Business Continuty Plan and Disaster Recovery

 How do you identify the potential risk of fire in your organization? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2 discussions and 1 case study and 1 book review

Discussion 5.1

There are several steps in the remote targeting phase.  Which step do you think is the most important?  Why?  Which one do you think is the least important?  Why?

Discussion 5.2

What are some of the wireless tools discussed in the remote targeting phase?  How are they used?  Which one do you think is the most important?  Why?  Which one do you think is least important?  Why?  

Case Study 5.1

Conduct additional research and write a 3 to 4 page paper explaining the steps you would take in Phase III, Remote Targeting.  Make sure you follow the grading rubric and write your paper in APA format. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)

Book Review Chapters 6 & 7 

Write a three to four-page paper, explaining the Information found in Chapters 6 and 7 concentrating on Wireless systems and what hackers know about them.  Make sure you follow the grading rubric and write your paper in APA format. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

BI-20HR

Discussion Question (Chapter-8)

  1. How does prescriptive analytics relate to descriptive and predictive analytics?
  2. Explain the differences between static and dynamic models. How can one evolve into the other?
  3. What is the difference between an optimistic approach and a pessimistic approach to decision making under assumed uncertainty?
  4. Explain why solving problems under uncertainty sometimes involves assuming that the problem is to be solved under conditions of risk.

10.What is the difference between decision analysis with a single goal and decision analysis with multiple goals (i.e., criteria)? Explain the difficulties that may arise when analyzing multiple goals.

Chapter -9

  1. What is Big Data? Why is it important? Where does Big Data come from?
  2. What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be?
  3. What is Big Data analytics? How does it differ from regular analytics?
  4. What are the critical success factors for Big Data analytics?
  5. What are the big challenges that one should be mindful of when considering implementation of Big Data analytics?

Application Case9For these question I have upload the application case read that and answer the question)

Questions for the Opening Vignette

  1. What problem did customer service cancellation pose to AT’s business survival?
  2. Identify and explain the technical hurdles presented by the nature and characteristics of AT’s data.
  3. What is sessionizing? Why was it necessary for AT to sessionize its data?
  4. Research other studies where customer churn models have been employed. What types of variables were used in those studies? How is this vignette different?
  5. Besides Teradata Vantage, identify other popular Big Data analytics platforms that could handle the analysis described in the preceding case. 

Please read below to answer the question for the opening Vignette

A telecom company (named Access Telecom [AT] for privacy reasons) wanted to stem the tide of customers churning from its telecom services. Customer churn in the telecommunications industry is common. However, Access Telecom was losing customers at an alarming rate. Several reasons and potential solutions were attributed to this phenomenon. The management of the company realized that many cancellations involved communications between the customer service department and the customers. To this end, a task force comprising members from the customer relations office and the information technology (IT) department was assembled to explore the problem further. Their task was to explore how the problem of customer churn could be reduced based on an analysis of the customers’ communication patterns (Asamoah, Sharda, Zadeh, & Kalgotra, 2016).

Big Data Hurdles

Whenever a customer had a problem about issues such as their bill, plan, and call quality, they would contact the company in multiple ways. These included a call center, company Web site (contact us links), and physical service center walk-ins. Customers could cancel an account through one of these listed interactions. The company wanted to see if analyzing these customer interactions could yield any insights about the questions the customers asked or the contact channel(s) they used before canceling their account. The data generated because of these interactions were in both text and audio. So, AT would have to combine all the data into one location. The company explored the use of traditional platforms for data management but soon found they were not versatile enough to handle advanced data analysis in the scenario where there were multiple formats of data from multiple sources (Thusoo, Shao, & Anthony, 2010).

There were two major challenges in analyzing this data: multiple data sources leading to a variety of data and also a large volume of data.

