Categories
Writers Solution

Information technology (IT) intern working for Health Network, Inc. (Health Network)

 Purpose

This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a formal risk management plan for an organization.

Required Source Information and Tools

The following tools and resources that will be needed to complete this project:

  • Course textbook
  • Internet      access for research

Deliverables

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provides critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

Submission Requirements

All project submissions should follow this format:

  • Format: Microsoft Word or compatible
  • Font: Arial, 10-point,      double-space
  • Citation Style: Your school’s preferred style      guide
  • Minimum 2 pages per task

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

Project Part 1 Task 2: Risk Assessment Plan

After creating an initial draft of the risk management plan, the second part of the assigned project requires you to create a draft of the risk assessment (RA) plan. To do so, you must:

  1. Develop an introduction to the plan explaining its purpose and importance.
  2. Create an outline for the RA plan.
  3. Define the scope and boundaries for the RA      plan.
  4. Research and summarize RA approaches.
  5. Identify the key roles and      responsibilities of individuals and departments within the organization as      they pertain to risk assessment.
  6. Develop a proposed schedule for the RA      process.
  7. Create a professional report detailing the      information above as an initial draft of the RA plan.

Evaluation Criteria and Rubrics

Categories
Writers Solution

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years.

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

• Be approximately five to six pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Categories
Writers Solution

Reflect on the technology-minded “ten commandments” and the key elements of computer ethics you learned about in your module reading

Reflect on the technology-minded “ten commandments” and the key elements of computer ethics you learned about in your module reading. Considering what you have learned and your own personal experiences, complete the following discussion activity.

Research an Internet source that addresses computer ethics in the workplace. 

Categories
Writers Solution

Decision-making with Technology

Topic: Decision-making with Technology

Overview:

In all business areas making decisions is a natural and integral part of any company’s management process. Technology is taking on an increasingly major role in decision-making today. The sheer amount of data that managers must operate with on a daily basis is absolutely staggering compared to what they had to work with just a few decades ago. In today’s world, BI-centered tools are a critical component of any successful company’s strategy. They allow managers to streamline the effort needed to search for, combine and query data to obtain the information required for good decisions.

Describe two key system-oriented / technology trends that have brought IS-supported decision making to the forefront of the decision analysis field in recent years.

List and describe two capabilities of computing that can facilitate good managerial decision-making. How can information systems and tools help overcome the cognitive limits of humans?

Guidelines for Submission: Using APA 6th edition style standards, submit a Word document that is 2-3 pages in length (excluding title page, references, and appendices) and include at least two credible scholarly references to support your findings.

Include the following critical elements in your essay:

I. System / Technology Trends: Describe two key technology trends that have brought IS-supported decision making to the forefront of the decision analysis field in recent years. What features of these tools or technologies have help change the industry of DSS?

AI. Capabilities: List and briefly describe two capabilities of computing that can facilitate good managerial decision-making in a modern organization. How do these capabilities help organizations gain an advantage in the business sector?

III. Cognitive ability: Explain how technology and information systems can help organizations overcome limitations in human thinking.

Required elements:

Please ensure your paper complies APA 6th edition style guidelines. There is an essay template located under the Course Resources link.

APA basics:

· Your essay should be typed, double-spaced on standard-sized paper (8.5″ x 11″)

· Use 1″ margins on all sides, first line of all paragraphs is indented ½” from the margin

· Use 12 pt. Times New Roman font

Follow the outline provided above and use section headers to improve the readability of your paper. If I cannot read and understand it, you will not earn credit for the content.

Critical Elements

System / Technology Trends

Capabilities

Cognitive ability

Articulation of Response

Proficient (100%) Describe two key system-oriented / technology trends that have enable IS-supported decision

Describes describe two capabilities of computing that can facilitate good managerial decision-making

Substantive explanation of how information systems and tools help overcome the cognitive limits of humans

Submission has no major errors related to citations, grammar, spelling, syntax, or organization.

Needs Improvement (70%) Describes one key system-oriented / technology trends that have enable IS-supported decision

Describes one capabilities of computing that can facilitate good managerial decision-making

Briefly explains information systems and tools help overcome the cognitive limits of humans

Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas.

Not Evident (0%)Value
Does not describe two key
system-oriented / technology30
trends that have enable IS-
supported decision
Does not describe two
capabilities of computing that30
can facilitate good managerial
decision-making
Does not explain how
information systems and tools30
help overcome the cognitive
limits of humans
Submission has critical errors
related to citations, grammar,10
spelling, syntax, or
organization that prevent
understanding of ideas.
EARNED TOTAL100%
Categories
Writers Solution

What is the new technology?

