{"id":22816,"date":"2024-04-25T19:44:52","date_gmt":"2024-04-25T19:44:52","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/you-will-review-four-case-studies-then-in-a-powerpoint-presentation-you-will-evaluate-the-studies-and-address-each-of-the-requirements-listed-below-using-both-critical-thinking-and-theory\/"},"modified":"2024-04-25T19:44:52","modified_gmt":"2024-04-25T19:44:52","slug":"you-will-review-four-case-studies-then-in-a-powerpoint-presentation-you-will-evaluate-the-studies-and-address-each-of-the-requirements-listed-below-using-both-critical-thinking-and-theory","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/you-will-review-four-case-studies-then-in-a-powerpoint-presentation-you-will-evaluate-the-studies-and-address-each-of-the-requirements-listed-below-using-both-critical-thinking-and-theory\/","title":{"rendered":"you will review four case studies. Then, in a PowerPoint presentation, you will evaluate the studies and address each of the requirements listed below, using both critical thinking and theory"},"content":{"rendered":"<div style=\"cursor: auto;\">\n<h2 style=\"margin-right: 0px; margin-bottom: 0.875rem; margin-left: 0px; font-size: 1.125rem; line-height: 1.4; cursor: auto; color: rgb(205, 205, 205);\">Assignment Content<\/h2>\n<\/div>\n<section style=\"cursor: auto;\" aria-labelledby=\"\">\n<ol style=\"font-size: 0.875rem; line-height: 1.6; cursor: auto;\">\n<li style=\"margin: 0px 0px 1.25rem; cursor: auto;\">\n<div style=\"cursor: auto;\">\n<div style=\"cursor: auto;\">\n<div style=\"cursor: auto;\">\n<div style=\"line-height: inherit; cursor: auto;\">\n<div style=\"line-height: inherit; cursor: auto;\">\n<div style=\"margin: 0px 0px 0.9375rem; font-size: 0.875rem; line-height: inherit; cursor: auto;\">\n<div style=\"line-height: inherit; cursor: auto;\" data-gramm=\"false\">\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\">It is important to understand what information systems are and why they are essential for running and managing a business. The case studies below will provide you with an opportunity to review many of the concepts covered in this course. These case studies provide you with an opportunity to critically analyze events that are taking place in real-life organizations. This helps to develop your critical thinking and research skills as you research each of these scenarios.&nbsp;<\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\"><br style=\"line-height: inherit; cursor: auto;\"><\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\">For this assignment, you will review four case studies. Then, in a PowerPoint presentation, you will evaluate the studies and address each of the requirements listed below, using both critical thinking and theory as well as supporting documentation.<\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\"><br style=\"line-height: inherit; cursor: auto;\"><\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\">Review and analyze the Chapter 1 Case Study \u201cWill the Coronavirus Pandemic Make Working from Home the New Normal?\u201d&nbsp;<\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\">and address the following in a minimum of four slides:<\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\"><br style=\"line-height: inherit; cursor: auto;\"><\/p>\n<ul style=\"padding: 0px 3rem 0px 1.5rem; font-size: 0.875rem; line-height: inherit; cursor: auto;\">\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto;\">Define the problem described in this case. What are the management, organization, and technology issues raised by this problem?<\/li>\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto;\">Identify the information technologies used to provide a solution to this problem. Was this a successful solution? Why, or why not?<\/li>\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto;\">Will working from home become the dominant way of working in the future? Why, or why not?<\/li>\n<\/ul>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\"><br style=\"line-height: inherit; cursor: auto;\"><\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\">Review and analyze the Chapter 2 Case Study \u201cIs Social Business Good Business?\u201d and address the following in a minimum of four slides:<\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\"><br style=\"line-height: inherit; cursor: auto;\"><\/p>\n<ul style=\"padding: 0px 3rem 0px 1.5rem; font-size: 0.875rem; line-height: inherit; cursor: auto;\">\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto;\">Identify the management, organization, and technology factors affecting adoption of internal corporate social networks.<\/li>\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto;\">Compare the experiences implementing internal social networks of the organizations described in this case. Why was Standard Bank successful? What role did management play in this process?<\/li>\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto;\">Should all companies implement internal enterprise social networks? Why, or why not?<\/li>\n<\/ul>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\"><br style=\"line-height: inherit; cursor: auto;\"><\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\">Review and analyze the Chapter 8 Case Study \u201cIs the Equifax Hack the Worst Ever\u2014and Why?\u201d and address the following in a minimum of four slides:&nbsp;<\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\"><br style=\"line-height: inherit; cursor: auto;\"><\/p>\n<ul style=\"padding: 0px 3rem 0px 1.5rem; font-size: 0.875rem; line-height: inherit; cursor: auto;\">\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto;\">Identify and discuss the security and control issues that resulted from flaws in Equifax security and control.&nbsp;<\/li>\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto;\">What management, organization, and technology factors contributed to these problems?<\/li>\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto;\">Discuss the impact of the Equifax hack.<\/li>\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto;\">How can future data breaches like this one be prevented? Explain your answer.<\/li>\n<\/ul>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\"><br style=\"line-height: inherit; cursor: auto;\"><\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\">Finally, review the case study \u201cCapital One: A Big Bank Heist from the Cloud\u201d from Chapter 8, and address the prompts below in at least four slides.<\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\"><br style=\"line-height: inherit; cursor: auto;\"><\/p>\n<ul style=\"padding: 0px 3rem 0px 1.5rem; font-size: 0.875rem; line-height: inherit; cursor: auto;\">\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto;\">Discuss at least two security threats to cloud data.<\/li>\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto;\">What should companies do to protect cloud data?<\/li>\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto;\">Discuss why both the company and the cloud vendor are responsible for security.<\/li>\n<li style=\"padding: 0px 0px 0px 1.5em; line-height: inherit; cursor: auto;\">Discuss at least one security control that companies can use to increase security.<\/li>\n<\/ul>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\"><br style=\"line-height: inherit; cursor: auto;\"><\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\">In formatting your PowerPoint presentation, do not use the question-and-answer format; instead, use bullets, graphs, and\/or charts in your slides to identify important points, and then discuss those points in the speaker notes of each slide. The speaker notes section of each slide should not repeat slide information, but serve as an area in which you augment or elaborate on slide information so that your audience has a better understanding of the material. You must have a minimum of 100 words in the Speaker Notes section of each content slide.<\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\"><br style=\"line-height: inherit; cursor: auto;\"><\/p>\n<p style=\"font-size: 0.875rem; line-height: inherit; cursor: auto;\">Your PowerPoint presentation should be a minimum of 15 slides in length (not counting the title and reference slides). You are required to use a minimum of two peer-reviewed, academic sources that are no more than 5 years old to support each case study. You may use your eTextbook once in each case study. All sources used, including the eTextbook, must be referenced; all paraphrased material must have accompanying in-text citations. At least two sources must come from the CSU Online Library. APA style and formatting is required.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/li>\n<\/ol>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Assignment Content It is important to understand what information systems are and why they are essential for running and managing a business. The case studies below will provide you with an opportunity to review many of the concepts covered in this course. These case studies provide you with an opportunity to critically analyze events that [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[9],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/22816"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=22816"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/22816\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=22816"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=22816"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=22816"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=22816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}