ACC/340: Accounting Information Systems I

Write a response of no more than 1,050 words to Problem 6 from Ch. 1, “Accounting Information Systems and Firm Value” of Accounting Information Systems.Using the accompanying explanations of each IT strategic role, suggest the appropriate IT strategic role (automate, informate or transform) for the following types of IT investments. Depending on your interpretation, it is possible that some of the IT investments could include two IT strategic roles.a. Digital health recordsb. Google Maps that recommend hotels and restaurants along a trip pathc. Customer relationship management softwared. Supply chain management softwaree. Enterprise systemsf. Airline flight reservations systemsg. PayPal (www.paypal.com)h. Amazon.com product recommendation on your homepagei. eBayj. Course and teacher evaluations conducted online for the first time (instead of on paper)IT Strategic RolesAutomate IT Strategic Role• Replace human labor by automating business processes.• Virtually no IT-driven transformation efforts.• IT providing enhancements to existing processes or practices.Informate-Up/-Down IT Strategic Role• Provide new data/information to empower management, employees, or customers.• An intermediate level of IT-driven transformation efforts.• Gain clearer picture of cause–effect relationships, greater understanding of operating environment.Transform IT Strategic Role• Fundamentally alter traditional ways of doing business by redefining business capabilities and/or (internal or external) business processes and relationships.• Strategic acquisition to acquire new capabilities or to enter a new marketplace. • Use of IT to dramatically change how tasks are carried out recognized as being important in enabling firm to operate in different markets, serve different customers, and gain considerable competitive advantage by doing things differently.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

MBA – Online – Act 4

Activity 4Activity I – Qualitative Risk Assessment.  Imagine that you are a member of a project team that has been charged with developing a new product for the residential building industry. Using a qualitative risk analysis matrix, develop a risk assessment for a project based on the following information: :Identified risk factorsLikelihood1.   Key team members pulled off project                  1.   High2.   Chance of economic downturn                            2.   Low3.   Project funding cut                                               3.   Medium4.   Project scope changes                                           4.   High5.   Poor spec. performance                                        5.   LowBased on this information, how would you rate the consequences of each of the identified risk factors?  Why?  Construct the risk matrix and classify each of the risk factors in the matrix.Activity II – Sochi Olympics—What’s the Cost of National Prestige?The Sochi Olympics was an example of project costs running out of control; so much so that the final price tag (estimated to be more than $50 billion), dwarfed the costs of every other Olympic Games to this point in time.  In addition to picking a questionable, sub-tropical location for the Games, from the very beginning, the process of developing the site was subject to meddling from politicians, including President Vladimir Putin. Another major cost to the final price tag was related to charges of wide-spread corruption, as sub-projects for the Games (such as infrastructure, buildings, and roads) ended up with highly inflated price tags.   This is a great case for general class discussion as we consider the purpose for Olympic Games, the challenges of cost control with critical deadlines that must be adhered to, and the fact that costs are rising for Games to the point where in 2017, Rome, Budapest, and several other cities withdrew their bids to host the 2024 Olympics because they could not trust the final costs and could not justify the value they would gain versus the costs of the project.QuestionsConsider the following statement: “Government-funded projects intended to serve as ‘prestige projects,’ such as the Sochi Olympics, should not be judged on the basis of cost.” Do you agree or disagree with this statement? Why?Project success is defined as adherence to budget, schedule, functionality (performance), and client satisfaction.  Under these criteria, cite evidence that suggests the Sochi Olympics project was a success and/or failure.When a project has a “hard gate,” like being ready on time, how does that affect normal success criteria?  Is it fair to judge a project with a critical completion date by normal project success standards?  Why or why not?Consider the problems with the Rio Olympics sites that quickly occurred following completion of the 2016 Summer Games.  Access the internet to find evidence of the current state of the Sochi Olympic site.  How is it being used and what are the current problems and opportunities for Sochi?

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Enterprise Risk Management ITS 835

Homework AssignmentAddress the following questions:What other strategic processes are closely tied to ERM?Performance measurement and budgeting are closely tied to ERM.What three kinds of risks are identified within the City of Edmonton?The City has strategic, project, and operating risks.What two criteria must be balanced in a successful ERM model?An ERM model should be simple enough to understand while being complex enough to add value.Who is responsible for dealing with and mitigating risks?The risk owner is responsible.To what body must the City’s strategic risks be reported?Risks are reported to the City Council, through the Audit Committee.Major Homework RequirementsThe homework assignments are not opinion compositions, or a book, chapter, or article review. These assignments are positional arguments that are entirely supported by empirical evidence and well-known industry facts. You can include your personal experiences and ideas if it directly relates to the topic, or reinforces your position. However, you must support all statements with evidence. All submissions must adhere to APA guidelines. APA writing is an academic standard; therefore,it is not optional, it is mandatory.Points are deducted if your submission does not adhere to the following requirements:Be a scholarly submissionInclude a title pageTimes New Roman font, 1-inch margin, and double-spacedBe at least two pages in lengthShould not consist of any bullet-pointsHave a reference page with at least three academic referencesYou CANNOT use Wikipedia, LinkedIn articles, blogs, paid vendors, certification websites, or similar sources in academic writing. You CAN use reputable industry articles from publications similar to ComputerWeekly, PCMag, Wall Street Journal, New York Times, or similar sources. Academic journals and popular industry articles are accessible in the university’s library databases and Google Scholar. All references should not have a publication date older than 2005.Be written in a clear and concise mannerContains contractual phrases, as an example “shouldn’t” “couldn’t” or “didn’t,” or similarUses vague words such as “proper,” “appropriate,” “adequate,” or similar to describe a process, function, or a procedure.As an example, “proper incident response plan,” “appropriate IT professional,” “adequate security,” or similar. These words are subjective because they have a different meaning to different individuals.Does not adhere to the University’s academic dishonesty and plagiarism policies.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

POM+ Project, Part 1

Develop the Work Breakdown Structure (WBS) outline and Gantt chart using Microsoft® Project 2016 and the information provided in the textbook. Save your file.Use this file and the information provided below to create a project schedule:The following holidays are observed: January 1, Martin Luther King Day (third Monday in January), Memorial Day (last Monday in May), July 4th, Labor Day (first Monday in September), Thanksgiving Day (fourth Thursday in November), December 25 and 26.If a holiday falls on a Saturday then Friday will be given as an extra day off, and if it falls on a Sunday then Monday will be given off.The project team works eight-hour days, Monday through Friday.The project will begin on January 3, 20XX.Based on this schedule, write a 1-page memo that answers the following questions:When is the project estimated to be completed?How many working days will it take?What is the critical path?Which activity has the most total slack?How sensitive is this network?Identify two sensible milestones, and explain your choice.Submit the following:Your Microsoft® Project fileThe 1-page memoInclude the following (one page) printouts:A Gantt chartA network diagram highlighting the critical path.A schedule table reporting ES, LS, EF, LF, and slack for each activityHints: Change the timescale to months and weeks. The estimated duration of the project is 135 days.Remember: Save your files for future assignments!

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Information technology (2 task ) – 24 hours

First task Milestone – 1 (3 pages)Second Task – Discussion – 650 words.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Wk 3 Discussion – Exponential and Logarithmic Functions

This week you learned about exponential and logarithmic functions.Respond to the following prompts in a minimum of 175 words:Search the internet for real-world applications of logarithms or exponential functions.Share the application you discovered with the class along with how it relates to logarithms or exponential functions. Be sure to cite the resource.What is the relationship between exponentials and logarithms?

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Essay and Quiz (Data Science)

**** Need it by 12/04/2019 5 PM EST****APA Format NEEDEDNO PLAGIARISMSUBJECT: Data Science and Big DataQuestion 1: 300 words and 2 referencesOrganizations are often challenged with what to protect and to what extent. Many companies are still having a difficult time in protecting their data in digital formatand defining what constitutes sensitive and non-confidential data, and how to share the data within the company and with the public.Describe technology’s impact on data security and ethics in data analytics. Use APA-style references wherever necessary to support your answer.Question 2:Answer the quiz in the attached word document.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Week 8 – Analysis Paper

An essential element for graduate level student learning is written and oral reflections on experience within the field of study combined with the elements of the course. To have an experience isn’t enough to ensure learning; you need to intentionally and thoughtfully reflect upon the experience and what you learned from it to ensure that learning occurs.Towards this end, students are required to complete this analysis and reflection assignment. This reflection is intended to help you focus in on what you are learning, identify issues or concerns on your mind, explore an idea more deeply, or in other ways enhance your learning about the course topics, yourself, and others. This assignment should be structured to address the following:WHAT?What have you learned through this course?What stands out to you, feels new to you, excites you, or challenges you?SO WHAT?Why does this learning matter?Why does it stand out to you?Why is it important – to you personally or in the bigger picture?NOW WHAT?What do you do from here?How will you take this learning with you?Does this learning change your perspective, your career goals, or your interests?Your reflection should be 7-10 pages long (double spaced) and should dig deeply into this experience to reflect on your learning. It should connect to academic concepts and critically examine your own development through this learning. You will be graded based on the reflection rubric provided.View RubricAnalysis Paper ScoringAnalysis Paper ScoringCriteriaRatingsPtsSelf-disclosureview longer description/ 50 ptsConnection to outside experiences, readings, class discussionsview longer description/ 100 ptsGrammar/Spellingview longer description/ 25 ptsLength requirement metview longer description/ 25 pts

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

performance management

Discuss what performance management is and how it influences effective teams.Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…).  Please note at least five organizational activities and be specific when responding.Note at least two organizational capabilities and compare and contrast each.At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources.  Use APA references and in-text citations.11.1•Competency of leader•Contextual factors•Good communication•Working conditions•Nature of the work•Reward systems•Development opportunities•Security•Co-workers•Recognition•Levels of autonomy

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Developing the Corporate Strategy for Information Security Overview

Week 4 Assignment – Developing the Corporate Strategy for Information SecurityOverviewImagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.As part of the Information Security Strategy development, you are required to define specific Information Technology Security roles that will optimize and secure the organization’s data assets.PreparationReview the following article:National Initiative for Cybersecurity Careers and Studies.2017 National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. U.S. Department of Commerce.InstructionsWrite a 5–7 page paper in which you address the following:The Chief Information Security Officer (CISO) is responsible for several functions within an organization.Examine three specific functions a CISO and provide examples of when a CISO would execute these functions within the organization.Specify at least three competencies that the CISO could perform using the provided websites and articles.The Chief Information Officer (CIO) is responsible for several accountability functions within an organization:Identify at least four functions of the CIO using the EBK as a guide.Provide examples of how the CIO would execute these functions within an organization.Classify at least two security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program.Suggest methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an organization on a day-to-day basis.Describe how the digital forensics function complements the overall security efforts of the organization.Evaluate the operational duties of digital forensic personnel and how this helps qualify the integrity of forensic investigations within the enterprise and industry.List at least three technical resources available to the digital forensics professional to perform forensic audits and investigations.Use three sources to support your writing. Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access thelibraryor reviewlibrary guides.This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is:Determine the functions and operational duties of key information security personnel within an organization.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"