Maintain an online reflective blog

Assignment Help Computer Network Security
Reference no: EM13923261

Part -1:

Assessment task

In this assessment item, you are required to maintain an online reflective blog/journal and write blog posts/entries based on academic articles. For writing each blog post, you will select one of the listed articles from the Additional Readings sectionof every week in the Moodle site.You will write a reflective blog post after reading how the article has helped you to learn the week's topic.Ensure that you write the blog post based on the correct article i.e. if you are writing Blog post 1(Business Process Architecture), then refer to the Additional Readings section of week 4 to choose an article since Business Process Architecture is covered in week 4. To find anarticle for Blog post 2, refer to the Additional Readings section of week 6 and so forth.

Please label the blog posts correctly i.e. provide the correct title. For example- the first blog post should be labelled "Blog post 1: Business Process Architecture", the second one should be "Blog post 2: Business Process Management" and so forth.

Blog format

In your reflective blog post, you should demonstrate an ability to reflect on and learn from established practices in the nominated article and the weekly course topic. You will write your blog post in the format as described below.
• Synopsis - this is a summary of the content of the article (should be objective);
• Critique - how well you think the author or authors address the article topic (should be objective);
• Your reflection - how you think the article has assisted you in understanding the weekly course topic (can be subjective as you are discussing your own learning).

It is advisable to structure your blog post in three paragraphs: Synopsis, Critique and Reflection.Do not create headings and subheadings as distinct paragraphs will suffice.

Note: You need to use correct Harvard reference citations for each blog to support your critique even though you are only referring to one paper.The blog post should be free from typographical, spelling and grammatical errors.

You can complete your blog posts before the due dates but feedback will not be released until 2 weeks after the due date of each blog. No comment on your work will be posted on your blog for viewing by the general public.

Instructions for creating and registering your blog

A blog (or weblog) is a website where entries are made in reverse chronological order. It is perhaps the simplest and one of the most popular ways of producing a website. For more information about blogs, see the Wikipedia page for ‘blog' or follow this link to see a video about blogs.

You will be using Mahara to create your blog. After creating the blog/journal and blog posts/entries in Mahara, you will subsequently need to create a Mahara page, embed the journal in it and create a secret URL. Steps for all of these can be found in the course website on Moodle.

After following all the steps and completing your blog post, submitthe Secret URL by pasting it into Moodle for marking and feedback.

Part -2:Assessment task

You are to conduct a research of the Internet on the topics as listed at the top of this assessment detail. You should review the items you find around the specified topic and select a minimum of 5 items for each week and link them to your portfolio.So to start with, you need to create a portfolio on Mahara with 4 pages(i.e. 1 page for each of the above weekly topic) and then each page should have 5 items with a justification for each item.

The items you may include in the portfolio could be YouTube videos, clips from lectures and/or tutorials, relevant websites and your own work that you produce in the tutorials. Your portfolio should capture rich ideas, resources and innovative practice around business process management within the frame of the four topics listed above.

In the justification, you are to write a brief discussion as to why you chose the items you did, and why you thought the items chosen are appropriate. Your justification for each item should be around 100 words (100 words for each item * 5 items = 500 words on each page).

You are not to upload files from the Internet, as you do not own copyright, and if you do upload the files, this will be plagiarism. You are to use links to your items only.

Harvard referencing format and citations are to be used to substantiate your discussion.

Reference no: EM13923261

Questions Cloud

Independent variables and longevity : Using the SPSS, calculate a simultaneous multiple regression with SES, age, and optimism as the independent variables and longevity as the dependent variable.
Organizational structure-culture-power and politics : Q1. - Analyze the influence of organizational structure on behavior. Q2. - Analyze the influence of organizational culture on behavior. Q3. - Analyze the influence of power and politics on behavior.
Discuss the concept of emotional intelligence : Question 1: Do you see a value in the use of the Myers-Briggs Type Indicator (MBTI) as a means of increasing employee self-awareness? Justify your position with support from the text and/or additional academic sources. Question 2: Discuss the conc..
Frequency tables and bar charts for the nominal variables : Generate frequency tables and bar charts for the nominal variables. Generate and interpret descriptive statistics of central tendency, variability, skewness, and kurtosis for the continuous (scale) variables.
Maintain an online reflective blog : Maintain an online reflective blog/journal and write blog posts/entries based on academic articles and conduct a research of the Internet on the topics as listed at the top of this assessment detail.
Problem regarding the importance of business research : Q1. - Why must business managers understand the importance of business research and how it is used in their organizations?
Workplace stress and aggression-interpersonal communications : Analyze the stressors employees might experience as a result of the underperforming economy and current retraction of business, and make at least three recommendations for how almost any leader or manager could help mitigate those stressors. Provi..
Write an expression that represents cost of admission prices : Write an expression that represents the cost of the admission prices and the concession stand items based on the available information. Letdrepresent the cost for a large drink and letprepresent the cost of the popcorn.
Businesses in terms of employment law : Why are small businesses treated differently than large businesses in terms of employment law?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analyze the header files of spams

Analyze the header files of spams. The file 199803.zip is a collection of spams received by someone during 1998 March (http://untroubled.org/spam/, other spam archives could be found at:http://spamlinks.net/filter-archives.htm, etc.).

  After the 911 attacks there has been an increased demand

after the 911 attacks there has been an increased demand for private security services. post to the discussion board

  Calculate the crc or fcs for the sender

The pattern or generator is P 1001. Calculate the CRC or FCS for the sender. You must give the details of this calculation.

  Identify a successful three-way handshake?

Identify a successful three-way handshake?

  Explain simple issue specific security policy in school

Rrules and regulations you have been provided with in your institution.does your school have a similar policy?does it contain all the elements listed in the text?

  Explain the nature of security assessments is changing

The motivation for security reviews and assessments is changing and, consequently, the nature of security assessments is changing. The practice of risk analysis is relatively less developed in the field of homeland security than in other areas

  Discuss ways to reduce risk in the network

Discuss 2 ways to reduce risk in the network. Who do you think is responsible for keeping the network safe to the administrator, the users, or both? Why

  How http and smtp figure into organizational security

Users are familiar with some network services like HTTP (Hypertext Transport Protocol) - the Web; and SMTP. Tell us more about these services. How do they figure into organizational security? Elaborate with specifics.

  Mandatory access control and discretionary access control

Explain in your own words the elements of the following methods of access control: Mandatory access control (MAC), Discretionary access control (DAC) and Role-based access control (RBAC)

  Reviews of the article- what is the big deal about security

Reviews of the given Article- "What's the Big Deal about Security".

  Use a two-stage transposition technique to encrypt

Use a two-stage transposition technique to encrypt the following message using the key "Decrypt". Ignore the comma and the period in the message

  A business wants to share its customer account database

a business wants to share its customer account database with its trading partners and customers while at the same time

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd