CSIS 325 Final Exam (2019)

IMPORTANT: AFTER PURCHASE, LOG IN TO YOUR ACCOUNT AND SCROLL DOWN BELOW THIS PAGE TO DOWNLOAD FILES WITH ANSWERS.

Question 1   Use the following tables to answer the question below

Given the following Access SQL   SELECT statement:

SELECT eventplan.eventno,   eventrequest.datereq, dateauth, planno,workdate, empname

FROM (EventRequest INNER JOIN   EventPlan

ON EventRequest.eventno =   EventPlan.eventno)

LEFT JOIN employee ON   EventPlan.empno = employee.empno

WHERE eventrequest.datereq   BETWEEN #7/1/2007# AND #7/31/2007#

AND dateauth BETWEEN #7/1/2007#   AND #7/31/2007# AND status = “Approved”;

The   meaning of the SELECT statement is

Question 2 The following table represents what type of operation that has been performed   on STUDENT_1 and STUDENT_2 tables?

Question 3 A table that satisfies 2NF:

Question 4 Use the following table definitions to answer the question   below.

customer(custno, name, address, city, state, zip, phone, income)

asset(assetno, assetdesc, assettype)

service(servno, servdesc, servrate)

employee(empno, empname, emptitle)

pricehistory(assetnodate, price)

FOREIGN KEY assetno REFERENCES   asset

charge(chargenocustnoservno, starttime, endtime, empno, billed, amtpaid)

FOREIGN KEY custno REFERENCES   customer

FOREIGN KEY servno REFERENCES   service

FOREIGN KEY empno REFERENCES   employee

holding(custnoassetno, qty)

FOREIGN KEY custno REFERENCES   customer

FOREIGN KEY assetno REFERENCES   asset

trade(tradenocustnoassetno, qty, price, date, type, status)

FOREIGN KEY custno REFERENCES   customer

FOREIGN KEY assetno REFERENCES   asset

What table contains a combined   primary key that represents a M-N relationship?

Question 5 Use the following tables to answer the question below

Given   the following Access SQL SELECT statement:

SELECT eventrequest.eventno,   custname, contact, dateauth

FROM eventrequest, customer

WHERE eventrequest.custno =   customer.custno AND status = “Approved”

AND eventno NOT IN

( SELECT eventno FROM eventplan

WHERE workdate BETWEEN   #10/1/2007# AND #10/31/2007#)

The SELECT statement

 

Question 6 Use the following tables to answer the question below

To load   the tables from text files, which load order will NOT cause a violation of   referential integrity

 

Question 7 Use the following tables to answer the question below

Given the following Access SQL   SELECT statement:

SELECT eventplan.eventno,   eventrequest.datereq, dateauth, planno, workdate, empname

FROM (EventRequest INNER JOIN   EventPlan

ON EventRequest.eventno =   EventPlan.eventno)

LEFT JOIN employee ON   EventPlan.empno = employee.empno

WHERE eventrequest.datereq   BETWEEN #7/1/2007# AND #7/31/2007#

AND dateauth BETWEEN #7/1/2007#   AND #7/31/2007# AND status = “Approved”;

The   FROM clause of the SELECT statement

Question 8 Which table below is union compatible with the Student_1 and Student_2 tables?

Question 9

CUSTOMER (primary key = CID)

RENTALS (primary key = RTN)

In the table RENTALS, RTN   provides the rental number (it is the primary key), CID refers to the CID in   CUSTOMER, PICKUP is the city where the car was (or will be) picked up and   Return is the city where the car was (or will be) returned, VIN is a foreign   key that references the table CAR. The rental company has two branches, one   in San Diego (SD) and one in Los Angeles (LA). Cars are picked up and   returned by the customers at these two locations.

RENTCOST

In RENTCOST, COST shows the   base cost of renting a given MAKE for one day.

CAR

The table CAR (primary key =   VIN) provides information about each car, in particular if it is currently   rented, and where its usual storage location is (attribute AT).

CREATE VIEW CUST_SD AS

SELECT * FROM CUSTOMER

WHERE Cregion = ‘SD’

CREATE VIEW CUST_40D AS

SELECT CNAME, RENTALS.MAKE,   RENTCOST.COST

FROM CUSTOMER, RENTALS,   RENTCOST

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.MAKE =   RENTCOST.MAKE

AND RENTCOST < 40

CREATE VIEW Make_View (Make,   NumRentals, Cregion, Storageat) AS

SELECT RENTALS.MAKE, Count   (RTN), Cregion, AT

FROM CUSTOMER, RENTALS, CAR

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.VIN = CAR.VIN

GROUP BY RENTALS.MAKE, Cregion,   At

The maximum value in the column   Storageat of the view Make_View is:

 

Question 10 The following SQL query is an   example of a _____________________ join.

SELECT   FacNo, FacFirstName, FacLastName, FacSalary, StdNo

FROM Faculty RIGHT JOIN Student

ON Student.StdNo =   Faculty.FacNo

Question 11 The following SQL query is an   example of a _____________________ join.

SELECT FacNo, FacFirstName,   FacLastName, FacSalary, StdNo

FROM Faculty LEFT JOIN Student

ON Student.StdNo = Faculty.FacNo

 

Question 12 A table that satisfies BCNF:

 

Question 13 Use the following tables to answer the question below

List   the event number, customer name, plan number, employee name, facility name,   work date, and activity for event plans.  The result should show only   event plans with a work date in October 2007.
How   many tables appear in the FROM clause assuming that no nested queries are   used?

 

Question 14

CUSTOMER (primary key = CID)

RENTALS   (primary key = RTN)

In the table RENTALS, RTN   provides the rental number (it is the primary key), CID refers to the CID in   CUSTOMER, PICKUP is the city where the car was (or will be) picked up and   Return is the city where the car was (or will be) returned, VIN is a foreign   key that references the table CAR. The rental company has two branches, one   in San Diego (SD) and one in Los Angeles (LA). Cars are picked up and   returned by the customers at these two locations.

RENTCOST

In RENTCOST, COST shows the   base cost of renting a given MAKE for one day.

CAR

The table CAR (primary key =   VIN) provides information about each car, in particular if it is currently   rented, and where its usual storage location is (attribute AT).
CREATE   VIEW CUST_SD AS

SELECT * FROM CUSTOMER

WHERE Cregion = ‘SD’

CREATE VIEW CUST_40D AS

SELECT CNAME, RENTALS.MAKE,   RENTCOST.COST

FROM CUSTOMER, RENTALS,   RENTCOST

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.MAKE =   RENTCOST.MAKE

AND RENTCOST < 40

CREATE VIEW Make_View (Make,   NumRentals, Cregion, Storageat) AS

SELECT RENTALS.MAKE, Count   (RTN), Cregion, AT

FROM CUSTOMER, RENTALS, CAR

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.VIN = CAR.VIN

GROUP BY RENTALS.MAKE, Cregion,   At

There   is a request to execute the two following SQL commands in the order shown:

CREATE VIEW CUST1 AS

SELECT CNAME, AGE FROM CUSTOMER

UPDATE CUST_SD

SET AGE = AGE +1

Select   the most appropriate statement:

 

Question 15 After execution of this SQL   query

SELECT CID, CName

FROM  Customer

WHERE  (SELECT COUNT(*)   FROM Rentals WHERE Customer.CID = Rentals.CID) = 0

The   execution of this query produces the following number of rows:

Question 16 The entity integrity rule

Question 17 The following SQL query is an   example of a _____________________ join.

SELECT   FacNo, FacFirstName, FacLastName, FacSalary, StdNo

FROM Faculty, Student

WHERE Student.StdNo =   Faculty.FacNo

Question 18 A table in 1NF in which the unique   candidate key consists of two of its three attributes:

Question 19 Use the following tables to answer the question below

Null   values in the column EventRequest.DateAuth represent

 

Question 20 Use the following tables to answer the question below The   combination of columns, EventPlan.PlanNo and EventPlan.EventNo, is a

Question 21 Given the following query:

SELECT CID FROM Customer

WHERE CID IN(SELECT DISTINCT   CID FROM Rentals WHERE Make = ‘FORD’)

The meaning of this query is   the following:

 

Question 22 Use the following tables to answer the question below

Using the tables listed above,   a natural join of the EventPlanLine and Location tables contains how many   rows?

 

Question 23 What query produces the same   results as the one below?

SELECT Student.StdNo,   Student.StdFirstName, Student.StdLastName, Student.StdMajor

FROM Student

WHERE EXISTS (SELECT * FROM   Enrollment

WHERE Enrollment.StdNo =    Student.StdNo )

 

Question 24 What field is redundant in the   Rentals table?

Question 25 For a violation of 2NF to occur in   a table in 1NF, the following condition(s) must exist:

CUSTOMER (primary key = CID)

RENTALS (primary key = RTN)

In the table RENTALS, RTN   provides the rental number (it is the primary key), CID refers to the CID in   CUSTOMER, PICKUP is the city where the car was (or will be) picked up and   Return is the city where the car was (or will be) returned, VIN is a foreign   key that references the table CAR. The rental company has two branches, one   in San Diego (SD) and one in Los Angeles (LA). Cars are picked up and   returned by the customers at these two locations.

RENTCOST

In RENTCOST, COST shows the   base cost of renting a given MAKE for one day.

CAR

The   table CAR (primary key = VIN) provides information about each car, in   particular if it is currently rented, and where its usual storage location is   (attribute AT).

CREATE VIEW CUST_SD AS

SELECT * FROM CUSTOMER

WHERE Cregion = ‘SD’
CREATE VIEW   CUST_40D AS

SELECT CNAME, RENTALS.MAKE,   RENTCOST.COST

FROM CUSTOMER, RENTALS,   RENTCOST

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.MAKE =   RENTCOST.MAKE

AND RENTCOST < 40

CREATE   VIEW Make_View (Make, NumRentals, Cregion, Storageat) AS

SELECT RENTALS.MAKE, Count   (RTN), Cregion, AT

FROM CUSTOMER, RENTALS, CAR

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.VIN = CAR.VIN

GROUP BY RENTALS.MAKE, Cregion,   At

SELECT * FROM CUST_SD

WHERE AGE < 25

The   number of rows displayed by this SELECT statement is:

Question 27 Under the MapReduce model,   the data processing primitives are called

Question 28

Use the following table definitions to answer the question   below.

customer(custno, name, address, city, state, zip, phone, income)

asset(assetno, assetdesc, assettype)

service(servno, servdesc, servrate)

employee(empno, empname, emptitle)

pricehistory(assetnodate, price)

FOREIGN KEY assetno REFERENCES   asset

charge(chargenocustnoservno, starttime, endtime, empno, billed, amtpaid)

FOREIGN KEY custno REFERENCES   customer

FOREIGN KEY servno REFERENCES   service

FOREIGN KEY empno REFERENCES   employee
holding(custnoassetno, qty)

FOREIGN KEY custno REFERENCES   customer

FOREIGN KEY assetno REFERENCES   asset

trade(tradenocustnoassetno, qty, price, date, type, status)

FOREIGN KEY custno REFERENCES   customer

FOREIGN KEY assetno REFERENCES   asset

Null values in the column   Charge.EmpNo represent

Question 29

After execution of this SQL   query

SELECT Customer.CName, SUM(Cost   * Days) AS TotalCost

FROM Customer, Rentals,   Rentcost

WHERE Customer.CID =   Rentals.CID

AND Rentals.Make =   RentCost.Make

AND Rentals.Make = ‘FORD’

GROUP BY CNAME

The   execution of this query lists the following TotalCost:

Question 30

CUSTOMER (primary key = CID)

RENTALS (primary key = RTN)

In the table RENTALS, RTN   provides the rental number (it is the primary key), CID refers to the CID in   CUSTOMER, PICKUP is the city where the car was (or will be) picked up and   Return is the city where the car was (or will be) returned, VIN is a foreign   key that references the table CAR. The rental company has two branches, one   in San Diego (SD) and one in Los Angeles (LA). Cars are picked up and   returned by the customers at these two locations.

RENTCOST

In RENTCOST, COST shows the   base cost of renting a given MAKE for one day.

CAR

The table CAR (primary key =   VIN) provides information about each car, in particular if it is currently   rented, and where its usual storage location is (attribute AT).

CREATE VIEW CUST_SD AS

SELECT * FROM CUSTOMER

WHERE Cregion = ‘SD’

CREATE   VIEW CUST_40D AS

SELECT CNAME, RENTALS.MAKE,   RENTCOST.COST

FROM CUSTOMER, RENTALS,   RENTCOST

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.MAKE =   RENTCOST.MAKE

AND RENTCOST < 40

CREATE VIEW Make_View (Make,   NumRentals, Cregion, Storageat) AS

SELECT RENTALS.MAKE, Count   (RTN), Cregion, AT

FROM CUSTOMER, RENTALS, CAR

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.VIN = CAR.VIN

GROUP BY RENTALS.MAKE, Cregion,   At

The   view Make-View provides the following information:

Question 31 Which of the following will   usually not result in a faster execution of an SQL query?

Question 32 Since the objective of   physical database design is to minimize the combined demand of all   applications using the database, it is usually necessary to balance the   sometimes conflicting needs of both retrieval and update applications.

Question 33 Which of the following is not   a good candidate for a clustering index?

Question 34 The storage level is close   to:

Question 35 When a logical record   requested by an application is already in memory, which of the following is   not true?

Question 36 After the crash of a disk   containing the database, which of the following tools will need to be used   for recovery?

Question 37 An operating system failure   affects all active transactions, while a device failure affects all active   transactions plus all committed transactions that have been recorded on the   disk that failed.

Question 38 It is possible to detect   deadlocks in a database system by doing the following:

Question 39 Which one of the following   isolation levels does not prevent the uncommitted dependency problem?

Question 40 The redo operation:

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

9-1 Final Project Submission: Security Awareness Program Proposal

PROJECT PROPOSAL 1

PROJECT PROPOSAL 3

Security Awareness Program Proposal

Chaston Carter

Human Factors in Security

02/25/17

Security Awareness Program Proposal

In light of my recent move to an organization without a security awareness program, as a chief information security information officer. I have been tasked with drawing a proposal for this organization. The need for this proposal is to implement organizational threats, and a protection awareness program with the potential to help this organization with the appropriate network and IT-enabled devices and security practices. As well, as the need for this proposal is for the identification of likely vulnerabilities of the organization’s system. The overall purpose of this proposal is to address the company’s CEO’s concerns about risks that may be brought about by a breach of the company’s system security.

Based on the above introductory statements, this proposal seeks to highlight on security postures to be addressed by the security awareness program proposal. Likewise, the paper will assess human factors contribution and associated factors within an organization that contributes to the status of security posture. To begin with, security posture refers to an overall plan for system security of an organizational. This is usually from the planning to the implementation stages which comprise of non-technical and technical controls, policies and procedures. Usually, security postures are meant to address policies, communication, user awareness, training, risk assessment, and controls within management practices in an organization’s system security.

With this in mind, the proposal seeks to ratify a security model that conforms to next generation technology. This is a view of addressing threats that may come by in the future at elevated levels. Additionally, based on security posture the proposal seeks to align initiatives towards security on the requirements of the organization. Likewise, the need to develop a culture of security accountability and inclusion will be drafted. Moreover, this model will include other factors that are often overlooked such as time, resources and the human element. Nevertheless, the major concentration will be on the human element.

The human element is a phenomenal threat to an organization’s system security. This may be through mistakes or lack of an understanding by the employees of their role in supporting security procedures and processes. In this light, this proposal seeks to recommend a model for analyzing the role of human factors in an organization’s security. This is for the use of the goal-driven risk management and force field analysis methods of human factor analysis. Likewise, the proposal will offer more insight on how changing behaviors, attitudes, and beliefs of employees may improve the security posture of an organization’s information system. As well, the proposal will highlight the importance of information sharing and effective training programs whose aim is in reducing the risk of lack of understanding and human error in an organization’s information security.

However, despite looking at the human factor, this proposal seeks to reflect at other aspects within the organization that has a contribution to security posture. This is beyond the scope of social and human elements. These factors are organizational policies, organizational culture, and management philosophy which expediently play a huge role in shaping the security posture of an organization’s security posture.

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

C10; Introduction To Computers Assignment 8; Business Consulting

C10; Introduction to Computers Assignment 8; Business Consulting

C10; Introduction to Computers
Assignment 8; Business Consulting
Remember Bill? He was the gentleman that you helped to start up his business in week 4. Well his business is doing well, but he has come to you with some questions and concerns. You discuss each of these with Bill and promise to send him a written report with your suggestions and recommendations. Submit your written response to Bill’s questions and concerns below.
1. Bill has set up a spreadsheet in Excel that will help him keep track of expenses. So far, he has this:

Tell Bill how to do the following tasks:
• What formula or function does he put in Column F that will show the total expenses for each day?
• What formula or function does he put in columns B through F in Row 13 that will give him the total expenses for the week in each category?
• Bill wants the entry in Column G to remind him of expenses that require receipts for the accountant. Tell Bill what to put in Column G to do this:
a. Print the word “Yes” in any row where the total daily expenses are greater than or equal to $100.00.
b. If the daily expenses total is less than $100.00, leave the Column G entry for that row blank.
2. Bill’s business is already expanding. He thinks that in a few weeks, he will need to hire one or two employees to help him. He knows that each new employee will need their own computer. He is also making the necessary changes so that the new employees will be working in a spare room in Bill’s house. Explain to Bill what networking options he has. Go through each type or configuration of network possible for him, making sure that you explain the pros and cons of each configuration. Finish with your suggestion for the network that he should set up and explain what new hardware will be required to do this.
3. With the possibility of three business computers in his home, and all of his business records possibly vulnerable, this would be a good time to advise Bill on how to set up a routine plan to protect and defend his new network. Provide a list of the five most important concerns for safety and security of the network and the computers in the network. For each concern, specify the action to be taken, and if applicable, what software you recommend be added to the system. Justify each of your recommendations.

