Archive for January 19th, 2018

CIS512 W3 Assignment

Many organizations have now adopted or begun to offer cloud computing. This type of computing has advantages and disadvantages that may vary from organization to organization. Select two (2) organizations in which you are interested, and use the Internet and Strayer Library to research the advantages and disadvantages of cloud computing for the selected organizations. Use the Internet to research the characteristics of organizations most likely to use cloud computing.

Write a three to four (3-4) page paper in which you:

1. Determine whether or not there are definite characteristics of organizations that are more likely to use cloud computing than other organizations. Provide a rationale for your response.

2. Examine the major advantages and disadvantages of cloud computing for the two (2) selected organizations. Recommend whether or not each of the selected companies should use cloud computing. Provide a rationale for your response.

3. Determine whether or not government agencies such as the National Security Agency (NSA) or Central Intelligence Agency (CIA) would be good candidates for cloud computing. Provide a rationale for your response.

4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

· Analyze the types of organizational and computer architectures for integrating systems.

· Compare and contrast the types and role of distributed software architecture.

· Use technology and information resources to research issues in enterprise architecture.

· Write clearly and concisely about Advanced Computer Architecture topics using proper writing mechanics and technical style conventions.

Discussion1

Read the "Creating a Methodology" and then answer one (1) of the questions

1. What can you determine about the corporate culture from the fact that they waited this long to consider the development of an EPM system?

2. Can a PMO accelerate the implementation process?

3. Is it acceptable for the PMO to report to the chief information officer or to someone else?

4. Why is it best to have six or less life-cycle phases in an EPM system?

5. Is it best to design an EPM system around flexible or inflexible elements? Generally, when first developing an EPM system, do companies prefer to use formality or informality in the design?

6. Should an EPM system have the capability of capturing best practices?

Protecting Patient Data

You are tasked to analyze the use of information technology resources and assess the applicability to United General Hospital and the video scenario presented in this week’s Discussion. Your response to this assessment will be to write policy statements that address specific issues related to patient health care records and align with HIPAA regulations. Assess threats related to issues presented in the case study that United General Hospital must address.

Part I: Policy Manual Introduction (1–2 pages)

United General’s hospital administrator reviews the hospital’s policy manual and discovers that it inadequately addresses the area of patient records. The hospital administrator tasks you with reviewing the hospital policy manual and reporting on the thoroughness of its coverage of patient records. After a review of the policy manual, you report that the coverage of patient records is sparse and outdated. The hospital administrator then asks you to update the policy manual.

The policy manual introduction should include:

  • An update to the manual’s introduction to include more depth in the area of patient records. As you write this section, describe the purpose of patient record protection and its importance to the organization.
  • An explanation of the legal requirements for protecting patient health records.

Part II: Risk Assessment (3–5 pages)

Because Pete compromised Winnie’s patient records, the hospital administrator tasks you with identifying other potential risks that the hospital and the primary care physicians may need to address to protect patient records.

Your risk assessment should:

  • Identify risks to both electronic and paper patient records, and recommend remedies United General can put in place to protect the records from compromise.
  • Create policy statements that comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA) regulations addressing access to and disclosure of electronic and paper patient records.
  • Describe relevant training topics that will educate the staff on accessing and disclosing patient records.

Part III: Alignment with Regulatory Requirements (3–5 pages)

Winnie’s lawsuit refers to United General’s violation of patient record protection and privacy regulations as the prime cause of the problem. This has now opened United General to governmental inquiries as well as to federal lawsuits.

Write a 3–5 page APA style paper addressing the following:

  • Review the requirements of the HIPAA regulations and identify areas in the case study that breached HIPAA regulations, remembering your analysis of the hospital’s policy manual—the policies applicable to patient record handling and disposal require an update to align with HIPAA regulations.
  • Create policy statements that align with HIPAA regulations that address patient health care record handling and disposal.
  • Describe relevant training topics for staff in order to educate them on the handling and disposal of patient records.

Part IV: Managerial Oversight (3–4 pages)

During Pete’s exit interview he states that he did not receive managerial direction or training in regard to accessing computer systems and online patient records. The hospital administrator reviews the management training manual and finds that the area detailing instructions that management needs to give to staff is sparse. The hospital administrator asks that you write a section of the management training manual to provide clear instructions for management oversight in the area of handling and accessing patient records. As part of managerial oversight of hospital staff, access to patient records should be restricted and only available to appropriate staff members. For instance, in this case study, Pete should not have had access to Winnie’s patient record.

This section of the management training manual should:

  • Include clear instructions for management oversight in the area of handling and accessing patient records.
  • Include policy statements for role-based security level access to patient records.
  • Describe methods to set security levels for accessing patient records to support the policy statements.

Note: The paper should be 10–16 pages, not including the title and reference pages. Your Assignment must be written in standard edited English. Be sure to support your work with 4–6 specific citations from this week’s Learning Resources and additional scholarly sources as appropriate. Refer to the Essential Guide to APA Style for Walden Students to ensure that your in-text citations and reference list are correct. Your Assignment should show effective application of triangulation of content and resources to show your conclusion and recommendations. See the Week 9 Assignment Rubric for additional requirements related to research and scholarly writing.

Effective Approaches In Leadership And Management

In this assignment, you will be writing a 1,000-1,250-word essay   describing the differing approaches of nursing leaders and managers to   issues in practice. To complete this assignment, do the following:

 

  1. Select an issue from the following list: nursing shortage and     nurse turn-over, nurse staffing ratios, unit closures and     restructuring, use of contract employees (i.e., registry and travel     nurses), continuous quality improvement and patient satisfaction,     and magnet designation.
  2. Compare and contrast how you would     expect nursing leaders and managers to approach your selected issue.     Support your rationale by using the theories, principles, skills,     and roles of the leader versus manager described in your   readings.
  3. Identify the approach that best fits your personal     and professional philosophy of nursing and explain why the approach     is suited to your personal leadership style.
  4. Identify a     possible funding source that addresses your issue. Consider looking     at federal, state, and local organizations. For example: There are     many grants available through the CDC, HRSA, etc.
  5. Use at     least two references other than your text and those provided in the   course.

Prepare this assignment according to the APA guidelines found in the   APA Style Guide, located in the Student Success Center. An abstract is   not required.

This assignment uses a rubric. Please review the rubric prior to   beginning the assignment to become familiar with the expectations for   successful completion.

You are required to submit this assignment to Turnitin

MS3

MS3

Prompt: Review your entire final project and develop a suitable incident response plan (IRP)based on the scenario presented in both your Final Project Scenario and the virtual environment presented in the educational video game Agent Surefire: InfoSec. Be sure to discuss the following in your plan: 

· Identify the purpose of the plan. 

· Create and define roles and responsibilities. 

· Define an incident with at least five examples of that incident (e.g., unauthorized access). 

· Discuss current incident response process within Limetree Inc., including current shortcomings 

· Create a new process for incident response. This must include incident recovery (use a flowchart to enhance your definition).

 

Guidelines for Submission: Your responses must be submitted as SIX to EIGHT (6-8) pages long excluding references and cover page as a Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least four sources cited in APA format. Make sure you cite if you take a piece of someone’s work, very important and your reference should relate to your writing (don’t cite a reference because it relates to the course and not this very paper) at least 4 current and relevant academic references. No heavy paraphrasing of others work.

Developing A Risk-Mitigation Plan Outline For An IT Infrastructure

Developing A Risk-Mitigation Plan Outline For An IT Infrastructure

Guidelines for Submission: Your responses must exclude references and cover page as a Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least four sources cited in APA format. Make sure you cite if you take a piece of someone’s work, very important and your reference should relate to your writing (don’t cite a reference because it relates to the course and not this very paper) at least 4 current and relevant academic references. No heavy paraphrasing of others work.

 

Systems

1. What are four types of feasibility? Which type focuses on total cost of ownership? Which type do users primarily influence?

 

 

2.Describe the six steps in a typical preliminary investigation. Why should an analyst be careful when using the word problem?

Heritage Assessment

Heritage Assessment

One approach nurses can use to deliver quality and safe care to client populations is to determine the extent to which a client identifies with a traditional heritage. Through independent online research locate a heritage assessment tool. Conduct your own heritage self-assessment. Answer the following questions about your experience. 

My heritage is that of a Caucasian from the southern part of America brought up in a Christian family background. 
In a 1-2 page Word document:

  1. Reflect upon your own heritage assessment and explain the degree to which your answers indicate you identify with your traditional heritage.
  2. If you believe or do not believe you identify with your traditional heritage, discuss why and how you believe it may impact your nursing practice.
  3. Explain how you can use a tool like a heritage assessment with clients and their families and how this will help develop your cultural competence.
  4. APA format with references

 

Application 1 – Analysis and Synthesis of Prior Research

Application 1 – Analysis and Synthesis of Prior Research

At professional conferences, blocks of time may be set aside for what are termed "poster sessions." A hotel ballroom or large open area will be ringed with individuals who use displays such as posters or electronic presentations displayed via projectors. These sessions provide an opportunity to share one's research in an intimate setting, with a small group gathered around who share a similar interest. The seminar format of this course is very similar to this academic exchange. During one set of paired weeks, you will be appointed as a Group Leader. If you are one of the Group Leaders for this week, you are to prepare an academic presentation, much like a poster session.

Your presentation should present analysis and synthesis of prior research and will begin the interaction with your colleagues. You will prepare an academic paper of between 5–7 pages in APA format, as well as a PowerPoint presentation of 7–10 slides. This analysis will be an open-ended introduction to relevant topics of study regarding systems design, analysis, and implementation. Your goal, as the presenter, should be to persuade your discussants that the approach(es) you have analyzed and synthesized is/are a sound means for discovering new methods in the field. You should acknowledge that there are other models, or means to study various types of systems, but you should strive to be as persuasive as possible that the specific concepts you have reviewed are exciting research avenues and that they are potentially breakthrough areas for advancing the understanding of systems development.

Your paper and presentation should contain the following elements:

  • An incorporation and analysis of at least 5 of the Required Resources from this pair of weeks;
  • The incorporation and analysis of 5 additional resources from the Walden Library;
  • An identification of principal schools of thought, tendencies in the academic literature, or commonalities that define the academic scholarship regarding your topic;
  • An evaluation of the main concepts with a focus on their application to management practice and their impact on positive social change;
  • Direct evidence of addressing the learning outcomes from this pair of weeks.

In addition to the above elements, the Group Leader(s) for this week will focus thematically on:

  • Articulating the relationship between requirements and requirements specification;
  • Identifying the role of management in requirements elicitation, analysis, and validation;
  • Conceptualizing the differences among the four software system modeling perspectives: external, interaction, structural and behavioral;
  • Analyzing the role of software architecture and architectural design in organizing and designing a software system.

Executive Summary On Veterans Affairs (VA) Loss Of Private Information

Refer to the “Case Study: Veterans Affairs (VA)” text sheet. By now, you have analyzed the case study and have suggested possible mitigating remedies to prevent loss of private information. Write an executive summary that supports your list of suggested remedies.

To begin, summarize your findings in a simple bullet-point list. This will help to prioritize the remedies suggested. Once you have the summary ready, compile your findings in the form of an executive summary. The main points you need to cover are:

  • Analyze the mistakes committed by both the employees and the Department of Veterans Affairs that led to data loss.
  • Ensure that the remedies you suggest prevent the mistakes you analyzed from reoccurring in the future. You can think of using encryption as one of the possible remedies. In this case, describe how encryption can be used.
  • Explain methods that will ensure proper monitoring and enforcement of the existing security policies.
  • Analyze the procedural changes made by the Department of Veterans Affairs as a result of the 2006 data breach. Are the changes sufficient to prevent similar data breaches in the future?

Required Resources

Text Sheet: Case Study: Veterans Affairs (VA) (ts_caseveteransaffairs)

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial 10-point size, Double-space
  • Citation Style: Follow your school’s preferred style guide
  • Length: No more than 500 words
error: Content is protected !!