SlideShare a Scribd company logo
Responses to Other Students: Respond to at least 2 of your
fellow classmates with at least a 40-50-word reply about their
Primary Task Response regarding items you found to be
compelling and enlightening. To help you with your discussion,
please consider the following questions:
DISCUSSION 1
What did you learn that you did not already know?
This has been like some of the other material that we have
covered. I have had exposure to many of the concepts in my
master’s program but with this material I am provided both
reinforcement of those concept understandings and present new
perspectives on them. The from Management Information
Systems: Managing the Digital Firm was particularly helpful.
Material such as this can often require several iterations of
review to begin to develop an understanding of how it can be
applied. I have had exposure to similar material but being able
to understand how to apply these concepts benefits considerably
form exposure to new sources. This material is not abstract but
at times being able to apply it in a practice manner almost does
seem abstract. Being able to read this material helps me solidify
thoughts and ideas on how to concretely implement them in real
life situations, this type of process for me is something that
requires deeper understanding of the “theory of operations”, for
a lack of better words. In course I have gotten a lot of that.
What are some problems that are apparent in the field?
I am going to inject some major bias at this point as my masters
was in software engineering and focused on enterprise
architecture, IT systems research, software project management,
and object-oriented paradigm. To me one of the biggest
problems in the industries I have been in is shear negligence in
researching the concepts of what software engineering is and
how to manage information systems or information
technology. The decision-making process is often left to those
who have no technical background, two who’s motivations are
at best questionable, and three have no concept of the
magnitude or time line of projects. There is an abundant source
of research, magazines, and various other forms of literature
explicitly addressing these things in a practical manner oriented
strictly towards helping organizations undertake such
endeavors. I by no means consider myself to be an expert but I
often find myself in a situation where I ask what should be
some basic questions about projects and in return I receive an
answer akin to “what are you talking about” or “I have never
heard of that” or “I don’t know I never thought about that”.
What are might be some opportunities for research on the topics
covered and how might you perform the appropriate research?
The above rant was a segue into this section because I feel that
big data is becoming more prevalent and both the elements of
software engineering and systems for big data could become
victim to similar issues as stated before. Some issues for
research in software engineering is an understanding of
optimization. Some programming languages are excellent for
the utilization of RAM for programming such as Python. At
times it is more computationally prudent to utilize a compiled
language such as Java. Even more cutting edge is the low-level
programming of GPU’s for parallel computations. The massive
amount of data presented in big data also means that relational
databases are not suitable in many use cases so architecting data
pipelines to utilize NoSQL databases are things that must be
considered. These elements must be understood and work in
unison to achieve optimal results and minimize cost. So, to me a
major are of research potential is the development of Models,
Frameworks, and Architectures that focus on helping implement
this new paradigm in a practical manner.
YOUR REPLY TO ABOVE DISCUSSION, please answer below
Questions.
· What did you learn from your classmate's posting?
· What additional questions do you have after reading the
posting?
· What clarification do you need regarding the posting?
· What differences or similarities do you see between your
posting and other classmates' postings?
DISCUSSION 2
What did you learn that you did not already know?
Overall I have learned a substantial amount in all of the above
subjects over the duration of this course thus far. Portions of the
information I have touched on in prior programs making this a
refresher in some aspects. An example of this would be the
computer systems data hierarchy from chapter 6. Of our
reading. Data starts with bits represented as a 0 or a 1(Laudon,
Laudon, 2016). Information was part of digital theory
instruction from an electronics class taken while pursuing an
Associates degree. Additionally, I am learning more about the
management of information security. Due to the constant
changes in technology, information security management will
always be a field requiring continual research to explore and
learn to stay current within the field.
What are some problems that are apparent in the field?
The most prevalent problem in the field is the need to protect
data and privacy. New vulnerabilities are exposed daily adding
to the difficulty of the problem. Compounding matters are the
continual addition of internet accessible devices and an
exponential increase in internet users. Cybersecurity is now a
focal point for the United States and international societies
(White, 2016). Risks are greater and more widespread
underscoring the need for data and privacy protection.
What are might be some opportunities for research on the topics
covered and how might you perform the appropriate research?
I believe there are many avenues for potential research within
the field of cybersecurity. As cloud mobile computing continues
to expand the protection of the critical information
infrastructure has become more challenging. This trend is
making traditional security methods obsolete and ineffective
(Wood, 2014). Analyzing data gathered from past security
breaches would be a good first step in researching this field.
Although analyzing past attacks might be reactive, the data
could show trends or patterns.
References
Laudon, K. C., & Laudon, J. P. (2016). Management
Information Systems Managing the Digital Firm (14th ed.).
Retrieved from https://ebooksbvd.my-education-connection.com
White, J. (2016). "Cyber Threats and Cyber Security: National
Security Issues, Policy and Strategies." Global Security
Studies 7(4): 23-33
WOOD, C. (2014). MISSION IMPOSSIBLE? (cover
story). Government Technology, 27(8), 16-20.
YOUR REPLY TO ABOVE DISCUSSION, please answer below
Questions.
· What did you learn from your classmate's posting?
· What additional questions do you have after reading the
posting?
· What clarification do you need regarding the posting?
· What differences or similarities do you see between your
posting and other classmates' postings?
DISCUSSION 1
Your targeted sample
The researcher’s targeted sample will consist a
nonprofit located in the Colorado Springs, CO area. It will
consist of 15-20 employees that have been with the company for
a minimum of three years. This may be the targeted sample but
the study also limited to Leadership Pikes Peak.
The anticipated risks from the subject's perspective
There are many anticipated risk, some include physical,
psychological, social, and legal risks. Physically, the subjects
may feel like they will be retaliated against if they speak
up. Psychologically and socially, their minds may begin to play
tricks on their minds. The also may feel like they will be
isolated for doing the same. Legally, they may feel like they
will be called to testify, or that they may get someone fired.
Your strategies for minimizing the risks to your subjects
In the hopes of providing fair and equal treatment to
every interviewee that has chosen to take part in this research
study, the researcher has devised a list of unbiased questions for
the participants. The questions will be submitted to the Chair,
then to the Review Board, and after making the appropriate
corrections they will then be sent to the Institutional Review
Board (IRB). Upon IRB approval, the questions will become
the official questions for the study. The interviewees will be
asked the questions during their individual interviews thus
enhancing the integrity of the questions.
The interviewees names and any information that would
allow them to be identified by their employee will only be
disclosed to the Chair. It will be completely omitted from the
final report and the official dissertation. The employee will not
know which employee said what. To minimize the other risk
that may be present themselves, the researcher will ensure that
the interviewees sign a consent form that addresses each issue
that may arise.
Provide your rationale
The rationale for picking the topic is based upon the
lack of available information on Ethical leadership within the
nonprofit sector. There is so much data on non-profits but it is
limited in the ethical arena. The researcher seeks to add to the
Body of Knowledge and to identify pitfalls within the current
non-profit sector. This research will become material of value
to current and future ethical training within the industry.
YOUR REPLY TO ABOVE DISCUSSION, please answer below
Questions.
· What did you learn from your classmate's posting?
· What additional questions do you have after reading the
posting?
· What clarification do you need regarding the posting?
· What differences or similarities do you see between your
posting and other classmates' postings?
DISCUSSION 2
Targeted Sample
The target population would be the project managers who are
working at Children Hospital in Denver. There would not be
any selective race, age, and gender involved in this
research. Their experience would be the main importance of this
study to provide the fixes in the logistics business within
Children's Hospital.
The anticipated risks from the subject's perspective
As a researcher, it is not all about collecting data to get a done
dissertation. I must take into an account in the process of my
research that my participants' rights to privacy should be
respected and fulfilled. There are various anticipated risks from
the subject's perspective. In other words, as a researcher, I
should be very careful with all the data that I have collected
involving my target population, and that I should not put them
at risk in any capacity. "It is important that the idea of research
is safe, participants will be voluntary, the benefits will
outweigh the risk, and that confidentiality and anonymity will
be protected (Perspective of Qualitative Research Methods)."
There are many anticipated risks from the subject's
perspective. However, I will be addressing two examples of the
risks involving their privacy. Example #1, Technology has its
disadvantages when it comes to entering sensitive information
and it could be stolen and misused. Price (2014) mentioned and
explained about a data breach from another article. It states, "A
data breach results when a user intentionally or accidentally
accesses data, discloses data contents, or alters data from the
original form without authorization (Cereola & Cereola, 2011;
Hong, 2012)." I must protect my participants' privacy on the
computer from hackers who have ways of getting into other
people's computers and taking their information, etc. (Practical
Research: Planning and Design). So, it is very pertinent that I
make every effort on my end to protect my participants' identity
and information pertaining to them. Example #2, Participants'
information should not be shared with anyone and not even with
people on their job without their permission. "Clearly, we need
to respect the privacy of individuals whose data are used in
research (Davies, C., & Collins, R., 2006)."
Strategies for minimizing the risks to your subjects
For me to minimize the risk of the participants' privacy, I would
reference their identities as numbers for each participant in
which I would be the only one who would know who is who so
to speak, and provide the code and numbers to their information
in the computer. This will prevent the participants' identities
and their personal information to be traced to them and their
job, etc., and to prevent damage in any way (Practical Research:
Planning and Design).
Participants must give me permission in writing if they want
their information shared. If permission was not granted by the
participants, then I would not share their information in any
shape or form, such as written and verbally (Practical Research:
Planning and Design).
Rationale
Since I will be conducting my research on project managers at
Children's Hospital in Denver, it is very vital to gain and apply
knowledge in protecting my participants' rights of privacy at
Children's Hospital in Denver, and everything else involved to
avoid any mishaps.
References
Cereola, S. J., & Cereola, R. J. (2011). Breach of data at TJX:
An instructional case used to study COSO and COBIT, with a
focus on computer controls, information security, and privacy
legislation. Issues in Accounting Education, 26, 521-545.
doi:10.2308/iace-50031 Chang
Davies, C., & Collins, R. (2006). Balancing potential risks and
benefits of using confidential data. BMJ: British Medical
Journal, 333(7563), 349.
doi:http://dx.doi.org/10.1136/bmj.333.7563.349
Hong, J. (2012). Protecting against data breaches; Living with
mistakes. Communications
Price, J. D. (2014). Reducing the risk of a data breach using
effective compliance programs (Order No. 3619214). Available
from ABI/INFORM Collection. (1536438339). Retrieved from
https://proxy.cecybrary.com/login?url=https://search.proquest.c
om/docview/1536438339?accountid=144789
YOUR REPLY TO ABOVE DISCUSSION, please answer below
Questions.
· What did you learn from your classmate's posting?
· What additional questions do you have after reading the
posting?
· What clarification do you need regarding the posting?
· What differences or similarities do you see between your
posting and other classmates' postings?

More Related Content

Similar to Responses to Other Students Respond to at least 2 of your fellow .docx

Threaded Discussion What Skills Will a Manager Need to Effectivel
Threaded Discussion What Skills Will a Manager Need to EffectivelThreaded Discussion What Skills Will a Manager Need to Effectivel
Threaded Discussion What Skills Will a Manager Need to Effectivel
TakishaPeck109
 
Research questions and research design
Research questions and research design Research questions and research design
Research questions and research design
Normative
 
Campus Session 2
Campus Session 2Campus Session 2
Campus Session 2
Peter Bryant
 
Read 290 Critical Reading as Critical ThinkingOnlineWeek .docx
Read 290 Critical Reading as Critical ThinkingOnlineWeek .docxRead 290 Critical Reading as Critical ThinkingOnlineWeek .docx
Read 290 Critical Reading as Critical ThinkingOnlineWeek .docx
catheryncouper
 
KM Chicago: Organisational Network Analysis
KM Chicago: Organisational Network AnalysisKM Chicago: Organisational Network Analysis
KM Chicago: Organisational Network Analysis
KM Chicago
 
Online Teaching and LearningIt is one of.docx
Online Teaching and LearningIt is one of.docxOnline Teaching and LearningIt is one of.docx
Online Teaching and LearningIt is one of.docx
mccormicknadine86
 
User Experience as an Organizational Development Tool
User Experience as an Organizational Development ToolUser Experience as an Organizational Development Tool
User Experience as an Organizational Development Tool
Donovan Chandler
 
