Reference no: EM13905413
Week 2 and Week 3 – Reflective Activity Instructions (word length – 1 page for each question)
If possible, choose Miami Dade Public Schools in United States as your organization.*****
1-) Describe the security that your organization uses to protect information. How many resources are dedicated to information security? Who is responsible for the overall security strategy? Has the strategy been successful? Is the strategy adequate for the risk? Has the environment been challenged in some way? Why or why not? Submit your work on your own Word document.
2-) Describe an example of an ERP, CRM or re-engineering activity in your organization within the last 2 years.
• What motivated this initiative?
• Has it been successful?
• What are the metrics used to measure the outcome?
• What challenges did the organization face in the implementation?
• How has the system changed since the original system?
• Why has it changed?
3-) Describe an effort that you organization has undertaken to invest in technology.
· How was the decision made?
· Who was involved in the decision making?
· Has the decision paid off the results that were forecasted?
· How is the system’s impact on the organization and business being measured?
Discuss the concept of perceived value
: Discuss the concept of perceived value and its importance to consumer behaviour and marketing. Discuss the theory and then give practical examples of how customers perceive various brands and how this impacts on their behaviour.
|
Explain your rankings of the most offensive
: Explain your rankings of the “most offensive” and the “least offensive” characters in the Alligator River Story. State in 1 paragraph each why you rated the 5 persons to be “most” and “least” offensive in the story.
|
The design and organization of our team
: The Design and Organization of Our Team.” It must include a code of conduct created by your team and to be used to guide all of its members.
|
Analysis what does the passage say
: This passage is unique and introduces the main theme of this Gospel: Jesus is the Word made flesh. He is God, He has always been and, therefore, was never created. John begins this passage with the statement "In the beginning".
|
Describe the security that your organization
: Describe the security that your organization uses to protect information. How many resources are dedicated to information security? Who is responsible for the overall security strategy? Has the strategy been successful.
|
Related to future homeland security policy
: credible recommendation related to future Homeland Security policy. The recommendation should be part of the conclusion.
|
How do international privacy laws differ
: How do international privacy laws differ from U.S. privacy laws? How could a U.S. business conduct normal business activities with the differences? Cite specific examples and compare to the U.S. standards.
|
What decision options does beth israel deacones
: In your opinion, what decision options does Beth Israel Deaconess have in the case situation?What criteria is important to making this decision?
|
Should central bank bail out failing financial institutions
: Should Central Bank bail out failing Financial Institutions and Banks which operate and risk investor’s funds? Are we permitting “Privatization of Profits and Socialization of losses?”Identify the lessons learned from the prior global banking crisis?..
|