Create an 10- to 12-slide Microsoft® PowerPoint® presentation addressing the following:

100% Original Work.

Graduate Level Writing Required.

DUE: Sunday, September 12, 2020 by 5pm Eastern Standard Time.

Overview: Risk assessment does not just include infrastructure. Risks can also include technological challenges, such as network and data vulnerabilities, which was evident when the Federal Government’s OPM personnel data was stolen.

Create an 10- to 12-slide Microsoft® PowerPoint® presentation addressing the following:

  • Describe and provide an example of the terms information, cyber, and computer security. Explain the differences between the terms.
  • Identify and provide an example of the steps to evaluate the effectiveness of an organization’s mobile security plan.
  • Contrast and provide an example of cyber-warfare and cyber-terrorism

 

4-6 Bullets per slide, 50 – 100 words per slide for speaker notes.

Include at least four additional scholarly references. 

Must Be Graduate Level Writing 

100% Original Work

Develop a 12- to 15-slide, approximately 10-minute business action plan presentation.

Reflect on your Week 1 Apply assignment, Business Plan Outline. This is your “big” idea that could make you the next Bill Gates. Your idea sounds good and looks great on paper. Now it’s time to determine if this idea is feasible. Remember, it’s better to identify challenges early than to put time and effort into a business that is destined to fail. Regardless of the outcome, you will now have the knowledge and skills to begin a business plan and determine if the idea will work.

Review Sections 4.2, 4.3, 4.4, 4.6, and 4.7 of Ch. 4.

Develop a 12- to 15-slide, approximately 10-minute business action plan presentation.

No Speaker Notes necessary.

Make the presentation to the virtual class.

Base your slides on the following bullets:

  • Identify your business idea and your product or service. Include details about your product or service and the customer experience that you want to provide for your customers.
  • Choose your industry. Briefly, identify market size and trends, strengths and weaknesses of competitors, and your customers and their needs.
  • Identify your perceived competitive advantages, including any unique benefits, and any limitations of your product or service.
  • Identify funding needs. Determine why funding is needed and which sources of funding to consider. Consider self-funding, borrowing, equity, venture capital, etc.
  • Determine the feasibility of your business idea. Identify if you need more information to determine feasibility and what additional resources and support you need, such as help from attorneys, accountants, and other business advisers.
  • Develop a timeline for your business and business planning. Include major tasks or milestones that must be accomplished. Assume that you determined your business idea is feasible for the purposes of this step in the assignment.

Remember to include a Cover Slide and a Reference Slide.

Create a 5-slide presentation to the leadership team of Washburn Guitars that details the following: 

Scenario

The modern Washburn Guitars Company started in 1977 when a small Chicago firm bought the century-old Washburn brand name and a small inventory of guitars, parts, and promotional supplies. At that time, annual company sales of about 2,500 guitars generated revenues of $300,000.

“Our designs are translated by Japan’s most experienced craftsmen, assuring the consistent quality and craftsmanship for which they are known. At that time, the American guitar-making craft was at an all-time low. Guitars made by Japanese firms, such as Ibanez and Yamaha, were in use by an increasing number of professionals.”

“We offer a guitar at every price point for every skill level,” explains Kevin Lello, vice president of marketing at Washburn Guitars. Washburn is one of the most prestigious guitar manufacturers in the world, offering instruments that range from one-of-a-kind, custom-made acoustic and electric guitars and basses to less-expensive, mass-produced guitars.

Lello has responsibility for marketing Washburn’s products and ensuring that the price of each product matches the company’s objectives related to sales, profit, and market share. “We do pay attention to break-even points,” adds Lello. “We need to know exactly how much a guitar costs us, and how much the overhead is for each guitar.”

Instructions

With Lello’s statements in mind, access the Learn: Washburn Guitars Pricing Decisions and Diversity activity in this week’s Learning Activities folder and watch the video describing how Washburn prices its guitars and how it uses the pricing variable as a strategic tool for positioning its various guitars in the marketplace.

Create a 5-slide presentation to the leadership team of Washburn Guitars that details the following:

  • Explain how elastic demand could influence sales. Include an example.
  • Determine how producing signature series guitars may affect demand for the product, as well as brand awareness and brand loyalty.
  • Provide an example of break-even quantity.
  • Recommend guidelines for selecting a diverse team of 5 employees to travel to Japan to meet with guitar craftspeople. Refer to the “Diversity and Inclusion Drive Success for Today’s Leaders” article from the University Library to guide your answer.

Submit your assignment.

Analyze and interpret perceptual elements of visual media communication to identify effective visual messages.

Competency

Analyze and interpret perceptual elements of visual media communication to identify effective visual messages.

Scenario

You have been hired by a large law enforcement agency to analyze the images used on advertising billboards in both urban and suburban regions. The billboards visually display a new campaign message to improve neighborhood safety.

During your analysis, you find that the images used on billboards in the urban areas are exactly the same as the images used in the suburban areas. Both images show parents happily talking with law enforcement officers while children run over green lawns having a fun balloon fight. You decide that these images are not sending proper perceptual messages. You decide to create a visual analysis video for the law enforcement agency to share with the administration

For the video visual analysis, you realize you will need to find two new images that are quite different from one another. One image will be used on the urban billboard, and the other image will be used on the suburban billboard. In your video presentation, you will compare and contrast how each image utilizes the following:

  1. Compare and contrast the visual elements of cultural familiarity. Explain why it is important to use culturally familiar visuals that are quite different in the urban and suburban billboard images. Include specific visuals in your visual analysis.
  2. Identify specific visual examples of the following cognitive elements: memories, experiences, and expectation. Compare and contrast how urban and suburban viewers may be affected differently by those specific cognitive visual elements.
  3. Explain the difference between urban and suburban viewers’ emotionally engagement with each of the billboard images.
  4. Identify visual semiotic codes in both images: metonymic, analogical, displaced, and condensed. Discuss the importance of using these codes. Include specific visuals in each part of your visual analysis.

As you outline your ideas for the video, you decide to record your verbal analysis while analyzing the two visuals in less than seven minutes for added clarity.

Prepare and evaluate the use of media visuals to improve persuasive and marketing communication.

Competency

Prepare and evaluate the use of media visuals to improve persuasive and marketing communication.

Scenario

You are a visual communication expert for a company that creates and maintains websites for large businesses and organizations. They called a meeting a few days ago to bring various departments together for a “think tank” session. The goal of this session was to update the images and visual elements on the website of your newest client: a large medical facility’s website. Currently, they are using the same website images across all websites in the following American locations: New York City, Miami, Phoenix, and Denver.

As the meeting progressed, several people posed several situational conversations. You took careful notes during the meeting, and as you review them at home, you decide to create a video to address all the issues discussed.

In less than seven minutes, your video will outline the importance of using cultural familiarity, perspective framing, and emotional appeal in order to visually persuade viewers in all of these different locations. For clarity, you decide to include specific visual images and examples that could replace current website images for each situation. During the video, you plan to include audio explanations to prove your points to the other “think tank” members.

You review the situational conversation notes:

  1. Carol asks: “Why can’t we just use the same images that are already being used for all the different locations? All the images of the medical staff look American enough.”
  2. Daniel states: “Let’s use images of families in all of the images that scroll through the main website page. That will catch everyone’s eye-everyone has a family somewhere.”
  3. Caleb questions: “The pictures we use should all be outdoors and of people having fun. Isn’t that what all patients want to see when they visit the medical facilities website?”
  4. Heather states: “Maybe we should think like the potential patients that might visit this website. What would those patients want to see regarding this facility?”
  5. Samuel asks: “How can we use images to get people to feel like they will get better, or experience a miracle, or receive better treatment here than at some other facility?”

Create a 1-page list of five to seven challenges that IT leaders and IT organizations currently face. Identify challenges from your organization or one you are familiar with. Include a brief 1- to 2-sentence description of each challenge.

Consider the challenges that IT leaders and IT organizations are facing today as they work to keep the pace of IT evolution, drive business value through innovation, and be effective leaders.

Create a 1-page list of five to seven challenges that IT leaders and IT organizations currently face. Identify challenges from your organization or one you are familiar with. Include a brief 1- to 2-sentence description of each challenge.

Pick two to three challenges from your list to address through new technologies.

Research technologies that would assist in overcoming each challenge.

Prepare an 8- to 10-slide voice-over or media-rich presentation, including the following:

  • Describe how each selected challenge is addressed through a new technology.
  • Evaluate how the new technology will influence organizational change and innovation.

Create a program identified to address the opioid crisis in the local community and describe in detail. What is the The goal of the program.

create a program identified to address the opioid crisis in the local community and describe in detail. What is the The goal of the program.
Name Three objectives for the program to be presented and are specific, measurable, attainable, relevant/realistic and time bound (SMART format). Program interventions directly relate to the objectives and goals of the program. create An evaluation plan that includes data to be collected and based upon the objectives is outlined. Name Three potential challenges have been identified and community engagement is discussed in detail. Resources (financial and other) needed to implement the program have been addressed in detail.

what is the role of the public health nurse as a community advocate, leader, and change agent is detailed

Business Critical Thinking Powerpoint

Learning Objectives

  • Examine the process involved with problem formulation.
  • Apply critical thinking to problem identification.
  • Apply decision-making techniques.
  • Determine factors affecting decision implementation.
  • Evaluate resources and actions required for implementation.
  • Evaluate ethical implications of a decision.
  • Evaluate decision-making outcomes and processes.

Prompt

Examine a business issue of your choosing that has ethical implications.

  • For example, research the arguments (both for and against) regarding advertising to children, paying a living wage, requiring union membership, or selling tobacco.

Research and present the leading opinions and comment on the validity of the arguments. Which side is more compelling? Why?

Instructions

  • Develop a 10 to 15 slide PowerPoint presentation
  • Include detailed speaker notes for each slide
  • Support your presentation with a minimum of 3 credible academic references.

Term Paper: Security Regulation Compliance

 This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security. As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance.  Thus, as a Chief Information Officer in a government agency, you realize the need to educate for senior leadership on some of the primary regulatory requirements, and you realize the need to ensure that the employees in the agency are aware of these regulatory requirements as well. Section 1: Written Paper1.  Write a six to eight (6-8) page paper in which you:

a.  Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including:

i.  FISMA
ii.  Sarbanes-Oxley Act
iii.  Gramm-Leach-Bliley Act
iv.  PCI DSS
v.  HIPAA
vi.  Intellectual Property Law

b.  Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.c.  Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements.d.  Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your written paper must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.

Section 2: PowerPoint Presentation2.  Create an eight to ten (8-10) slide security awareness PowerPoint presentation that will be presented to the agency’s employees, in which you:

a.  Include an overview of regulatory requirements and employee responsibilities, covering:

i.  FISMA
ii.  Sarbanes-Oxley Act
iii.  Gramm-Leach-Bliley Act
iv.  PCI DSS
v.  HIPAA
vi.  Intellectual Property Law

Your PowerPoint presentation must follow these formatting requirements:

  • Include a title slide, six to eight (6-8) main body slides, and a conclusion slide.

The specific course learning outcomes associated with this assignment are:

  • Explain the concept of privacy and its legal protections.
  • Describe legal compliance laws addressing public and private institutions.
  • Analyze intellectual property laws.
  • Examine the principles requiring governance of information within organizations.
  • Use technology and information resources to research legal issues in information security.
  • Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Assignment 3b: Analysis on the Threats Defense Argument

The information you provided in your PowerPoint presentation on Threats to the Global Environment has led to productive debates at the United Nations General Assembly! Hence, they are now asking you to create an additional analysis report to respond to the issues raised in these debates.

Your fourth project as a consultant for the United Nations is to develop a report that addresses the issues raised by some of the member states of the United Nations.

Step I. Consider the Issues

In Assignment 3a, you were asked to create a PowerPoint identifying the four most critical threats out of eight threats provided in the table below.

Energy sources

Civil war

Globalization

Poor health of entire populations

Lack of educational opportunities

Cultural taboos

Inappropriate uses of technology

Climate change

There are four remaining threats that you did not discuss in your PowerPoint. This assignment will focus on two of those four. Here are the specific tasks you will complete:

  • Review the remaining four threats that you did not use in Assignment 3a.
  • Pick two of the four to focus on in Assignment 3b.
  • Identify the reasons why you think these two threats are less critical than the four threats you chose for your PowerPoint presentation.

Step II. Prepare Your Report

The UN has given you the following guidelines.

Introduction

Briefly introduce the topic of the analysis (about 100-150 words).

  1. State the topic and intent of the paper.
  2. Identify the two threats you will discuss in the paper in the order in which they appear in the paper.

Section I. Threat 1

  1. Write an opening statement describing the perception of the threat.
  2. Write one page giving three reasons that explain why you saw this threat as less critical than the four you chose for your presentation in Assignment 3a.
  3. Support these reasons with at least three credible sources.

Section II. Threat 2

  1. Write an opening statement describing the perception of the threat.
  2. Write one page giving three reasons to explain why you saw this threat as less critical than the four you chose for your presentation in Assignment 3a.
  3. Support these reasons with at least three credible sources.

Conclusion

  • Offer a summary (one page or less) of your defense of your choices that the United Nations can use to address their prioritization concerns.

Formatting Requirements

  • Your paper may consist of up to four pages (not including the cover or reference pages).
  • Create headings for each section of your paper as follows:
    • Introduction
    • Threat 1 (include the name of your chosen threat)
    • Threat 2 (include the name of your chosen threat)
    • Conclusion
  • Use and cite four to six credible sources in your analysis. You may use the same source for more than one threat as long as you use a minimum of four different sources. A list of potential resources is available at the end of this course guide.
  • Make sure your paper contains both in-text citations and a source list, per SWS guidelines; refer to the Strayer Writing Standards (SWS) document for reference.
  • Include a cover page with your name, the date you submitted the paper, and your instructor’s name.