Your proposal will be evaluated using the rubric below. Make sure you read the rubric and have a clear idea of what is expected. If there are any additional questions that you would have asked Bill be sure to note them as you explain to Bill what networking options he has so that you can explain what additional information could change your suggestion if any.
?
Rubric

Print this page

Format Requirements
Use the following format requirements on all submissions.
Writing Style APA (American Psychological Association)

Note: To find detailed information on APA manuscript style guidelines on the Internet, go to www.apastyle.org.

Margins 1” all sides

Paragraphs Single-space
Double-space between paragraphs
Indent first line of each paragraph

Headings Bold

Type Style and Size Times New Roman, 12 point

Software MS Word
Student/Assignment Information
The following information should be on the first page on the top left side of the page in the format provided below. Do not provide a cover sheet (unless the assignment requires one).
Student Name

Student Identification Number

Course Number and Title

Assignment Number and Title

Date of Submission

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Cs 300 Help

i have a texst due on the 11th half of it is done here are the articles the test is on, attached is the test

 

1.  http://www.cs.ucdavis.edu/~rogaway/classes/188/materials/postman.pdf

2.  http://www.theatlantic.com/business/archive/2012/07/the-social-century-100-years-of-talking-watching-reading-and-writing-in-america/260372/

3.  http://www.nytimes.com/2005/04/03/magazine/03DOMINANCE.html?_r=0

4.  http://www.nybooks.com/articles/archives/2011/aug/18/how-google-dominates-us/

5.  http://www.technologyreview.com/featuredstory/428150/what-facebook-knows/

6.  The decision lens by helen knight ( cannot find a link)

7.  http://www.technologyreview.com/news/427156/beyond-credit-cards-qa-with-dan-schulman-of-american-express/

8.  http://online.wsj.com/news/articles/SB10000872396390443517104577575454164490344

9.  http://www.americanscientist.org/issues/pub/automation-on-the-job

10.  http://www.fastcompany.com/1826869/lost-steve-jobs-tapes

11.  http://www.irma-international.org/viewtitle/12910/

12.  http://www.newyorker.com/magazine/2010/10/04/small-change-3

13.  https://wiki.uiowa.edu/download/attachments/49481240/Virtual_society.pdf

14.  http://www.apa.org/monitor/2012/02/friends.aspx

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Linear Development In Learning Approaches.

Information Technology and Organizational

Learning Managing Behavioral Change

in the Digital Age Third Edition

 

 

Information Technology and Organizational

Learning Managing Behavioral Change

in the Digital Age Third Edition

Arthur M. Langer

 

 

CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742

© 2018 by Taylor & Francis Group, LLC

CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

Printed on acid-free paper

International Standard Book Number-13: 978-1-4987-7575-5 (Paperback) International Standard Book Number-13: 978-1-138-23858-9 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information stor- age or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.copy- right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.

Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com

and the CRC Press Web site at http://www.crcpress.com

 

 

v

Contents

Foreword xi Acknowledgments xiii Author xv IntroductIon xvii

chApter 1 the “rAvell” corporAtIon 1 Introduction 1 A New Approach 3

The Blueprint for Integration 5 Enlisting Support 6 Assessing Progress 7

Resistance in the Ranks 8 Line Management to the Rescue 8 IT Begins to Reflect 9 Defining an Identity for Information Technology 10 Implementing the Integration: A Move toward Trust and Reflection 12 Key Lessons 14

Defining Reflection and Learning for an Organization 14 Working toward a Clear Goal 15 Commitment to Quality 15 Teaching Staff “Not to Know” 16 Transformation of Culture 16

Alignment with Administrative Departments 17 Conclusion 19

 

 

vi Contents

chApter 2 the It dIlemmA 21 Introduction 21 Recent Background 23 IT in the Organizational Context 24 IT and Organizational Structure 24 The Role of IT in Business Strategy 25 Ways of Evaluating IT 27 Executive Knowledge and Management of IT 28 IT: A View from the Top 29

Section 1: Chief Executive Perception of the Role of IT 32 Section 2: Management and Strategic Issues 34 Section 3: Measuring IT Performance and Activities 35 General Results 36

Defining the IT Dilemma 36 Recent Developments in Operational Excellence 38

chApter 3 technology As A vArIAble And responsIve orgAnIzAtIonAl dynAmIsm 41 Introduction 41 Technological Dynamism 41 Responsive Organizational Dynamism 42

Strategic Integration 43 Summary 48

Cultural Assimilation 48 IT Organization Communications with “ Others” 49 Movement of Traditional IT Staff 49 Summary 51

Technology Business Cycle 52 Feasibility 53 Measurement 53 Planning 54 Implementation 55 Evolution 57 Drivers and Supporters 58

Santander versus Citibank 60 Information Technology Roles and Responsibilities 60 Replacement or Outsource 61

chApter 4 orgAnIzAtIonAl leArnIng theorIes And technology 63 Introduction 63 Learning Organizations 72 Communities of Practice 75 Learning Preferences and Experiential Learning 83 Social Discourse and the Use of Language 89

Identity 91 Skills 92

 

 

viiContents

Emotion 92 Linear Development in Learning Approaches 96

chApter 5 mAnAgIng orgAnIzAtIonAl leArnIng And technology 109 The Role of Line Management 109

Line Managers 111 First-Line Managers 111 Supervisor 111

Management Vectors 112 Knowledge Management 116 Ch ange Management 120 Change Management for IT Organizations 123 Social Networks and Information Technology 134

chApter 6 orgAnIzAtIonAl trAnsFormAtIon And the bAlAnced scorecArd 139 Introduction 139 Methods of Ongoing Evaluation 146 Balanced Scorecards and Discourse 156 Knowledge Creation, Culture, and Strategy 158

chApter 7 vIrtuAl teAms And outsourcIng 163 Introduction 163 Status of Virtual Teams 165 Management Considerations 166 Dealing with Multiple Locations 166

Externalization 169 Internalization 171 Combination 171 Socialization 172 Externalization Dynamism 172 Internalization Dynamism 173 Combination Dynamism 173 Socialization Dynamism 173

Dealing with Multiple Locations and Outsourcing 177 Revisiting Social Discourse 178 Identity 179 Skills 180 Emotion 181

chApter 8 synergIstIc unIon oF It And orgAnIzAtIonAl leArnIng 187 Introduction 187 Siemens AG 187

Aftermath 202 ICAP 203

 

 

viii Contents

Five Years Later 224 HTC 225

IT History at HTC 226 Interactions of the CEO 227 The Process 228 Transformation from the Transition 229 Five Years Later 231

Summary 233

chApter 9 FormIng A cyber securIty culture 239 Introduction 239 History 239 Talking to the Board 241 Establishing a Security Culture 241 Understanding What It Means to be Compromised 242 Cyber Security Dynamism and Responsive Organizational Dynamism 242 Cyber Strategic Integration 243 Cyber Cultural Assimilation 245 Summary 246 Organizational Learning and Application Development 246 Cyber Security Risk 247 Risk Responsibility 248 Driver /Supporter Implications 250

chApter 10 dIgItAl trAnsFormAtIon And chAnges In consumer behAvIor 251 Introduction 251 Requirements without Users and without Input 254 Concepts of the S-Curve and Digital Transformation Analysis and Design 258 Organizational Learning and the S-Curve 260 Communities of Practice 261 The IT Leader in the Digital Transformation Era 262 How Technology Disrupts Firms and Industries 264

Dynamism and Digital Disruption 264 Critical Components of “ Digital” Organization 265 Assimilating Digital Technology Operationally and Culturally 267 Conclusion 268

chApter 11 IntegrAtIng generAtIon y employees to AccelerAte competItIve AdvAntAge 269 Introduction 269 The Employment Challenge in the Digital Era 270 Gen Y Population Attributes 272 Advantages of Employing Millennials to Support Digital Transformation 272 Integration of Gen Y with Baby Boomers and Gen X 273

 

 

ixContents

Designing the Digital Enterprise 274 Assimilating Gen Y Talent from Underserved and Socially Excluded Populations 276 Langer Workforce Maturity Arc 277

Theoretical Constructs of the LWMA 278 The LWMA and Action Research 281

Implications for New Pathways for Digital Talent 282 Demographic Shifts in Talent Resources 282 Economic Sustainability 283 Integration and Trust 283

Global Implications for Sources of Talent 284 Conclusion 284

chApter 12 towArd best prActIces 287 Introduction 287 Chief IT Executive 288 Definitions of Maturity Stages and Dimension Variables in the Chief IT Executive Best Practices Arc 297

Maturity Stages 297 Performance Dimensions 298

Chief Executive Officer 299 CIO Direct Reporting to the CEO 305 Outsourcing 306 Centralization versus Decentralization of IT 306 CIO Needs Advanced Degrees 307 Need for Standards 307 Risk Management 307

The CEO Best Practices Technology Arc 313 Definitions of Maturity Stages and Dimension Variables in the CEO Technology Best Practices Arc 314

Maturity Stages 314 Performance Dimensions 315

Middle Management 316 The Middle Management Best Practices Technology Arc 323

Definitions of Maturity Stages and Dimension Variables in the Middle Manager Best Practices Arc 325

Maturity Stages 325 Performance Dimensions 326

Summary 327 Ethics and Maturity 333

chApter 13 conclusIons 339 Introduction 339

glossAry 357 reFerences 363 Index 373

 

 

xi

Foreword

Digital technologies are transforming the global economy. Increasingly, firms and other organizations are assessing their opportunities, develop- ing and delivering products and services, and interacting with custom- ers and other stakeholders digitally. Established companies recognize that digital technologies can help them operate their businesses with greater speed and lower costs and, in many cases, offer their custom- ers opportunities to co-design and co-produce products and services. Many start-up companies use digital technologies to develop new prod- ucts and business models that disrupt the present way of doing busi- ness, taking customers away from firms that cannot change and adapt. In recent years, digital technology and new business models have dis- rupted one industry after another, and these developments are rapidly transforming how people communicate, learn, and work.

Against this backdrop, the third edition of Arthur Langer’ s Information Technology and Organizational Learning is most welcome. For decades, Langer has been studying how firms adapt to new or changing conditions by increasing their ability to incorporate and use advanced information technologies. Most organizations do not adopt new technology easily or readily. Organizational inertia and embed- ded legacy systems are powerful forces working against the adoption of new technology, even when the advantages of improved technology are recognized. Investing in new technology is costly, and it requires

 

 

xii Foreword

aligning technology with business strategies and transforming cor- porate cultures so that organization members use the technology to become more productive.

Information Technology and Organizational Learning addresses these important issues— and much more. There are four features of the new edition that I would like to draw attention to that, I believe, make this a valuable book. First, Langer adopts a behavioral perspective rather than a technical perspective. Instead of simply offering norma- tive advice about technology adoption, he shows how sound learn- ing theory and principles can be used to incorporate technology into the organization. His discussion ranges across the dynamic learning organization, knowledge management, change management, com- munities of practice, and virtual teams. Second, he shows how an organization can move beyond technology alignment to true technol- ogy integration. Part of this process involves redefining the traditional support role of the IT department to a leadership role in which IT helps to drive business strategy through a technology-based learn- ing organization. Third, the book contains case studies that make the material come alive. The book begins with a comprehensive real-life case that sets the stage for the issues to be resolved, and smaller case illustrations are sprinkled throughout the chapters, to make concepts and techniques easily understandable. Lastly, Langer has a wealth of experience that he brings to his book. He spent more than 25 years as an IT consultant and is the founder of the Center for Technology Management at Columbia University, where he directs certificate and executive programs on various aspects of technology innovation and management. He has organized a vast professional network of tech- nology executives whose companies serve as learning laboratories for his students and research. When you read the book, the knowledge and insight gained from these experiences is readily apparent.

If you are an IT professional, Information Technology and Organi­ zational Learning should be required reading. However, anyone who is part of a firm or agency that wants to capitalize on the opportunities provided by digital technology will benefit from reading the book.

Charles C. Snow Professor Emeritus, Penn State University

Co­Editor, Journal of Organization Design

 

 

xiii

Acknowledgments

Many colleagues and clients have provided significant support during the development of the third edition of Information Technology and Organizational Learning.

I owe much to my colleagues at Teachers College, namely, Professor Victoria Marsick and Lyle Yorks, who guided me on many of the the- ories on organizational learning, and Professor Lee Knefelkamp, for her ongoing mentorship on adult learning and developmental theo- ries. Professor David Thomas from the Harvard Business School also provided valuable direction on the complex issues surrounding diver- sity, and its importance in workforce development.

I appreciate the corporate executives who agreed to participate in the studies that allowed me to apply learning theories to actual organizational practices. Stephen McDermott from ICAP provided invaluable input on how chief executive officers (CEOs) can success- fully learn to manage emerging technologies. Dana Deasy, now global chief information officer (CIO) of JP Morgan Chase, contributed enormous information on how corporate CIOs can integrate tech- nology into business strategy. Lynn O’ Connor Vos, CEO of Grey Healthcare, also showed me how technology can produce direct mon- etary returns, especially when the CEO is actively involved.

And, of course, thank you to my wonderful students at Columbia University. They continue to be at the core of my inspiration and love for writing, teaching, and scholarly research.

 

 

xv

Author

Arthur M. Langer, EdD, is professor of professional practice of management and the director of the Center for Technology Management at Columbia University. He is the academic direc- tor of the Executive Masters of Science program in Technology Management, vice chair of faculty and executive advisor to the dean at the School of Professional Studies and is on the faculty of the Department of Organization and Leadership at the Graduate School of Education (Teachers College). He has also served as a member of the Columbia University Faculty Senate. Dr. Langer is the author of Guide to Software Development: Designing & Managing the Life Cycle. 2nd Edition (2016), Strategic IT: Best Practices for Managers and Executives (2013 with Lyle Yorks), Information Technology and Organizational Learning (2011), Analysis and Design of Information Systems (2007), Applied Ecommerce (2002), and The Art of Analysis (1997), and has numerous published articles and papers, relating to digital transformation, service learning for underserved popula- tions, IT organizational integration, mentoring, and staff develop- ment. Dr. Langer consults with corporations and universities on information technology, cyber security, staff development, man- agement transformation, and curriculum development around the Globe. Dr. Langer is also the chairman and founder of Workforce Opportunity Services (www.wforce.org), a non-profit social venture

 

 

xvi Author

that provides scholarships and careers to underserved populations around the world.

Dr. Langer earned a BA in computer science, an MBA in accounting/finance, and a Doctorate of Education from Columbia University.

 

 

xvii

Introduction

Background

Information technology (IT) has become a more significant part of workplace operations, and as a result, information systems person- nel are key to the success of corporate enterprises, especially with the recent effects of the digital revolution on every aspect of business and social life (Bradley & Nolan, 1998; Langer, 1997, 2011; Lipman- Blumen, 1996). This digital revolution is defined as a form of “ dis- ruption.” Indeed, the big question facing many enterprises today is, How can executives anticipate the unexpected threats brought on by technological advances that could devastate their business? This book focuses on the vital role that information and digital technology orga- nizations need to play in the course of organizational development and learning, and on the growing need to integrate technology fully into the processes of workplace organizational learning. Technology personnel have long been criticized for their inability to function as part of the business, and they are often seen as a group outside the corporate norm (Schein, 1992). This is a problem of cultural assimila- tion, and it represents one of the two major fronts that organizations now face in their efforts to gain a grip on the new, growing power of technology, and to be competitive in a global world. The other major

 

 

xviii IntroduCtIon

front concerns the strategic integration of new digital technologies into business line management.

Because technology continues to change at such a rapid pace, the ability of organizations to operate within a new paradigm of dynamic change emphasizes the need to employ action learning as a way to build competitive learning organizations in the twenty-first century. Information Technology and Organizational Learning integrates some of the fundamental issues bearing on IT today with concepts from organizational learning theory, providing comprehensive guidance, based on real-life business experiences and concrete research.

This book also focuses on another aspect of what IT can mean to an organization. IT represents a broadening dimension of business life that affects everything we do inside an organization. This new reality is shaped by the increasing and irreversible dissemination of technology. To maximize the usefulness of its encroaching presence in everyday business affairs, organizations will require an optimal understanding of how to integrate technology into everything they do. To this end, this book seeks to break new ground on how to approach and concep- tualize this salient issue— that is, that the optimization of information and digital technologies is best pursued with a synchronous imple- mentation of organizational learning concepts. Furthermore, these concepts cannot be implemented without utilizing theories of strategic learning. Therefore, this book takes the position that technology liter- acy requires individual and group strategic learning if it is to transform a business into a technology-based learning organization. Technology­ based organizations are defined as those that have implemented a means of successfully integrating technology into their process of organiza- tional learning. Such organizations recognize and experience the real- ity of technology as part of their everyday business function. It is what many organizations are calling “ being digital.”

This book will also examine some of the many existing organi- zational learning theories, and the historical problems that have occurred with companies that have used them, or that have failed to use them. Thus, the introduction of technology into organizations actually provides an opportunity to reassess and reapply many of the past concepts, theories, and practices that have been used to support the importance of organizational learning. It is important, however, not to confuse this message with a reason for promoting organizational

 

 

xixIntroduCtIon

learning, but rather, to understand the seamless nature of the relation- ship between IT and organizational learning. Each needs the other to succeed. Indeed, technology has only served to expose problems that have existed in organizations for decades, e.g., the inability to drive down responsibilities to the operational levels of the organization, and to be more agile with their consumers.

This book is designed to help businesses and individual manag- ers understand and cope with the many issues involved in developing organizational learning programs, and in integrating an important component: their IT and digital organizations. It aims to provide a combination of research case studies, together with existing theories on organizational learning in the workplace. The goal is also to pro- vide researchers and corporate practitioners with a book that allows them to incorporate a growing IT infrastructure with their exist- ing workforce culture. Professional organizations need to integrate IT into their organizational processes to compete effectively in the technology-driven business climate of today. This book responds to the complex and various dilemmas faced by many human resource managers and corporate executives regarding how to actually deal with many marginalized technology personnel who somehow always operate outside the normal flow of the core business.

While the history of IT, as a marginalized organization, is rela- tively short, in comparison to that of other professions, the problems of IT have been consistent since its insertion into business organiza- tions in the early 1960s. Indeed, while technology has changed, the position and valuation of IT have continued to challenge how execu- tives manage it, account for it, and, most important, ultimately value its contributions to the organization. Technology personnel continue to be criticized for their inability to function as part of the business, and they are often seen as outside the business norm. IT employees are frequently stereotyped as “ techies,” and are segregated in such a way that they become isolated from the organization. This book pro- vides a method for integrating IT, and redefining its role in organiza- tions, especially as a partner in formulating and implementing key business strategies that are crucial for the survival of many companies in the new digital age. Rather than provide a long and extensive list of common issues, I have decided it best to uncover the challenges of IT integration and performance through the case study approach.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Excel Question

1.Start Excel. Download and open the workbook named go16_xl_ch04_grader_4g_hw.xlsx, and then save it in your Excel Chapter 4 folder as Lastname_Firstname_4G_Loan_Staff_Form.

 

2.Display the second worksheet named Warehouse Payment Table. In cell B8, enter a PMT function using cell B4 divided by 12 as the rate, cell B3 as the number of payment periods, and cell B2 as the present value of the loan. Display the result as a positive number.

 

3.Create a two-variable data table in the range B8:H16. Set cell B3 as the row input cell, and cell B4 as the column input cell. From the Cell Styles gallery, apply the Currency cell style to the range C9:H16. Select the payment option closest to but less than $10,000 per month for a 120-month loan—cell D16—and format the option with the Note cell style. Save your workbook.

 

4.Display the fourth worksheet named Job Information, select the range A4:C11, and then sort the range by Job Code in ascending order. Create a range named Job_Code using the data in cells A5:A11.

 

5.Display the Staffing Plan worksheet, and then select the range A9:A18. Display the Data Validation dialog box, and validate from a List using the Source =Job_Code.

 

6.Click cell A9, click the list arrow, and then click M-MG. Click cell B9 to make it the active cell, and then insert a VLOOKUP function that will look up the Description of the Job Code in cell A9 using the information in the Job Information worksheet as the table array. After selecting the table array, be sure to press F4 to make it an absolute cell reference. The Description to be looked up is in column 2 of the table array.

 

7.With cell B9 as the active cell, copy the VLOOKUP formula down through cell B18. In cell C9, type 1 as the # of Positions and in cell D9, type Management as the Type.

 

8.In cell E9, insert the VLOOKUP function to look up the Salary of the Job Code in cell A9 by using the information in the Job Information sheet as the table array; the Salary is in column 3 of the table array. Copy the VLOOKUP formula in cell E9 down through cell E18.

 

9.Beginning in cell A10, add these staff positions:
Item # of Positions Type
C-CASH 3 Cashier
C-CSA 1 Customer Service
M-AMG 3 Management

 

10.Delete any unused rows between the last item and the Total row. Sum the Budget Amount column and apply the Total cell style. Save your workbook.

 

11.Display the Bracelet Revenue worksheet. Click cell I5, and then on the Formulas tab, click Trace Precedents. On the ribbon, in the Formula Auditing group, click Error Checking, and then click Edit in Formula Bar. Edit the formula so that the formula is using the Growth Assumption for Beaded Bracelets, not for Crystal Bracelets.

 

12.In the Error Checking dialog box, click Resume. In cell M6, notice the formula is trying to divide by cell L10, which is empty. Click Edit in Formula Bar, change 10 to 9 Ensure that the reference to L9 is an absolute reference, and then in the Error Checking dialog box, click Resume.

 

13.In cell F7, examine the error information, and then click Copy Formula from Above. Examine the error in cell J8, and then click Copy Formula from Left. Click OK. Use Format Painter to copy the format in cell M5 to cell M6. Save your workbook.

 

14.In the sheet tab row, right-click any sheet tab, and then click Select All Sheets. Display the Page Setup dialog box, click the Margins tab, and then under Center on page, click Horizontally. Click the Header/Footer tab, click Custom Footer, and then in the Left section, insert the File Name. Click OK two times. Ungroup the sheets, and then for these three worksheets—Warehouse Payment Table, Staffing Plan, and Bracelet Revenue—set the Orientation to Landscape. Select the Bracelet Revenue sheet, and on the Page Layout tab, set the Scale to 90%. Add the tag New York revenue to the properties.

 

15.Ensure that the worksheets are correctly named and placed in the following order in the workbook: Warehouse Purchase, Warehouse Payment Table, Staffing Plan, Job Information, Revenue. Save the workbook. Close the workbook and then exit Excel. Submit the workbook as directed.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

1.Using Expected Value, Is It Economically Better To Make Or Buy The Component? Strategically Thinking, Why Might Management Opt For Other Than The Most Economical Choice?

