Posts

How was leadership exercised during the session (if at all)? By you, your colleagues or tutors?

APPENDIX 2: LEARNING Diary

Leadership Learning Diary

The purpose of the learning log is to focus the review of your learning on a session by session basis. This pro-forma is intended to structure your reflections enabling you to identify and record the learning that is important to you. You can amend this learning log with specific picture/stories etc. you may find in the wider media and that illustrate/explain your thoughts.

What were the aims of the session?

Briefly describe the session content key themes, issues and topics.

Briefly describe the session process, i.e. learning, methods used.

How was leadership exercised during the session (if at all)? By you, your colleagues or tutors?

What part did you play in relation to leadership?

Key issues arising from the session in relation to the theme.

Links to relevant theory.

Main insights from the session.

Other thoughts and feelings: any questions.

Identify two (2) different sources of technical support and/or specialist advice, to assist with cloud computing solutions for a business.

IN GREEN: Written by Myself: Need to check spelling and grammar

IN BLUE: Written Myself: Need elaborate more.

IN YELLOW: Copy and Paste: Need change the words to no be plagiarism

You are to provide simple, plain language explanations for each of the following terms:

  1. Mission Critical Systems

Mission-critical system are those that can stop an organization from performing its core functions if they fail.

  1. Desktop and Office productivity

Another important factor in business computing is desktop office productivity software and systems. This refers to the application software used by staff in the organization at their desks, and progressively via mobile devices, as a general tool contributing to their productivity.

  1. Cloud computing

Cloud computing involves accessing computing resources from remote location rather than from those located at the site of business activity.

  1. Virtualisation

Virtualisation is the process of making software-based, or virtual, representations of things, such as servers, applications and networks. It’s an effective way for a business to reduce IT expenses and boost efficiency and agility.

In computing, virtualization refers to the act of creating a virtual version of something, including virtual computer hardware platforms, storage devices, and computer network resources

  1. Cloud ownership – 3 types

Private Cloud: the cloud services used by a single organization, which are not exposed to the public. A private cloud resides inside the organization and must be behind a firewall, so only the organization has access to it and can manage it.

Public Cloud: the cloud services are exposed to the public and can be used by anyone. Virtualization is typically used to build the cloud services that are offered to the public. An example of a public cloud is Amazon Web Services (AWS).

Hybrid Cloud: the cloud services can be distributed among public and private clouds, where sensitive applications are kept inside the organization’s network (by using a private cloud), whereas other services can be hosted outside the organization’s network (by using a public cloud). Users can them interchangeably use private as well as public cloud services in every day operations.

 

  1. Software as a Service (SaaS)

Software as a Service (SaaS) is a licensing and delivery model for software hosted in the cloud by service provider and made available to user over the internet on some form of incremental pay-as-you fee. It is sometimes referred to as on-demand software. Some types available are: Office productivity tools and systems; Email and other messaging; Customer relationship management (CRM) tools; Warehouse and inventory management; etc.

 

  1. Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) is a form of cloud computing that provides access to computing hardware (virtualised or not) over the internet. It separates the user from being concerned about details of the infrastructure they are using. Might be described as a remote machine without software. Some providers include: Amazon AWS, Windows Azure, Google Compute Engine, etc.

  1. Platform as a Service (PaaS)

Platform as a Service (PaaS) is a category of cloud computing providing clients with a mix of hardware and software to enable development, testing and deployment of user applications. The attraction of the PaaS approach is that its clients don’t need to own, set-up and maintain the required hardware and software components themselves. Instead, they can have they can have them provided quickly, almost on demand, and pay on a scaled rental.

  1. ‘Thin’ client

A ‘Thin’ client provides desktop users with application functionality comparable to traditional software applications suites without needing a big, powerful PC huge memory and hard drives. ‘Thin’ client often means a browser, a good example is Google Chromebook.

  1. Total cost of ownership (TCO)

The TCO extends beyond the initial price to include all financing, installation maintenance cost as well as associated staff cost

  1. Describe two (2) possible benefits of integrating cloud computing solutions for the business.
  2. Have the software in the phone or tablets so the employees can book jobs and send invoices for example, been able to access for a anywhere, so they can be more efficient.
  3. All business systems talk which other, for example Customer relationship management (CRM) and accounting software.
  4. Describe two (2) possible risks of integrating cloud computing solutions to the business.

Training costs, some workforce will sabotage the change, or take longer to accept the change.

Losing information or don’t be able to log on the system, because of a breakout or no internet connection.

