Identify and evaluate strategies for crisis management

Assignment Help Computer Network Security
Reference no: EM13983636 , Length: 6

Activity: Assess the Role of Information Technology in Crisis Management

Activity Description

In a paper, identify and evaluate strategies for crisis management. Your paper should focus on the information technology perspective in terms of crisis management. Your paper should include answers to the following questions:

What is technology's role in managing a crisis situation? Does it change depending upon the crisis?

Should a manager within the information technology team be in charge of the crisis? Why or why not? What plans and procedures should be in place regarding information technology in times of crisis?

How can organizations ensure the crisis plan will be effective BEFORE a crisis actually occurs? What does the current research say about the role of information technology in a crisis?

Support your paper with a minimum of five recent (within the past five years) scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.

Length: 5-7 pages not including titles and reference pages

Resources

Books Reference

Coombs, W. T. (2008) PSI handbook of business security: Securing the enterprise.

Coombs, W. T. (2008) PSI handbook of business security: Securing the enterprise.

Articles Reference

Beebe, N., & Rao, V. (2010). Improving organizational information security strategy via Meso-level application of situational crime prevention to the risk management process.

Moskowitz, H., Drnevich, P., Ersoy, O., Altinkemer, K., & Chaturvedi, A. (2011, May). Using real-time decision tools to improve distributed decision-making capabilities in high-magnitude crisis situations.

Verified Expert

Reference no: EM13983636

Questions Cloud

The monthly household survey of unemployment : The monthly "household survey" of unemployment conducted for the Bureau of Labor Statistics of the U.S. Department of Labor for  is discussed athttp://www.bls.gov/news.release/empsit.nr0.htm.
The annual ytm on a bond-equivalent basis is approximately : Consider the following information on a bond for the next 2 problems: Coupon rate = 11% Maturity = 18 years Par value = $1,000. The annual YTM on a bond-equivalent basis is approximately.
Discuss between validity and reliability : Discuss between validity and reliability. Why does this issue matter? Think about this: Can research be valid, but not reliable? Can research be reliable, but not valid? Does this matter in your study? The word count has to be no less than 200 words.
What is the current through voltage across : What is the current through, voltage across, and power dissapated in R2? What is the current through, voltage across, and power dissapated in R3?
Identify and evaluate strategies for crisis management : Identify and evaluate strategies for crisis management. Your paper should focus on the information technology perspective in terms of crisis management.
What is the estimated monthly contribution margin per cable : What is the estimated monthly contribution margin per cable subscriber for CableVision in 2016? What are the estimated total monthly fixed costs for CableVision in 2016. What is CableVision's estimated monthly operating income in 2016 if 18,000 resid..
Difference between financial income and taxable income : In accounting for a pension plan, any difference between the pension cost charged to expense and the payments into the fund should be reported as
What is the equivalent resistance of the circuit : What is the equivalent resistance of this circuit? What is current and voltage across R1? What is current and voltage across R2? What is current and voltage across R3?
What is the total capacitance of this circuit : What is the total capacitance of this circuit? What is the total resistance of this circuit? What is the time constant for this circuit? What is the charge at time 0.541 s, when the capacitor is charging up?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Prepare an initial security planning report

Overview: For this milestone, you will prepare an initial security planning report. This document will become the foundation for the final risk assessment and mitigation strategy.

  The 2 main types of communications media used for network

the 2 main types of communications media used for network connections are wired connections and wireless connections.

  Find the product cipher obtained by using the

1 if the two most common letters in a long ciphertext encrypted by an affine transformation c equiv ap b mod 26 are x

  Explain the nature of security assessments is changing

The motivation for security reviews and assessments is changing and, consequently, the nature of security assessments is changing. The practice of risk analysis is relatively less developed in the field of homeland security than in other areas

  What was the volume of digital evidence

Cybersecurity or Digital Forensics- Select a real world event related to Cybersecurity or Digital Forensics. What was the volume of digital evidence

  Create and describe a comprehensive security policy

Create and describe a comprehensive security policy for this data-collection and analysis company that will: Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA i..

  Solve using javascript to implement rsa

ECB2234 Assignment- Use JavaScript to implement RSA including Key generation Encryption. Decryption. Signing. Verifying.

  Describe ipsec provides security at the network layer

If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Traffic padding what is traffic padding and what is its

what is traffic padding and what is its purpose? plz give this que of answer

  Address of the router that computer

1. Your boss wants to know the address of the router that his computer is using. What do you tell him?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd