Assignment For Data Mining

APA format with 2 space.

Attached text book also

Introduction <Most>

Questions–

1. What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means? (Chapter 8)

2. Compare the membership weights and probabilities of Figures 8.1 (626 page) and 8.4 (635 page), which come, respectively, from applying fuzzy and EM clustering to the same set of data points. What differences do you detect, and how might you explain these differences? (Chapter 8)

3. Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases. (Chapter 9)

Conclusion <Most>

References <minimum 5 >

Note FYI

Chapter#8

Question 1- you can get it from Page No# 704

Question 2- You can get it from page No# 704

Chapter#9

Question 3- You can get it from page No#757

 

I

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Risk Assessment Matrix For The Purchase And Integration Of Six New Web Servers For A Start Up Internet Firm

I need someone to create a risk assessment matrix for the purchase and integration of six new web servers for a start-up Internet firm.

 

The assignment must be in APA format with no words that end in “ed”, everything must be in future or present tense. Work must be 100% original and will be checked for plagiarism before the final payment is made.

 

The attached Risk Assessment Matrix (fig. 3.2) must be used as the format for this assignment. Matrix must capture of all the risk associated with the purchase and integration of six new web servers. Assignment must have at least 3 references. Use fig. 35.1 as example of  background information that must be considered when creating risk assessment matrix

 

Assignment:

 

Create a risk assessment matrix for the purchase and integration of six new web servers for a start-up Internet firm.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Encase Lab

Advanced Computer Forensics

Windows EnCase Forensics Lab

Due date: Please submit your work to Windows EnCase Lab dropbox by July 2nd, 2013.

Lab Setup for using RLES vCloud

This lab is designed to function on the RLES vCloud. The interface is available by navigating to https://rlesvcloud.rit.edu/cloud/org/NAT . If you did the Linux forensics lab on RLES vCloud, you should have created a vApp with the Linux VMware image. If you did not use the RLES vCloud for your first lab, please follow the instruction described in the Linux Forensics Lab to create a vApp. Now, you will add the vApp template, Windows 7 w/FTK 7 EnCase image, from the Public Catalogs to the same vApp following the instruction of Add Virtual Machines to a vApp (Page 8 in RLES vCloud User Guide) with the following setting:

· Set network to be Net_Network

· Select DHCP to create an IP address (when you use DHCP, fencing option is NOT necessary.)

Note: If you get an error when trying to start a vApp (or a VM within a vApp), try these steps:

1. Open up your vApp and click on the Virtual Machines tab.  Right-click your VM and choose “Properties”.

2. Click on the Hardware tab.  At the bottom of the page, click on the MAC address and choose “Reset”.

3. Click OK.  When it asks if you want to enable guest customization, click No.

4. Give it a minute to update your VM, then try starting it.

Power on the Windows Virtual machine and login to the system with:

Username: Student

Password: student

EnCase 7 is installed on the virtual machine. When you start the EnCase application, you should see “EnCase Forensic (not Acquisition)” on the top of the application.

EnCase 7 Tutorial

· The EnCase Forensics V7 User Guide posted in myCourses under Hands-on Labs.

· EnCase 7 Essentials webinar series at http://www.encaseondemand.com/EnCasev7Essentials/tabid/2617/index.aspx

The following image files will be used for this lab and they are located in the local drive E:\

1) WinLabRaw.img – Raw Image from dd

2) WinLabEnCase.E01 — EnCase evidence file

Note: “WinLabEnCase Image” in this documentation = “Lab5 image” in your EnCase image.

PART I: Familiar with EnCase

Exercise 1: Starting a New Case

Launch EnCase for Windows – make sure that you are in the EnCase forensics mode (on the top of the software, you should see EnCase Forensic Training, NOT acquisition mode.)

Click the “New Case” button under CASE FILE to begin a new case.

Use the #1 Basic Template and name the case “Case 1”

Record the defaults that EnCase gives you for its folders. It is safe to use these defaults in our experiments.

Add a Raw Image to the exist case

You can add a raw disk image, for example, the dd image, to your case.

Click EVIDENCE > Add Evidence, then click Add Raw Image

Enter “WinLabRaw Image” in the “Name” field.

Under “Image Type” choose “Disk” and click “OK”.

Under Component Files, click New, locate and select the “WinLabRaw.img” file from E:\

The image will now be added to your case. Double click on the hyperlink of WinLbRaw Image, you will be able to view the files and folders from the image.

Question 1: What is the file system of this raw Image?

(Hint: 1. Check “report” from the bottom pane OR

2. choose “Disk View…” from the top drop-down disk manual, image1.png

then click the first sector (in red), the volume boot, image2.png

and read the text in the bottom pane.)

Question 2: What is the first character (in Hex) of the filename of a deleted file (check week 6 lecture recording)?

Add the EnCase Image, WinLabEnCase.E01 located at E:\, to the exist case via EnCase’s “Add Evidence” from the top menu, choose Add Evidence File…

Question 3: What type of files can be added using EnCase’s “Add Evidence Files”

Now you have two evidences added into the case. You can view either one by selecting View->Evidence from the top View menu.

Exercise 2: Using Encase

Set the Time Zone

EnCase v7 will utilize the time zone setting of your examiner workstation if no time zone is set for the evidence.

When you acquire a computer as evidence it is important to make note of the computer’s time and time zone, especially if you need to correlate evidence from different time zones (never assume the time or time zone on a computer is correct.)

Question 4: Where does the Time Zone information reside in a Windows system? (Hint: See EnCase 7 User guide, page 122 or watch Processing Evidence Part 1 from http://www.encaseondemand.com/EnCasev7Essentials/tabid/2617/index.aspx).

Before starting the evidence analysis, you should verify that time zone settings for the evidence are configured properly and modify the time zone setting if necessary.

In our case, since we did not include the complete Windows’ image, let’s assume the computer’s time zone is North American Eastern Time Zone time zone. Verify the time zone setting by opening the WinLabEnCase image and selecting “Device -> Modify Time Zone Settings”.

image3.png

Question 5: How do you modify Time Zone Settings, show a screen shot below.

Now that you have the evidence added and the time zone set, you can analyze the evidence.

Timeline View

The Timeline view gives you a graphical overview of file creation, modification and access times and dates in a calendar view. It allows you to look for patterns.

Green Select the WinLabEnCase Image and click on the Timeline tab in the Views pane.

The timeline view can be zoomed from a yearly view to a minute-by-minute view using Higher Resolution button and Lower Resolution button.

The colored dots represent activity on a particular file. The legend for the colors can be found by clicking “Options” button from the top menu.

Question 6: Why is Timeline View useful for your investigation?

Gallery View

The Gallery view allows you to quickly see all the pictures in the case. Now let’s switch to the WinLabRaw image by View -> Evidence then open the WinLabRaw Image. Green select “WinLab Raw image”, in the Views pane, select the Gallery tab.

You will now see all of the pictures contained in the WinLabRaw Image. The Gallery view displays graphics files based on file extension.

Question 7: In the Raw Image, how many pictures are shown in Gallery View?

Process the Evidence (watch Processing Evidence Part 2 from http://www.encaseondemand.com/EnCasev7Essentials/tabid/2617/index.aspx)

Select Process Evidence… from the Add Evidence menu. Click the Process check box for the evidences that you intend to run through the Evidence Processor. The Evidence Processor Task list is shown at the bottom pane. You have the freedom to enable the tasks to run. For example, you may want to run certain tasks in the beginning, such as file signature and hash analysis, then later add other options, such as parsing compound files. However, you have to run certain tasks at a particular time. For example, you must run Recover Folders in the initial processing step. Tasks you must run in a specific step are marked with a red flag icon.

Note: If a task name is listed in a blue font, click on its task name to configure it. If a task name is listed in a black font, no further configuration is necessary

Select the WinLabRaw Image, enable the top five tasks and run the evidence processor.

image4.png

Recover folders.

Recover Folders will recover all deleted folders.

Note: For this image, you may not see anything interesting.

Question 8: Read the EnCase manual to find out how Recover-Folders recover deleted folders for FAT and NTFS file systems respectively?

File Signature Analysis

A file type (JPEG, Word Document, MP3 file) can be determined by the file’s extension and by a header that precedes the data in the file. If a file’s extension has been changed, then the only way to determine its type is by looking at its header.

Encase has a list of known file extensions and headers that it uses to identify files.

From the “View” menu select “File Types” to see the list of file types.

Question 9: What information is listed for each file type?

Question 10: What can an investigator do if the header of a file is unknown in your current setting of the EnCase?

When EnCase finished the file signature analysis. Select the WinLabRaw Image and take a look at the “Signature Analysis” and “Signature” Columns in the “Table” view.

Question 11: What different terms you see in the Signature Analysis column?

Question 12: Do you find any signature mismatch? List them.

Examine the WinLabRaw image in the gallery view again.

Question 13: Are there any graphics files on the WinLabRaw image whose file extensions have been changed? List them.

Question 14: If a file’s extension has been changed to a non-graphics file type (such as changing jpg to txt), will it be displayed in the Gallery view? If not, what could you do to fix this?

Hash Analysis

A hash is a digital fingerprint of a file or collection of data. EnCase uses the MD5 (and/or SHA1) algorithm to create hash(s) or “digital fingerprint” of a file.

The Evidence Processor’s Hash Analysis that we have run earlier has created the MD5 and SHA-1 hash values for the Raw image.

Check the “WinLabRaw Image” evidence in the table view, and make sure that the hash columns are filled.