CSIA 485 Project #4 Detailed Assignment DescriptionDevelop a.docx
CSIA 485 Project #4 Detailed Assignment DescriptionDevelop a.docxCSIA 485 Project #4 Detailed Assignment DescriptionDevelop a.docx
CSIA 485 Project #4 Detailed Assignment DescriptionDevelop a.docx
annettsparrow
 
6p model of research
6p model of research6p model of research
6p model of research
bharati vidhyapeeth uni.-pune
 
Your HR project to develop a centralized model of deliveri.docx
Your HR project to develop a centralized model of deliveri.docxYour HR project to develop a centralized model of deliveri.docx
Your HR project to develop a centralized model of deliveri.docx
danhaley45372
 
Outline & Research Design RoadmapThis exercise will help you bui.docx
Outline & Research Design RoadmapThis exercise will help you bui.docxOutline & Research Design RoadmapThis exercise will help you bui.docx
Outline & Research Design RoadmapThis exercise will help you bui.docx
alfred4lewis58146
 
Bagali, MM.......Research guide student - work outcome
Bagali, MM.......Research guide   student - work outcomeBagali, MM.......Research guide   student - work outcome
Bagali, MM.......Research guide student - work outcome
dr m m bagali, phd in hr
 
MM Bagali...... CV, 2017 Academic Research, MBA , Management,Publications, Re...
MM Bagali...... CV, 2017 Academic Research, MBA , Management,Publications, Re...MM Bagali...... CV, 2017 Academic Research, MBA , Management,Publications, Re...
MM Bagali...... CV, 2017 Academic Research, MBA , Management,Publications, Re...
dr m m bagali, phd in hr
 
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
Karen Graham
 

Similar to Responses to Other Students Respond to at least 2 of your fellow .docx (15)

Threaded Discussion What Skills Will a Manager Need to Effectivel
Threaded Discussion What Skills Will a Manager Need to EffectivelThreaded Discussion What Skills Will a Manager Need to Effectivel
Threaded Discussion What Skills Will a Manager Need to Effectivel
 
Research questions and research design
Research questions and research design Research questions and research design
Research questions and research design
 
Campus Session 2
Campus Session 2Campus Session 2
Campus Session 2
 
Read 290 Critical Reading as Critical ThinkingOnlineWeek .docx
Read 290 Critical Reading as Critical ThinkingOnlineWeek .docxRead 290 Critical Reading as Critical ThinkingOnlineWeek .docx
Read 290 Critical Reading as Critical ThinkingOnlineWeek .docx
 
KM Chicago: Organisational Network Analysis
KM Chicago: Organisational Network AnalysisKM Chicago: Organisational Network Analysis
KM Chicago: Organisational Network Analysis
 
Online Teaching and LearningIt is one of.docx
Online Teaching and LearningIt is one of.docxOnline Teaching and LearningIt is one of.docx
Online Teaching and LearningIt is one of.docx
 
User Experience as an Organizational Development Tool
User Experience as an Organizational Development ToolUser Experience as an Organizational Development Tool
User Experience as an Organizational Development Tool
 
CSIA 485 Project #4 Detailed Assignment DescriptionDevelop a.docx
CSIA 485 Project #4 Detailed Assignment DescriptionDevelop a.docxCSIA 485 Project #4 Detailed Assignment DescriptionDevelop a.docx
CSIA 485 Project #4 Detailed Assignment DescriptionDevelop a.docx
 
SAL2016_paper_15
SAL2016_paper_15SAL2016_paper_15
SAL2016_paper_15
 
6p model of research
6p model of research6p model of research
6p model of research
 
Your HR project to develop a centralized model of deliveri.docx
Your HR project to develop a centralized model of deliveri.docxYour HR project to develop a centralized model of deliveri.docx
Your HR project to develop a centralized model of deliveri.docx
 
Outline & Research Design RoadmapThis exercise will help you bui.docx
Outline & Research Design RoadmapThis exercise will help you bui.docxOutline & Research Design RoadmapThis exercise will help you bui.docx
Outline & Research Design RoadmapThis exercise will help you bui.docx
 
Bagali, MM.......Research guide student - work outcome
Bagali, MM.......Research guide   student - work outcomeBagali, MM.......Research guide   student - work outcome
Bagali, MM.......Research guide student - work outcome
 
MM Bagali...... CV, 2017 Academic Research, MBA , Management,Publications, Re...
MM Bagali...... CV, 2017 Academic Research, MBA , Management,Publications, Re...MM Bagali...... CV, 2017 Academic Research, MBA , Management,Publications, Re...
MM Bagali...... CV, 2017 Academic Research, MBA , Management,Publications, Re...
 
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
Data Maturity for Nonprofits: Three Perspectives, Nine Lessons, and Three Ass...
 

More from ronak56

According to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docxAccording to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docx
ronak56
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
ronak56
 
According to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docxAccording to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docx
ronak56
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
ronak56
 
According to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docxAccording to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docx
ronak56
 
According to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docxAccording to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docx
ronak56
 
According to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docxAccording to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docx
ronak56
 
According to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docxAccording to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docx
ronak56
 
According to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docxAccording to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docx
ronak56
 
According to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docxAccording to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docx
ronak56
 
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docxAccording to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
ronak56
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
ronak56
 
According to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docxAccording to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docx
ronak56
 
According to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docxAccording to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docx
ronak56
 
According to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docxAccording to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docx
ronak56
 
According to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docxAccording to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docx
ronak56
 
According to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docxAccording to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docx
ronak56
 
According to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docxAccording to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docx
ronak56
 
According to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docxAccording to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docx
ronak56
 
Access the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docxAccess the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docx
ronak56
 

More from ronak56 (20)

According to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docxAccording to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docx
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
 
According to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docxAccording to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docx
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
 
According to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docxAccording to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docx
 
According to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docxAccording to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docx
 
According to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docxAccording to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docx
 
According to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docxAccording to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docx
 
According to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docxAccording to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docx
 
According to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docxAccording to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docx
 
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docxAccording to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
 
According to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docxAccording to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docx
 
According to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docxAccording to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docx
 
According to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docxAccording to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docx
 
According to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docxAccording to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docx
 
According to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docxAccording to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docx
 
According to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docxAccording to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docx
 
According to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docxAccording to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docx
 
Access the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docxAccess the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docx
 

Recently uploaded

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 

Recently uploaded (20)

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 

Responses to Other Students Respond to at least 2 of your fellow .docx

  • 1. Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 40-50-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions: DISCUSSION 1 What did you learn that you did not already know? This has been like some of the other material that we have covered. I have had exposure to many of the concepts in my master’s program but with this material I am provided both reinforcement of those concept understandings and present new perspectives on them. The from Management Information Systems: Managing the Digital Firm was particularly helpful. Material such as this can often require several iterations of review to begin to develop an understanding of how it can be applied. I have had exposure to similar material but being able to understand how to apply these concepts benefits considerably form exposure to new sources. This material is not abstract but at times being able to apply it in a practice manner almost does seem abstract. Being able to read this material helps me solidify thoughts and ideas on how to concretely implement them in real life situations, this type of process for me is something that requires deeper understanding of the “theory of operations”, for a lack of better words. In course I have gotten a lot of that. What are some problems that are apparent in the field? I am going to inject some major bias at this point as my masters was in software engineering and focused on enterprise architecture, IT systems research, software project management, and object-oriented paradigm. To me one of the biggest problems in the industries I have been in is shear negligence in researching the concepts of what software engineering is and how to manage information systems or information technology. The decision-making process is often left to those
  • 2. who have no technical background, two who’s motivations are at best questionable, and three have no concept of the magnitude or time line of projects. There is an abundant source of research, magazines, and various other forms of literature explicitly addressing these things in a practical manner oriented strictly towards helping organizations undertake such endeavors. I by no means consider myself to be an expert but I often find myself in a situation where I ask what should be some basic questions about projects and in return I receive an answer akin to “what are you talking about” or “I have never heard of that” or “I don’t know I never thought about that”. What are might be some opportunities for research on the topics covered and how might you perform the appropriate research? The above rant was a segue into this section because I feel that big data is becoming more prevalent and both the elements of software engineering and systems for big data could become victim to similar issues as stated before. Some issues for research in software engineering is an understanding of optimization. Some programming languages are excellent for the utilization of RAM for programming such as Python. At times it is more computationally prudent to utilize a compiled language such as Java. Even more cutting edge is the low-level programming of GPU’s for parallel computations. The massive amount of data presented in big data also means that relational databases are not suitable in many use cases so architecting data pipelines to utilize NoSQL databases are things that must be considered. These elements must be understood and work in unison to achieve optimal results and minimize cost. So, to me a major are of research potential is the development of Models, Frameworks, and Architectures that focus on helping implement this new paradigm in a practical manner. YOUR REPLY TO ABOVE DISCUSSION, please answer below Questions. · What did you learn from your classmate's posting? · What additional questions do you have after reading the posting?
  • 3. · What clarification do you need regarding the posting? · What differences or similarities do you see between your posting and other classmates' postings? DISCUSSION 2 What did you learn that you did not already know? Overall I have learned a substantial amount in all of the above subjects over the duration of this course thus far. Portions of the information I have touched on in prior programs making this a refresher in some aspects. An example of this would be the computer systems data hierarchy from chapter 6. Of our reading. Data starts with bits represented as a 0 or a 1(Laudon, Laudon, 2016). Information was part of digital theory instruction from an electronics class taken while pursuing an Associates degree. Additionally, I am learning more about the management of information security. Due to the constant changes in technology, information security management will always be a field requiring continual research to explore and learn to stay current within the field. What are some problems that are apparent in the field? The most prevalent problem in the field is the need to protect data and privacy. New vulnerabilities are exposed daily adding to the difficulty of the problem. Compounding matters are the continual addition of internet accessible devices and an exponential increase in internet users. Cybersecurity is now a focal point for the United States and international societies (White, 2016). Risks are greater and more widespread underscoring the need for data and privacy protection. What are might be some opportunities for research on the topics covered and how might you perform the appropriate research? I believe there are many avenues for potential research within the field of cybersecurity. As cloud mobile computing continues
  • 4. to expand the protection of the critical information infrastructure has become more challenging. This trend is making traditional security methods obsolete and ineffective (Wood, 2014). Analyzing data gathered from past security breaches would be a good first step in researching this field. Although analyzing past attacks might be reactive, the data could show trends or patterns. References Laudon, K. C., & Laudon, J. P. (2016). Management Information Systems Managing the Digital Firm (14th ed.). Retrieved from https://ebooksbvd.my-education-connection.com White, J. (2016). "Cyber Threats and Cyber Security: National Security Issues, Policy and Strategies." Global Security Studies 7(4): 23-33 WOOD, C. (2014). MISSION IMPOSSIBLE? (cover story). Government Technology, 27(8), 16-20. YOUR REPLY TO ABOVE DISCUSSION, please answer below Questions. · What did you learn from your classmate's posting? · What additional questions do you have after reading the posting? · What clarification do you need regarding the posting? · What differences or similarities do you see between your posting and other classmates' postings? DISCUSSION 1 Your targeted sample The researcher’s targeted sample will consist a nonprofit located in the Colorado Springs, CO area. It will consist of 15-20 employees that have been with the company for a minimum of three years. This may be the targeted sample but the study also limited to Leadership Pikes Peak.
  • 5. The anticipated risks from the subject's perspective There are many anticipated risk, some include physical, psychological, social, and legal risks. Physically, the subjects may feel like they will be retaliated against if they speak up. Psychologically and socially, their minds may begin to play tricks on their minds. The also may feel like they will be isolated for doing the same. Legally, they may feel like they will be called to testify, or that they may get someone fired. Your strategies for minimizing the risks to your subjects In the hopes of providing fair and equal treatment to every interviewee that has chosen to take part in this research study, the researcher has devised a list of unbiased questions for the participants. The questions will be submitted to the Chair, then to the Review Board, and after making the appropriate corrections they will then be sent to the Institutional Review Board (IRB). Upon IRB approval, the questions will become the official questions for the study. The interviewees will be asked the questions during their individual interviews thus enhancing the integrity of the questions. The interviewees names and any information that would allow them to be identified by their employee will only be disclosed to the Chair. It will be completely omitted from the final report and the official dissertation. The employee will not know which employee said what. To minimize the other risk that may be present themselves, the researcher will ensure that the interviewees sign a consent form that addresses each issue that may arise. Provide your rationale The rationale for picking the topic is based upon the lack of available information on Ethical leadership within the nonprofit sector. There is so much data on non-profits but it is limited in the ethical arena. The researcher seeks to add to the
  • 6. Body of Knowledge and to identify pitfalls within the current non-profit sector. This research will become material of value to current and future ethical training within the industry. YOUR REPLY TO ABOVE DISCUSSION, please answer below Questions. · What did you learn from your classmate's posting? · What additional questions do you have after reading the posting? · What clarification do you need regarding the posting? · What differences or similarities do you see between your posting and other classmates' postings? DISCUSSION 2 Targeted Sample The target population would be the project managers who are working at Children Hospital in Denver. There would not be any selective race, age, and gender involved in this research. Their experience would be the main importance of this study to provide the fixes in the logistics business within Children's Hospital. The anticipated risks from the subject's perspective As a researcher, it is not all about collecting data to get a done dissertation. I must take into an account in the process of my research that my participants' rights to privacy should be respected and fulfilled. There are various anticipated risks from the subject's perspective. In other words, as a researcher, I should be very careful with all the data that I have collected involving my target population, and that I should not put them at risk in any capacity. "It is important that the idea of research is safe, participants will be voluntary, the benefits will outweigh the risk, and that confidentiality and anonymity will be protected (Perspective of Qualitative Research Methods)."
  • 7. There are many anticipated risks from the subject's perspective. However, I will be addressing two examples of the risks involving their privacy. Example #1, Technology has its disadvantages when it comes to entering sensitive information and it could be stolen and misused. Price (2014) mentioned and explained about a data breach from another article. It states, "A data breach results when a user intentionally or accidentally accesses data, discloses data contents, or alters data from the original form without authorization (Cereola & Cereola, 2011; Hong, 2012)." I must protect my participants' privacy on the computer from hackers who have ways of getting into other people's computers and taking their information, etc. (Practical Research: Planning and Design). So, it is very pertinent that I make every effort on my end to protect my participants' identity and information pertaining to them. Example #2, Participants' information should not be shared with anyone and not even with people on their job without their permission. "Clearly, we need to respect the privacy of individuals whose data are used in research (Davies, C., & Collins, R., 2006)." Strategies for minimizing the risks to your subjects For me to minimize the risk of the participants' privacy, I would reference their identities as numbers for each participant in which I would be the only one who would know who is who so to speak, and provide the code and numbers to their information in the computer. This will prevent the participants' identities and their personal information to be traced to them and their job, etc., and to prevent damage in any way (Practical Research: Planning and Design). Participants must give me permission in writing if they want their information shared. If permission was not granted by the participants, then I would not share their information in any shape or form, such as written and verbally (Practical Research:
  • 8. Planning and Design). Rationale Since I will be conducting my research on project managers at Children's Hospital in Denver, it is very vital to gain and apply knowledge in protecting my participants' rights of privacy at Children's Hospital in Denver, and everything else involved to avoid any mishaps. References Cereola, S. J., & Cereola, R. J. (2011). Breach of data at TJX: An instructional case used to study COSO and COBIT, with a focus on computer controls, information security, and privacy legislation. Issues in Accounting Education, 26, 521-545. doi:10.2308/iace-50031 Chang Davies, C., & Collins, R. (2006). Balancing potential risks and benefits of using confidential data. BMJ: British Medical Journal, 333(7563), 349. doi:http://dx.doi.org/10.1136/bmj.333.7563.349 Hong, J. (2012). Protecting against data breaches; Living with mistakes. Communications Price, J. D. (2014). Reducing the risk of a data breach using effective compliance programs (Order No. 3619214). Available from ABI/INFORM Collection. (1536438339). Retrieved from https://proxy.cecybrary.com/login?url=https://search.proquest.c om/docview/1536438339?accountid=144789 YOUR REPLY TO ABOVE DISCUSSION, please answer below Questions. · What did you learn from your classmate's posting? · What additional questions do you have after reading the
  • 9. posting? · What clarification do you need regarding the posting? · What differences or similarities do you see between your posting and other classmates' postings?