Create an Entity Relationship Diagram: As part of the design of the cloud-based database, create an ERD to show the architecture of the cloud database system.

Entity relationship diagrams (ERDs)

Create an Entity Relationship Diagram: As part of the design of the cloud-based database, create an ERD to show the architecture of the cloud database system. To create your ERD, refer to this example that already includes some components of your diagram. You must add to this diagram by including the following components:

• All of the appropriate entities: What are the entities that need to be included in the ERD that are described in the business scenario?

• All of the appropriate attributes: What are at least five attributes for each entity?

• Necessary relationships: How will the relationships between the entities be accurately presented in the diagram?

Explain Your ERD: Write 2 to 5 paragraphs about how your diagram meets the needs of YODAE and its clients. You are required to provide a brief explanation about the entities, attributes, and relationships depicted in your diagram.

Which new goals do you want to achieve through an NCU scholarship?

NCU scholarship

Which new goals do you want to achieve through an NCU scholarship?

Given your generic business strategy from week 1 (cost leadership strategy) for Southwest Airlines, if Southwest Airlines can afford only one major system upgrade at this time, describe how one of the following types of systems could contribute to the value of your business and influence the business strategy of cost leadership

Generic business strategy

Given your generic business strategy from week 1 (cost leadership strategy) for Southwest Airlines, if Southwest Airlines can afford only one major system upgrade at this time, describe how one of the following types of systems could contribute to the value of your business and influence the business strategy of cost leadership—choose either: computer-aided design/computer-aided manufacturing (CAD/CAM), supply chain management (SCM) systems, customer relationship management (CRM) systems, or enterprise resource planning (ERP) systems. CAD/CAM systems enable businesses to design and manufacture unique products to differentiate themselves in the marketplace. SCM systems can improve efficiency and reduce costs if a business has a large number of suppliers and products. CRM systems enable businesses to better manage customer information to develop deep relationships with customers. ERP systems help to manage resources (e.g., finance, inventory, human resources) to improve the efficiency of business operations. Even though your business may use many types of systems, focus on one (CAD/CAM, SCM, CRM, or ERP) that is most important for your business strategy.

Create a professional PowerPoint presentation for your business recommending a system upgrade. Make sure you remind your business team of the generic strategy and how the system you are proposing will enhance the business strategy. The presentation should provide a description of the new type of system and describe the types of people in the company who would use or be impacted by the new system. In the PowerPoint presentation you should justify your decision by describing what business improvements your business could make with the new system. The Porter Value Chain and Five Competitive Forces models can be helpful in describing the areas impacted by the new system and how the new system could impact your business’ competitive advantage. Although a cost/benefit analysis would typically be included in this type of presentation, that is not required for this assignment.

Authorities frequently tap online service providers to track down hackers. Do you think it is ethical for authorities to tap an online service provider and to read people’s email? Why or why not?

Tracking down hackers

(a) Authorities frequently tap online service providers to track down hackers. Do you think it is ethical for authorities to tap an online service provider and to read people’s email? Why or why not?

(b) Identify some of the different types of hackers and viruses and explain how a company can protect itself from hackers.

Instructions: Read and use the attached Targeting Target document, research the Internet and use three internet references to address all questions. Use the attached rubric as a guide.

What was the dotcom bubble and who was to blame for the dotcom bubble and its collapse in the 1990’s? Are there any similarities between the environment of the dotcom Bubble and the current social media environment?

Dotcom Bubble

What was the dotcom bubble and who was to blame for the dotcom bubble and its collapse in the 1990’s? Are there any similarities between the environment of the dotcom Bubble and the current social media environment? Do you think that we are currently in a social media bubble now, considering the popularity of social media sites and apps, and the prices that other investors and companies are investing in them and buying them? Explain. Do you think that our economy could survive another dotcom bubble? What support do you have for this thinking?

 

Develop a policy to implement functions that encompass putting programs, processes, or policies into action within an organization.

Develop a Policy

Develop a policy to implement functions that encompass putting programs, processes, or policies into action within an organization.

How effective is the partnership between IT and the business at Hefty Hardware? Identify the shortcomings of both IT and the business.