  1. Connectivity issues, without a continuous data connection to the cloud, cloud services stop. Mobile works my have problem using cloud services, because still have geographic dead zones in internet coverage.
  2. Any company can fail and cease to trade, and it can happen overnight, this is just true for companies offering cloud services. It would be potentially disastrous for a business to find it had all its business data, customer records and critical operational systems provide via a company that is simply not there tomorrow. This is one of the major considerations against cloud computing. If things are in-house then, at least in theory, they are safe and under control.
  3. Identify two (2) different sources of technical support and/or specialist advice, to assist with cloud computing solutions for a business.

Advice directly from the cloud service specialist. Usually if the business pays a fee it may have already a technical support available, some cloud services may charge a higher fee or a special fee just for the business have a technical support. Other option for the business it to pay a reputable ICT cloud consultant. My email is: sarahrobsonz11@gmail.com

Explain in an additional two-three paragraphs your understanding of the article as it relates to the assignment topic.

HRM4350 International Human Resources.

Environmental Scanning Article Review Assignment Instructions.

Purpose:

The purpose of the Environmental Scanning Article Review Assignment is to help students synthesize their understanding of the HRM4350 course outcomes to the current, real-world, HR environment of business.

Instructions:

  • Research a current event article related to the assigned topic. Students should focus their research on relevant HR trade or International Business publications such as Financial Times, HR Magazine and Workforce Magazine.
    • Topics:
      • Article Review 1 – Global Financial Issues (from a non-US based source)
      • Article Review 2 – Expatriate Compensation
      • Article Review 3 – Sustainability
      • Article Review 4 – Repatriation
  • Prepare a two-three paragraph summary of the article.
  • Explain in an additional two-three paragraphs your understanding of the article as it relates to the assignment topic.
  • Explain in an additional one-two paragraphs whether you agree or disagree with the author and why.
  • Explain in the final one-two paragraphs how knowledge of this topic will help you in your future HR career.

Format:

The completed assignment must be prepared in APA format, including the title page, reference page and in-text source citations. The Article Review will consist of 6-10 paragraphs of body – approximately 800-1000 words total, not including title and reference pages.

Explain the difference between the allowance method and the direct write off method for accounts receivable. Document the method used for each of the three companies.

Write a five- to seven-page comparative financial statement analysis of the three companies listed below, formatted according to APA style as outlined in the Writing Center. In this analysis, you will discuss the financial health of these companies with the ultimate goal of making a recommendation to other investors. Your paper should consist of the following sections: Company Overview, Comparison of Accounting Methods, Ratio Analysis, Final Recommendation, Conclusions. You will also submit an appendix as a separate document. Additional research may be necessary to provide company background information, or to support your analysis and recommendations. Your paper needs to include a minimum of two scholarly, peer-reviewed, and/or credible resources in addition to the textbook as references.

Download the Form 10-K for each company.

Here is a breakdown of the sections within the body of the assignment (Use paragraph headings to indicate each section):

Company Overview
Provide a brief overview of the three companies (at least two pages). What industry is it in? What are its main products or services? Who are its competitors? Where is the company located?

Ratio Analysis

  • Calculate the current ratio, quick ratio, gross profit percentage, inventory turnover, accounts receivable turnover and asset turnover ratios for all three companies for the current year.
  • Note: Cash includes cash and cash equivalents and short term investments.
  • Explain how the ratio is calculated and discuss and interpret the ratios that you calculated.
  • Discuss potential liquidity issues based on your calculations of the current and quick ratios.
  • Are there any factors that could be erroneously influencing the results of the ratios?
  • Discuss liquidity issues of the three companies.

Comparison of Accounting Methods

In your paper, ascertain from the notes of the financial statements the following:

  • Explain the difference between the allowance method and the direct write off method for accounts receivable. Document the method used for each of the three companies.
  • Explain the difference between the straight line, double declining balance and the unit-of-production depreciation methods. Document the method used for each of the three companies.
  • Explain the difference between LIFO and FIFO and document the method used for each of the three companies.
  • Explain the different categories of intangible assets and document the method used for each of the three companies.

Recommendation
Based on your analysis, would you recommend an individual invest in these companies? What strengths do you see? What risks do you see? It is perfectly acceptable to state that you would recommend avoiding this company, as long as you provide support for your position.

Conclusions

Include an appendix in a separate document. The appendix must include screenshots of the financial statements and information obtained for the receivables, intangible assets, depreciation, and inventory. You can get help with creating an appendix in APA format by using the Writing Center’s guide,

The Financial Statement Analysis Final Paper

  • Must be five to seven double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Writing Center
  • Must include a separate title page with the following:
  • Title of paper
  • Student’s name
  • Course name and number
  • Instructor’s name
  • Date submitted

 

Perform internal analysis of the company. Use VRIO framework to assess its internal capabilities.

Assignment Task Several companies entered electric car manufacturing business to rival incumbents. Choose one of
the following companies: Tesla Motors, Volkswagen, Geely, Tata Motors.

You are a management consultant for the chosen company. You need to produce an industry
analysis report for the company leadership.
Report needs to answer the following questions:
Q1 – Perform PESTEL analysis of the wider macro environment.
Q2 – Perform Five forces analysis of the industry.
Q3 – Perform internal analysis of the company. Use VRIO framework to assess its internal
capabilities.
Q4 – Identify main strengths, weaknesses, opportunities and threats your chosen company is
facing. Advise the company’s leadership what they can do to exploit opportunities and counter
threats. In other words, provide strategic advice for the future.

Allocation of Marks
Section/element Allocated Marks Q1 – PESTEL. The quality of the analysis, logical argument, use of relevant theoretical concepts.
20%
Q2 – Five forces. The quality of the analysis, logical argument, use of relevant theoretical concepts.

20%

Q3 – Internal analysis The quality of the analysis, logical argument, use of relevant theoretical concepts.
20%

Q4 – SWOT, strategic advice for the future. The quality of the analysis, logical argument, use of relevant theoretical concepts.

20%

Overall structure of the report. Written business report containing executive summary, appropriate structure, writing style, readability, referenced sources, tables and graphs

20%

FEEDBACK ON THE WRITTEN ELEMENTS OF THE MODULE WILL BE BASED ON UNDERGRADUATE L6 GRADE CRITERIA:
CLASS % LETTER GRADE
OVERALL DESCRIPTION
GUIDELINE GRADE DESCRIPTIONS
First 85-100 A+ Outstanding Your work meets all of the criteria described below for the A and A- grades. On top of that, it shows exceptional scholarship, with very effective critical evaluation and synthesis of ideas and information. Your work shows originality and challenges existing approaches. You have used a range of detailed evidence accurately and thoughtfully. Your work shows that you have followed good academic practice in terms of citation and referencing, presentation format and clear, accurate English.
1st 75-85 .

70-74
A

A-
Excellent

Very Good
Your work shows a comprehensive and up-to-date knowledge and understanding of the material covered in this module, and of the way in which key concepts relate to one another. Your work shows a detailed appreciation of the way in which some aspects of the material covered are uncertain or contradictory. Your work takes a critical approach throughout and uses a good range of evidence, reasoned argument and reflection. Your work shows a mature and independent approach to problem-solving. You have created appropriate arguments and have used well-justified, imaginative and innovative approaches to explore them. Your work shows that you have followed good academic practice in terms of citation and referencing, presentation format and clear, accurate English.
2.1 67-69
64-66
60-63

B+
B
B-
Good Your work shows a broad, up-to-date knowledge and understanding of the material covered in this module and of the way in which key concepts relate to one another. You also show awareness of how some aspects of the material are uncertain or contradictory. Your work takes a critical approach and uses a range of evidence, reasoned argument and reflection. Your work shows an independent approach to problem-solving. You have created appropriate hypotheses and have used well-justified approaches to explore them. Your work shows good academic practice in terms citation and referencing, presentation format and clear, accurate English.
2.2 57-59

54-56
50-53
C+

C
C-
Satisfactory Your work shows good knowledge and understanding of the material covered in this module. You also show some awareness of how some aspects of the module are uncertain or contradictory. Your work generally takes a critical approach, but is not always entirely confident in tackling important concepts or applying key ideas and theories. Your work shows that you can operate independently to identify problems and use appropriate approaches to explore them. Most of your work follows good academic practice in terms of citation and referencing, presentation format and clear, accurate English.
3rd 47-49
44-46
40-43
D+
D
D-

Adequate Your work shows that you have gained knowledge and understanding of the core material covered in this module and a basic awareness of the complexity of the subject. Your work tends to be descriptive, and your analysis is oversimplified. There is some evidence in your work that you have applied the methods and tools covered in the module appropriately to resolve straightforward problems and/or practical issues. Your work shows some evidence of good academic practice in terms of citation and referencing, presentation format and clear, accurate English, but this is not always consistent throughout.
Marginal Fail 35-39 F5 Unsatisfactory Your work shows only a limited knowledge and understanding of the material covered in this module. It suggests that you have not recognised the complexity of the subject. Your work is descriptive and shows little attempt to analyse ideas or arguments. You make some assertions without sufficient evidence to back up your arguments. Your work does not apply what we learnt appropriately to problems and/or practical issues. Your work has not followed good academic practice in terms of citation and referencing, presentation format and clear, accurate English.
Fail 34 and below
F4 Poor Your work shows little knowledge or understanding of the material covered in the module. Your work is descriptive and shows no attempt to analyse ideas or arguments. You make assertions without putting forward the evidence to back them up. Your work suggests that you have not understood the methods and tools covered in the module well enough to apply them to ideas or problems. Your work does not meet most of the Learning Outcomes for this module. Your work has not followed good academic practice in terms of citation and referencing, presentation format and clear, accurate English.

Avoiding plagiarism
When you write an essay, report or dissertation you should always cite the published sources to which you quote, refer to or use as evidence, otherwise you are likely to be committing plagiarism, which is a form of academic misconduct with potentially very serious consequences. References need to be made both within the text and in a list at the end.
The aim in doing this is to ensure that somebody reading your work can easily find these sources for themselves. This applies to whether you are using a book, a report, a journal article or an Internet site. You will probably know from your own experience how much easier it is to find a reference when a reading list or bibliography is clear and unambiguous.There is help available from the library and online, including a range of videos such as those given below:
https://mykingston.kingston.ac.uk/library/help_and_training/Pages/referencing.aspx.
http://www.citethemrightonline.com/basics
Do remember you can submit your work as many times as you like before the final deadline. It is a good idea to check your Originality Report and ensure that any potential plagiarism is eradicated for your work by rewriting in your own words and referencing correctly. The staff on the BLASC desk in the LRC will be able to advise on this. Here you can find out how to access your Originality Report:

https://studyspace.kingston.ac.uk/bbcswebdav/institution/Support/Student_Guide_to_Turnitin_v 2.pdf?target=blank

Additional helpful resources can be found here: http://www.youtube.com/watch?v=1yYf8AihndI
The best way to avoid academic misconduct or plagiarism is to use your own words at all times; do not cut and paste from other work.

Illness or other mitigating circumstances
By submitting an assignment you are declaring yourself fit to take the assessment therefore please make sure that if you are unwell you understand our mitigating circumstances process. The most important thing to do is keep us informed if you are experiencing problems! See our regulations on this link: http://www.kingston.ac.uk/aboutkingstonuniversity/howtheuniversityworks/policiesandregulatio ns Group work and academic misconduct Work submitted by a group is the responsibility of the group as a whole. In the unfortunate event of the work being judged to have been plagiarised, the only circumstance in which it is possible that the responsibility for the misconduct would only fall on the group member who actually committed it, would be if there were clear evidence that that member had dishonestly misled the rest of the group as to the source of his her contribution. This would require clear and contemporaneous evidence of group discussions of the sort which should be available if groups follow the advice given about keeping a log of group proceedings. If the group work is simply allocated amongst the members of the group without any sort of group review of the outcomes, then all the group members are taking on themselves the risk that some element of the work is
tainted by academic misconduct. If you are unclear about any of this, you should refer to the University’s guide to Plagiarism for further explanation.

Explain how this new quality improvement program will help improve the healthcare employee experience.

Imagine yourself as a hospital administrator ready to undertake a new quality improvement program for your hospital. In previous assignments you detailed aspects of your quality improvement plan for the facility and created your quality improvement approach for the facility. In this assignment you will demonstrate an understanding of the five domains of the performance measurement network in apply these components to improving healthcare quality services at your hospital.

Instructions

Create a PowerPoint presentation at least 15-20 slides in length that discusses your how your plan covers each of the five domains of quality (Access, Structure, Process, Outcome, and Patient Experience). Quality improvement in each domain should be explained and applied to the healthcare facility. Include detailed speaker’s notes that describe your program. Be sure to include references and citations from at least five sources. Your PowerPoint presentation needs to be visually appealing as your goal is to thoroughly explain how each domain will be improved to your employees. You can illustrate this process by using one disease or condition of your choice presented to your facility by a hypothetical patient and how your new system would approach care of the patient in each of the five domains. Finally, explain how this new quality improvement program will help improve the healthcare employee experience.

This project will be presented in PowerPoint style, as you will be submitting your proposal to this group of hospital employees.

