Category: Information systems (IS)

  • Security Guidelines and Data Protection

    Prior to beginning work on this discussion forum, review Module 5 in your MIS textbook.

    Welcome to Week 2 of your exploration into the foundational principles of cybersecurity. This week lays the groundwork for understanding the essential components of a comprehensive security system and explores key guidelines that form the bedrock of effective cybersecurity practices.

    As organizations navigate an increasingly complex digital landscape, the importance of robust cybersecurity measures cannot be overstated. Cyber threats continue to evolve in sophistication and scale, posing significant risks to the integrity, confidentiality, and availability of sensitive information and critical systems. Therefore, it is imperative for businesses and individuals alike to adopt proactive strategies to safeguard their digital assets and mitigate the impact of potential security breaches.

    To kickstart your discussion, review the 10 guidelines that should be included in a comprehensive security system:

    • Access Control: Implement robust access controls to restrict unauthorized access to sensitive data and systems, including user authentication mechanisms, role-based access controls, and least privilege principles.
    • Regular Updates and Patch Management: Keep software, operating systems, and firmware updated with the latest security patches and updates to address known vulnerabilities and mitigate potential security risks.
    • Network Security: Deploy firewalls, intrusion detection and prevention systems, and secure network protocols to monitor and protect network traffic, detect malicious activities, and prevent unauthorized access to network resources.
    • Data Encryption: Encrypt sensitive data, both in transit and at rest, using strong encryption algorithms to ensure confidentiality and prevent unauthorized access in the event of data breaches or unauthorized interception.
    • Incident Response Plan: Develop and regularly test an incident response plan to effectively respond to and mitigate the impact of cybersecurity incidents, including data breaches, malware infections, and other security breaches.
    • Employee Training and Awareness: Provide comprehensive cybersecurity training and awareness programs to educate employees about potential cyber threats, phishing attacks, social engineering tactics, and best practices for maintaining security hygiene.
    • Secure Configuration Management: Implement secure configuration management practices to ensure that systems and devices are configured securely, with unnecessary services and features disabled, default credentials changed, and secure configurations applied.
    • Vulnerability Management: Proactively conduct regular vulnerability assessments and penetration testing to identify and remediate security vulnerabilities in systems, applications, and infrastructure.
    • Data Backup and Recovery: Implement regular data backup procedures and offsite storage solutions to ensure data integrity and availability in the event of data loss, corruption, or ransomware attacks.
    • Regulatory Compliance: Ensure compliance with relevant industry regulations, data protection laws, and cybersecurity standards to mitigate legal and regulatory risks and protect sensitive customer information.

    In your initial post, reflecting on the 10 guidelines for a comprehensive security system which are already outlined, answer the following questions:

    • Which guideline do you believe is the most critical for ensuring effective cybersecurity, and why?
    • Can you identify any additional guidelines or best practices that should be included in a comprehensive security system?
    • Can you share an example of a cybersecurity incident or breach that could have been prevented or mitigated by following one or more of these guidelines?
    • How can organizations balance the need for robust cybersecurity measures with considerations of usability, productivity, and user experience?
    • How can individuals contribute to enhancing cybersecurity awareness and promoting a culture of security within their organizations or communities?

    Engage in a thoughtful discussion, drawing from your own experiences, insights, and research findings to explore the importance of comprehensive security systems and strategies in todays digital landscape.

  • Case Study: Using Technology at Federal Express

    Case Study: Using Technology at Federal Express[WLOs: 1, 2, 5] [CLOs: 1, 2, 5, 6]

    Prior to beginning work on this assignment, review Module 1 in the MIS textbook.

    Review the Case Study 1-1: Using Information Technologies at Federal Express minutely to complete this assignment.

    Case Study 1-1: Using Information Technologies at Federal Express

    In this case study, you explore the innovative strategies employed by Federal Express (FedEx), a global leader in the logistics industry, to leverage information technologies for enhancing customer service and operational efficiency. Since its inception in 1971, FedEx has continually evolved to meet the market’s evolving demands, exemplifying the transformative power of technology in driving organizational success.

    At the heart of FedExs approach lies a steadfast commitment to customer satisfaction, underscored by the seamless integration of technology into its operations. Through initiatives such as the comprehensive FedEx.com website and the innovative Ship Manager application, FedEx has streamlined its internal processes and empowered customers with greater control and convenience in managing their shipments.

    The case study highlights the significant cost savings and operational efficiencies achieved by FedEx through the adoption of technology-enabled solutions. By redirecting customer inquiries to the web platform and leveraging automation tools like Ship Manager, FedEx has substantially reduced call center volumes and associated costs, while simultaneously enhancing the overall customer experience.

    However, the case study also sheds light on the challenges inherent in technology implementation, as evidenced by FedExs ongoing investment in its call center infrastructure to mitigate issues such as website downtime and user difficulties. Through the deployment of customer relationship management software like Clarify, FedEx endeavors to optimize its call center operations and uphold its commitment to prompt and effective customer service.

    For further guidance please review the

    from the UAGC Writing Center.

    In your paper,

    • Explain if technology by itself is enough to ensure high-quality customer service.
    • Estimate FedEx’s annual savings from using information technology.
    • Present two examples of information technologies used by FedEx.
    • Discuss how these technologies might help FedEx maintain a competitive advantage.
    • Provide two credible sources of supporting information.

    Assignment Requirements

    The Case Study: Using Technology at Federal Express paper,

    • must be 2 to 3 double-spaced pages in length (not including title and references pages) and formatted according to
    • as outlined in the Writing Centers
    • resource.
    • must include a separate title page with the following in title case:
    • title of paper in bold font
    • Space should appear between the title and the rest of the information on the title page.
    • students name
    • name of institution (The University of Arizona Global Campus)
    • course name and number
    • instructors name
    • due date
    • must utilize academic voice.
    • Review the
    • resource for additional guidance.
    • must include an introduction and conclusion paragraph.
    • Your introduction paragraph needs to end with a clear thesis statement that indicates the purpose of your paper.
    • For assistance on writing
    • and
    • , refer to the Writing Center resources.
    • must use at least 2 credible sources in addition to the course text.
    • The
    • table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source.
    • To assist you in completing the research required for this assignment, refer to this
    • tutorial, which introduces the University of Arizona Global Campus Library and the research process, and provides some library search tips.
    • must document any information used from sources in APA Style as outlined in the Writing Centers
    • guide.
    • must include a separate references page that is formatted according to APA Style as outlined in the Writing Center.
    • Refer to the
    • resource in the Writing Center for specifications.
  • CSD 3521 Information Systems Development

    Please go through the uploaded document.

    Attached Files (PDF/DOCX): Coursework1 Brief – 2026.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Declining applications in Masters Information Systems progra…

    I need to rewrite this assignment attached. You can use this for more reference: As an enterprise team, you face complex challenges. You work across silos and juggle competing requirementsall while racing to meet rising expectations. Thats why we can use Enterprise Design Thinking, a framework that aligns multi-disciplinary teams around their users’ real needs. When teams apply these scalable methods, they can move faster and deliver differentiated outcomes over and over again. The supporters of this technique believe that the world’s systems should work in the service of people. At the heart of our human-centered mission is Enterprise Design Thinking: a framework to solve our users problems at the speed and scale of the modern enterprise. Design thinking is an iterative problem-solving approach emphasizing empathy, creativity, and collaboration to develop innovative solutions. It encourages students to tackle complex problems by understanding the needs and perspectives of the people they are designing for. Design thinking is a flexible and dynamic process that encourages students to think creatively. It empowers them to approach problems from a human-centered perspective and fosters innovation and problem-solving skills. In this individual activity, we will practice the design-thinking technique to solve a real business problem. The principles that guide us in this exercise are to see problems and solutions as an ongoing conversation. Each student can come up with a new way to solve the given problem. Then, each student needs to submit a report highlighting how they used the design-thinking technique to solve the mentioned business problem. Background: Information systems (IS) educators at universities face a number of challenges in the current environment, including dealing with declining enrolments, preparing students for the changes in the profession, and updating the curriculum to integrate new ideas and technologies. These challenges make sharing IS education-related knowledge and practices especially critical. Scenario: A large university recently announced that the number of applicants for Masters degree programs in Information Systems (IS) declined by 55% in 2021, 45% in 2022, 40% in 2023, and 42% in 2024. There are some speculations and assumptions about the reasons, but the university does not use a traditional problem-solving approach. Use the design thinking technique to solve the issues. Write the report using the following steps. Responses to each step will be assessed: 1- What is the business problem? 2- Do a “5 Whys” to find the main cause (dig deeper). 3- Who are the Users (main user identification)? 4- What is the User-centered problem statement (Problem statement from the users ‘ perspective)? 5- Do “As-Is” analysis: What is their current struggle today? Their daily work? Their needs? 6- Do “to-be” analysis: Propose some User-centric Ideas to solve their problems. Format requirements: – Please mention each question followed by an answer – Each student may find different “users,” which is acceptable in this approach – To answer Q5, try to deeply analyze the current situations that “users” may face – To answer Q6, try to come up with at least three solutions. – Page limit for the report: Minimum three pages- Maximum five pages

    Attached Files (PDF/DOCX): 1.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Discussion Post

    Description

    Read the case, Fang, Su and Yang, Ivey Publishing, 2019, W19051-PDF-ENG in the course packet

    And answer the following question:

    1. How have Cathay Pacifics IT strategies developed over the decade under different business circumstances?
    2. What have been the major incentives and focus of its IT outsourcing?
    3. What are the pros and cons of the Evolve and long-tail outsourcing strategies and the necessity of the transition?

    Once you posted yours, add comments to at least two other postings. Not adding comments results in -20 points from your discussion grading.

    This is due by 11:59 pm (CT) on Feb. 1.

    Discussion Expectations:

    Below lists the expectations for our discussion posts.

    Attached Files (PDF/DOCX): Cathay Pacific Navigating Digital Disruption.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • HW2 Chapter 5

    The Bob White Karate Studio has

    been a local fixture for almost 40 years. The studio offers training in American Kenpo Karate to students from 3 years old to 80 years old. Students select one of several programs: (a) monthly payments, (b) semi-annual payments, or (c) the black belt program. Each of these programs allows them to take group classes as well as one or more private lessons with a qualified black belt instructor, depending on the program selected. For example, the monthly program includes one private lesson, the semi-annual program includes three private lessons, and the black belt program includes one lesson per week until the student attains black belt rank.

    Additionally, students may purchase additional private lessons, as well as uniforms, sparring gear, and various studio insignia and clothing items. The additional half-hour private lessons are priced as packages, which include 5, 10, 20, 40, or 60 lessons, and the price also varies depending on whether the lessons are provided by senior or junior instructors.

    When students purchase a package, they are assigned to a particular instructor for the duration of the package. Students typically pay for anything they buy at the time of their purchase, but established students are sometimes allowed to purchase on credit. In that case, they generally must pay within 2 weeks. While all studio employees are also instructors, only a few employees handle sales transactions and accept payments.

    A.Draw a BPMN activity diagram that describes the Bob White Karate Studio’s sales and collection process.

    B.Prepare a UML class diagram with classes, associations, and multiplicities.

    C . Using the preceding information and the following attributes list, prepare a listing of the relational tables necessary to support this sales and collection process. List the tables in the following order: resources, events, agents, type images, and linking tables.

    Attributes:

    Cash account#

    Cash account balance

    Credit card number for this sale

    Date sale paid

    Employee/instructor#

    Employee name

    Employee rank

    Instructor type

    Inventory item#

    Inventory item description

    Inventory item price

    Inventory item quantity on hand (QOH)

    Private lesson package#

    Private lesson package description

    Private lesson package price

    Program#

    Program description

    Program price

    Private lesson package price

    Program#

    Program description

    Program price

    Quantity of instructors of this type

    Quantity of this inventory item purchased on this sale

    Sale#

    Sale amount

    Sale date

    Sale paid (Y/N)

    Student#

    Student current rank

    Student name

    Student original enrollment date

  • Poster Assignment

    Please follow instructions in the attached document

    Attached Files (PDF/DOCX): Poster Assignment Instructions.docx

    Note: Content extraction from these files is restricted, please review them manually.