Case note

1. Overall, how effective is the partnership between IT and the business at Hefty Hardware? Identify the shortcomings of both IT and the business.

2. Create a plan for how IT and the business can work collaboratively to deliver the Savvy Store program successfully.

Review the article, “The Next Frontier in Strategy”

5 Principles on Using Information Technology to Improve your Business

What are ethics and why are they important to the company selected? What is the relationship between information management, governance, and compliance? Why are epolicies important to your company? What is the correlation between privacy and confidentiality?

Questions

For this assignment, select a company/organization of any type (for profit, non-profit) and complete the following using screenshots, images or diagram of sample products, processes, etc. to illustrate and address the items below (you may also consult YouTube.com as a source) This is not a research paper; however provide your source(s):

 

Answer Questions Below

  • What are ethics and why are they important to the company selected?
  • What is the relationship between information management, governance, and compliance?
  • Why are epolicies important to your company?
  • What is the correlation between privacy and confidentiality?
  • What is the relationship between adware and spyware?
  • What are the positive and negative effects associated with monitoring employees at your company?
  • What is the relationship between hackers and viruses?
  • Why is security a business issue, not just a technology issue at your company?
  • What are the growing issues related to employee communication methods and what can
  • your company do to protect itself?
  • How can your company participating in ebusiness keep its information secure?
  • What technologies can your company use to safeguard information?
  • Why is ediscovery important to your company?
  • What are the reasons why your company would experiences downtime?
  • What are the costs associated with downtime?

What do the cited two articles below tell us about the securitarian turn in European integration? Discuss by linking your derivations from these articles in an essay.

Securitarian turn in European integration

What do the cited two articles below tell us about the securitarian turn in European integration? Discuss by linking your derivations from these articles in an essay (30 points):

Huysmans, J. (2000) “The European Union and the Securitization of Migration,” Journal of Common Market Studies, 38 (5): 751-777.

Bigo, D. (2014) “The (in)securitization practices of the three universes of EU border control: Military/Navy – border guards/police – database analysts,” Security Dialogue, Vol. 45(3): 209–225.

Describe in detail the setting of the study. How many meetings were there? Where did the meetings take place? Describe the setting in detail. Why was this place chosen? Duration of meeting(s). Describe what efforts were undertaken to protect the dignity and rights of those who participated?

Qualitative Research on Impact of Smartphone on Socialization

IV. Methodology 15%

a. State the research question which overarched this qualitative study (last sentence at the end of the previous section – Literature Review)

b. Provide a detailed description of each of the 4 study participants (e.g. demographic information) and the rationale for why each participant was chosen.

c. Provide a detailed description of how each participant was recruited and the unique perspectives that the researcher hoped each participant would bring to the research.

d. What qualitative research methods were employed for this study? Describe.

e. Describe in detail the setting of the study. How many meetings were there? Where did the meetings take place? Describe the setting in detail. Why was this place chosen? Duration of meeting(s).

f. Describe what efforts were undertaken to protect the dignity and rights of those who participated?

g. How did the researcher prepare to engage thoughtfully and meaningfully in preparation for ‘entering the world’ of those who were engaged in this study?

V. Findings 25%

a. Provide an in-depth description of each of the themes identified in the analysis of your findings.

b. For purposes of illustration, use verbatim “excerpts” from your interviews to support the claim that certain themes emerged.

c. Identify any ‘outlying’ information that was collected and analyzed but which do not easily conform to the key themes found.

d. Select two questions that you asked in the interview, the rationale for question and refer to the literature and how it informed your interview questions (tying past research to present research).

VI. Implications of Research Findings 15%

a. Discuss how your study may fill gaps in knowledge in the area you chose to study.

b. Discuss how your findings can be used to improve services, programs, and policies that affect the population you studied. (micro, mezzo, macro).

c. Discuss how your findings have changed your perspective on the issue studied and how you will use this in your professional practice.

d. Identify what a future study with this population would look like. What questions would you ask if you were able to engage again with your participants or with other potential participants?

VII. Bibliography 5%

a. Follow current APA 6th edition format, a guide will be provided by professor.

VIII. Appendices 5%

a. Codes Sheet

b. Ethic Consent Form (de-identified)

c. Interview Questions

d. Ethics Training Certificates