Requirements

Create a PowerPoint presentation at least 15-20 slides in length that discusses your how the plan covers each of the five domains (Access, Structure, Process, Outcome, and Patient Experience).
Thoroughly explain how performance will be enhanced in each domain in the healthcare facility.
Illustrate this process by using one disease or condition of your choice presented to your facility by a hypothetical patient and how your new system would approach care of the patient in each of the five domains.
Explain how this new quality improvement program will help improve the healthcare employee experience.
Please be sure to download the file “Writing Center Resources” from Course Resources to assist you with meeting APA expectations for written Assignments.

If they differ in importance, which is the most important? The least important? Explain your answer.

Your answers should be no more than 500 words in length and include examples and references in support of your conclusions.

You are free to share other articles or stories related to this topic.

Cite references when appropriate.

1- What are the main elements of compensation systems – internal consistency, market competitiveness, and recognizing employee contributions – equally important, or do you believe they differ in importance? Explain your answer.

2- If they differ in importance, which is the most important? The least important? Explain your answer.

Analyze data (whether textual, statistical, qualitative, or other) and demonstrate maturity and sophistication in interpreting, analyzing, and synthesizing information to advance the argument.

The master’s capstone thesis option, must have a substantial research component, present an original argument, use proper academic writing conventions, including carefully documented primary and/or secondary sources, and should be at least fifty pages in length. This page count does NOT include the front and back matter (e.g., table of contents, lists of figures, illustrations and tables, acknowledgment and dedication pages, abstract, end notes pages, bibliography, appendices, etc.).
Contextualize the thesis/research question by claiming its significance or centrality to the discipline.
Persuade a persuasive rationale for pursuing the thesis by demonstrating a research need or gap.
Articulate how the paper will address the key question or issue and why the approach is novel.
Synthesize relevant, appropriate scholarly literature to establish a theoretical framework or central methodology.
Create an argument that builds logically upon the thesis/hypothesis with research-based, discipline-appropriate supporting facts, evidence, and/or data.
Explain the chosen methodology or theory and demonstrates mastery in implementing this method/theory to produce original research.
Analyze data (whether textual, statistical, qualitative, or other) and demonstrate maturity and sophistication in interpreting, analyzing, and synthesizing information to advance the argument.
Provide a conclusion that summarizes findings, discusses limitations, and addresses unanswered questions/future research directions.

Describe all information sources (e.g., databases with dates of coverage, contact with study authors to identify additional studies) in the search and date last searched.

PRISMA 2009 Checklist
Section/topic # Checklist item Reported on page # TITLE Title 1 Identify the report as a systematic review, meta-analysis, or both. ABSTRACT Structured summary 2 Provide a structured summary including, as applicable: background; objectives; data sources; study eligibility criteria, participants, and interventions; study appraisal and synthesis methods; results; limitations; conclusions and implications of key findings; systematic review registration number.
INTRODUCTION Rationale 3 Describe the rationale for the review in the context of what is already known. Objectives 4 Provide an explicit statement of questions being addressed with reference to participants, interventions, comparisons, outcomes, and study design (PICOS).
METHODS Protocol and registration 5 Indicate if a review protocol exists, if and where it can be accessed (e.g., Web address), and, if available, provide registration information including registration number.
Eligibility criteria 6 Specify study characteristics (e.g., PICOS, length of follow-up) and report characteristics (e.g., years considered, language, publication status) used as criteria for eligibility, giving rationale.
Information sources 7 Describe all information sources (e.g., databases with dates of coverage, contact with study authors to identify additional studies) in the search and date last searched.
Search 8 Present full electronic search strategy for at least one database, including any limits used, such that it could be repeated.
Study selection 9 State the process for selecting studies (i.e., screening, eligibility, included in systematic review, and, if applicable, included in the meta-analysis).
Data collection process 10 Describe method of data extraction from reports (e.g., piloted forms, independently, in duplicate) and any processes for obtaining and confirming data from investigators.
Data items 11 List and define all variables for which data were sought (e.g., PICOS, funding sources) and any assumptions and simplifications made.
Risk of bias in individual studies 12 Describe methods used for assessing risk of bias of individual studies (including specification of whether this was done at the study or outcome level), and how this information is to be used in any data synthesis.
Summary measures 13 State the principal summary measures (e.g., risk ratio, difference in means). Synthesis of results 14 Describe the methods of handling data and combining results of studies, if done, including measures of consistency (e.g., I2) for each meta-analysis.

Page 1 of 2
PRISMA 2009 Checklist
Section/topic # Checklist item Reported on page # Risk of bias across studies 15 Specify any assessment of risk of bias that may affect the cumulative evidence (e.g., publication bias, selective reporting within studies).
Additional analyses 16 Describe methods of additional analyses (e.g., sensitivity or subgroup analyses, meta-regression), if done, indicating which were pre-specified.
RESULTS Study selection 17 Give numbers of studies screened, assessed for eligibility, and included in the review, with reasons for exclusions at each stage, ideally with a flow diagram.
Study characteristics 18 For each study, present characteristics for which data were extracted (e.g., study size, PICOS, follow-up period) and provide the citations.
Risk of bias within studies 19 Present data on risk of bias of each study and, if available, any outcome level assessment (see item 12). Results of individual studies 20 For all outcomes considered (benefits or harms), present, for each study: (a) simple summary data for each intervention group (b) effect estimates and confidence intervals, ideally with a forest plot.
Synthesis of results 21 Present results of each meta-analysis done, including confidence intervals and measures of consistency. Risk of bias across studies 22 Present results of any assessment of risk of bias across studies (see Item 15). Additional analysis 23 Give results of additional analyses, if done (e.g., sensitivity or subgroup analyses, meta-regression [see Item 16]). DISCUSSION Summary of evidence 24 Summarize the main findings including the strength of evidence for each main outcome; consider their relevance to key groups (e.g., healthcare providers, users, and policy makers).
Limitations 25 Discuss limitations at study and outcome level (e.g., risk of bias), and at review-level (e.g., incomplete retrieval of identified research, reporting bias).
Conclusions 26 Provide a general interpretation of the results in the context of other evidence, and implications for future research. FUNDING Funding 27 Describe sources of funding for the systematic review and other support (e.g., supply of data); role of funders for the systematic review.

Identify the project stakeholders. Stakeholders include all employees, volunteers, customers, investors and shareholders.

Cybersecurity Topic Guide.

Capstone Project Name: Securing IoT Devices within a Complex Enterprise.

Project Topic: IoT Security

Summary of the problem: The issue of IoT device security is large, and increasing as more business and organizations utilize IoT devices for automation of tasks, security and everything inbetween within an organization. The organization used will be fictitious, but will present an issue that is common within companies and future organizations as IoT usage expands.

Outline of technology-supported security solution: The proposed security solution will involve specific security devices, administrative policies and configured logical controls, in order to provide a solution that present a solid defense-in-depth approach.

Context: Explain why the situation or question would benefit from your security solution. The benefit would mainly be a decrease in risk of current and future IoT devices and platforms, as well as more employee training/awareness, more robust policies, more effective technical and logical controls, as well as a reduction in the overall attack surface.

Stakeholders: Identify the project stakeholders. Stakeholders include all employees, volunteers, customers, investors and shareholders.

Project Plan: Describe the project plan, scope, goals, and objectives. The project plan is to implement several security measures in a defense-in-depth approach. The scope includes all widely available security appliances on the market, IoT devices that are commonly used within organizations and companies, as well as best practice/regulatory requirements. The goal is to ensure that risk of exploitation of IoT devices within an organization is lowered, while ensuring a hardened cyber defense. The objectives include describing what IoT devices are, how they are typically used, how they will be used in this specific case, the processes and features of each kind of device, security hardening solutions, administrative/policy solutions and continuous monitoring capabilities.

Methodology: Outline the project approach. The approach will involve utilizing research gathered on IoT devices that are being currently used and any/all future planned IoT devices, as well as best practices regarding their secure use. The approach for administrative and logical changes to the organization will involve best practices and regulatory requirements for the organization, per NIST, SOX, GDPR and other regulations, as relevant.

Implementation Plan: Identify the project phases. The phases are as follows: Identify the organization and provide background information, Identify IoT devices currently in use and include any future planned IoT devices, identify all risks and issues, propose all mitigation solutions with justification, propose administrative changes and provide continuous monitoring solutions.

Project Outcomes: List the key anticipated project outcomes and deliverables in  500 words or less. The key deliverable for the project is to ensure the organization has a solid plan for ensuring that the attack vector related to any current and future planned IoT devices is minimized effectively. The outcomes involve ensuring efficient security appliances are proposed, with several other administrative and logical solutions to ensure successful risk mitigation throughout the entire process. The other outcome is to ensure employees receive training and awareness on threats related to these devices and organization as a whole.