Assessment item 3 – Annotated Bibliography and Journal Synopsis

Value: 35%

Length: 2000 words (10-12 pages)

Submission method options: Alternative submission method

TASK

You are required to prepare for this Assessment Item by:

1. READING the Subject outline,

2. COMPLETING Topic 3, 4 and 5 on sections that discuss how to do an Annoatated

Bibliography and a Journal Synopsis paper.

WHAT TO DO: Tasks 1 and 2 below

TASK 1 – 25%

Annotated Bibliography

1. Write an Annotated Bibliography for your Capstone Topic with a collection of 12 articles following a set structure. The Annotated Bibliography is a critical examination of the most relevant and recent scholarly research on the topic area that is not just a summary of the articles you have read.

2. An Annotated Bibliography is a detailed analysis of sources that can be used later in an expanded Literature Review.

3. Use the latest online search tools (CSU PRIMO, Google Scholar, Online databases) and efficient bibliographic organisers – CSU supports the use of EndNote. (available on iPad). EndNote is a bibliographic citation program, allowing references and footnotes to be translated into a variety of standard formats.

4. As a CSU student you can download and install EndNote X7 for Windows or Mac OS platforms from https://online.csu.edu.au/division/dit/software/core.html

5. Ensure that the Annotated Bibliography submitted by you is your own work and has not been submitted elsewhere and comply with the University’s requirements for academic integrity.

6. You can get help in Building and Writing an Annotated Bibliography from several Topics in the ITC571 Interact2 site sidebar menu and other study advice and tips from:

1. Study Resources (PDF files to download): http://student.csu.edu.au/study/ resources

2. APA style Referencing from http://student.csu.edu.au/study/referencing-at-csu 

Example below shows APA6 style with 2nd and subsequent line indentation and use of DOI link to source if available:

3. The CSU Library website for LibGuides in Information Technology, Computing and Mathematics at http://libguides.csu.edu.au/cat.php?cid=66969

4. EndNote Bibliographic software and tutorials LibGuide at http://libguides.csu.edu.au/endnote

7. Review the emerging technology (use internet for journals, conference papers, magazines, news articles, online databases, eBooks) and submit a 12-article Annotated Bibliography on your topic.

8. A good place to start a collection of articles in your annotated bibliography is via the PRIMO search tool located on the CSU Library website at http://www.csu.edu.au/ division/library

9. Self-Evaluation Report on Originality (100-150 words)

a. Select a 1000-word sample of annotations text only (exclude references) from and submit it for testing at Turnitin turnitin.com

b. Save and append a copy of the originality report obtained.

c. Critically evaluate and interpret the originality report, from your context or point of view as your personal Self-Evaluation Report on Originality (100-150 words).

10. NOTE: Tasks 1 and 2 (below) can be appended into the one document and submitted via Turnitin as PDF or other document format.

As an example, the Capstone Topic PRIMO search on a research topic like “IoT security in smart

cities” returned the following snapshot from a large list of very recent journals related to the Topic, by using the “articles” filter to cut out books, eBooks etc. Next when applying another filter “peer-reviewed” and a sort by “Date-newest”, joined with a show only “Open access” and “Available Online”, then the second screen reveals a 2019 journal paper not readily seen on the first broader search result page 1:

Library Resources

Information Technology Journal Databases: http://www.csu.edu.au/division/library/findinfo/databases/subject/infotech

Information Technology & Computing LibGuides : http://libguides.csu.edu.au/itc

(http://libguides.csu.edu.au/itc)

The following questions may be useful while reviewing the topic:

1. What is the new technology?

2. What does it do and what are the special features it has?

3. When is it coming out in the market and how much will it cost?

4. What industry will the new technology affect? (Medical, agricultural, computer, business, etc….).

5. In your opinion, will the new technology be beneficial to society? Why or why not.

6. What did you learn from a critical analysis of your sources of information on this new technology?

TASK 2 – 10%

Write a 120-200 word Journal Synopsis paper based on your Task 1 results. The purpose of this final assessment activity is to produce a 120-200 word Journal Synopsis paper on your findings, lessons learnt and a discussion that will be supported by your annotated bibliography with references from respected sources. After submission, post a copy to share with your peers on the ITC571 Discussion Forum. The challenge is to communicate the most about your project in the least amount of words.

What is a synopsis?

It is another name for an Abstract, that you will have read at the beginning of academic journal articles when researching your A4 Annotated Bibliography. If you have read these synopses or abstracts, you’ll already know that they are:

“a summary of the article; its arguments and conclusion.”

