This week we focus on the concept of the balanced scorecard. Please note what it is and how organizations use balanced scorecards. Note any alternative methods organizations use instead of the balanced scorecard and why they would use these methods over the balanced scorecard.Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.Your response should be 250-300 words. Respond to two postings provided by your classmates.
This is a required assignment worth 15 points (15-points/1000-points). Assignment must be submitted by the due date. No late assignments are allowed. Please discuss the following topics and provide substantive comments to at least two other posts. Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 7 (Jamsa, 2013).Chapter 7 topics:
Study Questions 1. Briefly define each of the three members of the information security triad. 2. What does the term authentication mean? 3. What is multi-factor authentication? 4. What is role-based access control? 5. What is the purpose of encryption? 6. What are two good examples of a complex password? 7. What is pretexting? 8. What are the components of a good backup plan? 9. What is a firewall? 10. What does the term physical security mean?
1. Find favorable and unfavorable articles about both blockchain and bitcoin. Report your findings, then state your own opinion about these technologies
2. Find the information security policy at your place of employment or study. Is it a good policy? Does it meet the standards outlined in the chapter?
3. How diligent are you in keeping your own information secure? Review the steps listed in the chapter and comment on your security status.
School of Computer & Information Sciences ITS-631 Operational Excellence Chapter 6 – Information Systems for Business and Beyond (2019)
identify the information security triad;
identify and understand the high-level concepts surrounding information security tools; and
secure yourself digitally.
Information Security Triad and Tools for Information Security
Information Security Triad:
Tools for Information Security
Read: Sidebar Password security
Blockchain and Bitcoin
Speed of adoption
Payment system that uses cryptocurrency
Full understanding of the organization's information resources
Regular backups of all data
Offsite storage of backup data sets
Test of data restoration
UPS (uninterruptible Power Supply)
Alternate or “hot” sites
Firewalls and Intrusion Detection Systems
Used to increase security on an organizational network
Intrusion Detection Systems
Placed on the network to determine if a network is being attacked.
Physical Security and Policies
Physical intrusion detection
Usability and Personal Information Security
Balance the need for security and being able to access and use the resources
Personal Information Security
Keep software up to date
Install antivirus software and keep up to date
Be smart about your connections
Secure accounts with two-factor authentication
Be suspicious of strange links and attachments
Bourgeous, D., Smith, J., Wang. S., Mortati, J. (2019). Information Systems for Business and Beyond. Retrieved from https://opentextbook.site/informationsystems2019/.
School of Computer & Information Sciences ITS-631- Operational Excellence Chapter 6 – Information Technology and Organizational Learning
Examine the nature of organizational transformation, how it occurs, and how it can be measured
Three possible dimensions
Changes in goals
Changes in boundaries
Changes in activities
Organizational transformation is significant for three reasons:
Orgs that cannot change will be at risk from competition
If the org cannot evolve, it will persist in its norms and will not be able to change
If the community is forced to change, it will be unable to successfully transform and will need to be replaced.
Three Dimensions of Organizational Transformation
Change in the market or target population
Overall goal of the organization itself changes
Driver to supporter life cycle
Aldrich’s Evolutionary Process
Figure 6.2 Aldrich’s Evolutionary Process and its relationship to ROD
Methods of Ongoing Evaluation
Organizational transformation = the retention of knowledge within the body of communities of practice.
Cultural assimilation does not occur immediately, but over periods of transition.
Use a balanced scorecard to transition emerging technologies.
Balanced Scorecard and Technology and ROD
Figure 6.5- utilizes the core balanced scorecard with technology and ROD
Balanced Scorecards and Discourse
Target Areas to integrate language and discourse and communities or practice theory with the balanced scorecard strategy:
Developing of strategy maps
Validating links across balanced scorecard perspectives
Evaluating Organizational Transformation
Knowledge Creation, Culture, and Strategy
Knowledge creation (especially in technology) has meaning in the relationship between data and information
New information does not ensure new knowledge creation
Knowledge linked to organizational transformation allows for the knowledge to be institutionalized
This process must be linked to business strategy.
The ultimate goal is to accelerate the investment in technology during the reallocation of the company for reasons of economies of scale and competitive advantage.
Langer, A. M. (2018). Information Technology and Organizational Learning. 3rd edition. Taylor & Francis Group, LLC. ISBN: 978-1-138-23858-9
We are a professional custom writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework.
Yes. We have posted over our previous orders to display our experience. Since we have done this question before, we can also do it for you. To make sure we do it perfectly, please fill our Order Form. Filling the order form correctly will assist our team in referencing, specifications and future communication.
2. Fill in your paper’s requirements in the "PAPER INFORMATION" section and click “PRICE CALCULATION” at the bottom to calculate your order price.
3. Fill in your paper’s academic level, deadline and the required number of pages from the drop-down menus.
4. Click “FINAL STEP” to enter your registration details and get an account with us for record keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
5. From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.