Entries by Sarah Kaelo

Information-Gathering Techniques

Information-Gathering Techniques Create a report for your Manager on Information-Gathering Techniques. Gathering information for a new system  is important and sets the tone of the development cycle. If not done  thoroughly, the project could be a failure before it begins. You are the Project Manager of XYZ  Enterprises. Your manager gives you the task of […]

Describe strategies business organizations use to mine social media to collect data and provide supporting examples.

TOPIC: Social Media Data Collection Assessment Description The purpose of this assignment is to identify social media data collection strategies and the legal and ethical issues associated with social media data mining. Part 1 Conduct research to identify how business organizations mine social media to collect data so they can obtain a competitive advantage in […]

Benchmark – Applying Emerging Technology in Business

TOPIC 7: Benchmark – Applying Emerging Technology in Business Assessment Description The purpose of this assignment is to explore emerging technologies that were discussed in class that are used in business enterprises. The following emerging technologies were discussed during this course: Blockchain Artificial Intelligence (AI) Augmented Reality (AR) Machine Learning Cognitive Computing Choose three emerging […]

Analyze how the new product or service fits with the company’s current strategic plan.

Developing innovative new products and services is expensive, time-consuming, and extremely risky. Most studies have indicated that the majority of development projects fail. Firms need to make difficult choices about which projects are worth the investment and which of those projects are pursued with a rigorous and well-thought-out development process. Outline an innovation project by creating […]

What tools and resources have you used for teamwork in the past?

To give you a sense of real-world context, the problem in this course is set in a hypothetical organization. The problem has been carefully crafted to prompt learning in the areas of virtuous leadership and global-based teams. You work for an organization that believes in shared responsibility and teamwork. Your organization is also on the […]

6 types of social engineering attacks.

All posts must be (2) substantive responses with a minimum of 150 words each for Responses 1 and 2. Ensure you list and break down each response in a word document, along with its reference. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion […]

Are cybercrime efforts becoming more targeted? Why?

The case discussion questions are designed to make you think strategically at the CIO/CISO level. In your discussion of each question, focus on how you would deal with each of these situations if you were the CIO/CISO thus integrated both your business acumen and your technical knowledge. The business case comes directly from a real-world […]

Transfer Strategy – Steps to follow to transfer operations to a remote location.

For the final assignment, you must design a corporate risk management  plan for NCU-FSB as part of their corporate security program. The  format for the plan must be as follows: Introduction – State of the Organization corporate management of systems and applications threats every organization or institution faces in the era of mobile and cloud […]