Campbellsville University Innovation Discussion

User Generated

Znqqlcnjne

Writing

Campbellsville University

Description

I have attached the document with 8 discussions and I need to reply to each one of them in 100 words. APA format and reference atleast one for each discussion.

Total 800 words.

Unformatted Attachment Preview

Vinod CSP replies 1 day ago Mayukha Bairy Week5Discussion Name: Mayukha Bairy COLLAPSE The innovation blast of the previous two decades has utilized innovation in practically all parts of the association a basic piece of the business. As the utilization of innovation has expanded, so has the electronic waste. Subsequently, a ton of mindfulness is being raised about green IT, which is vitality productive utilization of innovation and appropriate removal of electronic waste. One idea that can help empower Green IT is Cloud figuring. Distributed computing is the sharing of assets over the web as opposed to having neighborhood workers. It is the conveyance of processing as assistance instead of an item, whereby shared assets are given to PCs as a utility over the web. This paper expects to contemplate the current circumstance with respect to the utilization of IT use and the effect of e-squander at the University of Bahrain. It will likewise recognize the empowering agents and inhibitors of adjusting Green IT at the University of Bahrain. Vitality use and its effect on the earth have become a subject of worldwide worry in recent years Gardner, G. and Stern, P. (2008). The creation and utilization of different types of vitality is a large supporter of ozone-depleting substance (GHG) outflows and environmental change (BSD Global, 2002). These issues are getting imperative to associations as such issues are progressively thought to affect intensity (Rao and Holt, 2005). In many associations, IT is a significant buyer of energy. Greening IT can thusly lead not exclusively to a decrease in carbon discharges yet, in addition, to significant cost investment funds (Mines, 2008; Donston, 2007; Nunn, 2007). Greening IT along these lines not only lessens the all-out expense of innovation proprietorship yet, in addition but also builds the all-out environmental value of possession (Tung, 2007). The capability of innovation to make feasible business and society is generally acknowledged (Olson, 2008; Gonzalez, 2005; Hart 1997) with just a couple (Fuchs,2008) addressing such possibilities. Additionally, there are a few reports of major counseling firms and popular press hailing Green IT and estimating that Green IT can possibly make new competitive chances, to diminish carbon emanations and to improve by and large business efficiency(ACS, 2007; Baines, 2007; Gartner, 2008; Info~Tech, 2008a, 2008b; Jones and Mingay, 2008; Mines, 2008). References: Mines, C. (2008) The Dawn of Green IT Services, FORRESTER Research Inc, February 2008, 1- 1419. Donston, D. (2007) Green IT generates fertile ideas, eWeek, 24(16), 46.20. Nunn, S. (2007) Green IT: Beyond the data center how IT can contribute to the environmental agenda across and beyond the business, Accenture, 1- 7.21. Tung, L. (2007) Green IT will hit Australian govt 'like a ton of bricks, Accessed June 30, 2008, fromhttp://www.zdnet.com.au 22. Olson, E.G (2008) Creating an enterprise-level "green" strategy", The Journal of Business Strategy, 29(2),22-30.23. González, P.d.R. (2005) Analyzing the factors influencing clean technology adoption: A Study of the Spanish pulp and paper industry, Business Strategy and the Environment 14(1), 20-37 7 hours ago Teja Sri Mallempati Discussion COLLAPSE Cloud computing is the availability of computer system resources on demand especially computing power and cloud storage without direct active management by the user. I disagree that cloud computing enhances green computing and reduces the total cost of computing. My reasons are as follows: To access the files stored in the cloud storage, there must be an internet connection. Wherever there is no internet connection or the internet service is down, you would not be able to access your files at that time even though they are safely stored. Another disadvantage is the terms of the agreement. Before agreeing to the services, one should look for what is offered (Obrutsky, 2016). Cloud computing is because some systems known to provide a certain number of gigs yet delivers lesser. For this, the number of files that can be stored can be less than what the person wanted. Cloud-computing may appear cheaper than other software solutions. They cost too much. Yes, cloud application does not require significant investments for support or license infrastructure. Still, it does not contain all the features available in software applications. This feature missing may be as important as the other features available .in cases of transfer of data, the cloud requires a large amount of data charged on a per GB basis. The data used can add up hence end up costing a lot of money Cloud computing is usually vulnerable to various cyberattacks that are designed to penetrate through. (Shaikh & Haider, 2011) Cloud itself is a third party where someone`s or a company's data is stored, and they are stored so that they can be accessed from anywhere. However, most third parties try to secure the data, but this has been poorly done because there many users using the cloud. So, the person or company using should ensure further security to protect their data. Cloud computing is also exposed to security threats such as hacking. For most accounts, a password or a pin is used to secure the documents but in the field of authentication password and pins are known to be the weakest form of authenticating, and for that, someone’s account can be illegally breached. After hacking the information is costly to retrieve. Reference Shaikh, F. B., & Haider, S. (2011, December). Security threats in cloud computing. In 2011 International conference for Internet technology and secured transactions (pp. 214-219). Obrutsky, S. (2016). Cloud storage: Advantages, disadvantages and enterprise solutions for business. In Conference: EIT New Zealand. Saket replies 1 day ago Tejaswini Mylaram Discussion 13 COLLAPSE Mitigation is also the approach to mitigating damage caused by natural disasters by removing risk factors. Mitigation can come in several different forms: restoration of natural systems, restoration of land, removal of hazards, and prevention of future disasters. Prevention is an attempt to prevent damage from natural disasters. It is usually associated with reducing risk in the future when possible or protecting against the next disaster in the same way that we protect against a natural disaster today, such as protecting against flood damage and earthquakes (Shultz & Galea, 2017). Prevention takes a long-term approach. It focuses on making changes, as opposed to preventing damage. Previsions made in the future will affect the damage done by the next disaster. Preventing loss of life means making sure that people's lives are not put in danger and that others have adequate protection against danger. Prevention works best by focusing on the present decades to centuries. It focuses on making changes, as opposed to preventing damage. Prevention is most effective when the actions taken in the present are taken by people in control of the future and made to reduce future damage (Shultz & Galea, 2017). The purpose of mitigation is to minimize the impact of the disaster. As part of this effort, we will also focus on mitigating the effects of natural disasters. The goal of mitigations is to minimize the impact of the disaster. Mitigation is the effort to reduce the loss of life and property by lessening the impact of disasters. Actions that are not mitigation-oriented are usually called preventive actions. Prevention efforts may provide immediate relief against potential future disasters, but they do not address the underlying causes of disasters. Preventive actions can include efforts to improve the infrastructure and services in a community or country or prevent an individual from becoming a victim of a disaster (Bier, 2017). These steps will help mitigate a disaster's impact. The more a disaster impacts a community, the less likely it is to be mitigated. A disaster can result in a loss of life and personal loss. The potential loss of human life from an earthquake is very high, but there is also the potential loss of a business, home, or even an entire town. Mitigation planning is often a multi-year effort that combines disaster risk and mitigation actions—and it will be a lengthy and costly process. Mitigation can be measured as either loss of life or property. The probability of death measures loss of life due to a natural disaster and loss of property is when property and assets are lost or damaged. Risk is the probability of an event occurring, risk of death. Mitigation means reducing the loss of life or property to a level where the probability of loss is less than the risk of a loss (Bier, 2017). References: Bier, V. M. (2017). Understanding and mitigating the impacts of massive relocations due to disasters. Economics of disasters and climate change, 1(2), 179-202. Shultz, J. M., & Galea, S. (2017). Mitigating the mental and physical health consequences of Hurricane Harvey. Jama, 318(15), 1437-1438. 2 hours ago Venkata Sivasai Kasani Discussion 13 COLLAPSE Disaster Recovery Plan According to Makwae (2018), after a disaster has attacked a company or country, it is the responsibility of the leaders to participate in a recovery process. The processes in this situation are always led by the goal of returning the society or the organization in its pre-disaster form. On the other hand, the business continuity plan refers to the processes designed to curb any disasters that have the potential of hindering the critical processes of the business (Fani & Subriadi, 2019). Therefore, it is well established that a disaster recovery plan has to be within the business continuity plan for its efficiency. From the definition of the disaster recovery plan, it is well established that it contains the processes that are used in mitigating the destruction that a disaster can cause in organizations. On the other hand, this is a concept that applies to numerous societal aspects. In a concert, coming up with an efficient risk management plan is vital for the overall success. On the other hand, a disaster recovery plan has to be a part of the risk management plan as it assists in mitigating the risks that arise from any disastrous incidences in concerts. Furthermore, Prescent (2018) outlined that having a written plan, keeping data copies offsite, testing plans with realistic scenarios, updating the disaster recovery plan throughout, and planning and resuming normal operations are some of the common best practices that can be done for a successful disaster recovery plan. It is, therefore, well established that a disaster recovery plan is an important aspect in modern-day society and companies should make sure that they have these plans. References Fani, S. V., & Subriadi, A. P. (2019). Business Continuity Plan: Examining of Multi-Usable Framework. Procedia Computer Science, 161, 275282. https://doi.org/10.1016/j.procs.2019.11.124 Makwae, E. (2018). An assessment of disaster recovery planning: A strategy for data security. Lap Lambert Academic Publishing. ISBN: 978-613-3-99011-1. Retrieved from https://www.researchgate.net/publication/327572587_An_assessment_of_disaster_r ecovery_planning_A_strategy_for_data_security Prescent (2018) Best Practices for Disaster Recovery. Retrieved from https://www.prescientsolutions.com/blog/best-practices-disaster-recovery/ Divya replies Femi OBAYEMI 3 hours ago, at 9:42 AM Heightened cyber warfare on internet users and businesses make them prone to a wide range of attacks that can cripple or crush them irreparably. None is guaranteed immunity from these attacks. Major security threats to e-commerce web sites include: Data breach occurs when hackers gain unauthorized access by means such as backdoor, malware (viruses, trojan horses, drive by downloads, ransomware), DOS, DDoS and so on. In 2016, Yahoo’s data for 1 billion users was compromised in this regard. Credit Card fraud targets hijacking financial transactions and inventory volume cum delivery address. It is one of the oldest and most attractive internet frauds. E-skimming (identity theft) targets websites to steal clients’ data and initiate clandestine transactions under the guise of an assumed identity. Brute force attack occurs when fraudulent programs attempt multiple combinations on the Admin Panel to crack its password. Man in the Middle attack occurs when a hacker can listen in on or access communication between the firm and client, and use information gained to inflict damage to both of them. This mostly occurs when the user is connected to a vulnerable wi-fi. Exploitation of known variables such as poor security policies, non-compliance by employees, social engineering hacks and security breaches such as defective software and data (bugs and defects, maintenance nightmare, software metrics. Employee Sabotage implies deliberate damage inflicted by disgruntled staff or competitor’s plant to destabilize the website and operations. Research by Intermedia and Osterman showed that 89% of exemployees still have access to corporate applications for a window of time post-departure. The impact of these attacks includes financial loss, down time or loss of time to productivity, brand or reputation damage, cost of trouble shooting by IT consultants, effects of black listing by search engines, loss of future sales due to reputation damage and search engine limitations. Satyasriram_Varma DANTULURI 13 hours ago, at 11:34 PM NEW Credit Card Fraud Most of the times, ecommerce sites let customers to create accounts and the option to save their credit card details. When Hackers hack devices which customers use like Laptops or Phones, they get access to credentials of customers and can make unintended purchases on customer’s credit cards. Spamming Fraudulent emails are sent to customers and when they are opened and clicked, customers are directed to fraudulent websites where customer credit card information is captured and misused. Suspicious Application Downloads When accessing certain sites, unauthorized applications and viruses are downloaded into our laptops and they start tracking all user activity. They have the ability to capture user sensitive data and this data can be sold to 3rd party services for a price. Network Attack Network attacks like Distributed Denial of Service (DDoS) can make ecommerce sites not accessible as the site is overwhelmed with traffic from illegal multiple sources. As recent of June 2020, Amazon web services site had a DDoS attack which effected a large number of websites. Steps to avoid security threats – • Use websiteprotection services like Cloudflare, AWS Shield or Akamai to reduce the impactof DDoS attacks. • • Using good anti-virusand anti-malware applications. Using a VPNservice, which keeps user’s activity and data secured. References: Laudon, K. C., & Laudon, J. P. (2017c). Management Information Systems: Managing the Digital Firm (15th Edition) (15th ed.). Pearson. Reply Venkata MYNAMPATI 19 hours ago, at 5:19 PM NEW Selecting information systems projects is critical because all the companies rely on information systems' smooth operation. The selection process is complicating due to the availability of several information system projects. Due to the nature of the problem, preferences, and requirements, choosing an appropriate method often becomes challenging (Deng & Wibowo,2008). Hence, the need for an intelligent decision support system (DSS) facilitates adopting proper multicriteria analysis for solving information systems project evaluation and selection process. The selection process for appropriate information systems projects requires evaluating the performance of all the available information systems projects, assessing the importance of the criteria, and sum up the assessments for the overall performance index for each information system project (Deng & Wibowo,2008). For an effective information system plan, the organization must have a vision for short and long-term information requirements. The first step in the information system plan is to know the purpose of the plan. The second step is the strategic business plan rationale. The third step is the current system that exists in the firm. The fourth step is the new developments. The fifth step is the management strategy. The sixth step is to anticipate the difficulties in implementation. The last step is to analyze the business requirements. The large-sized companies Large corporations will have a management structure to ensure the most critical systems projects receive priority. Critical success factors (CSF), portfolio analysis, and scoring models are used to identify and evaluate alternative information systems projects. In CSF's approach, the key performance indicators of managers determine the company's information requirements. The portfolio analysis is the analysis of potential applications to assess the risks and benefits of selecting among the alternatives for information systems. A scoring model is used for deciding the alternative systems based on rating systems for selected objectives (Laudon & Laudon, 2017). References Deng, H. & Wibowo, S. (2008). Intelligent Decision Support for Evaluating and Selecting Information Systems Projects Laudon, K. C., & Laudon, J. P. (2017). Management Information Systems: Managing th Pujitha GANGARAPU 7/28/20, 10:24 AM NEW The management structure for projects look something as follows: Corporate strategic planning group : They develop the firm’s strategic plan IS steering committee operation : They are responsible for system development and Project management : They oversee IS projects Project team : They are responsible for the individual systems project Organizations need an information systems plan that describes how IT supports the attainment of their business goals and documents all their system applications and IT infrastructure components. This should identify and evaluate alternative information systems projects: • • • Critical success factors: Organisation must have a clear understanding of its long and short term information requirements. Personal interviews with top managers and identifying their goals to develop the firm’s CSFs. Portfolio analysis: Management can determine the optimal mix of investment risk and reward for their firms, balancing riskier high-reward projects with safer lower-reward ones. Scoring models: Assigns weights to various features of a system and then calculates the weighted totals. For selecting and evaluating information systems projects and aligning them with the firm’s business goals: • • • • One must calculate its costs and benefits. Tangible benefits are quantifiable, and intangible benefits that cannot be immediately quantified may provide quantifiable benefits in the future. Benefits that exceed costs should be analyzed using capital budgeting methods to make sure a project represents a good return on the firm’s invested capital. Rely on measures of cash flows into and out of the firm; capital projects generate those cash flows. Real options pricing models, which apply the same techniques for valuing financial options to systems investments, can be useful when considering highly uncertain IT investments. Reply
Purchase answer to see full attachment
Explanation & Answer:
800 Words
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

1

Responses
Student’s Name
Course Department, Institution
Course Code, Course Name
Instructor’s Name
Date

2

Dear Mayukha Bairy,
Innovation has highly been realized in the globe through the development of IT leading to
the development if green IT. Green IT is important in appropriation and innovation thus should
be promoted. I, therefore, concur with you that one of the best ways of empowering Green IT is
through figuring cloud which involves sharing the assets over the web against having the web in
nearby workers as the great assets are provided to PC

as a utility over the web. Green IT is

also important in reducing the effects of vitality on the environment through decreasing the
discharge of carbon dioxide in the atmosphere thus improving the cost of investment.
Dear Teja Sri Mallempati,
Cloud computing is the availability of the systems of the computers on-demand without
direct active management of the people using the computers. Cloud computing enhances green
computing and reduces the cost of computing, I, therefore, disagree with your controversial
statement on the importance of cloud computing. Cloud computing ease access to the files stored
in th...


Anonymous
This is great! Exactly what I wanted.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags