IISP DISCUSSION-5-dummy

“Read the topics of content in the attached text book and write this assignment how the knowledge from this text book can help you in your workplace if you’re working now or finding employment.
 Improper use of outside sources, including your own prior work, will result in a zero on the activity and a report possibly being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 
It is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. 
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 
Requirements:
Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. You should have at least two scholarly sources supporting your write-up.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
Improper use of outside sources, including your own prior work, will result in a zero on the activity and a report possibly being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 
Topics in the course:
  Week-1
Chapter 1, “The Information Systems Strategy Triangle
Dent, A. (2015). Aligning IT and business strategy: an Australian university case study. Journal of Higher Education Policy & Management, 37(5), 519–533. Retrieved from https://doi.org/10.1080/1360080X.2015.1079395
Chapter 2, “Strategic Use of Information Resources” pp. 38-46; 51-54
Zhang, Y. (2016). What Makes Information Strategic? An Examination of Access to Information Resources for Entrepreneurs and Business Performance. ProQuest LLC. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=eric&AN=ED588420&site=eds-live 
  Week-2
Blockchain: 
· Stoyanovich, M., & Tanz, F. E. (2019). Coming to Grips with Blockchain. Benefits Magazine, 56(5), 20-25. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=135900272&site=eds-live
· Waldo, J. (2019). A Hitchhiker’s Guide to the Blockchain Universe. Communications of the ACM, 62(3), 38–42. Retrieved from https://doi.org/10.1145/3303868
· Burns, S. (2019). Blockchain: Hype Vs Reality. Computer Weekly, 21-24. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=138564674&site=eds-live
Week-3
  
Chapter 4, “Digital Systems and the Design of Work” pp. 83-98
Harris, W. J. (2018). Technology adoption by global virtual teams: Developing a cohesive approach. SAM Advanced Management Journal, 83(1), 4-21. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=buh&AN=135806019&site=eds-live
Chapter 5, “Information Systems and Digital Transformation” pp. 109-121
Week-4  
Chapter 6, “Architecture and Infrastructure” pp. 143-150
Singh, M. (2018). Virtualization in Cloud Computing- a Study. 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), 64. Retrieved from https://doi.org/10.1109/ICACCCN.2018.8748398 
  Week-5
Chapter 7, “Security”
Khelf, R., & G-Z, N. (2018). IPsec/Firewall Security Policy Analysis: A Survey. 2018 International Conference on Signal, Image, Vision and Their Applications (SIVA), 1. Retrieved from https://doi.org/10.1109/SIVA.2018.8660973
  
Chapter 9, “Governance of the Information Systems Organization””

IISP DISCUSSION-5-dummy

“Assignment:
Use RStudio to generate advanced graphs (using the ggplot2 package) using the dataset below.
Use the following videos to learn the commands to produce advanced graphs in RStudio:  RStudio – Advanced Graphs – Part1.mp4
 |  RStudio – Advanced Graphs – Part2.mp4  
Graphs to Produce:
ggplot2 – Bar Plot: (Use dataset_student_survey_data.csv)
x=Smoke
fill=Exer
position=dodge
facet=Sex
x-label=Smoker
y-label=Counts
title=The Exercise habits of Male and Female students that smoke
ggplot2 – Histogram: (Use dataset_us_car_price_data.csv)
x=Price
fill=Type
facet=Type
x-label=Price
y-label=Freq
title=Car Price Distribution based on Car Type
ggplot2 – Box Plot: (Use dataset_production_of_rice_in_india.csv)
x=varieties
y=price
fill=bimas
facet=status
x-label=Rice Varieties
x-label=Price
title=India Rice Prices based on Varieties, Land Status, and Bimas Program
ggplot2 – Scatter Plot: (Use dataset_production_of_rice_in_india.csv)
x=price
y=wage
shape=bimas
col=bimas
facet=status
method=lm
se=F
x-label=Rice Price
y=Wage
title=India Rice Prices vs Wage broken down by Land Status and Bimas Program
Please put all screen shots in a MS Word (other word processors are fine to use but save it in MS Word format).”

Open chat
Need assignment help?