Where do you see Business Intelligence and related technology 5 or 10 years from?  What new technologies are being developed in the computer industry and how can those technologies be utilized for business and process analysis?

This week we examine how Business Intelligence is constantly changing due to new and exciting technology such as improvements in artificial intelligence and automated decision support systems.
Where do you see Business Intelligence and related technology 5 or 10 years from?  What new technologies are being developed in the computer industry and how can those technologies be utilized for business and process analysis?
Write an aper in APA format, using a minimum of 3 peer reviewed sources.  Write about future trends in Business Intelligence and Analytics?  The rubric for this assignment can be viewed when clicking on the assignment link.

At present, the research question is good, but there is no detail in the proposal that really addresses who you will answer that question. What economic models are you attempting to demonstrate the presence of, or transformation from one economic system to another? What data will you use, specifically. It is not enough to say, coins, glass, pottery, and metalwork will answer the question. They have not done so for other scholars to date – why is that?

Here’s my professors’ comments, and attached with more in article comments.
At present, the research question is good, but there is no detail in the proposal that really addresses who you will answer that question. What economic models are you attempting to demonstrate the presence of, or transformation from one economic system to another? What data will you use, specifically. It is not enough to say, coins, glass, pottery, and metalwork will answer the question. They have not done so for other scholars to date – why is that? Is it that there is too little data? Is it that they have not considered the problem with an economic perspective? Have previous scholars focussed on too narrow or limited a range of data?
I would also note there is not specification of the chronological range of your proposed research. That is really important, as it specifying the geographical parameters. Hadrian’s Wall is a well defined area, but the kingdom of Northumbria is much larger and varies in size depending on what date you are talking about.
The other aspect that is still absent, is a demonstration that you have a good command of the underlying conceptual issues. For example, while the research context talks a bit about Hadrian’s Wall and late Roman material culture, there is no mention of the kingdom of Northumbria or its origins. To support your research question, you also need an argument or link that connects the late Roman garrison of Hadrian’s Wall to the kingdom of Northumbria. At present, they are two separately floating concepts. Similarly, you do not really talk much about economics or economic impacts until your methodology section. The current state of research and understanding of economics for Hadrian’s Wall and Northumbria need to be addressed in the Research Context section.
As I think I’ve tried to explain previously, the Research Context section should be a succinct and very critical review of the current state of research as it relates to your research question. It should not be general, but quite specific. What are understood/argued at present, and on what basis. What is the problem with that current knowledge/state of research? For example, at present, very few scholars credit the late Roman frontier or army of Central Britain as having any impact or effect on the formation of Northumbria (I am the exception in this regard), with a more typical view divorcing any Roman cultural impact/significance on early Northumbrian culture (e.g. Rollason and Halsall); even Christianity as seen as something taken up by Northumbrian royalty from outside influences (e.g. Oswald and Dal Riata/Iona). Why is this view problematic? How will your research challenge this view? How will your view be unique/different and advance scholarship?
Having established a good critique of current research, Methods allows you to specify which sites and datasets you will make use of. What theoretical and or conceptual frameworks will you apply to enhance interpretation. What specific methods in GIS or statistical analysis will be used with your data? What is the timeline for your overall research project?
Given that your research question names economic impacts or contributions, your Research Context needs to critique current research from this perspective, and your Methods should also demonstrate how your data will conform to economic analysis and modelling.

Bob noticed his supervisor, a young married man, taking his divorced co-worker Joanna home two nights in succession, and decided something was going on between them. Without any malicious intent, Bob introduced the matter into the local grapevine and, as so often happens, the rumor got out of hand. Is Bob’s behavior unethical?  Why or why not?

Discussion 1Ethics in the Workplace
 
Analyze three of the following ethical scenarios:
 

Lorna is an administrative assistant in the human resources department. Her good friend, Bill, is applying for a job with the company, and she has agreed to serve as a reference for him. Bill approaches her for advice on preparing for the interview. Lorna has the actual interview questions and considers making him a copy of the list so he can adequately prepare. Is this unethical behavior?  Why or why not?

 

Betty is a high-producing, devoted employee who, at her boss’s request, will often volunteer to work overtime in an emergency. One morning, after arriving late to work, she told her boss that she got caught in traffic, when in fact, she overslept. Is making up an excuse for being late to work unethical behavior in Betty’s case? Why or why not?

 

Suzy and Tom work on an assembly line making computer parts. While there are safety protocols in place to prevent workplace injuries, these policies slow down the pace of work. Since employees are paid per computer part that gets assembled, Suzy and Tom decide not to follow the safety procedures so that they can speed up the pace of assembly. Is this unethical behavior? Why or why not?

 

Bob noticed his supervisor, a young married man, taking his divorced co-worker Joanna home two nights in succession, and decided something was going on between them. Without any malicious intent, Bob introduced the matter into the local grapevine and, as so often happens, the rumor got out of hand. Is Bob’s behavior unethical?  Why or why not?

 

Jennie was recently hired to work as a receptionist for the front lobby. As a receptionist, she is responsible for making copies for the associates. Her son Bruce comes in and needs to make some copies for a school project. He brought his own paper and needs 300 copies for his class. If he does not bring the copies with him, he will fail the project. The company copier does not require a security key, nor do they keep track of copies made by departments, so Jennie allows her son make the copies at her work. Is this unethical behavior? Why or why not?

Your initial post should be at least 250 words in length.

Identify the various ethical, legal, and safety considerations applicable to your topic of interest. What are two major challenges that you see in protecting patient privacy regarding health care information, and specifically your chosen technology, in today’s health care climate?

Identify the various ethical, legal, and safety considerations applicable to your topic of interest.
What are two major challenges that you see in protecting patient privacy regarding health care information, and specifically your chosen technology, in today’s health care climate?
The paper should include:
3 professional references,
be 3-4 pages long,
contain an introduction and conclusion,
in-text citations,
a cover page, and
a reference page
This paper must follow all proper APA formatting requirements.

Have you had an experience when evidence-based research had a significant impact on the quality of your patient care that resulted in policy making? Please discuss and state the issue and policy.

W1 Assignment 2 Discussion
 
To support your work, use your course and text readings and articles from the South University Online Library. As in all assignments, cite your sources in your work and provide references for the citations in APA format.
Nursing Research
Using the South University Online Library, mine information about nursing research.
Based on your research, respond to one of the following discussion questions.
Discussion Question 1

Is research used in your facility? If so, what type of research and how is this different than other nursing roles? Find out if there is a research committee at your facility. Is research an important component of clinical practice?

Discussion Question 2

Have you had an experience when evidence-based research had a significant impact on the quality of your patient care that resulted in policy making? Please discuss and state the issue and policy.

 textbook, Nursing Research: Reading, Using, and Creating Evidence:

Identify which law or laws would have required OPM to report their breach, and the steps the organization needs to take to report the issues.

Overview
A major security breach that happened within the federal government is the Office of Personnel Management (OPM) data breach, which exposed a large amount of personally identifiable information (PII) of federal and state employees. The effects of this breach are still being explored, and the full extent is still not known. This breach has become an important learning experience. Examining laws that suggest controls to minimize the possibility of data breaches is a crucial part of developing an adversarial mindset and will help with future instances of data breaches. There are numerous articles and research papers on the OPM breach, but the article provided in the prompt explores the breach from the employee perspective and discusses the steps that could have been used to help minimize the possibility of a data breach.
The critical controls defined by the Center for Internet Security (CIS) are used as guidelines for processes that a company can incorporate for data security. The controls are used to determine compliance to a standard put forth by the organization. They are meant to be used as an adaptive tool that will allow an organization to evaluate compliance to a known risk-mitigation level.
You have been preparing for this assignment by summarizing privacy laws and determining who is responsible for ensuring compliance to the law within an organization. It is important that you complete this assignment in your own words. Express your own ideas on how the laws and controls can be applied to this breach. It is the responsibility of a security analyst to be able to explain breaches and the controls used to mitigate issues.
Listed below are the privacy laws you are familiar with and the critical controls you will be learning about to help you complete this activity.
Privacy Laws
Americans With Disabilities Act, Section 508
Cable Communications Policy Act (1984)
Census Confidentiality Act
Children’s Internet Protection Act (CIPA)
Children’s Online Privacy Protection Act (COPPA)
Computer Security Act
Driver’s Privacy Protection Act (1994)
E-Government Act (2002)
Electronic Communications Privacy Act (1986)
Federal Information Security Management Act (FISMA)
Freedom of Information Act (1966)
Gramm-Leach-Bliley Act
Health Insurance Portability and Accountability Act (HIPAA)
Health Information Technology for Economic and Clinical Health (HITECH) Act
Mail Privacy Statute (1971)
Payment Card Industry Standards
Privacy Act (1974)
Red Flags Rule
Sarbanes-Oxley Act
State Data Breach Notification Laws
U.S. Constitution
USA Patriot Act
Wiretap Act (1968, Amended)
CIS Controls
Inventory and Control of Hardware Assets
Inventory and Control of Software Assets
Continuous Vulnerability Management
Controlled Use of Administrative Privileges
Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
Maintenance, Monitoring, and Analysis of Audit Logs
Email and Web Browser Protections
Malware Defenses
Limitation and Control of Network Ports, Protocols, and Services
Data Recovery Capabilities
Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches
Boundary Defense
Data Protection
Controlled Access Based on the Need to Know
Wireless Access Control
Account Monitoring and Control
Implement a Security Awareness and Training Program
Application Software Security
Incident Response and Management
Penetration Tests and Red Team Exercises
Prompt
Before you begin working on this assignment, read the article Inside the Cyberattack That Shocked the US Government and review the CIS Controls website. Then address the following:
Briefly summarize (in one to two paragraphs) the major issues with the OPM breach and how it occurred.
Select two of the privacy laws provided above and describe how they relate to the OPM breach.
Determine to what extent jurisdiction plays a role in the application of your selected laws.
Identify which law or laws would have required OPM to report their breach, and the steps the organization needs to take to report the issues.
Select four of the CIS controls provided above that could have been monitored to help minimize the possibility of the breach. Explain why monitoring these controls would have helped minimize the breach.

Your company is planning to implement a team-based approach to designing and creating packaging materials for clients. The purpose is to increase productivity and reduce cost. What training issues should your company address? Name two or three specific suggestions for how they should deal with them. Explain why skills training programs are important for long-term vitality of businesses.

report, address the following questions. Support your responses with materials from this week’s readings.
Your company is planning to implement a team-based approach to designing and creating packaging materials for clients. The purpose is to increase productivity and reduce cost.
What training issues should your company address? Name two or three specific suggestions for how they should deal with them.
Explain why skills training programs are important for long-term vitality of businesses.

Ethics plays a major role in the auditing process and profession. Discuss the ethical theories that can be utilized to deal with issues that can arise during the audit process. Address the following topics: Explain how you could establish a framework using these theories to support an audit.

Ethics plays a major role in the auditing process and profession. Discuss the ethical theories that can be utilized to deal with issues that can arise during the audit process. Address the following topics:
Explain how you could establish a framework using these theories to support an audit.
Highlight the key principles of the American Institute of CPAs (AICPA’s) Rules of Conduct.
Compare and contrast their rules against the rules used in international audits under the International Ethics Standards Board for Accountants (IESBA).
What does independence mean in an auditing context?
Compare and contrast in fact and in appearance, and illustrate their differences.

select a company or organization of your choice that has been dealing with risk and uncertainty within the last six months.Determine the ways the company/organization is dealing with the moral hazard problem, and suggest best practices used in the industry to deal with moral hazard. Describe a principal-agent problem in the company/organization, and evaluate the tools the company/organization uses to align incentives and improve profitability/efficiency.

Overview
In this case study , you will select a company or organization of your choice that has been dealing with risk and uncertainty within the last six months.Determine the ways the company/organization is dealing with the moral hazard problem, and suggest best practices used in the industry to deal with moral hazard.
Describe a principal-agent problem in the company/organization, and evaluate the tools the company/organization uses to align incentives and improve profitability/efficiency. Then you will? determine solutions to organizational problems that take into account principles of risk management to improve operations and profitability.
Instructions
  6–8 pages in which you:

Evaluate a selected company’s or organization’s recent (within the last six months) actions dealing with risk and uncertainty.
Recommend advice for improving risk management and provide justification for the recommendation.
Examine an adverse selection problem the company/organization is facing, and recommend how it should minimize the negative impact of adverse selection on transactions.
Determine the ways the company/organization is dealing with the moral hazard problem, and suggest best practices used in the industry to deal with moral hazard.
Describe a principal-agent problem in the company/organization, and evaluate the tools the company/organization uses to align incentives and improve profitability/efficiency.
Examine the organizational structure of the company/organization, and suggest changes to improve the overall profitability/efficiency?. Explain why those changes would result in an improvement to profitability.
Use five sources to support your writing, including one published within the last six months about the risk and uncertainty the company has faced. Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.

You must follow these formatting requirements: 
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
The specific course learning outcome associated with this assignment is:
Determine solutions to organizational problems that take into account principles of risk management to improve operations and profitability.

Recognize and define the problem or opportunity. In business, the problem can come in the form of customer complaints, supplier breakdowns, staff turnover, sales decline, and so on. Organizations proactively seek opportunities to exceed goals, surpass the industry expectations, and to expand and grow the business. Identify and analyze alternative courses of action. Leaders should seek input from multiple sources to interpret and analyze the problem/opportunity to come up with as many options as possible to solve the issue. Choose a preferred course of action. The group want to answer the following: Is the action ethical? Is it feasible? (Costs, technology availability.) Is it effective? If your answer to this question is the resolution is “good enough,” you want to rethink this solution—it will cause more harm than good.

 
Decision making is the process of identifying and choosing alternative courses of action. While we want to make rational decisions, sometimes we don’t. Sometimes, we make non-rational decisions.
There are four steps in rational decision making:

Recognize and define the problem or opportunity. In business, the problem can come in the form of customer complaints, supplier breakdowns, staff turnover, sales decline, and so on. Organizations proactively seek opportunities to exceed goals, surpass the industry expectations, and to expand and grow the business.
Identify and analyze alternative courses of action. Leaders should seek input from multiple sources to interpret and analyze the problem/opportunity to come up with as many options as possible to solve the issue.
Choose a preferred course of action. The group want to answer the following:

Is the action ethical?
Is it feasible? (Costs, technology availability.)
Is it effective? If your answer to this question is the resolution is “good enough,” you want to rethink this solution—it will cause more harm than good.

Implement the preferred course of action. You need to the participation from all teams to successfully implement the action.

On the other hand, non-rational decisions are generally the result of either satisficing (going with the first available option without much research) or intuition (using your “gut” or just your own feelings to make decisions).
For this week’s discussion, think about a time when you made a non-rational decision on the job or in your personal life.
Respond to the following:

Was it the result of satisficing or intuition?
How would your decision have been different using the four steps for rational decision making?
How would the steps have helped you to make a better, or more sound, decision?