SWOT analysis and corporate level strategy 

I have attached the article document below, need 8-10 PPT Slides with In-text citations, references and pictures  with plagarism report. for below two topics.

1. External environment

2. SWOT and corporate level strategy

Refer the article and complete ppt slides

Daniels Fund Ethics Initiative University of New Mexico

http://danielsethics.mgt.unm.edu

This material was developed by Alicja Spaulding, Stephanie Fernandez, and Jennifer Sawayda under the direction of O.C. Ferrell and Linda Ferrell. It is provided for the Daniels Fund Ethics Initiative at the University of New Mexico and is intended for classroom discussion rather than to illustrate effective or ineffective handling of administrative, ethical, or legal decisions by management. Users of this material are prohibited from claiming this material as their own, emailing it to others, or placing it on the Internet. Please call O.C. Ferrell at 505-277- 3468 for more information. (2011)

TOMS: One for One Movement

INTRODUCTION

TOMS Shoes is a for-profit business with a philanthropic component. The company was started

after entrepreneur Blake Mycoskie witnessed the poverty among villagers in Argentina, poverty so

extreme that the villagers could not even afford a pair of shoes. Mycoskie returned to the United

States with 200 Argentinean shoes and a mission. He went from one retail store to another with a

unique business proposal. He would start an organization that would provide a pair of shoes for a

child in need for every pair of shoes purchased. Finally, a few Los Angeles boutiques agreed to sell

the shoes. Mycoskie’s idea was picked up by the Los Angeles Times, which ran an article on his

business idea. To his surprise, that weekend garnered him $88,000 in orders. Two years after

officially establishing TOMS Shoes, the business had $9.6 million in revenue.

The TOMS business model is unusual. While many businesses engage in cause-related marketing, at

TOMS the philanthropic component is just as important as the for-profit business. The cost of

providing the shoes to children in need is built into the shoes’ sales price. The customer is thereby

turned into the benefactor, enabling TOMS to become a sustainable organization based on giving

back to the world on a continuous basis. As long as people continue to purchase TOMS shoes,

children in need will receive a pair in return. In the process, TOMS is also able to turn a profit,

support itself, make the world a better place, and educate consumers how they are helping children

in need by providing them with a pair of shoes.

This case will discuss Mycoskie’s revolutionary business model and how it has achieved such

success. It will begin by analyzing the background and origins of the TOMS Shoes business concept.

We then discuss TOMS’ operational approach, including how the organization manages to carry out

its central mission. We also examine the corporate culture—a necessity for the successful operation

of TOMS shoes—and the marketing of TOMS. Next, we analyze how this business model has

impacted both society and other organizations. Since no business is immune from ethical issues, the

following section details some of the criticisms and risks of TOMS Shoes. We conclude by

speculating about the future of this company.

BACKGROUND AND HISTORY

Blake Mycoskie is the founder and Chief Shoe Giver of TOMS Shoes. Before founding TOMS Shoes,

Mycoskie had started five companies that ranged from billboard advertising to laundry services. His

foray into the shoe industry, however, was almost accidental. After participating in the 2002

Amazing Race reality television show, Mycoskie made a decision to return to all the countries he

had visited during the show. One country on his stop was Argentina. Mycoskie traveled to Argentina

in 2006 with no idea that the backwoods of Argentina would be his inspiration for a new

company. Two incidents inspired Mycoskie to create TOMS. First, he noticed that many of the

villagers could not even afford a pair of shoes for their children. Secondly, he discovered the

2

comfortable and unique farm shoe worn by the locals (known as the Alpargata). These two

discoveries convinced Mycoskie to take action.

Upon coming back home, Mycoskie sold his online driver education company for $500,000 and

used that money to finance TOMS Shoes. TOMS was derived from “tomorrow,” which was taken

from the original company concept “shoes for tomorrow project.” TOMS Shoes opened for business

in May 2006. TOMS also runs the non-profit subsidiary, Friends of TOMS. The for-profit and non-

profit organizations work in conjunction in operating the enterprise. Since its founding, TOMS has

been widely successful among regular individuals and celebrities. Scarlett Johansson and Keira

Knightley were among the first to become celebrity fans of TOMS products. The non-profit

component is also achieving its objective of providing shoes for those in need. In 2010 TOMS Shoes

distributed its one-millionth pair of shoes.

THE IMPORTANCE OF SHOES

TOMS decided to develop its product line and business model around shoes for several key reasons.

First, many children in impoverished countries live in areas with unsafe terrains. Lack of paved

roads and other hazards can cause injury for children walking barefoot. The second reason involves

health concerns. Children can contract a range of soil-transmitted diseases from not wearing shoes.

For example, soil-transmitted Helminthiasis, an infection developed from intestinal worms, is

common in South Africa. The disease Podoconiasis is also an infection transmitted through the soil

and is common in places like southern Ethiopia. This illness causes the lymphatic system to break

down and the feet to become swollen. Another unfortunate consequence of this disease is ostracism

and ridicule imposed upon infected children in their communities. Many of these diseases can be

prevented simply by wearing shoes.

The third reason involves education. In many nations, shoes are required in order to attend school.

Owning a pair of shoes provides a child with an opportunity to be educated, leading to higher

school attendance. According to TOMS, this combination of education and health provides children

the opportunity for a better tomorrow.

TOMS MOVEMENT: MANAGEMENT AND BUSINESS MODEL

Mycoskie’s organization consists of two parts. TOMS Shoes is a for-profit company that manages the

overall operations and logistics. Friends of TOMS, the company’s non-profit subsidiary, is

responsible for organizing volunteer activities and all shoe drops. Friends of TOMS is not a

corporate-backed foundation that the company supports through donations; rather, it is a

necessary part of TOMS’ distinct business model, One for One TM. The model is simple: for every pair

of shoes that TOMS sells, it donates a pair of shoes to a child in need on behalf of the customer.

Mycoskie dubs this business system “Philanthropic Capitalism” because the company makes a

profit but incorporates philanthropy into its business strategy. The company’s ultimate vision is to

demonstrate the effect of how working together as a society can “create a better tomorrow by

taking compassionate action today.”

3

The key for any organization, even nonprofits, is to be sustainable. Nonprofits that depend largely

on donations struggle to remain in operation during economic downturns. By incorporating the

nonprofit component into the business model, TOMS mitigates this risk. The One to One model

enables Friends of TOMS to remain in operation because the shoes sold cover the cost of the extra

shoes and shoe drops. When coming up with the company, Mycoskie recognized that simply

donating money to children would be a one-time deal. However, he felt that creating a sustainable

business would create continual opportunities to provide shoes for those in need as long as the

company remains in business. As long as people keep purchasing shoes, the nonprofit will remain

sustainable.

It might appear that Friends of TOMS depends entirely on the for-profit business. In reality,

however, the relationship between the two operations is interdependent. The philanthropic

component of TOMS likely contributes to its widespread popularity among consumers. One

consumer survey revealed that nearly half of respondents had purchased or would purchase items

during a certain time period if part of the revenues supported charitable causes. Cause-related

marketing is growing, and businesses like TOMS Shoes—where philanthropy is embedded within

the business model—are likely to attract the support of consumers who want to make a difference.

Already, TOMS has developed successful collaborations with recognizable brands such as Ralph

Lauren and Element Skateboard. Ralph Lauren worked with TOMS to develop a co-branded Polo

Rugby shoe, which maintained the One for One premise. Element Skateboard joined forces with

TOMS as well to fashion limited edition TOMS + Element shoes, donating a pair of shoes to a child in

need for each pair sold. To further the One for One movement, Element Skateboard also promised

that for every skateboard purchased, one would be donated to a child participating in the Indigo

Skate Camp in Durban, South America.

Finally, the TOMS Shoes business model does not support any form of traditional paid marketing or

advertising. TOMS does not have a marketing budget. Instead, the company relies on word of

mouth, viral marketing, and social networks for its marketing efforts. Word-of-mouth is one of the

most effective forms of marketing because many consumers believe it to be more trustworthy than

corporate advertisements. The challenge for organizations is how to convince customers to talk

about its products. For TOMS Shoes, many customers are excited that their purchase is going

toward a good cause and are eager to discuss it with others. TOMS Shoes has taken proactive steps

to encourage word-of-mouth communication. Each pair of TOMS Shoes comes with a blue-and-

white TOMS’ flag and a small card asking customers to take pictures of themselves wearing their

new shoes and holding up the flag. The customers are then asked to upload those photos to the

“HOW WE WEAR THEM” section on the company’s website, in addition to other social networking

websites such as Facebook and Twitter. The photos of customers using TOMS products increases

both awareness and the credibility of the brand.

TOMS’ SUPPLY CHAIN: GETTING THE SHOES WHERE THEY NEED TO BE

Due to their lack of knowledge about the shoe industry, Mycoskie and his team initially faced supply

chain management problems. Mycoskie was unaware how fast demand for TOMS shoes would

escalate. Two weeks after Mycoskie began selling his products to retailers, a fashion reporter wrote

4

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"

The Pros And Cons Of Having Risk Officers

What Are The Pros And Cons Of Having Risk Officers As Part-Time Assignments Within Different Functions And Business Units? 2. Do You Think That Companies Need To Experience A Crisis To Take Risk Seriously?

1 What are the pros and cons of having risk officers as part-time assignments within different functions and business units?

2. Do you think that companies need to experience a crisis to take risk seriously?

bout The ERM Framework With Practical Approach On How To Overcome The Challenges While Implementing ERM On Enterprise Level

Need to dicuss about ERM framework ,how to implement in one of the sector and discuss about the challenges we face during implementation and how to overcome

I need this paper in APA format with annoted bibilography

The Effective Cyber Security Measures To Support For Health Information Technology For Economic And Clinical Health Act Compliance.

 

The effective cyber security measures to support for Health Information Technology for Economic and Clinical Health Act Compliance.

This is the final submission of your research assignment for this course. The research paper must directly address your approved topic defined during the Residency Weekend through the assignment – Topic Selection and contain all of the following elements;

· a title page.

· an introduction of the content of the paper, including the scholarly value of your research.

· a brief review of the recent literature related to your topic.

· a brief analysis of the synthesized conclusions of the existing research related to your topic.

· a conclusion that summarizes the content of your paper and discusses research gaps and future research opportunities related to your topic.

· a reference page(s).

To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. Remember that your paper, including your list of sources, must be in APA format, and you MUST cite your references in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

This assignment must be YOUR OWN WORK!  This is an individual assignment. Plagiarism detected in your work will be addressed as discussed in the plagiarism section of the syllabus.

Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded.

· Your paper must include both a Title page and a Reference page.

· Your paper should NOT include an abstract.

· You paper must include a minimum of 7 peer reviewed resources (articles or papers)

. Cited sources must directly support your paper (i.e. not incidental references)

· Your paper must be at least 1500 words in length (but NOT longer than 2000 words; Scholarly writing should be efficient and precise. Be clear in the information that you are conveying and with the evidence used to support it. Here is a good resource to help with writing concisely:https://academicguides.waldenu.edu/writingcenter/scholarlyvoice/writingconcisely)

. Title and reference pages are NOT included in calculating the paper length.

If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:

http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles http://libguides.gwu.edu/education/peer-reviewed-articles

Introduction

The Health Information Technology for Economic and Clinical Health Act is part of the American Recovery and Reinvestment Act of 2009.The HITECH Act was created to promote and expand the adoption of health information technology, specifically, the use of electronic health records (EHRs) by healthcare providers.

Conclusion

Please use these references:

References

· Anderson, H. (2012, April 9). Utah health breach affects 780,000. Data Breach Today. Retrieved from http://www.databreachtoday.com/utah-health-breach-affects-780000-a-4667 Booz Allen Hamilton

· Bowman, S. (2013, October 1). Impact of electronic health record systems on information integrity: Quality and safety implications. National Center for Biotechnology Information (NCBI). Retrieved from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3797550/

· Krisberg K. Cybersecurity: Public health increasingly facing threats. American Journal of Public Health. 2017 Aug 1;107(8):1195

· Langer SG. Cyber-Security Issues in Healthcare Information Technology. Journal of digital imaging. 2017 Feb 1;30(1):117-25. 2.

· Luna R, Rhine E, Myhra M, Sullivan R, Kruse CS. Cyber threats to health information systems: A systematic review. Technol Health Care. 2016 Jan 27;24(1): 1-9. Available from: 10.3233/THC-151102.

· McLaughlin, Peter. Journal of Health Care Compliance. Mar/Apr2017, Vol. 19 Issue 2, p5-12.

· Piliouras, Teresa; Tian, Xin; Desai, Dhaval; Patel, Avani; Shah, Dhara; Su, Yang; (Raymond) Yu, Pui Lam; Sultana, Nadia. 2012 IEEE Long Island Systems, Applications & Technology Conference (LISAT), 1/ 1/2012, pp.1-7.

· https://en.wikipedia.org/wiki/Health_Information_Technology_for_Economic_and_Clinical_Health_Act

· https://www.campussafetymagazine.com/hospital/hitech-act-summary-healthcare-compliance/

· https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/understanding/coveredentities/hitechact.pdf

· https://www.healthit.gov/sites/default/files/hitech_act_excerpt_from_arra_with_index.pdf

· https://www.hipaajournal.com/hitech-compliance/

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"

Infotech Importance In Strategic Planning

Please refer textbook page no -275 for case study and answer the following questions.

1. What is the benefit of the Scan It! data to Stop & Shop ? What are some of the questions the company could answer about its customers?

2. How would you assess the level of capabilities of Stop & Shop ’ s use of analytics? What might the company do differently with the data to gain more value?

chapters 30, 31, and 34 presented three mini-case studies on ERM and risk. Each one presented a slightly different risk scenario. Suppose General Motors wants to replace one of their traditional lines of vehicles with all electric models. How could GM use game theory to identify and assess the major risks to this decision? Identify two major risks that would result from GM converting an existing line to an all-electric line. Provide a brief discussion of each risk, and your assessment of the levels of inherent, current, and residual risk, using GM’s five point scale.

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"

Enterprise Risk Management

Define: ABC a mobile devices company . Goals of the company are: enhance growth, profits, customer retention,

Risks can be identified from objectives like User friendly new technology, R & D (future initiatives), updating current products, external factors (like competitors, governance, environmental and social)

provide a short summary of the Kali Tool you have researched. Share with other students, how it’s used, implemented and measures to protect your network against illicit use of it. The main post must be a minimum of 200 words.

Functions And Business

1 What are the pros and cons of having risk officers as part-time assignments within different functions and business units?

2. Do you think that companies need to experience a crisis to take the risk seriously?

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"

Safeguarding Covered Defense Information

Last week, we discussed how the Red Team penetrated the Sifers-Grayson enterprise (the “incident”). This week, we will collect “lessons learned” from your analysis of the Red Team’s successes in exploiting vulnerabilities at Sifers-Grayson. 

Your first posting to the war room this week should be a “Lessons Learned” analysis. You must include at least 5 specific “lessons learned.” For each item, provide a short title followed by a one paragraph description of (a) what happened, (b) the vulnerability that the Red Team exploited, and (c) the main “lesson learned” from this vulnerability or exploit. In your critiques and follow-up postings, provide additional information about the steps or measures that Sifers-Grayson could take to remediate or remove the listed vulnerabilities.

Final Project: Incident Response Exercise & Report

Your Task

You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident described below. The Blue Team has already created a set of enterprise architecture diagrams (see figures 1-4) to help with your analysis of the incident and preparation of the incident report as required by the company’s contracts with the federal government. After completing their penetration tests, the Red Team provided Sifers-Grayson executives with a diagram showing their analysis of the threat environment and potential weaknesses in the company’s security posture for the R&D DevOps Lab (see figure 5).

Overview of the Incident

Sifers-Grayson hired a cybersecurity consulting firm to help it meet the security requirements of a contract with a federal agency. The consulting firm’s Red Team conducted a penetration test and was able to gain access to the engineering center’s R&D servers by hacking into the enterprise network through an unprotected network connection (see figure 2). The Red Team proceeded to exfiltrate files from those servers and managed to steal 100% of the design documents and source code for the AX10 Drone System. The Red Team also reported that it had stolen passwords for 20% of the employee logins using keylogging software installed on USB keys that were left on the lunch table in the headquarters building employee lounge (see Figure 3). The Red Team also noted that the Sifers-Grayson employees were quite friendly and talkative as they opened the RFID controlled doors for the “new folks” on the engineering staff (who were actually Red Teamers).

The Red Team continued its efforts to penetrate the enterprise and used a stolen login to install malware over the network onto a workstation connected to a PROM burner in the R&D DevOps lab (See Figure 3). This malware made its way onto a PROM that was then installed in an AX10-a test vehicle undergoing flight trials at the Sifers-Grayson test range (See Figures 1 and 4). The malware “phoned home” to the Red Team over a cellular connection to the R&D center. The Red Team took control of the test vehicle and flew it from the test range to a safe landing in the parking lot at Sifers-Grayson headquarters.

Background

Sifers-Grayson is a family owned business headquartered in Grayson County, Kentucky, USA. The company’s physical address is 1555 Pine Knob Trail, Pine Knob, KY 42721. The president of the company is Ira John Sifers, III. He is the great-grandson of one of the company’s founders and is also the head of the engineering department. The chief operating officer is Michael Coles, Jr. who is Ira John’s great nephew. Mary Beth Sifers is the chief financial officer and also serves as the head of personnel for the company.

Recent contracts with the Departments of Defense and Homeland Security have imposed additional security requirements upon the company and its R&D DevOps and SCADA labs operations. The company is now required to comply with NIST Special Publication 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. The company must also comply with provisions of the Defense Federal Acquisition Regulations (DFARS) including section 252-204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting. These requirements are designed to ensure that sensitive technical information, provided by the federal government and stored on computer systems in the Sifers-Grayson R&D DevOps and SCADA labs, is protected from unauthorized disclosure. This information includes software designs and source code. The contract requirements also mandate that Sifers-Grayson report cyber incidents to the federal government in a timely manner.

SCADA Lab

The SCADA lab was originally setup in 1974. It has been upgraded and rehabbed several times since then. The most recent hardware and software upgrades were completed three years ago after the lab was hit with a ransomware attack that exploited several Windows XP vulnerabilities. At that time, the engineering and design workstations were upgraded to Windows 8.1 professional. A second successful ransomware attack occurred three months ago. The company paid the ransom in both cases because the lab did not have file backups that it could use to recover the damaged files (in the first case) and did not have system backups that it could use to rebuild the system hard drives (in the second case).

The SCADA Lab is locked into using Windows 8.1. The planned transition to Windows 10 is on indefinite hold due to technical problems encountered during previous attempts to modify required software applications to work under the new version of the operating system. This means that an incident response and recovery capability for the lab must support the Windows 8.1 operating system and its utilities.

R&D DevOps Lab

The R&D DevOps Lab was built in 2010 and is used to develop, integrate, test, support, and maintain software and firmware (software embedded in chips) for the company’s robots, drones, and non-SCADA industrial control systems product lines. The workstations in this lab are running Windows 10 and are configured to receive security updates per Microsoft’s monthly schedule.

Enterprise IT Operations

The company uses a combination of Windows 10 workstations and laptops as the foundation of its enterprise IT capabilities. The servers in the data center and the engineering R&D center are built upon Windows Server 2012.

Issues Summary:

1. Newly won government contracts now require compliance with DFARS §252.204-7008, 7009, and 7012

· http :// www.acq.osd.mil/dpap/dars/dfars/html/current/252204.htm

· http :// www.acq.osd.mil/se/docs/DFARS-guide.pdf

2. Derivative requirements include:

· Implementation of and compliance with NIST SP 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r1.pdf

· Compliance with DFARS 252.239-7009 Representation of Use of Cloud Computing and 7010 Cloud Computing Services (see https://www.acq.osd.mil/dpap/dars/dfars/html/current/252239.htm#252.239-7009

3. Additional Contractual Requirements for Lab Operations include:

· Incident Response per NIST SP-800-61 (Computer Security Incident Handling Guide)

· SCADA Security per NIST SP 800-82 (Guide to Industrial Control Systems Security)

· Software / Systems Development Lifecycle (SDLC) Security per NIST SP 800-64 (Security Considerations in the System Development Life Cycle)

· Configuration Management per NIST SP 800-128 (Guide for Security-Focused Configuration Management of Information Systems)

RESOURCES

After Action Review- https://www.betterevaluation.org/en/evaluation-options/after_action_review

Guide to the After Action Review- (see attachment)

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"

situational awareness

Chapter 7 discusses situational awareness. Much of the security efforts of the past have been centered around prevention and protection. The increasing sophistication of cyber attacks have shown that no controls are 100% effective, and some compromises do occur. There is a rising realization that in addition to considering prevention and protection, controls that address detection and response are necessary to improve security posture. Please describe how situational awareness is a driver for detection and response controls.

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, describe how situational awareness is a driver for detection and response controls.

===================================================

 

Chapter 19 introduced the impact of the global digital divide. According to the authors, countries that lag behind the rest of the world’s ICT capabilities encounter difficulties at various levels. Discuss specific areas, both within and outside, eGovernance, in which citizens living in a country that lags behind the rest of the world in ICT capacity are lacking. Include in your discussion quality of life, sustainability, safety, affluence, and any other areas that you find of interest. Use at least 8-10 sentences to discuss this topic.

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, discuss specific areas, both within and outside, eGovernance, in which citizens living in a country that lags behind the rest of the world in ICT capacity are lacking. Include in your discussion quality of life, sustainability, safety, affluence, and any other areas that you find of interest. Use at least 8-10 sentences to discuss this topic.

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"

Teaming Across Distance And Culture

What are the major effects of the physical separation of group members? How can distance, in some cases, be beneficial to groups and teams?

· What other areas of organizational behavior or design are impacted by information technology, and what are the implications for organizational change?

· Brainstorm some ways to “redesign” your office space (or an office space you have previously worked in) on paper using virtual or flexible space, or flexible furniture. How would this redesign enhance successful teamwork?

· What are some of the ways that cross-cultural teams are distinguished from other types of teams? What are some of the benefits and difficulties of building a cross-cultural team?

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"

The Impact of The Global Digital Divide

Countries and ICT capabilities Many countries are still in the initial stages of implementing ICT in policymaking due to the technology backwardness or digital divide among a different set of groups involved in the process. eGovernment cannot function successfully without the true involvement of stakeholders at different levels, and several tools like eparticipation tools and simulation tools are not available that can change the course of policy implementation to a better process. Due to the lack of funding, many initiations to encourage the participation of the public in the process, educating them on the benefits are getting nowhere. Below are some of the troubles that are mostly interrelated, faced by the citizens of countries that cannot overcome the digital divide and still lagging other countries in using ICT in policymaking. Quality of life: Quality of life index would deteriorate due to the lack of optimized policy that meets the needs of the community since their voice is not heard or included, and the worst-case possibilities are not tested on policy implementation. Sustainability: Due to the lack of ICT and participation of all the stakeholders, the policy cannot grow the community in a sustainable way, and therefore, it will very vulnerable to changes. Safety: With no sustainable environment, the safety of the people becomes questionable. Affluence: When there is no way to hear and involve most of the people, it would be easier for an affluent agent to change the policies that would benefit them. External factors would stress the government to work for them. Community divide: Since a majority is not involved in the policymaking, they may revolt against the government or against a community that’s getting benefitted, and a divide happens that would grow into violence. Climate Change: Lack of involvement accelerates climate change due to irresponsible behavior with or without knowing. Health Crises and life expectancy: All the above factors would affect people’s health and in turn, life expectancy.

Countries and ICT capabilities Many countries are still in the initial stages of implementing ICT in policymaking due to the technology backwardness or digital divide among a different set of groups involved in the process. eGovernment cannot function successfully without the true involvement of stakeholders at different levels, and several tools like eparticipation tools and simulation tools are not available that can change the course of policy implementation to a better process. Due to the lack of funding, many initiations to encourage the participation of the public in the process, educating them on the benefits are getting nowhere. Below are some of the troubles that are mostly interrelated, faced by the citizens of countries that ca.nnot overcome the digital divide and still lagging other countries in using ICT in policymaking Quality of life: Quality of life index would deteriorate due to the lack of optimized policy that meets the needs of the community since their voice is not heard or included, and the worst-case possibilities are not tested on policy implementation. Sustainability: Due to the lack of ICT and participation of all the stakeholders, the policy cannot grow the community in a sustainable way, and therefore, it will very vulnerable to changes. Safety: With no sustainable environment, the safety of the people becomes questionable. Affluence: When there is no way to hear and involve most of the people, it would be easier for an affluent agent to change the policies that would benefit them. External factors would stress the government to work for them. Community divide: Since a majority is not involved in the policymaking, they may revolt against the government or against a community that’s getting benefitted, and a divide happens that would grow into violence. Climate Change: Lack of involvement accelerates climate change due to irresponsible behavior with or without knowing. Health Crises and life expectancy: All the above factors would affect people’s health and in turn, life expectancy.

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"

Information Technology

 What are your research interests in the area of Information Technology? Why are you inspired to research in this area, and why do you think it is important to research in this area?

Why did you select PhD in Information Technology? Why did you select xx university

As an individual, what are your strengths and weaknesses and how will they impact you as a PhD IT student?

Where do you see the future of Information Technology going and where do you see yourself in this mix after obtaining PhD in Information Technology from xx university?

xercises: process management (due first class week 7)

2. Give an original “real life” example (not related to a computer system environment, not discussed in our textbook or in lecture) of each of these concepts: deadlock, starvation, and race.

5. Using the narrow staircase example from the beginning of this chapter, create a list of features or actions that would allow people to use it without causing deadlock or starvation.

14. As discussed in this chapter, a system that is in an unsafe state is not necessarily deadlocked. Explain why this is true. Give an example of such a system (in an unsafe state) and describe how all the processes could be completed without causing deadlock to occur.

16. Given the four primary types of resources—CPU, memory, secondary storage, and files—select for each one the most suitable technique described in this chapter to fight deadlock and briefly explain why you choose it

___________________________________________________________________________

Exercises: device management (due first class week 8)

3. Explain the differences between blocking and buffering.

7. Minimizing the variance of system response time is an important goal, but it does not always prevent an occasional user from suffering indefinite postponement. What mechanism would you incorporate into a disk scheduling policy to counteract this problem and still provide reasonable response time to the user population as a whole? Explain your answer.

8. Explain the difference between buffering and spooling.

9. Under light loading conditions, every disk scheduling policy discussed in this chapter tends to behave like one of the policies discussed in this chapter. Which one and why?

12a. Disk track requests are not usually equally or evenly distributed. For example, the tracks where the disk directory resides are accessed more often than those where the user’s files reside. Suppose that you know that 50 percent of the requests are for a small, fixed number of tracks. Which one of the scheduling policies presented in this chapter would work best under these conditions? Explain your answer.

Exercises: file management (due first class week 9)

3. Is device independence important to the File Manager? Explain why or why not.

6. Files can be formatted with fixed length fields or variable length fields. In your opinion, would it be feasible to combine both formats in a single storage medium? Explain the reasons for your answer.

14. Compare and contrast dynamic memory allocation with the allocation of files in secondary storage.

Exercises: security basics (due first class week 10)

1. Give three examples of excellent passwords and explain why each would be a good choice to protect a system from unauthorized users.

2. Give three advantages and disadvantages of password generator software. Would you recommend the use of such software for your own system? Explain why or why not.

7. Many users are required to log into several networks and thus have multiple passwords, which are difficult to remember. Name three ways that a user can manage these password requirements and compare the advantages and disadvantages of each. Which one you would use, and why?

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"

Health Care Information System

Due Week 10 and worth 150 points

Write a three to five (3-5) page paper in which you:

  • Select a health care setting within which to implement an electronic medical record product. Be as specific as possible.
    • Examples of health care delivery settings are as follows: a small community hospital, a rural primary care clinic, a home health agency, a medical unit within a correctional facility, a large multi-facility urban hospital system, or a specialty physician’s office such as oncology or endocrinology.
    • Consider choosing a setting that you currently work in or would like to work in later on in your career.
  • Describe this health care setting, the patient population it serves, the volume of patients that it serves, the needs of the setting, etc.
  • Identify a health care information system to meet the needs of this facility. Is there a vendor who offers such a system, or is a custom solution needed? Provide details.
  • Include the all necessary elements in the proposal:
    • Capabilities of the system, how the system aligns with the needs of the health care facility, initial and maintenance costs of the system, staff needs to support the system, the timeline and plan for implementation of the system, the strategy for introducing staff to the system, getting buy-in and cooperation, providing training, and how privacy, security, and confidentiality will be maintained.
  • Identify three to five (3-5) potential barriers in implementing the system and describe how you would work around those barriers.

Go to https://research.strayer.edu to locate at least three (3) quality resources to use in this assignment. Note: Wikipedia and similar Websites do not qualify as academic resources. Refer to the Strayer University Library, https://research.strayer.edu.

 

  • This course requires the use of the new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Use the resources available in this course to help with this system’s implementation proposal.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"