The journal abstract or synopsis was very useful to you perhaps, in helping you to decide if an article is relevant to your research, and in deciding the worth of futher reading and are an integral feature of most conferences. The presenters are required to submit an abstract or synopsis of their papers, which conference delegates later receive. This helps the delegates decide which presentation they will attend. So you need to be convincing with your synopsis and include an overview of your arguments and conclusions. Synopses are generally only one or two paragraphs long, and they are placed at the beginning of the paper.

Adapted here from the Source:

https://www.uow.edu.au/content/groups/public/@web/@stsv/@ld/documents/doc/ uow195641.pdf

It should make it easier if you use the simple template below for your 120-200 word Journal Synopsis paper as it has the following headings and length as a guide: TITLE (10 words of the synopsis paper and NOT the same as your Project Title)

1. AIM OF THE PROJECT ( 1 sentence or 15 words)

2. METHOD (2 sentences or 30 words)

3. RESULTS (1-2 sentences or 15 to 30 words)

4. DISCUSSION (2 sentences or 30 words)

5. CONCLUSION (1 sentence or 15 words)

Guidelines:

· The ABSTRACT of an article is written LAST. See https://www.editage.com/insights/ a-10-step-guide-to-make-your-research-paper-abstract-more-effective (https://www.editage.com/insights/a-10-step-guide-to-make-your-research-paperabstract-more-effective)

• The final task is to refine is the TITLE of the paper

• Include your references in APA style as usual (http://student.csu.edu.au/study/ referencing-at-csu (http://student.csu.edu.au/study/referencing-at-csu))

• Ensure that the Journal paper is your own work and has not been submitted elsewhere and complies with the University’s requirements for academic integrity.

• Post a message about your Journal Synopsis paper on the Discussion Forum to share with your lecturer and peers.

• Your lecturer will advise further on how the format can be modified to suit the nature of your work.

RATIONALE

This assessment task will assess the following learning outcome/s:

• be able to perform literature searches and critically analyse the literature in the chosen topic.

• be able to critically reflect on and synthesize complex information, problems, concepts and theories in the chosen topic.

• be able to apply established research methodologies with autonomy.

• be able to apply project management and information and communication echnologies (ICT) tools to plan, execute, record and present their research and project work as a capstone experience.

The rationale of this assessment is to test your ability to review, evaluate, critique and support others opinions as well as existing literature, using a scholarly writing style. You will also demonstrate your ability to carry out independently research and locate information from various sources such as journals, conference proceedings, online databases, eBooks and industry magazines.

The Learning Outcomes being assessed in task include your ability to perform literature searches and critically analyse the literature in the chosen topic and then to critically reflect on and synthesize complex information, problems, concepts and theories in the chosen topic. As the Annotated Bibliography develops, so will also be demonstrating your advanced communication and academic writing skills in transmitting your capstone experiences and ideas to others.

What does a well-constructed annotated bibliography contain?

That is a research topic on its own, however I recommend the list of SIX structural elements below

1. Interpretation and evaluation of an overview of recent trends in emerging technologies and innovation;

2. Evidence of literature searches and critical analysis of the literature in the chosen capstone topic;

3. Critical reflection and synthesis of complex information, problems, concepts and theories in the chosen topic;

4. Original opinion on the benefits of your capstone project to others;

5. Reflective comments on what was learnt from a review of the literature;

6. Use of correct citations and referencing conforming to recognised referencing format.

The Checklist for the Annotations elements can be used as a quality check as you write:

Content Elements

• Coverage of topic

• Depth of discussion

• Development of argument and reasoning

• Selection of literature

Writing Style Elements

• Structure of review

• Technical competence

• Use of citations and quotations

• Referencing

Task 2

After studying something quite intensely in task 1 Annotated Bibliography, you are now an expert in that area of research. As such, you need to be able to present that knowledge as a compact 120 to 200 word Journal Synopsis paper as a final demonstration of your knowledge and understanding in deploying a range of research principles, methodologies and academic writing skills.

Research is defined in the AQF as follows: “Research comprises systematic experimental and theoretical work, application and/or development that results in an increase in the dimensions of knowledge.”

Your ITC571 research includes original, exploratory, experimental, applied, clinically or work-based, and other forms of creative work undertaken systematically to increase knowledge and understanding, deploying a range of research principles and methodologies.

The aims of this Journal exercise are based and modified on those for which CORE was established:

• to create a professional journal experience for those postgraduate students engaged in computer science and information technology in higher education and research institutes and to facilitate their research skills development;

• to assist and advance research in computer science and information technology in higher education and research institutes;

• to assist and advance teaching and research in computer science and information technology in higher education;

Categories
Writers Solution

Where do you see technology leading us in terms of the future?

1) Where do you see technology leading us in terms of the future?

2) Identify a device (anything that has a CPU) that we use every day that is not protected and subject to being hacked?

Categories
Writers Solution

Blockchain technology the gig economy and gig workers social media cloud computing or corporate sustainability

1 Project management requires an acute awareness of the latest business and technology trends to make better informed decisions and open the path to new ideas. Select one of the following or one of your own: Blockchain technology the gig economy and gig workers social media cloud computing or corporate sustainability Research how it will impact Project Management in the coming years. Which one do you suggest will have the biggest impact two years from now? Discussion 2 Project planning is an essential phase performed by the project team to ensure the optimal resources are assigned to the project. The resources include people, capital, equipment, and technology. Project planning is a rational determination of how to initiate, execute, control, and close a project. Leaders must ensure projects are aligned with the mission and vision of the organization. By doing so, the work is tied to organizational strategy. For projects to succeed, the project team must define the scope and conduct risk management. From your research, what are the results of poor project planning? Please incorporate an example when discussing this topic. HINT: Consider scope creep.

Categories
Writers Solution

What are your research interests in the area of information technology?

What are your research interests in the area of information technology?  

How did you become interested in this area of research?

What is your current job/career and how will this program impact your career growth?  

What unique qualities do you think you have that will help you in being successful in this program?

How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC?

Categories
Writers Solution

Information Technology (IT) promotes

Write a research paper that explains how Information Technology (IT) promotes getting people who are affected by policies involved in the policy-making process. Cite specific examples. 

Remember that this paper, including the list of sources, must be in APA format, and MUST cite references in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper.

Requirements:

  • 2 peer reviewed resources (articles or papers) (1 may be from your annotated bibliography assignment)
  • Cited sources must directly support your paper (i.e. not incidental references)
  • At least 500 words in length (but NOT longer than 1000 words)

If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:

http://libguides.gwu.edu/education/peer-reviewed-articles

APA formatting guidelines:

Categories
Writers Solution

Chief information technology (IT) security officer for the Quality Medical Company (QMC)

PKI and Encryption at Work

Learning Objectives and Outcomes

  • Develop a plan to deploy public key infrastructure (PKI) and encryption solutions to protect data and information.

Assignment Requirements

In this assignment, you play the role of chief information technology (IT) security officer for the Quality Medical Company (QMC). QMC is a publicly traded company operating in the pharmaceutical industry.

QMC is expanding its arena of work through an increase in the number of clients and products. The senior management of the company is highly concerned about complying with the multitude of legislative and regulatory laws and issues in place. The company has an internal compliance and risk management team to take care of all the compliance-related issues. The company needs to make important decisions about the bulk of resources they will need to meet the voluminous compliance requirements arising from the multidimensional challenge of expansion.

QMC will be required to conform to the following compliance issues:

  • Public-company regulations, such as the Sarbanes-Oxley (SOX) Act
  • Regulations affecting financial companies, companies that make loans and charge interest, such as the U.S. Securities and Exchange Commission (SEC) rules and Gramm-Leach-Bliley Act (GLBA)
  • Regulations affecting healthcare privacy information, such as Health Insurance Portability and Accountability Act (HIPAA)
  • Intellectual Property Law that is important for information asset protection particularly for organizations in the pharmaceutical and technology industry
  • Regulations affecting the privacy of information, including personal identification information, such as personally identifiable information (PII) regularly collected from employees, customers, and end users
  • Corporate governance policies including disclosures to the board of directors and the auditors and the policies related to human resources, governance, harassment, code of conduct, and ethics

Compliance with regulatory requirements implies encrypting sensitive data at rest (DAR) and allowing access to role-holders in the enterprise who require the access. It also implies that sensitive data in motion (DIM) or data that is being communicated via e-mail, instant message (IM), or even Web e-mail must be suitably protected and sent only to the individuals who have a right to view it. The company is conscious about the loss they may face in terms of penalty and brand damage if they fail to abide by the compliance laws, especially in the online information transfer phase. Therefore, as a dedicated employee, your task is to develop a content monitoring strategy using PKI as a potential solution. You will need to determine a process or method to identify multiple data types, processes, and organizational policies. Incorporate them into a plan, and select a PKI solution that will effectively address the content management needs of your company.

You need to present your PKI solution in the form of a professional report to the senior management.

Required Resources

None

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space
  • Citation Style: APA
  • Length: 1–2 pages

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

  • I have identified specific data types related to the specific compliance regulatory requirements.
  • I have indicated a solution for sharing data beyond the borders of the organization.
  • I have appropriately selected and developed a PKI solution for content control.
  • I have followed the submission requirements.