1) APA format

1.Using Expected Value, Is It Economically Better To Make Or Buy The Component? Strategically Thinking, Why Might Management Opt For Other Than The Most Economical Choice?

2)add references at end

Teloxy Engineering has received a one-time contract to design and build 10,000 units of a new product. During the proposal process, management felt that the new product could be designed and manufactured at a low cost. One of the ingredients necessary to build the product was a small component that could be purchased for $60 in the marketplace, including quantity dis- counts. Accordingly, management budgeted $650,000 for the purchasing and handling of 10,000 components plus scrap.

During the design stage, your engineering team informs you that the final design will require a somewhat higher-grade component that sells for $72 with quantity discounts. The new price is substantially higher than you had budgeted for. This will create a cost overrun.

You meet with your manufacturing team to see if they can manufacture the component at a cheaper price than buying it from the outside. Your manufacturing team informs you that they can produce a maximum of 10,000 units, just enough to fulfill your contract. The setup cost will be $100,000 and the raw material cost is $40 per component. Since Teloxy has never manu- factured this product before, manufacturing expects the following defects:

Percent defective 0 10 20 30 40 Probability of 10 20 30 25 15

occurrence
All defective parts must be removed and repaired at a cost of $120 per part.

  1. Using expected value, is it economically better to make or buy the component?
  2. Strategically thinking, why might management opt for other than the most economical choice?
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Powerpoint Assignment – Follow Exactly The Instructions

perform the below instructions to the po2c1women_lastfirst  powerpoint file the other two files will be needed to complete the assignment

Outline and Modifications

Based on the storyboard you created after researching women in STEM on the Internet, you type the outline of your presentation. As you create the outline, you also modify the outline structure.

  • a.Open Outline view.
  • b.Type Name 3 women in STEM as the title for Slide 2.
  • c.Type each of the following as Level 1 bullets for Slide 2: My biology teacherMy computer applications teacherMy math teacher.
  • d.Type Think on a bigger scale as the title for Slide 3. Enter each of the following as Level 1 bullets for Slide 3: National names?, and International names?
  • e.Add this speaker note to Slide 3: These may be hard questions to answer quickly because there are relatively few women in these fields.
  • f.Type Here are some names to get you started as the title for Slide 4.
  • g.Type each of the following as Level 1 bullets for Slide 4: Sally RideChrista McAuliffe.
  • h.Add this speaker note to Slide 4: For different reasons, both of these women were important in the development of the aerospace industry.

Imported Outline

You have an outline on women in STEM that was created in Microsoft Word and also a slide show on that topic. You reuse this content to build your slide show.

  • a.Position the insertion point at the end of the outline after Slide 4.
  • b.Use the Slides from Outline option to insert the p02c1Stem outline.
  • c.Delete Slide 5 and any blank slides.
  • d.Demote the last two bullets on the new Slide 5.
  • e.Click the first bullet on Slide 6. Cut and paste the text after the name and date from the bullet point to the Notes pane. Replace She with Hypatia. Repeat for the remaining two bullets.
  • f.Delete all text after physics for the first bullet of Slide 7. Replace the comma with a period.
  • g.Position the insertion point at the end of the outline.
  • h.Reuse Slides 2 and 3, using the same order, from p02c1Work to add two slides to the end of the presentation.
  • i.Modify the outline structure by reversing slides 8 and 9.

Design

The content of some of the imported slides does not fit well and the font colors are not uniform across all of the slides. You want to adjust the layout and font color to create a well-designed presentation. Then you decide to view a slide show to verify your changes.

  • a.Switch to Normal view. Change the layout of Slide 9 to Blank.
  • b.Check Slides 5–7 to ensure the title placeholder font is Arial Black (Heading) with the color set to Black, Text 2. Check the subtitle font to Arial Body with the color set to Grey 80%, Text 1.
  • c.Use the spelling checker and proofread the presentation.
  • d.View a slide show from the beginning.
  • e.Move Slide 5 to just before Slide 8.

Sections

To facilitate organization of the presentation and moving between the slides, you create sections.

  • a.Add a section before Slide 2 and rename it Quiz.
  • b.Add a section before Slide 5 and rename it History.
  • c.Add a section before Slide 7 and rename it Reasoning.
  • d.Print the outline as directed by your instructor.
  • e.Save and close the file. Based on your instructor’s directions, submit p02c1Women_LastFirst.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

OWASP WEBGOAT

INCS 775 Data Center Security

Summer 2018

 

Lab 1 – OWASP WebGoat

OWASP WebGoat is a deliberately insecure application that allows developers and security

researchers to test vulnerabilities commonly found in Java-based applications that use common

and popular open source components. In this assignment we will be using tools on Kali Linux to

allow exploitation of such vulnerabilities.

1. Download, install, and run the OWASP Broken Web Apps VMware machine.

2. Use a browser on Kali Linux machine to access the WebGoat interface. Login as

userid=guest, password=guest.

3. Make use of the WebScarab proxy to alter HTTP requests as required by the WebGoat

lessons.

4. Try the different Lessons, review provided solutions.

Prepare a report summarizing your activities.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Lab Assessment Questions & Answers 1. Which Tool, Wireshark Or NetWitness, Provides Information About The Wireless Antenna Strength During A Captured…

Lab Assessment Questions & Answers
1. Which tool, Wireshark or NetWitness, provides information about the wireless antenna strength during a captured transmission?
2. Which tool displays the MAC address and IP address information and allows them to be correlated for a given capture transmission?
3. What is the manufacturer specific ID for the GemTek radio transmitter/receiver?
4. The receiver and/or transmitter address is hard-coded in hardware and cannot be changed: It can always be counted on to correctly identify the device transmitting. True or false?
5. What was the actual web host name to which www.polito.it resolved?
2 | Lab #2 Using Wireshark and NetWitness Investigator to Analyze Wireless Traffic
Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com  Student Lab Manual
6. How can one determine that the website www.polito.it is in Italy?
7. What is the IP address for www.polito.it?
8. What destination organization is the owner of record of www.polito.it?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!