Concert Calendar Websites (2 pages)
Look specifically for free concerts or discounted tickets for students!!
eZseatU
http://www.philorch.org/ezseatu/
MC3 Events calendar
http://calendar.mc3.edu/CalendarNOW.aspx?fromdate=2/1/2015&todate=2/28/2015&display=Month&more=1/1/0001
Temple University
http://calendar.activedatax.com/temple/CalendarNOW.aspx?fromdate=1/1/2013&todate=1/31/2013&display=Month&display=Month
Curtis Institute of Music
http://www.curtis.edu/performances/
Brandywine Ballet
http://www.brandywineballet.org/
Symphony in C
http://www.symphonyinc.org/
Orchestra Society of Philadelphia
http://orchestrasociety.org/schedule-current.php
Kimmel Center: Philadelphia Orchestra, Chamber Orchestra of Phila., Penna. Ballet, Phila. Opera Co.
http://www.kimmelcenter.org/
Piffaro: The Renaissance Band
http://www.piffaro.org/calendar/all-events/
Philly Fun Guide:
www.phillyfunguide.com
Drexel University:
http://www.drexel.edu/depts/perform/chorus/chamber_singers.htm
West Chester University
https://www.wcupa.edu/cvpa/eventsCalendar.aspx
Center City Opera
http://www.operatheater.org/wp4/
Black Pearl Chamber Orchestra
http://blackpearlco.org/web/home.aspx
Kennett Symphony
http://www.kennettsymphony.org/
Swarthmore College
http://www.swarthmore.edu/Humanities/music/concerts.html
Bryn Mawr College
http://www.brynmawr.edu/arts/bi-co.html
The Crossing Choir
http://www.crossingchoir.com/
Relache
http://www.relache.org/
Orchestra 2001
http://www.orchestra2001.org/
Camerata Philadelphia
http://www.camerataphiladelphia.org/Home_Page.html
Delaware Valley Opera
http://www.delawarevalleyopera.org/
Academy of Vocal Arts
http://avaopera.org/
Gilbert and Sullivan Society
http://www.gsschesco.org/
2
Case Study #2: Integrating Disaster Recovery / IT Service Continuity with Information Technology Governance Frameworks
Case Scenario:
You have been assigned to a large, cross-functional team which is investigating adopting a new governance framework for your company’s Information Technology governance program. Your first assignment as a member of this team is to research and write a 2 to 3 page white paper which discusses one of the Chief Information Security Officer (CISO) functional areas. The purpose of this white paper is to “fill in the gaps” for team members from other areas of the company who are not familiar with the functions and responsibilities of the Office of the Chief Information Security Officer.
Your assigned CISO functional area is:Disaster Recovery / IT Service Continuity (IT Service Continuity is a subset of Business Continuity). Your white paper must address the planning, implementation, and execution aspects of this CISO functional area. Your audience will be familiar with the general requirements for business continuity planning (BCP), business impact analysis (BIA), and continuity/recovery strategies for business operations (e.g. restore in place, alternate worksite, etc.). Your readers will NOT have in-depth knowledge of the .
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Concert Calendar Websites (2 pages)Look specifically for free co.docx
1. Concert Calendar Websites (2 pages)
Look specifically for free concerts or discounted tickets for
students!!
eZseatU
http://www.philorch.org/ezseatu/
MC3 Events calendar
http://calendar.mc3.edu/CalendarNOW.aspx?fromdate=2/1/2015
&todate=2/28/2015&display=Month&more=1/1/0001
Temple University
http://calendar.activedatax.com/temple/CalendarNOW.aspx?fro
mdate=1/1/2013&todate=1/31/2013&display=Month&display=
Month
Curtis Institute of Music
http://www.curtis.edu/performances/
Brandywine Ballet
http://www.brandywineballet.org/
Symphony in C
http://www.symphonyinc.org/
Orchestra Society of Philadelphia
http://orchestrasociety.org/schedule-current.php
Kimmel Center: Philadelphia Orchestra, Chamber Orchestra of
Phila., Penna. Ballet, Phila. Opera Co.
http://www.kimmelcenter.org/
Piffaro: The Renaissance Band
http://www.piffaro.org/calendar/all-events/
2. Philly Fun Guide:
www.phillyfunguide.com
Drexel University:
http://www.drexel.edu/depts/perform/chorus/chamber_singers.ht
m
West Chester University
https://www.wcupa.edu/cvpa/eventsCalendar.aspx
Center City Opera
http://www.operatheater.org/wp4/
Black Pearl Chamber Orchestra
http://blackpearlco.org/web/home.aspx
Kennett Symphony
http://www.kennettsymphony.org/
Swarthmore College
http://www.swarthmore.edu/Humanities/music/concerts.html
Bryn Mawr College
http://www.brynmawr.edu/arts/bi-co.html
The Crossing Choir
http://www.crossingchoir.com/
Relache
http://www.relache.org/
Orchestra 2001
http://www.orchestra2001.org/
Camerata Philadelphia
http://www.camerataphiladelphia.org/Home_Page.html
Delaware Valley Opera
http://www.delawarevalleyopera.org/
Academy of Vocal Arts
3. http://avaopera.org/
Gilbert and Sullivan Society
http://www.gsschesco.org/
2
Case Study #2: Integrating Disaster Recovery / IT Service
Continuity with Information Technology Governance
Frameworks
Case Scenario:
You have been assigned to a large, cross-functional team which
is investigating adopting a new governance framework for your
company’s Information Technology governance program. Your
first assignment as a member of this team is to research and
write a 2 to 3 page white paper which discusses one of the Chief
Information Security Officer (CISO) functional areas. The
purpose of this white paper is to “fill in the gaps” for team
members from other areas of the company who are not familiar
with the functions and responsibilities of the Office of the Chief
Information Security Officer.
Your assigned CISO functional area is:Disaster Recovery / IT
Service Continuity (IT Service Continuity is a subset of
Business Continuity). Your white paper must address the
planning, implementation, and execution aspects of this CISO
functional area. Your audience will be familiar with the general
requirements for business continuity planning (BCP), business
impact analysis (BIA), and continuity/recovery strategies for
business operations (e.g. restore in place, alternate worksite,
etc.). Your readers will NOT have in-depth knowledge of the
requirements / implementation strategies which are specific to
restoring IT services which support the critical functions of the
business (as identified in a BIA).
Note: in your Critical Analyses and Discussion for this case
study you will address specific aspects of a governance
framework, e.g. COBIT®, ITIL®, or ISO/IEC 27002, which
4. apply to planning and implementation of disaster recovery / IT
Service Continuity.
Research:
1. Read / Review the Week 3 readings:
0. Organizations and Their Security Programs (Course Module)
0. Information Security Governance Simplified (e-book)
0. Evolution of the CISO Role and Organizational Readiness
http://www.csoonline.com/article/2838371/security-
leadership/the-evolution-of-the-ciso-role-and-organizational-
readiness.html
0. How Good is Your Cyber Incident Response Plan?
http://www.mckinsey.com/insights/business_technology/how_go
od_is_your_cyberincident_response_plan
0. A Strategic Framework for IT Disaster Recovery Assessments
http://www.isaca.org/Journal/archives/2012/Volume-
6/Documents/jol12v6-A-Strategic.pdf
1. Find three or more additional sources which provide
information about best practices for IT Service Continuity /
Disaster Recovery planning, implementation, and execution.
(Hint: begin by exploring http://www.ready.gov/business ) For
the purposes of this assignment, implementation means the
advance work necessary to implement recovery plans by
acquiring or contracting for products, services, infrastructures,
and facilities. Execution means activating the DR/BCP plans
and overseeing the recovery operations.
Write:
Using standard terminology (see case study #1), write a two to
three page summary of your research. At a minimum, your
summary must include the following:
1. An introduction or overview of disaster recovery / IT Service
Continuity which provides definitions and addresses the reasons
why cybersecurity should be specifically addressedin the
company’s DR/BCP strategies and plans. This introduction
should be suitable for an executive audience.
5. 1. A separate section which addresses disaster recovery / IT
Service Continuity planning functions performed by staff
members in the Office of the CISO.
1. A separate section which addresses best practices for
implementing disaster recovery / IT Service Continuity.
Submit For Grading & Discussion
1. Submit your case study in MS Word format (.docx or .doc
file) using the Case Study #2 Assignment in your assignment
folder. (Attach the file.)
1. Post your case study for discussion with your classmates.
First, create a new topic in the Case Study #2 Discussion
Forum. Then, paste the contents of your Case Study #2
document directly into that message. (Do not attach the file.)
1. Last posting or no posting for discussion will be penalized
heavily so it is in your best interests to post your case study
before the assigned due date.
Formatting Instructions
1. Use standard APA formatting for the MS Word document that
you submit to your assignment folder. Formatting requirements
and examples are found under Course Resources > APA
Resources.
1. Use the “Paste from Word” paste option in the LEO editor
when posting your Case Study to the Case Study #2 Discussion
forum.
Additional Information
1. You are expected to write grammatically correct English in
every assignment that you submit for grading. Do not turn in
any work without (a) using spell check, (b) using grammar
check, (c) verifying that your punctuation is correct and (d)
reviewing your work for correct word usage and correctly
structured sentences and paragraphs. These items are graded
under Professionalism and constitute 20% of the assignment
grade.
6. 1. You are expected to credit your sources using in-text
citations and reference list entries. Both your citations and your
reference list entries must comply with APA 6th edition Style
requirements. Failure to credit your sources will result in
penalties as provided for under the university’s Academic
Integrity policy.
Rubric Name: Case Study #2 Rubric
Criteria
Excellent
Outstanding
Acceptable
Needs Improvement
Needs Significant Improvement
Missing or Unacceptable
Introduction or Overview for the Case Study
20 points
Provided an excellent overview of disaster recovery / IT service
continuity. The overview appropriately used information from 3
or more authoritative sources.
18 points
Provided an outstanding overview of disaster recovery / IT
service continuity. The overview appropriately used information
from 2 or more authoritative sources.
16 points
7. Provided an overview of disaster recovery / IT service
continuity. The overview appropriately used information from 2
or more authoritative sources.
14 points
Provided an overview but the section lacked important details
about disaster recovery and/or IT service continuity.
Information from authoritative sources was cited and used in the
overview.
10 points
Attempted to provide an introduction to the case study but this
section lacked detail and/or was not well supported by
information drawn from authoritative sources.OR, the Case
Study was posted late for discussion (mandatory 10 point
deduction).
0 points
The introduction and/or overview sections of the paper were off
topic.OR, the Case Study was not posted for discussion or was
posted more than two days late (mandatory 20 point deduction).
Identified and Explained the Reasons Why Cybersecurity
Should be Addressed in DR/BCP Strategies & Plans
20 points
Provided an excellent discussion which included 5 or more
reasons why cybersecurity should be specifically addressed in
the company’s DR/BCP strategies and plans. Appropriately used
information from 3 or more authoritative sources.
18 points
Provided an outstanding discussion of 4 or more reasons why
cybersecurity should be specifically addressed in the company’s
DR/BCP strategies and plans. Appropriately used
information from authoritative sources.
16 points
8. Provided a discussion of 3 or more reasons why cybersecurity
should be addressed in the company’s DR/BCP strategies and
plans. Appropriately used information from authoritative
sources.
14 points
Provided a discussion which included at least 2 reasons why
cybersecurity should be addressed in the company’s DR/BCP
strategies and plans. Appropriately used information from
authoritative sources.
10 points
Provided a discussion of cybersecurity in the context of
DR/BCP decision making. The discussion lacked detail and/or
was not well supported by information drawn from authoritative
sources.
0 points
This section was missing, off topic, or failed to provide
information aboutcybersecurity considerations for DR/BCP
decisions.
CISO Roles & Responsibilities for DR/BCP Planning
10 points
Provided an excellent discussion of CISO roles, responsibilities,
and best practices for integrating cybersecurity into DR/BCP
planning. Appropriately used information from 3 or more
authoritative sources.
8.5 points
Provided an outstanding discussion of CISO roles,
responsibilities, and best practices for integrating cybersecurity
into DR/BCP planning. Appropriately used information from 3
or more authoritative sources.
7 points
9. Provided a discussion of CISO roles, responsibilities, and best
practices for integrating cybersecurity into DR/BCP planning.
Appropriately used information from authoritative sources.
6 points
Discussion provided some information about CISO best
practices, roles, and responsibilities for DR/BCP planning.
Mentioned information obtained from authoritative sources.
4 points
Discussion provided some information about CISO best
practices, roles, and responsibilities for DR/BCP planning but
the lacked detail and/or was not supported by information from
authoritative sources.
0 points
Did not address roles & responsibilities of the CISO for
DR/BCP planning.
CISO Roles & Responsibilities for DR/BCP Implementation
15 points
Provided an excellent discussion of CISO roles, responsibilities,
and best practices for integrating cybersecurity into DR/BCP
implementation(i.e. acquistion & contracting). Appropriately
used information from 3 or more authoritative sources.
14 points
Provided an outstanding discussion of CISO roles,
responsibilities, and best practices for integrating cybersecurity
into DR/BCP implementation(i.e. acquistion & contracting).
Appropriately used information from 3 or more authoritative
sources.
