Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. . Use proper citations and references in your post.

  

There is no such thing as a bug-free IT project. Because bugs are a fact of IT project life, IT project managers must articulate a process for identifying, tracking, and handling the bugs that will inevitably occur. In addition, because technical and business requirements change frequently, IT project managers must also plan to log and track requests for new features and functionality. 

Read the following linked documents: 

– “”: This article describes the process of tracking bugs in Visual Studio, a popular .NET development suite created by Microsoft.

– “”: This article describes the process of tracking bugs in Jira, a popular bug tracking and project management tool created by Atlassian. 

Create a 3-page Microsoft Word document of a bug tracking process for the project you created in the individual assignments in Weeks 2 and 3. Be sure to differentiate between bugs and feature requests. For this assignment, you will only be tracking bugs. 

Your tracking process must include: 

– Description of software you propose using for bug tracking (in-house developed or third-party)

– Description of issues that will be considered bugs (vs. feature requests)

– Description of who will use the system to track bugs

– Description of who will monitor the system, follow up with the requestor as necessary, and implement the bug fixes

– Description of bug-related information (such as a unique tracking number, description, assignee, etc.) necessary to identify, fix, and log bugs 

Submit your completed document.

Read “End-of-Chapter Application Case: Nationwide Insurance Used BI to Enhance Customer Service” at the end of Chapter 1 in the textbook, and answer the following questions.

  1. Why did Nationwide need an enterprise-wide data warehouse?
  2. How did integrated data drive the business value?
  3. What forms of analytics are employed at Nationwide?
  4. With integrated data available in an enterprise data warehouse, what other applications could Nationwide potentially develop?

Note:Need 700 words with apa format with references.

attached text book. go through the chapter one.

 

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

Please make your initial post and two response posts substantive. 

A substantive answer will do at least TWO of the following:

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source (for example, an article from the google scholar Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

Use proper citations and references.

Need help with below work.

 Topic: Their is little doubt we are living at a time when technology is  advancing at a pace that some believe is too fast for humans to trucly  understand the implications these advances may have.  Search the  peer-reviewed literature for examples of this. You may select any topic  relating to technology that illustrates the potential for really messing  things up. Include, in your description, an analysis of what might have  caused the problems and potential solutions to them. Be sure to provide  supporting evidence, with citations from the literature. As with the  first discussion topic, it is not enough for you to simply create a own  posting. You must read the postings of the other members of the class  and comment on each of them. Please see Discussion Forum of the class  syllabus for additional details on content.

note:

Need 3 pages of work, APA format, citations and references must

 Select an recent attack and discuss it with the group. Cite the news article and use only legitimate news sources. Find two additional academic sources for your attack. This attack must be within the last six months. (150 words)

 Be sure to have at least two responses to other students that are constructive and aid them going forward. Your responses are to be at least 50 words each. 

Using what was covered in the lectures, write a program in R to collect data via webscraping. 

The website the data is collected from must allow webscraping. There are numerous websites that offer directions on how to webscrape. Have you visited any of these sources? How many mention legality?

 

After scraping data from a site write a research paper to describe:

The data collected, how you chose this data and how legality was confirmed

What issues you may have ran into in the data collection

How you may use webscraping in a practical setting, such as research or for an employer

Discuss the legality of webscraping outside the scope of this data, what problems can webscraping cause?

The following documents should be submitted for full credit:

The research paper

The .r file with your webscraping code

Your research paper should be at least 3 pages (and at least 800 words), double-spaced, saved in MS Word format. All research papers in this course should be written in APA format (no abstract is necessary). Properly cite and reference any websites or documents you include to support the requirements of this assignment.

Your cover page should contain the following: Title, Students name, Universitys name, Course name, Course number, Professors name, and Date.

 

Submit your assignment on or before the due date.

 

By submitting this paper, you agree:

(1) that you are submitting your paper to be used and stored as part of the SafeAssign services in accordance with the  

(2) that your institution may use your paper in accordance with your institution’s policies; and

(3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

APA format 

300 words

2 references

In text citations

Module 1 Discussion Question

Search “scholar.google.com” for a company, school, or person that has been the target of a network
or system intrusion? 

What information was targeted? 

Was the attack successful?

 If so, what changes were  made to ensure that this vulnerability was controlled? 

If not, what  mechanisms were in-place to protect against the intrusion.

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.