Question 15: What are the types of files that will not have a hash generated?

Question 16: What are the three most common uses for hashes analysis?

Compound Files

Compound files are files with multiple layers and/or metadata such as Outlook Express email folders (.dbx), registry files, or OLE files.

In EnCase 7, you have several ways to expand the compound files. You can run the EnCase Evidence Processor on the EnCase image, select Expand compound files to expand all achieves and registry files OR you can expand the individual compound file.

Here we will try the second method by only expanding the individual compound file. Let’s look at the NTUSER.DAT registry file from WinLabEncase image.

View -> Evidence and click on WinLabEncase image,

In the Table view locate the file “Documents and Settings\PSMITH\NTUSER.DAT” and expand the EnCase image to find the “Documents and Settings\PSMITH\NTUSER.DAT” file by right click the file and choose Entries -> View File Structures. (Note: other registry files exist in C:\windows\system32\config folder. They are not included in this image.)

image5.png

Double click on NTUSER.DAT

Question 17: Did anything happen? Do you find any important information? If so, what kind of information you got?

Searching for Email (See Email from the EnCase V7 Essential webinar)

EnCase can search various types of email artifacts including Outlook (2000/2003), Outlook Express, Exchange, Lotus Notes, AOL and Thunderbird’s MBOX.

Select Process Evidence… from the Add Evidence menu. Select the WinLabEnCase image from the Evidence Process, and ONLY check Find Email (uncheck other tasks).

Double click on “Find Email” and check Search for Additional Lost or Deleted Items box for a search for deleted e-mails. Click OK to run the processor.

The processed e-mail will be found under the Records view.

image6.png

A list of processed e-mail archives will be displayed under the Email Folder. To open an e-mail archive, click on the hyperlink of the name of the archive

Question 18: What interesting information do you see from emails?

EnCase v7 also supports two forms of e-mail threading analysis, Conversations and Related messages.

Double click on Deleted Items.dbx. In the Records tab, from the Find related items menu, click Show related messages button.

image7.png

Question 19: Read EnCase Forenscis V7 User Guide (page 208), briefly describe what are these features.

Question 20: Under the Records view, you should also see Thumbnails under WinLabRaw Image, what are thumbnails? List three of them.

Searching for Internet Artifacts (Processed Evidence Results Part 2)

Internet history contains rich evidences. EnCase will collect Internet-related artifacts, such as browser histories and cached web pages. You also have the option to search unallocated space for the Internet

artifacts.

Select Process Evidence… from the Add Evidence menu. Select the WinLabEnCase image from the Evidence Process, and check Find internet artifacts. Double click the Find internet artifacts hyperlink and choose “search unallocated space for internet artifacts” and run the processor.

The processed internet artifacts will be found under the Records view. Select the Internet folder of Records and then click on the Internet hyperlink.

Question 21: What kind of information do you see in the record for Internet?

Question 22: How does “search unallocated space for internet artifacts” affect your search results in the record?

Searching in EnCase v7

There are three principal methods of searching through evidence in EnCase v7:

· Index searches – Evidence data is indexed prior to searching

· Raw searches – Searches based on non-indexed, raw data

· Tag searches – Searches based on user-defined tags

Generating an index can take time, however, the trade-off in time spent creating the index yields a greater payoff with near instantaneous search times.

Using EnCase indexing search (Viewing Index and Search Results Part 1)

Text indexing allows you to quickly query the transcript of entries. Creating an index builds a list of words from the contents of an evidence file that contain pointers to their occurrence in the file. Two steps are involved in using the index: Generating an index and Searching an Index.

Select Process Evidence… from the Add Evidence menu. Select the WinLabEnCase image from the Evidence Process, and check “Index Text And MetaData” and only set index slack and Unallocated, then click OK to run the processor.

To search an index, first open the search tab by clicking “View” -> Search, then click on Index button.

Type “search” in the index space and hit the run button (a green arrow at the same line of the Index button). The search result is shown in the table view. You can read the file by right-click on the tile and choose Go to file, then view the content at the low pane by choose text, Doc, Transcript or Picture depending on the file type.

Question 23: What are the results? List 2 files that contain the term “search” in their contents.

Searching for Keywords

This option runs a raw keyword search during the processing. You can either use Evidence Process Search for Keywords before analysis or the Raw Keyword search function outside the Evidence Processor during analysis. Let’s try the keyword search outside the Evidence Processor.

Click “View” -> “Evidence”, then click Raw Search All top-down menu and choose New Raw Search All…

image8.png

Use “New” to add a single keyword, “microsoft” (no quotes). Under Search Option, add the Unicode in addition to the default ANSI Latin-1

If you have multiple keywords to add at once, you can use “Add Keyword List” to add them.

Now use “Add Keyword List” to add in the following keywords:

computer

this

Again, under Search Option, add the Unicode in addition to the default ANSI Latin-1

Choose “Search entry slack” from the top checkboxes.

Questions 24: What are the other search options besides “Search entry slack”?

Click “Run…” under Raw Search All

When the search is done, to view the search results, let’s go to the View keywords hits (the yellow key symbol) sub-tab of Search tab. image9.png

In the keywords tree pane, we will see all the keywords we created. To see the result of any keyword, simply click on the keyword.

Question 25: What do you see from Search Hits? List two files from the search hits.

Bookmarks and Tags

Bookmarks allow you to mark folders, files, search results, or parts of a file for later reference and for inclusion in reports.

Bookmarking in Evidence View

Go to the “WinLabRaw Image” evidence, click on the “Gallery”, blue-check the additional images that you identified after “Signature Analysis”. Use the Bookmark drop-down menu to create bookmarks for the selected entry (or entries) by selecting Single item…. Or Selected items… (for multiple entries). Place the evidence bookmarks in the appropriate folder of your case report template or you can create a new folder.

image10.png

To view the bookmarking you created: “view” -> Bookmarks

Action 26: Include a screenshot of the bookmarks you created in the Bookmarks tab.

Tags

The EnCase v7 tagging feature allows you to mark evidence items from Records, Evidence, or Bookmarks for review. You can use the default tags created by EnCase or define your own tags. Tags tab can be found from the Records, Evidence, or Bookmark tabs,

Let’s create a tag and then tag the two files from your keyword search exercise using this tag.

Go to the evidence that contains these two suspicious files. Click “Tags” -> Manage tags…. , then create a tag named Suspicious Files, displayed as “Files” in Red color (right-click the Background Color and choose edit).

Select and blue check these two suspicious files, then use “Tags -> Tag selected items…” to tag them using the “Files” tag. The tag should be shown in the Table view of the “Tag” column.

Action 27: Show the tagged Files in the Table view.

Question 28: What is the “One-click tagging” feature (see EnCase User Guide, page 234)?

Action 29: Finally, go back Process Evidence… from the Add Evidence menu. Selected the WinlabEnCase image, expend Modules, and choose one function from Modules and include your results below.

PAGE

1

Advanced Computer Forensics – EnCase

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Roles Of Line Management And Social Network And Information Technology Sections

Information Technology and Organizational

Learning Managing Behavioral Change

in the Digital Age Third Edition

 

 

Information Technology and Organizational

Learning Managing Behavioral Change

in the Digital Age Third Edition

Arthur M. Langer

 

 

CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742

© 2018 by Taylor & Francis Group, LLC

CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

Printed on acid-free paper

International Standard Book Number-13: 978-1-4987-7575-5 (Paperback) International Standard Book Number-13: 978-1-138-23858-9 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information stor- age or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.copy- right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.

Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com

and the CRC Press Web site at http://www.crcpress.com

 

 

v

Contents

Foreword xi Acknowledgments xiii Author xv IntroductIon xvii

chApter 1 the “rAvell” corporAtIon 1 Introduction 1 A New Approach 3

The Blueprint for Integration 5 Enlisting Support 6 Assessing Progress 7

Resistance in the Ranks 8 Line Management to the Rescue 8 IT Begins to Reflect 9 Defining an Identity for Information Technology 10 Implementing the Integration: A Move toward Trust and Reflection 12 Key Lessons 14

Defining Reflection and Learning for an Organization 14 Working toward a Clear Goal 15 Commitment to Quality 15 Teaching Staff “Not to Know” 16 Transformation of Culture 16

Alignment with Administrative Departments 17 Conclusion 19

 

 

vi Contents

chApter 2 the It dIlemmA 21 Introduction 21 Recent Background 23 IT in the Organizational Context 24 IT and Organizational Structure 24 The Role of IT in Business Strategy 25 Ways of Evaluating IT 27 Executive Knowledge and Management of IT 28 IT: A View from the Top 29

Section 1: Chief Executive Perception of the Role of IT 32 Section 2: Management and Strategic Issues 34 Section 3: Measuring IT Performance and Activities 35 General Results 36

Defining the IT Dilemma 36 Recent Developments in Operational Excellence 38

chApter 3 technology As A vArIAble And responsIve orgAnIzAtIonAl dynAmIsm 41 Introduction 41 Technological Dynamism 41 Responsive Organizational Dynamism 42

Strategic Integration 43 Summary 48

Cultural Assimilation 48 IT Organization Communications with “ Others” 49 Movement of Traditional IT Staff 49 Summary 51

Technology Business Cycle 52 Feasibility 53 Measurement 53 Planning 54 Implementation 55 Evolution 57 Drivers and Supporters 58

Santander versus Citibank 60 Information Technology Roles and Responsibilities 60 Replacement or Outsource 61

chApter 4 orgAnIzAtIonAl leArnIng theorIes And technology 63 Introduction 63 Learning Organizations 72 Communities of Practice 75 Learning Preferences and Experiential Learning 83 Social Discourse and the Use of Language 89

Identity 91 Skills 92

 

 

viiContents

Emotion 92 Linear Development in Learning Approaches 96

chApter 5 mAnAgIng orgAnIzAtIonAl leArnIng And technology 109 The Role of Line Management 109

Line Managers 111 First-Line Managers 111 Supervisor 111

Management Vectors 112 Knowledge Management 116 Ch ange Management 120 Change Management for IT Organizations 123 Social Networks and Information Technology 134

chApter 6 orgAnIzAtIonAl trAnsFormAtIon And the bAlAnced scorecArd 139 Introduction 139 Methods of Ongoing Evaluation 146 Balanced Scorecards and Discourse 156 Knowledge Creation, Culture, and Strategy 158

chApter 7 vIrtuAl teAms And outsourcIng 163 Introduction 163 Status of Virtual Teams 165 Management Considerations 166 Dealing with Multiple Locations 166

Externalization 169 Internalization 171 Combination 171 Socialization 172 Externalization Dynamism 172 Internalization Dynamism 173 Combination Dynamism 173 Socialization Dynamism 173

Dealing with Multiple Locations and Outsourcing 177 Revisiting Social Discourse 178 Identity 179 Skills 180 Emotion 181

chApter 8 synergIstIc unIon oF It And orgAnIzAtIonAl leArnIng 187 Introduction 187 Siemens AG 187

Aftermath 202 ICAP 203

 

 

viii Contents

Five Years Later 224 HTC 225

IT History at HTC 226 Interactions of the CEO 227 The Process 228 Transformation from the Transition 229 Five Years Later 231

Summary 233

chApter 9 FormIng A cyber securIty culture 239 Introduction 239 History 239 Talking to the Board 241 Establishing a Security Culture 241 Understanding What It Means to be Compromised 242 Cyber Security Dynamism and Responsive Organizational Dynamism 242 Cyber Strategic Integration 243 Cyber Cultural Assimilation 245 Summary 246 Organizational Learning and Application Development 246 Cyber Security Risk 247 Risk Responsibility 248 Driver /Supporter Implications 250

chApter 10 dIgItAl trAnsFormAtIon And chAnges In consumer behAvIor 251 Introduction 251 Requirements without Users and without Input 254 Concepts of the S-Curve and Digital Transformation Analysis and Design 258 Organizational Learning and the S-Curve 260 Communities of Practice 261 The IT Leader in the Digital Transformation Era 262 How Technology Disrupts Firms and Industries 264

Dynamism and Digital Disruption 264 Critical Components of “ Digital” Organization 265 Assimilating Digital Technology Operationally and Culturally 267 Conclusion 268

chApter 11 IntegrAtIng generAtIon y employees to AccelerAte competItIve AdvAntAge 269 Introduction 269 The Employment Challenge in the Digital Era 270 Gen Y Population Attributes 272 Advantages of Employing Millennials to Support Digital Transformation 272 Integration of Gen Y with Baby Boomers and Gen X 273

 

 

ixContents

Designing the Digital Enterprise 274 Assimilating Gen Y Talent from Underserved and Socially Excluded Populations 276 Langer Workforce Maturity Arc 277

Theoretical Constructs of the LWMA 278 The LWMA and Action Research 281

Implications for New Pathways for Digital Talent 282 Demographic Shifts in Talent Resources 282 Economic Sustainability 283 Integration and Trust 283

Global Implications for Sources of Talent 284 Conclusion 284

chApter 12 towArd best prActIces 287 Introduction 287 Chief IT Executive 288 Definitions of Maturity Stages and Dimension Variables in the Chief IT Executive Best Practices Arc 297

Maturity Stages 297 Performance Dimensions 298

Chief Executive Officer 299 CIO Direct Reporting to the CEO 305 Outsourcing 306 Centralization versus Decentralization of IT 306 CIO Needs Advanced Degrees 307 Need for Standards 307 Risk Management 307

The CEO Best Practices Technology Arc 313 Definitions of Maturity Stages and Dimension Variables in the CEO Technology Best Practices Arc 314

Maturity Stages 314 Performance Dimensions 315

Middle Management 316 The Middle Management Best Practices Technology Arc 323

Definitions of Maturity Stages and Dimension Variables in the Middle Manager Best Practices Arc 325

Maturity Stages 325 Performance Dimensions 326

Summary 327 Ethics and Maturity 333

chApter 13 conclusIons 339 Introduction 339

glossAry 357 reFerences 363 Index 373

 

 

xi

Foreword

Digital technologies are transforming the global economy. Increasingly, firms and other organizations are assessing their opportunities, develop- ing and delivering products and services, and interacting with custom- ers and other stakeholders digitally. Established companies recognize that digital technologies can help them operate their businesses with greater speed and lower costs and, in many cases, offer their custom- ers opportunities to co-design and co-produce products and services. Many start-up companies use digital technologies to develop new prod- ucts and business models that disrupt the present way of doing busi- ness, taking customers away from firms that cannot change and adapt. In recent years, digital technology and new business models have dis- rupted one industry after another, and these developments are rapidly transforming how people communicate, learn, and work.

Against this backdrop, the third edition of Arthur Langer’ s Information Technology and Organizational Learning is most welcome. For decades, Langer has been studying how firms adapt to new or changing conditions by increasing their ability to incorporate and use advanced information technologies. Most organizations do not adopt new technology easily or readily. Organizational inertia and embed- ded legacy systems are powerful forces working against the adoption of new technology, even when the advantages of improved technology are recognized. Investing in new technology is costly, and it requires

 

 

xii Foreword

aligning technology with business strategies and transforming cor- porate cultures so that organization members use the technology to become more productive.

Information Technology and Organizational Learning addresses these important issues— and much more. There are four features of the new edition that I would like to draw attention to that, I believe, make this a valuable book. First, Langer adopts a behavioral perspective rather than a technical perspective. Instead of simply offering norma- tive advice about technology adoption, he shows how sound learn- ing theory and principles can be used to incorporate technology into the organization. His discussion ranges across the dynamic learning organization, knowledge management, change management, com- munities of practice, and virtual teams. Second, he shows how an organization can move beyond technology alignment to true technol- ogy integration. Part of this process involves redefining the traditional support role of the IT department to a leadership role in which IT helps to drive business strategy through a technology-based learn- ing organization. Third, the book contains case studies that make the material come alive. The book begins with a comprehensive real-life case that sets the stage for the issues to be resolved, and smaller case illustrations are sprinkled throughout the chapters, to make concepts and techniques easily understandable. Lastly, Langer has a wealth of experience that he brings to his book. He spent more than 25 years as an IT consultant and is the founder of the Center for Technology Management at Columbia University, where he directs certificate and executive programs on various aspects of technology innovation and management. He has organized a vast professional network of tech- nology executives whose companies serve as learning laboratories for his students and research. When you read the book, the knowledge and insight gained from these experiences is readily apparent.

If you are an IT professional, Information Technology and Organi­ zational Learning should be required reading. However, anyone who is part of a firm or agency that wants to capitalize on the opportunities provided by digital technology will benefit from reading the book.

Charles C. Snow Professor Emeritus, Penn State University

Co­Editor, Journal of Organization Design

 

 

xiii

Acknowledgments

Many colleagues and clients have provided significant support during the development of the third edition of Information Technology and Organizational Learning.

I owe much to my colleagues at Teachers College, namely, Professor Victoria Marsick and Lyle Yorks, who guided me on many of the the- ories on organizational learning, and Professor Lee Knefelkamp, for her ongoing mentorship on adult learning and developmental theo- ries. Professor David Thomas from the Harvard Business School also provided valuable direction on the complex issues surrounding diver- sity, and its importance in workforce development.

I appreciate the corporate executives who agreed to participate in the studies that allowed me to apply learning theories to actual organizational practices. Stephen McDermott from ICAP provided invaluable input on how chief executive officers (CEOs) can success- fully learn to manage emerging technologies. Dana Deasy, now global chief information officer (CIO) of JP Morgan Chase, contributed enormous information on how corporate CIOs can integrate tech- nology into business strategy. Lynn O’ Connor Vos, CEO of Grey Healthcare, also showed me how technology can produce direct mon- etary returns, especially when the CEO is actively involved.

And, of course, thank you to my wonderful students at Columbia University. They continue to be at the core of my inspiration and love for writing, teaching, and scholarly research.

 

 

xv

Author

Arthur M. Langer, EdD, is professor of professional practice of management and the director of the Center for Technology Management at Columbia University. He is the academic direc- tor of the Executive Masters of Science program in Technology Management, vice chair of faculty and executive advisor to the dean at the School of Professional Studies and is on the faculty of the Department of Organization and Leadership at the Graduate School of Education (Teachers College). He has also served as a member of the Columbia University Faculty Senate. Dr. Langer is the author of Guide to Software Development: Designing & Managing the Life Cycle. 2nd Edition (2016), Strategic IT: Best Practices for Managers and Executives (2013 with Lyle Yorks), Information Technology and Organizational Learning (2011), Analysis and Design of Information Systems (2007), Applied Ecommerce (2002), and The Art of Analysis (1997), and has numerous published articles and papers, relating to digital transformation, service learning for underserved popula- tions, IT organizational integration, mentoring, and staff develop- ment. Dr. Langer consults with corporations and universities on information technology, cyber security, staff development, man- agement transformation, and curriculum development around the Globe. Dr. Langer is also the chairman and founder of Workforce Opportunity Services (www.wforce.org), a non-profit social venture

 

 

xvi Author

that provides scholarships and careers to underserved populations around the world.

Dr. Langer earned a BA in computer science, an MBA in accounting/finance, and a Doctorate of Education from Columbia University.

 

 

xvii

Introduction

Background

Information technology (IT) has become a more significant part of workplace operations, and as a result, information systems person- nel are key to the success of corporate enterprises, especially with the recent effects of the digital revolution on every aspect of business and social life (Bradley & Nolan, 1998; Langer, 1997, 2011; Lipman- Blumen, 1996). This digital revolution is defined as a form of “ dis- ruption.” Indeed, the big question facing many enterprises today is, How can executives anticipate the unexpected threats brought on by technological advances that could devastate their business? This book focuses on the vital role that information and digital technology orga- nizations need to play in the course of organizational development and learning, and on the growing need to integrate technology fully into the processes of workplace organizational learning. Technology personnel have long been criticized for their inability to function as part of the business, and they are often seen as a group outside the corporate norm (Schein, 1992). This is a problem of cultural assimila- tion, and it represents one of the two major fronts that organizations now face in their efforts to gain a grip on the new, growing power of technology, and to be competitive in a global world. The other major

 

 

xviii IntroduCtIon

front concerns the strategic integration of new digital technologies into business line management.

Because technology continues to change at such a rapid pace, the ability of organizations to operate within a new paradigm of dynamic change emphasizes the need to employ action learning as a way to build competitive learning organizations in the twenty-first century. Information Technology and Organizational Learning integrates some of the fundamental issues bearing on IT today with concepts from organizational learning theory, providing comprehensive guidance, based on real-life business experiences and concrete research.

This book also focuses on another aspect of what IT can mean to an organization. IT represents a broadening dimension of business life that affects everything we do inside an organization. This new reality is shaped by the increasing and irreversible dissemination of technology. To maximize the usefulness of its encroaching presence in everyday business affairs, organizations will require an optimal understanding of how to integrate technology into everything they do. To this end, this book seeks to break new ground on how to approach and concep- tualize this salient issue— that is, that the optimization of information and digital technologies is best pursued with a synchronous imple- mentation of organizational learning concepts. Furthermore, these concepts cannot be implemented without utilizing theories of strategic learning. Therefore, this book takes the position that technology liter- acy requires individual and group strategic learning if it is to transform a business into a technology-based learning organization. Technology­ based organizations are defined as those that have implemented a means of successfully integrating technology into their process of organiza- tional learning. Such organizations recognize and experience the real- ity of technology as part of their everyday business function. It is what many organizations are calling “ being digital.”

This book will also examine some of the many existing organi- zational learning theories, and the historical problems that have occurred with companies that have used them, or that have failed to use them. Thus, the introduction of technology into organizations actually provides an opportunity to reassess and reapply many of the past concepts, theories, and practices that have been used to support the importance of organizational learning. It is important, however, not to confuse this message with a reason for promoting organizational

 

 

xixIntroduCtIon

learning, but rather, to understand the seamless nature of the relation- ship between IT and organizational learning. Each needs the other to succeed. Indeed, technology has only served to expose problems that have existed in organizations for decades, e.g., the inability to drive down responsibilities to the operational levels of the organization, and to be more agile with their consumers.

This book is designed to help businesses and individual manag- ers understand and cope with the many issues involved in developing organizational learning programs, and in integrating an important component: their IT and digital organizations. It aims to provide a combination of research case studies, together with existing theories on organizational learning in the workplace. The goal is also to pro- vide researchers and corporate practitioners with a book that allows them to incorporate a growing IT infrastructure with their exist- ing workforce culture. Professional organizations need to integrate IT into their organizational processes to compete effectively in the technology-driven business climate of today. This book responds to the complex and various dilemmas faced by many human resource managers and corporate executives regarding how to actually deal with many marginalized technology personnel who somehow always operate outside the normal flow of the core business.

While the history of IT, as a marginalized organization, is rela- tively short, in comparison to that of other professions, the problems of IT have been consistent since its insertion into business organiza- tions in the early 1960s. Indeed, while technology has changed, the position and valuation of IT have continued to challenge how execu- tives manage it, account for it, and, most important, ultimately value its contributions to the organization. Technology personnel continue to be criticized for their inability to function as part of the business, and they are often seen as outside the business norm. IT employees are frequently stereotyped as “ techies,” and are segregated in such a way that they become isolated from the organization. This book pro- vides a method for integrating IT, and redefining its role in organiza- tions, especially as a partner in formulating and implementing key business strategies that are crucial for the survival of many companies in the new digital age. Rather than provide a long and extensive list of common issues, I have decided it best to uncover the challenges of IT integration and performance through the case study approach.

 

 

xx IntroduCtIon

IT continues to be one of the most important yet least understood departments in an organization. It has also become one of the most significant components for competing in the global markets of today. IT is now an integral part of the way companies become successful, and is now being referred to as the digital arm of the business. This is true across all industries. The role of IT has grown enormously in companies throughout the world, and it has a mission to provide stra- tegic solutions that can make companies more competitive. Indeed, the success of IT, and its ability to operate as part of the learning organization, can mean the difference between the success and failure of entire companies. However, IT must be careful that it is not seen as just a factory of support personnel, and does not lose its justification as driving competitive advantage. We see in many organizations that other digital-based departments are being created, due to frustration with the traditional IT culture, or because they simply do not see IT as meeting the current needs for operating in a digital economy.

This book provides answers to other important questions that have challenged many organizations for decades. First, how can manag- ers master emerging digital technologies, sustain a relationship with organizational learning, and link it to strategy and performance? Second, what is the process by which to determine the value of using technology, and how does it relate to traditional ways of calculating return on investment, and establishing risk models? Third, what are the cyber security implications of technology-based products and services? Fourth, what are the roles and responsibilities of the IT executive, and the department in general? To answer these questions, managers need to focus on the following objectives:

• Address the operational weaknesses in organizations, in terms of how to deal with new technologies, and how to bet- ter realize business benefits.

• Provide a mechanism that both enables organizations to deal with accelerated change caused by technological innovations, and integrates them into a new cycle of processing, and han- dling of change.

• Provide a strategic learning framework, by which every new technology variable adds to organizational knowledge and can develop a risk and security culture.

 

 

xxiIntroduCtIon

• Establish an integrated approach that ties technology account- ability to other measurable outcomes, using organizational learning techniques and theories.

To realize these objectives, organizations must be able to

• create dynamic internal processes that can deal, on a daily basis, with understanding the potential fit of new technologies and their overall value within the structure of the business;

• provide the discourse to bridge the gaps between IT- and non- IT-related investments, and uses, into one integrated system;

• monitor investments and determine modifications to the life cycle;

• implement various organizational learning practices, includ- ing learning organization, knowledge management, change management, and communities of practice, all of which help foster strategic thinking, and learning, and can be linked to performance (Gephardt & Marsick, 2003).

The strengths of this book are that it integrates theory and practice and provides answers to the four common questions mentioned. Many of the answers provided in these pages are founded on theory and research and are supported by practical experience. Thus, evidence of the performance of the theories is presented via case studies, which are designed to assist the readers in determining how such theories and proven practices can be applied to their specific organization.

A common theme in this book involves three important terms: dynamic , unpredictable , and acceleration . Dynamic is a term that rep- resents spontaneous and vibrant things— a motive force. Technology behaves with such a force and requires organizations to deal with its capabilities. Glasmeier (1997) postulates that technology evolution, innovation, and change are dynamic processes. The force then is tech- nology, and it carries many motives, as we shall see throughout this book. Unpredictable suggests that we cannot plan what will happen or will be needed. Many organizational individuals, including execu- tives, have attempted to predict when, how, or why technology will affect their organization. Throughout our recent history, especially during the “ digital disruption” era, we have found that it is difficult, if not impossible, to predict how technology will ultimately benefit or

 

 

xxii IntroduCtIon

hurt organizational growth and competitive advantage. I believe that technology is volatile and erratic at times. Indeed, harnessing tech- nology is not at all an exact science; certainly not in the ways in which it can and should be used in today’ s modern organization. Finally, I use the term acceleration to convey the way technology is speeding up our lives. Not only have emerging technologies created this unpre- dictable environment of change, but they also continue to change it rapidly— even from the demise of the dot-com era decades ago. Thus, what becomes important is the need to respond quickly to technology. The inability to be responsive to change brought about by technologi- cal innovations can result in significant competitive disadvantages for organizations.

This new edition shows why this is a fact especially when examining the shrinking S-Curve. So, we look at these three words— dynamic, unpredictable, and acceleration— as a way to define how technology affects organizations; that is, technology is an accelerating motive force that occurs irregularly. These words name the challenges that organizations need to address if they are to manage technological innovations and integrate them with business strategy and competi- tive advantage. It only makes sense that the challenge of integrating technology into business requires us first to understand its potential impact, determine how it occurs, and see what is likely to follow. There are no quick remedies to dealing with emerging technologies, just common practices and sustained processes that must be adopted for organizations to survive in the future.

I had four goals in mind in writing this book. First, I am inter- ested in writing about the challenges of using digital technologies strategically. What particularly concerns me is the lack of literature that truly addresses this issue. What is also troublesome is the lack of reliable techniques for the evaluation of IT, especially since IT is used in almost every aspect of business life. So, as we increase our use and dependency on technology, we seem to understand less about how to measure and validate its outcomes. I also want to convey my thoughts about the importance of embracing nonmon- etary methods for evaluating technology, particularly as they relate to determining return on investment. Indeed, indirect and non- monetary benefits need to be part of the process of assessing and approving IT projects.

