Information Systems Homework Help


# Description Question

Many nongovernmental organizations (NGOs) and government organizations often work side by side on the same problem.

To prepare for this Application Assignment, explore the web pages of the organizations provided in your Learning Resources, this week, to learn about the work they are doing. Look for one health issue that you can see in both the NGO and government organizations for this assignment.

To complete this Application Assignment, write a 2- to 3-page paper that summarizes and compares the roles and function of one governmental and one nongovernmental organization (NGO) public or global health organization for a specific health issue. Be sure that your summary includes information about the following:

  1. Where are the organizations' headquarters located?
  2. What is the mission or purpose of these organizations?
  3. What populations do they serve? And what do they do?
  4. How are the organizations funded? Are they part of a larger public health infrastructure?
  5. Do these organizations mention collaboration with any other agencies or organizations?
  6. Are there any major public health issues these organizations are currently focusing on?
  7. What might be some ethical issues that are related to the mission of these organizations? (If the organizations have a code of conduct or ethics statement, provide a brief summary in your description.)
  8. Summarize what you learned in researching these organizations: What were the most interesting things you learned in this application? How are the organizations you selected similar or different?

Be sure to support your work with specific citations from this week's Learning Resources and additional scholarly sources, as required. Ensure that your in-text citations and reference list are correct.


List of NGOs


The public health infrastructure includes a complex network of governmental and non-governmental organizations (NGOs) that work to assure conditions in which populations can be healthy. Here are a few key organizations that work to improve public health in the U.S. and around the world. (Hint: These organizations are all reliable sources of information for your academic and professional research needs.)

U.S. Government

The Department of Health & Human Services (HHS) 

The Department of Health & Human Services is the U.S. government's agency for protecting the health of all Americans, especially those who are unable to help themselves. HHS administers Medicare and Medicaid, which provides health care insurance to one in four Americans.
The Health Resources and Services Administration (HRSA) 

The Health Resources and Services Administration is the primary federal agency for improving access to health care services for people who are uninsured, isolated, or medically vulnerable.
The Centers for Disease Control and Prevention (CDC)

The Centers for Disease Control and Prevention is a leader in promoting public health for all people, protecting the United States and the world from health threats, and working with global partners to realize the goal of "Healthy People in a Healthy World - through Prevention."
The National Institutes of Health (NIH) 

The National Institutes of Health is composed of 27 Institutes and Centers. The NIH scientists investigate ways to prevent disease, understand the causes, treatments, and even find cures for common and rare diseases.
The Food & Drug Administration (FDA) 

The Food & Drug Administration protects the public by assuring the safety, effectiveness and security of medications, medical devices, the food supply, cosmetics, dietary supplements and products that give off radiation. They help the public get accurate, science-based information to use medicines and foods to improve their health.
The Indian Health Service (IHS) 

The Indian Health Service's mission is to raise the physical, mental, social, and spiritual health of American Indians and Alaska Natives to the highest level. The HIS helps uphold the federal government's obligation to promote healthy American Indian and Alaska Native people, communities, and cultures and to honor and protect the inherent sovereign rights of Tribes.
The Substance Abuse and Mental Health Services Association's (SAMHSA) 

The Substance Abuse and Mental Health Services Association's mission is to reduce the impact of substance abuse and mental illness on America's communities.
The Agency for Toxic Substances and Disease Registry (ATSDR) 

The Agency for Toxic Substances and Disease Registry is a public health agency that serves to protect the public from harmful exposures and diseases related to toxic substances.
The United States Agency for International Development (USAID) 

The United States Agency for International Development is an independent federal government agency that supports long-term and equitable economic growth and advances U.S. foreign policy objectives by supporting global health and humanitarian assistance.
The Pan American Health Organization (PAHO) 

The Pan American Health Organization is an international public health agency working to improve health and living standards of the countries of the Americas. PAHO serves as the Regional Office for the Americas of the World Health Organization and is part of the United Nations system.
The World Health Organization (WHO) 

The World Health Organization is the directing and coordinating authority for health within the United Nations system. WHO provides leadership on global health matters and research, and it monitors and assesses global health trends.

Global Nongovernmental Organizations

The International Federation of Red Cross and Red Crescent Societies (IFRC/RC) 

The International Federation of Red Cross and Red Crescent Societies is the world's largest humanitarian organization, providing assistance without discrimination as to nationality, race, religious beliefs, class, or political opinions. The Red Crescent is used in place of the Red Cross in many Islamic countries.

CARE is a humanitarian organization fighting global poverty. Women are at the heart of CARE's community-based efforts. CARE also delivers emergency aid to survivors of war and natural disasters, and helps people rebuild their lives.
The United Nations Infant and Child Emergency Fund (UNICEF) 

The United Nations Infant and Child Emergency Fund, is a global organization mandated by the UN General Assembly to advocate for the protection of children's rights around the world. UNICEF works to achieve the Millennium Development Goals, help meet their basic needs, and expand their opportunities to reach their full potential.
The United Nations Foundation 

The United Nations Foundation was started in 1998 with a $1 billion gift from philanthropist Ted Turner. The UN Foundation supports innovative health programs for children and other programs to; eliminate malaria deaths, eradicate polio, and reduce measles mortality.
The United Nations Programme on AIDS/HIV (UNAIDS) 

The United Nations Programme on AIDS/HIV was started through a series of goals, resolutions, and declarations adopted by member nations of the United Nations to stop and reverse the spread of HIV.
Doctors Without Borders/Médecins Sans Frontières (MSF) 

Doctors Without Borders/Médecins Sans Frontières provides aid to people whose survival is threatened by armed conflict, epidemics, malnutrition, exclusion from health care, or natural disasters in nearly 60 countries.

Other Nongovernmental Organizations

The American Public Health Association (APHA) 

The American Public Health Association has been working to improve public health since 1872. APHA aims to protect all Americans, their families, and their communities from preventable, serious health threats. The organization works to assure community-based health promotion and disease prevention activities and preventive health services are universally accessible in the United States.
The American Red Cross 

The American Red Cross offers domestic disaster relief and compassionate services in five other areas: community services that help the needy; support and comfort for military members and their families; the collection, processing and distribution of lifesaving blood and blood products; and educational programs.

Sample of Disease-Specific Nongovernmental Organizations

The American Heart Association

The American Heart Association is a non-profit organization working to help build healthier lives, free of cardiovascular diseases and stroke.
World Heart Federation 

World Heart Federation is a nongovernmental organization committed to the global fight against heart disease and stroke. They focus their efforts on low-and middle-income countries.
The American Cancer Society 

The American Cancer Society is a nationwide community-based voluntary health organization dedicated to eliminating cancer as a major health problem.
The American Foundation for AIDS Research 

The American Foundation for AIDS Research is dedicated to ending the global AIDS epidemic through innovative research.
Many nongovernmental organizations (NGOs)

1. Software vendor uses the term Strategic Enterprise Management (SEM).  Cognos uses the term Corporate Performance Management (CPM), and Hyperion uses the term Business Performance Management (BPM).  Are they talking about the same basic thing, or are they different concepts?  Justify your posts with facts and research.


2. What is are the differences and similarities between star schema, and snowflake schema? Can you find a diagram on the web of a snowflake schema


3. Why bother with a different type of schema for a data warehouse? Why not use the same, heavily normalized type of scheme used in operational databases?

Software vendor uses the term Strategic Enterprise Management (SEM).


You have been asked to create a Microsoft Access database management system for an educational publishing company. The company employs a staff of nearly 50 people, including publishers, administrators, researchers, and salespeople, but contracts the development of each media title to an outside author. The business rules and table relationships are as follows:

·        A publisher (which is simply an employee with the job title "Publisher") manages one or more media titles, controlling its budget, sales forecasts, and production schedules.

·        An editor (an employee with the title "Editor") can manage many authors, approving their contracts, workflow, and deadlines. Each author, however, reports to a single editor.

·        Each media title is written by a single author; there are no co-author teams.

·        All of the entities (tables), attributes (fields), and relationships appear in the ER diagram below. You do not need to add any additional elements to your Access database entities beyond what appears in this ER diagram.


Note that the field "Topic" in Media is equivalent to "SubjectArea" in Authors.


Cod,etpK) Topic Title

PubYear Media Grade Price

Empl'oy,ee 10 IIFK) Allthor ID 1FK)

Employ,ee II) WKl Surname Given


Department Hired Salary Bonus Gender Vacation Education


Allthor 10WKl Surname Given HourlyWage SubjectArea Employee 10 IFK)


Figure 1. ER diagram for use in constructing an Access database

Using this ER diagram as your guide, you will modify an existing Access database in the following steps. Once completed, upload the resulting database file into the Moodle dropbox.



Perform the following steps to create this database management application.

(Note: You may use either Access 2010 or Access 2013 to complete this assignment.)

1.     Download the AccessDB.accdb database file from Moodle. Open the database file and browse its two table objects, Media and Employees, to familiarize yourself with the data.

2.      Open the Media table in Design View. Ensure that the Code field is set as the Primary Key (PK). Then, add two new fields for the Foreign Keys (FKs), as shown in the ER diagram above. These FK fields must use the Number data type, as they will be used to connect to the AutoNumber ID fields in the other two tables.

3.      Ensure that all Short Text data types are 50 characters in size and that all Number data types are set to Long Integer. Save your changes and return to Datasheet View.

4.      Use the Find and Replace command to replace all instances of"BD" in the Media field column with "Blu-ray". Widen the columns (as necessary) to display their headings and data, and then apply an alternate row colour of"Orange, Accent 2, Lighter 80."

5.      Add a Field Validation Rule to the Media field column so that only the following values are acceptable: Blu-ray, CDROM, DVD, VHS, and WEB. Add a Field Validation Message that describes the available options. Sort the datasheet by Topic into ascending order and then close it, saving your changes.

6.      Open the Employees table in Design View. Rename the AutoNumber ID field to "Employee ID" and confirm that it is the Primary Key (PK). As in the Media table, ensure that all Short Text data types are 50 characters in size, but do not adjust the Number data type fields. Save your changes and return to Datasheet View.

7.      Set the datasheet font to Cambria, adjust the column widths (if necessary), and sort the datasheet by Surname, into ascending order. Close the datasheet, saving your changes.

8.      Create the remaining table object, Authors, using the fields shown in the ER diagram.

Specify an AutoNumber field called "Author ID" for the Primary Key. Add the required Foreign Key to the table object as a Number data type and ensure that the Short Text fields do not exceed 50 characters in size.

9.      Add the following record data to the Authors table, but remove the "0" that appears in the Employee ID field for each record. Save and then close the table once completed.

      Author's Name                               Subject Area                       Hourly Wage

Rachel Green



Ross Geller



Monica Geller



Chandler Bing



Joey Tribbiani



Phoebe Buffay




10. Using the Relationships command on the Database Tools tab, establish the one-to-many relationships shown in the ER diagram. Enforce referential integrity for each relationship, but do not select the Cascade Update and Cascade Delete options. When finished, save and close the Relationships window.

11. Create three form objects, named frmAuthors, frmEmployees, and frmMedia, that will help users input and modify data in their respective tables. Remove the AutoNumber primary key fields from the frmAuthors and frmEmployees forms, but leave the Code field on the frmMedia form. Modify the titles of each form to reflect their contents (e.g., "Author Data Form") and apply some basic formatting of your choice to the forms. Lastly, enter a "Copyright (c) your name" text label in the footer area of each form.

12. Replace the three Foreign Key fields on the frmAuthors and frmMedia forms with combo boxes that retrieve values from their respective tables. In the wizard, select the ID field, Surname, and Given fields for display in the combo boxes. Sort the combo boxes by Surname and hide the ID key column when asked. Remember to store the value in the appropriate Foreign Key field and, lastly, delete the original text boxes and labels from the form. Save and close all form objects.

13. Create a Select query, entitled qryMedia Titles, which displays the Title, Media, Grade, Pub Year, and Cost columns from the Media table (in that order). Sort this query by ascending Grade and then, enter a criteria to display only those products that are DVDs published since 2006 (inclusive of2006). Add a Totals row to the resulting datasheet that calculates the average Cost of the returned titles. (Note: Do not create a Totals query.)

14. Create a Parameter query, entitled qryEmployees, which includes all fields from the Employees table, except for the Employee ID, and then sort the listing first by department and then by surname. Use a criteria filter to display only those employees hired between January 1 st, 2000 and December 31 st, 2006. Create a parameter filter which prompts the user to enter a job title (e.g., Researcher) in order to filter the datasheet result.

15. Create a portrait, letter-sized report, entitled rptMedia by Topic, which displays a listing of the media products. Design and format the report using the wizard, as follows:

·         Select the Topic, Title, Media, Pub Year, and Cost fields from the Media table.

·        Group the data by Topic and sort the contents of each grouping by Title.

·        Add a summary calculation to the report for the average cost of each Topic group.

·        Apply bold to the Topic titles (e.g., Business) and the Avg Cost calculations.

·        Edit the title of the report to read: Published Titles by Topic and make sure that all of the data and column titles are sized to display fully in Print Preview mode.

Important: Close all the open windows (inside of the Access work area) and then exit ( close) Access before uploading your database file into Moodle.

Buad283: Assignment 02 - Microsoft Access
  • How is an application layer firewall different from a packet-filtering firewall?
  • Why is an application layer firewall sometimes called a proxy server?
  • What is stateful inspection?
  • What is a VPN? Why is it becoming more widely used?
  • What is content filtering, and should it be leveraged on a corporate network?  Backup your statement with 2 or 3 facts.

Please pick two peer posts for your responses. Do you agree with their statements on content filtering or disagree and why? Are there other angles they did not add?  I expect a minimum of 3 posts per discussion question; the first response will be your initial answer to the discussion question.  When responding to a peer’s initial post, I expect more than just “I agree or disagree.” I want you to back up your opinion and add to the overall discussion.

How is an application layer firewall different from a packet-filtering firewall?



ABC Company is a manufacturing company that produces new technology that sells online directly to customers and retailers.  The system they use is a core transactional Enterprise Resource Planning system called NEDS.  NEDS is similar to many core systems that provide integrated applications on a common platform for financials, managing materials, sales distribution, and production planning (similar to Oracle or SAP).   NEDS is located in the Netherlands, while ABC Company is located in Florence, Kentucky.  On June 15, 2016, James Hurd (ABC’s Global Security Director) was notified that NEDS was burglarized during business hours involving individuals stealing equipment including blackberries, iPhones, laptops and hard drives.  Local police were notified and the incident was reported on that date.  A police report only included identification of specific hardware that was stolen and several bicycles.


The burglary notification that was mailed was sent to a branch office of ABC Company in Mexico.  James Hurd was notified by the Mexico office via email which included an attached electronic version of the burglary notification and police report on June 20, 2016.  James Hurd recognized that the incident actually occurred 5 days earlier.


The letter contained the following information about the incident:


·         The incident occurred in the application area that provides custom application development and reporting for the ABC Company. 

·         The area that was impacted involved “potential data” used for sales analysis.  Data from the ABC Company had been placed on laptops while some diagnostics were being carried out. 

·         Compromised data could have included customer or retailer information from 2002-2014 consisting of names, address, bank account data or credit card numbers, SKU product numbers, descriptions, quantities, Purchase Order numbers, and purchase price.


You are James Hurd and need to respond to this incident by taking action immediately.  


You will need to complete the following:     

I.                     Develop an Incident Response Policy for ABC Company that will be used as your reference for your evaluation of this potential data incident (this is an attachment that should be included in your paper and referenced in your presentation).


II.                  Upon developing ABC Company’s Incident Response Policy, evaluate the incident described above:

-          Summarize the data incident and potential level of risk, include why?

-          Upon identifying the  types of data that could potentially be impacted and what laws/regulations could be in violation of non-compliance if this data was breached

-          Develop your action plan to evaluate this data incident (include your rationale for why the steps were necessary)

-          Describe how the Incident Response Policy supported your actions

-          Identify any issues that made the evaluation more difficult

-          Identify areas of future risk mitigation actions should a similar incident occur (look at the gaps or issues with this scenario)

-          Close the incident (NOTE: The outcome of the incident did not surface any major risks or data breach to the company but it took the evaluation to get to this conclusion)









This presentation must be support by the research paper.


Please note the following criteria:


Research paper:

  • Research Paper must be in APA Style
  • Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note your book can be included as a reference)
  • Must be at least 5 double-spaced pages
  • The Policy will be an Attachment and not count toward the 5 Page requirement
  • Graphs, illustrations and spreadsheets are allowed, but will not count toward the 5 Page requirement



Grading criteria will include the following as this represents 40% of your grade:


Presentation will be 100 points and based on the following:


Completeness of the Topic (Policy, Processes, Action, Conclusion)

Presentation Delivery

Alignment of policy


Paper will be 100 points:


-          Meets Standard Criteria

-          Completeness/content

-          Incident Risk Policy as Attachment

-          Logic of Processes and Actions (Thoroughness)

-          Alignment of the Incident Risk Policy components in completing and supporting the evaluation



Security Incident - Student

Instructions: Assignment Instructions

Write a 9 pages paper discussing the below topics as they relate to computer crime.
Submission Instructions:
You must provide cases and examples to support the topics.

1) Identify and discuss the steps necessary to make electronic evidence admissible in court.

2) Identify various crimes and incidents that are involved in electronic forensic investigations.

3) Discuss the importance of security and computer use policies.

4) Identify and discuss the techniques to obtain evidence from Internet and Web resources.

5) Identify and discuss the types of evidence that can be recovered from computer and electronic devices.

6) Discuss the importance of documentation and chain-of-custody in the forensic process.
Submit your Term Paper in a Word file for grading.
Specific Instructions for the Term Paper:
1.      Include a title page for your own paper. This includes the “Running Head” in the page header, the title of your paper, and your name. If you don’t know how to edit a header in Word, Google for instructions on how to edit a header in the version of Word you are using and follow the instructions. Also add the university and class info as well as the date authoring the paper.
2.      Write a 150-250 word abstract for your the paper. The abstract should be a brief summary of your paper.
3.      Next you need a Table of contents page.
4.      Next you will start the paper. The 8 pages starts counting from this page. All prior pages are pages for "metadata" information about the paper - and not part of the body of the paper.
5.      For each major section of the paper, you will need to add sub-headings. You may need as many subheading as needed, but each section must have a minimum of three sub-headings. Be sure to be descriptive in your sub-heading names, so that the content following the subheading is informative.
6.      More info on the body of the paper: Write the introductory paragraphs of your term paper (following the table of contents page) underneath the title of your paper. The introductory paragraphs should be at least one page long. These paragraphs should provide the reader with an overview of what you are covering. In addition to the 9 pages of the paper itself, you must include a title page (abstract and table of contents pages) and a references page. Your title page must include the title of your paper, the date, the name of this course, your name, and your instructor's name, as well as the university info and the date paper was written.
7.      Your paper must be on the topic of this assignment in computer forensics. Remember to explain the types of software you would use to complete the case. You may use the cases noted in the book for guidance or may use one of your own.
8.      The last section of your paper is the list of references in APA Style format. Name the header "References" then list the references in alphabetical order of the authors' last name. Include a minimum of 6-10 outside sources cited and referenced in the paper. Your references page must be written in APA citation style.

Number of Pages: 9 Pages

Page Line Spacing: Double spaced (Default)

Academic Level: College

Paper Format: APA

Write a 9 pages paper discussing the below topics

You have just completed 10 weeks of a CIS course. Imagine you have been asked to create five 1-hour modules highlighting the most important topics you have learned in this course. 

o List the topics for each of your five 1-hour modules. 

o Give a detailed rationale as to why you chose each of the topics for your five 1-hour modules.

o Explain what order you would place the modules in, and why. 

You have just completed 10 weeks of a CIS course.

 You are managing a server installation project that has globally interconnected stakeholders in San Jose, CA; Colorado Springs, CO; St. Louis, MO; Nashua, MA; Rhos-on-Sea, Wales; and Ljubljana, Slovenia. Stakeholders in San Jose build the individual machines that will comprise the kluge of boxes that will make up your install project in Rhos-on-Sea and Ljubljana. Your systems engineers are located in Colorado Springs and your system testers reside in St. Louis. The contracted vendor assembles the various CPUs, processors, file servers, drives, and cabling that make up your server network. Rhos-on-Sea and Ljubljana will provide the necessary technicians, on site, to do the installation under the supervision of the systems engineers, followed by systems testing by your testers. Use the Communications Plan template to build a Project Communication Plan that encompasses the information requirements as outlined in the PMBOK Guide section Communications Management Plan.  





Communications Management Plan

<Project Name>





Table of Contents

Introduction. 2

Communications Management Approach.. 2

Communications Management Constraints. 3

Stakeholder Communication Requirements. 3

Roles. 4

Project Team Directory. 6

Communication Methods and Technologies. 6

Communications Matrix. 8

Communication Flowchart. 9

Guidelines for Meetings. 9

Communication Standards. 10

Communication Escalation Process. 11

Glossary of Communication Terminology. 12






The purpose of the Communications Management Plan is to define the communication requirements for the project and how information will be distributed.  The Communications Management Plan defines the following:

  • What information will be communicated—to include the level of detail and format
  • How the information will be communicated—in meetings, email, telephone, web portal, etc.
  • When information will be distributed—the frequency of project communications both formal and informal
  • Who is responsible for communicating project information
  • Communication requirements for all project stakeholders
  • What resources the project allocates for communication
  • How any sensitive or confidential information is communicated and who must authorize this
  • How changes in communication or the communication process are managed
  • The flow of project communications
  • Any constraints, internal or external, which affect project communications
  • Any standard templates, formats, or documents the project must use for communicating
  • An escalation process for resolving any communication-based conflicts or issues



Communications Management Approach

Approximately 80% of a Project Manager’s time is spent communicating.  Think about it – as a Project Manager you are spending most of your time measuring and reporting on the performance of the project, composing and reading emails, conducting meetings, writing the project plan, meeting with team members, overseeing work being performed, meeting with clients over lunch and many more activities related to your projects.


You should give considerable thought to how you want to manage communications on this project.  By having a solid communications management approach you’ll find that many project management problems can be avoided.  In this section give an overview of your communications management approach.


Communications Management Constraints

All projects are subject to limitations and constraints as they must be within scope and adhere to budget, scheduling, and resource requirements.  Project planning and documentation are no exception to this rule.  There may also be legislative, regulatory, technology, or organizational policy requirements which must be followed as part of communications management.  These constraints must be clearly understood and communicated to all stakeholders. While communications management is arguably one of the most important aspects of project management, it must be done in an effective manner and within the constraints of the allocated budget, time, and resources. 



Stakeholder Communication Requirements

Most projects consist of a broad range of stakeholders all of whom may have differing interests and influence on the project.  As such, it is important for project teams to determine the communication requirements of these stakeholders in order to more effectively communicate project information.  There are a number of methods for determining stakeholder communication requirements; however, it is imperative that they are completely understood in order to effectively manage their interest, expectations, and influence and ensure a successful project.







Project Team Directory

The following table presents contact information for all persons identified in this communications management plan.  The email addresses and phone numbers in this table will be used to communicate with these people.





Organization/ Department



Project Sponsor

  1. White

VP of Technology


(555) 555-1212

Program Manager

  1. Brown

PMO Manager


(555) 555-1313

Project Manager

  1. Black

Project Manager


(555) 555-1414

Project Stakeholders

See Stakeholder Register

See Stakeholder Register

See Stakeholder Register

See Stakeholder Register

See Stakeholder Register


J. Doe XYZ Corp



(615) 555-8121

Project Team






Technical Lead
































Communication Methods and Technologies

Many times, the methods and technologies used to communicate are just as important of a consideration as the information being communicated.  Imagine a large project with many stakeholders who all have different technological capabilities.  Some may have access to a share drive while others do not.  Some may have access to video teleconferencing and others only have telephone and email capabilities.  In order to be effective, project information must be communicated to everyone involved by some method using available technology.  Determining communication methods and what technologies are available should be part of determining stakeholder communication requirements. 

Communications Matrix

The following table identifies the communications requirements for this project.


Communication Type

Objective of Communication







Kickoff Meeting

Introduce the project team and the project.  Review project objectives and management approach.

·   Face to Face


·   Project Sponsor

·   Project Team

·   Stakeholders

Project Manager

·   Agenda

·   Meeting Minutes

·   Soft copy archived on project SharePoint site and project web site

Project Team Meetings

Review status of the project with the team.

·   Face to Face

·   Conference Call


·   Project Team

Project Manager

·   Agenda

·   Meeting Minutes

·   Project schedule

·   Soft copy archived on project SharePoint site and project web site

Technical Design Meetings

Discuss and develop technical design solutions for the project.

·   Face to Face

As Needed

·   Project Technical Staff

Technical Lead

·   Agenda

·   Meeting Minutes

·   Soft copy archived on project SharePoint site and project web site

Monthly Project Status Meetings

Report on the status of the project to management.

·   Face to Face

·   Conference Call


·   PMO

Project Manager

·   Slide updates

·   Project schedule

·   Soft copy archived on project SharePoint site and project web site

Project Status Reports

Report the status of the project including activities, progress, costs and issues.

·   Email


·   Project Sponsor

·   Project Team

·   Stakeholders

·   PMO

Project Manager

·   Project Status Report

·   Project schedule

·   Soft copy archived on project SharePoint site and project web site



Communication Flowchart

Flowcharts provide a visual representation of a process or processes which often allow a better understanding of how the process is intended to work.  Project communications may be extremely complex depending on the size and scope of the project and the number of stakeholders.  A flowchart provides all stakeholders with a better understanding of the steps involved with the distribution of all project communications.









Communication Standards

Standardization is a proven way to simplify the complexities of project management communications.  Many organizations develop and use standard templates or formats for the various communication tools used throughout projects.  Standard templates and formats may be applied to certain types of project meetings or specific types of communication (i.e. emails, status reports, etc.).  By using standardization, organizations can help ensure that its project teams and stakeholders have a thorough understanding of what is expected and achieve consistent and effective communications.


In addition to standard templates and/or formats, organizations may standardize file naming or sharing conventions.  An organization may use SharePoint or some other type of Web Portal/Network tool (blogs, message boards, etc.) as a standard platform from which to share information and communicate.  Additionally, an organization may have standard file naming conventions for their stored data on their internal share drives.  Many of these tools and new technologies are used in today’s projects with team members and stakeholders often spread over wide geographic areas.  Standardization provides a level of simplicity to an organization’s communication platforms and improves effectiveness and efficiency.




Communication Escalation Process

As issues or complications arise with regards to project communications it may become necessary to escalate the issue if a resolution cannot be achieved within the project team.  Project stakeholders may have many different conflicting interests in a given project.  While escalations are a normal part of project management, there must be a documented process that defines how those escalations will take place.






Decision Authority

Timeframe for Resolution

Priority 1

Major impact to project or business operations.  If not resolved quickly there will be a significant adverse impact to revenue and/or schedule.

Vice President or higher

Within 4 hours

Priority 2

Medium impact to project or business operations which may result in some adverse impact to revenue and/or schedule.

Project Sponsor

Within one business day

Priority 3

Slight impact which may cause some minor scheduling difficulties with the project but no impact to business operations or revenue.

Project Manager

Within two business days

Priority 4

Insignificant impact to project but there may be a better solution.

Project Manager

Work continues and any recommendations are submitted via the project change control process



Glossary of Communication Terminology




The effective sending and receiving of information.  Ideally, the information received should match the information sent.  It is the responsibility of the sender to ensure this takes place.


Individuals or groups involved in the project or whose interests may be affected by the project’s execution or outcome.

Communications Management Plan

Portion of the overall Project Management Plan which details how project communications will be conducted, who will participate in communications, frequency of communications, and methods of communications.


The process which details how conflicts and issues will be passed up the management chain for resolution as well as the timeframe to achieve resolution.



Sponsor Acceptance



Approved by the Project Sponsor:



__________________________________________             Date:___________________

<Project Sponsor>

<Project Sponsor Title>


You are managing a server installation project

Create and submit an ER Diagram with at least two tables and their attributes.  Your diagram should include:

  • Table Names (for each entity)
  • Attributes (first name, last name, city, etc.)
  • Primary Keys
  • Foreign keys
  • Relationships
  • Field types  (text, currency, numeric, date)

Your tables should be should be normalized (first, second and third normal forms)

  You can use the attached form or upload your tables in Excel or create and link them in an Access database file.

For information on how to use Word to create and ERD, go to:

Resources for Building ER Diagrams and Normalization:

What is an ER Diagram:

Video Tutorial Entity Relationship Diagram (ERD) Training Video:

How do I normalize a database: 

Database Project Charter/Business Case

  For this business case, the focus is on an electronic health record database for hospitals and doctor's office businesses. The electronic health record database (ExBase) will be a system that collects health information about patients and compares it to other people in the population for data analyzing purposes assisting doctors and nurses in crucial data to treat their patients better. The database will store data electronically ranging from medical history, demographics, allergies, medication, patient immunization records, laboratory tests results, personal statistics like weight, age, race as well as billing information.

Business Problem

          Currently, most hospitals and doctors offices are using an electronic medical record database that is very vulnerable to hacking and isn't practical for data analytics. Unupdated technology places the practice a point where it may be financially vulnerable as well. For instance the current medical record system may not accurately capture some billing or may cause inaccuracies in the submission of claims to insurance companies, this will cause the practice to be leaving money on the table. When it comes to customer data protection, the current system may fail to meet the encryption standard of HIPAA 256 and may not able to interface with the old billing system. Therefore, there is need to either update the existing system or purchase a new electronic health recording system.

Project Scope

          The scope of the project entails all the designs including development, licensing, coding and hosting the new system. All the training needed to implement the new system successfully will be completed by us the vendor. The new system will provide a user-friendly environment. The project also includes migration of data contained in the current system to our new system, licensing of all software, compatibility with the existing classifications, terminologies, and coding systems. ExBase will be a web database accessible remotely as well as in-house with as many as 500 user codes per server. Multiple practices can access real-time data by logging onto a secure online program; we will install servers in each Practice as well as backup servers for data storage in a secured facility.

Project Business Objectives

          The primary objectives of the database to the business is driving the business' revenue by improving its billing system thus increasing revenue; patients will receive an enhanced experience through data analytics and being able to be cured in the most efficient way using the best medicines. This project is also expected to improve provider or patient access to healthcare documents, generation of increased effectiveness in the provision of medical care and increasing the number of services offered. Also, it will also ensure storage of accurate and reliable medical data shared through a secured network.


          In the implementation of every project, there are constraints that have to be overcome. For the implementation of the electronic health record system, the constraints include time constraint, resource constraints and resistance to change. The time constraint comes as a result of the extended period that will be used in development and implementation of the new system. Another limitation that the company may face is that of funding resources; a budget is needed to create, implement and maintain the database. In addition to resource constraints, the business will have to employ more staff members with the right qualifications to operate and maintain the new system. Another constraint is the resistance effect where businesses and individuals who are currently using an existing system may resist the new system or find it a challenge to use because they used an old system that was still functional.


Description of Solution

          The new electronic health record system (ExBase) will collect and electronically store patient information and data in a single database. ExBase will provide solutions to Practices by creating an up to date billing system, which captures billing and financial data as well as patient data delivering accurate information in real time.  It will meet the current standard of the electronic health record technology and will be encrypted with HIPAA 256 bit.


Project Description

          The entity seeks to do away with the current electronic medical record system and implement a new solution that is expected to maintain a diverse number of features. This project will come with some benefits that include enhanced access to patient records, an improved billing system as well as an ability to perform data analytics to improve the medical business.  Once implemented ExBase will be a user-friendly interface that can be used by the current as well as new employees. The development and implementation of ExBase w run for six months with full funding from our company account customers will only be responsible for the primary cost of the database.

Business Process Impact

          The new system will impact the business in some ways. First, the solution is expected to minimize clinical documentation errors, increase the effectiveness of the operations of the business, increase the business revenue capture as well as enhancing administration reporting throughout the practice (Menachemi & Collum 2017). The Proposed system will also cause an adverse effect on the routine duties of all the members of staff. The new system will also impact the business financially due to continuous maintenance and licensing costs of the solution. However, it will cause a negligible impact on the clinical workflow as the training and education for staff preparation will be minimal.


Technical Feasibility

          After, looking at the problems with the existing system which include the issue of accuracy and compatibility, and the fact that the existing system has served the company for more than ten years, it is effective to purchase a new system rather than updating the current system. The new system aligns with the current goals and objectives of the practice. By developing and installing the new system, the company will have to purchase a new server and new equipment for handling and operating the new system.


Resource Estimate

          The project is expected to run for six months involving the signing of the contract, employing temporary employees and implementing the software. The project will cost an estimate of $60,000 in all the stages of purchase, consulting and training. References















Fleming, N.N., Culler, S.D., McCorckle, R., Becker, E.R. & Ballard, D.J. (2011). The

           financial and non-financial costs of implementing electronic health records in primary

           care practices. Health Affairs. 30(3): 481-489.

Menachemi, N. & Collum (2017). Benefits and drawbacks of electronic health record

            systems. Risk Management and Healthcare Policy pp. 47.

Mendelson, D. (2004). Health Connect and the duty of care: A dilemma for medical

            practitioners. Journal of Law and Medicine. 12(1): 69-79.

Parish, C. (2006). Edging towards a brave new IT world. Nursing Standard. Royal College of

           Nursing. 20(27): 15-16.


Create and submit an ER Diagram

 Using your project Requirements Document and WBS, enter your project into MS Project 2016.  Ensure that you Project Schedule has logical flow through the tasks entered using Summary and Sub-tasks, and make sure that your tasks are linked using dependencies.  Actual Start and Stop dates in the respective blocks become project constraints so instead use duration entries. 









Project Requirements

Jesus Mojica


March 5th








The advancements in cloud computing technology have played a significant role in facilitating distribution of downloadable contents as, game updates and detection of software errors (Ruparelia, 2016). The several gaming streaming services which allow users to access the gaming services without necessarily using additional hardware resources include Netflix, Hulu, and Pandora. There are several project requirements associated with a video game for entertainment purposes and are categorized into functional and nonfunctional requirements. Functional requirements stipulate the specific tasks performed by a system. Nonfunctional requirements, on the other hand, depicts the quality requirements of the gaming system and include maintainability, reliability, and performance ("Non-Functional Requirements | TankWars Project | Assembla," n.d.).

The specific requirements provide detailed descriptions of the user interface for the gaming software as well as hardware and software interfaces of the system. The main objective of this gaming system is to provide entertainment options, especially to youths. In order to come up with an effective game-based system, adhering to the following specific requirements would be vital

First, the system should adhere to the systems usability requirements including provision of in-game tutorials and helps, provision of a familiar user interface to the users and less time when loading the game. Secondly, the gaming system should be reliable, meaning that the system is in a position to detect any form of errors and resolve it within the minimum possible time. In addition, performance requirement plays a key role by taking into account degradation and resource utilization modes. Supportability is a specific requirement which enables the game to run on multiple platforms, portability of data, offering frequent upgrades and limiting regular maintenance. Online user documentation will be available to users after completion and delivery (Grady, 2006). Moreover, the gaming system will offer an interactive user interface, for instance, providing dialogue box and alerts in case of incorrect entries. As part of the interface requirements, users will not be required to possess any additional hardware in order to operate and communication from the database components will be properly encrypted to enhance security. Users will also not be required to incur costs related to licensing requirements. Finally, legal, copyright and other notices will be available to all potential users of the gaming system.


















Grady, J. O. (2006). Introduction to System Requirements Analysis. System Requirements Analysis, 3-17. doi:10.1016/b978-012088514-5/50004-7

Non-Functional Requirements | TankWars Project | Assembla. (n.d.). Retrieved from

Ruparelia, N. B. (2016). Cloud computing.


Using your project Requirements Document and WBS,

Each grocery location at Ray's Food has a Windows Server 2012 R2 server but no domain services are used. Management would like to extend the Windows domain at the corporate office to the three grocery locations, but they are afraid the cost of this would be excessive.


Provide management with a 2- to 3-slide PowerPoint®  presentation that outlines how you would add the three grocery  locations to the corporate office domain  raysfoods.local.Includeestimates of how many hours the domain extension  will take and how many hours each month it will take to manage and  maintain Active Directory. Include speaker notes on all slides.






Ray’s Food: VPN, Direct Access, and Windows Routing

Michael Boddie

Administering Windows Server


Sokly Vann

March 12, 2018













In this week, I will detail some of the actions that are required to configure VPN, direct access services and routing in windows server 2012 R2 so as to give Ray’s customers a remote access to some of the organization services

Why VPN, Direct Access, and windows routing

Virtual Private Network (VPN) is a computer technology which allows the extension of local network on a public network just like the internet. By using VPN, a user computer which is connected to the internet can send or receive data from other computers inside the network as if the computer was connected directly. To configure VPN is very easy especially on Windows 2012 R2. Direct Access is a feature both in Windows 2008 R2 and windows 2012 R2. It allows remote connectivity to the corporate network resources without the requirement of VPN. Windows routing provides traditional VPN connectivity for legacy clients.

Requirements for configuration

When doing so, Ray’s need to configure the two network interfaces which are external and internal. This configuration usually allows for better security. Only the external network interface is configured with the organization default gateway so as to allow remote internal subnets (Hicks, 2016).

Configuring VPN, Direct Access, and windows routing 

To configure VPN and Direct Access the first step is to install the Remote Access Role. In here one obtains two consecutive IPv4 addresses which must be unique. Second, one creates a new DNS record for the server FQDN. The third step is obtaining a server certificate for IP-HTTPS connections. Forth, is creating a client security group policy. After this Remote Access Role feature will have been installed. The network administrator then opens up the Remote Access Management Console. After this one clicks on the Deploy Direct Access and VPN and then clicks finish.

To configure windows routing, one does the same as configuring VPN and Direct access by first installing remote access role then opening the server manager and clicking on manage and then selecting add roles and features.  On reaching the step of roles services, routing option is selected then finishing the configuration process (Bartolo, 2014).



















Bartolo, A. (2014). Step-By-Step: Enabling DirectAccess in Windows Server 2012 R2. Retrieved March 8th, 2018, from Microsoft TechNet:

Hicks, R. (2016). Configure VPN in Windows Server 2012 R2. Retrieved March 8th, 2018, from Technix:



Each grocery location at Ray's Food has a Windows Server 2012 R2

You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work.

Write a paper in which you complete the following three (3) parts. Note: Please use the following breakdown to complete your assignment:

· Overall network diagram 

· Datapath diagrams (one for each of the steps in the scenarios below)

· Write-up

Part 1

1a.  Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you’ve designed, from the user or endpoint device to the Internet cloud, and everything in between, in which you:

i. Follow the access, core, distribution layer model.

ii. Include at a minimum:

· Authentication server (i.e. Microsoft Active Directory)

· Routers

· Switches (and / or hubs)

· Local users

· Remote users

· Workstations

· Files share (i.e. CIFS)

· Mail server

· Web servers (both internal and external)

· Firewalls

· Internet cloud

· Web proxy

· Email proxy

· FTP server (for internal-to-external transport)

1b.  Explain each network device’s function and your specific configuration of each networking device.

1c.  Design and label the bandwidth availability or capacity for each wired connection.

Part 2

2a.  Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Local user sends email to a Yahoo recipient. Local (corporate) user having email address jonny.hill@Corp534.comsends an email to

i. Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 

ii. Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 

iii. Show user authentication when necessary.

2b.  Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site ( He has to access the secure shell using his active directory credentials to authenticate to the ftp server (Linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to

i. Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 

ii. Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 

iii. Show user authentication when necessary.

2c.  Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:

Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.

i.  Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 

ii.  Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 

iii.  Show user authentication when necessary.

2d.  Explain how your overall design protects the organization from both inside and outside attacks. Give examples. 

2e.  Explain how your layered design compensates for possible device failures or breaches in network security.

2f.  Determine whether any possible bottlenecks exist in your design.

2g.  Explain how to make the file transfer process more secure.

Part 3

1. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

2. Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

You are tasked with designing the most secure network possible
  • An international law firm has asked you to engage in a risk and mitigation evaluation and plan for their organization. The details of their infrastructure follow.
    The organization has offices in:
    • United States: New York, New York, and Palo Alto, California (headquarters).
    • England: London.
    • Russia: Moscow.
    • Mongolia: Ulaanbaatar.
    • China: Hong Kong.
    • Japan: Tokyo.
    • Each location is set up as a star topology with 40 PCs networked together, with the exception of the law firm's headquarters in Palo Alto, California. The offices in New York are located on the 20th floor of a high rise. The remaining locations are all in commercial office centers with office space that shares a common wall with other businesses. All locations have a dedicated closet space that houses the networking equipment. Each location has IT support, and local users are managed locally with organization-wide replication of active directory changes that occur every 20 minutes.
      The Palo Alto location has an additional 10 PCs and the following employees:
    • Executives: Chief executive officer, chief financial officer, chief operating officer, chief information officer, and chief ethics officer, plus executive assistants (5).
    • Accounting: Director, accounts payable clerk, and accounts receivable clerk.
    • Human Resources: Director.
    • Information Technology: Director and systems analyst.
    • Legal: Attorneys (10), paralegals (10), legal assistants (10), and legal interpreters (2).
    • Administration: Office administrator and office assistant.
    • Other Offices
      Each of the other locations has 40 PCs and the following employees:
    • Accounting: Director, accounts payable clerk, and accounts receivable clerk.
    • Human Resources: Director.
    • Information Technology: Director and systems analyst.
    • Legal: Attorneys (10), paralegals (10), legal assistants (10), and legal interpreters (2).
    • Administration: Office administrator and office assistant.
    • Further Details
      Additional details about the project organization including the following:
    • All executives, lawyers, paralegals, legal assistants, and legal interpreters have been issued an HP Pavilion dv7t Quad edition laptop with security provided by Zone Alarm's security suite. No desktops are used by these employees. Docking stations are used at the office. When out of the office, each of these employees conducts business wirelessly using AT&T's wireless card and Motorola's Droid X.
    • All other employees use HP's Pavilion Elite HPE-570t series desktop.
    • All laptops and desktops run the Windows XP operating system with WordPerfect, Office 2010 Professional, Windows Media, WebEx, and Adobe Reader 8 installed. The company uses Gmail as its e-mail provider. Droid X runs all of the above except for the XP operating system. Each runs the Android 2.2 OS.
    • Each location uses an IBM BladeCenter HX5 server along with Microsoft Windows Server 2008 R2 (NOS).
    • The switch for each location is Cisco's Catalyst 2960-S series model number 2960S-48TS-S with Cisco TrustSec installed.
    • All locations but the Mongolia office have been equipped with Cisco's 3900 series Integrated Services Router Model 2951, with security provided by Cisco's Network Analysis Module (NAM).
    • The Mongolia office is equipped with Cisco's Space Router due to Ulaanbaatar's unreliable infrastructure.
    • Connecting the locations to each other is an IP WAN utilizing an integrated services digital network primary rate interface (ISDN-PRI) back up and fiber distributed data interface (FDDI).
      Use the study materials, the enterprise description, and any additional research needed to fill in knowledge gaps. Write a 2–3 page paper that addresses the following:
    • Evaluate the existing infrastructure as it currently exists.
    • Identify significant vulnerabilities, risks, and points that exist within the network architecture of the organization.
    • Recommend specific security technologies/methods that can be implemented to mitigate risks and points of vulnerability within the organization.
    • Explore the benefits and challenges of implementing a cloud based solution for this organization.
    • Assignment Requirements
    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Resources and citations are formatted according to APA (sixth edition) style and formatting.
    • Length of paper: 2–3 pages, excluding the references page.
    • Font and font size: Times New Roman, 12 point. 
    • Resources
    • Application of Network Security Concepts Scoring Guide
    • APA Style and Format.
  • Toggle Drawer
An international law firm has asked you
  1. Please include the following elements:
  • Table of Contents
  • Executive Summary
  • Introduction to the Problem
  • Business Analysis
  • Proposal Overview
  • HRIS Type and Comparison
  • Recommendation for an HRIS Vendor
  • Project Management Roadmap
  • Conclusion
  • Please do not simply copy and paste Phases 1-3. The previous phases were considered raw data, and now you will be summarizing and finalizing your findings. You want to apply critical thinking to describe the data you have obtained.

    Write a four (4) page paper in which you:
  1. Identify the current issue that the business is facing and propose an HRIS solution. Introduce the HR function that you chose as the focus of your business proposal, and explain the potential benefit for the business if that function is addressed.
  2. Propose a type of HRIS for the organization in the scenario. Discuss the function that the HRIS serves, and identify how that system will solve the business issue.
  3. Compare and contrast at least two (2) HRIS vendors. Based on this comparison, make a case for the one (1) vendor that you recommend for your client.
  4. Create a project management roadmap for the client with projected timelines. Discuss the costs associated with the implementation, justifying your claims with HR metrics and cost benefit analysis.
  5. Use at least (4) quality academic resources in this assignment. Note: Wikipedia and similar Websites do not qualify as academic resources.
  6. Format your assignment according to the following formatting requirements:
    1. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    2. Include a cover page containing the title of the assignment, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
    3. Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.


The specific course learning outcomes associated with this assignment are:

  • Analyze the strategy of the organization, the HR strategy, and HR programs with HRIS.
  • Analyze key elements of the design in database HR relationships and evaluate system considerations in the design.
  • Create an HRIS needs analysis and evaluate the acquisition process.
  • Analyze HR metrics to support the justification of the cost of an HRIS.
  • Create a project management plan and prepare the organization for the implementation.
  • Analyze the complexities of HRIS administration.
  • Evaluate the role of HRIS with performance management, compensation, benefits, and payroll.
  • Use technology and information resources to research issues in human resource information systems.
  • Write clearly and concisely about human resource information systems using proper writing mechanics.
Write a four (4) page paper in which you:

It consists of writing a research paper on the computer assembly parts and process, by the members of the group. Your paper must be written in MS Word and each group member must submit/upload the file into Blackboard in order to receive credit. Your paper must contain at least 5 references.


Your Word file should include the following:

Your paper needs a table of contents page. The paper should also discuss the necessary hardware and software for a functioning PC. You will also need to incude how to assemble a fully functioning computer. Your last page should be your reference page that will contain all the sources you utilized.

The first group assignment/ project is “How to build a PC"

Help me in writing this essay please.




The U.S. has in place many laws related to information security, computer security, and internet use. Many of these laws relate to information governance, accountability, and commercial liability. In addition, the issue of personal privacy is addressed in many of the laws that relate to specific industries, sectors, and types of information.

Write a 1-to 2-page paper using Microsoft® Word that answers the following questions:

  • For two laws from Table 3.1 in Principles of Information Security, state the overall intent of each law. For example what do the U.S. Police and Justice Act and the Computer Fraud and Abuse Act of the U.K. do?
  • Using a browser and search engine, determine the general number of cases/complaints that have been filed based on each of the laws listed below:
    • Computer Fraud and Abuse Act
    • National Information Infrastructure Protection Act
    • Sarbanes-Oxley Act
  • Having reviewed these laws and cases/complaints associated with them, completely answer each of the following:
    • Which of these laws seemed more frequently enforced? Which of these laws have resulted in a large financial impact to a business? Which of these have imposed a strict punitive damage (e.g., someone being convicted of fraud)?
    • According to your answer above, what infrastructural or cyber domain sector or assets are being protected by such enforcement?
    • Accurately explain if the ethical confidentiality of all private information is assured by the three laws
  • Based on your Learning Team discussion, list at least two conflicts faced by U.S. cloud service providers when providing services globally.




Table 3-1 Key U.S. Laws of Interest to Information Security Professionals






Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act of 1934 (47 USC 151 et seq.)


Regulates interstate and foreign telecommunications (amended in 1996 and 2001)

Civil legal evidence

Federal Rules for Civil Procedure (FRCP)


As updated in 2006, specifies requirements for the storage, protection, and surrender of discoverable electronic data as used in federal civil proceedings

Freedom of information

Freedom of Information Act (FOIA)


Allows for disclosure of previously unreleased information and documents controlled by the U.S. government


Federal Privacy Act of 1974


Governs federal agency use of personal information


Copyright Act of 1976—an update to U.S. Copyright Law (17 USC)


Protects intellectual property, including publications and software


Electronic Communications Privacy Act of 1986 (Update to 18 USC)


Regulates interception and disclosure of electronic information; also referred to as the Federal Wiretapping Act

Access to stored communications

Unlawful Access to Stored Communications (18 USC 2701)


Provides penalties for illegally accessing communications (such as e-mail and voicemail) stored by a service provider

Threats to computers

Computer Fraud and Abuse Act (also known as Fraud and Related Activity in Connection with Computers; 18 USC 1030)


Defines and formalizes laws to counter threats from computer-related acts and offenses (amended in 1996, 2001, and 2006)

Federal agency information security

Computer Security Act of 1987


Requires all federal computer systems that contain classified information to have security plans in place, and requires periodic security training for all people who operate, design, or manage such systems

Trap and trace restrictions

General prohibition on pen register and trap and trace device use; exception (18 USC 3121 et seq.)


Prohibits the use of electronic pen registers and trap and trace devices without a court order

Criminal intent

National Information Infrastructure Protection Act of 1996 (update to 18 USC 1030)


Categorizes crimes based on criminal intent and a defendant's authority to access a protected computer system

Trade secrets

Economic Espionage Act of 1996


Prevents abuse of information gained while employed elsewhere

Personal health information protection

Health Insurance Portability and Accountability Act of 1996 (HIPAA)


Requires medical practices to ensure the privacy of personal medical information

Intellectual property

No Electronic Theft Act amends 17 USC 506(a)—copyright infringement, and 18 USC 2319—criminal (Public Law 105-147) infringement of copyright


Amends copyright and criminal statutes to provide greater copyright protection and penalties for electronic copyright infringement

Copy protection

Digital Millennium Copyright Act (update to 17 USC 101)


Provides specific penalties for removing copyright protection from media

Identity theft

Identity Theft and Assumption Deterrence Act of 1998 (18 USC 1028)


Attempts to instigate penalties for identity theft by recognizing people who lose their identity as the true victims, not just the commercial and financial credit entities that suffered losses

Children's privacy

Children's Online Privacy Protection Act of 1998 (COPPA)


Protects children online by requiring Web sites with users under the age of 13 to post privacy policies that specify clear guidance and restrictions on information collection

Encryption and digital signatures

Security and Freedom Through Encryption Act of 1999


Affirms the rights of people in the United States to use and sell products that include encryption and to relax export controls on such products


Gramm-Leach-Bliley Act of 1999 (GLB) or the Financial Services Modernization Act


Repeals the restrictions on banks affiliating with insurance and securities firms; has significant impact on the privacy of personal information used by these industries

Children's online protection

Children's Internet Protection Act


Requires K-12 schools and libraries to use Internet filters to protect children online


USA PATRIOT Act of 2001 (update to 18 USC 1030)


Defines stiffer penalties for prosecution of terrorist crimes


Sarbanes-Oxley Act of 2002 (SOX) or Public Company Accounting Reform and Investor Protection Act


Enforces accountability for executives at publicly traded companies; this law has created ripple effects throughout the accounting, IT, and related units of many organizations

Federal information security

Federal Information Security Management Act (FISMA)


Specifies the requirement for federal agencies to establish information security programs to protect their information assets


Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 CAN-SPAM Act (15 USC 7701 et seq.)


Sets the first national standards for regulating the distribution of commercial e-mail, including mobile phone spam

Fraud with access devices

Fraud and Related Activity in Connection with Access Devices (18 USC 1029)


Defines and formalizes law to counter threats from counterfeit access devices such as ID cards, credit cards, telecom equipment, mobile or electronic serial numbers, and the equipment that creates them


Customs-Trade Partnership Against Terrorism (C-TPAT)


Organizations that conduct international business may voluntarily comply with this initiative by U.S. Customs and Border Protection to facilitate security and shipments processing

Terrorism and extreme drug trafficking

USA PATRIOT Improvement and Reauthorization Act of 2005 (update to 18 USC 1030)


Renews critical sections of the USA PATRIOT Act

Identity theft

Identity Theft Enforcement and Restitution Act


Imposes criminal liability on people who commit identity theft, but does not regulate the technology


PATRIOT Sunsets Extension Act of 2011 (update to 18 USC 1030)


Renews critical sections of the USA PATRIOT Act



The U.S. has in place many laws related to information security,

For this assignment, we are going to build upon what you have learned from the last two assignments. You will apply one of the application data tools that you were introduced to in Module 6 to a real data set to create a dash board. You will need to go to the Kaggle web site and select on competitions: Choose any competition you like. Download the data set and use one of the tools from the Module 6 (Micro Strategy, Tableaux, Watson), to create a dash board report. For this assignment, you may simply present the data in a report fashion using one of the dashboard formats from the options offered by the tools.

we are going to build upon what you have learned from the last two assignments


We will be using the case titled “Managing with Analytics at Procter & Gamble.”  You can buy the case from the website or Ivey (see the Course Syllabus for more information). 


Read the case and write a short analysis that answers the following questions.  The write-up should answer all the questions thoughtfully and completely, and should include your perspective based on your education, work and personal experience, and the material covered thus far in MGT 450.  The analysis must follow the specific format described below.  This is an individual assignment and all work  correctly cited.

Analysis contents

The analysis should answer the following questions:

1.  What is operations research? (In your own words!)

2.  What was Passerini and McDonald’s vision for IDS?

3.  How was data stored and managed at P&G?

4.  Why did they decide to embed IDS analysts in business units?

5.  What was the impact of all this data focus on the culture at P&G?  Do you think it changed the way decisions were made?

6.  Google is another data-driven company.  They are pioneers in a field called people analytics.  What is people analytics, and why are companies interested in it?

7.  Explore the Google re:Work site:  Pick a case study, either one of Google’s ( or one from another company (  Describe the question that the company wanted to answer, how they answered it, whether action was taken based on the data, and what the result was.

8.  In your life, do you ever make data-driven decisions?  Describe one.

Formatting requirements

1.  The document should be 3 pages in length (excluding figures and citations) or as long or short as it needs to be to thoughtfully and completely address the topics listed above.

2.  Formatting:

a.  Title should be 18pt font, Calibri bold.

b.  Section titles should be 12pt font, Calibri bold.

c.  Text should be 12pt font, Calibri

d.  Document should be SINGLE SPACED using .75” margins all around

e.  Feel free to use this document as your template!

3.  Save your report as a Microsoft Word document in docx format

Logins to access the book to use: use the book for chapter 1-5.username: 900@hotmail.compassword:Leen700700w&link:

We will be using the case titled “Managing with Analytics at Procter & Gamble.”


· Submit your responses in a word document.

· Plagiarism will be checked.

· APA format.

· Limit your response to 4-page.

· Include References to the material used. 

· Turnitin report required.

Brainstorm ideas for a new information system that could be implemented by your current employer, previous employer or university in order to benefit the organization in some manner. Create a 4-page document explaining the idea and the benefits in implementing, request the information system department initiate systems investigation for this project.

Submit your responses in a word document.

Workbook for creating dependencies in MS Project

Example 1

Construct a WBS diagram in MS Project using the following information

Work out the duration of the project.


Task Name






2 days




4 days




7 days




6 days




8 days




7 days




5 days




3 days

Example 2

Construct a network diagram using the following data

Work out the duration of the project using forward and backward pass and work out the critical path


Task Name














































And now for a more challenging one


The following activities were listed during a brainstorming session on product development.  Find the appropriate predecessor-successor relationships and then construct a network diagram using the activity durations.  Find the critical path and any slack time for the activities.

1.        Organise the sales office:                     Hire sales manager (6 weeks)

2.        Hire sales personnel:                              The sales manager will recruit and hire the                                                                                    salespeople (4 weeks)

3.        Train sales personnel:                            Train sales people hire to sell the product to                                                                                distributors (7 weeks)

4.        Select advertising agency:                    Sales manager will select agency (2 weeks)

5.        Plan advertising campaign:                 Sales and advertising office will jointly plan the                                                                           campaign (4 weeks)

6.        Conduct advertising campaign:         Advertising agency will a “watch for” campaign                                                                          for potential customers (10 weeks)

7.        Design package:                                       Have packaging designed and engineered                                                                                     (2 weeks)

8.        Set up packaging facility:                      Prepare to package good received from                                                                                         distributor  (10 weeks)

9.        Package initial stocks:                            Package stocks from manufacturer (6 weeks)

10.    Order and receive stock                        Order stock from manufacturer.  Includes                                                                                    delivery time      (13 weeks)

11.    Select distributors                                   Sales manager will select, sales people will                                                                                    contact to make sales (9 weeks)

12.    Sell to distributors                                  Take orders, assign stock on a quota basis                                                                                    (6 weeks)

13.    Ship stock                                                  Ship orders (6 weeks)



Having viewed the resources concerning MS Project and project planning, this is an exercise to help get you familiar with the basics of using MS Project.
Part of the assignment report when you are creating your Project Initiation Document (PID) is that it should contain a work breakdown structure (WBS) and a ‘project schedule’ using a Gantt chart.


This exercise will give you experience of inputting a WBS into MS Project and to create a simple Gantt chart.


The tasks will require that you do the following:


1.      Create a new blank project in MS Project.

2.      Create a correctly ordered WBS and input this into the task pane within MS Project. To limit the time this will take, please copy and paste the list of tasks on page 2 of this document and insert them into MS Project.

3.      Add accurate durations (in days) for each activity. Please just use your best estimate.

4.      Link and indent activities based on their relationships to each other.

5.      Add milestones for each phase of the project.

6.      Create yourself as a resource and attach yourself to any work that you will do within the project. 

7.      Change the schedule if required so that you are not working weekends. By default MS Project does this automatically but you may be required to change this if you are using non-standard settings in your copy of MS Project.

8.      Set as a baseline to schedule against.


Note: Refer to the WBS diagram supplied in page 3.


There are a variety of ways to perform these tasks in MS Project depending on user preference. Please use the walk through guide (MS Project Activity Companion found in Moodle), which will guide you step by step for how to complete this exercise. Please try using this before watching the solution video.  

(Please copy and paste below from ‘1.1 Select Topic’ to ‘ Analyse’ and insert into MS Project Task Pane)


1.1 Select Topic

1.1.1 Define Problem

1.1.2 Contextualise

1.1.3 Develop Aims

1.1.4 Agree with Supervisor

1.2 Plan Research

1.2.1 Plans Schedule Budget Risks Assumptions & Constraints

1.2.2 Aims Objectives Deliverables

1.2.3 Initial Literature Review Propositions

1.2.4 Initial Methodology Tools Data Collection Sample

1.3 Literature Review

1.3.1 Identify Themes Key Word Literature Review

1.3.2 Write Findings Review Propositions Supervisor Feedback

1.3.3. Identify Conceptual Models

1.4 Methodology

1.4.1 Strategy Philosophical Approach Design Evaluate Methods Select Methods

1.4.2 Data Collection Evaluate Tools Select Tools

1.4.3 Sample Identify Pop Sampling Strategy Criteria Development Contingency

1.4.4 Analysis Sort Data Analyse