Games, simulations, and virtual “worlds” provide learners with an opportunity to engage in an immersive and interactive environment that requires knowledge, decision making, and information management skills. Check out the demo versions of games and simulations at LavaMind 

 

(http://www.lavamind.com/index.html) and choose one to play. In your discussion, identify the game you played and answer the following questions about the game:

 

  • What types of learning outcomes can be achieved through playing the game?
  • Are there particular academic disciplines where the game and/or simulation would be most effective? What about particular learning styles?
  • What support is needed by faculty to integrate the game and/or simulation in their course?
  • Did you learn anything?

 

The use of games, simulations, and virtual environments is still controversial, as their association with play and fun is often considered non-educational. In addition to answering the above questions, discuss how willing you would be to implement experiential learning in your course. Why or why not?

Opinions concerning the impact of technology on teaching and learning are divided. Review the Visible Knowledge Project  (https://blogs.commons.georgetown.edu/vkp/) blog to see the results of their collaborative project that explored the impact of technology on learning. Then share your opinion about the impact of technology with your classmates by addressing the following questions:

 

  • Does the use of technology help students achieve learning goals?
  • Does the use of technology change student engagement in learning inside and outside of class?
  • Does the use of technology change teaching behaviors and practices?
  • Does the use of technology improve teaching effectiveness and efficiency?

As the change leader for Delta  Pacific Company (DPC), you know  certain elements need to be in place by leadership for a change to be  successful. DPC wants to change the culture from the more traditional  manufacturing environment to one of a contemporary consulting   environment. Now it’s time for you to help the leaders execute a  successful  change:

 

 

 

  

Determine how leadership impacts the  organizational culture during this change

 

  

Examine elements that are critical to making this change sustainable

 

  

Assess the top mistakes leaders make and determine the best way to avoid those mistakes

 

 

As the change leader, it is your  responsibility to help ensure a  successful change in the shift of DPC’s  organizational culture. Part of  this includes alerting leadership to how their  own behavior impacts  change and how change can be sustainable.

 

 

Conduct academic research and create a plan to present to the CEO  and board in which you complete the following successful change  management plan:

 

 

 

  

Explanation of leadership behaviors that impact organizational change.

 

  

Description of critical factors that ensures this cultural shift will be sustainable.

 

  

Examination of the top mistakes leaders make during a change.

 

  

Explanation of your recommendations as to the best ways the leaders can avoid making those mistakes.

 

  

Remember that this is a proposal. Make sure to format your  paper properly for your proposal. A proposal is a persuasive document,  so make sure to use proper language and tone. Remember, you are the  change leader, and you are writing to the CEO. So use a tone in your  proposal that is specific to your audience (the CEO). 

This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

 

The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.

 

Section 1: Infrastructure Document

 

  1. Write a four to six (4-6) page infrastructure document in which you:
    • Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.
    • Present the rationale for the logical and physical topographical layout of the planned network.
    • Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
    • Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.
    • Create and describe a comprehensive security policy for this data-collection and analysis company that will:

 

  • Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information. 
  • Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

 

Your assignment must follow these formatting requirements:

 

  • This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

 

Section 2: Revised Project Plan

 

Use Microsoft Project to:

 

  1. Update the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.

 

The specific course learning outcomes associated with this assignment are:

 

  • Develop information systems-related activities to maximize the business value within and outside the organization.
  • Demonstrate an understanding of existing and emerging information technologies, the functions of IS, and its impact on the organizational operations.
  • Evaluate the issues and challenges associated with information systems integration.
  • Use technology and information resources to research issues in information systems.
  • Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions

Executive Program Practical Connection Assignment

 

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

 

 

 

Assignment: 

 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. Also provide a a summary of at least one information security breach that has occurred in the last three months. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

 

 

 

Requirements:

 

Provide a 500 word (or 2 pages double spaced) minimum reflection.

 

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

 

Share a personal connection that identifies specific knowledge and theories from this course. 

 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Instructions

There is much discussion today about securing our borders and the fight against crime. Most Americans do not realize that many of the people who commit these crimes are juveniles that are part of some type of organized gang. For this assignment, you will research a city in the United States that has a gang problem and describe the extent of the gang problem. Identify the characteristics of the gang and the supposed rationale for gang membership. Finally, describe the resources and policies employed as a response to gang violence. 

Create an eight-slide PowerPoint presentation. In addition, be sure to include a title slide and a reference slide using APA formatting. Also, include at least three graphics (charts, tables, photos, etc.) in your presentation, and use at least two academic sources. 

 
 
 

For the Final Project, you are asked to write an eight-to ten-page research report (typed, double-spaced) in which you describe a company of your choice, the nature of its business, a specific product or service, and how that product or service is produced and distributed by the company and then recommend the information technology system you think should be in place and why. Address the following questions in narrative form (according to APA style). Be sure to provide examples and supporting rationale throughout the paper.

 

Company Background and Information Systems

 

  • What is the name, nature of business, and specific products or services of your chosen organization?
  • How are the products or services produced and distributed by the company?
  • Why are information systems essential in managing the organization’s business?
  • Describe the existing information systems supporting the major business functions of the organization (e.g., sales and marketing, manufacturing and production, accounting, human resources, etc.)

 

Information Technology Recommendation

 

  • What is your recommendation for the information technology systems you think should be in place and why? Your recommendation should include the following:
    • Information needs:
      • What types of decisions do users need to make by accessing the information systems?
      • What are the different levels of information groups?
    • Need for system automation
    • Benefits of the proposed system (savings, quality improvements, faster processing, etc.)
    • Types of database data elements (data, images, photographs, sound, video, etc.)
    • Networking and interactive processing
    • Centralization versus decentralization
    • End-user computing needs
    • Your recommendation to develop or acquire the system software

 

Potential Security Threats

 

  • Describe the various threats and security threats to the proposed information system. What security controls are required to address the threats?

 

Social, Political, and Diversity Impacts

 

  • Summarize the social and political issues raised by the proposed information system.
  • Discuss the impact of diversity to the development and management of the proposed information system.

 

Conclusion

 

References

 

The Final Project – IT System Recommendation

 

  • Must be eight to ten double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  • Must use at least three scholarly sources in addition to the course text.
  • Must document all sources in APA style as outlined in the Ashford Writing Center.
  • Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.

 

 

 

 

 

 

 

Resources

 

 

 

Multimedia

 

Ivy, K. (Director & Producer). (2015). INF220 Week Five information systems – Security, ethical, and social impacts part one (Links to an external site.) [Video file]. Retrieved from http://ashford.mediaspace.kaltura.com/media/INF220+Week+Five+Information+Systems+-+Security%2C+Ethical%2C+and+Social+Impacts+Part+One/0_kof13iex 

 

  • The INF220 subject matter expert discusses real-world industry experiences relating to the strategic use of information systems in the organization. This week’s part one of two video focuses on the security, ethical, and social impacts of information systems.
    Accessibility statement does not exist.
  • Privacy Policy (Links to an external site.)

 

Ivy, K. (Director & Producer). (2015). INF220 Week Five information systems – Security, ethical, and social impacts part two (Links to an external site.) [Video file]. Retrieved from http://ashford.mediaspace.kaltura.com/media/INF220+Week+Five+Information+Systems+-+Security%2C+Ethical%2C+and+Social+Impacts+Part+Two/0_w4tpdnky 

 

  • The INF220 subject matter expert discusses real-world industry experiences relating to the strategic use of information systems in the organization. This week’s part two of two video focuses on the security, ethical, and social impacts of information systems.
  • Privacy Policy (Links to an external site.)

 

Recommended Resources

 

Articles

 

Johnson, S. (n.d.). What globalization means for diversity and inclusion efforts (Links to an external site.). Profiles in Diversity Journal. Retrieved from http://www.diversityjournal.com/

 

  • The article discusses the changing face of organizations due to globalization and the need for organizations to understand differences between countries as well as the internal diversity of each country. In order to transform a business environment, inclusion practices must be imbedded into an organization’s bottom line and throughout its culture. This is critical when developing information systems in global organizations.

 

Leal, G. C. L., Huzita, E. H. M., & Tait, T. F. C. (2012). Globalization and socio-technical aspects of information systems development (Links to an external site.). In C. Kalloniatis (Ed.), Innovative Information Systems Modelling Techniques (pp. 99-122).doi:10.5772/36867

 

  • This article discusses the impact of globalization and socio-technical aspects on the development of information systems.

 

Multimedia

 

TED. (2014, Jun 10). Hackers: The Internet’s immune system | Keren Elazari | TED talks (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=erCAp_Bd0AQ 

 

  • According to cybersecurity expert Keren Elazari, the beauty of hackers is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights. By exposing vulnerabilities, they push the Internet to become stronger and healthier, wielding their power to create a better world.

 Describe one internal and one external method for the dissemination of your EBP project results(the effects of inadequate nurse staffing on patient care). For example, an internal method may be the hospital board, and an external method may be a professional nursing organization. Discuss why it is important to report your results to both of these groups. How will your communication strategies change for each group? 

As a first step toward crafting your discussion post, review the short video, Six Bases of Power for Leaders, from this module’s assigned resources.

 

Now, apply the six types of power identified in the video to the Netflix case study, which you read about last week.

 

  1. Official (positional) power
  2. Transactional (reward) power
  3. Coercive power
  4. Knowledge (information) power
  5. Charismatic
  6. Principle-centered (social)

 

Consider the types of power that Sharon Slade, the chief human resources officer (CHRO) at Netflix, has in this situation. In your initial post, first describe the six types of power Sharon possesses. Then, provide examples that show how Sharon may exhibit this type of power during the negotiations. Finally, provide a reason why this type of power is important in this setting. Use the example below as a guide.

 

Example—Official (positional) power: This is the power that comes from the title/position. For example, Sharon has authority in human resource matters, as defined by the scope of her role as the CHRO. She can draw on her knowledge of the company’s policies and the law during the negotiations to drive a fair bargain.

Instructions

 

As you work on this assignment, you will need to refer to the two articles and the presentation about Netflix in the Module One Readings and Resources folder.

 

For this assignment, your task is to incorporate the concepts in Watzlawick’s iceberg model of communication to analyze the organizational culture at Netflix.

 

As you work on this assignment, refer to the Module Two overview in regards to the four categories of an organization’s culture: observable artifacts, espoused values, enacted values, and basic assumptions. You will also provide two examples from the two articles and the presentation on Netflix for each category.

 

Completing this assignment will provide you with key insights that will assist you in completing Section II: Cultural Analysis Overview of Milestone One.