flat and hierarchical organizations

Lab Assessment 2 – ISOL 631 – Operations Security
University of the Cumberlands
Dr. Charles DeSassure

Instructions

1. Answer each question thoroughly.

2. Include your full name as a header.

3. Do not copy and paste information from the Internet, you will receive a zero for this assignment.

4. You may research information from the Internet and rewrite it in your own words (acceptable).

5. Do not copy another student work. The University of the Cumberlands has a strict policy relating to cheating. Think before you act!

6. Provide your answers as outlined below. Each answer should be on a separate page.

7. Assessment: 25 pts per question. Please research and explain your answers. Do not type one or two sentences and expect to receive full credit. And please do not include meaningless words.

8. After you have answered each question, submit in MS Word document format.

 

Overview
In this lab, you identified human nature and behaviors in hierarchical and flat organizations, you found ways to ensure employees overcome apathy related to security awareness, you identified how security policies shape organizational behaviors and culture, you compared hierarchical and flat organizational structures, and you created an organizational policy implementation plan for a combined organizational structure.

 

1.  What are the differences between flat and hierarchical organizations?

 

2.  What is difficult about policy implementation in a flat organization?

 

3.  What is difficult about policy implementation in a hierarchical organization?

 

4.  How do you overcome employee apathy toward policy compliance?

 

"Are you looking for this answer? We can Help click Order Now"

research paper

Read the attached research paper (Yang et al. 2018) and 2 chapters as below mentioned and conduct research using the Google Scholar on Enterprise Risk Management and Firm Performance.

Write a 6 page (double space, Font – Georgia with font size 12) research paper on your findings on enterprise risk management and firm performance.

The research paper needs to refer to the following references

1.  Yang, S.; Ishtiaq, M.; Anwar, M. Enterprise Risk Management Practices and Firm Performance, the Mediating Role of Competitive Advantage and the Moderating Role of Financial Literacy. J. Risk Financ. Manag. 2018, 11- 35(see attachment)

2. Chapter 18, BlueWood Chocolates (from ERM textbook (Fraser, J., Simkins, B., & Narvaez, K. (2014). Implementing enterprise risk management: Case studies and best practices. John Wiley & Sons.)

3. Chapter 19 Kilgore Custom Milling (from textbook)

In addition, the research paper needs to minimally refer to 3 peer reviewed journal papers. The bibliography should be included as a separate page and is not part of the 6 page requirement.

The research paper should include the following components

  1. Title Page (Not part of the minimum 6 page requirement)
  2. Abstract (quick review of the entire content of the paper, limited to 200-350 words)
  3. Introduction (1-2 pages, provides a broad overview of the topic and basic background information)
  4. Literature Review (2-3 pages, describes the research papers that you find in reference to enterprise risk management and firm performance, it can list theories about the subject, findings from other studies and research directions. Please ensure to refer to the case studies from the attached research paper Yang et al. 2018)
  5. Discussion (1-2 pages -This should include your thoughts on the topic and implications in reference to ERM and firm performance. Please draw on examples/other studies to support your thoughts)
  6. Conclusion (1-2 paragraphs, This provides a final summary of your research paper)
  7. Bibliography in APA format
 

"Are you looking for this answer? We can Help click Order Now"

the ATM problem

Need it finished by 1am est 1/28/19 9 hours from now

  1. Delimit the ATM problem

  2. by creating a problem diagram using Visio or an equivalent such as Dia. The diagram must show system components that are relevant to the problem of withdrawing cash. Note: The graphically depicted solution is not included in the required page length.
  3. Write one (1) paragraph that describes the use and meaning of the problem diagram components.
  4. Create two (2) Structured Analysis and Design Technique (SADT) diagrams to document the activities and data involved in the transactions stated above using Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length.
  5. Write one (1) paragraph that describes the use and meaning of the SADT diagram components.

  6. Provide three (3) possible scenarios of interaction between you and the ATM through a few message sequence charts.
  7. Create one (1) UML diagram for each scenario, from Question 5, to show the interactions. Note: The graphically depicted solution is not included in the required page length.
  8. Create one (1) state machine diagram for the ATM that covers the scenarios you have identified in Question 5 using Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length.
  9. Write one (1) paragraph that describes the use and meaning of the state machine diagram components
 

"Are you looking for this answer? We can Help click Order Now"

Team Leadership/Management Style

Team Leadership/Management Style

Part 1: According to the Sarin and O’Connor (2009) article, certain style and goal structures of team leaders have a strong influence on internal team dynamics.  Based on your research within the article and textbook, as well as your own experience, what team leader management style would be most effective in leading a team in which you were a member?

Part 2: DeRue, Barnes, and Morgeson (2010) found that team leadership style effectiveness depended on the level of charisma exhibited by the leader.  Drawing from the article and the textbook, have you ever worked for a charismatic leader?  What style (coaching or directing) did that leader administer?  Was he or she effective in leading you as part of the team?

Specific Instructions:

APA format

No plagirism

Need in the next 4 hours

300 words

 

"Are you looking for this answer? We can Help click Order Now"

Estimation Techniques

“Estimation Techniques” Please respond to the following:

  • There are various methods that may be used to determine activity estimates with respect to resources, costs, and durations. Choose at least three estimation techniques that may be used for determining activity estimates for an IT project. Describe the pros and cons of each. Determine the most efficient estimation technique for an IT project; include an example or scenario to support your response.
  • Describe the accuracy level and the risk level of effort and the activities associated with each estimation technique you chose in Part 1 of this discussion. Determine the technique that would be efficient for the following:
  1. Estimating a source code based project

  2. Systems development project
  3. High-risk software project
 

"Are you looking for this answer? We can Help click Order Now"

reduce potential vulnerabilities, protect against intrusion attempts

Read Chapter 3: Separation from book Amoroso, E. G. (2012). Cyber-attacks: protecting national infrastructure.

Elsevier. (https://books.google.com/books?hl=en&lr=&id=uwko5fHsexIC&oi=fnd&pg=PP1&dq=Amoroso,+E.+G.+(2012).+Cyber+attacks:+protecting+national+infrastructure.+Elsevier&ots=yZIAXEXmeB&sig=vLybpAGqNTXZIWdZCShU-Kg3ud0#v=onepage&q&f=false)

In today’s world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.

It is the policy of the United States

to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States. The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.

Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.(350 words)

 

"Are you looking for this answer? We can Help click Order Now"

Project Managers and Leadership, Ethics, and  Technology.

This assignment a document to be delivered in a word processor document format. Write a two to three (2-3) page paper covering:

  1. The context of your paper.
  2. The contribution of the paper to the Literature.
  3. The gap in the Literature.
  4.  Use at least seven (7) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Overview

This  is one of the most important steps to help you prepare for the term  paper. The goal for the literature review is to understand what is  already published about Project Managers and Leadership, Ethics, and  Technology. You should use the library for this assignment extensively.  The literature review should include the following parts.

Context  of your outline. You need to explain the context of the points in your  outline using the perspectives presented by the literature. You should  expect several cited sources to appear here.

Contribution of the  paper to the Literature. You need to explain how your paper contributes  to the literature surrounding your outline.

Explain how you  expect the paper to contribute knowledge and insight into the context  supporting the topic. Remember, every topic has supporting  context—without it, you do not have the people and processes allowing  the topic to exist. So, make sure you have a contribution as to help  others enhance their understanding of the topic.

Gap in the  Literature. Explain how your paper fills in a missing segment (or gap)  in the literature. Your unique perspective will contribute something  new.

The specific course learning outcomes associated with this assignment are:

  • Describe and demonstrate ethical practices in project management.
  • Examine the human resource factors that can impact project management.
  • Use technology and information resources to research issues in IT project management.
  • Write  clearly and concisely about issues in IT project management using  proper writing mechanics and technical style conventions.

Rubric

1. Explain the context of the paper

2. Describethe contribution of the paper to the Literature

3. Identify the gap in the literature

4. Seven references

5. Clarity, writing mechanics, and formatting requirements

 

"Are you looking for this answer? We can Help click Order Now"

aspects to security

During this time when the Internet provides essential communication

between literally billions of people and is used as a tool for commerce, social interaction, and the exchange of an increasing amount of personal information, security has become a tremendously important issue for every user to deal with.

There are many aspects to security and many applications,

ranging from secure commerce and payments to private communications and protecting health care information. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient.

In your initial discussion post, please describe the hashing security mechanism and how it is different from the encryption mechanism.

Respond substantively to at least two other students’ posts. In your peer responses, please discuss how these mechanisms work to provide password security in today’s organizations. Can they be used together?

 

"Are you looking for this answer? We can Help click Order Now"

real time health sector usage

You should right something related to cloud computing in real time health sector usage  and how it is used in real time environment as if i’m writing in own words not copying from internet

Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe how these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:  Provide a 500 word minimum (or 2 pages double spaced) reflection essay.

Use of proper APA formatting and citations. When supporting evidence from external resources is used, those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

 

"Are you looking for this answer? We can Help click Order Now"

a shopping cart

mplement the class structure

that represents a shopping cart

for an online shop

and items that

can be put in

the shopping cart

.

Create the following classes

. Use appropriate access modifiers

(

member

variables should be private!)

and data types for each.

Don’t forget to add

getter

and

setter functions

for each member variable.

Item

: This class has the

member variable

s

called

title

,

description

, and

price

.

It has a

pure

virtual

function

called print

(

void print() = 0;

)

that prints the type and description of

the current object to the console. This function is NOT

implemented in this class but

must be implemented/overridden in the three subclasses below.

o

Book

:

This class inherit

s

from Item. It has an

instance variable called pageCount.

o

Movie

:

This class inherits from Item. It has an instance variable called length.

o

CD

:

This class inherits from Item. It has an instance variable called trackCount.

ShoppingCart

:

This class

keeps track of items that were bought

.

It

has

a single

constructor which expects the maximum number of items that can be placed in the cart.

It must

have a dynamically allocated array of pointer

s

to an item object

(

Item

*

* array

;

)

which is initialized in the

constructor

(

array =

new Item*[size]

).

The cart

must have

functions to add an item

object to the

cart

and

print

the items c

urre

ntly in the cart to

the console by calling each o

bject’s

print

()

function.

can anyone do this assignment for me plagiarism  free in c++

 

"Are you looking for this answer? We can Help click Order Now"