  1. DATA FROM MULTIPLE SOURCES: Customers could connect with the company by accessing their accounts on the company’s Web site, allowing AT to generate Web log information on customer activity. The Web log track allowed the company to identify if and when a customer reviewed his/her current plan, submitted a complaint, or checked the bill online. At the customer service center, customers could also lodge a service complaint, request a plan change, or cancel the service. These activities were logged into the company’s transaction system and then the enterprise data warehouse. Last, a customer could call the customer service center on the phone and transact business just like he/she would do in person at a customer service center. Such transactions could involve a balance inquiry or an initiation of plan cancellation. Call logs were available in one system with a record of the reasons a customer was calling. For meaningful analysis to be performed, the individual data sets had to be converted into similar structured formats.
  2. DATA VOLUME: The second challenge was the sheer quantity of data from the three sources that had to be extracted, cleaned, restructured, and analyzed. Although previous data analytics projects mostly utilized a small sample set of data for analysis, AT decided to leverage the multiple variety and sources of data as well as the large volume of data recorded to generate as many insights as possible.

An analytical approach that could make use of all the channels and sources of data, although huge, would have the potential of generating rich and in-depth insights from the data to help curb the churn.

Solution

Teradata Vantage’s unified Big Data architecture (previously offered as Teradata Aster) was utilized to manage and analyze the large multistructured data. We will introduce Teradata Vantage in Section 9.8. A schematic of which data was combined is shown in Figure 9.1. Based on each data source, three tables were created with each table containing the following variables: customer ID, channel of communication, date/time stamp, and action taken. Prior to final cancellation of a service, the action-taken variable could be one or more of these 11 options (simplified for this case): present a bill dispute, request for plan upgrade, request for plan downgrade, perform profile update, view account summary, access customer support, view bill, review contract, access store locator function on the Web site, access frequently asked questions section on the Web site, or browse devices. The target of the analysis focused on finding the most common path resulting in a final service cancellation. The data was sessionized to group a string of events involving a particular customer into a defined time period (5 days over all the channels of communication) as one session. Finally, Vantage’s nPath time sequence function (operationalized in an SQL-MapReduce framework) was used to analyze common trends that led to a cancellation.

Figure 9.1 Full Alternative Text

Results

The initial results identified several routes that could lead to a request for service cancellation. The company determined thousands of routes that a customer may take to cancel service. A follow-up analysis was performed to identify the most frequent routes to cancellation requests. This was termed as the Golden Path. The top 20 most occurring paths that led to a cancellation were identified in both short and long terms. A sample is shown in Figure 9.2.

Figure 9.2 Full Alternative Text

This analysis helped the company identify a customer before they would cancel their service and offer incentives or at least escalate the problem resolution to a level where the customer’s path to cancellation did not materialize.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 13 – Written Work/ Assignment/ Datatronics Case Study

Read the Customer Service at Datatronics Case Study on pages 246-250 in the textbook: IT Strategy: Issues and practices, McKeen, J. D., & Smith, H. A., Pearson, 2015, Third Edition

Answer the Discussion Questions at the end of the Case Study. 

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Can you help with Programming assignment?

 Can you help with Programming assignment? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

What are the factors that influence the selection of access control software and/ or hardware?

What are the factors that influence the selection of access control software and/ or hardware? Discuss all aspects of access control systems.

This discussion should be between 200-to-300 words and it must contain a properly formatted in-text citation and scholarly reference.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

$70 for Database Project, Report and Presentation ..due in 45hrs from now

Deadline is fixed

Will check plag with turnitin

You must be an expert -Its complex

 fundamentals of database design, implementation, management, and  maintenance, including consideration of appropriate data security 

NB. I need a word report and a 7-10 powerpoint of it for my presentation

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database.

Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

please find the 11th list of questions

  • 11.1 List and briefly define three classes of intruders.
  • 11.2 What are two common techniques used to protect a password file?
  • 11.3 What are three benefits that can be provided by an intrusion detection system?
  • 11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection?
  • 11.5 What metrics are useful for profile-based intrusion detection?
  • 11.6 What is the difference between rule-based anomaly detection and rule-based penetration identification?
  • 11.7 What is a honeypot?
  • 11.8 What is a salt in the context of UNIX password management?
  • 11.9 List and briefly define four techniques used to avoid guessable passwords.

