Identify and evaluate strategies for crisis management

Assignment Help Computer Network Security
Reference no: EM13983636 , Length: 6

Activity: Assess the Role of Information Technology in Crisis Management

Activity Description

In a paper, identify and evaluate strategies for crisis management. Your paper should focus on the information technology perspective in terms of crisis management. Your paper should include answers to the following questions:

What is technology's role in managing a crisis situation? Does it change depending upon the crisis?

Should a manager within the information technology team be in charge of the crisis? Why or why not? What plans and procedures should be in place regarding information technology in times of crisis?

How can organizations ensure the crisis plan will be effective BEFORE a crisis actually occurs? What does the current research say about the role of information technology in a crisis?

Support your paper with a minimum of five recent (within the past five years) scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.

Length: 5-7 pages not including titles and reference pages

Resources

Books Reference

Coombs, W. T. (2008) PSI handbook of business security: Securing the enterprise.

Coombs, W. T. (2008) PSI handbook of business security: Securing the enterprise.

Articles Reference

Beebe, N., & Rao, V. (2010). Improving organizational information security strategy via Meso-level application of situational crime prevention to the risk management process.

Moskowitz, H., Drnevich, P., Ersoy, O., Altinkemer, K., & Chaturvedi, A. (2011, May). Using real-time decision tools to improve distributed decision-making capabilities in high-magnitude crisis situations.

Verified Expert

Reference no: EM13983636

Questions Cloud

The monthly household survey of unemployment : The monthly "household survey" of unemployment conducted for the Bureau of Labor Statistics of the U.S. Department of Labor for  is discussed athttp://www.bls.gov/news.release/empsit.nr0.htm.
The annual ytm on a bond-equivalent basis is approximately : Consider the following information on a bond for the next 2 problems: Coupon rate = 11% Maturity = 18 years Par value = $1,000. The annual YTM on a bond-equivalent basis is approximately.
Discuss between validity and reliability : Discuss between validity and reliability. Why does this issue matter? Think about this: Can research be valid, but not reliable? Can research be reliable, but not valid? Does this matter in your study? The word count has to be no less than 200 words.
What is the current through voltage across : What is the current through, voltage across, and power dissapated in R2? What is the current through, voltage across, and power dissapated in R3?
Identify and evaluate strategies for crisis management : Identify and evaluate strategies for crisis management. Your paper should focus on the information technology perspective in terms of crisis management.
What is the estimated monthly contribution margin per cable : What is the estimated monthly contribution margin per cable subscriber for CableVision in 2016? What are the estimated total monthly fixed costs for CableVision in 2016. What is CableVision's estimated monthly operating income in 2016 if 18,000 resid..
Difference between financial income and taxable income : In accounting for a pension plan, any difference between the pension cost charged to expense and the payments into the fund should be reported as
What is the equivalent resistance of the circuit : What is the equivalent resistance of this circuit? What is current and voltage across R1? What is current and voltage across R2? What is current and voltage across R3?
What is the total capacitance of this circuit : What is the total capacitance of this circuit? What is the total resistance of this circuit? What is the time constant for this circuit? What is the charge at time 0.541 s, when the capacitor is charging up?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd