BIS/221 Week 2
Everything listed for Week 2 is included in this purchase!
Charter: Individual Assignment
Resources: Week 2 Learning Team Collaborative Discussion and the
Learning Team Charter for Collaborative Learning Activities.
Write a 150- to 200-word individual response to the following:
• Consider the multiple definitions of collaboration.
• Define collaboration and how you will apply it in this course based
upon the
discussion with your Learning Team. Be sure to reference and
cite your sources.
• Answer the questions individually.
Participation
How often should team members meet to discuss an assignment deliverable?
Collaboration
How will we work with others to achieve our assignment goals and work through conflict?
Communication
What modes of communication will we use? Where will we communicate?
Team contributions
What are the expectations for equitable contributions from each team member?
Assignment deadlines
Identify the dates in which team collaborative activities should be completed in order to complete the individual assignments
Other Considerations
Include any other special considerations for this team
Click the Assignment Files tab to submit your assignment and be sure
to attach a copy of your Learning Team Charter for Collaborative
Learning Activities.
Individual: Business Value of Software Applications
Option #1-Part I & Part II / Summary and Memo / Word Count: 1,929 words!
Option #2-Part I & Part II / Summary and Memo / Word Count: 1,532 words!
Security in the work place is a major concern businesses must address
to protect company data. In addition, to automated security, it is also
the company's responsibility to implement policies and procedures for
the handling of data by company personnel. Students will research risks
and threats to digital data and develop security policies all company
personnel must be trained on and be held accountable to protect
company data.
Part 1
Develop a 1,400-word summary describing the challenges businesses
have in securing data in today's technological environment:
• Include risks and threats of company data.
• What policies/procedures should be implemented for the handling of
data
ensure data protection and business continuity?
Use the following features of Microsoft Word in your summary:
• A Microsoft Word memo template.
• Either a bulleted or numbered list of the new security
policies/procedures, and
bold or changed font color so this list is highly
visible.
• Highlight the effective date so it stands out.
• Insert an image that is relevant to the memo content. Images must
also be
cited and referenced.
Save as a Microsoft Word document saved under the following format:
Lastname_Course#_W2.doc.
Format your assignment consistent with APA guidelines.
Part 2
Develop a 175-word memo announcing the new security policies to all
employees taking effect in one month following mandatory training.
Search online for a Microsoft memo template.
Create an eye-catching memo that is clear and to the point concerning
the new security policies. APA formatting is not required for this part of
the assignment.
Save as a Microsoft Word document saved under the following format:
Lastname_Course#_Memo.doc.
Format your assignment consistent with APA guidelines.
Click the Assignment Files tab to submit both parts of your
assignments.
Learning Team Charter for Collaborative Learning Activities
Complete the Learning Team Charter for Collaborative Learning Activities with your Learning Team.
Each student must submit their own copy of the Learning Team Charter highlighting their input.
BIS/221 Week 2 Discussion Questions
Three Answer Choices included with each Discussion Question.
Supporting Activity: Document Management Information Systems
What is a "Document Management Information System" and how valuable is it to organizations?
Supporting Activity: PDF Documents
What is a PDF and how is it used - is it secure?
Supporting Activity: Viruses
Class, Why do you think we are seeing so many top company's being hacked? Is it due to poor security measures?
Supporting Activity: Malware
Class,
How do you protect your devices from malicious malware? Do you see the value of antivirus software?
Supporting Activity: Controls
Class. Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one.
|