Submit a Microsoft Word document under the Homework Submission link.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 5 – Final Paper Strategic Information Technology Plan

 The template needed for this paper is attached along with the other weeks assignments that make up this final paper. The file named Capture is the balanced scorecard needed in the assignment. The file named MGT497 is the template

The weekly written exercises collectively comprise the Strategic Information Technology Plan. Students will each select a business organization which they will refer to for every written exercise. Students will respond to each assignment exercise as it applies to their chosen organization, integrating citations from the text and other scholarly sources. Each weekly assignment exercise should be accompanied by a title page and reference page formatted according to APA style.

Include side headings (also called sub-titles), according to APA style as outlined in the Ashford Writing Center Subtitles improve readability and are important for the reader to see where your paper content aligns with the required content. For instance, in section IV of the Final Paper, you would include the side headings (sub-titles).

  • Identify the IT Strategy to support goals of the organization
    • Service
    • Innovation
    • Security
    • IT Foundation

The first written assignment requires an introductory paragraph about the student’s selected business, its mission, and its immediate management of technology and innovation (M.T.I.) goals. This introductory paragraph should be included in each audit exercise paper submitted in the course.

Focus of the Final Paper

The executive summary is an abbreviated overview of the entire plan, and as such, it should touch upon all major points while engaging the reader. It should make the reader want to read the plan. Students should assume that the target audience is familiar with the computer terminology learned throughout this course.

During Week Five, the student cohesively brings together the weekly written assignments and an executive summary to form an Information Technology Strategic Plan. The student’s business focus for weekly assignments should remain consistent throughout the course. This final paper should be eighteen to twenty pages in length and should incorporate any comments or suggestions made by the instructor on the weekly assignment papers.

Students must use the Information Technology Strategic Plan templatePreview the document provided in the course material.

The Information Technology Strategic Plan sections are:

  • Executive Summary
    • The executive summary is an abbreviated overview of the entire plan, and as such, it should touch upon all major points of the plan while engaging the reader. Students should discuss the various evaluations performed on their chosen organization throughout the course. Students should assume that the target audience is familiar with the computer terminology learned throughout this course.
  • Introduction (Use the Introduction paragraph created for the Week1 Exercise)
    • Name of the organization
    • Organization Mission Statement
    • Industry
    • Specialization
    • Geographical regions of location
    • Management of Technology & Innovation (M.T.I.) current state and future growth directions
  • Identify the key business goals of the organization (Identify at least 4 business goals)
    • The organization business goals of existing companies can be found on its website or annual report.
  • Identify the IT Strategy to support goals of the organization

Specify how IT strategy should contribute to and support the organizations’ business goals.

In this section, you should describe what “should” be the strategy of a technologically driven company. You should focus specifically on the technology strategy. You should think about all the things we learned in the class that will determine a strategy that will help the company succeed.

Remember that you can use either an existing company or a fictitious company. If you choose to use an existing company, you can visit their web site to see if their strategy is listed. Or you can do a web search on their technology strategy to see if anyone has written any stories about their strategy. For a fictitious company, you should make up a technology strategy that fits that type of company.

Include the IT directions and initiatives to address:

  • Service – Enhance and expand existing technology and services
  • Innovation – Advance the organization in the innovative use of technology to meet the organization’s needs.
  • Security – Strengthen the organization’s security systems, processes and approach to identity management
  • IT Foundation – IT Systems and competitive infrastructure to ensure it meets organizational technology needs (provide specific IT systems, functions, and descriptions)
  • Assessment of Management Technology Innovation (MTI) Capabilities
    • Address each of the following:
      • Who are your organization’s competitors?
      • How does your organization gather information to be on the forefront of information technology development? What type of research facilities exist?
      • How does your organization accept product and other innovative ideas from employees?
      • What programs and processes are in place for employees to provide innovative suggestions?
      • What strategy or objectives are in place in your organization to deal with internal innovations of entrepreneurs?
  • Assessing Sustainability, Stakeholder Responsibility and Technology Innovation
    • Address each of the following:
      • Environmental – What is your organization impact on resources, such as air, water, ground and waste emissions?
      • Economic – Evaluate the company stakeholder responsibility and the bottom line. What is evidence of your organization’s sustained economic success?
      • Social – What is your organization’s code of conduct and corporate governance statement? What does your organization have in place for a Corporate Social Responsibility (C.S.R.)? This is the company’s sense of responsibility toward the community and environment.
  • Evaluation of the Firm – McGrath’s and MacMillion’s Twelve Factors of Evaluating Firm
    • Evaluate your organization, being sure to address six of the twelve McGrath’s and MacMillion’s Twelve Factors:
      • Demand for the Product
      • Factors that could speed adoption
      • Factors that could block success of an Innovation
      • Likelihood of Strong Competitive Response
      • Likelihood that the Potential Competitive Advantage is Sustainable
      • Ability to Create Standards
      • Cost Factors in Commercialization
      • Resources Available for Commercialization
      • Level of novelty of the innovation
      • Cost considerations in development
      • Other opportunities that could be leveraged
      • Potential area where damage might occur
  • Apply the McFarlan & McKenney Strategic Grid Planning Process
    • The McFarlan & McKenney Strategic Grid Planning Process analyzes the organization’s readiness to implement innovation strategy.
  • Apply the Balanced Scorecard analysis for your organization

Apply the Balanced Scorecard analysis for your organization including descriptive text addressing each BSC factor analysis as outlined:

  • Financial Results
    • Success factors
    • Rationale
    • Key Performance Indicators
    • Responsible Entity
  • Customers
    • Success factors
    • Rationale
    • Key Performance Indicators
    • Responsible Entity
  • Human Resources
    • Success factors
    • Rationale
    • Key Performance Indicators
    • Responsible Entity
  • Sustainability
    • Success factors
    • Rationale
    • Key Performance Indicators
    • Responsible Entity
  • Plans for Technology Merger or Acquisition
    • Identify one merger or acquisition of your organization. This can be an upcoming planned acquisition or merger.
    • Discuss concerns that must be addressed in when planning the merger or acquisition. Choose two of the following areas: Business climate, cultural environment, marketing channels, financial processes, operations systems and structures, human resources policies, environmental conditions and management of technology & innovation. For each of your two chosen areas, list eight to ten concerns that would aid in the planning or the acquisition of technology.
  • Apply the Process Model Evaluation for Company

Refer to Chapter 11 – Section 115b Management Process Checklist.  This process model illustrates the process used by leadership to determine the level of complexity to pursue technologies and innovation considerations for project/product platforms. The Process Model allows you to evaluate the effect each technology strategy will have on organization’s structure and processes.

  • Identify: Identify a technology innovation direction of your chosen organization. You can identify this from the organization’s website or Internet information search on your organization.
  • Current Position: Discuss how well the current technology portfolio aligns to the business needs.
  • Risk Assessment: Identify the consequences of continuing with the current technology and future threats when you consider cost/time, technological challenges/competitive reality.
  • Decision Analysis: Identify the key decision points and risk factors that will drive strategic directions of acquisition/alliance/ interval development/ or stabilize current system and monitor.
  • Options: Identify options to be considered to shift from the current position to the desired position. Are there more choices?
  • Your Final Recommendation
    • Based on the detailed analysis and review of your chosen organization, identify three recommendations you would provide regarding the strategic information technology directions of the organization. One of your recommendations must be on strategic security requirements of the organization.
  • Conclusion

The Strategic Information Technology plan

  • Must be 18 to 20 double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.)Links to an external site..
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  • Must begin with an introductory paragraph that has a succinct thesis statement.
  • Must address the topic of the paper with critical thought.
  • Must end with a conclusion that reaffirms your thesis
  • Must use at least five scholarly sources in addition to the course text.
    • The Scholarly, Peer Reviewed, and Other Credible Sources table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.
  • Must document all sources in APA style as outlined in the Ashford Writing Center.
  • Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.

Carefully review the Grading Rubric (Links to an external site.)Links to an external site. for the criteria that will be used to evaluate your assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now