What new equipment and software are necessary? What training and support will the staff need? How will the staff complete their work during the transition period? Are there other areas of resistance that you anticipate? Weight: 30% (52.5 points) Inadequate explanation of why new equipment needed Did not propose staff training Limited explanation of how staff will continue to work Inadequate anticipation of resistance stated Somewhat explained why new equipment was needed Did not propose staff training Reasonable explanation of how staff continue to work Reasonable anticipation of resistance Explained why new hardware and software are needed Proposed staff training Explained how staff would continue work during transition Anticipated areas of resistance Connected need for change management to business needs Organized structure for staff training on implementation strategy Recommended approaches to address resistance 3. The CIO is very skeptical, so offer evidence that your assessment is accurate and complete. It can be difficult to admit to personal limitations! Inadequate evaluation of alternative assessment Limited explanation of why the Evaluated one alternative assessment Somewhat explained why the alternative Evaluated alternative assessments Explained why alternative assessments are Proposed how to mitigate personal and team limitations Proposed considerations that would interest other  CIS 500 – Information Systems for Decision-Making © 2017 Strayer University. All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS 500 Page 3 of 3 Weight: 30% (52.5 points) alternative assessment is inaccurate or incomplete Limited evidence as to why the assessment is accurate and complete assessment was inaccurate or incomplete Reasonable evidence that the assessment is accurate and complete not as accurate or complete Provided evidence that the assessment is accurate and complete members of the Csuite 4. Clarity, persuasion, proper communication, writing mechanics, and formatting requirements Weight: 10% (17.5 points) Unclear structure, not persuasive, major grammatical errors Somewhat clear structure, limited persuasion, grammatical errors, language too simple or too wordy Clear structure, persuasive writing, minor or no grammatical errors, length and format within requirements, plain language No grammatical errors, plain language, organized by topic, references business needs, connects to technical specs, persuasiv 

Categories
Information system

Mid-term assignment

 YOUR MID-TERM WILL BE (6) pages (excluding references and title page)  about any topic covered in weeks 1-8 from the textbook( the textbook must be one of your sources) From textbook only…that is attached. 

MUST BE APA CORRECT!

MUST HAVE (11) Scholarly references ( except for textbook)

MUST BE 30% or less matching through SafeAssign

YOU ARE NOT ALLOWED TO USE any papers or references that you have used in previous assignments. 

Categories
Information system

theoretical grounds of policy implementation

Identify two scholarly resources that present the theoretical grounds of policy implementation and write a short description of the content presented in the papers in 4-5 sentences. Write the references in APA format.

Categories
Information system

Policy 2

READ THOROUGHLY BEFORE SENDING HANDSHAKE OR BEFORE AGREEING TO DO THIS WORK.

 

Please make sure you use the attached readings links and the assigned Case Study for background information before responding to this discussion question.

 

Review the Week 2 readings and the assigned Case Study for background information before responding to this discussion question.

The company’s IT Governance Board has been tasked with developing a set of policies to address IT security requirements arising from

(a) PCI-DSS (credit card and transaction information)
(b) the HIPAA Security Rule (health related information) 
(c) the “Red Flags” Rule (consumer credit information: identity theft prevention).

Choose one of the three sources of regulatory requirements listed above. Write a three paragraph briefing statement which summarizes the regulatory requirements as they apply to the company’s collection, processing, management, and storage of personal information about its clients. Your briefing statement should identify the specific types of personal information which are covered by the “rule” or “standard.”

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

Please remember it’s a discussion board, after I post them, I will later require four additional replies to other students post. It could be like 4 to 6 sentences.

 

I REPEAT YOU ARE TO USE THE ATTACHED READING LINKS TO ANSWER THIS PAPER. THANK YOU!

 

NO PLAGIARISM IT WILL BE SCANNED!

 

DUE SEPT 2nd

Categories
Information system

Assignment 5

  Week 5 Assignment – Executive Program Practical Connection Assignment

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Categories
Information system

I need help with this cybersecurity case study assignment

Resources for the work are in the link below

 https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf  see chapter 7  Malicious Software and Anti-Virus Software in The InfoSec Handbook 

 https://www.gartner.com/it-glossary/endpoint-protection-platform-epp 

 https://www.pcmag.com/roundup/338257/the-best-hosted-endpoint-protection-and-security-software 

 https://www.gartner.com/reviews/market/endpoint-protection-platforms 

 https://cyber.dhs.gov/assets/report/bod-17-01.pdf