Two companies consider pooling resources to perform a joint venture. The CEO of the first company meets with his legal team, and the legal team consults a number of middle managers in the proposed product area. Meanwhile, the CEO of the first company sends an email to the CEO of the second company to offer a couple suggestions concerning the joint venture. Does this scenario follow the OSI model? Explain.

Two companies consider pooling resources to perform a joint venture. The CEO of the first company meets with his legal team, and the legal team consults a number of middle managers in the proposed product area. Meanwhile, the CEO of the first company sends an email to the CEO of the second company to offer a couple suggestions concerning the joint venture. Does this scenario follow the OSI model? Explain.

5. You are working from home using a microcomputer, a DSL modem, and a telephone connection to the Internet. Your company is connected to the Internet and has both local area networks and a mainframe computer. List all the different network connections involved in this operation.

1) Which is not a weakness of a shift cipher? _________________________ a) Natural language letter frequency makes them easy to decode b) Once you have the code book you can decode the message.

1) Which is not a weakness of a shift cipher? _________________________

a) Natural language letter frequency makes them easy to decode

b) Once you have the code book you can decode the message.

c) The number of letters in the alphabet makes them easy to decode.

d) Once the shift is determined the message is decoded almost instantly.

Reason:

2) Claude Shannon presented the encryption design principles of _________________.

a) multiplication and factoring

b) exponentiation and Logarithms

c) confusion and diffusion

d) perplexion and reflection

Give reason how and why those help the encryption:

3) A good hash function creates _________ mapping between the source string and the output string.

a) complex

b) as many as needed

c) divisional

d) one to one

Reason why is it a good function:

4) A number is relatively prime to another if they _____________.

a) have only each other as factors

b) have no prime factors in common

c) only have one prime factor in common

d) are both divisible by 7

Reason :

5) Repudiation means

a) Faking one’s identity

b) Uproot

c) Deny ownership

d) Plant clues in the text

Reason:

6) (15 pts) The following is a ciphertext:

WSMODAMTSB, STARTKLIOH OL FGM AZGWM USGKOGWL EKGCFOFU AEML. OM’L AZGWM QTTHOFU BGWK MTAD YGEWLTR GF A UGAS AFR DGMOXAMTR MG RG MITOK ZTLM MG AEIOTXT OM, TLHTEOASSB CITF MIT LMAQTL AKT IOUI AFR MIT EGFLTJWTFETL KTASSB DAMMTK. OM OL AZGWM SABOFU MIT UKGWFRCGKQ YGK GMITKL’ LWEETLL, AFR MITF LMAFROFU ZAEQ AFR STMMOFU MITD LIOFT. EIKOL IARYOTSR

a) What kind of cipher text is this? Mono- or Poly alphabetic; [Hint: assume one and when that does not work look for the other] [1 points]

b) Describe your cryptanalysis process. List all the steps you went through to decrypt the message. The steps should be in sufficient details so that a reader would be able to decrypt the encrypted text without needing any help from you.

c) State the plain text message in readable form i.e. separating words if required

[the solution worked without the help from online tools will be given full credit]

[If you find solution online or use online tools and if you describe the steps by reverse engineering you will still get full credit]

[If you list partial steps you will get partial credit]

[12points]

d) List features of the cipher- text that hindered and helped your decryption process. mention of helpful and hindering features [ 2 pts]

In this assignment, you identify a problem you currently face and use the concepts of logical decision-making to generate solutions. 1. List the 4 keys for logical decision-making. 2. Identify a problem you need to solve.

In this assignment, you identify a problem you currently face and use the concepts of logical decision-making to generate solutions.

1. List the 4 keys for logical decision-making.

2. Identify a problem you need to solve.

Identify and describe below a problem you are facing that is within your control to solve. Be sure to include enough detail so your faculty member has enough context to determine if the solutions provided later in the worksheet are appropriate. (50-100 words)

3. Review Ch. 10 and list two potential failures that can occur when identifying alternative solutions.

4. What two forms of irrational problem-solving are discussed in this week’s text reading?

5. Keeping in mind the need to avoid the potential challenges you identified in #3 and #4 above, create three possible solutions for solving the problem you are facing.

Solution #1 (25 to 50 words)

Solution #2 (25 to 50 words)

Solution #3 (25 to 50 words)

6. Evaluate identified solutions.

One way to determine which solution is best is to list advantages and disadvantages of each potential solution. As you consider the advantages and disadvantages for each solution, think carefully about the positive and negative consequences of implementing each.

Briefly describe at least two advantages and two disadvantages for each solution.

SOLUTION #1

ADVANTAGES

DISADVANTAGES

(25 to 50 words)

1.

(25 to 50 words)

1.

(25 to 50 words)

2.

(25 to 50 words)

2.

SOLUTION #2

ADVANTAGES

DISADVANTAGES

(25 to 50 words)

1.

(25 to 50 words)

1.

(25 to 50 words)

2.

(25 to 50 words)

2.

SOLUTION #3

ADVANTAGES

DISADVANTAGES

(25 to 50 words)

1.

(25 to 50 words)

1.

(25 to 50 words)

2.

(25 to 50 words)

2.

7. Rank identified solutions.

Think about the advantages and disadvantages you listed in the table above. Rank your solutions from (1) most effective to (3) least effective.

RANK

ENTER SOLUTION # from TABLE ABOVE

# 1 (most effective)

#2 (not as effective)

#3 (least effective)

Explain why you ranked your solutions the way you did. Discuss why your highest ranked solution is the best way to the solve problem and why the others are less effective solutions. (75-100 words)

Develop a change management plan for WeLoveVideo, Inc. Within the change management plan, incorporate the following: Ways in which the system was designed to support a positive user experience How the system changes will be communicated to the users

Develop a change management plan for WeLoveVideo, Inc. Within the change management plan, incorporate the following:
Ways in which the system was designed to support a positive user experience
How the system changes will be communicated to the users
Ways in which you will shape the communications to ensure a positive outlook
Collateral (Ex. FAQs and user guides) that will be developed in support of the new system
Explain what type of support will be available to the users after implementations.
Refer to Ch. 13 of Modern Systems Analysis and Design in the Week 5 – Required Learning Materials folder for information on creating change management plans.

When we take a close look at the author’s point of view, under the Federal Rules of Civil Procedures (FRCP) amendments dating back to 1938 there has been governance and the discovery of evidence in lawsuits and other civil cases. Please name and briefly discuss the three (3) reasons why corporations must proactively manage the e-discovery process?

When we take a close look at the author’s point of view, under the Federal Rules of Civil Procedures (FRCP) amendments dating back to 1938 there has been governance and the discovery of evidence in lawsuits and other civil cases. Please name and briefly discuss the three (3) reasons why corporations must proactively manage the e-discovery process?

TextBook:

Information Governance: Concepts, Strategies, and Best Practices

• Author: Robert F. Smallwood

• Publisher: Wiley

• Edition: Please Use Most Recent Edition

At least a 100 word for the answer to the question. 1. In reviewing the 10 strategic goals of the IT Strategic plan, which are most closely aligned with the initiative for SmartIV Pumps proposed by nurses and pharmacists?

At least a 100 word for the answer to the question.

1. In reviewing the 10 strategic goals of the IT Strategic plan, which are most closely aligned with the initiative for SmartIV Pumps proposed by nurses and pharmacists?

2.Which of the approaches suggested to improve medication management do you think would be the most appropriate course of action?

3. Why do you think that the suggested approach you selected will improve medication management?

4.How do decision support systems improve the safety of patient care and promote positive outcomes of care?

Case 3: Selection of a patient safety strategy
Background Information:
Langley Mason Health (LMH) is located in North Reno County, the largest public health care district in the state of Nevada, serving an 850-square-mile area encompassing seven distinctly different communities. The health district was founded in 1937 by a registered nurse and dietician who opened a small medical facility on a former poultry farm. Today the health system comprises Langley Medical Center, a 317-bed tertiary medical center and level II trauma center; Mason Hospital, a 107-bed community hospital; and Mason Continuing Care Center and Villa Langley, two-part-skilled nursing facilities (SNFs); a home care division; an ambulatory surgery center; and an outpatient behavioral medicine center.
In anticipation of expected population growth in North Reno County and to meet the state-mandated seismic requirements, LMH developed an aggressive facilities master plan (FMP) that includes plans to build a state-of-the-art 453-bed replacement hospital for its Langley Medical Center campus, double the size of its Mason Hospital, and build satellite clinics in four of its outlying communities. The cost associated with actualizing this FMP is estimated to be $1 billion. Several years ago, LMH undertook and successfully passed the largest health care bond measure in the state’s history and in so doing secured $496 million in general obligation bonds to help fund its massive facilities expansion project. The remaining funds must come from revenue bonds, growth strategies, philanthropic efforts, and strong operational performance over the next ten years. Additionally, $5 million of routine capital funds will be diverted every fiscal year for the next five years to help offset the huge capital outlay that will be necessary to equip the new facilities. That leaves LMH with only $10 million per year to spend on routine maintenance, equipment, and technology for all its facilities. LMH is committed to patient safety and is building what the leadership team hopes will be one of the safest hospital-of-the-future facilities. The challenge is to provide for patient safety and safe medication practices given the minimal capital dollars available to spend today.

LMH developed an IT strategic plan in late 2010, with the following ten goals identified:
• Empower health consumers and physicians
• Transform data into information
• Support the expansion of clinical services
• Expand e-business opportunities
• Realize the benefits of innovation
• Maximize the value of IT
• Improve projects outcomes
• Prepare for the unexpected
• Deploy a robust and agile technical architecture
• Digitally enable new facilities, including the new hospital.

Information System Challenge
LMH has implemented Phase 1 – an enterprise-wide EHR system developed by Cerner Corporation in 2008 at a cost of $20 million. Phase 2 of the project is to implement computerized provider order entry (CPOE) with decision-support capabilities. This phase was to have been completed in 2010, but has been delayed due to the many challenges associated with Phase 1, which still must be stabilized and optimized. LMH does have a fully automated pharmacy information system, albeit order technology, and Pyxis medication-dispensing systems on all units in the acute care hospitals. Computerized discharge prescriptions and instructions are available only for patients seen and discharge from the LMH emergency departments.

Currently, the pharmacy and nursing staff at LMH have been working closely on the selection of a smart IV pump to replace all of the health system’s aging pumps and have put forth a proposal to spend $4.9 million in the fiscal year beginning July 2012. Smart pumps have been shown to significantly reduce medication administration errors, thus reducing patient harm. This expenditure would consume roughly half of all the available capital dollars for the fiscal year.
The chief information officer, Marilyn Moore, PhD, understands the pharmacists’ and nurses’ desire to purchase smart IV pumps but believes the implementation of this technology should not be considered in isolation. She sees the smart pumps as one facet of an overall medication management capital purchase and patient safety strategic plan. Dr. Moore suggests that the pharmacy and nursing leadership team lead a medication management strategic planning process and evaluate a suite of available technologies that takes together could optimize medication safety (for example, CPOE, electronic medication administration records [e-mar], robots, automated pharmacy systems, bar coding, computerized discharge prescriptions and instructions, and smart IV pumps), the costs associated with implementing these technologies, and the organization’s readiness to embrace these technologies. Paul Robinson, PharmD, the director of pharmacy, appreciates Dr. Moore’s suggestion but feels that smart IV pumps are critical to patient safety and that LMH doesn’t have time to go through a long, drawn-out planning process that could take years to implement and the process of gaining board support. Others argue that all new proposals should be placed on hold until CPOE is up and running. They argue there are too many other pressing issues at hand to invest in yet another new technology.