Information Systems homework help

Define and describe cloud-based collaboration.

The reading this week discusses collaboration in the cloud. Your task this week is to write a research paper that contains the following:   Define and describe cloud-based collaboration.    Google Docs is a cloud-based tool used for document sharing.   Discuss pros and cons of using Google Docs for business-based documents.    Compare and contrast the use of […]

Define and describe cloud-based collaboration. Read More »

Does media directly influence individuals?

Instructions After studying the assigned reading The Handbook of Communication Science, Second Edition, Chapter 15: Mass Media Effects and considering one of the five categories of media effect theories mentioned in the article (learning, socialization, selective exposure, selective presentation, and perceived effects—remember, these are the categories, not the names of the theories themselves), identify one

Does media directly influence individuals? Read More »

Write a policy that determines where sensitive information may exist within your organization and how it should be disposed of securely.

This week we talked about dumpster diving and explored the risks of improperly disposing of sensitive information.  Use the tools and techniques from your readings this week to complete the following tasks: Part A: Using common open source information gathering techniques, compile a “dossier” of readily available information about yourself.  Consider “dumpster diving” your own

Write a policy that determines where sensitive information may exist within your organization and how it should be disposed of securely. Read More »

Write a policy describing the procedures our fictitious company will use to verify the identity of those requesting information.

Being aware of how attackers use pretexting to gather information, you need to write a policy describing the procedures our fictitious company will use to verify the identity of those requesting information.  Part A: Using ONLY your readings for this week as well as the videos and supplemental reading on how attackers use pretexting to

Write a policy describing the procedures our fictitious company will use to verify the identity of those requesting information. Read More »

What happens if staff fails to follow social engineering policy?

What happens if staff fails to follow social engineering policy? One key element in inspiring compliance is to establish the value of the information. One way to do that is to stress the importance of protecting information and establishing consequences for not doing so. This week, write a policy statement that explains the consequences of

What happens if staff fails to follow social engineering policy? Read More »

Horizontal or Vertical Information Sharing Flow

Research and select at least 1 peer-reviewed article related specifically to Horizontal or Vertical Information Sharing Flow which relates to your course reading from Chapter 3. 1. Research a total of two articles from peer-reviewed journals (published within the last 24 months) that address the assigned topic. Use the DU Library, journal, Internet, or text

Horizontal or Vertical Information Sharing Flow Read More »