Get help from the best in academic writing.

In Unit 3, you read about “Curiosity Collections” which were, in fact, the earliest museums. In this assignment we

In Unit 3, you read about “Curiosity Collections” which were, in fact, the earliest museums. In this assignment we are going to create a virtual “curiosity collection” by submitting “artifacts” (images) to the Curiosity Collection Discussion Board. Imagine that we, as a class, are creating a “Liberal Studies Museum.” The purpose of this collection is to educate others about the meaning and/or value of a liberal education. In short, our task is to help the public become interested in “new ways of seeing.” The museum curator has asked that we consider the following questions when deciding what objects to submit to the collection:

How would you describe your experiences as a liberal studies student?
What about being a liberal studies student is particularly meaningful to you?
What type of physical object might effectively translate your experience as a liberal studies student into a sensory experience that can help others understand what it means to pursue a broad education.

Keep in mind the range of what we have covered thus far in this course (educational history, disciplinary history, qualitative and quantitative analysis, 20th century literary/linguistic/philosophical theory, etc.) How would you contextualize the object to give it meaning for those unfamiliar with this type of education?

Part 1: Compiling the Collection–Due SATURDAY

Every person in the class is responsible for contributing ONE object to our virtual museum using the Curiosity Collection discussion board. When choosing an object to contribute, keep the following in mind:

Think about the terms of this assignment as described above.

Make sure that someone else hasn’t already used your idea since there shouldn’t be two of the same object in the collection (that does not mean that we can’t have more than one painting or song or sculpture or photo–we just can’t have the same picture, song etc.)

Your chosen object can be anything tasteful and appropriate that you can imagine being displayed in a museum: a piece of art, a form of technology, a sound recording, or something you created yourself.

Using the answers to your questions above, you will post an image of your contribution (either from a picture you found on the internet or one you took yourself) and 2-4 sentences to describe and contextualize your choice. In other words, how does the item relate to or reflect Liberal Studies? (20 points)

How to get started:

First visit the “Curiosity Museum Collection” discussion board and see what is already in the collection.
Decide what you would like to contribute and find a good image on the internet (or take your own picture).
Post the image to the discussion board. Include 2-4 sentences to describe and contextualize how your image relates to or reflects Liberal Studies along with the image itself AND give your contribution a title (the subject line) before submitting it for all to see.

Assignment 3: Layers of Protection Analysis (LOPA)1 Assignment 3: Layers of Protection

Assignment 3: Layers of Protection Analysis (LOPA)1

Assignment 3: Layers of Protection Analysis (LOPA)

Your Name

School of Computer and Information Sciences, University of the Cumberlands

ISOL634 Physical Security

Dr. Name of your Instructor

Current Date

Table of Contents

What Could Happen? (Note: This H1 required) 4

Threat 1 from Outside (Note: H2 required with actual threat) 4

Threat 2 from Outside (Note: H2 required with actual threat) 4

Threat 3 from Outside (Note: H2 required with actual threat) 4

Threat n from Outside (optional) 4

Threat 1 from Inside (Note: H2 required with actual threat) 4

Threat 2 from Inside (Note: H2 required with actual threat) 4

Threat 3 from Inside (Note: H2 required with actual threat) 4

Threat n from Inside (optional) 4

Frequency of Potential Threats (Note: This H1 required) 5

Frequency of Threat 1 from Outside (Note: H2 required with actual threat) 5

Frequency of Threat 2 from Outside (Note: H2 required with actual threat) 5

Frequency of Threat 3 from Outside (Note: H2 required with actual threat) 5

Frequency of Threat n from Outside (optional) 5

Frequency of Threat 1 from Inside (Note: H2 required with actual threat) 5

Frequency of Threat 2 from Inside (Note: H2 required with actual threat) 5

Frequency of Threat 3 from Inside (Note: H2 required with actual threat) 5

Frequency of Threat n from Inside (optional) 5

How Effective are the Layers of Protection (Note: This H1 required) 6

Effectiveness of Layer 1 against Threats from Outside (Note: H2 required with actual layer) 6

Effectiveness of Layer 2 against Threats from Outside (Note: H2 required with actual layer) 6

Effectiveness of Layer 3 against Threats from Outside (Note: H2 required with actual layer) 6

Effectiveness of Layer n against Threats from Outside (Note: optional) 6

Effectiveness of Layer 1 against Threats from Inside (Note: H2 required with actual layer) 6

Effectiveness of Layer 2 against Threats from Inside (Note: H2 required with actual layer) 6

Effectiveness of Layer 3 against Threats from Inside (Note: H2 required with actual layer) 6

Effectiveness of Layer n against Threats from Inside (Note: optional) 6

How Tolerable are the Mitigation Layers (Note: This H1 required) 7

Outside Layers of Protection Tolerability (Note: H2 required with actual layer) 7

Inside Layers of Protection Tolerability (Note: H2 required with actual layer) 7

References 8

Your paper starts here with the first paragraph indented. Start by writing a brief description of your approach to completing the assignment. (Note: Each Heading should have at least 2 properly formatted paragraphs and each paragraph should have at least 3 properly formatted sentences. Also, please delete all the notes before submitting).

What Could Happen? (Note: This H1 required)

Start typing here.

Threat 1 from Outside (Note: H2 required with actual threat)

Start typing here.

Threat 2 from Outside (Note: H2 required with actual threat)

Start typing here.

Threat 3 from Outside (Note: H2 required with actual threat)

Start typing here.

Threat n from Outside (optional)

Start typing here.

Threat 1 from Inside (Note: H2 required with actual threat)

Start typing here.

Threat 2 from Inside (Note: H2 required with actual threat)

Start typing here.

Threat 3 from Inside (Note: H2 required with actual threat)

Start typing here.

Threat n from Inside (optional)

Start typing here.

Frequency of Potential Threats (Note: This H1 required)

Start typing here.

Frequency of Threat 1 from Outside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat 2 from Outside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat 3 from Outside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat n from Outside (optional)

Start typing here.

Frequency of Threat 1 from Inside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat 2 from Inside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat 3 from Inside (Note: H2 required with actual threat)

Start typing here.

Frequency of Threat n from Inside (optional)

Start typing here.

How Effective are the Layers of Protection (Note: This H1 required)

Start typing here.

Effectiveness of Layer 1 against Threats from Outside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer 2 against Threats from Outside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer 3 against Threats from Outside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer n against Threats from Outside (Note: optional)

Start typing here.

Effectiveness of Layer 1 against Threats from Inside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer 2 against Threats from Inside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer 3 against Threats from Inside (Note: H2 required with actual layer)

Start typing here.

Effectiveness of Layer n against Threats from Inside (Note: optional)

Start typing here.

How Tolerable are the Mitigation Layers (Note: This H1 required)

Start typing here.

Outside Layers of Protection Tolerability (Note: H2 required with actual layer)

Start typing here. (Note: each layer should be addressed)

Inside Layers of Protection Tolerability (Note: H2 required with actual layer)

Start typing here. (Note: each layer should be addressed)

References

There are no sources in the current document.

Top of Form Hide Assignment Information Instructions Lesson Plan Graded Project Your

In Unit 3, you read about “Curiosity Collections” which were, in fact, the earliest museums. In this assignment we Management Assignment Help Top of Form

Hide Assignment Information

Instructions

Lesson Plan Graded Project

Your project must be submitted as a Word document (.docx, .doc)*. Your project will be individually graded by your instructor and therefore will take up to a few weeks to grade.

Be sure that each of your files contains the following information:

Your name

Your student ID number

Your email address

Follow the instructions provided to complete your exam.

Be sure to keep a backup copy of any files you submit to the school!

Part 1: Weekly Lesson Plan

For Part 1 of this project, you must create a one-week lesson plan around a culturally diverse theme for a classroom of preschool children. Your lesson plan will incorporate the concept of multiculturalism into each of the core curriculum areas.

If you’re completing this assignment as a retake, you must decide on five new countries or cultures, and then plan all new activities in your work. You may not reuse any of the same countries or cultures or activities previously submitted as part of your Cultural Diversity graded assignments. Your work for this assignment must be original.

You’ll be submitting your project online, copy and paste the supplement Lesson Plan Template into a document file for your project. As you type your lesson plan into the template, the spaces will expand to fit your material.

Title Part 1 of your project “Lesson Plan.” Name your document file using your student information, like this: student number_exam number_last name_ first name.

