Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.

Infrastructure project plan
Paper , Order, or Assignment Requirements

Project Deliverable 5: Infrastructure and Security

Due Week 8 and worth 110 points

This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.

Section 1: Infrastructure Document
1. Write a four to six (4-6) page infrastructure document in which you:
o Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.
o Present the rationale for the logical and physical topographical layout of the planned network.
o Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
o Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.
o Create and describe a comprehensive security policy for this data-collection and analysis company that will:
• Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.
• Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Prioritize the top three (3) benefits that an HRIS will offer the business, and explain your position.

Phase II – Selecting An HRIS Application
Paper , Order, or Assignment Requirements

Now that you assessed the business, identified some of the inefficient HR related processes plaguing Gladwell Grocery Stores, and pinpointed a few possible solutions, it is time to choose an HRIS application that will suit the business. In this assignment, you will consider the HR function you chose in Phase I, and recommend the type of HRIS that you believe would be the most efficient for addressing this function.
To prepare for this assignment, review the Gladwell Grocery Stores case scenario, and then research potential HRIS types and HRIS vendors that may suit the needs for Mr. Bell and Gladwell Grocery Stores.

Write a three to four (3-4) page paper in which you:

HRIS Needs Assessment
1. Prioritize the top three (3) benefits that an HRIS will offer the business, and explain your position. Next, examine the effect of automation on creating a more efficient process for the HR function chosen in Phase I.
Choose HRIS Type
1. Based on your research, select the type of HRIS that you plan to implement for your client. Analyze two (2) of the system’s offerings that you believe would be best suited to addressing your client’s needs. Then, assess two (2) ways that the selected HRIS can improve efficiency for the HR function you chose in Phase I. Defend your decisions with theory and findings from past readings and class activities.
Choose HRIS Vendor
1. Now that you know the type of HRIS you will be implementing, it is time to choose an HRIS vendor. Compare and contrast two (2) vendors, including a description of the cost, capabilities, and HR functions that the HRIS caters to. Based on your comparison, choose the HRIS vendor that you will recommend to your client, and explain the main reason why you decided to choose this vendor over the others.
2. Use at least (3) quality academic resources in this assignment. Note: Wikipedia and similar Websites do not qualify as academic resources.
3. Format your assignment according to the following formatting requirements:
4. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
5. Include a cover page containing the title of the assignment, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
6. Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.
The specific course learning outcomes associated with this assignment are:
• Create an HRIS needs analysis and evaluate the acquisition process.
• Use technology and information resources to research issues in human resource information systems.
• Write clearly and concisely about human resource information systems using proper writing mechanics.

discuss what success of the performance improvement plan will look like after implementation.

Healthcare Quality Issue Part 2
Paper , Order, or Assignment Requirements

You will also implement your performance improvement initiative and discuss what success of the performance improvement plan will look like after implementation. As this is a scholarly initiative, this assignment must adhere to all APA requirements and formatting and include peer-reviewed and evidence-based sources to support any and all claims. As you develop this final part of the assignment, consider the following prompts to formulate your paper.

You will write paper on the below parts III and IV. Be sure to see reference paper for parts I and II.
III. Performance Improvement Initiative
A. Propose an initiative that will address this problem within the department of your chosen healthcare organization. What specific relevant quality standard will this quality initiative address?
B. Discuss the data determinants of success, as related to this initiative. In other words, what type of data will be indicative of a quality outcome?
IV. Implementation of the Plan in the Organization
A. What interdepartmental communication channels willbe used for plan implementation?
B. What manner of data interpretation will be used to communicate the findings within the organization?
C. If this initiative was implemented, what do you believe would be the hypothetical effect(s) on patient care outcomes? How will health information systems support those improvements in patient care?
D. What do you think the hypotheticaleffect of the quality or performance initiative will be on the culture of safety within the organization?

Review the essential elements of a security strategy

Assignment 1: Creating And Communicating A Security Strategy
Paper , Order, or Assignment Requirements

As an IT professional, you’ll often be required to communicate policies, standards, and practices in the workplace. For this assignment, you’ll practice this important task by taking on the role of an IT professional charged with creating a memo to communicate your company’s new security strategy.

The specific course learning outcomes associated with this assignment are: • Analyze the importance of network architecture to security operations. • Apply information security standards to real-world implementation. • Communicate how problem-solving concepts are applied in a business environment. • Use information resources to research issues in information systems security. • Write clearly about network security topics using proper writing mechanics and business formats.

Preparation

1. Review the essential elements of a security strategy

A successful IT administration strategy requires the continuous enforcement of policies, standards, and practices (procedures) within the organization. Review these elements to see how they compare:

Policy The general statements that direct the organization’s internal and external communication and goals.
Standards Describe the requirements of a given activity related to the policy. They are more detailed and specific than policies. In effect, standards are rules that evaluate the quality of the activity. For example, standards define the structure of the password and the numbers, letters, and special characters that must be used in order to create a password.
Practices The written instructions that describe a series of steps to be followed during the performance of a given activity. Practices must support and enhance the work environment. Also referred to as procedures.

2. Describe the business environment

You are the IT professional in charge of security for a company that has recently opened within a shopping mall. Describe the current IT environment at this business. You can draw details from a company you work for now or for which you have worked in the past. You’ll need to get creative and identify the details about this business that will influence the policies you’ll create. For example, does the company allow cell phone email apps? Does the company allow web mail? If so, how will this affect the mobile computing policy? Describe all the details about this business environment that will be necessary to support your strategy.

Hospital Data Security Select a hospital or healthcare organization

Hospital Data Security Select a hospital or healthcare organization
Paper , Order, or Assignment Requirements

Hospital Data Security
Select a hospital or healthcare organization to research. You may choose an organization you are familiar with or can readily obtain information about. To maintain confidentiality, you do not need to mention the name of the organization. You may also choose a hypothetical/fictitious healthcare organization.
Daily life requires us to have access to a lot of information, and information systems help us access that information. Desktop computers, laptops, and mobile devices keep us connected to the information we need through processes that work via hardware and software components. Information systems infrastructure makes this possible. However, our easy access to communication and information also creates security and privacy risks. Laws, regulations, policies, and guidelines exist to protect information and information owners. Cybersecurity ensures the confidentiality, integrity, and availability of the information. Identity management is a fundamental practice. Part of identity management is the governance of access, authorization, and authentication of users to information systems, Identity management is one part of a layered security defense strategy within the information systems infrastructure. Your work in this project will enable you to produce a technical report and nontechnical presentation that addresses these requirements.
There are six steps that will help you create your final deliverables. The deliverables for this project are as follows:
Nontechnical presentation: This is an 8-10 slide PowerPoint presentation for business executives and board members.
Technical report: Your report should be a 6-7 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations.
Executive summary: This should be a 2-3 page double-spaced Word document.
In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

Examine potential changes in IT related to innovation and organizational processes

Examine potential changes in IT related to innovation and organizational processes
Paper , Order, or Assignment Requirements

Unit VIII Scholarly activity using the CSU Online Library, find two articles on information systems best practices. The Academic Search Complete database will provide you with excellent articles on thi
Unit VIII Scholarly activity using the CSU Online Library, find two articles on information systems best practices. The Academic Search Complete database will provide you with excellent articles on this concept.

Discuss some of the key issues to be aware of and the best practices to mitigate them.

• Discuss strategic analysis decisions in the next five years, what we need to watch out for in the information technology (IT) field, and how these decisions will impact the overall company.

• Examine potential changes in IT related to innovation and organizational processes.

• List and describe internal (online) information security risks and mitigation tactics and how they will affect decision-making strategies.

• List and describe external (building) information security risks and mitigation tactics and how they will affect decision-making strategies.Your scholarly activity submission must be at least three pages in length. You are required to use at least one outside source to support your explanation. All sources used must be referenced; paraphrased and quoted material must have accompanying citations and be cited per APA guidelines.

Personal Trainer, Inc. owns and operates fitness centers in a dozen

Personal Trainer, Inc. owns and operates fitness centers in a dozen
Paper , Order, or Assignment Requirements

Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new `supercenter`
Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new “supercenter” in the Toronto area. Personal Trainer’s president, Cassia Umi, hired an IT consultant, Susan Park, to help develop an information system for the new facility. During the project, Susan will work closely with Gray Lewis, who will manage the new operation.
Background
•You are enjoying your job as a student intern at use it to help you create the chart.
•Determine the overall duration of the project, and identify the critical path. Personal Trainer. Last week, Susan asked you to help her plan the new information system project. Susan knows that you have completed several information systems courses at the local college, and that you have studied project management tools and techniques.
•Specifically, she wants you to get ready for the next set of systems development tasks, which will be requirements modeling for the new system. Yesterday, Susan called you into her office to discuss the specific tasks she wants you to perform. After meeting with Susan, you sit down and review your notes. She wants you to treat the set of tasks as a project, and to use project management skills to plan the tasks. Here is what she suggested to you as a work breakdown structure, including the duration she estimated for each task:
•First, you need to meet with fitness center managers at other Personal Trainer locations (5 days).
•After these meetings, you can conduct a series of interviews (5 days).
•When the interviews are complete, two tasks can begin at the same time: you can review company records (3 days) and observe business operations (8 days).
•When you have reviewed the records and observed business operations, you can analyze the BumbleBee accounting software (5 days) and study a sample of sales and billing transactions (2 days).
•After completing the analysis and studying the sales transactions, prepare a report for Susan (1 day)
•You are excited about the opportunity to practice your skills, and you start to work on the following list of tasks:
1.Create a table listing all tasks separately, with their duration.
2.Identify all dependent tasks, and indicate what predecessor tasks are required.

Describe at least two (2) career options someone with an accounting education can pursue.

Assignment 1: Careers in Accounting Due Week 8 and worth 240 points
Paper , Order, or Assignment Requirements

Accounting is the study of how businesses track their income and assets over time. Accountants engage in a wide variety of activities besides preparing financial statements and recording business transactions. These activities include computing costs and efficiency gains from new technologies, participating in strategies for mergers and acquisitions, quality management, developing and using information systems to track financial performance, tax strategy, and health care benefits management.
Use the Internet or the Strayer Online database to research career options within the accounting field and accounting job postings in your local area to respond to the questions in the assignment.
Write a one to two (1-2) page paper in which you:
1. Describe at least two (2) career options someone with an accounting education can pursue. Be sure to reference sources such as the Bureau of Labor Statistics and the American Institute of Certified Public Accountants.
2. Describe one (1) researched accounting position, and explain the essential skills that would make a candidate successful in the position. Articulate the primary manner in which the researched accounting positions could add value to the company seeking candidates.

Patient satisfaction quality Improvement Project: Technologies

Patient satisfaction quality Improvement Project: Technologies
Paper , Order, or Assignment Requirements

For your Patient Satisfaction Quality Improvement Project, write a 1,400- to 1,750-word report in which you will:
• Explain the types of information technology systems you used to gather data.
o Explain how the use of nursing informatics applies to your department or unit, and how it relates to your quality improvement initiative.
o Evaluate the influence of information technology on patient care.
 Does it improve patient care?
 How much nursing time does technology take away from patient care?
 Evaluate the advantages and disadvantages of barcoding.
• Analyze which systems contribute to the management and maintenance of change for the organization.
• Analyze the Health and Medicine Division recommendations for integrated information systems (e.g., EpicCare, Cerner, ABELMed, FutureNet, or other system).
• Determine other types of applications of technology, other than the electronic medical record system, to implement the quality improvement project.