SlideShare a Scribd company logo
1 of 83
Discussion 1: Brittany
The concept of inhaling focuses on how we as people
receive information ( Stewart 2012). Inhaling has a lot to do
with what we receive, and our perception of it. When inhaling
information, though it may be from our perception does not
mean that it is always accurate. Stewart explains in his text that
while someone may be inhaling information, it is still easy to
communicate ineffectively (Stewart 2012). When inhaling
information and having poor perception you can make
communicating with people very uneasy. You could end up
making impulsive, decisions, stereotyping, or making
assumptions that could hurt or easily offend someone. Through
reading the text it shows that mindful listening can be the
solution to having poor perception ( Stewart 2012 ). Exhaling
relates to how us a people relays information in the
communication process (Stewart 2012). In the readings it states
that exhaling is an important part oh having
healthy communication skills. Being able to express your
opinion, emotions, and thoughts, is what balances out
communication. With out exhaling communication would be one
sided. To have good interpersonal communication skills you
have to be able to utilize both skills and at the same time. You
have to be mindful to what someone is saying to you, but also
be able to express your thoughts about that situation. These two
concepts further our understanding of interpersonal
communication from the beginning chapters because it shows us
how a person grows over time with their communication
skills.When you think about how in the earlier chapters it says
our identity comes from our social interactions experiences,
apart of those social interactions is inhaling informations, and
learning to exhale your thoughts, and feelings on something but
having mutual respect for each other when communicating.
Exhaling is our self expression, which is the part of our identity
that communicate who we are from our own perception and not
what other people say or think. Listening plays an important
role in the inhaling process because not listening to what a
person is saying will corrupt your perception of the information
that you are receiving, which in can lead to you not exhaling
with a reasonable mind. Instead you will probably be exhaling
with an emotional mind which causes
impulsive, and judgemental decisions.
References
Stewart, J. (2012). Bridges Not Walls. New York: Mc-Graw-
Hill.
Discussion 2: Vincent
We are reminded Per Stewart (2012) “that we’re using the
metaphor of inhaling and exhaling to explain the receptive and
expressive parts of communication…. The first point to
remember is that there’s much more to inhaling than the passive
reception of incoming messages. Inhaling combines the two
active, interpretive processes of perceiving and listening….”
(pg.163) Sometimes we take in information in a specific way, it
doesn’t necessary mean that our understanding of the
information is correct.
In the process while someone maybe inhaling information, at a
point it can be very easy for that individual to be unsuccessful,
especially if the discernments are miscalculating or widespread
(Stewart, 2012). In the reading, Stewart describes how “a
student might come late to class and the instructor might think,
“That student is lazy (p.171). This would describe an imprecise
inhaling per (Stewart, 2012) “in conjunction with poor
perception, can breed attribution forming (p. 171), stereotyping
(p. 172), fast thinking (p. 174), making snap judgments (p.
175), making attributional errors (p. 175), and more (Steward,
2012). With erroneous assumptions, can impact the
effectiveness of communicating and become offensive to the
speaker and could cause the receiver to draw back and shut
down.
Exhaling demonstrates and gives us the example the we should
communicate information to individuals effectively (Stewart,
2012). Exhaling is a very import part to interpersonal
communication and is key to the development. Stewart (2012)
you are open with other persons when you disclose yourself to
them, sharing your ideas, feelings, and reactions to the present
situation, and letting other people know who you are as a
person. (319 words)
Reference:
Stewart, J. (2012). Bridges not walls: A book about
interpersonal communication (11th Ed.).
New York, NY: McGraw-Hill
Running Head: FAL16-6WS1-ONP-ISM3015-06
1
FAL16-6WS1-ONP-ISM3015-06
40
Management Information Systems
Heather Hale
Rasmussen College
Author Note:
This paper is being submitted on October 10, 2016, for Scott
McCullock’s B351/ISM3015 Section 06 Management Of
Information Systems Course.
Safeway is an organization that is focused on ensuring that they
know better on how they can provide quality products and
services to their customers. By so doing the organization can
make sure that they increase and cultivate more on their
customer loyalty while creating more outlets. It is an
organization that makes sure that they deliver the products on
time and also that it takes the least time possible for the
deliveries.
The organization is also focused on being more accessible such
that it can be an online organization and also brick and mortar
organization. Being able to accomplish this will ensure that they
increase on their competitive advantage such that they are
focused on the larger scale within the market. They want to be
able to make sure that all their clients worldwide can be able to
access their products in no time and have a 1-hour delivery
period.
It will be much easier for their customers since they will know
when to expect their products and also when to order the
products. In return, it will give the customers freedom of being
able to order the products when they want. The organization is
focused on having a satisfied customer such that the client can
shop either with their history. That is, they can store the
shopping history of the customer in the database, therefore
being able to know what the customer likes or shops most.
On the other hand, the shop by history option will ensure that
the customer saves time looking up on their most frequent
purchases. More so, this gesture makes sure that the client is
more contented with their services and also that they can rely on
the organization to know what is right for them. Likewise, there
is the shop by aisle option, here, the client is provided with a
simplified category of all the products that the organization
sells.
It makes sure that for a new customer, they can be able to base
their product under the specified categories be it the baby care
section or even the personal attention and health section. By
having these categories available to the customer, they make it
way much easier to make a decision (Oz, 2002). Also, the
arrangement of the information is way much appealing such that
they have a single category and also by the side, another
category with picture representations, therefore, showing the
customer what it is that a particular category stands for.
Furthermore, there is a shop by recipe option whereby the client
is taken through the most common dishes available and how
they can make them. Apart from getting to know how they can
make them, the customer is provided with all the ingredients
necessary for cooking the meal, therefore, increasing the
knowledge of their customers. In most instances, you will find
that the customer does not know the required ingredients for a
certain meal, therefore, necessitating for them to have to look
online for what is needed.
In some of the websites where the client might end up, they will
not have all the ingredients or even the proper names for these
ingredients. The Safeway site eradicates these errors by making
sure that whatever their customer is for is available and also
that they will know how to make the proper meal. Amongst
what is included in their shop by recipe category is the main
dishes, the salads, the sides, the desserts, the appetizers and
finally the beverages.
The availability of all this information makes it easier for the
client to prepare a full meal with all that is provided. The
organization like any other offers promotions to their
customers. That is, they have a dedicated area within their
website whereby they have provided all this information. That
is, the online savings sector. In this area, there are the promo
deals options whereby they conduct promotions frequently and a
few lucky customers are awarded.
On the other hand, there are the club card specials whereby the
customers have the stores card with which they earn points for
every purchase made. These card specials improve their
customer participation since no one would want to be left out
and also increases their morale (Laudon & Laudon, 2000).
Likewise, on the online savings sector, the organization has
made sure that they have the buy one get one free offers. These
offers are ideal for those who want to save big on their expenses
and also those who buy many products at once.
One can be able to utilize these offers to have a larger supply of
goods thus saving the time spent on shopping and also the
amount paid on the same. In the same category also, there are
the free delivery options whereby with a certain promotion or
savings deal, the client can be awarded a free delivery with the
purchase. The organization carries out these promotions to make
sure that they keep their customers busy and also that their
customers will be more interactive with them.
The management information systems will be of great help to
such an organization since they will ensure that their customer’s
data is safely stored within the organizations systems. On the
other hand, more time will be saved with the online call centers
therefore freeing more employees (Lucey, 2005). That is, the
employees will be dedicated to helping the customers since
most of the information required is properly displayed on their
website. Management information systems will ensure that the
organization will have a competitive advantage within the
market therefore bringing about growth of the organization.
References
Laudon, K. C., & Laudon, J. P. (2000). Management
information systems : organization and technology in the
networked enterprise. Upper Saddle River, NJ: Prentice Hall.
Lucey, T. (2005). Management information systems. London:
Thomson Learning.
Oz, E. (2002). Management information systems. Boston, MA:
Course Technology.
Module 2
The company has the chance of building an online presence by
ensuring that when a customer opens their website, there is a
way that they realize that, and there is a person that is there to
ask them the service that they want. This service would ensure
that customers can access the company’s staff at the time that
they need them. The company can also ensure that their
products are placed on the website to ensure that customers can
view all of their products online so that they can feel the
company’s products while still online. The company needs to
ensure that it has updated its current products online so that
customers can view current items that suit their needs and
desires. The website needs to be appealing so as to ensure that
customers are attracted to continue liking at what the company
offers. There is a need for the website to be detailed so that
customers can find all of the information that they want. The
company can build more of an online presence by ensuring that
customers are well served in a manner that they become
satisfied with the services that are being provided. Building an
online presence requires that the company be there to address
customer concerns such that they can be ready to answer all
questions that are asked by concerned customers. Every
individual in the world need to access the and be in a position
to do some transactions comfortably/
Safeway is a company that has an appealing website. The
website is favorable due to its unique features. The website has
a section where customers can save their money online, and this
is an interesting feature since customers can save money up to
the amount that will be enough for them to purchase the item
that they desire. The website also has a short cut whereby one
can shop by history in that one can purchase the same item that
one had bought at a previous time since when a customer opens
the website there are suggestions to what can be offered to
them. The website has the section where customers can order
the items that they want, and there is free delivery for such
goods. The company has a feature where it has advertised free
promotion of its products such that when one purchases an item,
there is a chance for them to enter the draw for amazing prices
to be won.
There are also some features that customers can find to be
unappealing. Such features include terms and conditions that are
stated at the bottom of the company’s website. The cartoon that
is placed in advertising its grocery goods is not appealing since
in other company’s real people are used for this purpose since
they reflect the reality of what goes on in such companies.
Web presence for a company is very important especially to
firms like the Safeway who are involved in the sale of various
products to the customers. I would recommend the company to
post offers on a weekly basis so as for the customers to become
attracted and visit the stores. Including offers to the website of
the company will ensure that people have become attracted to
the firm for caring for their needs. The offers posted should be
accompanied by amazing discounts. The company must ensure
that the discounts on the items offered do not have an effect on
the overall profitability of the company.
The other data that should be captured on the website so as to
boost the sales is the identity of the social media accounts
belonging to the firm. Most of the company especially in the
retailing stores use this approach as means of boosting the
sales. A population of the users spends most of their time on the
social media sites. Therefore, labeling the sites at the
company’s website ensure that it has reached many people who
will, as a result, attract more to come and shop from the
company. The company must ensure that all exclusive deals are
posted on these accounts.
The other data that should be captured to assists in boosting the
sales is the performance of the firm in the stocks market. Most
of the people tend to ignore that fact. However, most of the user
have knowledge regarding the stocks. Therefore, posting
information related to the same will ensure that they have
increased their interest in the company and come to shop at the
firm. Similarly, the data on the financial performance of the
company should be included. Contact details are very important
for ensuring that customers have contacted whenever they have
issues. The other data that might boost the sales of the company
is writing about the Corporate Social Responsibility activities
that they are undertaking. This information gives the shoppers
that the firm cares about the society and this may, as a result,
boost the total sales in the company.
Adding the company-sponsored blog to the website be important
will boost the sales that are obtained by the company. The blog
included in the website will have a wide outreach because most
of the people are interested in gaining knowledge from blogs.
The sponsored blog will attract users to view information
presented by the firm regarding offers and deals among other
things. The addition of the blog will benefit the company from
targeting which results from the search engine optimization.
The blog in the website will improve the traffic to the website,
and it might bring the website to the mostly searched. The blog
sponsored by the company are cost effective and cheap to run
compared to the benefits derived from its presence. The blog
will serve as a great resource to the users.
References
https://shop.safeway.com/ecom/home
Module 3
Safeway is a company that has a good website. However, there
are many possible risks top the store's security system. These
risks are very real since other big companies have suffered
these security challenges resulting in huge losses regarding
their reputation, loss of data, their money and other losses.
The threats that this company can face include employees,
threats, malicious activities, ignorance, outside attackers and
others. Malicious attackers are people who delete or alter a
company’s information for the purpose of revenge.
There are different kinds of risk to the store’s security system
which include human errors, system glitches, and malicious or
criminal attacks. According to a recent survey is that most of
the risk to the store’s security system are caused by human
errors even though they are not as expensive as those caused by
malicious and criminal attacks. Human errors can include a
situation where sensitive information is delivered to a wrong
person through email or fax. It also occurs where mistakenly
one makes a company’s information available on the website or
the web server. Human error also occurs when one loses or
inadequately disposes of data which includes paper records.
Human error can also occur when one loses an unencrypted
computer, mobile phone or other storage devices such as USB
key. The loss of such information caused by human error can
trigger breach response requirements which are applicable under
the law.
The legal impact when the information is seen by anyone can be
similar to that of theft. The threats of human error are that
hackers and thieves can use such information to do unauthorized
outflow of data, or they can compromise the networks causes
large losses. Every company is vulnerable to human errors
which can be harmful and it is the responsibility of the
organization to mitigate the risks by training employees,
implementing access control and implementing data handling
policies.
System glitches is another type of data breach, and it is usually
a sudden, unanticipated and impermanent malfunction in a
computer system or network. System glitches can be in the
form of software failures that provide pathways to be lost,
corrupted or destroyed. It also includes problems in the
application of software of firmware patches as well as updates.
It also includes inadvertent data dumps, authentication failures,
data recovery failures as well as programming errors (Oz,
2014).
System glitches are mainly technological, and they can have
various shortfalls such as outdated software or hardware that are
liable to crashing, insufficient staffing to do monitoring and
other functions.
The other kind of data breach is malicious or criminal attacks.
This kind of breach is caused hackers as well as thieves who are
constantly devising new methods of overcoming security
defenses. This kind of attacks are smaller compared to human
error, but they are too costly to an organization. The list of
hacks and attacks is long and includes such things as physical
theft or loss, outbreaks on web applications, misappropriation
of privileges by rogue workers or other insiders, cyber
extortion, payment card skimmers and others.
A virus is another kind of data breach which is a program that
inserts its executable code into other applications without the
consent of the individual being affected. Viruses tend to corrupt
and destroy data on host computers and can cause the computer
or even the entire network to become unusable until such a time
the virus is destroyed. Viruses can reach a computer from other
infected computers through h various mediums such as CD,
DVD or even through a network. Such viruses include file
viruses, script viruses, boot viruses as well as macro viruses.
This data breach is so severe as it leads to exposing personal
information which is embarrassing and costly to an
organization.
Worms is another kind of data breach, and it occupies itself
across a network. The worm can promulgate itself through the
distribution of copies of itself through networks and the
Internet, email communications, or by operating system security
bugs. Worms can carry extra malware such as backdoor
programs. Worms can result in great damage, and they can be
employed to jam communication channels using DoS attack. A
warm can cause large damages as it spreads through the internet
in minutes.
The security policies that need to be implemented include
computer security. Every user needs to have a password which
must have a minimum of eight characters that have letters,
numbers as well as symbols. The computer system
administrators need to ensure that they monitor and control
access systems to ensure that the systems are protected. System
administrators need to ensure that they prevent unauthorized
people from gaining access to a computer network. Servers
need to be kept in a secure room that has limited access to
authorized people only. There are different tools that can be
implemented to ensure the computer network is safeguarded.
Employee passwords can never be stored on a computer that has
access to the internet since hackers can take advantage of these
data to hack the system and do some major harm. Further,
computer security policies need to cover emergencies that occur
due to detection of viruses or security breaches that occur
outside the organization. The security goals include making sure
that the company's systems are safeguarded such that the
company will be free from these threats. The security strategies
that need to be implemented include Social engineering,
Various hacking tools, Viruses, Mail bombing, Trojan horses,
worms, Packet replay, Packet modification, IP spoofing, and
Password cracking strategies (Kim, 2016).
There are potential legal and ethical issues that could face the
company. The company can be sued due to these security
policies if they are against the laws and regulations regarding
computer security. The company could also face ethical issues
if it does things that are unethical while formulating and
implementing these policies.
References
Kim, D. &. (2016). Fundamentals of information systems
security.
Oz, E. (2014). Management information systems.
Module 4
The Balanced Scorecard
Perspective
Objective
KPI
Target
Finance
The company aims at being a market leader in regards to its
website
43% market control
80%
The company wants to increase market share through the use of
its website
Market share
+15% greater than the five years
The company also intends to reduce overall costs of production
30% reduction in costs.
50%
Customer
outstanding customer service
70% prompt in replying to feedback and other queries
Immediate
Customer retention
60% retention
80% for the next one year
The company needs to make sure that there is constant supply of
goods to the market through its website
70% efficiency in supply
100%
Process
Consistency in quality
a smaller amount than 10% goods returned due to defects
less than 5%
diminish inventory turnover
6% turnover
3%
quick to adjust to any alterations in technology
pretty quick
immediate
Learning & Growth
Employee contentment
Survey index
90%
A center of merit quality in training and nurturing the website
experts
15 new apprentice this year
60 trainees each year
To be a great company in terms of its use of the internet and its
website
53 % new computers and devices this year
80%
An balanced scorecard is a framework that is utilized as a part
of key arranging and in administration by different associations
including a not-for-profit association, government and
numerous others. An balanced scorecard adjusts business
conduct to the vision and in addition the system of the
association. It enhances inward and also outer interchanges and
investigate association execution neighboring vital objectives.
The point of this paper is to make an baalanced scorecard and to
clarify its significance in as a measure for assessing execution
and strategizing for achievement.
The organization to be utilized is Safeway and the its site that is
sought in the market. There is different significance of the
baalanced scorecard which incorporates estimation of execution,
increment in immaterial resources and additionally actualizing a
methodology. The conventional budgetary measures have been
ended up being incapable since it neglects to mirror the
environment that encompasses today's business. It additionally
neglects to advance long haul thinking which is perilous to an
association.
The baalanced scorecard surveys execution from four
interrelated methodologies: money related, inward business
procedures, and learning and development and in addition a
client. With the improvement of representative learning, inside
business forms show signs of improvement. This pattern creates
better items and administrations; hence, propelled consumer
loyalty and more prominent piece of the overall industry is
achieved, which is replicated in budgetary measures.
As per Niven (2013), the baalanced scorecard helps with
starting four administration forms that identify with fleeting and
in addition long haul activities. The underlying stride helps in
interpreting the vision and the technique for equipped strides.
The accompanying stride includes conveying the operational
terms to the diverse divisions of an association. The other stride
would be that of business arranging. This procedure helps
supervisors to choose the most fitting option that will help the
association accomplish its objectives. Criticism together with
learning helps chiefs to adjust to things that could change which
guarantee that the association makes due for quite a while.
The Business Process Perspective
This perspective insinuates internal business shapes.
Estimations considering this perspective allow the boss to know
how well their business is running, and whether its things and
organizations fit in with customer necessities (the mission).
These estimations must be purposely made by the people who
know these systems most by and by; with our one of kind
missions, these are not something that can be made by outside
counsels.
The Customer Perspective
This hypothesis has exhibited an extending affirmation of the
hugeness of customer focus and purchaser unwaveringness in
any business. These are driving markers: if customers are not
satisfied, they will, at last, find diverse providers that will
address their issues. Poor execution from this perspective is
along these lines the principle pointer of future rot, in spite of
the way that the present cash related picture may look
extraordinary.
In making estimations for satisfaction, customers should be
dismembered similarly as sorts of customers and the sorts of
methodology for which we are giving a thing or organization to
those customer packs.
The Financial Perspective
Kaplan and Norton don't slight the standard necessity for money
related data. Propitious and exact financing data will constantly
be a need, and directors will do whatever critical to give it.
Frankly, often there is all that anybody could require dealing
with and treatment of cash related data. With the execution of a
corporate database, it is assumed that a more prominent measure
of the taking care of can be thought and mechanized.
Regardless, the truth of the matter is that the present
complement on financials prompts the "unequal" condition
concerning diverse perspectives. There is perhaps need to join
additional budgetary related data, for instance, peril assessment
and cash sparing favorable position data, in this class.
The Learning and Growth Perspective
This perspective consolidates specialist preparing and corporate
social perspectives related to both individual and corporate self-
change. In a learning pro affiliation, people - the fundamental
vault of data - are the standard resource. In the present climate
of quick, creative change, it is getting the opportunity to be
basic for data workers to be in a constant learning mode.
Estimations can be established to guide boss in focusing get
ready stores where they can help the most. In any case, learning
and improvement constitute the urgent foundation for
accomplishment of any worker data affiliation (Niven, 2013).
References
Nair, M. (2011). Essentials of balanced scorecard. Hoboken,
N.J: John Wiley & Sons.
Niven, P. R. (2013). Balanced scorecard step-by-step:
Maximizing performance and maintaining results. Hoboken,
N.J: Wiley.
Module 5
Request for Proposal (RFP)
Company Background
Safeway is a company that was established in 1915. It is a
supermarket that has an American origin. The company deals
with retail or grocery products. Safeway operations are
concentrated mainly in the central and western US. The
company has many subsidiaries all over the world.
Project Description
Safeway is a company that is looking to establish a website that
will be useful in selling its products and also in providing
various services for its customers. The website lacks various
features that are essential for a website to have and there is
need for a good website to be developed. The website needs to
be appealing so as to ensure that customers are attracted to
continue liking at what the company offers. There is a need for
the website to be detailed so that customers can find all of the
information that they want. The company can build more of an
online presence by ensuring that customers are well served in a
manner that they become satisfied with the services that are
being provided. Building an online presence requires that the
company be there to address customer concerns such that they
can be ready to answer all questions that are asked by concerned
customers. Every individual in the world need to access the and
be in a position to do some transactions comfortably. The
objective of having such a website is to increase sales and also
to address the needs of various customers.
Design Requirements
the company requires a website that has a sponsored blog to the
website since it will help in boosting the sales that are obtained
by the company. The website also needs to show performance
of the firm in the stocks market. This feature will help many
investors to be in a position to invest with this firm as a result
of viewing its performance. The other data that should be
captured on the website so as to boost the sales is the identity of
the social media accounts belonging to the firm. Most of the
company especially in the retailing stores use this approach as
means of boosting the sales. Including offers to the website of
the company will ensure that people have become attracted to
the firm for caring for their needs. The design also needs to be
in such a way that the company portrays its products in the
website so that customers can view the products are offered in
this company.
Technical and Infrastructure Requirements
the company welcomes bid from qualified professionals in this
area. The individuals need to have an experience in web design
so that they can be helpful in helping the company achieve its
goals. The suppliers need to be knowledgeable in this area top
ensure that the company benefits from their services of creating
and maintaining
Functional Requirements
The company requires that there be a catalog that can be
utilized by the users of the website so that they can realize
where they need to click to find what. The company will also be
aware of the features that have been placed and the ones that are
missing.
Estimated Project Duration
the completion of this project is expected to be after two
months. The company wants to use this website in doing
business. Since the website is an easy procedure, the company
expects to use the website from January 2017.
Assumptions and Agreements
The company expects that the suppliers only submit a single bid
and if there is a violation of this requirement there will be an
automatic. Any supplier that does not conform those the rules
and regulations will be dismissed. Suppliers that will be
demanding a price that is too high will not be considered.
Submission Information
the deadline for submitting applications is 30th November
20616. Applications need to be send to the company’s office so
that an assessment can be done for the qualified supplier
Additional Information or Clarification
There are various people from the marketing department as well
as from the technical department that will ask questions to
clarify on other information that is required. The following
emails can be used
[email protected] safeway.com
[email protected]
these two websites will assist the suppliers to deal with the
right people. Anyone with questions or comments can ask these
people.
Basis for Award of Contract
A contract will be awarded to the supplier that meets all of the
evaluation criteria
Supplier
The evaluating criteria that will be employed is
Supplier skills and competence
Experience
The ability to assisting company’s team in an effective manner.
Anticipated Selection Schedule
The selection process will be from now to the 30th of
September
Module 6
An executive summary
Website security is a fundamental aspect of every business as
the need to protect critical information has become a necessary
aspect in the modern world. Many small businesses have also
not been left behind in trying to implement strategies aimed at
protecting their websites. Most of the companies that have
found it imperative to have fundamental security plans for their
websites are those that operate by websites and computer
systems. When such websites fail to operate, businesses can
incur unprecedented losses as they may not be in a position to
effectively sell the products as and when required. Customers
may also not be in a position to access the websites and make
orders for their products. Any website that is malfunctioning
may imply that is has been hacked and can be detrimental to the
business as well as the customers. The business records may
also be lost when a database has been lost. Besides, the
employees’ productivity can simultaneously be affected by the
issues related to the websites and virus laden computers.
Such issues related to websites should be avoided by all means
as they can have serious impacts on the businesses. It is
important for the businesses to implement plans aimed at
mitigating the problems associated with the websites. For the
quality functionality of the business, proper plans should be
made to ensure that websites are secure and safe for everyone
and that cases of intrusion have been minimized significantly.
Most of the security issues related to the websites are caused by
hacking by intruders. Most of the hackers use the automated
scripts that they use to render the internet m less useful.
However, all the issues related to the websites are preventable
through proper security plans. The security plan is necessary for
minimizing the vulnerabilities associated with the websites.
Therefore, this discussion will primarily provide an overview of
the website security plans of Safeway Grocery Store. Doing so
will be of great help in the introduction of the security plan, the
strategy of the plan, deliverables and also test cases.
An introduction to the plan
As the need to have secure websites for businesses grow, it has
become necessary to have formulated plans in place so as to
enhance security. When websites have been secured, businesses
can gain profits and save most of the resources necessary for
business growth. The web security of Safeway Groceries is
important to protect it from being invaded by hackers. The
security plan for the company’s website will consist of the
following steps.
Updating the software
The company’s software will always be updated to
mitigate any intrusion by the hackers and unwanted users. In
most cases, the website is kept secure when all the loopholes
that can be used by hackers have adequately been sealed. The
IT department will have to determine if the kind of software
that is in use whether it is a managed hosting solution or the
third-party software so as to take the necessary ensure in
securing he web. When the company uses hosting solution to
the website, it would be necessary for it to seek guidance from
the hosting company (Cobb, 2005). However, as is the case with
Safeway Company, it uses the third party software, which will
be effective to use the Content Management System such as
Word Press to detect any issues with the website when logins
have been made.
Minimizing error messages
The plan will also consider the amount of information given
away as error messages to the website users. It will be
necessary also to consider the correct languages to use on the
website to discuss the failure of the website when trying to
login. The comp-any will use language that is simple and
generic such as ‘’ incorrect username’’. It is important for the
companies to have a limit to the information given away to the
web users. The error messages will be minimized since when
web attackers use forced usernames and passwords to gain entry
into the websites, and the error message is given away, they can
use it to gain access to other fields (Administration, 2016).
A web security plans strategy
The company’s website security plan strategy will eventually
involve strategies that seek to minimize the level of attack by
hackers and other users. It will involve an installation of the
web filtering products. The web filtering products are essential
in the provision of the security intelligence systems that
monitor the level of threats that the website faces. The
company will consider having a platform whereby the
information on the threats facing the websites can effectively be
shared with all the users in the information department (Kim,
2016). Such consideration will be effective since the company
will be well-prepared to respond to the threats that the website
is exposed to. This is for the reason that such data on the
information can easily help the users to easily notice any
threats. Furthermore, the company will effectively assess all the
elements associated with the website and its sources such as the
Java Scripts. Such critical undertaking will effectively be
instrumental in minimizing malicious attacks on the website.
The company will also ascertain that its websites have been
coded to minimize attacks. Issues such as the Cross-site
Scripting and Script Site Forgeries are mostly common for the
websites that have not observed key coding procedures for the
websites. Coding is a proven method that complicates the
methods that attackers use to gain access to the websites. The
company, despite the fact that it is still growing, will dedicate
most of its resources to ensure that the coding procedures have
been put in place. The company will also communicate all the
procedure to the Information Technology department, as a way
of equipping them with the vital information related to the
coding practices. Application of coding is an effective aspect
of protecting websites as it is less costly that provides complete
solutions to the problems associated with websites. Coding has
100% success rate of preventing criminals from attacking the
websites. It is a strategy will provide a significant solution to
the company’s web, by ensuring that all the risks have been
kept at bay (Harwood, 2011).
Another policy that the company considers effective is the
application of authentic passwords. Such passwords should
have a minimum of at least 8 characters with symbols as well as
numbers to increase security measures. The server and websites
should have strong passwords so as to maximize the level of
security for the users’ accounts.
The company’s system administrators should skillfully prevent
any unauthorized people or users from accessing the computer
network. Servers should also operate from a secure room that
bars unauthorized people from gaining access. Employee
passwords should never be stored on a computer that has access
to the internet since hackers can take advantage of data
provided to try and hack the system. The security goals of the
company will be to ensure that the systems are safeguarded to
minimize the threats posed to the company’s website. The
security strategies that need to be implemented include Social
engineering, various hacking tools, Viruses, Mail bombing,
Trojan horses, worms, Packet replay, Packet modification, IP
spoofing, and Password cracking strategies (Administration,
2016).
Deliverables.
Content security policy
Safeway Company will be able to use the language policy so as
to have a policy that is necessary and fit for a website resource.
The policy provides the required guidelines on what the
functions of the website will be. In so doing, the level of
attacks on the company website may be minimized drastically
and keeping the attackers at bay. The content security policy is
essential in detecting the methods that can be used by the
attackers to interfere with the web security through unauthentic
codes. When an attacker uses a code and succeeds to perform an
action, the website may be compromised, and there is no reverse
to such an occurrence (Cobb, 2005). Through this policy, the
server can easily tell the client about the actions which are
acceptable and those who are not through the use of whitelists.
Web regulations at the entry point
The company will have policies that permit various web
applications to have entry points necessitated by the policy
manifest. Web applications have been vulnerable to the XSS/
XSRF because the web design is not formulated such that it can
prevent malicious applications. The entry points are mostly the
main factors that expose the web applications to vulnerability.
The bookmarked pages which are found in the browser also
allow for attacks when they have breakages. Therefore, the
boundaries around web applications lead to security issues to
the websites. At Safeway Company, plans are underway to have
a strategy of managing the points of entry through the web
application. The better way to succeed is through having EPR
provided to the client so as to make the policy be a success. The
company is also prohibiting deep-linking of the web
applications for the reasons which are not related to security
(Oz, 2014).
Insecure requests upgrade
The application is mostly used to improve the insecure requests
to more secure before they are utilized in the web. The
company, therefore, will be upgrading the HTTP to HTTPS, in a
bid to ensure that users can only use secure links that do not
make the company vulnerable to web attacks. By upgrading the
links, the comoany6 will also be in a position to transfers
various sites to the HTTPS without altering from changing links
and references to scripts or even images.
Test cases
The company will conduct test cases to establish that the web
security plans have significantly been enhanced. It will conduct
a case to ascertain the correct and incorrect passwords to make
sure that they are not less than 8 characters and that they are not
the same as the user names.
Confirmations will also be made in regards to ensuring that any
person who tries to gain access to the website has been barred
through locking them out. It is a common occurrence for
intruders to access the site platforms using the wrong
credentials to log in. Such occurrences the company has been
incisive in minimizing them (Harwood, 2011).
Another case that Safe Way Company will consider is if the
necessary information about passwords, Credit Card numbers
and also the Identity card numbers are concealed from outside
users and attackers. The mechanism to ensure that they
encrypted in a format that cannot be easily understood by non-
users will be enhanced. Also, when typing in the information in
the computer, every set will be required to ensure that it is not
displayed in the input boxes.
References
Administration. (2016, November). Firewall. Retrieved from
The Web Security Strategy for Your Organization:
http://www.firewall.cx/general-topics-reviews/security-
articles/268-web-security-strategy.html
Cobb, M. (2005). TechTarget. Retrieved from How to develop
an effective application security strategy:
http://searchsecurity.techtarget.com/answer/How-to-develop-an-
effective-application-security-strategy
Harwood, M. (2011). jblearning. Retrieved from Security
Strategies in Web Applications and Social Networking:
http://www.jblearning.com/catalog/9780763791957/
Kim, D. &. (2016). Fundamentals of information systems
security.
Oz, E. (2014). Management information systems.
Module 01 Course Project – Business Description and
Components
Total Points Possible
100
Insufficient/Not Evident
Progressing
Competent
Exemplary
Earned Points
Provided a description of the company
Explain the company’s purpose, mission, and structure
(20 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
19
Describe the organization’s system in terms of inputs,
processes, and outputs (20 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
18
Describe how the company is organized, its people, and
technology features; also, the importance of an MIS system to
the company (20 Max Point Value).
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
18
Paper meets minimum 3 page length requirement. Included an
APA formatted title page
(10 Max Point Value)
(0-2pts.)
Paper not submitted. No title page submitted.
(3-6pts.)
Paper is less than 1page long and/ or no APA title page
provided.
(7-8 pts.)
Paper is less than 3 pages long, but at least 2 and/or no APA
title page provided.
(9-10 pts.)
Paper is a minimum of 3 pages long. APA formatted title page
provided
9
Demonstrates effective usage of English grammar and
mechanics. (10 Max Point Value)
(0pts.)
More than 10 errors in English grammar and mechanics
observed.
(3-6pts.)
6-10 errors in English grammar and mechanics.
(7-8 pts.)
3-5 errors in English grammar and mechanics.
(9-10 pts.)
0-2 errors in English grammar and mechanics.
9
Transferrable Skills
Communication: Used proper tone in paper. Spoke from a
“consultant” point of view. Kept in mind that audience was the
Leadership Team for the online grocery store (5 Max Point
Value)
(0pts.)
Did not use proper tone and did not structure paper according to
proper audience.
(__1-2_pts.)
Used proper tone somewhat, but paper wasn’t fully structured
properly with audience in mind.
(__3-4_pts.)
Used proper tone mostly. Paper mostly structured properly
according to stated audience.
(_5_pts.)
Used proper tone. Paper structured properly according to stated
audience.
5
Information Literacy: Included a minimum of 2 credible sources
for research, with 1 being an academic source, such as a book or
an academic scholarly journal (10 Max Point Value).
(0pts.)
No sources were submitted
(3-6pts.)
Less than 2sources and/or sources are not credible. Missing
1scholarly sources
(7-8 pts.)
2 credible sources were submitted, but 1 was not a scholarly
source
(9-10 pts.)
Included a minimum of 2 credible sources for research, with 1
being an academic source, such as a book or an academic
scholarly journal
9
Information Literacy: Use APA documentation style to cite
sources. (5 Max Point Value)
(0pts.)
No elements of APA formatting used.
(__1-2_pts.) Some elements of APA formatting used.
(__3-4_pts.)
Most elements of APA formatting used.
(_5_pts.)
All required elements of APA formatting are used.
4
Module 02 Project – Strengthening Web Presence
Total Points Possible
100
Insufficient/Not Evident
Progressing
Competent
Exemplary
Earned Points
Discussed how the company would build more of an online
presence
(15 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate
(6-10 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(11-13 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(14-15 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
14
Discuss how the business would benefit from adding a
company-sponsored blog to their website (20 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
19
Paper meets minimum 3 page length requirement. Included an
APA formatted title page
(5 Max Point Value)
(0pts.)
Paper not submitted. No title page submitted.
(1-2pts.)
Paper is less than 1page long and/ or no APA title page
provided.
(3-4pts.)
Paper is less than 3 pages long, but at least 2 and/or no APA
title page provided.
(5 pts.)
Paper is a minimum of 3 pages long. APA formatted title page
provided
4
Demonstrates effective usage of English grammar and
mechanics. (5 Max Point Value)
(0pts.)
More than 10 errors in English grammar and mechanics
observed.
(1-2pts.)
6-10 errors in English grammar and mechanics.
(3-4 pts.)
3-5 errors in English grammar and mechanics.
(5 pts.)
0-2 errors in English grammar and mechanics.
4
Transferrable Skills
Communication: Used proper tone in paper. Spoke from a
“consultant” point of view. Kept in mind that audience was the
Leadership Team for the online grocery store (5 Max Point
Value)
(0pts.)
Did not use proper tone and did not structure paper according to
proper audience.
(__1-2_pts.)
Used proper tone somewhat, but paper wasn’t fully structured
properly with audience in mind.
(__3-4_pts.)
Used proper tone mostly. Paper mostly structured properly
according to stated audience.
(_5_pts.)
Used proper tone. Paper structured properly according to stated
audience.
4
Digital Fluency: Analysis of their website. What was favorable
about their website? What are some of their website attributes
that customers may find unappealing? (20 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
20
Digital Fluency: Recommendations for data that they should
capture to help with their online conversions (sales) and why.
(20 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
20
Information Literacy: Included a minimum of 2 credible sources
for research, with 1 being an academic source, such as a book or
an academic scholarly journal (5 Max Point Value).
(0pts.)
No sources were submitted
(1-2pts.)
Less than 2sources and/or sources are not credible. Missing
1scholarly sources
(3-4 pts.)
2 credible sources were submitted, but 1 was not a scholarly
source
(5 pts.)
Included a minimum of 2 credible sources for research, with 1
being an academic source, such as a book or an academic
scholarly journal
5
Information Literacy: Use APA documentation style to cite
sources. (5 Max Point Value)
(0pts.)
No elements of APA formatting used.
(__1-2_pts.) Some elements of APA formatting used.
(__3-4_pts.)
Most elements of APA formatting used.
(_5_pts.)
All required elements of APA formatting are used.
4
Module 03 Project – Securing Information Systems
Total Points Possible
100
Insufficient/Not Evident
Progressing
Competent
Exemplary
Earned Points
Describe some of the possible risks to the store’s security
system (20 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
20
Draft a security policy that addresses the risks, identifies
security goals, and discusses strategies for achieving those
goals. (25 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
(6-13pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(14-20 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(21-25 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
25
Paper meets minimum 3 page length requirement. Included an
APA formatted title page
(10 Max Point Value)
(0-2pts.)
Paper not submitted. No title page submitted.
(3-6pts.)
Paper is less than 1page long and/ or no APA title page
provided.
(7-8 pts.)
Paper is less than 3 pages long, but at least 2 and/or no APA
title page provided.
(9-10 pts.)
Paper is a minimum of 3 pages long. APA formatted title page
provided
10
Demonstrates effective usage of English grammar and
mechanics. (10 Max Point Value)
(0pts.)
More than 10 errors in English grammar and mechanics
observed.
(3-6pts.)
6-10 errors in English grammar and mechanics.
(7-8 pts.)
3-5 errors in English grammar and mechanics.
(9-10 pts.)
0-2 errors in English grammar and mechanics.
10
Transferrable Skills
Communication: Used proper tone in paper. Spoke from a
“consultant” point of view. Kept in mind that audience was the
Leadership Team for the online grocery store (10 Max Point
Value)
(0pts.)
Did not use proper tone and did not structure paper according to
proper audience.
(__3-6_pts.)
Used proper tone somewhat, but paper wasn’t fully structured
properly with audience in mind.
(__7-8_pts.)
Used proper tone mostly. Paper mostly structured properly
according to stated audience.
(_9-10_pts.)
Used proper tone. Paper structured properly according to stated
audience.
10
Ethics and Professionalism: Discuss some of the ethical and
potential legal issues for the company and how the security
measures that you’ve outlined will help to minimize those
issues (20 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate.
(6-11 pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(12-15 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations
(16-20 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
20
Module 04 Course Project – Business Description and
Components
Total Points Possible
100
Insufficient/Not Evident
Progressing
Competent
Exemplary
Earned Points
Describe how the balanced scorecard with help management to
identify information requirements. (30 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate
(6-18pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(19-25 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(26-30 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
29
Paper meets minimum 3 page length requirement. Included an
APA formatted title page
(10 Max Point Value)
(0-2pts.)
Paper not submitted. No title page submitted.
(3-6pts.)
Paper is less than 1page long and/ or no APA title page
provided.
(7-8 pts.)
Paper is less than 3 pages long, but at least 2 and/or no APA
title page provided.
(9-10 pts.)
Paper is a minimum of 3 pages long. APA formatted title page
provided
10
Demonstrates effective usage of English grammar and
mechanics. (10 Max Point Value)
(0pts.)
More than 10 errors in English grammar and mechanics
observed.
(3-6pts.)
6-10 errors in English grammar and mechanics.
(7-8 pts.)
3-5 errors in English grammar and mechanics.
(9-10 pts.)
0-2 errors in English grammar and mechanics.
10
Transferrable Skills
Communication: Used proper tone in paper. Spoke from a
“consultant” point of view. Kept in mind that audience was the
Leadership Team for the online grocery store (5 Max Point
Value)
(0pts.)
Did not use proper tone and did not structure paper according to
proper audience.
(__1-2_pts.)
Used proper tone somewhat, but paper wasn’t fully structured
properly with audience in mind.
(__3-4_pts.)
Used proper tone mostly. Paper mostly structured properly
according to stated audience.
(_5_pts.)
Used proper tone. Paper structured properly according to stated
audience.
5
Digital Fluency:
Discuss the IS system would recommend for management to use
to obtain this information for each scorecard component and
provided rationale for recommendations (30 Max Point Value)
(0-5 pts.) Content was not included or incomplete, and/or
extremely inaccurate
(6-18pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(19-25 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(26-30 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
29
Information Literacy: Included a minimum of 2 credible sources
for research, with 1 being an academic source, such as a book or
an academic scholarly journal (10 Max Point Value).
(0pts.)
No sources were submitted
(3-6pts.)
Less than 2sources and/or sources are not credible. Missing
1scholarly sources
(7-8 pts.)
2 credible sources were submitted, but 1 was not a scholarly
source
(9-10 pts.)
Included a minimum of 2 credible sources for research, with 1
being an academic source, such as a book or an academic
scholarly journal
10
Information Literacy: Use APA documentation style to cite
sources. (5 Max Point Value)
(0pts.)
No elements of APA formatting used.
(__1-2_pts.) Some elements of APA formatting used.
(__3-4_pts.)
Most elements of APA formatting used.
(_5_pts.)
All required elements of APA formatting are used.
5
Module 05 Course Project - Beginning Phase
Total Points Possible
100
Insufficient/Not Evident
Progressing
Competent
Exemplary
Earned Points
Demonstrates effective usage of English grammar and
mechanics. (10 Max Point Value)
(0-2 pts.)
More than 10 errors in English grammar and mechanics
observed.
(3-6pts.)
6-10 errors in English grammar and mechanics.
(7-8 pts.)
3-5 errors in English grammar and mechanics.
(9-10 pts.)
0-2 errors in English grammar and mechanics.
10
Transferrable Skills
Digital Fluency:
Create a new folder called “LastName FirstName Project 1” (10
Max Point Value)
(0-2 pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
10
Digital Fluency:
Saved the file to your hard drive. (10 Max Point Value)
(0-2pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
10
Digital Fluency:
Add all the required tags (What are they again?)
Title your RFP page: Your Name Project Proposal 1 (15 Max
Point Value)
(0-3pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(4-8pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(9-12 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(13-15pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
14
Digital Fluency:
In the <body>, add 2 headings. Title the first heading: “My
Proposal” and the second: “My Research” (10 Max Point
Value).
(0-2pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
10
Digital Fluency:
Separated the headings with a horizontal rule. (10 Max Point
Value).
(0-2pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
10
Digital Fluency:
Typed up as much content that will allow you to put together an
RFP for a grocery delivery website. (15 Max Point Value).
(0-3pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(4-8pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(9-12 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(13-15pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
15
Digital Fluency:
Find a picture of project management (use google images),
download it into your project 1 folder, and add it to the “My
Proposal” section of your web page. (10 Max Point Value).
(0-2pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
10
Digital Fluency:
Added at least 3 resources to the “My Research” section of your
page. al (10 Max Point Value).
(0-2pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
10
Module 06 Course Project - Website Security Test Plan
Total Points Possible
100
Insufficient/Not Evident
Progressing
Competent
Exemplary
Earned Points
Provided an executive summary (10 Max Point Value)
(0-2pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
Provided a plan introduction (10Max Point Value)
(0-2pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(3-6pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(7-8 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(9-10 pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
Included a web security plan strategy (15 Max Point Value).
(0-3pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(4-8pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(9-12 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(13-15pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
Included deliverables (15 Max Point Value)
(0-3pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(4-8pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(9-12 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(13-15pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
Included test cases
(15 Max Point Value)
(0-3pts.)
Content was not included or incomplete, and/or extremely
inaccurate
(4-8pts.)
Question is only partially addressed: Content shows a basic
understanding of key ideas, yet includes some inaccuracies
(9-12 pts.)
Question is mostly addressed; Content meets criteria with
minimal errors, is accurate and shows a clear understanding
through appropriate examples and explanations.
(13-15pts.)
Question is fully and accurately addressed. Content meets or
exceeds criteria, is accurate and shows an extraordinary
understanding through rich examples and explanations
Paper meets minimum 6 page length requirement. Included an
APA formatted title page
(10 Max Point Value)
(0-2pts.)
Paper not submitted. No title page submitted.
(3-6pts.)
Paper is less than 3pages long and/ or no APA title page
provided.
(7-8 pts.)
Paper is less than 5 pages long, but at least 4 and/or no APA
title page provided.
(9-10 pts.)
Paper is a minimum of 6 pages long. APA formatted title page
provided
Demonstrates effective usage of English grammar and
mechanics. (10 Max Point Value)
(0pts.)
More than 10 errors in English grammar and mechanics
observed.
(3-6pts.)
6-10 errors in English grammar and mechanics.
(7-8 pts.)
3-5 errors in English grammar and mechanics.
(9-10 pts.)
0-2 errors in English grammar and mechanics.
Transferrable Skills
Information Literacy: Included a minimum of 5credible sources
for research, with 2 being an academic source, such as a book or
an academic scholarly journal (10 Max Point Value).
(0pts.)
No sources were submitted
(3-6pts.)
Less than 5 sources and/or sources are not credible. Missing 2
scholarly sources
(7-8 pts.)
5 credible sources were submitted, but 2 were not a scholarly
sources
(9-10 pts.)
Included a minimum of 5 credible sources for research, with 1
being an academic source, such as a book or an academic
scholarly journal
Information Literacy: Use APA documentation style to cite
sources. Used in-text citations (5 Max Point Value)
(0pts.)
No elements of APA formatting used.
(__1-2_pts.) Some elements of APA formatting used.
(__3-4_pts.)
Most elements of APA formatting used.
(_5_pts.)
All required elements of APA formatting are used.
Ethics & Professional Responsibility
Defining “Ethics & Professional Responsibility”
Ethics and professional responsibility can be defined and
applied in many ways based on a
person’s own values and experiences. Often these terms refer to
our behavior or decision-
making that impacts a larger community. We often derive our
ethical standards and beliefs
from our cultural norms and what we see in society ("Ethics &
Professional Responsibility,"
n.d.).
The Society of Human Resources Managers (n.d) defines
ethics of the workplace as “the values an organization
demonstrates in its goals, policies and practices” (p.1). SHRM
further describes ethical values as the core of the workplace
culture where “ethics encompass work, play, family,
education, community, politics, war, and worship” (SHRM
Foundation’s Effective Practice, n.d.). Each individual’s values
will be influenced by these factors and further influence the
environment of his or her
workplace.
Value of “Ethics & Professional Responsibility” to the
Workplace
and/or Student’s Career
As employees, our values may be categorized in different ways:
organizational,
professional, and personal values. A positive culture, one where
ethical values are
integrated, enriches the workplace experience for all
stakeholders (SHRM Foundation’s
Effective Practice, n.d.).While our basis for ethics is ingrained
from societal values, people
will also see and respond to situations quite differently from
each other. Recognizing that
individuals have different reactions will help one another
respect unique differences and “not
view them as somehow wrong” when variances occur (King &
Skakoon, 2010). For example,
meeting deadlines is perceived differently by individuals, to
some it may be considered
simply wrong and unacceptable to not meet the deadline, while
others may not view it as
significant. The reaction to a missed deadline will vary among
peers.
Demonstrating the “Ethics & Professional Responsibility” skill
The results of employees with strong ethical skills can be seen
across the business through
outcomes such as positive workplace environment, productivity,
and teamwork. “Businesses
that have ethical workplace cultures outperform their
competitors and peers in all the
categories that matter, but especially in stock price growth.”
(SHRM Foundation’s Effective
Practice, n.d., p.1) Further, on an individual level, ethical
employees outperform their peers
over time. While unethical decisions made may not impact a
person in the short-term,
reputations build over time and can impact promotional
opportunities and career options.
Individually, the result of ethical behavior is found in our
personal core values and principles
and through our professionalism on the job. With strong ethical
and professional
responsibility ingrained, we do not rely on feedback from
others, rather we build “the
capacity to sustain ourselves and move forward even in the
absence of support and
validation from others” (Froman, 2010 p. 61). Building ethical
skills allows for decision-
making processes to become intuitive and can occur more
efficiently.
Workplace Consequences when lacking the “Ethics &
Professional
Responsibility” skill
Organizations need employees who anticipate and adapt to
change and difficult decisions.
The SHRM Foundation’s Effective Practice (n.d.) suggests,
“Ethically engaged, internally
motivated employees learn and adapt faster than ethically
disengaged, externally motivated
workers. With ethical clarity comes trust, which can ease the
tension of difficult workplace
situations” (p.4). While ethics may be full of gray areas, the
ability to think critically
supports the mission of thriving organizations ("Ethics &
Professional Responsibility," n.d.).
Employees who are engaged will feel empowered to strive to
reach ethical standards and
serve customers and co-workers in a positive way.
Further Development of the “Ethics & Professional
Responsibility”
skill
Brian Tracy (2012) suggests a process to build the skills related
to professional
responsibility with three steps for growth. First, “accept
complete responsibility for yourself”
and next, that only you can change your situation and finally,
“set clear goals with time
lines” and results will follow (p. 4). These steps can help guide
individuals to developing
ethical skills by avoiding blame and taking an active part in
responding with ethical values in
mind.
Even the best employees can continue their development in the
skill of ethics and
professional responsibility. New situations create new
opportunities for growth. The SHRM
Foundation’s Effective Practice (n.d) considers “ethical learning
happens when people
discuss and debate their values” (p.3). Clarifying our beliefs by
sharing them begins the
process of internally debating the issue. Further, by listening
and sharing ideas with others,
we can hear reactions to our ideas and grow in our respect for
other values.
References
Ethics & professional responsibility. (n.d.). Retrieved August 5,
2014, from Online Academic
Guides website: http://guides.rasmussen.edu/ethics
Froman, L. (2010). Positive psychology in the workplace.
Journal Of Adult Development, 17(2),
59-69. http://dx.doi.org/10.1007/s10804-009-9080-0
King, W.J., & Skakoon, J.G. (2010). The unwritten laws of
engineering. Mechanical
Engineering, 132(12), 43-47.
SHRM foundation’s effective practice guidelines series: shaping
an ethical workplace culture.
(n.d.). Retrieved from SHRM Foundation website:
http://www.shrm.org/about/foundation/products/Documents/9-
13%20Ethics%20EPG%20FINAL.pdf
Tracy, B. (2012). The power of self-confidence. Hoboken, NJ:
John Wiley & Sons.
Digital Fluency
WHAT DOES DIGITAL FLUENCY MEAN?
Rasmussen College defines Digital Fluency as
“effectively employing and understanding digital tools
to express ideas in appropriate contexts" (“Digital
Fluency,” 2014, para.1). This skill involves a continual
effort to ethically interpret information, uncover the
context and content, synthesize the new knowledge,
and clearly communicate it to an audience who is
immersed in a digitally connected world.
Dictionary.com defines fluent as “able to speak or
write smoothly, easily, or readily” (2014, para 2). People have
communicated through
writing and reading for generations, so being fluent is not a new
concept. What is relatively
new is the introduction of technology which evolves fluency
further. The Internet allows vast
amounts of information to be available to anyone with access to
a digital device. This
limitless access to information requires a different skillset in
order to separate information
from hearsay. Additionally, the web encourages more
collaboration among a variety of
partners. Let’s take Wikipedia for instance. It is generated by
the users (or volunteers) from
around the world, and the content is constantly vetted by the
contributors. The ability to
appropriately utilize Wikipedia with an awareness of its
strengths (i.e., open and
transparent content), weaknesses (content possibly written by
amateurs), and differences
with paper-based references requires digital fluency.
The difference between print and digital technology is that
digital technology is interactive,
immediate, and fluid. Our job as digital citizens is then to
translate our current capacities to
understand printed materials and prepare for digital fluency that
will still require us to
process and critically apply information.
WHAT IS THE VALUE OF THE DIGITAL FLUENCY SKILL
TO THE WORKPLACE AND/OR
YOUR CAREER?
The 21st Century Information Fluency Project (2014) states that
“at home, at school, and in
the workplace, digital information is beginning to rival print as
the primary format for
information” (para. 5). Only a small fraction of new
information created today appears in
print format. For that reason, the ability to locate, evaluate, and
ethically use that
information is fast becoming a skill as essential as traditional
print literacy has been. In the
new digital world, information enriches our lives, personally,
socially, and economically.
Those without the skills to use digital information will become
increasingly disadvantaged at
home, at school, and in the workplace (The 21st Century
Information Fluency Project,2014,
para. 1). What does this mean to you as you launch your career?
According to iStart
(2014), increasing computer competency by just 20 minutes a
day adds up to 1.7 hours a
Figure 2. An image of the differences between digital fluency
and digital literacy. Taken from: The Digital Frontline image.
(2011). The Digital Frontline. Retrieved from
http://thedigitalfrontline.com/2012/06/12/digital-literacy-
dont-let-them-learn-it-on-the-streets/ Copyright 2011
week in gained productivity. This results in an annual savings
of $1,820 per employee.
Improving digital fluency isn’t only about saving money; it is
also about greater
productivity, or knowing how to work smarter and not harder.
For example, inefficient
processing of the flood of incoming emails slows down other
tasks. Learning to use email
software such as Microsoft Outlook to filter out junk email
makes it easy to search for the
right email you need to access to get the job done. Collectively
developing digital fluency in
the workplace is a sure way to succeed as an organization.
WHAT ARE THE CONSEQUENCES TO YOUR CAREER OR
WORKPLACE IF THE DIGITAL
FLUENCY SKILL IS LACKING? HOW IS THE DIGITAL
FLUENCY SKILL DEMONSTRATED?
Literacy and fluency shape our ability to use technology to
achieve a desired outcome. As an
information consumer, this applies to our ability to use
available digital resources to gather
information that we intend to communicate, and it applies to our
ability to use digital
technologies to have the intended positive effect on people and
situations. Note that a
literate person is perfectly capable of using such resources. He
or she knows how to use
them and what to do with them, but the outcome is less likely to
match the intention. It is
not until that person reaches a level of fluency, however, that he
or she is comfortable
with using the resources to achieve the desired outcome. He or
she can even appreciate
why the resources being used are appropriate and likely to have
the desired outcome at all
(Christian, 2011). Lack of digital fluency will lead to poor
research and shallow analysis of
the information to be processed.
Digital fluency can be demonstrated in a workplace in a few
ways. One example is how you
interact with your colleagues online, such as personal email or
discussion forums. Virginia
Shea (1994), the author of Netiquette, defines it as “network
etiquette, the do's and don'ts
of online communication” (p. 20). She outlines ten rules and
reminders of Netiquette in her
book. Some of the rules include:
• Rule 1: Remember the human
o Remember that behind every screen is a human being with
independent
thoughts and feelings. It is easy to misunderstand or be rude to
others when
you are not interacting with them in person. Before clicking
send or post, ask
yourself: Would you say it to the person's face?
• Rule 2: Adhere to the same standards of behavior that you
follow in "real life"
o This rule is a reminder that the ethical standards and laws that
govern our
society extend to cyberspace as well. This includes harassment
and bullying,
copyright regulations, and privacy.
• Rule 8: Respect other people's privacy
o The Internet is an open forum. Remember not to share
information about
others that could get them -- or yourself -- into trouble, both
personally and
professionally (Shea, p.33).
Mastery of rules such as these make employees dependable,
trustworthy, and productive.
WHAT CAN STUDENTS DO NOW TO FURTHER DEVELOP
THIS TRANSFERABLE SKILL?
Students can take advantage of many opportunities Rasmussen
College offers to develop
digital fluency skills. On campus, there is a computer lab with
the latest software to learn
and practice your skills. Online, there are Online Academic
Guides available
(http://guides.rasmussen.edu) at Rasmussen College’s website
(Rasmussen College
Website, 2014a 2014b) to help you learn how to research topics.
The librarians are always
available to answer any questions you have. Outside of
Rasmussen College, your local
library may offer a digital studio where, for example, you can
learn to compose music on
your computer. Computer programming is another avenue to
develop digital fluency.
Mitchel Resnick at the Massachusetts Institute of Technology
(MIT) argues that “coding is
the new literacy. To thrive in tomorrow’s society, young people
must learn to design, create
and express themselves with digital technologies” (The
Berkman Center for Internet &
Society, 2014, para. 3). Scratch language developed at MIT
teaches anyone to think
creatively and use logic – both skills indispensable in the new
digital world. The key is to
embrace technology to build confidence in your ability to use
technology.
http://guides.rasmussen.edu/
References
Christian. (2011, February 5). The difference between digital
literacy and digital fluency.
Retrieved from http://www.socialens.com/blog/2011/02/05/the-
difference-between-
digital-literacy-and-digital-fluency/
Fluent [Def. 2]. (2014). Retrieved from
http://www.dictionary.com
Rasmussen College Website. (2014a). Digital fluency. Retrieved
from
http://guides.rasmussen.edu/digital
iStart. (2014). Digital literacy: Getting your workplace up to
speed. Retrieved from
http://www.istart.co.nz/index/HM20/AL213/AR214189
Rasmussen College Website. (2014b). Home. Retrieved from
http://guides.rasmussen.edu/
Resources. (2014, July). Retrieved August 13, 2014, from
Resources website:
http://guides.rasmussen.edu/digital2
Shea, V. (1994). Netiquette. (Online ed., pp. 32-45). San
Francisco: Albion Books. Albion
Books.
21st Century Information Literacy. (2014, January 7). Why is
DIF important? Retrieved from
http://21cif.com/resources/difcore/dif_faqs.htm#important
The Berkman Center for Internet & Society. (2014, July 10).
21st century literacy: New initiative
makes the case that learning to code is for everyone. Retrieved
from
http://cyber.law.harvard.edu/node/9222
The Digital Frontline image. (2011). The Digital Frontline.
Retrieved from
http://thedigitalfrontline.com/2012/06/12/digital-literacy-dont-
let-them-learn-it-on-the-
streets/
INFORMATION LITERACY
WHAT DOES IT MEAN?
According to the Association of College & Research Libraries
(ACRL), information literacy is
“the set of integrated abilities encompassing the reflective
discovery of information, the
understanding of how information is produced and valued, and
the use of information in
creating new knowledge and participating ethically in
communities of learning” (Framework
for Information Literacy for Higher Education, 2015, para. 6) It
is a survival skill for the Age
of Information.Information literacy also provides a foundation
for lifelong learning, and is
essential to responding effectively in the ever-changing
academic
and workplace environment. . It is common to all disciplines, to
all
learning environments, and to all levels of education. In fact,
businesses actively search for employees who are able to gather
information quickly, evaluate, analyze, and present realistic
solutions
based on the information gathered (Owusu-Ansah, 2007).
Individuals who are ‘information literate’ are empowered to
make
sound arguments, appreciate different perspectives, and search
for
opportunities for personal and professional improvement. The
High-
Level Colloquium on Information Literacy and Lifelong
Learning
(UNESCO, 2005) proposes that information literacy is “a
prerequisite
for participating effectively in the Information Society and is
part of
the basic human right of lifelong learning” (p. 30).
An information literate individual is able to meet several
performance indicators, and the
first one is being able to determine the extent of information
needed. Before gathering
research even begins, part of the information literacy process
involves being able to define
the information needed, understanding what type of information
is needed, and determining
exactly how much information is needed.
After determining the information needed, next the information
literate individual will be
able to find and access the needed information effectively and
efficiently.
Determining the best way to retrieve information and what
search systems will be most
effective and efficient are signs of information literacy.
Information literacy is more than
knowing how to use technology to gather facts and figures.
Individuals can be information
literate regardless of access to a specific type of technology or
device. Technology is the
vehicle for access to online and physical library systems on
campus, at home, at work, or
even at the local coffee shop. This open access to resources is
critical to writing a paper,
collaborating on a team project, or even locating directions to
the nearest gas station.
The next step in the information literacy process is being able
to critically evaluate
information and its sources. Is the information that has been
gathered valid and relevant?
This step is increasingly important as we now depend almost
solely on technology to help us
find information. Constant changes in technology require the
ability to navigate through
multiple types of sources online quickly and easily; however,
not all information gathered
from the internet is appropriate or reliable. The International
Federation of Library
Associations and Institutions (2012), delves into the need for
individuals to understand how
to avoid using generic, but readily-available search engines like
Google as a primary source
of information. Although Google can provide answers to the
radio announcer’s trivia
question of the day, it is not the best source for identifying all
of the possible side effects to
the drug the neonatologist just prescribed an infant patient.
The ability to evaluate information with a critical eye is often
challenging and multi-
dimensional. It is not always easy to locate answers to
important questions in just one
attempt as effective search strategies are often complex.
Individuals who are ‘information
literate’ are able to locate information from a variety of
appropriate sources, and revise
search strategies if information gathered is irrelevant, biased, or
insignificant. Information
literacy does go beyond a finite skill set to the notion that
allows the individual to gain a
new view of a subject landscape move through a “liminal”
space, an uncomfortable,
challenging transition, and emerge with transformed
perspective.
After evaluating the information gathered, the next step is to
incorporate the selected
information into one’s knowledge base and use information
effectively to accomplish a
specific purpose. Information gathered might simply be for
personal growth, or it could be
for academic tasks and professional development. Lifelong
learning is at the center of
information literacy. Lifelong learners recognize that learning
happens every day and
adding new knowledge to our ‘wheelhouses’ provides growth
and development both
personally and professionally.
The final step in the information literacy process is to
understand the economic, legal, and
social issues surrounding the use of information, and access and
use information ethically
and legally. This involves more than plagiarism and also
encompasses freedom of speech,
privacy, intellectual property, fair use, and much more. Using
information ethically also
extends outside of the academic world. Corporations have
compliance and legal
departments directly responsible for the application of rules and
regulations by employees
and the organization itself. Economic and legal penalties can be
imposed if an individual,
organization or institution has not followed proper guidelines in
crediting original authors,
editors, or groups with acknowledgment of their original work
WHAT IS THE VALUE OF INFORMATION LITERACY IN
ONE’S CAREER?
HOW IS THIS TRANSFERABLE SKILL DEMONSTRATED?
Proficiency of information literacy equips individuals with the
strategies to be independent,
critical thinkers. Being information literate is an important
skill for any career. In the
health and human services fields, information literacy is
essential to understanding
documentation, records, charts and treatments to guarantee care,
accuracy in diagnosis,
treatment plans and patient instructions. According to
UNESCO (2005), Dr. Phil Candy
stresses that information literacy is crucial for health care
workers to provide ethical,
responsible services to patients and collaboration across sectors,
including “education, care
providers, insurance companies, libraries, publishers and
pharmaceutical companies” (p.55).
Dr. Candy also emphasizes a need for evidence-based decision
making in healthcare to
provide patients with the best options for therapies and
pharmacological interventions
(UNESCO, 2005).
In the criminal justice and related fields, information literacy is
imperative to recognizing
the application of laws, statutes and the legal system, and
ensuring that justice is applied
fairly and consistently. As a law enforcement detective, it is
essential to understand how to
investigate a ‘cold-case’ by collection of evidence, research of
previous cases, witness
testimony review and analysis of similar criminal reports in
adjacent jurisdictions. A suspect
would not be held accountable for his or her actions if the
detective relies on unreliable
information gathered from a generic internet search on “How to
pursue a homicide suspect.”
Additionally, in fields of business, information literacy is
crucial to team collaboration and
successful project management. All members of the team need
to be able to gather
relevant information quickly and evaluate source materials for
bias and appropriate business
application. Creating an innovative solution or new product
often requires understanding of
patent processes, cost analysis and knowledge of previous
attempts by competitors.
WHAT ARE THE CONSEQUENCES IF INFORMATION
LITERACY IS
LACKING?
Competition for jobs is often a reality in many fields, and
college graduates need to be
prepared to prove their worth during the interview process.
Unfortunately, without
successful tools in information literacy, candidates may be
overlooked for jobs despite solid
transcripts and work experience. Imagine a graduate with a 3.5
GPA, externship
experience, and glowing letters of recommendation interviewing
for a coveted position with
a Fortune 500 company. The interview is going well, and the
graduate is able to answer all
of the questions about skills for the job impeccably. The
interviewer then asks, “How would
you lead a team to find a solution to our company’s current
problem with…?” Without the
ability to explain the information literacy process succinctly,
the graduate may lose out on a
dream job.
In a recent study from Project Information Literacy (Head,
2014), college students were
more likely to use Google as a search engine and preferred
“online forums, blogs, webinars,
MOOCs, YouTube, and face-to-face conversations” for
information sources (p.4). By
avoiding opportunities to perform scholarly research using
appropriate methods, students
are unable to practice the strategies needed to be ‘information
literate’ upon graduation.
According to Owusu-Ansah (2007), individuals must also
understand how “copyright,
intellectual property and plagiarism” are critical factors in
information literacy skill
development (p.417). Information literacy is essential for
employees to produce ethically
and legally compliant products and services. When individuals
are not cognizant of the
ramifications of failure to comply with copyright laws and
plagiarism rules, the result can be
disastrous. Consider the following scenarios:
A. An employee creates a presentation to the Board of Directors
of the company and
includes an online video from a Grammy-winning artist. The
emotion and passion of
the video, music and lyrics fit perfectly into the presentation
and the reaction from
the board is overwhelmingly positive. The company agrees to
sign a contract with
an outside vendor for $1 million provided the music is included
in the marketing
campaign. Unfortunately, the employee did not understand
Creative Commons
licensing and assumes it is not a big deal to gain permission
from the artist. The
original artist files a lawsuit against the company for violation
of copyright, the
company loses the $1 million contract, and the employee is
fired.
B. A Nursing student is in the final quarter before graduation
and has already accepted
a position at a prestigious local hospital in a preferred
department. The job offer is
contingent on a diploma in hand by the end of the quarter. The
student has an A in
the externship course and the final project is due at the end of
the next week. The
student has been working 40+ hours at a local pharmacy, caring
for an elderly
parent and managing a household. A classmate suggests that the
student save time
by copying a section from a blog she found online. The student
likes the information
but is not sure how to properly cite the information. She adds
the content anyway to
“get the job done.” The instructor checks all students’
reference citations, locates
the plagiarized portion and gives the student an F in the course
for violating the
college’s Academic Integrity policy. The student loses the job
at the hospital and
must retake the course the following quarter and adjust her
student loan to pay for
the course a second time.
WHAT CAN A STUDENT DO NOW TO FURTHER DEVELOP
THIS SKILL?
Students can develop information literacy skills through
practice and application in
researching and retrieving information in each course at
Rasmussen. Knowing resources
and creating habits of inquiry establish a foundation for
success. The High-Level Colloquium
on Information Literacy and Lifelong Learning (UNESCO,
2005) created a model, titled
“Empowering 8,” to describe the process by which students
develop through stages when
applying information literacy to new situations (p. 31-2).
1. Identify a personal need for information to solve a problem;
2. Explore the problem, and develop a search strategy by posing
important questions
that need attention;
3. Select the sources from which information can be obtained:
print, electronic, or
human;
4. Organize, sort, analyze, and evaluate the information to apply
it to the specific
problem;
5. Create by synthesis one’s own answer based on the facts
available, and be
prepared to justify the decision
6. Present the new knowledge, understanding, or resolution
using a medium that is
practical for the audience
7. Assess the success of the activity in terms of content
investigated, the skills
learned, and the product’s applicability through personal,
teacher, and peer feedback
and evaluations.
Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx
Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx
Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx
Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx
Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx
Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx
Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx
Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx
Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx
Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx
Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx

More Related Content

Similar to Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx

My Future Essay Writing
My Future Essay WritingMy Future Essay Writing
My Future Essay WritingTiffany Young
 
Kotler_MM_06_ippt.pptx
Kotler_MM_06_ippt.pptxKotler_MM_06_ippt.pptx
Kotler_MM_06_ippt.pptxShershahAdnan
 
Literary Analysis Thesis. Midterm Literary Analysis
Literary Analysis Thesis. Midterm Literary AnalysisLiterary Analysis Thesis. Midterm Literary Analysis
Literary Analysis Thesis. Midterm Literary AnalysisLanate Drummond
 
Descriptive Essay On Ice Hockey
Descriptive Essay On Ice HockeyDescriptive Essay On Ice Hockey
Descriptive Essay On Ice HockeyPatty Loen
 
Essay Benefits Of Competitive Sports. Online assignment writing service.
Essay Benefits Of Competitive Sports. Online assignment writing service.Essay Benefits Of Competitive Sports. Online assignment writing service.
Essay Benefits Of Competitive Sports. Online assignment writing service.Stephanie Wilson
 
Applying Behavioral Economics
Applying Behavioral EconomicsApplying Behavioral Economics
Applying Behavioral EconomicsC.A.F.C.A.
 
The Human Truths Behind Consumer Behaviour
The Human Truths Behind Consumer BehaviourThe Human Truths Behind Consumer Behaviour
The Human Truths Behind Consumer BehaviourXPotential
 
7 cognitive biases that impact conversion rates and how to leverage them to y...
7 cognitive biases that impact conversion rates and how to leverage them to y...7 cognitive biases that impact conversion rates and how to leverage them to y...
7 cognitive biases that impact conversion rates and how to leverage them to y...Conversion Fanatics
 

Similar to Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx (10)

My Future Essay Writing
My Future Essay WritingMy Future Essay Writing
My Future Essay Writing
 
Kotler_MM_06_ippt.pptx
Kotler_MM_06_ippt.pptxKotler_MM_06_ippt.pptx
Kotler_MM_06_ippt.pptx
 
Advocacy influencing action
Advocacy influencing actionAdvocacy influencing action
Advocacy influencing action
 
Literary Analysis Thesis. Midterm Literary Analysis
Literary Analysis Thesis. Midterm Literary AnalysisLiterary Analysis Thesis. Midterm Literary Analysis
Literary Analysis Thesis. Midterm Literary Analysis
 
Drug Abuse Essay
Drug Abuse EssayDrug Abuse Essay
Drug Abuse Essay
 
Descriptive Essay On Ice Hockey
Descriptive Essay On Ice HockeyDescriptive Essay On Ice Hockey
Descriptive Essay On Ice Hockey
 
Essay Benefits Of Competitive Sports. Online assignment writing service.
Essay Benefits Of Competitive Sports. Online assignment writing service.Essay Benefits Of Competitive Sports. Online assignment writing service.
Essay Benefits Of Competitive Sports. Online assignment writing service.
 
Applying Behavioral Economics
Applying Behavioral EconomicsApplying Behavioral Economics
Applying Behavioral Economics
 
The Human Truths Behind Consumer Behaviour
The Human Truths Behind Consumer BehaviourThe Human Truths Behind Consumer Behaviour
The Human Truths Behind Consumer Behaviour
 
7 cognitive biases that impact conversion rates and how to leverage them to y...
7 cognitive biases that impact conversion rates and how to leverage them to y...7 cognitive biases that impact conversion rates and how to leverage them to y...
7 cognitive biases that impact conversion rates and how to leverage them to y...
 

More from elinoraudley582231

Assignment ContentTo learn how to apply SPCM to a process,.docx
Assignment ContentTo learn how to apply SPCM to a process,.docxAssignment ContentTo learn how to apply SPCM to a process,.docx
Assignment ContentTo learn how to apply SPCM to a process,.docxelinoraudley582231
 
Assignment ContentTo prepare for the Week 2 Assessment, .docx
Assignment ContentTo prepare for the Week 2 Assessment, .docxAssignment ContentTo prepare for the Week 2 Assessment, .docx
Assignment ContentTo prepare for the Week 2 Assessment, .docxelinoraudley582231
 
Assignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docxAssignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docxelinoraudley582231
 
Assignment ContentThroughout this course, you have been using .docx
Assignment ContentThroughout this course, you have been using .docxAssignment ContentThroughout this course, you have been using .docx
Assignment ContentThroughout this course, you have been using .docxelinoraudley582231
 
Assignment ContentThis week’s readings and activities focu.docx
Assignment ContentThis week’s readings and activities focu.docxAssignment ContentThis week’s readings and activities focu.docx
Assignment ContentThis week’s readings and activities focu.docxelinoraudley582231
 
Assignment ContentThis week you will continue your work on the.docx
Assignment ContentThis week you will continue your work on the.docxAssignment ContentThis week you will continue your work on the.docx
Assignment ContentThis week you will continue your work on the.docxelinoraudley582231
 
Assignment ContentThis week, you will continue building th.docx
Assignment ContentThis week, you will continue building th.docxAssignment ContentThis week, you will continue building th.docx
Assignment ContentThis week, you will continue building th.docxelinoraudley582231
 
Assignment ContentThis week you will finalize your present.docx
Assignment ContentThis week you will finalize your present.docxAssignment ContentThis week you will finalize your present.docx
Assignment ContentThis week you will finalize your present.docxelinoraudley582231
 
Assignment ContentThis weeks’ discussion of correlation and ca.docx
Assignment ContentThis weeks’ discussion of correlation and ca.docxAssignment ContentThis weeks’ discussion of correlation and ca.docx
Assignment ContentThis weeks’ discussion of correlation and ca.docxelinoraudley582231
 
Assignment ContentThis week, you will continue building the .docx
Assignment ContentThis week, you will continue building the .docxAssignment ContentThis week, you will continue building the .docx
Assignment ContentThis week, you will continue building the .docxelinoraudley582231
 
Assignment ContentThis week you will continue your work on.docx
Assignment ContentThis week you will continue your work on.docxAssignment ContentThis week you will continue your work on.docx
Assignment ContentThis week you will continue your work on.docxelinoraudley582231
 
Assignment ContentThis week you learned about the application .docx
Assignment ContentThis week you learned about the application .docxAssignment ContentThis week you learned about the application .docx
Assignment ContentThis week you learned about the application .docxelinoraudley582231
 
Assignment ContentThis assignment offers you the opportuni.docx
Assignment ContentThis assignment offers you the opportuni.docxAssignment ContentThis assignment offers you the opportuni.docx
Assignment ContentThis assignment offers you the opportuni.docxelinoraudley582231
 
Assignment ContentThis assignment has two parts.Part 1.docx
Assignment ContentThis assignment has two parts.Part 1.docxAssignment ContentThis assignment has two parts.Part 1.docx
Assignment ContentThis assignment has two parts.Part 1.docxelinoraudley582231
 
Assignment ContentThis assignment is designed to help you .docx
Assignment ContentThis assignment is designed to help you .docxAssignment ContentThis assignment is designed to help you .docx
Assignment ContentThis assignment is designed to help you .docxelinoraudley582231
 
Assignment ContentThere are various schools within Buddhis.docx
Assignment ContentThere are various schools within Buddhis.docxAssignment ContentThere are various schools within Buddhis.docx
Assignment ContentThere are various schools within Buddhis.docxelinoraudley582231
 
Assignment ContentThere are two deliverables for this assi.docx
Assignment ContentThere are two deliverables for this assi.docxAssignment ContentThere are two deliverables for this assi.docx
Assignment ContentThere are two deliverables for this assi.docxelinoraudley582231
 
Assignment ContentThere are offenders whose criminality is.docx
Assignment ContentThere are offenders whose criminality is.docxAssignment ContentThere are offenders whose criminality is.docx
Assignment ContentThere are offenders whose criminality is.docxelinoraudley582231
 
Assignment ContentThere are many different threats to the conf.docx
Assignment ContentThere are many different threats to the conf.docxAssignment ContentThere are many different threats to the conf.docx
Assignment ContentThere are many different threats to the conf.docxelinoraudley582231
 
Assignment ContentThe strategic sourcing plan is a plan fo.docx
Assignment ContentThe strategic sourcing plan is a plan fo.docxAssignment ContentThe strategic sourcing plan is a plan fo.docx
Assignment ContentThe strategic sourcing plan is a plan fo.docxelinoraudley582231
 

More from elinoraudley582231 (20)

Assignment ContentTo learn how to apply SPCM to a process,.docx
Assignment ContentTo learn how to apply SPCM to a process,.docxAssignment ContentTo learn how to apply SPCM to a process,.docx
Assignment ContentTo learn how to apply SPCM to a process,.docx
 
Assignment ContentTo prepare for the Week 2 Assessment, .docx
Assignment ContentTo prepare for the Week 2 Assessment, .docxAssignment ContentTo prepare for the Week 2 Assessment, .docx
Assignment ContentTo prepare for the Week 2 Assessment, .docx
 
Assignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docxAssignment ContentThroughout this course you will study the di.docx
Assignment ContentThroughout this course you will study the di.docx
 
Assignment ContentThroughout this course, you have been using .docx
Assignment ContentThroughout this course, you have been using .docxAssignment ContentThroughout this course, you have been using .docx
Assignment ContentThroughout this course, you have been using .docx
 
Assignment ContentThis week’s readings and activities focu.docx
Assignment ContentThis week’s readings and activities focu.docxAssignment ContentThis week’s readings and activities focu.docx
Assignment ContentThis week’s readings and activities focu.docx
 
Assignment ContentThis week you will continue your work on the.docx
Assignment ContentThis week you will continue your work on the.docxAssignment ContentThis week you will continue your work on the.docx
Assignment ContentThis week you will continue your work on the.docx
 
Assignment ContentThis week, you will continue building th.docx
Assignment ContentThis week, you will continue building th.docxAssignment ContentThis week, you will continue building th.docx
Assignment ContentThis week, you will continue building th.docx
 
Assignment ContentThis week you will finalize your present.docx
Assignment ContentThis week you will finalize your present.docxAssignment ContentThis week you will finalize your present.docx
Assignment ContentThis week you will finalize your present.docx
 
Assignment ContentThis weeks’ discussion of correlation and ca.docx
Assignment ContentThis weeks’ discussion of correlation and ca.docxAssignment ContentThis weeks’ discussion of correlation and ca.docx
Assignment ContentThis weeks’ discussion of correlation and ca.docx
 
Assignment ContentThis week, you will continue building the .docx
Assignment ContentThis week, you will continue building the .docxAssignment ContentThis week, you will continue building the .docx
Assignment ContentThis week, you will continue building the .docx
 
Assignment ContentThis week you will continue your work on.docx
Assignment ContentThis week you will continue your work on.docxAssignment ContentThis week you will continue your work on.docx
Assignment ContentThis week you will continue your work on.docx
 
Assignment ContentThis week you learned about the application .docx
Assignment ContentThis week you learned about the application .docxAssignment ContentThis week you learned about the application .docx
Assignment ContentThis week you learned about the application .docx
 
Assignment ContentThis assignment offers you the opportuni.docx
Assignment ContentThis assignment offers you the opportuni.docxAssignment ContentThis assignment offers you the opportuni.docx
Assignment ContentThis assignment offers you the opportuni.docx
 
Assignment ContentThis assignment has two parts.Part 1.docx
Assignment ContentThis assignment has two parts.Part 1.docxAssignment ContentThis assignment has two parts.Part 1.docx
Assignment ContentThis assignment has two parts.Part 1.docx
 
Assignment ContentThis assignment is designed to help you .docx
Assignment ContentThis assignment is designed to help you .docxAssignment ContentThis assignment is designed to help you .docx
Assignment ContentThis assignment is designed to help you .docx
 
Assignment ContentThere are various schools within Buddhis.docx
Assignment ContentThere are various schools within Buddhis.docxAssignment ContentThere are various schools within Buddhis.docx
Assignment ContentThere are various schools within Buddhis.docx
 
Assignment ContentThere are two deliverables for this assi.docx
Assignment ContentThere are two deliverables for this assi.docxAssignment ContentThere are two deliverables for this assi.docx
Assignment ContentThere are two deliverables for this assi.docx
 
Assignment ContentThere are offenders whose criminality is.docx
Assignment ContentThere are offenders whose criminality is.docxAssignment ContentThere are offenders whose criminality is.docx
Assignment ContentThere are offenders whose criminality is.docx
 
Assignment ContentThere are many different threats to the conf.docx
Assignment ContentThere are many different threats to the conf.docxAssignment ContentThere are many different threats to the conf.docx
Assignment ContentThere are many different threats to the conf.docx
 
Assignment ContentThe strategic sourcing plan is a plan fo.docx
Assignment ContentThe strategic sourcing plan is a plan fo.docxAssignment ContentThe strategic sourcing plan is a plan fo.docx
Assignment ContentThe strategic sourcing plan is a plan fo.docx
 

Recently uploaded

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Discussion 1 BrittanyThe concept of inhaling focuses on how we .docx

  • 1. Discussion 1: Brittany The concept of inhaling focuses on how we as people receive information ( Stewart 2012). Inhaling has a lot to do with what we receive, and our perception of it. When inhaling information, though it may be from our perception does not mean that it is always accurate. Stewart explains in his text that while someone may be inhaling information, it is still easy to communicate ineffectively (Stewart 2012). When inhaling information and having poor perception you can make communicating with people very uneasy. You could end up making impulsive, decisions, stereotyping, or making assumptions that could hurt or easily offend someone. Through reading the text it shows that mindful listening can be the solution to having poor perception ( Stewart 2012 ). Exhaling relates to how us a people relays information in the communication process (Stewart 2012). In the readings it states that exhaling is an important part oh having healthy communication skills. Being able to express your opinion, emotions, and thoughts, is what balances out communication. With out exhaling communication would be one sided. To have good interpersonal communication skills you have to be able to utilize both skills and at the same time. You have to be mindful to what someone is saying to you, but also be able to express your thoughts about that situation. These two concepts further our understanding of interpersonal communication from the beginning chapters because it shows us how a person grows over time with their communication skills.When you think about how in the earlier chapters it says our identity comes from our social interactions experiences, apart of those social interactions is inhaling informations, and learning to exhale your thoughts, and feelings on something but having mutual respect for each other when communicating. Exhaling is our self expression, which is the part of our identity that communicate who we are from our own perception and not
  • 2. what other people say or think. Listening plays an important role in the inhaling process because not listening to what a person is saying will corrupt your perception of the information that you are receiving, which in can lead to you not exhaling with a reasonable mind. Instead you will probably be exhaling with an emotional mind which causes impulsive, and judgemental decisions. References Stewart, J. (2012). Bridges Not Walls. New York: Mc-Graw- Hill. Discussion 2: Vincent We are reminded Per Stewart (2012) “that we’re using the metaphor of inhaling and exhaling to explain the receptive and expressive parts of communication…. The first point to remember is that there’s much more to inhaling than the passive reception of incoming messages. Inhaling combines the two active, interpretive processes of perceiving and listening….” (pg.163) Sometimes we take in information in a specific way, it doesn’t necessary mean that our understanding of the information is correct. In the process while someone maybe inhaling information, at a point it can be very easy for that individual to be unsuccessful, especially if the discernments are miscalculating or widespread (Stewart, 2012). In the reading, Stewart describes how “a student might come late to class and the instructor might think, “That student is lazy (p.171). This would describe an imprecise inhaling per (Stewart, 2012) “in conjunction with poor perception, can breed attribution forming (p. 171), stereotyping (p. 172), fast thinking (p. 174), making snap judgments (p. 175), making attributional errors (p. 175), and more (Steward,
  • 3. 2012). With erroneous assumptions, can impact the effectiveness of communicating and become offensive to the speaker and could cause the receiver to draw back and shut down. Exhaling demonstrates and gives us the example the we should communicate information to individuals effectively (Stewart, 2012). Exhaling is a very import part to interpersonal communication and is key to the development. Stewart (2012) you are open with other persons when you disclose yourself to them, sharing your ideas, feelings, and reactions to the present situation, and letting other people know who you are as a person. (319 words) Reference: Stewart, J. (2012). Bridges not walls: A book about interpersonal communication (11th Ed.). New York, NY: McGraw-Hill Running Head: FAL16-6WS1-ONP-ISM3015-06 1 FAL16-6WS1-ONP-ISM3015-06 40 Management Information Systems
  • 4. Heather Hale Rasmussen College Author Note: This paper is being submitted on October 10, 2016, for Scott McCullock’s B351/ISM3015 Section 06 Management Of Information Systems Course. Safeway is an organization that is focused on ensuring that they know better on how they can provide quality products and services to their customers. By so doing the organization can make sure that they increase and cultivate more on their customer loyalty while creating more outlets. It is an organization that makes sure that they deliver the products on time and also that it takes the least time possible for the deliveries. The organization is also focused on being more accessible such that it can be an online organization and also brick and mortar organization. Being able to accomplish this will ensure that they increase on their competitive advantage such that they are focused on the larger scale within the market. They want to be able to make sure that all their clients worldwide can be able to access their products in no time and have a 1-hour delivery period. It will be much easier for their customers since they will know when to expect their products and also when to order the products. In return, it will give the customers freedom of being able to order the products when they want. The organization is
  • 5. focused on having a satisfied customer such that the client can shop either with their history. That is, they can store the shopping history of the customer in the database, therefore being able to know what the customer likes or shops most. On the other hand, the shop by history option will ensure that the customer saves time looking up on their most frequent purchases. More so, this gesture makes sure that the client is more contented with their services and also that they can rely on the organization to know what is right for them. Likewise, there is the shop by aisle option, here, the client is provided with a simplified category of all the products that the organization sells. It makes sure that for a new customer, they can be able to base their product under the specified categories be it the baby care section or even the personal attention and health section. By having these categories available to the customer, they make it way much easier to make a decision (Oz, 2002). Also, the arrangement of the information is way much appealing such that they have a single category and also by the side, another category with picture representations, therefore, showing the customer what it is that a particular category stands for. Furthermore, there is a shop by recipe option whereby the client is taken through the most common dishes available and how they can make them. Apart from getting to know how they can make them, the customer is provided with all the ingredients necessary for cooking the meal, therefore, increasing the knowledge of their customers. In most instances, you will find that the customer does not know the required ingredients for a certain meal, therefore, necessitating for them to have to look online for what is needed. In some of the websites where the client might end up, they will not have all the ingredients or even the proper names for these ingredients. The Safeway site eradicates these errors by making sure that whatever their customer is for is available and also that they will know how to make the proper meal. Amongst
  • 6. what is included in their shop by recipe category is the main dishes, the salads, the sides, the desserts, the appetizers and finally the beverages. The availability of all this information makes it easier for the client to prepare a full meal with all that is provided. The organization like any other offers promotions to their customers. That is, they have a dedicated area within their website whereby they have provided all this information. That is, the online savings sector. In this area, there are the promo deals options whereby they conduct promotions frequently and a few lucky customers are awarded. On the other hand, there are the club card specials whereby the customers have the stores card with which they earn points for every purchase made. These card specials improve their customer participation since no one would want to be left out and also increases their morale (Laudon & Laudon, 2000). Likewise, on the online savings sector, the organization has made sure that they have the buy one get one free offers. These offers are ideal for those who want to save big on their expenses and also those who buy many products at once. One can be able to utilize these offers to have a larger supply of goods thus saving the time spent on shopping and also the amount paid on the same. In the same category also, there are the free delivery options whereby with a certain promotion or savings deal, the client can be awarded a free delivery with the purchase. The organization carries out these promotions to make sure that they keep their customers busy and also that their customers will be more interactive with them. The management information systems will be of great help to such an organization since they will ensure that their customer’s data is safely stored within the organizations systems. On the other hand, more time will be saved with the online call centers therefore freeing more employees (Lucey, 2005). That is, the employees will be dedicated to helping the customers since most of the information required is properly displayed on their website. Management information systems will ensure that the
  • 7. organization will have a competitive advantage within the market therefore bringing about growth of the organization. References Laudon, K. C., & Laudon, J. P. (2000). Management information systems : organization and technology in the networked enterprise. Upper Saddle River, NJ: Prentice Hall. Lucey, T. (2005). Management information systems. London: Thomson Learning. Oz, E. (2002). Management information systems. Boston, MA: Course Technology. Module 2 The company has the chance of building an online presence by ensuring that when a customer opens their website, there is a way that they realize that, and there is a person that is there to ask them the service that they want. This service would ensure that customers can access the company’s staff at the time that they need them. The company can also ensure that their products are placed on the website to ensure that customers can view all of their products online so that they can feel the company’s products while still online. The company needs to ensure that it has updated its current products online so that customers can view current items that suit their needs and desires. The website needs to be appealing so as to ensure that customers are attracted to continue liking at what the company offers. There is a need for the website to be detailed so that customers can find all of the information that they want. The company can build more of an online presence by ensuring that customers are well served in a manner that they become satisfied with the services that are being provided. Building an online presence requires that the company be there to address customer concerns such that they can be ready to answer all questions that are asked by concerned customers. Every individual in the world need to access the and be in a position
  • 8. to do some transactions comfortably/ Safeway is a company that has an appealing website. The website is favorable due to its unique features. The website has a section where customers can save their money online, and this is an interesting feature since customers can save money up to the amount that will be enough for them to purchase the item that they desire. The website also has a short cut whereby one can shop by history in that one can purchase the same item that one had bought at a previous time since when a customer opens the website there are suggestions to what can be offered to them. The website has the section where customers can order the items that they want, and there is free delivery for such goods. The company has a feature where it has advertised free promotion of its products such that when one purchases an item, there is a chance for them to enter the draw for amazing prices to be won. There are also some features that customers can find to be unappealing. Such features include terms and conditions that are stated at the bottom of the company’s website. The cartoon that is placed in advertising its grocery goods is not appealing since in other company’s real people are used for this purpose since they reflect the reality of what goes on in such companies. Web presence for a company is very important especially to firms like the Safeway who are involved in the sale of various products to the customers. I would recommend the company to post offers on a weekly basis so as for the customers to become attracted and visit the stores. Including offers to the website of the company will ensure that people have become attracted to the firm for caring for their needs. The offers posted should be accompanied by amazing discounts. The company must ensure that the discounts on the items offered do not have an effect on the overall profitability of the company. The other data that should be captured on the website so as to boost the sales is the identity of the social media accounts belonging to the firm. Most of the company especially in the retailing stores use this approach as means of boosting the
  • 9. sales. A population of the users spends most of their time on the social media sites. Therefore, labeling the sites at the company’s website ensure that it has reached many people who will, as a result, attract more to come and shop from the company. The company must ensure that all exclusive deals are posted on these accounts. The other data that should be captured to assists in boosting the sales is the performance of the firm in the stocks market. Most of the people tend to ignore that fact. However, most of the user have knowledge regarding the stocks. Therefore, posting information related to the same will ensure that they have increased their interest in the company and come to shop at the firm. Similarly, the data on the financial performance of the company should be included. Contact details are very important for ensuring that customers have contacted whenever they have issues. The other data that might boost the sales of the company is writing about the Corporate Social Responsibility activities that they are undertaking. This information gives the shoppers that the firm cares about the society and this may, as a result, boost the total sales in the company. Adding the company-sponsored blog to the website be important will boost the sales that are obtained by the company. The blog included in the website will have a wide outreach because most of the people are interested in gaining knowledge from blogs. The sponsored blog will attract users to view information presented by the firm regarding offers and deals among other things. The addition of the blog will benefit the company from targeting which results from the search engine optimization. The blog in the website will improve the traffic to the website, and it might bring the website to the mostly searched. The blog sponsored by the company are cost effective and cheap to run compared to the benefits derived from its presence. The blog will serve as a great resource to the users.
  • 10. References https://shop.safeway.com/ecom/home Module 3 Safeway is a company that has a good website. However, there are many possible risks top the store's security system. These risks are very real since other big companies have suffered these security challenges resulting in huge losses regarding their reputation, loss of data, their money and other losses. The threats that this company can face include employees, threats, malicious activities, ignorance, outside attackers and others. Malicious attackers are people who delete or alter a company’s information for the purpose of revenge. There are different kinds of risk to the store’s security system which include human errors, system glitches, and malicious or criminal attacks. According to a recent survey is that most of the risk to the store’s security system are caused by human errors even though they are not as expensive as those caused by malicious and criminal attacks. Human errors can include a situation where sensitive information is delivered to a wrong person through email or fax. It also occurs where mistakenly one makes a company’s information available on the website or the web server. Human error also occurs when one loses or inadequately disposes of data which includes paper records. Human error can also occur when one loses an unencrypted computer, mobile phone or other storage devices such as USB key. The loss of such information caused by human error can trigger breach response requirements which are applicable under the law.
  • 11. The legal impact when the information is seen by anyone can be similar to that of theft. The threats of human error are that hackers and thieves can use such information to do unauthorized outflow of data, or they can compromise the networks causes large losses. Every company is vulnerable to human errors which can be harmful and it is the responsibility of the organization to mitigate the risks by training employees, implementing access control and implementing data handling policies. System glitches is another type of data breach, and it is usually a sudden, unanticipated and impermanent malfunction in a computer system or network. System glitches can be in the form of software failures that provide pathways to be lost, corrupted or destroyed. It also includes problems in the application of software of firmware patches as well as updates. It also includes inadvertent data dumps, authentication failures, data recovery failures as well as programming errors (Oz, 2014). System glitches are mainly technological, and they can have various shortfalls such as outdated software or hardware that are liable to crashing, insufficient staffing to do monitoring and other functions. The other kind of data breach is malicious or criminal attacks. This kind of breach is caused hackers as well as thieves who are constantly devising new methods of overcoming security defenses. This kind of attacks are smaller compared to human error, but they are too costly to an organization. The list of hacks and attacks is long and includes such things as physical theft or loss, outbreaks on web applications, misappropriation of privileges by rogue workers or other insiders, cyber extortion, payment card skimmers and others. A virus is another kind of data breach which is a program that inserts its executable code into other applications without the consent of the individual being affected. Viruses tend to corrupt and destroy data on host computers and can cause the computer or even the entire network to become unusable until such a time
  • 12. the virus is destroyed. Viruses can reach a computer from other infected computers through h various mediums such as CD, DVD or even through a network. Such viruses include file viruses, script viruses, boot viruses as well as macro viruses. This data breach is so severe as it leads to exposing personal information which is embarrassing and costly to an organization. Worms is another kind of data breach, and it occupies itself across a network. The worm can promulgate itself through the distribution of copies of itself through networks and the Internet, email communications, or by operating system security bugs. Worms can carry extra malware such as backdoor programs. Worms can result in great damage, and they can be employed to jam communication channels using DoS attack. A warm can cause large damages as it spreads through the internet in minutes. The security policies that need to be implemented include computer security. Every user needs to have a password which must have a minimum of eight characters that have letters, numbers as well as symbols. The computer system administrators need to ensure that they monitor and control access systems to ensure that the systems are protected. System administrators need to ensure that they prevent unauthorized people from gaining access to a computer network. Servers need to be kept in a secure room that has limited access to authorized people only. There are different tools that can be implemented to ensure the computer network is safeguarded. Employee passwords can never be stored on a computer that has access to the internet since hackers can take advantage of these data to hack the system and do some major harm. Further, computer security policies need to cover emergencies that occur due to detection of viruses or security breaches that occur outside the organization. The security goals include making sure that the company's systems are safeguarded such that the company will be free from these threats. The security strategies that need to be implemented include Social engineering,
  • 13. Various hacking tools, Viruses, Mail bombing, Trojan horses, worms, Packet replay, Packet modification, IP spoofing, and Password cracking strategies (Kim, 2016). There are potential legal and ethical issues that could face the company. The company can be sued due to these security policies if they are against the laws and regulations regarding computer security. The company could also face ethical issues if it does things that are unethical while formulating and implementing these policies. References Kim, D. &. (2016). Fundamentals of information systems security. Oz, E. (2014). Management information systems. Module 4 The Balanced Scorecard
  • 14. Perspective Objective KPI Target Finance The company aims at being a market leader in regards to its website 43% market control 80% The company wants to increase market share through the use of its website Market share +15% greater than the five years The company also intends to reduce overall costs of production 30% reduction in costs. 50% Customer outstanding customer service 70% prompt in replying to feedback and other queries Immediate Customer retention 60% retention 80% for the next one year The company needs to make sure that there is constant supply of goods to the market through its website 70% efficiency in supply 100% Process Consistency in quality a smaller amount than 10% goods returned due to defects less than 5%
  • 15. diminish inventory turnover 6% turnover 3% quick to adjust to any alterations in technology pretty quick immediate Learning & Growth Employee contentment Survey index 90% A center of merit quality in training and nurturing the website experts 15 new apprentice this year 60 trainees each year To be a great company in terms of its use of the internet and its website 53 % new computers and devices this year 80% An balanced scorecard is a framework that is utilized as a part of key arranging and in administration by different associations including a not-for-profit association, government and numerous others. An balanced scorecard adjusts business conduct to the vision and in addition the system of the association. It enhances inward and also outer interchanges and investigate association execution neighboring vital objectives. The point of this paper is to make an baalanced scorecard and to clarify its significance in as a measure for assessing execution and strategizing for achievement. The organization to be utilized is Safeway and the its site that is sought in the market. There is different significance of the baalanced scorecard which incorporates estimation of execution, increment in immaterial resources and additionally actualizing a
  • 16. methodology. The conventional budgetary measures have been ended up being incapable since it neglects to mirror the environment that encompasses today's business. It additionally neglects to advance long haul thinking which is perilous to an association. The baalanced scorecard surveys execution from four interrelated methodologies: money related, inward business procedures, and learning and development and in addition a client. With the improvement of representative learning, inside business forms show signs of improvement. This pattern creates better items and administrations; hence, propelled consumer loyalty and more prominent piece of the overall industry is achieved, which is replicated in budgetary measures. As per Niven (2013), the baalanced scorecard helps with starting four administration forms that identify with fleeting and in addition long haul activities. The underlying stride helps in interpreting the vision and the technique for equipped strides. The accompanying stride includes conveying the operational terms to the diverse divisions of an association. The other stride would be that of business arranging. This procedure helps supervisors to choose the most fitting option that will help the association accomplish its objectives. Criticism together with learning helps chiefs to adjust to things that could change which guarantee that the association makes due for quite a while. The Business Process Perspective This perspective insinuates internal business shapes. Estimations considering this perspective allow the boss to know how well their business is running, and whether its things and organizations fit in with customer necessities (the mission). These estimations must be purposely made by the people who know these systems most by and by; with our one of kind missions, these are not something that can be made by outside counsels. The Customer Perspective This hypothesis has exhibited an extending affirmation of the hugeness of customer focus and purchaser unwaveringness in
  • 17. any business. These are driving markers: if customers are not satisfied, they will, at last, find diverse providers that will address their issues. Poor execution from this perspective is along these lines the principle pointer of future rot, in spite of the way that the present cash related picture may look extraordinary. In making estimations for satisfaction, customers should be dismembered similarly as sorts of customers and the sorts of methodology for which we are giving a thing or organization to those customer packs. The Financial Perspective Kaplan and Norton don't slight the standard necessity for money related data. Propitious and exact financing data will constantly be a need, and directors will do whatever critical to give it. Frankly, often there is all that anybody could require dealing with and treatment of cash related data. With the execution of a corporate database, it is assumed that a more prominent measure of the taking care of can be thought and mechanized. Regardless, the truth of the matter is that the present complement on financials prompts the "unequal" condition concerning diverse perspectives. There is perhaps need to join additional budgetary related data, for instance, peril assessment and cash sparing favorable position data, in this class. The Learning and Growth Perspective This perspective consolidates specialist preparing and corporate social perspectives related to both individual and corporate self- change. In a learning pro affiliation, people - the fundamental vault of data - are the standard resource. In the present climate of quick, creative change, it is getting the opportunity to be basic for data workers to be in a constant learning mode. Estimations can be established to guide boss in focusing get ready stores where they can help the most. In any case, learning and improvement constitute the urgent foundation for accomplishment of any worker data affiliation (Niven, 2013).
  • 18. References Nair, M. (2011). Essentials of balanced scorecard. Hoboken, N.J: John Wiley & Sons. Niven, P. R. (2013). Balanced scorecard step-by-step: Maximizing performance and maintaining results. Hoboken, N.J: Wiley. Module 5 Request for Proposal (RFP) Company Background Safeway is a company that was established in 1915. It is a supermarket that has an American origin. The company deals with retail or grocery products. Safeway operations are concentrated mainly in the central and western US. The company has many subsidiaries all over the world. Project Description Safeway is a company that is looking to establish a website that will be useful in selling its products and also in providing various services for its customers. The website lacks various features that are essential for a website to have and there is need for a good website to be developed. The website needs to be appealing so as to ensure that customers are attracted to continue liking at what the company offers. There is a need for the website to be detailed so that customers can find all of the information that they want. The company can build more of an online presence by ensuring that customers are well served in a manner that they become satisfied with the services that are being provided. Building an online presence requires that the company be there to address customer concerns such that they can be ready to answer all questions that are asked by concerned customers. Every individual in the world need to access the and be in a position to do some transactions comfortably. The objective of having such a website is to increase sales and also to address the needs of various customers. Design Requirements
  • 19. the company requires a website that has a sponsored blog to the website since it will help in boosting the sales that are obtained by the company. The website also needs to show performance of the firm in the stocks market. This feature will help many investors to be in a position to invest with this firm as a result of viewing its performance. The other data that should be captured on the website so as to boost the sales is the identity of the social media accounts belonging to the firm. Most of the company especially in the retailing stores use this approach as means of boosting the sales. Including offers to the website of the company will ensure that people have become attracted to the firm for caring for their needs. The design also needs to be in such a way that the company portrays its products in the website so that customers can view the products are offered in this company. Technical and Infrastructure Requirements the company welcomes bid from qualified professionals in this area. The individuals need to have an experience in web design so that they can be helpful in helping the company achieve its goals. The suppliers need to be knowledgeable in this area top ensure that the company benefits from their services of creating and maintaining Functional Requirements The company requires that there be a catalog that can be utilized by the users of the website so that they can realize where they need to click to find what. The company will also be aware of the features that have been placed and the ones that are missing. Estimated Project Duration the completion of this project is expected to be after two months. The company wants to use this website in doing business. Since the website is an easy procedure, the company expects to use the website from January 2017. Assumptions and Agreements The company expects that the suppliers only submit a single bid
  • 20. and if there is a violation of this requirement there will be an automatic. Any supplier that does not conform those the rules and regulations will be dismissed. Suppliers that will be demanding a price that is too high will not be considered. Submission Information the deadline for submitting applications is 30th November 20616. Applications need to be send to the company’s office so that an assessment can be done for the qualified supplier Additional Information or Clarification There are various people from the marketing department as well as from the technical department that will ask questions to clarify on other information that is required. The following emails can be used [email protected] safeway.com [email protected] these two websites will assist the suppliers to deal with the right people. Anyone with questions or comments can ask these people. Basis for Award of Contract A contract will be awarded to the supplier that meets all of the evaluation criteria Supplier The evaluating criteria that will be employed is Supplier skills and competence Experience The ability to assisting company’s team in an effective manner. Anticipated Selection Schedule The selection process will be from now to the 30th of September Module 6 An executive summary Website security is a fundamental aspect of every business as the need to protect critical information has become a necessary aspect in the modern world. Many small businesses have also not been left behind in trying to implement strategies aimed at
  • 21. protecting their websites. Most of the companies that have found it imperative to have fundamental security plans for their websites are those that operate by websites and computer systems. When such websites fail to operate, businesses can incur unprecedented losses as they may not be in a position to effectively sell the products as and when required. Customers may also not be in a position to access the websites and make orders for their products. Any website that is malfunctioning may imply that is has been hacked and can be detrimental to the business as well as the customers. The business records may also be lost when a database has been lost. Besides, the employees’ productivity can simultaneously be affected by the issues related to the websites and virus laden computers. Such issues related to websites should be avoided by all means as they can have serious impacts on the businesses. It is important for the businesses to implement plans aimed at mitigating the problems associated with the websites. For the quality functionality of the business, proper plans should be made to ensure that websites are secure and safe for everyone and that cases of intrusion have been minimized significantly. Most of the security issues related to the websites are caused by hacking by intruders. Most of the hackers use the automated scripts that they use to render the internet m less useful. However, all the issues related to the websites are preventable through proper security plans. The security plan is necessary for minimizing the vulnerabilities associated with the websites. Therefore, this discussion will primarily provide an overview of the website security plans of Safeway Grocery Store. Doing so will be of great help in the introduction of the security plan, the strategy of the plan, deliverables and also test cases. An introduction to the plan As the need to have secure websites for businesses grow, it has become necessary to have formulated plans in place so as to enhance security. When websites have been secured, businesses can gain profits and save most of the resources necessary for business growth. The web security of Safeway Groceries is
  • 22. important to protect it from being invaded by hackers. The security plan for the company’s website will consist of the following steps. Updating the software The company’s software will always be updated to mitigate any intrusion by the hackers and unwanted users. In most cases, the website is kept secure when all the loopholes that can be used by hackers have adequately been sealed. The IT department will have to determine if the kind of software that is in use whether it is a managed hosting solution or the third-party software so as to take the necessary ensure in securing he web. When the company uses hosting solution to the website, it would be necessary for it to seek guidance from the hosting company (Cobb, 2005). However, as is the case with Safeway Company, it uses the third party software, which will be effective to use the Content Management System such as Word Press to detect any issues with the website when logins have been made. Minimizing error messages The plan will also consider the amount of information given away as error messages to the website users. It will be necessary also to consider the correct languages to use on the website to discuss the failure of the website when trying to login. The comp-any will use language that is simple and generic such as ‘’ incorrect username’’. It is important for the companies to have a limit to the information given away to the web users. The error messages will be minimized since when web attackers use forced usernames and passwords to gain entry into the websites, and the error message is given away, they can use it to gain access to other fields (Administration, 2016). A web security plans strategy The company’s website security plan strategy will eventually involve strategies that seek to minimize the level of attack by hackers and other users. It will involve an installation of the web filtering products. The web filtering products are essential
  • 23. in the provision of the security intelligence systems that monitor the level of threats that the website faces. The company will consider having a platform whereby the information on the threats facing the websites can effectively be shared with all the users in the information department (Kim, 2016). Such consideration will be effective since the company will be well-prepared to respond to the threats that the website is exposed to. This is for the reason that such data on the information can easily help the users to easily notice any threats. Furthermore, the company will effectively assess all the elements associated with the website and its sources such as the Java Scripts. Such critical undertaking will effectively be instrumental in minimizing malicious attacks on the website. The company will also ascertain that its websites have been coded to minimize attacks. Issues such as the Cross-site Scripting and Script Site Forgeries are mostly common for the websites that have not observed key coding procedures for the websites. Coding is a proven method that complicates the methods that attackers use to gain access to the websites. The company, despite the fact that it is still growing, will dedicate most of its resources to ensure that the coding procedures have been put in place. The company will also communicate all the procedure to the Information Technology department, as a way of equipping them with the vital information related to the coding practices. Application of coding is an effective aspect of protecting websites as it is less costly that provides complete solutions to the problems associated with websites. Coding has 100% success rate of preventing criminals from attacking the websites. It is a strategy will provide a significant solution to the company’s web, by ensuring that all the risks have been kept at bay (Harwood, 2011). Another policy that the company considers effective is the application of authentic passwords. Such passwords should have a minimum of at least 8 characters with symbols as well as numbers to increase security measures. The server and websites should have strong passwords so as to maximize the level of
  • 24. security for the users’ accounts. The company’s system administrators should skillfully prevent any unauthorized people or users from accessing the computer network. Servers should also operate from a secure room that bars unauthorized people from gaining access. Employee passwords should never be stored on a computer that has access to the internet since hackers can take advantage of data provided to try and hack the system. The security goals of the company will be to ensure that the systems are safeguarded to minimize the threats posed to the company’s website. The security strategies that need to be implemented include Social engineering, various hacking tools, Viruses, Mail bombing, Trojan horses, worms, Packet replay, Packet modification, IP spoofing, and Password cracking strategies (Administration, 2016). Deliverables. Content security policy Safeway Company will be able to use the language policy so as to have a policy that is necessary and fit for a website resource. The policy provides the required guidelines on what the functions of the website will be. In so doing, the level of attacks on the company website may be minimized drastically and keeping the attackers at bay. The content security policy is essential in detecting the methods that can be used by the attackers to interfere with the web security through unauthentic codes. When an attacker uses a code and succeeds to perform an action, the website may be compromised, and there is no reverse to such an occurrence (Cobb, 2005). Through this policy, the server can easily tell the client about the actions which are acceptable and those who are not through the use of whitelists. Web regulations at the entry point The company will have policies that permit various web applications to have entry points necessitated by the policy manifest. Web applications have been vulnerable to the XSS/ XSRF because the web design is not formulated such that it can prevent malicious applications. The entry points are mostly the
  • 25. main factors that expose the web applications to vulnerability. The bookmarked pages which are found in the browser also allow for attacks when they have breakages. Therefore, the boundaries around web applications lead to security issues to the websites. At Safeway Company, plans are underway to have a strategy of managing the points of entry through the web application. The better way to succeed is through having EPR provided to the client so as to make the policy be a success. The company is also prohibiting deep-linking of the web applications for the reasons which are not related to security (Oz, 2014). Insecure requests upgrade The application is mostly used to improve the insecure requests to more secure before they are utilized in the web. The company, therefore, will be upgrading the HTTP to HTTPS, in a bid to ensure that users can only use secure links that do not make the company vulnerable to web attacks. By upgrading the links, the comoany6 will also be in a position to transfers various sites to the HTTPS without altering from changing links and references to scripts or even images. Test cases The company will conduct test cases to establish that the web security plans have significantly been enhanced. It will conduct a case to ascertain the correct and incorrect passwords to make sure that they are not less than 8 characters and that they are not the same as the user names. Confirmations will also be made in regards to ensuring that any person who tries to gain access to the website has been barred through locking them out. It is a common occurrence for intruders to access the site platforms using the wrong credentials to log in. Such occurrences the company has been incisive in minimizing them (Harwood, 2011). Another case that Safe Way Company will consider is if the necessary information about passwords, Credit Card numbers and also the Identity card numbers are concealed from outside
  • 26. users and attackers. The mechanism to ensure that they encrypted in a format that cannot be easily understood by non- users will be enhanced. Also, when typing in the information in the computer, every set will be required to ensure that it is not displayed in the input boxes. References Administration. (2016, November). Firewall. Retrieved from The Web Security Strategy for Your Organization: http://www.firewall.cx/general-topics-reviews/security- articles/268-web-security-strategy.html Cobb, M. (2005). TechTarget. Retrieved from How to develop an effective application security strategy: http://searchsecurity.techtarget.com/answer/How-to-develop-an- effective-application-security-strategy Harwood, M. (2011). jblearning. Retrieved from Security Strategies in Web Applications and Social Networking: http://www.jblearning.com/catalog/9780763791957/ Kim, D. &. (2016). Fundamentals of information systems security. Oz, E. (2014). Management information systems. Module 01 Course Project – Business Description and Components Total Points Possible
  • 27. 100 Insufficient/Not Evident Progressing Competent Exemplary Earned Points Provided a description of the company Explain the company’s purpose, mission, and structure (20 Max Point Value) (0-5 pts.) Content was not included or incomplete, and/or extremely inaccurate (6-11 pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (12-15 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (16-20 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 19 Describe the organization’s system in terms of inputs, processes, and outputs (20 Max Point Value) (0-5 pts.) Content was not included or incomplete, and/or extremely inaccurate. (6-11 pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (12-15 pts.) Question is mostly addressed; Content meets criteria with
  • 28. minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations (16-20 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 18 Describe how the company is organized, its people, and technology features; also, the importance of an MIS system to the company (20 Max Point Value). (0-5 pts.) Content was not included or incomplete, and/or extremely inaccurate. (6-11 pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (12-15 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations (16-20 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 18 Paper meets minimum 3 page length requirement. Included an APA formatted title page (10 Max Point Value) (0-2pts.) Paper not submitted. No title page submitted. (3-6pts.) Paper is less than 1page long and/ or no APA title page provided. (7-8 pts.) Paper is less than 3 pages long, but at least 2 and/or no APA
  • 29. title page provided. (9-10 pts.) Paper is a minimum of 3 pages long. APA formatted title page provided 9 Demonstrates effective usage of English grammar and mechanics. (10 Max Point Value) (0pts.) More than 10 errors in English grammar and mechanics observed. (3-6pts.) 6-10 errors in English grammar and mechanics. (7-8 pts.) 3-5 errors in English grammar and mechanics. (9-10 pts.) 0-2 errors in English grammar and mechanics. 9 Transferrable Skills Communication: Used proper tone in paper. Spoke from a “consultant” point of view. Kept in mind that audience was the Leadership Team for the online grocery store (5 Max Point Value) (0pts.) Did not use proper tone and did not structure paper according to proper audience. (__1-2_pts.) Used proper tone somewhat, but paper wasn’t fully structured properly with audience in mind. (__3-4_pts.) Used proper tone mostly. Paper mostly structured properly according to stated audience. (_5_pts.) Used proper tone. Paper structured properly according to stated audience. 5 Information Literacy: Included a minimum of 2 credible sources
  • 30. for research, with 1 being an academic source, such as a book or an academic scholarly journal (10 Max Point Value). (0pts.) No sources were submitted (3-6pts.) Less than 2sources and/or sources are not credible. Missing 1scholarly sources (7-8 pts.) 2 credible sources were submitted, but 1 was not a scholarly source (9-10 pts.) Included a minimum of 2 credible sources for research, with 1 being an academic source, such as a book or an academic scholarly journal 9 Information Literacy: Use APA documentation style to cite sources. (5 Max Point Value) (0pts.) No elements of APA formatting used. (__1-2_pts.) Some elements of APA formatting used. (__3-4_pts.) Most elements of APA formatting used. (_5_pts.) All required elements of APA formatting are used. 4 Module 02 Project – Strengthening Web Presence Total Points Possible 100 Insufficient/Not Evident Progressing
  • 31. Competent Exemplary Earned Points Discussed how the company would build more of an online presence (15 Max Point Value) (0-5 pts.) Content was not included or incomplete, and/or extremely inaccurate (6-10 pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (11-13 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (14-15 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 14 Discuss how the business would benefit from adding a company-sponsored blog to their website (20 Max Point Value) (0-5 pts.) Content was not included or incomplete, and/or extremely inaccurate. (6-11 pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (12-15 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations (16-20 pts.) Question is fully and accurately addressed. Content meets or
  • 32. exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 19 Paper meets minimum 3 page length requirement. Included an APA formatted title page (5 Max Point Value) (0pts.) Paper not submitted. No title page submitted. (1-2pts.) Paper is less than 1page long and/ or no APA title page provided. (3-4pts.) Paper is less than 3 pages long, but at least 2 and/or no APA title page provided. (5 pts.) Paper is a minimum of 3 pages long. APA formatted title page provided 4 Demonstrates effective usage of English grammar and mechanics. (5 Max Point Value) (0pts.) More than 10 errors in English grammar and mechanics observed. (1-2pts.) 6-10 errors in English grammar and mechanics. (3-4 pts.) 3-5 errors in English grammar and mechanics. (5 pts.) 0-2 errors in English grammar and mechanics. 4 Transferrable Skills Communication: Used proper tone in paper. Spoke from a “consultant” point of view. Kept in mind that audience was the Leadership Team for the online grocery store (5 Max Point Value)
  • 33. (0pts.) Did not use proper tone and did not structure paper according to proper audience. (__1-2_pts.) Used proper tone somewhat, but paper wasn’t fully structured properly with audience in mind. (__3-4_pts.) Used proper tone mostly. Paper mostly structured properly according to stated audience. (_5_pts.) Used proper tone. Paper structured properly according to stated audience. 4 Digital Fluency: Analysis of their website. What was favorable about their website? What are some of their website attributes that customers may find unappealing? (20 Max Point Value) (0-5 pts.) Content was not included or incomplete, and/or extremely inaccurate. (6-11 pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (12-15 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations (16-20 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 20 Digital Fluency: Recommendations for data that they should capture to help with their online conversions (sales) and why. (20 Max Point Value) (0-5 pts.) Content was not included or incomplete, and/or extremely inaccurate.
  • 34. (6-11 pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (12-15 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations (16-20 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 20 Information Literacy: Included a minimum of 2 credible sources for research, with 1 being an academic source, such as a book or an academic scholarly journal (5 Max Point Value). (0pts.) No sources were submitted (1-2pts.) Less than 2sources and/or sources are not credible. Missing 1scholarly sources (3-4 pts.) 2 credible sources were submitted, but 1 was not a scholarly source (5 pts.) Included a minimum of 2 credible sources for research, with 1 being an academic source, such as a book or an academic scholarly journal 5
  • 35. Information Literacy: Use APA documentation style to cite sources. (5 Max Point Value) (0pts.) No elements of APA formatting used. (__1-2_pts.) Some elements of APA formatting used. (__3-4_pts.) Most elements of APA formatting used. (_5_pts.) All required elements of APA formatting are used. 4 Module 03 Project – Securing Information Systems Total Points Possible 100 Insufficient/Not Evident Progressing Competent Exemplary Earned Points Describe some of the possible risks to the store’s security system (20 Max Point Value) (0-5 pts.) Content was not included or incomplete, and/or extremely inaccurate. (6-11 pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (12-15 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations (16-20 pts.) Question is fully and accurately addressed. Content meets or
  • 36. exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 20 Draft a security policy that addresses the risks, identifies security goals, and discusses strategies for achieving those goals. (25 Max Point Value) (0-5 pts.) Content was not included or incomplete, and/or extremely inaccurate. (6-13pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (14-20 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations (21-25 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 25 Paper meets minimum 3 page length requirement. Included an APA formatted title page (10 Max Point Value) (0-2pts.) Paper not submitted. No title page submitted. (3-6pts.) Paper is less than 1page long and/ or no APA title page provided. (7-8 pts.) Paper is less than 3 pages long, but at least 2 and/or no APA title page provided. (9-10 pts.) Paper is a minimum of 3 pages long. APA formatted title page provided
  • 37. 10 Demonstrates effective usage of English grammar and mechanics. (10 Max Point Value) (0pts.) More than 10 errors in English grammar and mechanics observed. (3-6pts.) 6-10 errors in English grammar and mechanics. (7-8 pts.) 3-5 errors in English grammar and mechanics. (9-10 pts.) 0-2 errors in English grammar and mechanics. 10 Transferrable Skills Communication: Used proper tone in paper. Spoke from a “consultant” point of view. Kept in mind that audience was the Leadership Team for the online grocery store (10 Max Point Value) (0pts.) Did not use proper tone and did not structure paper according to proper audience. (__3-6_pts.) Used proper tone somewhat, but paper wasn’t fully structured properly with audience in mind. (__7-8_pts.) Used proper tone mostly. Paper mostly structured properly according to stated audience. (_9-10_pts.) Used proper tone. Paper structured properly according to stated audience. 10 Ethics and Professionalism: Discuss some of the ethical and potential legal issues for the company and how the security measures that you’ve outlined will help to minimize those issues (20 Max Point Value) (0-5 pts.) Content was not included or incomplete, and/or
  • 38. extremely inaccurate. (6-11 pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (12-15 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations (16-20 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 20 Module 04 Course Project – Business Description and Components Total Points Possible 100 Insufficient/Not Evident Progressing Competent Exemplary Earned Points Describe how the balanced scorecard with help management to identify information requirements. (30 Max Point Value) (0-5 pts.) Content was not included or incomplete, and/or extremely inaccurate (6-18pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (19-25 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding
  • 39. through appropriate examples and explanations. (26-30 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 29 Paper meets minimum 3 page length requirement. Included an APA formatted title page (10 Max Point Value) (0-2pts.) Paper not submitted. No title page submitted. (3-6pts.) Paper is less than 1page long and/ or no APA title page provided. (7-8 pts.) Paper is less than 3 pages long, but at least 2 and/or no APA title page provided. (9-10 pts.) Paper is a minimum of 3 pages long. APA formatted title page provided 10 Demonstrates effective usage of English grammar and mechanics. (10 Max Point Value) (0pts.) More than 10 errors in English grammar and mechanics observed. (3-6pts.) 6-10 errors in English grammar and mechanics. (7-8 pts.) 3-5 errors in English grammar and mechanics. (9-10 pts.) 0-2 errors in English grammar and mechanics. 10 Transferrable Skills Communication: Used proper tone in paper. Spoke from a
  • 40. “consultant” point of view. Kept in mind that audience was the Leadership Team for the online grocery store (5 Max Point Value) (0pts.) Did not use proper tone and did not structure paper according to proper audience. (__1-2_pts.) Used proper tone somewhat, but paper wasn’t fully structured properly with audience in mind. (__3-4_pts.) Used proper tone mostly. Paper mostly structured properly according to stated audience. (_5_pts.) Used proper tone. Paper structured properly according to stated audience. 5 Digital Fluency: Discuss the IS system would recommend for management to use to obtain this information for each scorecard component and provided rationale for recommendations (30 Max Point Value) (0-5 pts.) Content was not included or incomplete, and/or extremely inaccurate (6-18pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (19-25 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (26-30 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 29 Information Literacy: Included a minimum of 2 credible sources for research, with 1 being an academic source, such as a book or
  • 41. an academic scholarly journal (10 Max Point Value). (0pts.) No sources were submitted (3-6pts.) Less than 2sources and/or sources are not credible. Missing 1scholarly sources (7-8 pts.) 2 credible sources were submitted, but 1 was not a scholarly source (9-10 pts.) Included a minimum of 2 credible sources for research, with 1 being an academic source, such as a book or an academic scholarly journal 10 Information Literacy: Use APA documentation style to cite sources. (5 Max Point Value) (0pts.) No elements of APA formatting used. (__1-2_pts.) Some elements of APA formatting used. (__3-4_pts.) Most elements of APA formatting used. (_5_pts.) All required elements of APA formatting are used. 5 Module 05 Course Project - Beginning Phase Total Points Possible 100 Insufficient/Not Evident Progressing Competent
  • 42. Exemplary Earned Points Demonstrates effective usage of English grammar and mechanics. (10 Max Point Value) (0-2 pts.) More than 10 errors in English grammar and mechanics observed. (3-6pts.) 6-10 errors in English grammar and mechanics. (7-8 pts.) 3-5 errors in English grammar and mechanics. (9-10 pts.) 0-2 errors in English grammar and mechanics. 10 Transferrable Skills Digital Fluency: Create a new folder called “LastName FirstName Project 1” (10 Max Point Value) (0-2 pts.) Content was not included or incomplete, and/or extremely inaccurate (3-6pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (7-8 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (9-10 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 10 Digital Fluency: Saved the file to your hard drive. (10 Max Point Value)
  • 43. (0-2pts.) Content was not included or incomplete, and/or extremely inaccurate (3-6pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (7-8 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (9-10 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 10 Digital Fluency: Add all the required tags (What are they again?) Title your RFP page: Your Name Project Proposal 1 (15 Max Point Value) (0-3pts.) Content was not included or incomplete, and/or extremely inaccurate (4-8pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (9-12 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (13-15pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 14 Digital Fluency: In the <body>, add 2 headings. Title the first heading: “My
  • 44. Proposal” and the second: “My Research” (10 Max Point Value). (0-2pts.) Content was not included or incomplete, and/or extremely inaccurate (3-6pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (7-8 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (9-10 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 10 Digital Fluency: Separated the headings with a horizontal rule. (10 Max Point Value). (0-2pts.) Content was not included or incomplete, and/or extremely inaccurate (3-6pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (7-8 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (9-10 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 10 Digital Fluency:
  • 45. Typed up as much content that will allow you to put together an RFP for a grocery delivery website. (15 Max Point Value). (0-3pts.) Content was not included or incomplete, and/or extremely inaccurate (4-8pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (9-12 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (13-15pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 15 Digital Fluency: Find a picture of project management (use google images), download it into your project 1 folder, and add it to the “My Proposal” section of your web page. (10 Max Point Value). (0-2pts.) Content was not included or incomplete, and/or extremely inaccurate (3-6pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (7-8 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (9-10 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 10
  • 46. Digital Fluency: Added at least 3 resources to the “My Research” section of your page. al (10 Max Point Value). (0-2pts.) Content was not included or incomplete, and/or extremely inaccurate (3-6pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (7-8 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (9-10 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations 10 Module 06 Course Project - Website Security Test Plan Total Points Possible 100 Insufficient/Not Evident Progressing Competent Exemplary Earned Points Provided an executive summary (10 Max Point Value) (0-2pts.) Content was not included or incomplete, and/or extremely inaccurate (3-6pts.)
  • 47. Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (7-8 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (9-10 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations Provided a plan introduction (10Max Point Value) (0-2pts.) Content was not included or incomplete, and/or extremely inaccurate (3-6pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (7-8 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (9-10 pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations Included a web security plan strategy (15 Max Point Value). (0-3pts.) Content was not included or incomplete, and/or extremely inaccurate (4-8pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (9-12 pts.) Question is mostly addressed; Content meets criteria with
  • 48. minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (13-15pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations Included deliverables (15 Max Point Value) (0-3pts.) Content was not included or incomplete, and/or extremely inaccurate (4-8pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (9-12 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (13-15pts.) Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations Included test cases (15 Max Point Value) (0-3pts.) Content was not included or incomplete, and/or extremely inaccurate (4-8pts.) Question is only partially addressed: Content shows a basic understanding of key ideas, yet includes some inaccuracies (9-12 pts.) Question is mostly addressed; Content meets criteria with minimal errors, is accurate and shows a clear understanding through appropriate examples and explanations. (13-15pts.)
  • 49. Question is fully and accurately addressed. Content meets or exceeds criteria, is accurate and shows an extraordinary understanding through rich examples and explanations Paper meets minimum 6 page length requirement. Included an APA formatted title page (10 Max Point Value) (0-2pts.) Paper not submitted. No title page submitted. (3-6pts.) Paper is less than 3pages long and/ or no APA title page provided. (7-8 pts.) Paper is less than 5 pages long, but at least 4 and/or no APA title page provided. (9-10 pts.) Paper is a minimum of 6 pages long. APA formatted title page provided Demonstrates effective usage of English grammar and mechanics. (10 Max Point Value) (0pts.) More than 10 errors in English grammar and mechanics observed. (3-6pts.) 6-10 errors in English grammar and mechanics. (7-8 pts.) 3-5 errors in English grammar and mechanics. (9-10 pts.) 0-2 errors in English grammar and mechanics. Transferrable Skills Information Literacy: Included a minimum of 5credible sources for research, with 2 being an academic source, such as a book or an academic scholarly journal (10 Max Point Value).
  • 50. (0pts.) No sources were submitted (3-6pts.) Less than 5 sources and/or sources are not credible. Missing 2 scholarly sources (7-8 pts.) 5 credible sources were submitted, but 2 were not a scholarly sources (9-10 pts.) Included a minimum of 5 credible sources for research, with 1 being an academic source, such as a book or an academic scholarly journal Information Literacy: Use APA documentation style to cite sources. Used in-text citations (5 Max Point Value) (0pts.) No elements of APA formatting used. (__1-2_pts.) Some elements of APA formatting used. (__3-4_pts.) Most elements of APA formatting used. (_5_pts.) All required elements of APA formatting are used.
  • 51. Ethics & Professional Responsibility Defining “Ethics & Professional Responsibility” Ethics and professional responsibility can be defined and applied in many ways based on a person’s own values and experiences. Often these terms refer to our behavior or decision- making that impacts a larger community. We often derive our ethical standards and beliefs from our cultural norms and what we see in society ("Ethics & Professional Responsibility," n.d.). The Society of Human Resources Managers (n.d) defines ethics of the workplace as “the values an organization demonstrates in its goals, policies and practices” (p.1). SHRM further describes ethical values as the core of the workplace culture where “ethics encompass work, play, family, education, community, politics, war, and worship” (SHRM Foundation’s Effective Practice, n.d.). Each individual’s values will be influenced by these factors and further influence the environment of his or her workplace. Value of “Ethics & Professional Responsibility” to the Workplace and/or Student’s Career As employees, our values may be categorized in different ways: organizational, professional, and personal values. A positive culture, one where ethical values are
  • 52. integrated, enriches the workplace experience for all stakeholders (SHRM Foundation’s Effective Practice, n.d.).While our basis for ethics is ingrained from societal values, people will also see and respond to situations quite differently from each other. Recognizing that individuals have different reactions will help one another respect unique differences and “not view them as somehow wrong” when variances occur (King & Skakoon, 2010). For example, meeting deadlines is perceived differently by individuals, to some it may be considered simply wrong and unacceptable to not meet the deadline, while others may not view it as significant. The reaction to a missed deadline will vary among peers. Demonstrating the “Ethics & Professional Responsibility” skill The results of employees with strong ethical skills can be seen across the business through outcomes such as positive workplace environment, productivity, and teamwork. “Businesses that have ethical workplace cultures outperform their competitors and peers in all the categories that matter, but especially in stock price growth.” (SHRM Foundation’s Effective Practice, n.d., p.1) Further, on an individual level, ethical employees outperform their peers over time. While unethical decisions made may not impact a person in the short-term, reputations build over time and can impact promotional opportunities and career options. Individually, the result of ethical behavior is found in our personal core values and principles
  • 53. and through our professionalism on the job. With strong ethical and professional responsibility ingrained, we do not rely on feedback from others, rather we build “the capacity to sustain ourselves and move forward even in the absence of support and validation from others” (Froman, 2010 p. 61). Building ethical skills allows for decision- making processes to become intuitive and can occur more efficiently. Workplace Consequences when lacking the “Ethics & Professional Responsibility” skill Organizations need employees who anticipate and adapt to change and difficult decisions. The SHRM Foundation’s Effective Practice (n.d.) suggests, “Ethically engaged, internally motivated employees learn and adapt faster than ethically disengaged, externally motivated workers. With ethical clarity comes trust, which can ease the tension of difficult workplace situations” (p.4). While ethics may be full of gray areas, the ability to think critically supports the mission of thriving organizations ("Ethics & Professional Responsibility," n.d.). Employees who are engaged will feel empowered to strive to reach ethical standards and serve customers and co-workers in a positive way. Further Development of the “Ethics & Professional Responsibility”
  • 54. skill Brian Tracy (2012) suggests a process to build the skills related to professional responsibility with three steps for growth. First, “accept complete responsibility for yourself” and next, that only you can change your situation and finally, “set clear goals with time lines” and results will follow (p. 4). These steps can help guide individuals to developing ethical skills by avoiding blame and taking an active part in responding with ethical values in mind. Even the best employees can continue their development in the skill of ethics and professional responsibility. New situations create new opportunities for growth. The SHRM Foundation’s Effective Practice (n.d) considers “ethical learning happens when people discuss and debate their values” (p.3). Clarifying our beliefs by sharing them begins the process of internally debating the issue. Further, by listening and sharing ideas with others, we can hear reactions to our ideas and grow in our respect for other values.
  • 55. References Ethics & professional responsibility. (n.d.). Retrieved August 5, 2014, from Online Academic Guides website: http://guides.rasmussen.edu/ethics Froman, L. (2010). Positive psychology in the workplace. Journal Of Adult Development, 17(2), 59-69. http://dx.doi.org/10.1007/s10804-009-9080-0 King, W.J., & Skakoon, J.G. (2010). The unwritten laws of engineering. Mechanical Engineering, 132(12), 43-47. SHRM foundation’s effective practice guidelines series: shaping an ethical workplace culture. (n.d.). Retrieved from SHRM Foundation website: http://www.shrm.org/about/foundation/products/Documents/9- 13%20Ethics%20EPG%20FINAL.pdf Tracy, B. (2012). The power of self-confidence. Hoboken, NJ: John Wiley & Sons. Digital Fluency
  • 56. WHAT DOES DIGITAL FLUENCY MEAN? Rasmussen College defines Digital Fluency as “effectively employing and understanding digital tools to express ideas in appropriate contexts" (“Digital Fluency,” 2014, para.1). This skill involves a continual effort to ethically interpret information, uncover the context and content, synthesize the new knowledge, and clearly communicate it to an audience who is immersed in a digitally connected world. Dictionary.com defines fluent as “able to speak or write smoothly, easily, or readily” (2014, para 2). People have communicated through writing and reading for generations, so being fluent is not a new concept. What is relatively new is the introduction of technology which evolves fluency further. The Internet allows vast amounts of information to be available to anyone with access to a digital device. This limitless access to information requires a different skillset in order to separate information from hearsay. Additionally, the web encourages more collaboration among a variety of partners. Let’s take Wikipedia for instance. It is generated by the users (or volunteers) from around the world, and the content is constantly vetted by the contributors. The ability to appropriately utilize Wikipedia with an awareness of its strengths (i.e., open and transparent content), weaknesses (content possibly written by amateurs), and differences with paper-based references requires digital fluency. The difference between print and digital technology is that digital technology is interactive,
  • 57. immediate, and fluid. Our job as digital citizens is then to translate our current capacities to understand printed materials and prepare for digital fluency that will still require us to process and critically apply information. WHAT IS THE VALUE OF THE DIGITAL FLUENCY SKILL TO THE WORKPLACE AND/OR YOUR CAREER? The 21st Century Information Fluency Project (2014) states that “at home, at school, and in the workplace, digital information is beginning to rival print as the primary format for information” (para. 5). Only a small fraction of new information created today appears in print format. For that reason, the ability to locate, evaluate, and ethically use that information is fast becoming a skill as essential as traditional print literacy has been. In the new digital world, information enriches our lives, personally, socially, and economically. Those without the skills to use digital information will become increasingly disadvantaged at home, at school, and in the workplace (The 21st Century Information Fluency Project,2014, para. 1). What does this mean to you as you launch your career? According to iStart (2014), increasing computer competency by just 20 minutes a day adds up to 1.7 hours a Figure 2. An image of the differences between digital fluency and digital literacy. Taken from: The Digital Frontline image. (2011). The Digital Frontline. Retrieved from http://thedigitalfrontline.com/2012/06/12/digital-literacy- dont-let-them-learn-it-on-the-streets/ Copyright 2011
  • 58. week in gained productivity. This results in an annual savings of $1,820 per employee. Improving digital fluency isn’t only about saving money; it is also about greater productivity, or knowing how to work smarter and not harder. For example, inefficient processing of the flood of incoming emails slows down other tasks. Learning to use email software such as Microsoft Outlook to filter out junk email makes it easy to search for the right email you need to access to get the job done. Collectively developing digital fluency in the workplace is a sure way to succeed as an organization. WHAT ARE THE CONSEQUENCES TO YOUR CAREER OR WORKPLACE IF THE DIGITAL FLUENCY SKILL IS LACKING? HOW IS THE DIGITAL FLUENCY SKILL DEMONSTRATED? Literacy and fluency shape our ability to use technology to achieve a desired outcome. As an information consumer, this applies to our ability to use available digital resources to gather information that we intend to communicate, and it applies to our ability to use digital technologies to have the intended positive effect on people and situations. Note that a literate person is perfectly capable of using such resources. He or she knows how to use them and what to do with them, but the outcome is less likely to match the intention. It is not until that person reaches a level of fluency, however, that he
  • 59. or she is comfortable with using the resources to achieve the desired outcome. He or she can even appreciate why the resources being used are appropriate and likely to have the desired outcome at all (Christian, 2011). Lack of digital fluency will lead to poor research and shallow analysis of the information to be processed. Digital fluency can be demonstrated in a workplace in a few ways. One example is how you interact with your colleagues online, such as personal email or discussion forums. Virginia Shea (1994), the author of Netiquette, defines it as “network etiquette, the do's and don'ts of online communication” (p. 20). She outlines ten rules and reminders of Netiquette in her book. Some of the rules include: • Rule 1: Remember the human o Remember that behind every screen is a human being with independent thoughts and feelings. It is easy to misunderstand or be rude to others when you are not interacting with them in person. Before clicking send or post, ask yourself: Would you say it to the person's face? • Rule 2: Adhere to the same standards of behavior that you follow in "real life" o This rule is a reminder that the ethical standards and laws that govern our society extend to cyberspace as well. This includes harassment and bullying,
  • 60. copyright regulations, and privacy. • Rule 8: Respect other people's privacy o The Internet is an open forum. Remember not to share information about others that could get them -- or yourself -- into trouble, both personally and professionally (Shea, p.33). Mastery of rules such as these make employees dependable, trustworthy, and productive. WHAT CAN STUDENTS DO NOW TO FURTHER DEVELOP THIS TRANSFERABLE SKILL? Students can take advantage of many opportunities Rasmussen College offers to develop digital fluency skills. On campus, there is a computer lab with the latest software to learn and practice your skills. Online, there are Online Academic Guides available (http://guides.rasmussen.edu) at Rasmussen College’s website (Rasmussen College Website, 2014a 2014b) to help you learn how to research topics. The librarians are always available to answer any questions you have. Outside of Rasmussen College, your local library may offer a digital studio where, for example, you can learn to compose music on your computer. Computer programming is another avenue to develop digital fluency.
  • 61. Mitchel Resnick at the Massachusetts Institute of Technology (MIT) argues that “coding is the new literacy. To thrive in tomorrow’s society, young people must learn to design, create and express themselves with digital technologies” (The Berkman Center for Internet & Society, 2014, para. 3). Scratch language developed at MIT teaches anyone to think creatively and use logic – both skills indispensable in the new digital world. The key is to embrace technology to build confidence in your ability to use technology. http://guides.rasmussen.edu/ References
  • 62. Christian. (2011, February 5). The difference between digital literacy and digital fluency. Retrieved from http://www.socialens.com/blog/2011/02/05/the- difference-between- digital-literacy-and-digital-fluency/ Fluent [Def. 2]. (2014). Retrieved from http://www.dictionary.com Rasmussen College Website. (2014a). Digital fluency. Retrieved from http://guides.rasmussen.edu/digital iStart. (2014). Digital literacy: Getting your workplace up to speed. Retrieved from http://www.istart.co.nz/index/HM20/AL213/AR214189 Rasmussen College Website. (2014b). Home. Retrieved from http://guides.rasmussen.edu/ Resources. (2014, July). Retrieved August 13, 2014, from Resources website: http://guides.rasmussen.edu/digital2 Shea, V. (1994). Netiquette. (Online ed., pp. 32-45). San Francisco: Albion Books. Albion Books. 21st Century Information Literacy. (2014, January 7). Why is DIF important? Retrieved from
  • 63. http://21cif.com/resources/difcore/dif_faqs.htm#important The Berkman Center for Internet & Society. (2014, July 10). 21st century literacy: New initiative makes the case that learning to code is for everyone. Retrieved from http://cyber.law.harvard.edu/node/9222 The Digital Frontline image. (2011). The Digital Frontline. Retrieved from http://thedigitalfrontline.com/2012/06/12/digital-literacy-dont- let-them-learn-it-on-the- streets/ INFORMATION LITERACY WHAT DOES IT MEAN? According to the Association of College & Research Libraries (ACRL), information literacy is “the set of integrated abilities encompassing the reflective discovery of information, the understanding of how information is produced and valued, and the use of information in creating new knowledge and participating ethically in communities of learning” (Framework for Information Literacy for Higher Education, 2015, para. 6) It
  • 64. is a survival skill for the Age of Information.Information literacy also provides a foundation for lifelong learning, and is essential to responding effectively in the ever-changing academic and workplace environment. . It is common to all disciplines, to all learning environments, and to all levels of education. In fact, businesses actively search for employees who are able to gather information quickly, evaluate, analyze, and present realistic solutions based on the information gathered (Owusu-Ansah, 2007). Individuals who are ‘information literate’ are empowered to make sound arguments, appreciate different perspectives, and search for opportunities for personal and professional improvement. The High- Level Colloquium on Information Literacy and Lifelong Learning (UNESCO, 2005) proposes that information literacy is “a prerequisite for participating effectively in the Information Society and is part of the basic human right of lifelong learning” (p. 30). An information literate individual is able to meet several performance indicators, and the first one is being able to determine the extent of information needed. Before gathering research even begins, part of the information literacy process involves being able to define the information needed, understanding what type of information is needed, and determining exactly how much information is needed.
  • 65. After determining the information needed, next the information literate individual will be able to find and access the needed information effectively and efficiently. Determining the best way to retrieve information and what search systems will be most effective and efficient are signs of information literacy. Information literacy is more than knowing how to use technology to gather facts and figures. Individuals can be information literate regardless of access to a specific type of technology or device. Technology is the vehicle for access to online and physical library systems on campus, at home, at work, or even at the local coffee shop. This open access to resources is critical to writing a paper, collaborating on a team project, or even locating directions to the nearest gas station. The next step in the information literacy process is being able to critically evaluate information and its sources. Is the information that has been gathered valid and relevant? This step is increasingly important as we now depend almost solely on technology to help us find information. Constant changes in technology require the ability to navigate through multiple types of sources online quickly and easily; however, not all information gathered from the internet is appropriate or reliable. The International Federation of Library Associations and Institutions (2012), delves into the need for
  • 66. individuals to understand how to avoid using generic, but readily-available search engines like Google as a primary source of information. Although Google can provide answers to the radio announcer’s trivia question of the day, it is not the best source for identifying all of the possible side effects to the drug the neonatologist just prescribed an infant patient. The ability to evaluate information with a critical eye is often challenging and multi- dimensional. It is not always easy to locate answers to important questions in just one attempt as effective search strategies are often complex. Individuals who are ‘information literate’ are able to locate information from a variety of appropriate sources, and revise search strategies if information gathered is irrelevant, biased, or insignificant. Information literacy does go beyond a finite skill set to the notion that allows the individual to gain a new view of a subject landscape move through a “liminal” space, an uncomfortable, challenging transition, and emerge with transformed perspective. After evaluating the information gathered, the next step is to incorporate the selected information into one’s knowledge base and use information effectively to accomplish a specific purpose. Information gathered might simply be for personal growth, or it could be for academic tasks and professional development. Lifelong learning is at the center of information literacy. Lifelong learners recognize that learning happens every day and
  • 67. adding new knowledge to our ‘wheelhouses’ provides growth and development both personally and professionally. The final step in the information literacy process is to understand the economic, legal, and social issues surrounding the use of information, and access and use information ethically and legally. This involves more than plagiarism and also encompasses freedom of speech, privacy, intellectual property, fair use, and much more. Using information ethically also extends outside of the academic world. Corporations have compliance and legal departments directly responsible for the application of rules and regulations by employees and the organization itself. Economic and legal penalties can be imposed if an individual, organization or institution has not followed proper guidelines in crediting original authors, editors, or groups with acknowledgment of their original work WHAT IS THE VALUE OF INFORMATION LITERACY IN ONE’S CAREER? HOW IS THIS TRANSFERABLE SKILL DEMONSTRATED? Proficiency of information literacy equips individuals with the strategies to be independent, critical thinkers. Being information literate is an important skill for any career. In the health and human services fields, information literacy is essential to understanding documentation, records, charts and treatments to guarantee care, accuracy in diagnosis, treatment plans and patient instructions. According to UNESCO (2005), Dr. Phil Candy
  • 68. stresses that information literacy is crucial for health care workers to provide ethical, responsible services to patients and collaboration across sectors, including “education, care providers, insurance companies, libraries, publishers and pharmaceutical companies” (p.55). Dr. Candy also emphasizes a need for evidence-based decision making in healthcare to provide patients with the best options for therapies and pharmacological interventions (UNESCO, 2005). In the criminal justice and related fields, information literacy is imperative to recognizing the application of laws, statutes and the legal system, and ensuring that justice is applied fairly and consistently. As a law enforcement detective, it is essential to understand how to investigate a ‘cold-case’ by collection of evidence, research of previous cases, witness testimony review and analysis of similar criminal reports in adjacent jurisdictions. A suspect would not be held accountable for his or her actions if the detective relies on unreliable information gathered from a generic internet search on “How to pursue a homicide suspect.” Additionally, in fields of business, information literacy is crucial to team collaboration and successful project management. All members of the team need to be able to gather relevant information quickly and evaluate source materials for bias and appropriate business
  • 69. application. Creating an innovative solution or new product often requires understanding of patent processes, cost analysis and knowledge of previous attempts by competitors. WHAT ARE THE CONSEQUENCES IF INFORMATION LITERACY IS LACKING? Competition for jobs is often a reality in many fields, and college graduates need to be prepared to prove their worth during the interview process. Unfortunately, without successful tools in information literacy, candidates may be overlooked for jobs despite solid transcripts and work experience. Imagine a graduate with a 3.5 GPA, externship experience, and glowing letters of recommendation interviewing for a coveted position with a Fortune 500 company. The interview is going well, and the graduate is able to answer all of the questions about skills for the job impeccably. The interviewer then asks, “How would you lead a team to find a solution to our company’s current problem with…?” Without the ability to explain the information literacy process succinctly, the graduate may lose out on a dream job. In a recent study from Project Information Literacy (Head, 2014), college students were more likely to use Google as a search engine and preferred “online forums, blogs, webinars, MOOCs, YouTube, and face-to-face conversations” for information sources (p.4). By avoiding opportunities to perform scholarly research using
  • 70. appropriate methods, students are unable to practice the strategies needed to be ‘information literate’ upon graduation. According to Owusu-Ansah (2007), individuals must also understand how “copyright, intellectual property and plagiarism” are critical factors in information literacy skill development (p.417). Information literacy is essential for employees to produce ethically and legally compliant products and services. When individuals are not cognizant of the ramifications of failure to comply with copyright laws and plagiarism rules, the result can be disastrous. Consider the following scenarios: A. An employee creates a presentation to the Board of Directors of the company and includes an online video from a Grammy-winning artist. The emotion and passion of the video, music and lyrics fit perfectly into the presentation and the reaction from the board is overwhelmingly positive. The company agrees to sign a contract with an outside vendor for $1 million provided the music is included in the marketing campaign. Unfortunately, the employee did not understand Creative Commons licensing and assumes it is not a big deal to gain permission from the artist. The original artist files a lawsuit against the company for violation of copyright, the company loses the $1 million contract, and the employee is fired.
  • 71. B. A Nursing student is in the final quarter before graduation and has already accepted a position at a prestigious local hospital in a preferred department. The job offer is contingent on a diploma in hand by the end of the quarter. The student has an A in the externship course and the final project is due at the end of the next week. The student has been working 40+ hours at a local pharmacy, caring for an elderly parent and managing a household. A classmate suggests that the student save time by copying a section from a blog she found online. The student likes the information but is not sure how to properly cite the information. She adds the content anyway to “get the job done.” The instructor checks all students’ reference citations, locates the plagiarized portion and gives the student an F in the course for violating the college’s Academic Integrity policy. The student loses the job at the hospital and must retake the course the following quarter and adjust her student loan to pay for the course a second time. WHAT CAN A STUDENT DO NOW TO FURTHER DEVELOP THIS SKILL? Students can develop information literacy skills through practice and application in researching and retrieving information in each course at Rasmussen. Knowing resources and creating habits of inquiry establish a foundation for
  • 72. success. The High-Level Colloquium on Information Literacy and Lifelong Learning (UNESCO, 2005) created a model, titled “Empowering 8,” to describe the process by which students develop through stages when applying information literacy to new situations (p. 31-2). 1. Identify a personal need for information to solve a problem; 2. Explore the problem, and develop a search strategy by posing important questions that need attention; 3. Select the sources from which information can be obtained: print, electronic, or human; 4. Organize, sort, analyze, and evaluate the information to apply it to the specific problem; 5. Create by synthesis one’s own answer based on the facts available, and be prepared to justify the decision 6. Present the new knowledge, understanding, or resolution using a medium that is practical for the audience 7. Assess the success of the activity in terms of content investigated, the skills learned, and the product’s applicability through personal, teacher, and peer feedback and evaluations.