When your lesson plan is complete, turn to Part 2.

Part 2: Detailed Activity Plan

Now that you’ve completed your weekly lesson plan, choose one of the days and provide a detailed activity plan worksheet for each activity that day. Use the Activity Plan Worksheet template located on your student portal or copy and use the one provided in this booklet. Complete a separate sheet for each activity.

Use every opportunity possible to include concepts about multiculturalism and diversity in your activities. For example, you might use your morning greeting to introduce the country of the day or the particular concept of diversity that you’ll highlight throughout your lessons, and your closing activities to prepare the students for the next day’s topics.

In addition, notice that lunch and snacks are included as part of the lesson plan. These are great opportunities for you and the children to experience culture and diversity, if you’ve planned well. The meals, snack, art, and language and literacy areas may also provide an opportunity for you to involve students’ parents in the classroom, as families share their own cultural past and particular artistic heritage.

You’ll be submitting your project online, download the supplement Activity Plan Worksheet and enter your responses electronically. Use one Activity Plan Worksheet per activity. As you type your lesson plan into the template, the spaces will expand to fit your material. 

Grading Criteria

Your project will be evaluated according to the following criteria:

Contents of your lesson plan

Effective incorporation of the multicultural theme into daily activities

Completeness of both the lesson plan and the activities plans

Choice of culturally diverse activities appropriate for the age group

Clarity of description and procedure

Correct spelling, punctuation, and grammar

Your instructor will use the following rubric to grade your project:

Cultural Diversity Lesson Plan

Grading Criteria

Exemplary

Proficient

Fair

Poor

Not Evident

Part One: Lesson plan was created around a culturally diverse theme that incorporates the concept of multiculturalism into each of the core curriculum areas

40

35

20

10

0

All activities are appropriate for preschool children

5

4

3

2

0

Part Two: Specific detail provided for one full day’s activities

50

45

30

15

0

Mechanics: Grammar, punctuation, and format

5

4

3

2

0

Assignment No. 6 ~ Technology Innovation for competitive advantage Revised: 6/29/2022 For

Assignment No. 6 ~ Technology Innovation for competitive advantage

Revised: 6/29/2022

For this assignment, use the business that you selected for Homework 1 — unless you clear a new selection with your facilitator in advance.

Good news! The business evolution that you proposed (from Module 1) was accepted!

Over the next two years, your organization needs to shift its business model and widen its technology exploitation in order to expand in its existing market, expand into new markets, facilitate new products and services, and reduce costs, using your business evolution as the beginning platform to do it from.

Your mission is to provide the CEO or CFO with technical recommendations on how to accomplish these goals and fulfill your business model evolution proposal.

Your assignment is to prepare a PowerPoint presentation for the CEO, CFO and the Board of Directors, describing a technology you believe should be adopted, describing the benefits, costs and risks of adoption, and recommending how to proceed. However, all work and ideas not your own should be clearly acknowledged in the PowerPoint notes in accordance with academic standards.

Use your own words and do research to back up your assertions! Your objective is to convince the committee to adopt your proposal.

Use the PowerPoint “Notes” section for comments that you would supply verbally at the presentation. Also use it for explanations to your facilitator.

Address (in order) the sections described below in approximately 15 PowerPoint slides with Notes sections. Typically, an average submission is about 12-13 slides with speaker notes. You may follow this with appendices if you wish.  Appendices will be read only as needed.  You need not address every point mentioned within each section – just those most significant for your organization and the technology, and which result in a clear, coherent overall presentation.   Give approximately equal space to the sections.

For 5 points of extra credit for this assignment, you can record yourself going through the presentation and upload it as well either separately or as part of the presentation. This must include video to achieve the 5 points of extra credit!

Hints:

This presentation is designed to convince your CEO, the CFO and the Board of Directors. The slides should steer a course between the extremes of wordiness (remember that you can talk to add content) and bare-bones meaninglessness (viewers need words with meaning). Vary bullet slides, figures, and tables to maintain attention.

You have limited space, so conciseness is important.

Organizational Background

This section of the presentation demonstrates to the CTO/CIO that you clearly understand your organization’s background enough to advocate the technology you propose. Emphasize the basis on which it competes with similar organizations (or for organizations where there is no relevant basis for competition, describe the organization’s mission).  Include mention of technology that your organization uses, but only to the extent that it is relevant or needed to understand this presentation. This will probably differ somewhat from assignment 1 in that it describes the background for the proposals you are making in this presentation: However, you are free to cut and paste from assignment 1 if you wish. The section in this week’s notes on SWOT may help too.

2. Technology Description

Re-cap your business model evolution and then identify and describe a technology (e.g., virtualization) that your organization should adopt, along with its key capabilities and characteristics.  The specifics of “how” the technology would be implemented are not required in this section. If it is to replace technology your organization currently uses, consider summarizing key technology differences.  Focus on the here on the essential technology description, as well as on the problems you expect that adoption would solve. Do not focus on these details about the technology (especially ones extracted from marketing materials).  Where possible, focus on the technology, rather than one particular product or supplier’s version. The section in this week’s notes on IT portfolio management may help for this and subsequent sections. In thinking about this, note the section in this week’s notes on “The Technology Hype Curve.”

Use and Benefits

In considering a technology, it is possible or even likely that you have a specific use in mind (e.g., for a specific project, or to solve a specific problem). However, keep in mind that a technology may be used for a variety of purposes, and that after its first use, others applications may present themselves.

Your task in this section is to be somewhat visionary, and imagine, where possible, a range of potential uses (in part, so that you can justify amortizing any one-time costs of adoption over multiple uses) and benefits, while still remaining pragmatic. Be clear about exactly how features of the technology support the benefits described. Recall the following.

Operational Uses and Benefits.  What are the most significant ways in which adoption of the technology could allow your organization to operate more effectively?  Consider both new opportunities, as well as ways in which existing problems and compliance requirements can be addressed.

Competitive Uses and Benefits. What are the most significant ways in which adoption of the technology could benefit the company’s competitive strategy (or for organizations where there is no relevant basis for competition, consider how adoption would support the organization’s mission)?  Consider new opportunities (e.g. ways of expanding or extending the company’s business model), as well as ways of addressing existing environmental (e.g. regulatory, economic) and competitive forces.

Hints:

For technologies whose benefits are primarily operational, there may be no competitive use or benefit that you can clearly articulate.  Don’t stretch to find competitive uses and benefits that are not clear.

Internal cost reductions, by themselves, are primarily an operational benefit rather than a competitive benefit, unless the cost reduction is intended to directly affect product or market positioning (e.g. by lowering prices in a market where cost is a primary basis of competition) or to provide the crucial additional revenues needed for specific competitive strategies.

Technologies that will be adopted for incorporation into products or services that your organization offers may primarily have competitive uses or benefits and may not have significant operational benefits for your organization.  Note that operational benefits refer to your organization, not to your customers.

4. Technology Analysis

Summarize the preliminary analysis you have done which convinced you that the technology is viable and appropriate for its intended uses in the intended timeframe, and to identify any additional analysis that will be needed as part of the adoption consideration process.   

Consider and address the specific points below to the extent that they serve this purpose.  The goal is not to necessarily address every point, but to include material and organize this section in a way that provides a clear, cohesive, and diligent analysis of the technology, and how it would fit into your organization’s technology infrastructure. Focus here on “what” the technology is, not necessarily “how” it will be implemented in the organization. You may find the section “IT Architecture Planning” – and, of course the section on “Technology Analysis” – in this week’s notes helpful for this part of the assignment.

Technology Maturity. 

Think about where the technology currently falls on the reality curve, where you think it will fall at the time you believe it should be adopted, and what that says about whether your organization should adopt it.  What successes and difficulties have been reported in both experimental and actual deployments, especially in situations similar to the uses you imagine?  How stable and mature are the companies developing and supplying the technology?

Technology Displacement and Disruption.  In what ways, to what degree, and how rapidly might this technology displace other existing technologies, especially ones your organization is currently using?  How might this affect whether and when your organization should adopt it? 

Technology Impacts.  Think about ways in which the technology would need to be integrated with your organization’s existing IT systems, and the associated costs and risks.  How might it result in new reliability, privacy, security and compliance challenges? How might adoption drive or limit other technology choices you expect to make in the future?  What other IT-based solutions or initiatives are needed to address these issues and ameliorate these risks?  (Note that initiatives or processes that would involve your organization more broadly are probably better discussed below under Addressing Operational and Competitive Impacts).

Technology Evolution.  Think about how the technology might evolve over the next five years and how this might affect its value for your organization, or your organization’s need to adopt it.  Might there be added costs or risks if your organization doesn’t have control over how it evolves?

Technology Alternatives.  Are there alternative technologies (other than the ones you are already using) that could be adopted for the uses you envision?  If so, how would they compare with respect to technology evolution and lifetime benefits, as well as costs, risks and benefits.  Why do you believe the technology you’ve chosen is the best alternative?  Note that if it’s not clear, there might be some additional evaluation needed during the adoption consideration process.

5. Operational and Competitive Risks

The purpose of this section is to describe the impact of adoption and the approaches needed to ensure that any related issues and risks are addressed successfully. 

Consider including the following.

The major issues and risks that will need to be addressed during integration and deployment of the technology (other than ones fully addressed in the Technology Analysis section above)

What it is about your organization or the technology that makes each of these issues or risks significant and critical (this ensures that you focus on real issues specific to your organization or the technology, not just general principles)

The operational processes, structures or approaches that will be needed to address these issues and risks successfully.  (These should be very specific to your organization and to the technology.  Note that purely IT-specific solutions and initiatives are probably better discussed above under Technology Analysis.)

In regard to issues and risks, consider the following.

The structure, management, business processes, staff and culture of your organization, and whether its capabilities are adequate for successful adoption, as well as any negative impacts that adoption might have.

The external relationships of the organization, and how they might be impacted by adoption.

Whether adoption might have any negative impact on the basis of competition in your segment (e.g. might adoption lead to commoditization) or on the success of your organization’s competitive strategy.

In regard to processes, structures and approaches needed for successful integration and deployment, consider the following.

relationships with technology suppliers

stakeholder involvement

change management

resource and capability management (including outsourcing)

pace and extent of deployment

management and governance structure and activities

6. Adoption Analysis Summary

The purpose of this section is to summarize the key reasons why you believe, on balance (considering costs, risks etc.), that the technology is seriously worth considering for adoption, and the reasons for the specific timeframe you are recommending. 

Consider and address the specific points below only to the extent that they serve this purpose.  The goal is not to necessarily address each and every point, but to include material and organize this section in a way that provides a clear, cohesive and compelling overall analysis that supports your recommendation.

Adoption Cost and Value.  What are the main sources of cost due to adoption, including some rough $ estimates?  What are the overall costs, and how would they be spread out?  What’s the ROI (or other basis for evaluating return), or more generally, how can the costs be justified relative to the perceived value of adoption?  You might think about quantifying the perceived value in terms of $’s, although this can be hard to estimate, especially when the benefits involve opportunities such as preparing for potential business model evolution or are part of a larger initiative.

Risks of Adoption.  What are the most significant risks of adopting the technology? What’s the likelihood of the various risks?  What kinds of effort should be put into ameliorating (vs. accepting) the various risks, and what are the associated costs? (Note that these may actually dominate other costs!)  What are the costs and other impacts if the risk scenarios actually occur?

Other Approaches.  For the uses you intend, are there other approaches that need to be considered that do NOT involve adoption of new technology, and if so, why?  How do they compare with respect to costs, risks and benefits?  Why do you believe that adopting new technology makes most sense?  Note that if it’s not clear, there might be some additional evaluation processes needed during the adoption consideration process.

Relative Value.  How important and urgent is adoption of this technology relative to other IT activities your organization could undertake instead?  How well does adoption of this technology fit into your organization’s overall IT portfolio?

Adoption of this Technology.  It is almost certainly worth noting what kind of adopter your organization should be for this technology, with respect to (a) all potential adopters, (b) all organizations in your industry/segment and (c) just those of comparable size.  You will probably want to provide some justification if the answers are different than the one for organizational adoption, in general.

End with a list of references following the standard reference format, as described in References and Citations document.

Use the Ask Your Facilitator Discussion Board if you have any questions regarding the objectives of the assignment or how to approach the assignment. 

Save your assignment as LastnameFirstname_assign6.doc and submit it in the Assignments section of the course.

Dell Customer Communication – Confidential

Dell Customer Communication – Confidential© Trustees of Boston University. Materials contained within this course are subject to copyright protection.