13 points
Provided a discussion of CISO roles, responsibilities, and best
10. practices for integrating cybersecurity into
DR/BCP implementation(i.e. acquistion & contracting).
Appropriately used information from authoritative sources.
11 points
Discussion provided some information about CISO best
practices, roles, and responsibilities for DR/BCP
implementation. Mentioned information obtained from
authoritative sources.
4 points
Discussion provided some information about CISO best
practices, roles, and responsibilities for DR/BCP
implementation but the lacked detail and/or was not supported
by information from authoritative sources.
0 points
Did not address roles & responsibilities of the CISO for
DR/BCP implementation.
CISO Roles & Responsibilities for DR/BCP Execution
15 points
Provided an excellent discussion of CISO roles, responsibilities,
and best practices for integrating cybersecurity into
DR/BCP execution (i.e. activating and overseeing recovery
operations). Appropriately used information from 3 or more
authoritative sources.
14 points
Provided an outstanding discussion of CISO roles,
responsibilities, and best practices for integrating cybersecurity
into DR/BCP execution (i.e. activating and overseeing recovery
operations). Appropriately used information from 3 or more
authoritative sources.
13 points
11. Provided a discussion of CISO roles, responsibilities, and best
practices for integrating cybersecurity into DR/BCP execution
(i.e. activating and overseeing recovery operations).
Appropriately used information from authoritative sources.
11 points
Discussion provided some information about CISO best
practices, roles, and responsibilities for DR/BCP execution.
Mentioned information obtained from authoritative sources.
4 points
Discussion provided some information about CISO best
practices, roles, and responsibilities for DR/BCP execution but
the lacked detail and/or was not supported by information from
authoritative sources.
0 points
Did not address roles & responsibilities of the CISO for
DR/BCP execution.
Addressed security issues using standard cybersecurity
terminology
5 points
Demonstrated excellence in the integration of standard
cybersecurity terminology into the case study.
4 points
Provided an outstanding integration of standard cybersecurity
terminology into the case study.
3 points
Integrated standard cybersecurity terminology into the into the
case study
2 points
Used standard cybersecurity terminology but this usage was not
12. well integrated with the discussion.
1 point
Misused standard cybersecurity terminology.
0 points
Did not integrate standard cybersecurity terminology into the
discussion.
APA Formatting for Citations and Reference List
5 points
Work contains a reference list containing entries for all cited
resources. Reference list entries and in-text citations are
correctly formatted using the appropriate APA style for each
type of resource.
4 points
Work contains a reference list containing entries for all cited
resources. One or two minor errors in APA format for in-text
citations and/or reference list entries.
3 points
Work contains a reference list containing entries for all cited
resources. No more than 3 minor errors in APA format for in-
text citations and/or reference list entries.
2 points
Work has no more than three paragraphs with omissions of
citations crediting sources for facts and information. Work
contains a reference list containing entries for cited resources.
Work contains no more than 5 minor errors in APA format for
in-text citations and/or reference list entries.
1 point
Work attempts to credit sources but demonstrates a fundamental
failure to understand and apply the APA formatting standard as
13. defined in the Publication Manual of the American
Psychological Association (6th ed.).
0 points
Reference list is missing. Work demonstrates an overall failure
to incorporate and/or credit authoritative sources for
information used in the paper.
Professionalism Part I: Organization & Appearance
5 points
Submitted work shows outstanding organization and the use of
color, fonts, titles, headings and sub-headings, etc. is
appropriate to the assignment type.
4 points
Submitted work has minor style or formatting flaws but still
presents a professional appearance. Submitted work is well
organized and appropriately uses color, fonts, and section
headings (per the assignment’s directions).
3 points
Organization and/or appearance of submitted work could be
improved through better use of fonts, color, titles, headings, etc.
OR Submitted work has multiple style or formatting errors.
Professional appearance could be improved.
2 points
Submitted work has multiple style or formatting errors.
Organization and professional appearance need substantial
improvement.
1 point
Submitted work meets minimum requirements but has major
style and formatting errors. Work is disorganized and needs to
be rewritten for readability and professional appearance.
0 points
14. Submitted work is poorly organized and formatted. Writing and
presentation are lacking in professional style and appearance.
Work does not reflect college level writing skills.
Professionalism Part II: Execution
15 points
No formatting, grammar, spelling, or punctuation errors.
14 points
Work contains minor errors in formatting, grammar, spelling or
punctuation which do not significantly impact professional
appearance.
13 points
Errors in formatting, spelling, grammar, or punctuation which
detract from professional appearance of the submitted work.
11 points
Submitted work has numerous errors in formatting, spelling,
grammar, or punctuation. Work is unprofessional in appearance.
4 points
Submitted work is difficult to read / understand and has
significant errors in formatting, spelling, grammar, punctuation,
or word usage.
0 points
Submitted work is poorly executed OR does not reflect college
level work.
Overall Score
Excellent
90 or more
Outstanding
80 or more
Acceptable
15. 70 or more
Needs Improvement
56 or more
Needs Significant Improvement
36 or more
Missing or Unacceptable
0 or more
4
3
2
1
0
Quality of Information
Student includes the title and composer of one piece and makes
insightful comments about its performance and explains
specifically when defending these opinions.
Student includes the title and composer of one piece and makes
insightful comments about its performance, but only explains
vaguely when defending the comments.
Student includes the title and composer of one piece and makes
somewhat insightful comments about its performance, but
explains vaguely when defending the comments.
16. Student includes the title and composer of one piece and makes
only fairly insightful comments about its performance, but
doesn’t really
defend the comments by merely saying, “it was good/pretty/
bad, etc.”
Student did not discuss a specific piece of music and the
comments were vague; no specific
comments about the performance were made.
Musical Terminology
Student uses appropriate musical terms (i.e., genre, form,
texture, dynamics, etc.) to describe one musical piece.
When using
musical terms, student uses
them correctly,
showing an
understanding of
the concepts.
Student uses appropriate musical terms to describe the musical
piece and attempts to use them correctly.
Student attempts to use appropriate musical terms but does not
fully describe the musical piece. The student has no real
understanding
of how to use the terms or what they mean.
17. Student attempts to use musical terms in the description of the
musical piece, but is unable to effectively describe the piece.
The student has no
real understanding
of how to use the terms or what they mean. Comments are
focused on things other than what was heard (i.e. performer’s
wardrobe, etc.)
Student does not use any musical terms in the description of the
musical piece.
Length of Report
Review was the proper length according to the guidelines (2-3
pages).
Review was short of the required length (1.5 pages).
Review was short of the required length (1 page).
Review was extremely short of the required length (less than 1
page).
Mechanics
No grammatical, spelling and/ or punctuation errors.
Information is very organized with well-constructed paragraphs.
Almost no grammatical, spelling and/ or punctuation errors.
Information is organized with well-constructed paragraphs.
A few grammatical, spelling, and/ or punctuation errors.
Information is organized, but paragraphs are not well-
18. constructed.
Many grammatical, spelling, and/ or punctuation errors. The
information appears to be disorganized.
Too many grammatical, spelling, and/ or punctuation errors to
count. The information is highly disorganized.
Proof of Attendance
Proof of attendance was provided. Program and/ or ticket stub is
included. (If neither were available at the event, other
appropriate proof of attendance is supplied).
The program or ticket stub is submitted, but the program/ ticket
is damaged, unclear, or does not seem to be supported by the
report (questions of accuracy or attendance exist).
Proof of attendance was not provided. Neither the program nor
ticket stub is included.
Points _______ /20 = _____%
Concert Calendar Websites (2 pages)
Look specifically for free concerts or discounted tickets for
students!!
eZseatU
http://www.philorch.org/ezseatu/
MC3 Events calendar
http://calendar.mc3.edu/CalendarNOW.aspx?fromdate=2/1/2015
&todate=2/28/2015&display=Month&more=1/1/0001
Temple University
19. http://calendar.activedatax.com/temple/CalendarNOW.aspx?fro
mdate=1/1/2013&todate=1/31/2013&display=Month&display=
Month
Curtis Institute of Music
http://www.curtis.edu/performances/
Brandywine Ballet
http://www.brandywineballet.org/
Symphony in C
http://www.symphonyinc.org/
Orchestra Society of Philadelphia
http://orchestrasociety.org/schedule-current.php
Kimmel Center: Philadelphia Orchestra, Chamber Orchestra of
Phila., Penna. Ballet, Phila. Opera Co.
http://www.kimmelcenter.org/
Piffaro: The Renaissance Band
http://www.piffaro.org/calendar/all-events/
Philly Fun Guide:
www.phillyfunguide.com
Drexel University:
http://www.drexel.edu/depts/perform/chorus/chamber_singers.ht
m
West Chester University
https://www.wcupa.edu/cvpa/eventsCalendar.aspx
Center City Opera
http://www.operatheater.org/wp4/
Black Pearl Chamber Orchestra