Week 1 Assignment

User Generated

zngurjhue

Writing

InfoTech in a Global Economy

Golden Gate University-San Francisco

Description

Assignment

Hints: selected peer-reviewed literate, chapter 1 and 2 can assist you with this assignment.

You need to submit a paper regarding the threat that establishments must mitigate regarding sharing information in a global economy. Your essay must be NOT less than 1200 words, excluding the list of references.

This assignment will be one of several throughout your educational program. One of the core competencies necessary to succeed in your education endeavor is the ability to identify other research that pertains to your own. This means you'll have to identify similar research, read the papers, and assimilate prior work into your research.

Your paper must be a correct APA format, use proper grammar, and will need to include at three (3) resources, ALL of which must:

1) Be current. Published within the last few years, but not older than 2014.

2) Be peer-reviewed.

3) Relate directly to Information Technology in a Global Economy.

USE YOUR OWN WORDS!!!! DO NOT PLAGIARIZE!!!!

Every resource you choose must be peer-reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous revisions. In most cases, you can find out the review process for a meeting or journal by visiting the appropriate web site. Do not merely assume that a resource is peer reviewed - check it out.

Here are a few URLs with additional information:

https://sites.umuc.edu/library/libhow/bibliography...

https://www.bethel.edu/library/research/apa-annobib-sixth.pdf\

http://libguides.enc.edu/writing_basics/annotatedb...

http://guides.library.cornell.edu/annotatedbibliog...

https://owl.english.purdue.edu/owl/resource/614/03...

Unformatted Attachment Preview

ITS 832 Chapter 2 Information Technology in a Global Economy Professor Michael Solomon Introduction • Educating Policy Managers and Policy Analysts • Two practitioner types • • Policy informatics-savvy public manager Policy information analyst • Needs addressed by two graduate programs • • Master of Public Administration (MPA) Master of Public Policy (MPP) • Chapter focus • Role of policy informatics in preparing practitioners Practitioner Orientations to Policy Informatics • • • Two “ideal” types • • Policy informatics-savvy public managers Policy informatics analyst Manager • • Play important roles in implementation Instrumental in using policy informatics projects Analyst • • Execute policy informatics initiatives Other common role names • • • • Analyst Researcher Modeler Programmer Policy Informatics-savvy Manager • • • May not need to • • Build models Analyze big data Must be able to • Lead personnel who build models and manage big data Necessary competencies • • • • • • Systems thinker Process orientations to public policy Research methodologies Performance/Financial management Collaborative/communicative Social media, IT, and e-Governance awareness Policy Informatics Analyst • Start with basic competencies of managers • Additional necessary competencies • • • • Advanced research methods of IT applications Data visualization and design Programming skills Modeling skills • Perhaps one of the most important Summary • Two types of practitioners • • • Leadership Interacting with actors Analysts • • • Analysts Managers • • • Managers Technical skills Responsible for executing requirements University of Vermont • Distinct programs to address each role ITS 832 Chapter 1 Information Technology in a Global Economy Professor Michael Solomon Introduction • Policy-making and implementation • Necessary to deal with societal problems • Policy interventions • • • • Costly Long-term implications May affect large groups of people Not easy to undo Complexity and Uncertainty • Ongoing process • • • • • • Recognize issue as problem Develop alternative course of action Create or alter policy Implement policy Execute policy Evaluate policy Policy cycle and stakeholders Developments • New technology that affects policy process • • • • • • • • Social media Blogs Open data Freedom of information Wisdom of the crowds Open collaboration Transparency in policy simulation Agent-based simulation and hybrid modeling techniques Combining Disciplines • New field is known by different names • • • • • ePolicy-making Digital policy science Computational intelligence Digital science / Data science Policy informatics • Multidisciplinary • Requires expertise from wide range of disciplines Summary • Policy-making is changing due to technology • Technology can help to develop more effective policy • Integrating technology requires substantial effort • • • Many types of technology Requires different levels of expertise All technology is not helpful for each situation • Emerging need for inter-disciplinary specialists
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: MITIGATING THREATS IN SHARING INFORMATION GLOBAL
ECONOMY

Mitigating Threats In Sharing Information In A Global Economy
Institution Affiliation
Date:

1

MITIGATING THREATS IN SHARING INFORMATION GLOBAL ECONOMY
2

Over the recent few years, there has been a vast of changes in global economic
viewpoints. The main issues have been on the matter of sharing information regarding the global
economy. There exist some threats that need addressing to ensure that the sharing of data follows
the right procedures and is done correctly to ensure that the final product is well refined and
there is less risk involved in the information-sharing techniques. Commonly, threats exist in the
policymaking process as well as in development. This is especially regarding the technology and
more so in combining disciplines throughout the policymaking process. There are also emerging
needs that continue to cause more threats to technology, making it hard to come up with the
necessary policies within the specified thresholds. Issues of leadership, the skills, and the laid
down programs also need some mitigation to help come up with the best systems in the global
economy.
As mentioned, there has been some technological development throughout the past few
years. To this extent, therefore, there the development of cyber threats, especially relating to
sharing data. There is a need to refine this formation in the global economy, given that there is a
high risk of data loss or theft, especially when distributing the data. Constance Douris (2017)
starts by giving the most vulnerabilities that relate to cyber threats to the global economy in a
matter relati...


Anonymous
Excellent resource! Really helped me get the gist of things.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags