Entries by Sarah Kaelo

Do the author(s) use this format in a way that furthers research – what other component(s), if any, might be helpful to that purpose?

Title,  Abstract,  Introduction,  Method,  Results,  Future Works, Week 3 research writing assignment.  As you complete any writing assignment it is a good idea to proof read your work and use the University Writing Center to help with APA formatting; both will assist in minimizing grammatical errors and improve conducting research. Your Assignment:Find a research article – mobile technology preferred; but any technology […]

What methodology are you planning on using?

Here are some things to consider: Identify a topic in your specialization. (For IT students, Information Technology is not a topic, however, Millennial’s perceptions of smart phone technology could be a topic.  For leadership students, leadership or leadership styles would be too broad.  You could, however, compare leader and followers perceptions of leadership styles in […]

Project Feasibility Study Assignment Instructions

Project Feasibility Study Assignment Instructions For this assignment, you will select a business in order to begin research on the Final Project Assignment. The objective of this project is to analyze, design, and plan to implement a secure enterprise information system. It is recommended that the business/organization that is selected is familiar to you or one that information can be […]

Cyberattacks in today’s world can cripple infrastructure

All posts must be (2) substantive responses with a minimum of 150 words each for Responses 1 and 2. Ensure you list and break down each response in a word document, along with its reference. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion […]

how do all the systems’ risks sum up to an organization’s computer security risk posture?

Faced with the need to deliver risk ratings for your organization, you will have to substitute the organization’s risk preferences for your own. For, indeed, it is the organization’s risk tolerance that the assessment is trying to achieve, not each assessor’s personal risk preferences. What is the risk posture for each particular system as it […]

Are there other software packages that would work better?

Review Scenario 1, “Cool College Start-Ups,” under “Making Business Decisions” at the end of Ch. 3 of Business Driven Technology. Navigate to Inc. and find this year’s current Coolest College Start-ups article. Choose one of the start-up organizations listed. Respond to the following in a minimum of 175 words: From the select start-up organization selected from the site […]

Whistle-blowing and morality. Journal of Business Ethics

Each of us perceives “ethics” from our own point of reference as to what is or is not ethical. This assignment asks you to consider ethics and whistle-blowers. Select one of the behaviors listed below for your discussion posting. Base your posting on your relationship with the “unethical person” and any risk involved in “whistle […]

It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public

In today’s world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet. It is the policy of the United States to prevent or minimize disruptions […]