Transformational Leadership and Knowledge

This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions: How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? How does servant leadership assist with transferring knowledge in an organization? When thinking about data analytics, how does transformational leadership assist with building good data structures? Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years. The paper should meet the following requirements: 3-5 pages in length (not including title page or references), APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion. A minimum of five peer-reviewed journal articles.

Read more

Data Dictionaries and Data

Given the knowledge you have gained about data dictionaries and metadata, put yourself in the role of an electronic health record designer. Specify the attributes that should be included in the database to correctly identify and track patients. Attributes are the individual data types that can be represented as “columns” in the data table.Your database attributes and the specifications of the attribute should be listed in a table format–Excel spreadsheet or a Word table. The content in your spreadsheet or table should include: Data attribute or element, Definition, How many characters long should this data attribute or element be, What type is the data attribute (text, numeric, etc.), Any other specifications you think would be important to the attribute or element.

Read more

Leadership Ethics

Read the below content in URL https://www.scu.edu/ethics/focus-areas/leadership-ethics/resources/the-ceo-of-starbucks-and-the-practice-of-ethical-leadership/ Please answer all the questions. Creating  Community:  Did Johnson use Starbucks’ shared values as the cornerstone of his decision making after the arrests?  Did his decision to close all  Starbucks stores for unconscious bias training and to create a new  “Third Space Policy” align with Starbucks’ mission and goals?  Did his handling of the incident promote positive relationships between employees and customers? Did it encourage a sense of connectedness and shared values? Encouraging  Ethical Conduct:  Did Johnson openly acknowledge that his decision was based on ethics and morality?  Did his apology and actions promote awareness of an ethical issue? Did it create a positive or negative difference in the communities Starbucks serves? Did it make a positive or negative difference for Starbucks employees and customers? Showing  Discipline in One’s Role:  Does Johnson explicitly accept responsibility for the incident and provide direction for a course correction? Does he identify ways to collaborate with others when necessary?  Does he show he understands what his role is in fixing this problem? Clarifying  Culture:  Did Johnson clarify his values and the company’s values in his apology and with his subsequent actions?  Did Johnson’s apology and follow-up actions uphold Starbucks’ mission and core values? Did he identify gaps between stated and actual values?  Did Johnson’s apology help Starbucks employees figure out if their personal values align with the company’s? Designing  Ethical Systems:  Did Johnson’s actions have an impact beyond Starbucks?   Did they send a precedent for other companies to follow? Did his apology create a conversation about unconscious bias in the workplace?  How do his apology and the subsequent follow-up actions compare to other companies and CEOs that have faced similar problems?

Read more

Preferences and Configuration Options in Wireshark

Share your findings regarding the preferences and configuration options in Wireshark. This doesn’t require a reference. OERs Wireshark User’s Guide. (n.d.). Retrieved from: https://www.wireshark.org/docs/wsug_html_chunked/index.html Petters, G. (2020). How to Use Wireshark: Comprehensive Tutorial + Tips. Retrieved from: https://www.varonis.com/blog/how-to-use-wireshark/ Orgera, S. (2020). How to Use Wireshark: A Complete Tutorial. Retrieved from: https://www.lifewire.com/wireshark-tutorial-4143298 HowtoGeek. (n.d.). How to Use Wireshark to Capture, Filter, and Inspect Packets. Retrieved from: http://www.howtogeek.com/104278/how-to-use-wireshark-to-capture-filter-and-inspect-packets/

Read more

Culture of Innovation in IT

 write a 3-page proposal detailing how you, as a senior IT manager, plan to create a culture of innovation in IT operations and integrate IT innovation into long-range strategic planning. The audience for this plan is the senior leadership. Your proposal should include recommendations for specific technology innovations and a rationale for how you expect these innovations to drive business success. 

Read more

Effectiveness of Security Training and Awareness Program

write a paper that contains a literature review about Effectiveness of Security Training and Awareness Program for cyber-attacks from 2015-2020 years in the literature review, each study should include the following what did the study focus on, factors that used, the outcome of the study, methods used, theories used and number of participants

Read more

physical Security Concepts

Please research physical security concepts and provide at least 500 words on how you would “protect” your vehicle, your home and your neighbourhood from a “terrorist attack”. 

Read more

Organizational behavior and Outsourcing

Topic 1 1.Journal Article Summary of your research:  Organizational behavior.Topic 2 Journal Article Summary your research:  Outsourcing.

Read more

Devices Restriction In Organisations

Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? 

Read more

Infotech In Global Economy

gent Based Modeling can be used for introducing new technologies and for policy making and policy review. Research and select an article (dated within the last 3 years) discussing the use of agent-based modeling(ABM). Using at least 300 words, discuss the article you found and specifically describe how agent-based modeling (ABM) was used for simulating the actions and interactions of autonomous agents (both individual or collective entities such as organizations or groups) with a view to assessing their effects on the system as a whole.  

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information