mgt 311(organizational development) course material week 1-5

MGT 311 (Organizational Development)
 
 
Week 1
MGT/311 WEEK 1 DQ 1
 
DQ1: Which of the following employee characteristics have the greatest impact on employee behavior: general attitudes, job satisfaction, emotions and moods, personality, values, or perception? Provide a rational for your choice including examples of assessments and evaluations you might use to determine the characteristics of your employees.
MGT/311 WEEK 1 DQ2
DQ2: How might an individual employees personality affect the performance of an organization? If the effect is negative, how might you change this? If the affect is positive, how can you capitalize on this? What examples can you provide of changes you have successfully affected in your organizations? As a manager, how can you use your knowledge of employee characteristics to improve organizational performance Provide specific examples to support your response?
MGT/311 WEEK 1 DQ 3
 
Review the section in Ch. 5 of your titled, “An Ethical Choice: What If I Have the “Wrong Personality?”
DQ3: As a manager, what do you if you have someone who scores low in desirable personality traits, but their behavior does not reflect this?
 
·         MGT/311 WEEK 1 SUMMARY (150+ Words)
 
 
 
 
 
 
 
 
MGT 311 (Organizational Development)
Week 2
MGT/311 Week 2 DQ 1
DQ1: In week one, you learned about individual personality characteristics. How do these traits affect the type of motivational strategy you use? Provide an example of how this would apply. 
 
MGT/311 Week 2 DQ 2
DQ2: Evidence indicates high-performing managers tend to be more media sensitive than low-performing managers – they are better to match appropriate media richness with the message to be delivered. As a manager, how would you determine which communication channel should be used for a particular message? What barriers might distort the message?
MGT/311 WEEK 2 DQ 3
                                                                                               
DQ3: As a manager what factors do you consider when determining the most effective way to communicate a message to your employees? Does this change if you are preparing to communicate the same message to your supervisors? Why?
MGT 311 Week 2 Learning Team (250 Words)
Discuss the objectives for Week One and Two. Your discussion should include the topics you feel comfortable with, any topics you struggled with, and how the weekly topics relate to application in your field.
Write a 350- to 700-word summary of the team’s discussion.
·         MGT/311 WEEK 2 SUMMARY (150 + Words)
·         Employee Portfolio Management Plan (350+ Words)
·         Employee Portfolio (250+ Words)
 
MGT 311 (Organizational Development)
Week 3
MGT/311 WEEK 3 DQ 1
DQ1: Although the optimal level of conflict can be functional, no conflict or too much conflict can be dysfunctional. What steps would you as a manager take to stimulate some degree of conflict when appropriate and reduce conflict when it is excessive?
 
 
MGT/311 WEEK 3 DQ 2
 
 
DQ2: What is the difference between a group and a team?  Would your strategy be different for putting together a group than creating a team?  Explain your answer. 
 
MGT/311 WEEK 3 DQ 3
DQ3: In the article, “Conflict Management”, the author discusses several strategies for resolving group or team conflict.  Which type of strategies seems to fit you best?  What criteria should you consider when determining the best conflict resolution strategy? 
Week 3
Employee Portfolio: Motivation Action Plan
 
Determine the motivational strategy or strategies that would likely be most appropriate for each of your three employees, based on their individual characteristics. Indicate how you would leverage their employee evaluations to motivate each of the three employees. Describe one or more of the motivational theories and explain how the theories connect to each of your selected motivational strategies.
 
·         Week 3 Learning Team Reflection (650+ Words)
·         MGT/311 WEEK 3 Summary (250 + Words)
 
 
 
 
 
 
MGT 311 (Organizational Development)
Week 4
MGT/311 WEEK 4 DQ 1
DQ1: Organizational culture is in many ways beneficial for an organization and its employees but can also be a liability. What do you think are the most significant ways that organizational culture is beneficial? A liability? Be sure to provide specific examples. In what ways is organizational culture beneficial or a liability in your organization?
MGT/311 WEEK 4 DQ 2
DQ2: An effective manager accepts the political nature of organizations. Power tactics are used to translate power bases into specific action, and there are a number of tactics that could be used in various situations. As a manager trying to influence your employees, what tactics would you personally be most likely to use? Why? What tactics have been used by your manager that have been effective?
                MGT/311 WEEK 4 DQ 3
DQ3: What is the difference between the position a person holds in a company and their political power? Is the top executive in an organization always the person who holds the most political power? Explain your answer. Who holds the most political power in your organization? How do you know?
           
·         Team Strategy Plan Part I Week 4  (700+ Words)
 
·         Conflict Management Plan Part 2 Week 4 (650+ Words)
 
·         MGT 311 Week 4 Team Reflection (300+ Words)
 
 
 
 
 
 
 
 
 
MGT 311 (Organizational Development)
Week 5
 
MGT/311 WEEK 5 DQ 1
DQ1: Deep-level abilities are closely related to job performance. As a manager, how could you use the knowledge that people differ to increase the likelihood an employee will perform his or her job well? What challenges does this pose when managing a diverse workforce? Provide personal examples from your workplace.
MGT/311 WEEK 5 DQ 2
DQ2: Employees often see change as threatening. What are some of the sources of resistance to change, and what can you as a manager do to overcome that resistance? Provide personal examples relating to resistance to change that you have witnessed.
 
·         MGT 311 Week 5 Team Assignment Change Management and Communication Plan.
·         MGT 311 Wk 5 Team Assignment (Change Management Communication Plan).
·         MGT 311 Learning Team Reflection (450 + Words)
 
 
 

Strategy, process, product, and services paper ( only need a

Prepare a 1,050- to 1,400-word paper based on the organization your team selected for your Benefits and Drivers Proposal.
 
Evaluate the impact of innovation and creativity on the organizational strategy, processes, products, and services of your selected organization. 
 
Identify at least two to three unique innovation considerations for your selected organization.
 
Explain why you feel these considerations apply to this organization. 
 
Format your paper consistent with APA guidelines. I
 
ONLY NEED A CONCLUSION

Assignment 2: the multiplier effect ( kern new 1)

Assignment 2: The Multiplier Effect

Go to “FRB: Press Release—FOMC statement—December 16, 2009.”
 You should now find a press release from the Board of Governors of the Federal Reserve System, dated December 16, 2009, which discusses the decisions of the Federal Open Market Committee (FOMC) for that date.

This release also states that the Federal Reserve is in the process of purchasing $1.25 trillion of agency mortgage-backed securities and about $175 billion of agency debt. Additionally, the release states that the FOMC has decided to gradually reduce “the pace” of such Fed purchases. Discuss why you believe that the FOMC has made such a decision, and explain the consequences of such a decision on the economy.
In your answer, discuss the Federal Reserve’s use of open-market operations to influence the money supply and the respective consequences of such actions. Include a discussion of the money multiplier effect in your response. Justify your conclusions and provide appropriate examples.
Using Microsoft Word, submit your responses in the form of a short paper (1 ½ 2 pages).
By Wednesday, January 29, 2014, submit your responses to the M4: Assignment 2 Dropbox.

Assignment 2 Grading Criteria

Maximum Points

Discussed in detail reasons for the FOMC decision to reduce the number of purchases of government securities.

20

Discussed the consequences of the FOMC’s decision on the economy.

20

Discussed the Federal Reserve’s use of open-market operations to influence the money supply.

20

Justified ideas and responses by using appropriate examples and references from texts, Web sites, and other references.

20

Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in accurate representation and attribution of sources; displayed accurate spelling, grammar, and punctuation.

20

Total:

100

 

Career awareness activity | Psychology homework help

Description:  You are planning a Career Awareness Activity at your school.  You want the students to be aware of a variety of careers that represent various Career Clusters. Choose an educational level, (Elementary, Middle, High School, Higher Ed) and plan a Career Awareness Activity. You may choose to include the information in a PowerPoint presentation or paper.
l.  Choose the Educational Level
2.  Choose time of the year of the activity.
3.  Explain how your career activity will be organized.  Be creative and include the details of what you would like your day or week of activities to look like. Include careers in the various career clusters.  Who will be included?  What will they do? How will they be arranged? 
4.  Explain the objectives and outcomes. How will you evaluate the activity?  What did the students learn? What will the students know at the conclusion of the activity?
5.  What additional activities could you include to expand the activity?

SU Mendels Principles and Contribution to Modern Biology Discussion

Can you help me understand this Writing question? Mendel used mathematics and experimentation to derive major principles that have helped us understand inheritance. His ideas were totally different than the explanation for passage of characteristics from parents to offspring that was common to his time. Discuss at least two of his principles in detail, providing examples. Describe how each principle contributes to genetic variability. Discuss the significance of Mendel’s discoveries to modern biology.

Nsg4065 w4 assignment 2 choosing a core value and healing vs. curing

review the core values of holistic nursing listed in the text. Determine which one you personally rank as the most important. Explore this core value further on the Web, in the text, and on the online library. State your rationale of why you see this value as being important for a holistic nurse to incorporate into his or her practice.
Interview 3 people (family, friends, coworkers) according to the following guidelines:

Explain the selected core value to them in your own words.

Ask them if they think that this would be an important aspect for a nurse to incorporate into his or her practice and have them explain why or why not.

Also, review your text and lecture and explore the Web for descriptions of the terms healing and cure. Describe a case from your clinical practice in which there was no cure but there was healing. Describe the details of the healing experienced by the person interviewed.
Post a summary in a 3-4 page Word document to the W4: Assignment 2 Dropbox

Project global diversity training memo

Imagine that you have been employed as a Human Resource Leadership practitioner for the South Asian Google headquarters in Singapore for the last six months. You check your corporate website (http://www.google.com/diversity/workforce.html) and realize that per corporate policies you should develop a training program to address diversity in your regional workforce.
Write a memo to your corporate Human Resource Vice President and Google President:

Explain the required need for developing a diversity training program.
What should the training include?
How should it be designed to address the needs of your regional operation?

Project Overview
Your project is to write a series of memos as a Human Resource Leadership practitioner (HRL) to various stakeholders. Practicing Human Resource Leadership requires particular competencies in communicating ideas clearly, cordially, effectively, and as a consultant/motivator. You will have an opportunity to apply each required HRL communication competency in four different memos.
Due Date
Your final memo is due in Module 05. There will be individual assignments along the way. The modules in which they are due are noted in the time line below.

Module

Assignment

01

Project IntroductionResources for Effective Memo Writing

02

Global Diversity Training Memo

03

Motivational Training Memo

04

Developmental Program Memo

05

Change Memo

 
Requirements
Your memos should be 1-2 pages in length, plus a cover page and a References Page at the end listing your research citations. Please use this template to construct each memo.
Each memo should include:

To: (Intended audience)
Subject: (What the topic is)
Date:
Memo (Write concisely, keeping the intended audience in mind)

As you write each memo for the project, keep the following in mind:

Use clear, concise, complete sentences, transitions between paragraphs, standard spelling, grammar, and punctuation.
Include at least three APA citations from different Online Library data sources.

Secure cyber communications | Computer Science homework help

II 111TH CONGRESS 1ST SESSION S. 773 To ensure the continued free flow of commerce within the United States and with its global trading partners through secure cyber communications, to provide for the continued development and exploitation of the Internet and intranet communications for such purposes, to provide for the development of a cadre of information technology specialists to improve and maintain effective cyber security defenses against disruption, and for other purposes. IN THE SENATE OF THE UNITED STATES APRIL 1, 2009 Mr. ROCKEFELLER (for himself, Ms. SNOWE, and Mr. NELSON of Florida) introduced the following bill; which was read twice and referred to the Committee on Commerce, Science, and Transportation A BILL To ensure the continued free flow of commerce within the United States and with its global trading partners through secure cyber communications, to provide for the continued development and exploitation of the Internet and intranet communications for such purposes, to provide for the development of a cadre of information technology specialists to improve and maintain effective cybersecurity defenses against disruption, and for other purposes. 1 Be it enacted by the Senate and House of Representa- 2 tives of the United States of America in Congress assembled, VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 2 •S 773 IS 1 SECTION 1. SHORT TITLE; TABLE OF CONTENTS. 2 (a) SHORT TITLE.—This Act may be cited as the 3 ‘‘Cybersecurity Act of 2009’’. 4 (b) TABLE OF CONTENTS.—The table of contents for 5 this Act is as follows: Sec. 1. Short title; table of contents. Sec. 2. Findings. Sec. 3. Cybersecurity Advisory Panel. Sec. 4. Real-time cybersecurity dashboard. Sec. 5. State and regional cybersecurity enhancement program. Sec. 6. NIST standards development and compliance. Sec. 7. Licensing and certification of cybersecurity professionals. Sec. 8. Review of NTIA domain name contracts. Sec. 9. Secure domain name addressing system. Sec. 10. Promoting cybersecurity awareness. Sec. 11. Federal cybersecurity research and development. Sec. 12. Federal Cyber Scholarship-for-Service program. Sec. 13. Cybersecurity competition and challenge. Sec. 14. Public–private clearinghouse. Sec. 15. Cybersecurity risk management report. Sec. 16. Legal framework review and report. Sec. 17. Authentication and civil liberties report. Sec. 18. Cybersecurity responsibilities and authorities. Sec. 19. Quadrennial cyber review. Sec. 20. Joint intelligence threat assessment. Sec. 21. International norms and cybersecurity deterrence measures. Sec. 22. Federal Secure Products and Services Acquisitions Board. Sec. 23. Definitions. 6 SEC. 2. FINDINGS. 7 The Congress finds the following: 8 (1) America’s failure to protect cyberspace is 9 one of the most urgent national security problems 10 facing the country. 11 (2) Since intellectual property is now often 12 stored in digital form, industrial espionage that ex- 13 ploits weak cybersecurity dilutes our investment in 14 innovation while subsidizing the research and devel- 15 opment efforts of foreign competitors. In the new VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 3 •S 773 IS 1 global competition, where economic strength and 2 technological leadership are vital components of na- 3 tional power, failing to secure cyberspace puts us at 4 a disadvantage. 5 (3) According to the 2009 Annual Threat As- 6 sessment, ‘‘a successful cyber attack against a major 7 financial service provider could severely impact the 8 national economy, while cyber attacks against phys- 9 ical infrastructure computer systems such as those 10 that control power grids or oil refineries have the po- 11 tential to disrupt services for hours or weeks’’ and 12 that ‘‘Nation states and criminals target our govern- 13 ment and private sector information networks to 14 gain competitive advantage in the commercial sec- 15 tor.’’. 16 (4) The Director of National Intelligence testi- 17 fied before the Congress on February 19, 2009, that 18 ‘‘a growing array of state and non-state adversaries 19 are increasingly targeting-for exploitation and poten- 20 tially disruption or destruction-our information in- 21 frastructure, including the Internet, telecommuni- 22 cations networks, computer systems, and embedded 23 processors and controllers in critical industries’’ and 24 these trends are likely to continue. VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00003 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 4 •S 773 IS 1 (5) John Brennan, the Assistant to the Presi- 2 dent for Homeland Security and Counterterrorism 3 wrote on March 2, 2009, that ‘‘our nation’s security 4 and economic prosperity depend on the security, sta- 5 bility, and integrity of communications and informa- 6 tion infrastructure that are largely privately-owned 7 and globally-operated.’’. 8 (6) Paul Kurtz, a Partner and chief operating 9 officer of Good Harbor Consulting as well as a sen- 10 ior advisor to the Obama Transition Team for cyber- 11 security, recently stated that the United States is 12 unprepared to respond to a ‘‘cyber-Katrina’’ and 13 that ‘‘a massive cyber disruption could have a cas- 14 cading, long-term impact without adequate co-ordi- 15 nation between government and the private sector.’’. 16 (7) The Cyber Strategic Inquiry 2008, spon- 17 sored by Business Executives for National Security 18 and executed by Booz Allen Hamilton, recommended 19 to ‘‘establish a single voice for cybersecurity within 20 government’’ concluding that the ‘‘unique nature of 21 cybersecurity requires a new leadership paradigm.’’. 22 (8) Alan Paller, the Director of Research at the 23 SANS Institute, testified before the Congress that 24 ‘‘the fight against cybercrime resembles an arms 25 race where each time the defenders build a new wall, VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00004 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 5 •S 773 IS 1 the attackers create new tools to scale the wall. 2 What is particularly important in this analogy is 3 that, unlike conventional warfare where deployment 4 takes time and money and is quite visible, in the 5 cyber world, when the attackers find a new weapon, 6 they can attack millions of computers, and success- 7 fully infect hundreds of thousands, in a few hours or 8 days, and remain completely hidden.’’. 9 (9) According to the February 2003 National 10 Strategy to Secure Cyberspace, ‘‘our nation’s critical 11 infrastructures are composed of public and private 12 institutions in the sectors of agriculture, food, water, 13 public health, emergency services, government, de- 14 fense industrial base, information and telecommuni- 15 cations, energy, transportation, banking finance, 16 chemicals and hazardous materials, and postal and 17 shipping. Cyberspace is their nervous system—the 18 control system of our country’’ and that ‘‘the corner- 19 stone of America’s cyberspace security strategy is 20 and will remain a public-private partnership.’’. 21 (10) According to the National Journal, Mike 22 McConnell, the former Director of National Intel- 23 ligence, told President Bush in May 2007 that if the 24 9/11 attackers had chosen computers instead of air- 25 planes as their weapons and had waged a massive VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00005 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 6 •S 773 IS 1 assault on a U.S. bank, the economic consequences 2 would have been ‘‘an order of magnitude greater’’ 3 than those cased by the physical attack on the 4 World Trade Center. Mike McConnell has subse- 5 quently referred to cybersecurity as the ‘‘soft under- 6 belly of this country.’’. 7 (11) The Center for Strategic and International 8 Studies report on Cybersecurity for the 44th Presi- 9 dency concluded that (A) cybersecurity is now a 10 major national security problem for the United 11 States, (B) decisions and actions must respect pri- 12 vacy and civil liberties, and (C) only a comprehen- 13 sive national security strategy that embraces both 14 the domestic and international aspects of cybersecu- 15 rity will make us more secure. The report continued 16 stating that the United States faces ‘‘a long-term 17 challenge in cyberspace from foreign intelligence 18 agencies and militaries, criminals, and others, and 19 that losing this struggle will wreak serious damage 20 on the economic health and national security of the 21 United States.’’. 22 (12) James Lewis, Director and Senior Fellow, 23 Technology and Public Policy Program, Center for 24 Strategic and International Studies, testified on be- 25 half of the Center for Strategic and International VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00006 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 7 •S 773 IS 1 Studies that ‘‘the United States is not organized and 2 lacks a coherent national strategy for addressing’’ 3 cybersecurity. 4 (13) President Obama said in a speech at Pur- 5 due University on July 16, 2008, that ‘‘every Amer- 6 ican depends—directly or indirectly—on our system 7 of information networks. They are increasingly the 8 backbone of our economy and our infrastructure; our 9 national security and our personal well-being. But 10 it’s no secret that terrorists could use our computer 11 networks to deal us a crippling blow. We know that 12 cyber-espionage and common crime is already on the 13 rise. And yet while countries like China have been 14 quick to recognize this change, for the last eight 15 years we have been dragging our feet.’’ Moreover, 16 President Obama stated that ‘‘we need to build the 17 capacity to identify, isolate, and respond to any 18 cyber-attack.’’. 19 (14) The President’s Information Technology 20 Advisory Committee reported in 2005 that software 21 is a major vulnerability and that ‘‘software develop- 22 ment methods that have been the norm fail to pro- 23 vide the high-quality, reliable, and secure software 24 that the IT infrastructure requires. . . . Today, as 25 with cancer, vulnerable software can be invaded and VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00007 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 8 •S 773 IS 1 modified to cause damage to previously healthy soft- 2 ware, and infected software can replicate itself and 3 be carried across networks to cause damage in other 4 systems.’’. 5 SEC. 3. CYBERSECURITY ADVISORY PANEL. 6 (a) IN GENERAL.—The President shall establish or 7 designate a Cybersecurity Advisory Panel. 8 (b) QUALIFICATIONS.—The President— 9 (1) shall appoint as members of the panel rep- 10 resentatives of industry, academic, non-profit organi- 11 zations, interest groups and advocacy organizations, 12 and State and local governments who are qualified 13 to provide advice and information on cybersecurity 14 research, development, demonstrations, education, 15 technology transfer, commercial application, or soci- 16 etal and civil liberty concerns; and 17 (2) may seek and give consideration to rec- 18 ommendations from the Congress, industry, the cy- 19 bersecurity community, the defense community, 20 State and local governments, and other appropriate 21 organizations. 22 (c) DUTIES.—The panel shall advise the President on 23 matters relating to the national cybersecurity program 24 and strategy and shall assess— VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00008 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 9 •S 773 IS 1 (1) trends and developments in cybersecurity 2 science research and development; 3 (2) progress made in implementing the strat- 4 egy; 5 (3) the need to revise the strategy; 6 (4) the balance among the components of the 7 national strategy, including funding for program 8 components; 9 (5) whether the strategy, priorities, and goals 10 are helping to maintain United States leadership 11 and defense in cybersecurity; 12 (6) the management, coordination, implementa- 13 tion, and activities of the strategy; and 14 (7) whether societal and civil liberty concerns 15 are adequately addressed. 16 (d) REPORTS.—The panel shall report, not less fre- 17 quently than once every 2 years, to the President on its 18 assessments under subsection (c) and its recommendations 19 for ways to improve the strategy. 20 (e) TRAVEL EXPENSES OF NON-FEDERAL MEM- 21 BERS.—Non-Federal members of the panel, while attend- 22 ing meetings of the panel or while otherwise serving at 23 the request of the head of the panel while away from their 24 homes or regular places of business, may be allowed travel 25 expenses, including per diem in lieu of subsistence, as auVerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00009 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 10 •S 773 IS 1 thorized by section 5703 of title 5, United States Code, 2 for individuals in the government serving without pay. 3 Nothing in this subsection shall be construed to prohibit 4 members of the panel who are officers or employees of the 5 United States from being allowed travel expenses, includ- 6 ing per diem in lieu of subsistence, in accordance with law. 7 (f) EXEMPTION FROM FACA SUNSET.—Section 14 8 of the Federal Advisory Committee Act (5 U.S.C. App.) 9 shall not apply to the Advisory Panel. 10 SEC. 4. REAL-TIME CYBERSECURITY DASHBOARD. 11 The Secretary of Commerce shall— 12 (1) in consultation with the Office of Manage- 13 ment and Budget, develop a plan within 90 days 14 after the date of enactment of this Act to implement 15 a system to provide dynamic, comprehensive, real- 16 time cybersecurity status and vulnerability informa- 17 tion of all Federal Government information systems 18 and networks managed by the Department of Com- 19 merce; and 20 (2) implement the plan within 1 year after the 21 date of enactment of this Act. 22 SEC. 5. STATE AND REGIONAL CYBERSECURITY ENHANCE- 23 MENT PROGRAM. 24 (a) CREATION AND SUPPORT OF CYBERSECURITY 25 CENTERS.—The Secretary of Commerce shall provide asVerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00010 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 11 •S 773 IS 1 sistance for the creation and support of Regional Cyberse- 2 curity Centers for the promotion and implementation of 3 cybersecurity standards. Each Center shall be affiliated 4 with a United States-based nonprofit institution or organi- 5 zation, or consortium thereof, that applies for and is 6 awarded financial assistance under this section. 7 (b) PURPOSE.—The purpose of the Centers is to en- 8 hance the cybersecurity of small and medium sized busi- 9 nesses in United States through— 10 (1) the transfer of cybersecurity standards, 11 processes, technology, and techniques developed at 12 the National Institute of Standards and Technology 13 to Centers and, through them, to small- and me- 14 dium-sized companies throughout the United States; 15 (2) the participation of individuals from indus- 16 try, universities, State governments, other Federal 17 agencies, and, when appropriate, the Institute in co- 18 operative technology transfer activities; 19 (3) efforts to make new cybersecurity tech- 20 nology, standards, and processes usable by United 21 States-based small- and medium-sized companies; 22 (4) the active dissemination of scientific, engi- 23 neering, technical, and management information 24 about cybersecurity to industrial firms, including 25 small- and medium-sized companies; and VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00011 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 12 •S 773 IS 1 (5) the utilization, when appropriate, of the ex- 2 pertise and capability that exists in Federal labora- 3 tories other than the Institute. 4 (c) ACTIVITIES.—The Centers shall— 5 (1) disseminate cybersecurity technologies, 6 standard, and processes based on research by the In- 7 stitute for the purpose of demonstrations and tech- 8 nology transfer; 9 (2) actively transfer and disseminate cybersecu- 10 rity strategies, best practices, standards, and tech- 11 nologies to protect against and mitigate the risk of 12 cyber attacks to a wide range of companies and en- 13 terprises, particularly small- and medium-sized busi- 14 nesses; and 15 (3) make loans, on a selective, short-term basis, 16 of items of advanced cybersecurity countermeasures 17 to small businesses with less than 100 employees. 18 (c) DURATION AND AMOUNT OF SUPPORT; PROGRAM 19 DESCRIPTIONS; APPLICATIONS; MERIT REVIEW; EVALUA- 20 TIONS OF ASSISTANCE.— 21 (1) FINANCIAL SUPPORT.—The Secretary may 22 provide financial support, not to exceed 50 percent 23 of its annual operating and maintenance costs, to 24 any Center for a period not to exceed 6 years (ex- 25 cept as provided in paragraph (5)(D)). VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00012 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 13 •S 773 IS 1 (2) PROGRAM DESCRIPTION.—Within 90 days 2 after the date of enactment of this Act, the Sec- 3 retary shall publish in the Federal Register a draft 4 description of a program for establishing Centers 5 and, after a 30-day comment period, shall publish a 6 final description of the program. The description 7 shall include— 8 (A) a description of the program; 9 (B) procedures to be followed by appli- 10 cants; 11 (C) criteria for determining qualified appli- 12 cants; 13 (D) criteria, including those described in 14 paragraph (4), for choosing recipients of finan- 15 cial assistance under this section from among 16 the qualified applicants; and 17 (E) maximum support levels expected to be 18 available to Centers under the program in the 19 fourth through sixth years of assistance under 20 this section. 21 (3) APPLICATIONS; SUPPORT COMMITMENT.— 22 Any nonprofit institution, or consortia of nonprofit 23 institutions, may submit to the Secretary an applica- 24 tion for financial support under this section, in ac- 25 cordance with the procedures established by the SecVerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00013 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 14 •S 773 IS 1 retary. In order to receive assistance under this sec- 2 tion, an applicant shall provide adequate assurances 3 that it will contribute 50 percent or more of the pro- 4 posed Center’s annual operating and maintenance 5 costs for the first 3 years and an increasing share 6 for each of the next 3 years. 7 (4) AWARD CRITERIA.—Awards shall be made 8 on a competitive, merit-based review. In making a 9 decision whether to approve an application and pro- 10 vide financial support under this section, the Sec- 11 retary shall consider, at a minimum— 12 (A) the merits of the application, particu- 13 larly those portions of the application regarding 14 technology transfer, training and education, and 15 adaptation of cybersecurity technologies to the 16 needs of particular industrial sectors; 17 (B) the quality of service to be provided; 18 (C) geographical diversity and extent of 19 service area; and 20 (D) the percentage of funding and amount 21 of in-kind commitment from other sources. 22 (5) THIRD YEAR EVALUATION.— 23 (A) IN GENERAL.—Each Center which re- 24 ceives financial assistance under this section 25 shall be evaluated during its third year of operVerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00014 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 15 •S 773 IS 1 ation by an evaluation panel appointed by the 2 Secretary. 3 (B) EVALUATION PANEL.—Each evalua- 4 tion panel shall be composed of private experts, 5 none of whom shall be connected with the in- 6 volved Center, and Federal officials. An official 7 of the Institute shall chair the panel. Each eval- 8 uation panel shall measure the Center’s per- 9 formance against the objectives specified in this 10 section. 11 (C) POSITIVE EVALUATION REQUIRED FOR 12 CONTINUED FUNDING.—The Secretary may not 13 provide funding for the fourth through the sixth 14 years of a Center’s operation unless the evalua- 15 tion by the evaluation panel is positive. If the 16 evaluation is positive, the Secretary may pro- 17 vide continued funding through the sixth year 18 at declining levels. 19 (D) FUNDING AFTER SIXTH YEAR.—After 20 the sixth year, the Secretary may provide addi- 21 tional financial support to a Center if it has re- 22 ceived a positive evaluation through an inde- 23 pendent review, under procedures established by 24 the Institute. An additional independent review 25 shall be required at least every 2 years after the VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00015 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 16 •S 773 IS 1 sixth year of operation. Funding received for a 2 fiscal year under this section after the sixth 3 year of operation may not exceed one third of 4 the annual operating and maintenance costs of 5 the Center. 6 (6) PATENT RIGHTS TO INVENTIONS.—The pro- 7 visions of chapter 18 of title 35, United States Code, 8 shall (to the extent not inconsistent with this sec- 9 tion) apply to the promotion of technology from re- 10 search by Centers under this section except for con- 11 tracts for such specific technology extension or 12 transfer services as may be specified by statute or 13 by the President, or the President’s designee. 14 (d) ACCEPTANCE OF FUNDS FROM OTHER FEDERAL 15 DEPARTMENTS AND AGENCIES.—In addition to such 16 sums as may be authorized and appropriated to the Sec- 17 retary and President, or the President’s designee, to oper- 18 ate the Centers program, the Secretary and the President, 19 or the President’s designee, also may accept funds from 20 other Federal departments and agencies for the purpose 21 of providing Federal funds to support Centers. Any Center 22 which is supported with funds which originally came from 23 other Federal departments and agencies shall be selected 24 and operated according to the provisions of this section. VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00016 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 17 •S 773 IS 1 SEC. 6. NIST STANDARDS DEVELOPMENT AND COMPLI- 2 ANCE. 3 (a) IN GENERAL.—Within 1 year after the date of 4 enactment of this Act, the National Institute of Standards 5 and Technology shall establish measurable and auditable 6 cybersecurity standards for all Federal Government, gov- 7 ernment contractor, or grantee critical infrastructure in- 8 formation systems and networks in the following areas: 9 (1) CYBERSECURITY METRICS RESEARCH.—The 10 Director of the National Institute of Standards and 11 Technology shall establish a research program to de- 12 velop cybersecurity metrics and benchmarks that can 13 assess the economic impact of cybersecurity. These 14 metrics should measure risk reduction and the cost 15 of defense. The research shall include the develop- 16 ment automated tools to assess vulnerability and 17 compliance. 18 (2) SECURITY CONTROLS.—The Institute shall 19 establish standards for continuously measuring the 20 effectiveness of a prioritized set of security controls 21 that are known to block or mitigate known attacks. 22 (3) SOFTWARE SECURITY.—The Institute shall 23 establish standards for measuring the software secu- 24 rity using a prioritized list of software weaknesses 25 known to lead to exploited and exploitable 26 vulnerabilities. The Institute will also establish a VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00017 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 18 •S 773 IS 1 separate set of such standards for measuring secu- 2 rity in embedded software such as that found in in- 3 dustrial control systems. 4 (4) SOFTWARE CONFIGURATION SPECIFICATION 5 LANGUAGE.—The Institute shall, establish standard 6 computer-readable language for completely speci- 7 fying the configuration of software on computer sys- 8 tems widely used in the Federal Government, by 9 government contractors and grantees, and in private 10 sector owned critical infrastructure information sys- 11 tems and networks. 12 (5) STANDARD SOFTWARE CONFIGURATION.— 13 The Institute shall establish standard configurations 14 consisting of security settings for operating system 15 software and software utilities widely used in the 16 Federal Government, by government contractors and 17 grantees, and in private sector owned critical infra- 18 structure information systems and networks. 19 (6) VULNERABILITY SPECIFICATION LAN- 20 GUAGE.—The Institute shall establish standard com- 21 puter-readable language for specifying vulnerabilities 22 in software to enable software vendors to commu- 23 nicate vulnerability data to software users in real 24 time. VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00018 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 19 •S 773 IS 1 (7) NATIONAL COMPLIANCE STANDARDS FOR 2 ALL SOFTWARE.— 3 (A) PROTOCOL.—The Institute shall estab- 4 lish a standard testing and accreditation pro- 5 tocol for software built by or for the Federal 6 Government, its contractors, and grantees, and 7 private sector owned critical infrastructure in- 8 formation systems and networks. to ensure that 9 it— 10 (i) meets the software security stand- 11 ards of paragraph (2); and 12 (ii) does not require or cause any 13 changes to be made in the standard con- 14 figurations described in paragraph (4). 15 (B) COMPLIANCE.—The Institute shall de- 16 velop a process or procedure to verify that— 17 (i) software development organizations 18 comply with the protocol established under 19 subparagraph (A) during the software de- 20 velopment process; and 21 (ii) testing results showing evidence of 22 adequate testing and defect reduction are 23 provided to the Federal Government prior 24 to deployment of software. VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00019 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 20 •S 773 IS 1 (b) CRITERIA FOR STANDARDS.—Notwithstanding 2 any other provision of law (including any Executive 3 Order), rule, regulation, or guideline, in establishing 4 standards under this section, the Institute shall disregard 5 the designation of an information system or network as 6 a national security system or on the basis of presence of 7 classified or confidential information, and shall establish 8 standards based on risk profiles. 9 (c) INTERNATIONAL STANDARDS.—The Director, 10 through the Institute and in coordination with appropriate 11 Federal agencies, shall be responsible for United States 12 representation in all international standards development 13 related to cybersecurity, and shall develop and implement 14 a strategy to optimize the United States position with re- 15 spect to international cybersecurity standards. 16 (d) COMPLIANCE ENFORCEMENT.—The Director 17 shall— 18 (1) enforce compliance with the standards de- 19 veloped by the Institute under this section by soft- 20 ware manufacturers, distributors, and vendors; and 21 (2) shall require each Federal agency, and each 22 operator of an information system or network des- 23 ignated by the President as a critical infrastructure 24 information system or network, periodically to demVerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00020 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 21 •S 773 IS 1 onstrate compliance with the standards established 2 under this section. 3 (e) FCC NATIONAL BROADBAND PLAN.—In devel- 4 oping the national broadband plan pursuant to section 5 6001(k) of the American Recovery and Reinvestment Act 6 of 2009, the Federal Communications Commission shall 7 report on the most effective and efficient means to ensure 8 the cybersecurity of commercial broadband networks, in- 9 cluding consideration of consumer education and outreach 10 programs. 11 SEC. 7. LICENSING AND CERTIFICATION OF CYBERSECU- 12 RITY PROFESSIONALS. 13 (a) IN GENERAL.—Within 1 year after the date of 14 enactment of this Act, the Secretary of Commerce shall 15 develop or coordinate and integrate a national licensing, 16 certification, and periodic recertification program for cy- 17 bersecurity professionals. 18 (b) MANDATORY LICENSING.—Beginning 3 years 19 after the date of enactment of this Act, it shall be unlawful 20 for any individual to engage in business in the United 21 States, or to be employed in the United States, as a pro- 22 vider of cybersecurity services to any Federal agency or 23 an information system or network designated by the Presi- 24 dent, or the President’s designee, as a critical infrastrucVerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00021 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 22 •S 773 IS 1 ture information system or network, who is not licensed 2 and certified under the program. 3 SEC. 8. REVIEW OF NTIA DOMAIN NAME CONTRACTS. 4 (a) IN GENERAL.—No action by the Assistant Sec- 5 retary of Commerce for Communications and Information 6 after the date of enactment of this Act with respect to 7 the renewal or modification of a contract related to the 8 operation of the Internet Assigned Numbers Authority, 9 shall be final until the Advisory Panel— 10 (1) has reviewed the action; 11 (2) considered the commercial and national se- 12 curity implications of the action; and 13 (3) approved the action. 14 (b) APPROVAL PROCEDURE.—If the Advisory Panel 15 does not approve such an action, it shall immediately no- 16 tify the Assistant Secretary in writing of the disapproval 17 and the reasons therefor. The Advisory Panel may provide 18 recommendations to the Assistant Secretary in the notice 19 for any modifications the it deems necessary to secure ap- 20 proval of the action. 21 SEC. 9. SECURE DOMAIN NAME ADDRESSING SYSTEM. 22 (a) IN GENERAL.—Within 3 years after the date of 23 enactment of this Act, the Assistant Secretary of Com- 24 merce for Communications and Information shall develop 25 a strategy to implement a secure domain name addressing VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00022 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 23 •S 773 IS 1 system. The Assistant Secretary shall publish notice of the 2 system requirements in the Federal Register together with 3 an implementation schedule for Federal agencies and in- 4 formation systems or networks designated by the Presi- 5 dent, or the President’s designee, as critical infrastructure 6 information systems or networks. 7 (b) COMPLIANCE REQUIRED.—The President shall 8 ensure that each Federal agency and each such system 9 or network implements the secure domain name address- 10 ing system in accordance with the schedule published by 11 the Assistant Secretary. 12 SEC. 10. PROMOTING CYBERSECURITY AWARENESS. 13 The Secretary of Commerce shall develop and imple- 14 ment a national cybersecurity awareness campaign that— 15 (1) is designed to heighten public awareness of 16 cybersecurity issues and concerns; 17 (2) communicates the Federal Government’s 18 role in securing the Internet and protecting privacy 19 and civil liberties with respect to Internet-related ac- 20 tivities; and 21 (3) utilizes public and private sector means of 22 providing information to the public, including public 23 service announcements. VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00023 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 24 •S 773 IS 1 SEC. 11. FEDERAL CYBERSECURITY RESEARCH AND DE- 2 VELOPMENT. 3 (a) FUNDAMENTAL CYBERSECURITY RESEARCH.— 4 The Director of the National Science Foundation shall 5 give priority to computer and information science and en- 6 gineering research to ensure substantial support is pro- 7 vided to meet the following challenges in cybersecurity: 8 (1) How to design and build complex software- 9 intensive systems that are secure and reliable when 10 first deployed. 11 (2) How to test and verify that software, 12 whether developed locally or obtained from a third 13 party, is free of significant known security flaws. 14 (3) How to test and verify that software ob- 15 tained from a third party correctly implements stat- 16 ed functionality, and only that functionality. 17 (4) How to guarantee the privacy of a

Various internet technologies | Computer Science homework help

Question 1: The address depletion of IPv4 and other shortcomings of this protocol prompted a new version of IP known as IPv6. Explain the advantages of this new IPv6 when compared to IPv4?
Question 2: Migrating from IPv4 to IPv6 is known as transition from version 4 to version 6 and requires formal strategies to handle this transition. Explain each of the strategies for this migration process using appropriate examples.Question 3: In a peer-to-peer (P2P) network, Internet users that are ready to share their resources become peers and form a network. Describe the differences between centralised and decentralised P2P networks? Discuss the advantages and disadvantages of both networks.Question 4:What is a Distributed Hash Table (DHT) and how is it used in P2P networks? Briefly explain how a DHT works with an example of a P2P network. Question 5: In the client-server paradigm, explain which entity provides the service and which entity receives the service. Why should a server be run all the time, but a client can be run when it is needed? Question 6: When an HTTP server receives a request message from an HTTP client, how does the server know when all headers have arrived and the body of the message is to follow?
Rationale
This assessment consists of six questions assessing a basic understanding of network data communication models, next generation IP and application layer paradigm. This assessment covers the following learning objectives:

define and explain various Internet technologies;
describe and analyse the role and importance of Internet technologies in the modern world; and
explain how different application layer services such as client-server and peer-to-peer paradigms work in the Internet.

Infrastructure and functional requirements of a digital business

CIS8100 Assignment 2 PROJECT (PROTOTYPE) REPORT

Description

Marks out of

Wtg(%)

Word limit

Due date

Assignment 2

100

30

Approx. 3000

4 April 2014

Learning objectives and graduate skills tested
This assignment relates to your understanding of the key issues in relation to the infrastructure and functional requirements of a digital business and to allow you to demonstrate your ability to research, synthesise and specify the infrastructure and functional requirements of an e-commerce website in a report.

 
Assignment 2 and the subsequent Assignment 4 require you to plan and develop an e-commerce strategy including building a prototype website of your choice to facilitate your proposed online business.
 
You will be required to design, install, configure and populate your proposed e-commerce site using the Joomla content management system using a URL in cloudaccess.net that will be supplied to you by the Course Leader.
 

 
Assignment 2 specifications
 
Assignment 2 is made up of THREE tasks:
 
TASK 1 – Assignment 2 Journal
 
Maintain a journal of the activities and research that you have engaged in in the completion of this assignment.
 
The journal must document the progress that you have made from start to the conclusion of this assignment.
 
Use the Journal Template provided in the CIS8100 StudyDesk.
 
The journal entries will include, in date order, the following:
 
? Date of project/research activity
? Project/research activity
? Duration
? Description/Discussion of the project/research activity
? Follow up task arising from this activity
(10 marks)
 
 
TASK 2 – Preliminary analysis of proposed online business and e-commerce strategy
 
For Task 2 you are required to conduct a preliminary analysis of your proposed online business (of your own choosing) and develop an e-commerce strategy and prototype web site.
 
The report must address the following:
 
1.      Conduct an environmental analysis of your proposed e-commerce presence, keeping in mind the potential for global e?Business and  focusing on the following:
a.      Value propositions of your e-commerce strategy
b.      Core competencies that can be enabled/enhanced through an e-commerce presence
c.       Market analysis and trends regarding your proposed e-commerce strategy
d.      Evaluation of your e-commerce strategy in terms of Porter’s competitive forces model (http://www.buildmyonlinestore.com/articles/how-defensible-is-your-e-commerce-business-model/).
2.      List and describe how the strategic goals and objectives of your organisation will be addressed in your proposed e-commerce website.
3.      Identify what key stakeholders/customers will want from your proposed e-commerce website, and how this fits with the goals of the e-commerce website and the organization
4.      Briefly describe and justify the e-Commerce business model(s) that will be used in your e-commerce website.
5.      List and briefly describe the potential risks associated with your proposed e-commerce strategy and presence.
(50 marks)
 
NOTE: The word length for this task is about 2500 words, so ensure you cover all the above topics adequately and concisely while taking this constraint into consideration.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
TASK 3 Briefing document of required Joomla! Activities undertaken for Assignment 2
Prepare and submit a briefing document (about 500 words) on completion of the following activities using your assigned Joomla!2.5 website:
1.      Use the assigned URL supplied to you by your Course Leader to commence the first steps in familiarising yourself with Joomla as a content management system and to develop a preliminary prototype of your proposed e-commerce website. (State the URL in the first part of the report)
2.      Configure the e-commerce site and create a home page (include the name of the your proposed e-commerce business or entity) with a menu and links and describe the steps required to achieve this (include snapshots in your document).
3.      List all the Joomla! components and features you are likely to use for Assignment 4 and why (see a selection of Joomla! features below).
4.      List and briefly describe any links and resources that you have used or are likely to  use to research and build your e-commerce website.
 
 

You will not be required to install the Jooma! system on your computer.
Instead you will be provided access to a pre-installed Joomla! development environment provided by cloudaccess.net via an url link assigned to each student.
Instructions to access your cloudaccess.net website will be provided on the StudyDesk.

 
To complete this task you will need to familiarise yourself with the features of the Joomla! Content Management System by studying one or more of the following online resources, (1) Cloudaccess.net Knowledge base for Joomla!2.5 , (2) Joomla! explained : your step-by-step guide / Stephen Burge (can be purchased as aKindle Edition, ebook or in hard copy) (3), Official Joomla! Book 2nd Edn Jennifer Marriot Ein Waring as aKindle Edition as ebook or in hard copy and (4)Joomla! Beginner’s Guide 2.5  free e-book.
(40 marks)
 
ASSSIGNMENT 2 TOTAL MARKS: 100
 
JOOMLA FEATURES
 

 
Setup
·         Using Cloudaccess.net
·         Installing Joomla
Creating content
·         Adding pages to the front page
·         Creating a Sitemap
·         Adding external and internal links
·         Deleting or hiding content
Creating Sections and Categories
·         Organising content in to sections and categories
·         Choosing content layout
·         Adding meta data for search engines
Global configurations
·         Configuring articles parameters
·         Ordering articles
·         Setting global configuration
Creating Menus
·         Adding navigation menus
·         Creating sub menus
·         Maintaining menus
·         Linking menus
·         Deleting menus

Working with Modules
·         Creating sidebar modules
·         Configuring modules
·         Creating login modules
·         Creating breadcrumbs modules
·         Working with other modules
Using Components
·         Adding contact us page
·         Adding polls
Users
·         Adding users
·         User permissions
Using Templates
·         Working with templates
·         Choosing different templates
·         Adjusting templates
Extending Joomla!
·         Using plug-in
·         Using extensions
·         Go Live
 

 
 
Submission Requirements
 
Your solution
Your solution should conform to the guidelines laid out in Summers, J Smith, B 2010, Communication skills handbook, 3rd edn, John Wiley Sons, Milton, Queensland.
Cautions
 
Originality of submission
 
· This assignment must be the expression of your own work. It is acceptable to discuss course content with others to improve your understanding and clarify requirements, but solutions to assignment questions must be done on your own. This also means that it is not sufficient to merely paraphrase the entire assignment content from a textbook or other source. Your assignment answers need be a reflection and synthesis of your research of the associated topics. This should be evident in your annotated bibliography.
 
· You need to demonstrate your understanding of associated topics for each assignment. You must not copy from anyone, including tutors and fellow students, nor provide copies of your work to others. Assignments that do not adhere to this requirement will be deemed as being the result of collusion or plagiarism. This may lead to severe academic penalties as outlined in Academic Regulation 5.10 of the USQ Handbook. It is your own responsibility to ensure the integrity of your work. Refer to the Faculty of Business policy for further details.
 
· An indiscriminate overuse of incorrectly referenced or cited web pages in your assignment will result in poor marks.
 
 
Late submission of assignment work
 
Late assignments will be penalised unless permission has been granted by the course leader BEFORE the assignment due date. Late assignments may be penalised by reducing the allocated mark by 5% per day late.
 
 
Other submission requirements
 
1)      Formatting
a.      Page size should be A4. Allow for TOP MARGIN – 2.5 cm; BOTTOM MARGIN – 2.5 cm; SIDE MARGINS – 2.5 cm
b.      Major headings should be in upper case, 14 point Times New Roman Bold
c.       Minor headings should be in lower case, 12 point Times New Roman Bold
d.      Body text should be formatted to 12 point, Times New Roman
e.      Use single or one and half line spacing
f.        Assignments should be in one of the following formats:
                                                              i.      Microsoft Word (2010)
                                                            ii.      Microsoft Word (2007)
                                                          iii.      Rich Text Format (RTF)
                                                           iv.      Portable Document Format (PDF)
 
 
2)      BEFORE submitting your FINAL version of the assignment to the online submission system (EASE) you must upload your draft copies to the online TURNITIN system (see the course StudyDesk for details on accessing and using the TURNITIN system).
a.      TURNITIN produces an Originality Report that shows your overall similarity index. If the index is less than 25 percent, your assignment is considered to be plagiarism-free. If not, you will have to rework your assignment, using the feedback in the Originality Report as a guide, and then resubmit it to TURNITIN for another round of checks until you are satisfied that it meets the requirements.
 
3)      The file naming guidelines are as follows:
a.      It is important that you use this convention to ensure that assignments can be tracked: Familyname_studentnumber_CIS8100_A2_XXXXXXXXX
b.      Replace ‘familyname’ with YOUR family or surname
c.       Replace ‘studentnumber’ with YOUR student number (which starts with ‘00’)
d.      Replace ‘XXXXXXXXXX’ with
                                                              i.      Task 1
                                                            ii.      Task 2
                                                          iii.      Task 3
                                                           iv.      TURNITIN
 
4)      Once you have obtained a plagiarism-free assignment you should submit the Originality Report (in pdf format) along with your FINAL assignment (in WORD or pdf format) electronically through the online assignment submission system (EASE). No hardcopy submissions will be accepted. See the course StudyDesk for instructions on uploading your assignment.