 

 

xxiiiIntroduCtIon

Second, I want to apply organizational learning theory to the field of IT and use proven learning models to help transform IT staff into becoming better members of their organizations. Everyone seems to know about the inability of IT people to integrate with other depart- ments, yet no one has really created a solution to the problem. I find that organizational learning techniques are an effective way of coach- ing IT staff to operate more consistently with the goals of the busi- nesses that they support.

Third, I want to present cogent theories about IT and organiza- tional learning; theories that establish new ways for organizations to adapt new technologies. I want to share my experiences and those of other professionals who have found approaches that can provide posi- tive outcomes from technology investments.

Fourth, I have decided to express my concerns about the valid- ity and reliability of organizational learning theories and practices as they apply to the field of IT. I find that most of these models need to be enhanced to better fit the unique aspects of the digital age. These modified models enable the original learning techniques to address IT-specific issues. In this way, the organization can develop a more holistic approach toward a common goal for using technology.

Certainly, the balance of how technology ties in with strategy is essential. However, there has been much debate over whether tech- nology should drive business strategy or vice versa. We will find that the answer to this is “ yes.” Yes, in the sense that technology can affect the way organizations determine their missions and business strate- gies; but “ no” in that technology should not be the only component for determining mission and strategy. Many managers have realized that business is still business, meaning that technology is not a “ sil- ver bullet.” The challenge, then, is to determine how best to fit tech- nology into the process of creating and supporting business strategy. Few would doubt today that technology is, indeed, the most signifi- cant variable affecting business strategy. However, the most viable approach is to incorporate technology into the process of determin- ing business strategy. I have found that many businesses still formu- late their strategies first, and then look at technology, as a means to efficiently implement objectives and goals. Executives need to better understand the unique and important role that technology provides us; it can drive business strategy, and support it, at the same time.

 

 

xxiv IntroduCtIon

Managers should not solely focus their attention on generating breakthrough innovations that will create spectacular results. Most good uses of technology are much subtler, and longer-lasting. For this reason, this book discusses and defines new technology life cycles that blend business strategy and strategic learning. Building on this theme, I introduce the idea of responsive organizational dynamism as the core theory of this book. Responsive organizational dynamism defines an environment that can respond to the three important terms (dynamic, unpredictable, and acceleration). Indeed, technology requires organizations that can sustain a system, in which individu- als can deal with dynamic, unpredictable, and accelerated change, as part of their regular process of production. The basis of this concept is that organizations must create and sustain such an environment to be competitive in a global technologically-driven economy. I further analyze responsive organizational dynamism in its two subcompo- nents: strategic integration and cultural assimilation, which address how technology needs to be measured as it relates to business strategy, and what related social– structural changes are needed, respectively.

Change is an important principle of this book. I talk about the importance of how to change, how to manage such change, and why emerging technologies are a significant agent of change. I support the need for change, as an opportunity to use many of the learning theories that have been historically difficult to implement. That is, implementing change brought on by technological innovation is an opportunity to make the organization more “ change ready” or, as we define it today, more “ agile.” However, we also know that little is known about how organizations should actually go about modifying existing processes to adapt to new technologies and become digital entities— and to be accustomed to doing this regularly. Managing through such periods of change requires that we develop a model that can deal with dynamic, unpredictable, and accelerated change. This is what responsive organizational dynamism is designed to do.

We know that over 20% of IT projects still fail to be completed. Another 54% fail to meet their projected completion date. We now sit at the forefront of another technological spurt of innovations that will necessitate major renovations to existing legacy systems, requiring that they be linked to sophisticated e-business systems. These e-business systems will continue to utilize the Internet, and emerging mobile

 

 

xxvIntroduCtIon

technologies. While we tend to focus primarily on what technology generically does, organizations need urgently to prepare themselves for the next generation of advances, by forming structures that can deal with continued, accelerated change, as the norm of daily opera- tions. For this edition, I have added new sections and chapters that address the digital transformation, ways of dealing with changing consumer behavior, the need to form evolving cyber security cultures, and the importance of integrating Gen Y employees to accelerate competitive advantage.

This book provides answers to a number of dilemmas but ultimately offers an imbricate cure for the problem of latency in performance and quality afflicting many technologically-based projects. Traditionally, management has attempted to improve IT performance by increasing technical skills and project manager expertise through new processes. While there has been an effort to educate IT managers to become more interested and participative in business issues, their involvement continues to be based more on service than on strategy. Yet, at the heart of the issue is the entirety of the organization. It is my belief that many of the programmatic efforts conducted in traditional ways and attempting to mature and integrate IT with the rest of the organiza- tion will continue to deliver disappointing results.

My personal experience goes well beyond research; it draws from living and breathing the IT experience for the past 35 years, and from an understanding of the dynamics of what occurs inside and outside the IT department in most organizations. With such experi- ence, I can offer a path that engages the participation of the entire management team and operations staff of the organization. While my vision for this kind of digital transformation is different from other approaches, it is consistent with organizational learning theo- ries that promote the integration of individuals, communities, and senior management to participate in more democratic and vision- ary forms of thinking, reflection, and learning. It is my belief that many of the dilemmas presented by IT have existed in other parts of organizations for years, and that the Internet revolution only served to expose them. If we believe this to be true, then we must begin the process of integrating technology into strategic thinking and stop depending on IT to provide magical answers, and inappropriate expectations of performance.

 

 

xxvi IntroduCtIon

Technology is not the responsibility of any one person or depart- ment; rather, it is part of the responsibility of every employee. Thus, the challenge is to allow organizations to understand how to modify their processes, and the roles and responsibilities of their employees, to incorporate digital technologies as part of normal workplace activi- ties. Technology then becomes more a subject and a component of discourse. IT staff members need to emerge as specialists who par- ticipate in decision making, development, and sustained support of business evolution. There are also technology-based topics that do not require the typical expertise that IT personnel provide. This is a literacy issue that requires different ways of thinking and learning during the everyday part of operations. For example, using desktop tools, communicating via e-mail, and saving files and data, are inte- gral to everyday operations. These activities affect projects, yet they are not really part of the responsibilities of IT departments. Given the knowledge that technology is everywhere, we must change the approach that we take to be successful. Another way of looking at this phenomenon is to define technology more as a commodity, readily available to all individuals. This means that the notion of technology as organizationally segregated into separate cubes of expertise is prob- lematic, particularly on a global front.

Thus, the overall aim of this book is to promote organizational learning that disseminates the uses of technology throughout a busi- ness, so that IT departments are a partner in its use, as opposed to being its sole owner. The cure to IT project failure, then, is to engage the business in technology decisions in such a way that individuals and business units are fundamentally involved in the process. Such processes need to be designed to dynamically respond to technology opportunities and thus should not be overly bureaucratic. There is a balance between establishing organizations that can readily deal with technology versus those that become too complex and inefficient.

This balance can only be attained using organizational learning techniques as the method to grow and reach technology maturation.

Overview of the Chapters

Chapter 1 provides an important case study of the Ravell Corporation (a pseudonym), where I was retained for over five years. During this

 

 

xxviiIntroduCtIon

period, I applied numerous organizational learning methods toward the integration of the IT department with the rest of the organiza- tion. The chapter allows readers to understand how the theories of organizational learning can be applied in actual practice, and how those theories are particularly beneficial to the IT community. The chapter also shows the practical side of how learning techniques can be linked to measurable outcomes, and ultimately related to business strategy. This concept will become the basis of integrating learning with strategy (i.e., “ strategic learning” ). The Ravell case study also sets the tone of what I call the IT dilemma, which represents the core problem faced by organizations today. Furthermore, the Ravell case study becomes the cornerstone example throughout the book and is used to relate many of the theories of learning and their practical applicability in organizations. The Ravell case has also been updated in this second edition to include recent results that support the impor- tance of alignment with the human resources department.

Chapter 2 presents the details of the IT dilemma. This chapter addresses issues such as isolation of IT staff, which results in their marginalization from the rest of the organization. I explain that while executives want technology to be an important part of business strat- egy, few understand how to accomplish it. In general, I show that individuals have a lack of knowledge about how technology and busi- ness strategy can, and should, be linked, to form common business objectives. The chapter provides the results of a three-year study of how chief executives link the role of technology with business strat- egy. The study captures information relating to how chief executives perceive the role of IT, how they manage it, and use it strategically, and the way they measure IT performance and activities.

Chapter 3 focuses on defining how organizations need to respond to the challenges posed by technology. I analyze technological dyna- mism in its core components so that readers understand the different facets that comprise its many applications. I begin by presenting tech- nology as a dynamic variable that is capable of affecting organizations in a unique way. I specifically emphasize the unpredictability of tech- nology, and its capacity to accelerate change— ultimately concluding that technology, as an independent variable, has a dynamic effect on organizational development. This chapter also introduces my theory of responsive organizational dynamism, defined as a disposition in

 

 

xxviii IntroduCtIon

organizational behavior that can respond to the demands of tech- nology as a dynamic variable. I establish two core components of responsive organizational dynamism: strategic integration and cultural assimilation . Each of these components is designed to tackle a specific problem introduced by technology. Strategic integration addresses the way in which organizations determine how to use technology as part of business strategy. Cultural assimilation, on the other hand, seeks to answer how the organization, both structurally and culturally, will accommodate the actual human resources of an IT staff and depart- ment within the process of implementing new technologies. Thus, strategic integration will require organizational changes in terms of cultural assimilation. The chapter also provides a perspective of the technology life cycle so that readers can see how responsive organi- zational dynamism is applied, on an IT project basis. Finally, I define the driver and supporter functions of IT and how these contribute to managing technology life cycles.

Chapter 4 introduces theories on organizational learning, and applies them specifically to responsive organizational dynamism. I emphasize that organizational learning must result in individual, and organizational transformation, that leads to measurable performance outcomes. The chapter defines a number of organizational learning theories, such as reflective practices, learning organization, communi- ties of practice, learning preferences and experiential learning, social discourse, and the use of language. These techniques and approaches to promoting organizational learning are then configured into various models that can be used to assess individual and organizational devel- opment. Two important models are designed to be used in responsive organizational dynamism: the applied individual learning wheel and the technology maturity arc. These models lay the foundation for my position that learning maturation involves a steady linear progression from an individual focus toward a system or organizational perspec- tive. The chapter also addresses implementation issues— political challenges that can get in the way of successful application of the learning theories.

Chapter 5 explores the role of management in creating and sustain- ing responsive organizational dynamism. I define the tiers of middle management in relation to various theories of management partici- pation in organizational learning. The complex issues of whether

 

 

xxixIntroduCtIon

organizational learning needs to be managed from the top down, bottom up, or middle-top-down are discussed and applied to a model that operates in responsive organizational dynamism. This chapter takes into account the common three-tier structure in which most organizations operate: executive, middle, and operations. The execu- tive level includes the chief executive officer (CEO), president, and senior vice presidents. The middle is the most complex, ranging from vice president/director to supervisory roles. Operations covers what is commonly known as “ staff,” including clerical functions. The knowl- edge that I convey suggests that all of these tiers need to participate in management, including operations personnel, via a self-development model. The chapter also presents the notion that knowledge manage- ment is necessary to optimize competitive advantage, particularly as it involves transforming tacit knowledge into explicit knowledge. I view the existing theories on knowledge management, create a hybrid model that embraces technology issues, and map them to responsive organizational dynamism. Discussions on change management are included as a method of addressing the unique ways that technol- ogy affects product development. Essentially, I tie together respon- sive organizational dynamism with organizational change theory, by offering modifications to generally accepted theories. There is also a specific model created for IT organizations, that maps onto organi- zational-level concepts. Although I have used technology as the basis for the need for responsive organizational dynamism, I show that the needs for its existence can be attributed to any variable that requires dynamic change. As such, I suggest that readers begin to think about the next “ technology” or variable that can cause the same needs to occur inside organizations. The chapter has been extended to address the impact of social networking and the leadership opportunities it provides to technology executives.

Chapter 6 examines how organizational transformation occurs. The primary focus of the chapter is to integrate transformation theory with responsive organizational dynamism. The position taken is that organizational learning techniques must inevitably result in orga- nizational transformation. Discussions on transformation are often addressed at organizational level, as opposed to focusing on individual development. As in other sections of the book, I extend a number of theories so that they can operate under the auspices of responsive

 

 

xxx IntroduCtIon

organizational dynamism, specifically, the works of Yorks and Marsick (2000) and Aldrich (2001). I expand organizational transformation to include ongoing assessment within technology deliverables. This is accomplished through the use of a modified Balanced Scorecard originally developed by Kaplan and Norton (2001). The Balanced Scorecard becomes the vehicle for establishing a strategy-focused and technology-based organization.

Chapter 7 deals with the many business transformation projects that require outsource arrangements and virtual team management. This chapter provides an understanding of when and how to consider outsourcing and the intricacies of considerations once operating with virtual teams. I cover such issues as management considerations and the challenges of dealing in multiple locations. The chapter extends the models discussed in previous chapters so that they can be aligned with operating in a virtual team environment. Specifically, this includes communities of practice, social discourse, self-development, knowl- edge management, and, of course, responsive organizational dyna- mism and its corresponding maturity arcs. Furthermore, I expand the conversation to include IT and non-IT personnel, and the arguments for the further support needed to integrate all functions across the organization.

Chapter 8 presents updated case studies that demonstrate how my organizational learning techniques are actually applied in practice. Three case studies are presented: Siemens AG, ICAP, and HTC. Siemens AG is a diverse international company with 20 discrete businesses in over 190 countries. The case study offers a perspec- tive of how a corporate chief information officer (CIO) introduced e- business strategy. ICAP is a leading international money and secu- rity broker. This case study follows the activities of the electronic trad- ing community (ETC) entity, and how the CEO transformed the organization and used organizational learning methods to improve competitive advantage. HTC (a pseudonym) provides an example of why the chief IT executive should report to the CEO, and how a CEO can champion specific projects to help transform organizational norms and behaviors. This case study also maps the transformation of the company to actual examples of strategic advantage.

Chapter 9 focuses on the challenges of forming a “ cyber security” culture. The growing challenges of protecting companies from outside

 

 

xxxiIntroduCtIon

attacks have established the need to create a cyber security culture. This chapter addresses the ways in which information technology organizations must further integrate with business operations, so that their firms are better equipped to protect against outside threats. Since the general consensus is that no system can be 100% protected, and that most system compromises occur as a result of internal expo- sures, information technology leaders must educate employees on best practices to limit cyberattacks. Furthermore, while prevention is the objective, organizations must be internally prepared to deal with attacks and thus have processes in place should a system become pen- etrated by third-party agents.

Chapter 10 explores the effects of the digital global economy on the ways in which organizations need to respond to the consumeriza- tion of products and services. From this perspective, digital transfor- mation involves a type of social reengineering that affects the ways in which organizations communicate internally, and how they consider restructuring departments. Digital transformation also affects the risks that organizations must take in what has become an accelerated changing consumer market.

Chapter 11 provides conclusions and focuses on Gen Y employ- ees who are known as “ digital natives” and represent the new supply chain of talent. Gen Y employees possess the attributes to assist com- panies to transform their workforce to meet the accelerated change in the competitive landscape. Most executives across industries recog- nize that digital technologies are the most powerful variable to main- taining and expanding company markets. Gen Y employees provide a natural fit for dealing with emerging digital technologies. However, success with integrating Gen Y employees is contingent upon Baby Boomer and Gen X management adopting new leadership philoso- phies and procedures suited to meet the expectations and needs of these new workers. Ignoring the unique needs of Gen Y employees will likely result in an incongruent organization that suffers high turnover of young employees who will ultimately seek a more entre- preneurial environment.

Chapter 12 seeks to define best practices to implement and sus- tain responsive organizational dynamism. The chapter sets forth a model that creates separate, yet linked, best practices and maturity arcs that can be used to assess stages of the learning development

 

 

xxxii IntroduCtIon

of the chief IT executive, the CEO, and the middle management. I discuss the concept of common threads , by which each best practices arc links through common objectives and outcomes to the responsive organizational dynamism maturity arc presented in Chapter 4. Thus, these arcs represent an integrated and hierarchical view of how each component of the organization contributes to overall best practices. A new section has been added that links ethics to technology leadership and maturity.

Chapter 13 summarizes the many aspects of how IT and organi- zational learning operate together to support the responsive organi- zational dynamism environment. The chapter emphasizes the specific key themes developed in the book, such as evolution versus revolu- tion; control and empowerment; driver and supporter operations; and responsive organizational dynamism and self-generating organiza- tions. Finally, I provide an overarching framework for “ organizing” reflection and integrate it with the best practices arcs.

As a final note, I need to clarify my use of the words information technology, digital technology, and technology. In many parts of the book, they are used interchangeably, although there is a defined difference. Of course, not all technology is related to information or digital; some is based on machinery or the like. For the purposes of this book, the reader should assume that IT and digital technology are the primary variables that I am addressing. However, the theories and processes that I offer can be scaled to all types of technological innovation.

 

 

1

1 The “Ravell” CoRpoRaTion

Introduction

Launching into an explanation of information technology (IT), organizational learning, and the practical relationship into which I propose to bring them is a challenging topic to undertake. I choose, therefore, to begin this discussion by presenting an actual case study that exemplifies many key issues pertaining to organizational learn- ing, and how it can be used to improve the performance of an IT department. Specifically, this chapter summarizes a case study of the IT department at the Ravell Corporation (a pseudonym) in New York City. I was retained as a consultant at the company to improve the performance of the department and to solve a mounting politi- cal problem involving IT and its relation to other departments. The case offers an example of how the growth of a company as a “learn- ing organization”—one in which employees are constantly learning during the normal workday (Argyris, 1993; Watkins & Marsick, 1993)— utilized reflective practices to help it achieve the practical stra- tegic goals it sought. Individuals in learning organizations integrate processes of learning into their work. Therefore, a learning organiza- tion must advocate a system that allows its employees to interact, ask questions, and provide insight to the business. The learning organiza- tion will ultimately promote systematic thinking, and the building of organizational memory (Watkins & Marsick, 1993). A learning organization (discussed more fully in Chapter 4) is a component of the larger topic of organizational learning.

The Ravell Corporation is a firm with over 500 employees who, over the years, had become dependent on the use of technology to run its business. Its IT department, like that of many other compa- nies, was isolated from the rest of the business and was regarded as a peripheral entity whose purpose was simply to provide technical support. This was accompanied by actual physical isolation—IT was

 

 

2 INFORMATION TECHNOLOGY

placed in a contained and secure location away from mainstream operations. As a result, IT staff rarely engaged in active discourse with other staff members unless specific meetings were called relat- ing to a particular project. The Ravell IT department, therefore, was not part of the community of organizational learning—it did not have the opportunity to learn along with the rest of the organiza- tion, and it was never asked to provide guidance in matters of gen- eral relevance to the business as a whole. This marginalized status resulted in an us-versus-them attitude on the part of IT and non-IT personnel alike.

Much has been written about the negative impact of marginal- ization on individuals who are part of communities. Schlossberg (1989) researched adults in various settings and how marginal- ization affected their work and self-efficacy. Her theory on mar- ginalization and mattering is applied to this case study because of its relevance and similarity to her prior research. For example, IT represents similar characteristics to a separate group on a college campus or in a workplace environment. Its physical isolation can also be related to how marginalized groups move away from the majority population and function without contact. The IT direc- tor, in particular, had cultivated an adversarial relationship with his peers. The director had shaped a department that fueled his view of separation. This had the effect of further marginalizing the posi- tion of IT within the organization. Hand in hand with this form of separatism came a sense of actual dislike on the part of IT personnel for other employees. IT staff members were quick to point fingers at others and were often noncommunicative with members of other departments within the organization. As a result of this kind of behavior, many departments lost confidence in the ability of IT to provide support; indeed, the quality of support that IT furnished had begun to deteriorate. Many departments at Ravell began to hire their own IT support personnel and were determined to create their own information systems subdepartments. This situation eventually became unacceptable to management, and the IT director was ter- minated. An initiative was begun to refocus the department and its position within the organization. I was retained to bring about this change and to act as the IT director until a structural transforma- tion of the department was complete.

 

 

3the “rAvell” CorporAtIon

A New Approach

My mandate at Ravell was initially unclear—I was to “fix” the problem; the specific solution was left up to me to design and imple- ment. My goal became one of finding a way to integrate IT fully into the organizational culture at Ravell. Without such integration, IT would remain isolated, and no amount of “fixing” around this issue would address the persistence of what was, as well, a cultural prob- lem. Unless IT became a true part of the organization as a whole, the entire IT staff could be replaced without any real change having occurred from the organization’s perspective. That is, just replacing the entire IT staff was an acceptable solution to senior management. The fact that this was acceptable suggested to me that the knowledge and value contained in the IT department did not exist or was mis- understood by the senior management of the firm. In my opinion, just eliminating a marginalized group was not a solution because I expected that such knowledge and value did exist, and that it needed to be investigated properly. Thus, I rejected management’s option and began to formulate a plan to better understand the contributions that could be made by the IT department. The challenge was threefold: to improve the work quality of the IT department (a matter of perfor- mance), to help the department begin to feel itself a part of the orga- nization as a whole and vice versa (a matter of cultural assimilation), and to persuade the rest of the organization to accept the IT staff as equals who could contribute to the overall direction and growth of the organization (a fundamental matter of strategic integration).

My first step was to gather information. On my assignment to the position of IT director, I quickly arranged a meeting with the IT department to determine the status and attitudes of its personnel. The IT staff meeting included the chief financial officer (CFO), to whom IT reported. At this meeting, I explained the reasons behind the changes occurring in IT management. Few questions were asked; as a result, I immediately began scheduling individual meetings with each of the IT employees. These employees varied in terms of their position within the corporate hierarchy, in terms of salary, and in terms of technical expertise. The purpose of the private meetings was to allow IT staff members to speak openly, and to enable me to hear their concerns. I drew on the principles of action science, pioneered

 

 

4 INFORMATION TECHNOLOGY

by Argyris and Schö n (1996), designed to promote individual self- reflection regarding behavior patterns, and to encourage a produc- tive exchange among individuals. Action science encompasses a range of methods to help individuals learn how to be reflective about their actions. By reflecting, individuals can better understand the outcomes of their actions and, especially, how they are seen by others. This was an important approach because I felt learning had to start at the indi- vidual level as opposed to attempting group learning activities. It was my hope that the discussions I orchestrated would lead the IT staff to a better understanding than they had previously shown, not only of the learning process itself, but also of the significance of that process. I pursued these objectives by guiding them to detect problem areas in their work and to undertake a joint effort to correct them (Argyris, 1993; Arnett, 1992).

Important components of reflective learning are single-loop and double-loop learning. Single-loop learning requires individuals to reflect on a prior action or habit that needs to be changed in the future but does not require individuals to change their operational proce- dures with regard to values and norms. Double-loop learning, on the other hand, does require both change in behavior and change in oper- ational procedures. For example, people who engage in double-loop learning may need to adjust how they perform their job, as opposed to just the way they communicate with others, or, as Argyris and Schö n (1996, p. 22) state, “the correction of error requires inquiry through which organizational values and norms themselves are modified.”

Despite my efforts and intentions, not all of the exchanges were destined to be successful. Many of the IT staff members felt that the IT director had been forced out, and that there was consequently no support for the IT function in the organization. There was also clear evidence of internal political division within the IT department; members openly criticized each other. Still other interviews resulted in little communication. This initial response from IT staff was disap- pointing, and I must admit I began to doubt whether these learning methods would be an antidote for the department. Replacing people began to seem more attractive, and I now understood why many man- agers prefer to replace staff, as opposed to investing in their transfor- mation. However, I also knew that learning is a gradual process and that it would take time and trust to see results.

 

 

5the “rAvell” CorporAtIon

I realized that the task ahead called for nothing short of a total cul- tural transformation of the IT organization at Ravell. Members of the IT staff had to become flexible and open if they were to become more trusting of one another and more reflective as a group (Garvin, 2000; Schein, 1992). Furthermore, they had to have an awareness of their history, and they had to be willing to institute a vision of partnering with the user community. An important part of the process for me was to accept the fact that the IT staff were not habitually inclined to be reflective. My goal then was to create an environment that would foster reflective learning, which would in turn enable a change in individual and organizational values and norms (Senge, 1990).

The Blueprint for Integration

Based on information drawn from the interviews, I developed a pre- liminary plan to begin to integrate IT into the day-to-day operations at Ravell, and to bring IT personnel into regular contact with other staff members. According to Senge (1990), the most productive learn- ing occurs when skills are combined in the activities of advocacy and inquiry. My hope was to encourage both among the staff at Ravell. The plan for integration and assimilation involved assigning IT resources to each department; that is, following the logic of the self-dissemina- tion of technology, each department would have its own dedicated IT person to support it. However, just assigning a person was not enough, so I added the commitment to actually relocate an IT person into each physical area. This way, rather than clustering together in an area of their own, IT people would be embedded throughout the organiza- tion, getting first-hand exposure to what other departments did, and learning how to make an immediate contribution to the productiv- ity of these departments. The on-site IT person in each department would have the opportunity to observe problems when they arose— and hence, to seek ways to prevent them—and, significantly, to share in the sense of accomplishment when things went well. To reinforce their commitment to their respective areas, I specified that IT person- nel were to report not only to me but also to the line manager in their respective departments. In addition, these line managers were to have input on the evaluation of IT staff. I saw that making IT staff offi- cially accountable to the departments they worked with was a tangible

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

MIS 2016 – Case Study 01 – Management: Meet The New Mobile Workers

Case Study Questions

 

1.What kinds of applications are described here? What business functions do they support? How do they improve operational efficiency and decision making?

2.Identify the problems that businesses in this case study solved by using mobile digital devices.

3.What kinds of businesses are most likely to benefit from equipping their employees with mobile digital devices such as iPhones and iPads?

4.One company deploying iPhones has said, “The iPhone is not a game changer, it’s an industry changer. It changes the way that you can interact with your customers and with your suppliers.” Discuss the implications of this statement.

Section 1.2, “What is an information system? How does it work? What are its management, organization, and technology components and why are complementary assets essential for ensuring that information systems provide genuine value for organizations?”

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Python API – Weather Py

In this example, you’ll be creating a Python script to visualize the weather of 500+ cities across the world of varying distance from the equator. To accomplish this, you’ll be utilizing a simple Python library, the OpenWeatherMap API, and a little common sense to create a representative model of weather across world cities.

Your first requirement is to create a series of scatter plots to showcase the following relationships:

  • Temperature (F) vs. Latitude
  • Humidity (%) vs. Latitude
  • Cloudiness (%) vs. Latitude
  • Wind Speed (mph) vs. Latitude

After each plot add a sentence or too explaining what the code is and analyzing.

Your second requirement is to run linear regression on each relationship, only this time separating them into Northern Hemisphere (greater than or equal to 0 degrees latitude) and Southern Hemisphere (less than 0 degrees latitude):

  • Northern Hemisphere – Temperature (F) vs. Latitude
  • Southern Hemisphere – Temperature (F) vs. Latitude
  • Northern Hemisphere – Humidity (%) vs. Latitude
  • Southern Hemisphere – Humidity (%) vs. Latitude
  • Northern Hemisphere – Cloudiness (%) vs. Latitude
  • Southern Hemisphere – Cloudiness (%) vs. Latitude
  • Northern Hemisphere – Wind Speed (mph) vs. Latitude
  • Southern Hemisphere – Wind Speed (mph) vs. Latitude

After each pair of plots explain what the linear regression is modeling such as any relationships you notice and any other analysis you may have.

Optional You will be creating multiple linear regression plots. To optimize your code, write a function that creates the linear regression plots.

