PhD candidates should provide an authentic personal statements to each of the five following questions/prompts reflecting on their own personal interest. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to respond to each prompt/question individually for clarity of the reviewer. Documents should be submitted in Microsoft Word format.


  1. What are your research interests in the area of Information Technology? Why do you think it is important to research in this area?
  2. Why did you select to pursue a program at University of the Cumberlands instead of other institutions?
  3. As an individual, what are your strengths and weaknesses? How will these impact you as a doctoral information technology student?
  4. Where do you see the future of Information Technology heading?
  5. How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC? 

PhD/EdD Leadership

  1. What are your research interests in the area of leadership? Why do you think it is important to research in this area?
  2. Why did you select to pursue a program at University of the Cumberlands instead of other institutions?
  3. As an individual, what are your strengths and weaknesses? How will these impact you as a doctoral leadership student?
  4. Where do you see the future of leadership heading?
  5. How can obtaining a doctorate impact your contribution to the practices of leadership? Where do you see yourself after obtaining a doctorate from UC?

DBA/PhD Business

  1. What are your research interests in the area of business? Why do you think it is important to research in this area?
  2. Why did you select to pursue a program at University of the Cumberlands instead of other institutions?
  3. As an individual, what are your strengths and weaknesses? How will these impact you as a doctoral business student?
  4. Where do you see the practice of business heading?
  5. How can obtaining a doctorate impact your contribution to the practices of business? Where do you see yourself after obtaining a doctorate from UC?

d5 reply san

Role of End-Users in Incident Reporting of Security Issues

End-users play an important role in securing computer systems and mitigating risks once an incident occurs. End-users can identify the presence of malicious software in a computer system through observation of uncommon occurrences and incidences (Polisena et al. 2015). End-users are able to detect problems with computer systems especially where a zero-day attack occurs and intrusion detection software (IDS) and intrusion prevention software (IPS) cannot detect (Catota et al. 2018). Employees can implement emergency procedures in risk management such as running scans, deploying anti-virus software, shutting down the computer system and switching off all devices. End-users report such incidences to CSIRT teams and management for appropriate responses (Catota et al. 2018).

End-users should be encouraged to report incidents of intrusion and threats to computer systems because they are part of the risk management team. End-users can provide observational evidence on threats and can directly explain to CSIRT teams the observable effects of the threat (Catota et al. 2018). Additionally, reporting helps end-users become part of security management and are able to implement security measures to avoid further breaches.

Several factors affect reporting of incidences by end-users. Some end-users might not be aware that the system is under attack because the method of attack is new to them. Some end-users are not aware of the observable direct effects of malicious software and might not notice the attack (Polisena et al. 2015). Some end-users assume that anti-virus software will solve the problems and hence fail to report any incident. Mostly, end-users lack proper understanding of computer systems and security operations and are unaware of any threat or attack on systems and therefore, do not report any incident (Polisena et al. 2015).


·         Catota, F. E., Morgan, M. G. & Sicker, D. C. (2018). Cybersecurity incident response capabilities in the Ecuadorian financial sector. Journal of Cybersecurity, 4(1): 67-74.

·         Polisena, J., Gagliardi, A., Urbach, D., Clifford, T. & Fiander, M. (2015). Factors that influence the recognition, reporting and resolution of incidents related to medical devices and other healthcare technologies: A systematic review. Systematic Reviews, 4(37): 27-39.

Discusiion 2

In today’s world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.

It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States.The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.

Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.

You must do the following:

1) Create a new thread. As indicated above, please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.

2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread. 

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

  • What did you learn from your classmate’s posting? 
  • What additional questions do you have after reading the posting? 
  • What clarification do you need regarding the posting? 
  • What differences or similarities do you see between your posting and other classmates’ postings?


 Your readings in this unit, along with the two sources that you located on systems modeling for decision making in IT, evaluate and analyze the applicability of system simulations in policy-making. 

Address the following:

· How is the model-based policy design different from intuitive policymaking?

· What are the techniques currently used to build models?

· How does system models assist with decision making?

 Your paper should be approximately 500 words and demonstrate proper APA formatting and style. You do not need to include a cover page or abstract, but be sure to include your name, assignment title, and page number in the running header of each page. Your paper should include a minimum of four references from your unit readings and assigned research; the sources should be appropriately cited throughout your paper and in your reference list. Use meaningful section headings to clarify the organization and readability of your paper.

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.


Policy design vs. intuitive policymaking

6.6 (33.00%)

Thoroughly discusses the differences. Research-based analysis.

Techniques currently used to build models

6.8 (34.00%)

A research-based discussion on current techniques for building models is included.

System models & decision making

6.6 (33.00%)

Discusses the value of systems modeling in decision making with research-based examples.

weekly discussion

HITECH Act Technology and Controls

The HITECH Act requires providers applying for financial incentives for meaningful use to engage in a number of very specific data collection, storage, and exchange activities. A large percentage of healthcare providers that might qualify for these financial incentives are small practices—essentially small businesses. These small businesses rarely have the resources available to purchase and maintain the technology necessary to qualify for these incentives. Providers have chosen a variety of solutions including partnering with large health systems that might provide the services as part of the partnership or choosing to outsource the work to a third party.

Dr. Taylor has been providing healthcare for his neighbors since the 1960s. Over the years, he has shared a clinic space with several other independent physicians, sharing expenses, support staff, and on-call responsibilities. Dr. Taylor and his partners have decided that they do not want to follow the path of many of their peers by joining forces with a large health insurance company. At a partners meeting, Dr. Taylor was tasked with finding a cloud provider to help the partners implement an appropriate electronic health record (EHR). The EHR would meet all criteria, including security and privacy regulations, that would qualify these health providers for meaningful use financial incentives.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Then discuss the following:

  • Describe the steps necessary to select an appropriate cloud provider that will provide access to an EHR and host data storage for a small provider practice.
  • Identify the security and privacy controls that the selected cloud provider must be able to implement to comply with the HITECH Act criteria.
  • Explain the roles and responsibilities of the cloud provider and the healthcare providers in ensuring that the HITECH Act security and privacy regulations are met.

Reply to discussions

reply to the below discussions with 250 words


  • Information Technology (IT) infrastructure is identified as a composition of software, hardware, network services and resources, and data centers (Vacca, 2013). IT infrastructure are important when it comes to the operation, existance, and management of enterprise information technology environment. It is understood that the weakest link in the security of an IT infrastruture plays a very important role in its success. When it comes to the secutiry of an IT infrastructure, the human element is considered as the weakest link. Even if the security of an IT infrastruture has a strong anti-virus software, firewall, cryptography, and intrusion detection system, it is only as strong as its weakest link. Human is to err is a common philosophical statement, and intrudors that want to take advanatge of an IT infrastructure are always waiting for this opportunity.   There are various strategies though that an organization may employ to reduce the risks possed, for exampe, organizations may engage in employee training to raise awareness of the various vectors of attack (Vacca, 2013). In addition, management of organizations may implement incentives which will encourage employees to take an active role and attention when it comes to matters security. Organizations may also engage in penetration testing and vulnerability assessment periodically in order to reduce the threat posture. In terms of costs, the whole process of mitigation of a data breach costs less than training and testing processes, and therefore it would be wise for any organization to carry-out the necessary steps in strengthening the weakest link.
  • What is the weakest link in the security of an IT infrastructure?  The weakest link in security is the Humans. The chain is the security of the organization and its cyber defense is majorly independent and we already know the link of the weakest part in an organization’s security. As per the report, 78% of the security professional thinks the biggest threat to the endpoints in the security where peoples neglect among the employees’ security practices. Here the percentage also shows us 9.3% of the organization’s threats per month.  We are all humans and we do make mistakes and among these people there are a plethora of people who are always trying to take advantage of any mistakes made by other people which costs the business in financial loss. Any technology and security practices no matter how much sophisticated there will always be the errors made by humans.  How to reduce the vulnerabilities:  In-depth training should be provided to all the employees such that there will be total awareness on all the different attacks.  Any regular people risk assessments of the employees can reduce cyber risk in many ways can help the organization.  To use Hitech mechanism to the employees to keep the attention towards securities.  The periodic vulnerability assessments and penetration testing reduces the threat to the organization.  Many small businesses simply do not have the strict guidelines for creating the passwords in uniquely to all the online accounts. Employees are left to their own devices which always relying on the humans nature that simple develop a single and easy passwords that they use for the accounts that they have in the organization.  Enforcing the passwords management to combat the human errors, where many large companies IT departments force their users to create a complex passwords and builds their passwords not to be stolen easily and its easy to get a new password to create it.  Benefits: Improved Security, Reduced Information Theft, Enhanced Productivity, Compliance.


Attackers don’t span a single way which helps them make their targets compromise. Their biggest weapon lies within the organization but not in the newest technology available in the market. This makes the weakest link in the information security. One such weakest is the emails and the system that manages email. Email is the source for most of threats like phishing, scams, ransomware and any such related malicious code. Even a single email which contains the confidential data goes out of the organization, may lead to the biggest threat and lowers the reputation of the organization. For this, employees should be given a training on what type of emails can be shared with their co-employees and what type of emails can be sent out of the scope of the company. Management should have access to the emails of their employees and should regularly monitor them. 

Some of the strategies that can be applied to reduce the effects of the emails are stated here. Users should be aware of the types of risks caused by the emails. Even if the user clicks the unsafe link unknowingly, that may lead to malware infection or that might give the attacker the access to the system. Humans are the primary cause that leads to email related breaches.  The phishing awareness and training program must replicate the various categories of methods and risks that spread over to other roles in the group so that individuals recognize accurately what to look in for. Just offering the training won’t serve the purpose, management should ensure that employees understand their security aspects and are willing to apply in their real time projects.



The Web 2.0 phenomenon involves a lot of techniques and applications structure standards for customizing the Web. It is distinctive to exemplary Web advancements  as it alludes to a class of Web-based applications that have been perceived to share certain structure designs. Today, the term includes Web-based applications like mashups, online journals, wikis, encourages, labeling frameworks, client made production frameworks, and informal communication applications actualized by a scope of techniques from programming dialects to calculations. The hidden driver of Web 2.0 is adaptability. The one characteristic innovations slapped with the Web 2.0 moniker share is that they are very (and maybe in some cases accidentally) moldable. The effective items don’t break when a client endeavors to expand them past their unique plan; they curve to acknowledge new employments. Unavoidably, when individuals find a helpful apparatus outside the working environment, they need to utilize it at the workplace also. This happened years sooner when representatives started sneaking PCs into their workplaces to make it simpler to oversee spreadsheets and archives. All the more as of late, end clients have imported texting and boundless email administrations from outside sources. Endeavor 2.0 separates customary divisional hindrances and empowers building spans. The administrative structure does not change, however the capacity to imagine arrangements and access the technology to convey them is accessible to everybody.  Web 2.0 has likewise brought an ocean change in the manner learning and data is overseen. One page contains content and even executable code from various sources  including end-clients, and data might be syndicated (eg, utilizing RSS) and changed ordinarily from its unique source. Trust in data is progressively hard to set up, making it simpler to advance false data for criminal purposes (eg, twisting of stock costs in supposed ‘siphon and dump’ plans). Technology can address a significant number of the more quick issues, however wiping out the more fundamental dangers requires an exhaustive way to deal with security including individuals, procedure and technology.

Mindfulness raising efforts eg, lifetime of information on the web, utilization of more grounded confirmation in certain Web 2.0 situations, and the inadequacy of age-check and substance rating plans in Web 2.0. Secure improvement activities – covering secure advancement forms for Web 2.0 and tools to encourage those procedures incorporating worked in security highlights for IDEs and APIs, the usage of mysterious solid validation tools.

Need a reply for above, at least 125 words in APA Format.  



Note: One article is from wikipedia (do not reference it in any of your work) only used for quick information.

Revisiting History

During the early 2000s Microsoft was under a microscope for having a monopoly. The case was settled (see wikipedia >    ( )Settlement)

Review the below links:

Answer the following:

  • What are your thoughts on what you have read?
  • Do you believe that your privacy rights have been or currently violated?
  • Do you think that hackers have found the backdoor?
  • How would you protect your infrastructure against a backdoor?
  • Any other thoughts?

Main post and respond to two other students

  • Do not reuse responses, every response must be unique
  • Do not copy other students responses and use them as your own.
  • All posts will be checked for plagiarisim.

I need to paraphrase these

 paraphrase these :

1. Starbucks Reserve Brand

Starbucks expects to have more than 37,000 stores by 2021. That’s an additional 12,000 new stores globally elevating the Starbucks Experience around the world. Complementing the “third place” Starbucks Experience customers know and love will be a new, premium retail platform centered around the companies rare, small-lot Reserve coffee. In addition to ongoing expansion of their Reserve Roasteries, as announced during Starbucks recent biennial Investor Conference, some of these customer experiences will be Reserve stores. Reserve® stores are a new retail format that will integrate the immersive, educational aspects of the Roastery with fresh baking onsite by the artisanal Italian food purveyor, Princi. Aspects of the Reserve Roastery and Reserve stores will also be extended into Starbucks broader retail footprint with the inclusion of Starbucks Reserve experience bars in up to 20 percent of its total portfolio.

2. Cold is Hot

Starbucks expects the cold coffee category to double in the next three years. Building on its nationwide launch of Cold Brew coffee the previous year, in May 2016 the company introduced two new cold coffee experiences to highlight the skillful craft of its baristas and high-quality coffee: Starbucks® Nitro Cold Brew and Vanilla Sweet Cream Cold Brew.  With Nitro Cold Brew on tap in major cities across the U.S., Starbucks is the largest retailer of this handcrafted cold coffee experience. In October, Canada introduced Nitro Cold Brew. In November, Starbucks Beijing World Trade Centre Reserve store became the first location in China to introduce Nitro Cold Brew. For the holidays, customers spiced up the cold beverage with Starbucks Spiced Sweet Cream Nariño 70 Cold Brew.

3. Coffee Meets Ice Cream

The Starbucks Reserve® Roastery in Seattle has always been about immersing customers in the craft of coffee. From roasting to brewing, some of the rarest, limited-availability coffees in the world take center stage there. In June, the Reserve coffees did a bit of immersing in the form of an Affogato lineup of beverages as part of the Roastery’s cold coffee menu. The simplicity of pouring hot espresso over cold ice cream not only offers a rich creaminess at first taste, but exposes the nuanced flavors unique to each espresso. In addition to the featured Affogato beverage, the cold bar menu expanded to offer a Reserve Cold Brew Float and a Malted Milkshake.

4. Teavana Around the World

Teavana’s hot and iced teas are now available at participating Starbucks stores globally – from a Citrus Mint Green Tea Latte with Matcha in Europe to the Black Tea with Ruby Grapefruit and Honey in China and an Iced Strawberry Green Tea Lemonade in Mexico. Teavana hot-brewed tea launched in Starbucks Europe, Middle East and Africa region and China/Asia Pacific region in the fall, preceded by a July debut in Latin America. There’s much more to come from Teavana. During its 2016 Investor Conference, Starbucks announced new products showing up in the grocery aisles during the spring of 2017 will include Bottled Starbucks® Cold Brew Cocoa and Honey with Cream in select markets in the U.S., and ready-to-drink Teavana® Craft Iced Teas in partnership with Anheuser-Busch.

5. New Era of Music Begins with Spotify

Almost a year ago, in January 2016, Starbucks launched a new digital music experience with leading streaming music service Spotify. It allows Starbucks Mobile App customers to immediately discover music playing overhead in Starbucks® stores, save Starbucks-curated songs to a playlist on Spotify and listen to Starbucks music anywhere they go on Spotify. This first-of-its-kind music experience now reaches customers at more than 7,800 Starbucks company-operated stores in the U.S., 12 million Rewards loyalty members, and U.S. Spotify users. Scroll to Starbucks latest playlists or sign up for Spotify here.

6. Starbucks Mobile App Gets Even Better

With an April launch of Starbucks Rewards™, the company unveiled a sleekly redesigned mobile app for iOS and Android customers. Additional updates offer customers an even more personalized experience through Starbucks Mobile Order & Pay, adding new time-saving features enabling customers to save their favorite orders and favorite store location. Global market expansion continued for the Starbucks App, which launched in China, Japan and Indonesia in 2016. And at its Investor Conference, Starbucks unveiled an innovative conversation ordering system, called My Starbucks Barista, powered by groundbreaking Artificial Intelligence (AI) for the Starbucks Mobile App. Customers will be able to place their orders via voice command or messaging interface. The AI feature will roll out first on iOS in limited beta in early 2017 and be made available to more iOS and Android users in subsequent releases.  

7. Enabling Entrepreneurs

When Livio Bisterzo and his team set out to make a “better for you” snack, they pushed the boundaries as far as they could. What resulted is a new product called Hippeas – organic chickpea puffs that are gluten-free, vegan, kosher, 100 calories per pack, 3 grams of protein and a good source of fiber. Hippeas recently became the latest product to join Starbucks assortment of grab-and-go snacks available in more than 7,500 Starbucks locations across the U.S. Starbucks Retail Branded Partnerships seeks out small, local companies with innovative products and brings them to Starbucks stores. The company has launched more than 15 small brands in select stores in the past year. Some of the food options are offered regionally. Others, like Bantam Bagels are carried in Starbucks stores across the U.S. 

8. By Popular Request

One of customers’ most-requested items arrived in U.S. Starbucks stores this fall. Almondmilk, a non-dairy alternative, in addition to soymilk and coconut milk became available for use in Starbucks handcrafted beverages, including hot or iced drinks and Frappuccino® blended beverages. Starbucks introduced its first nondairy milk alternative in 2004 with the launch of soy milk, followed by coconut milk in February 2015. This summer, Starbucks introduced the Iced Coconut Milk Mocha Macchiato, the first espresso beverage recipe to use coconut milk. Starbucks also saw a cultural phenomenon with Pink Drink, a customer-driven beverage customization made with Strawberry Acai Refreshers that substitutes water with coconut milk. Pink Drink, the subject of more than 100,000 Instagram posts, inspired several colorful beverage creations.

9. The Perfect Cup of Coffee at Home

Starbucks coffee team and equipment developers collaborated to create the new Verismo® System by Starbucks. Launched in October, the single-serve system delivers a premium Starbucks-brewed coffee and espresso experience that includes the Verismo® V Brewer, Verismo® Milk Frother and an expanded selection of Verismo® pods. The new Verismo V Brewer offers a sleek, updated design featuring a larger cup of brewed coffee, quieter operation and quick heat up.

10. Rare Coffees from Remote Locations

St. Helena is one of the world’s most remote destinations, not yet served by commercial flights and a five-day journey by sea from South Africa. Although the tiny island in the South Atlantic covers an area of only 47 square miles, roughly the size of San Francisco, it is the source of some of the world’s most extraordinary coffee, a rare arabica varietal called green-tipped bourbon. The first 25-pound allotment of Starbucks Reserve® St. Helena was set aside for Roastery customers, selling out in four days. Starbucks Reserve Coffee takes center stage through new store experiences inspired by the Seattle Roastery. Tailored for customers in each unique market, Starbucks plans to open up to 1,000 Starbucks stores with a Reserve coffee bar experience by the end of 2017. Twelve exist today, located in New York, Chicago, Atlanta, Baltimore and Boston. In addition to the siphon or Black Eagle, these locations will include the company’s full menu, including the recent rollout of Nitro Cold Brew taps.

Mini Paper


Chapter 29: Transforming Risk Management at Akawini Copper 

Please address the questions below. 

  1. If you were conducting interviews of the Akawini management team so that you could draw objective conclusions for the review described in the chapter, what questions would you ask?
  2. What would you expect to see in the first year risk management transformation plan? What would be the typical tasks?
  3. You have been asked to advise the Akawini management team how they should promote and monitor the transformation of risk management in their business. What performance measures would you recommend they use so that they can monitor progress and performance?


Chapter 28: The Reluctant General Counsel

Please address the questions below. 

  1. What are Jason’s options? Can he accept a risk management program that does not involve the legal department?
  2. Do you agree with George’s arguments? Are they valid?
  3. How would you proceed, if you were the risk officer?


Chapter 27: Nerds Galore

Please address the questions below. 

  1. This is a relatively brief case study; yet the problems faced are quite complex. In your workshop, how did you handle uncertainty in the information you have been given and how does this translate into real-world workshops where not all the answers can necessarily be given at the table?
  2. What were some of the risk sources that emerged repeatedly in evaluating the risks? How is this helpful?
  3. How would this risk assessment aid in the decision on whether or not to proceed with the new HR strategy?


Chapter 26: Bim Consultants Inc.

Please address the questions below.

  1. What is your assessment of the situation?
  2. What advice would you provide to the board of Bim Consultants?
  3. What pitfalls should they be concerned with?