CIS 336 – Enterprise Architecture

Discussion 1

“Social Information Technology (IT) and Business Frameworks”  Please respond to the following:

  • Consider collaboration as one of the social IT categories in which Facebook, LinkedIn, blogs, and Twitter are used to extend the reach of stakeholders and employees. Determine at least three business functions that could be used by this social IT. Predict possible problems that you foresee.
  • The Leavitt Business Diamond framework consists of four crucial components. Suppose we added an IS / IT component that sits in the middle of the diamond, thus creating a variation of the framework. Examine five relationships that the IS / IT components could facilitate between the other four components. Determine which relationship would be the strongest and which one would be the weakest. Support your reasoning.

 

Discussion 2

“Resources Frameworks and Plenitude” Please respond to the following:

  • One might argue that value is not always realized when using resource-based view (RBV) framework, especially when considering the IT infrastructure and Information Repository. Determine whether you agree or disagree with this viewpoint. Provide three examples to support your position.
  • From the video this week, determine five other IT resources within an organization that could be modeled in quantifiable terms that show value (i.e., software). Propose a model for one of the resources.

 Duscussion 3

“Organization Structures” Please respond to the following:

  • Suppose that you were creating a new global organization. The new organization will provide Information Technology (IT) infrastructure consulting services, computer security consulting services, and cloud computing consulting services. Determine whether you would employ a hierarchical, a flat, or a matrix organizational structure, and explain why.
  • From the video this week, propose how issues with hierarchical and flat structures should be resolved.

Discussion 4

 “Results-Only Work Environment (ROWE) and Instant Messaging (IM)” Please respond to the following:

  • Suppose you worked for a company that uses ROWE. Predict whether you would be more productive or less productive, and explain why.
  • IM applications like Microsoft’s Lync, Microsoft Instant Messenger, and Yahoo Instant Messenger are being used in some organizations to facilitate communication between employees. Determine whether you believe IM improves or hinders employee productivity. Support your rationale with an explanation.

Discussion 5

 “Agility and  Business Process Management (BPM)” Please respond to the following:

  • Suppose that an organization did not use processes that were designed and built to be agile, particularly when it comes to IS / IT technologies. Predict the impact of environmental changes on an organization financially, socially, and in terms of survivability.
  • A BPM model may help manage and streamline IT processes that are otherwise manually executed. Examine one enterprise manual process (i.e., purchase order approval) and propose two BPM models that would replace the process. Determine the IT resources that you would employ to automate the process (i.e., electronic documents instead of paper documents).

Discussion 6

“The Impact of Crowdsourcing” Please respond to the following:

  • Dell’s Ideastorm, Best Buy’s IdeaX, New York City’s Simplicity, and Samuel Adams’ Facebook application to determine the next flavor of beer are a few of the examples that use crowdsourcing. From this week’s video, assess whether ideasourcing generates the best innovative ideas for a business or organization. Explain why or why not. 
  • Suppose that you recently acquired a considerable amount of money and want to invest in some type of business. Determine whether or not you would use crowdsourcing to determine the type of business you invest in. Predict whether the use of crowdsourcing to select your type of business would be disastrous or advantageous, and explain why or why not.

 

Assignment: Models for Competitive Dynamics

Competition has, since the 90s, led to wider gaps between industry leaders and laggards. There are more “winner-take-all” environments and greater churns among industry sector rivals. We have witnessed sharp increases in quality and quantity of IT (Information Technology) investments. We’ve seen striking competitive dynamics, particularly in sectors that spend the most on IT. Some of the competitive dynamics models include the Destroy Your Business (DYB) strategy, the Grow Your Business (GYB) strategy, the Information Systems (IS) and strategic advantage, and the social business strategy.

Write a four to five page paper in which you:

  1. Compare and contrast the DYB and GYB strategies in terms of the ability to sustain a business in the marketplace over the long term, to be competitive against rivals, and profitability.
  2. Examine the “cannibalization” strategy and determine if it is or is not a better strategy compared to the DYB strategy for growth, competitiveness, and market leadership. Provide two business examples.  
  3. Determine whether or not changes in business strategy should entail reassessment of IS. Provide three reasons to support your position.
  4. Examine how firms can use social IT in alignment with organizational strategy and IS strategy. Consider collaborative capabilities; and what, how, and who should use social IT for a social business strategy.
  5. Use at three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Demonstrate an understanding of the integration of enterprise systems with inter-organizational partners.
  • Use technology and information resources to research issues in enterprise architecture.
  • Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions. 

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

subject:buscontrol plan discussion-4

 

Week 4 Discussion

According to your textbook, Chapter 6, what are the eight (8) steps or stages that should be followed when building your CSIRT? (10 points). For each step, how would you build a CSIRT for your school? (10 points).  According to your Textbook, in no more than three (3) sentences each, define your CSIRT’s Mission, Two (2) Goals, and Two (2) Objectives  

Post response format:

 Part 1. Eight (8) steps or stages  in Building the CSIRT are:

Step 1: Obtain management support and buy-in

Step 2: ……..

Step 3.

Step 4.

Step 8. 

Part 2. For each of the steps, I will do the following things:

Step 1. Obtain management support and buy-in

  •             Invite all of the top management for a face-to-face meeting to obtain buy-in
  •             Provide Top Management with a list of CSIRT objectives 
  •             Persuade Top management to participate 

Step 2. Determining the CSIRT Strategic Plan

  • Establish a CSIRT structure and team Model

Part 3.  define your CSIRT’s Mission, list two (2) Goals, and Two (2) Objectives

The Mission of my CSIRT is to 

Two goals of my CSIRT are:

 Goal 1 –

Goal 2 –

Two of my CSIRT Objectives are:

Objective 1 –

Objective 2 –

DQ requirement: Note that the requirement is to post your initial response no later than Thursday and you must post one additional post during the week. I recommend your initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference

below i am attaching the ppts of chapter-6 so u can look the document and prepare for discussion-4

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

For Essays Guru – Database and Data Warehousing Design

This assignment consists of two (2) sections: a design document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

One of the main functions of any business is to be able to use data to leverage a strategic competitive advantage. This feat hinges upon a company’s ability to transform data into quality information. The use of relational databases is a necessity for contemporary organizations; however, data warehousing has become a strategic priority due to the enormous amounts of data that must be analyzed along with the varying sources from which data comes. Since you are now the CIO of a data-collection company which gathers data by using Web analytics and operational systems, you must design a solution overview that incorporates data warehousing. The executive team needs to be clear about what data warehousing can provide the company.

Section 1: Design Document

  1. Write a four to six (4-6) page design document in which you:      
    • Support the need for data warehousing within your company and elaborate on the best practices that the company will adhere to.
    • Create a schema that supports the company’s business and processes. Explain and support the database schema with relevant arguments that support the rationale for the structure. Note: The minimum requirement for the schema should entail the tables, fields, relationships, views, and indexes.
    • Create an Entity-Relationship (E-R) Diagram relating the tables of your database schema through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix. Explain your rationale behind the design of your E-R Diagram.
    • Create a Data Flow Diagram (DFD) relating the tables of your database schema through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.
    • Illustrate the flow of data including both inputs and outputs for the use of a data warehouse. The diagram must map data between source systems, data warehouses and specified data marts. The diagram should map data between source systems, data warehouses, and specified data marts. Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in MS Visio or Dia as an appendix of the design document. All references to these diagrams must be included in the body of the design document.

Section 2: Revised Project Plan

Use Microsoft Project to:

  1. Update the project plan from Project Deliverable 2: Business Requirements, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.

The specific course learning outcomes associated with this assignment are:

  • Summarize how information systems represent a key source of competitive advantage for organizations.
  • Develop information systems-related activities to maximize the business value within and outside the organization.
  • Use technology and information resources to research issues in information systems.
  • Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

$20.00 Need in 8 Hours 2-3 pages CIS517 Week 4 Literature Review

  

· Literature Review – Submit Here

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Literature review for the term paper: Project Managers and Leadership, Ethics, and Technology

Due Week 4 and worth 100 points

This assignment a document to be delivered in a word processor document format. Write a two to three (2-3) page paper covering:

1. The context of your paper.

2. The contribution of the paper to the Literature.

3. The gap in the Literature.

Overview

This is one of the most important steps to help you prepare for the term paper. The goal for the literature review is to understand what is already published about Project Managers and Leadership, Ethics, and Technology. You should use the library for this assignment extensively. The literature review should include the following parts.

Context of your outline. You need to explain the context of the points in your outline using the perspectives presented by the literature. You should expect several cited sources to appear here.

Contribution of the paper to the Literature. You need to explain how your paper contributes to the literature surrounding your outline.

Explain how you expect the paper to contribute knowledge and insight into the context supporting the topic. Remember, every topic has supporting context—without it, you do not have the people and processes allowing the topic to exist. So, make sure you have a contribution as to help others enhance their understanding of the topic.

Gap in the Literature. Explain how your paper fills in a missing segment (or gap) in the literature. Your unique perspective will contribute something new. Describe that niche here and how it helps build upon previous literature. 

Your assignment must follow these formatting requirements:

· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

· Describe and demonstrate ethical practices in project management.

· Examine the human resource factors that can impact project management.

· Use technology and information resources to research issues in IT project management.

· Write clearly and concisely about issues in IT project management using proper writing mechanics and technical style conventions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion question with 500 words – 250 words in each topic with no plagarism with references

1. Explain the evolution of Internet Governance and why the shift to private control was needed? What are the challenges facing a potential threat from the internet with examples? Explain the future of Internet Governance?

2. What are the challenges with internet posed and how to control them? Have these steps been affecting in controlling the threat situation? What can possibly be done to control the situation?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

NACM DISCUSSION-1 W-2

 

Your state has a forthcoming referendum concerning no smoking in public places including bars and restaurants. Follow the ten steps on page 137 on negotiation planning. 

   

Required Course Material 

Negotiation, Lewicki, Barry, & Sanders, McGraw -Hill, 7th Edition (2015)   ISBN 978-0- 07-802944-9 

 Requirements (please read)

 For each discussion, you are required to write an initial post (300 words). For your initial post, you must have two academic peer-reviewed articles for references.  You must get them from the library.  

 

  • All discussions must  in-text citations and references in APA style formatting. If you do not use in-text citations or they are not in APA format you will lose 3 points.  If you do not have references or if they are not in APA format, you will lose 5 points.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Crime Prevention Through Environmental Design (CPTED)

 Hello,

Crime Prevention Through Environmental Design (CPTED) is defined as a multi-disciplinary approach to deterring criminal behavior through environmental design. CPTED strategies rely upon the ability to influence offender decisions that precede criminal acts by affecting the built, social and administrative environment.

Write two pages using proper APA format describing what is the field of Crime Prevention Through Environmental Design (CPTED) and identify some of the strategies that deter crime in urban communities.

  • Title Page
  • Abstract
  • Body (2 pages)
  • Conclusion
  • References Crime Prevention Through Environmental Design (CPTED) 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

operating system

 

Operating System

Preparation

Your boss has tasked you with installing and maintaining an operating system for a new employee. You will be re-using a computer formerly used by someone who just quit. Therefore, you will need to rebuild the operating systems and applications.

Instructions

For this assignment, write a 4–5 page report to your boss describing the procedures on how to install and configure an operating system. Include the following information:

  • Describe basic operating system tools.
  • Describe how to install, configure, and personalize an operating system.
  • Describe how to perform basic application management and system monitoring tasks from within an operating system.

Refer to the Operating System Scoring Guide to ensure that you meet the grading criteria for this assignment.op

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS 498 Project Deliverable 4: Infrastructure and Security

 

Project Deliverable 4: Infrastructure and Security

Due Week 8 and worth 150 points

This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

The last section of the project plan will present the infrastructure in accordance with the parameters set forth at the outset of the project. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy. CIA is a widely used benchmark for evaluation of information systems security.

Section 1: Infrastructure Document

1. Write a five to ten (5-10) page infrastructure document in which you:

a. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

b. Illustrate the possible placement of servers including access paths to the Internet and firewalls. Note: Facility limitations, workstations, printers, routers, switches, bridges and access points should be considered in the illustration.

c. Explain the rationale for the logical and physical topographical layout of the planned network.

d. Create a comprehensive security policy for the company that will:

i. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity and availability of information.

ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

Section 2: Revised Gantt Chart / Project Plan

Use Microsoft Project or an open source alternative, such as Open Project, to:

2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 3: Database and Programming Design, with all the project tasks.

The specific course learning outcomes associated with this assignment are:

  • Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations.
  • Evaluate the issues and challenges associated with information technology integration.
  • Evaluate the ethical concerns that information technology solve or present in a global context.
  • Use technology and information resources to research issues in information technology.
  • Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric found here.

My Original project was based on a company named bicycle trader which essentially was very similar to “Ebay” in its function, if that’s relevant.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS 498 Project Deliverable 4: Infrastructure and Security

 

Project Deliverable 4: Infrastructure and Security

Due Week 8 and worth 150 points

This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

The last section of the project plan will present the infrastructure in accordance with the parameters set forth at the outset of the project. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy. CIA is a widely used benchmark for evaluation of information systems security.

Section 1: Infrastructure Document

1. Write a five to ten (5-10) page infrastructure document in which you:

a. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

b. Illustrate the possible placement of servers including access paths to the Internet and firewalls. Note: Facility limitations, workstations, printers, routers, switches, bridges and access points should be considered in the illustration.

c. Explain the rationale for the logical and physical topographical layout of the planned network.

d. Create a comprehensive security policy for the company that will:

i. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity and availability of information.

ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

Section 2: Revised Gantt Chart / Project Plan

Use Microsoft Project or an open source alternative, such as Open Project, to:

2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 3: Database and Programming Design, with all the project tasks.

The specific course learning outcomes associated with this assignment are:

  • Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations.
  • Evaluate the issues and challenges associated with information technology integration.
  • Evaluate the ethical concerns that information technology solve or present in a global context.
  • Use technology and information resources to research issues in information technology.
  • Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric found here.

My Original project was based on a company named bicycle trader which essentially was very similar to “Ebay” in its function, if that’s relevant.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now