Your final notebook must:

  • Randomly select at least 500 unique (non-repeat) cities based on latitude and longitude.
  • Perform a weather check on each of the cities using a series of successive API calls.
  • Include a print log of each city as it’s being processed with the city number and city name.
  • Save a CSV of all retrieved data and a PNG image for each scatter plot.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

PHD INTERVIEW QUESTIONS

WRITTEN INTERVIEW QUESTIONS

Doctoral candidates should provide an authentic personal statement to each of the five following questions/prompts reflecting on their own personal interest. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to response to each prompt/question individually for clarity of the reviewer. Writing sample should be submitted in Microsoft Word format and include candidate’s name.

PhD IT

  1. Tell us about yourself and your personal journey that has lead you to University of the Cumberlands.
  2. What are your research interests in the area of information technology? How did you become interested in this area of research?
  3. What is your current job/career and how will this program impact your career growth?
  4. What unique qualities do you think you have that will help you in being successful in this program?
  5. How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC?
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Python API – Weather Py

In this example, you’ll be creating a Python script to visualize the weather of 500+ cities across the world of varying distance from the equator. To accomplish this, you’ll be utilizing a simple Python library, the OpenWeatherMap API, and a little common sense to create a representative model of weather across world cities.

Your first requirement is to create a series of scatter plots to showcase the following relationships:

  • Temperature (F) vs. Latitude
  • Humidity (%) vs. Latitude
  • Cloudiness (%) vs. Latitude
  • Wind Speed (mph) vs. Latitude

After each plot add a sentence or too explaining what the code is and analyzing.

Your second requirement is to run linear regression on each relationship, only this time separating them into Northern Hemisphere (greater than or equal to 0 degrees latitude) and Southern Hemisphere (less than 0 degrees latitude):

  • Northern Hemisphere – Temperature (F) vs. Latitude
  • Southern Hemisphere – Temperature (F) vs. Latitude
  • Northern Hemisphere – Humidity (%) vs. Latitude
  • Southern Hemisphere – Humidity (%) vs. Latitude
  • Northern Hemisphere – Cloudiness (%) vs. Latitude
  • Southern Hemisphere – Cloudiness (%) vs. Latitude
  • Northern Hemisphere – Wind Speed (mph) vs. Latitude
  • Southern Hemisphere – Wind Speed (mph) vs. Latitude

After each pair of plots explain what the linear regression is modeling such as any relationships you notice and any other analysis you may have.

Optional You will be creating multiple linear regression plots. To optimize your code, write a function that creates the linear regression plots.

Your final notebook must:

  • Randomly select at least 500 unique (non-repeat) cities based on latitude and longitude.
  • Perform a weather check on each of the cities using a series of successive API calls.
  • Include a print log of each city as it’s being processed with the city number and city name.
  • Save a CSV of all retrieved data and a PNG image for each scatter plot.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

CS510 Week 2 Assignment

Assignment 1: Error Handling in an Activity Diagram

Refer to the activity diagram Figure 2-15 on page 59 of the textbook. The diagram omits several error-handling pathways.

Write a two to three (2-3) page paper in which you:

  1. Using Microsoft Visio or an open source alternative such as Dia,  update the diagram to include two (2) error-handling pathways. Note: The  graphically depicted solution is not included within the required page  length.
  2. Produce a narrative which describes the added error-handling pathways that includes:
    1. an overview of the errors being checked
    2. an explanation of the main reasons why checking for such errors is important
    3. an overview of other possible errors
  3. Use at least three (3) quality resources outside of the suggested  resources in this assignment. Note: Wikipedia and similar Websites do  not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with  one-inch margins on all sides; citations and references must follow APA  or school-specific format. Check with your professor for any additional  instructions.
  • Include a cover page containing the title of the assignment, your  name, the professor’s name, the course title, and the date. The cover  page and the reference page are not included in the required assignment  page length.
  • Include charts or diagrams created in Visio or an open source  alternative such as Dia. The completed diagrams / charts must be  imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Analyze techniques for requirements determination, collection, and organization.
  • Use technology and information resources to research issues in systems analysis and design.
  • Write clearly and concisely about advanced systems analysis and  design topics using proper writing mechanics and technical style  conventions.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

LABSIMS

Need 2 labs completed, the first sooner as soon as possible and the second by April 30th

ITCO101  Unit 1 Lab

 

Introduction LabSim PC Pro is used to provide a simulated, hands-on laboratory for the purposes of learning about important hardware and software concepts.  In an online environment it is impossible for students to work directly with hardware or software in administrative scenarios.  Therefore, LabSim is the tool that supports students in their pursuit to understand difficult concepts in an online environment.

Use of LabSim PC Pro requires a one-time registration process. You should have received an activation code from the bookstore (Words of Wisdom). Notify the bookstore immediately if you have not yet received your activation code. Contact them at aiuonlinebooks@wordsofwisdombooks.com.

Instructions for accessing LabSim can be found in the Course Materials section. You can also contact your instructor with any questions. You will have access to PC Pro for 36 months (3 years) from the date of registration.

Note that LabSim PC Pro is aligned with CompTIA’s A+ certification. Completing this lab will not qualify you to complete the exam. One must complete several courses in order to cover all the concepts included in the certification exam. Further, completing the coursework does not conclude with automatic certification. Those students who wish to pursue certification may do so outside the classroom. For those students that qualify, they may contact the Registrar’s office for receipt of a discounted certification voucher honored by CompTIA.

Hardware Requirements:  Refer here to verify that you meet the necessary Hardware Requirements. Note that you will need speakers.

Expected Time for Completion:  Eight (8) hours or more depending on time necessary to familiarize yourself with tool and the particular Sections you choose to complete. You may complete the tasks in numerous iterations. You do not need to complete all the lab tasks in one sitting.

Lab Description Upon completion, you will:

 navigate LabSim modules;  experience and utilize a variety of learning tools including videos, Fact sheets, images, etc.;  interact with hardware and software in a simulated environment;  describe the various types of computer system components;  install various components including power supplies, motherboards, processors, memory, BIOS/UEFI, expansion cards, video cards, and sound cards .

 

Lab Tasks Each module contains numerous Sections. Each section contains sub-sections. The last sub-section contains Practice Questions related to the topic of that sub-section. The Practice Questions are not required. Completing the Practice Questions are optional. The results of the Practice Questions do not impact your course grade one way or the other.

Module 1.0 Computing Overview

Complete the following three sections and the specified sub-sections to become familiar with the LabSim environment and basic computer hardware. For example, for section 1.2, complete sub-sections  1.2.1, 1.2.2, 1.2.3, 1.2.4.

 

Section 1.1 Course Introduction

Section 1.2 Using the Simulator (Review demos and complete simulations: Sections 1.2.1, 1.2.2, 1.2.3, 1.2.4)

Section 1.3 Hardware Basics (Review videos and complete simulation: Sections 1.3.1, 1.3.3, 1.3.6, 1.3.7)

Module 3.0 System Components

Below are numerous sections covering System Components. Many of these sections include handson simulations. You may complete any or all of these sections. You are required to choose seven sections, at a minimum. For example, you may choose Section 3.1, Section 3.2, Section 3.3, Section 3.5, Section 3.7, Section 3.8, and Section 3.14. Again, choose what is of interest to you.  Review all videos, demos and simulations included in your chosen sections.

You are required to choose and complete seven sections only. But you may choose to complete anywhere from seven sections to all the sections, depending upon your time availability.  Note that you are permitted to return to this module at any time throughout the course and the program if you wish to complete more than your chosen sections required for this assignment. However, the grade for this will be determined based upon the chosen sections completed during Unit 1.

 

Section 3.1 Cases and Form Factors (Review video only: Section 3.1.1)

Section 3.2 Power Supplies (Review videos and complete simulation:  Sections 3.2.1, 3.2.3, 3.2.4, 3.2.5)

Section 3.3 Motherboards and Buses (Review videos and simulation: Sections 3.3.1, 3.3.3, 3.3.5)

Section 3.5 Processors (Review video, demo and simulations: Sections 3.5.1, 3.5.5, 3.5.7, 3.5.8)

Section 3.7 Memory (Review videos and RAM Facts: Sections 3.7.1, 3.7.2, 3.7.4)

Section 3.8 Memory Installation (Review video, demos, and complete simulations: Sections 3.8.1, 3.8.3, 3.8.4, 3.8.5, 3.8.7)

Section 3.10 BIOS/UEFI (Review videos, demos, and complete simulations: Sections 3.10.1, 3.10.2, 3.10.4, 3.10.5, 3.10.6, 3.10.7, 3.10.8)

Section 3.11 Expansion Cards (Review videos and complete simulation: Sections 3.11.1, 3.11.3, 3.11.4)

Section 3.12 Video (Review video, demo and complete simulation: Sections 3.12.1, 3.12.3, 3.12.5)

Section 3.13 Audio (Review videos, demo and complete simulation: Sections 3.13.1, 3.13.2, 3.13.4, 3.13.7)

Section 3.14 Cooling (Review video: Section 3.14.1)

The above Sections include the following hands-on simulations.

1.2.2 Explore the Lab Interface 1.2.4 Connect Internal Components 1.3.6 Set Up a Computer

3.2.5 Install a Power Supply 3.3.5 Choose and Install a Motherboard 3.5.7 Select and Install a Processor 1 3.5.8 Select and Install a Processor 2 3.8.3 Select Memory by Sight 3.8.7 Install Triple Channel Memory 3.10.7 Find BIOS/UEFI Settings 3.10.8 Clear CMOS Settings 3.11.4 Install Expansion Cards 3.12.5 Upgrade a Video Card 3.13.7 Select and Install a Sound Card

A word document goes with it

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!