SlideShare une entreprise Scribd logo
1  sur  407
CROSS CULTURAL COMMUNICATION
5
A Winning Concept:
The Benefits of Organizational Communication
Prepared by Student Name
Date
New England College
Course MG5415
Organizational Communication for Leaders
Julie Zink, Ph.D.
Abstract
Communication is a critical and effective medium that conveys
information to a recipient or a group. While it is important to
convey a message concisely, an effective communicator
commands undivided attention. The benefits of effective
organizational communication when executed well, cultivates a
sense of commitment and loyalty within its employees, as well
as instilling that they are an essential component to the overall
success of the organization.
Keywords: Organizational communication, strategy, leader,
vision, mission, goals, management
A Winning Concept: The Benefits of Organizational
Communication
“One of the greatest responsibilities of an organization’s
leadership is to communicate with unwavering clarity the values
on which the organization has been built (Vern Dosch, 2016).”
Introduction
Communication is a fundamental and essential function of
civilization from the cradle to the grave. It is the backbone of
the universe’s existence as we know it, creating and cultivating
a type of social bondage that occurs between human beings and
living things alike. In the business world, it is the absolute
nucleus that determines how effectively we will communicate,
react, interact, and share information with each other. In fact, if
we are to consider organizational communication as a field in
its own right, it would be apt to label it as a subcategory of a
much larger and broader discipline of communication studies.
As a subcategory, organizational communication’s composition
comprises analysis, consideration, and criticism of the role of
communication in organizational contexts.
Defined, organizational communication is, “the way in which an
organization gives the public and its employee’s information
about its aims and what it is doing (Cambridge, n.d.).”
Organizational communication is also a component of effective
management in a workplace environment. The main functions
are not only to inform but persuade and promote both support
and goodwill. Communication is the lifeline of an organization,
always providing the necessary information to ensure effective
performance in all business activities. Communication in an
organization is fundamental to running a successful business. It
also requires active participation that encompasses the Board of
Trustees and or Directors, Chief Executive Officer and or
President, C-Suite leaders, management, and the teams that
report to the managers. While management is the means to
achieving organizational goals, efficiency and effectiveness of
management depends on effective communication. Every minute
aspect of management hinges upon successful communication.
Without effective communication, an organization cannot
feasibly create and convey its credo: its vision and mission
statement, the strategic plan, conveying how one shares or
disseminates information, or even actively communicating
within the organization, one’s clients, providers, and even
vendors.
Factors That Contribute to Successful Organizational
Communication
Factors that contribute to successful organization
communication include a clear vision and mission statement, a
current strategic plan, clear goals and objectives, and a
steadfast commitment to the company’s success. In fact there
are a number of areas that support successful organizational
communication that include processes, structures, and even
forms of communication that transpire between the Board of
Directors, the leadership, and of course the different layers of
management.
In order to set up a safe structure for an organization to
successfully promote effective organizational communication, it
should be readily adaptable to the situations at hand and
responsive to the needs of the outside environment. There
should be open and frequent communication within the
organization through various mediums, in addition to
potentially developing internal/external newsletters, media
campaigns, and holding meetings or even conferences
depending on the size of the organization. Within the structure
itself, there should be clearly defined roles and policy
guidelines for the employees. By empowering employees with
open decision making at all tiers, members should also share a
stake in the organization’s process and outcomes.
Leaders should lead by example which means leadership should
begin at the very top. Membership of the Board should exhibit
not only mutual respect but understanding and trust as a whole.
They should demonstrate a willingness to compromise or
collaborate in the best interests of the organization.
Effective Leadership and the Management Paradox
The term “Leadership” is somewhat loosely defined, since there
is no clear or consistent language to determine the meaning of
leadership. For many, it denotes providing a clear vision, the
ability to lead others, completing tasks, or motivating others to
succeed within their defined roles and goals. It is important to
note that while there are leaders, there are also leaders who are
not so effective in their roles. Leaders need to be visionaries
who steadfastly steer a course for their organization regardle ss
of the obstacles they will need to overcome. While a leader may
not be born with the necessary abilities or skill sets, they may
be acquired along the way by learning through experience and
through example. In fact, by relying on different types of
behavioral traits, a leader may successfully influence others, in
addition to executing and accomplishing the organizations goals
regardless of the circumstances.
Souba (2006), suggests that there is a clearly defined
misalignment between that of leadership and its management.
While leadership is focused on change, creating a new strategic
vision, and transforming the corporate culture, management’s
focus is more aligned with creating and maintaining order,
maintaining a level of consistency, standardization, meeting
goals and budget, in addition to being ever efficient and
effective.
Bernard Bass, a specialist in transformational leadership, once
stated that, "Leaders manage and managers lead, but the two
activities are not synonymous (Coutts, n.d.).” Paradoxically,
this equates to managers not actually making good leaders and
good leaders not actually making good managers.
Managers are typically responsible for the planning,
investigating, and organization of business processes. Leaders
deal with the interpersonal aspect of a manager’s position. To
be a good leader, we need to be confident within ourselves.
The Four Stages of Organizational Change (OLC)
The concept of organizational change was first introduced in
1950 by British economist and philosopher, Kenneth Boulding
(Nasar, 1993). More than half a century later, Boulding’s
concept has been adapted to fit many different disciplines that
include, but are not limited to, management, marketing, and
public administration. According to Boulding’s concept, the
organizational life cycle may be segmented into four stages
similar to that of a natural living life cycle: Birth, youth,
maturity, and decline/death (Ionescu et al., 2007).
Organizations, like all living things, have a limited lifespan.
While some lives span a longer duration than others, each stage
of development is both predictable and sequential, from the
cradle to the grave. In order for an organization to be
successful, it must have a strong foundation in organizational
communication. Furthermore, it is important for leaders to truly
understand and realize exactly which phase their organization is
in, in order for them to adopt strategies that best suits their
current situation. It is important to note, however, that both
external environmental events and internal circumstances can
clearly impact the success of an organization. According to an
article by Inc., (n.d.), “The OLC model's prescription is that the
firm's managers must change the goals, strategies, and strategy
implementation devices to fit the new set of issues. Thus,
different stages of the company's life cycle require alterations
in the firm's objectives, strategies, managerial processes
(planning, organizing, staffing, directing, controlling),
technology, culture, and decision-making.”
Organization Stages of Development (Daft E5-6 p.175)
Source: www.unc.edu
The Power of Negotiation
Negotiation is prevalent everywhere throughout our daily lives
be it at a personal level or through the daily business
communications that we conduct internally or with the outside
world. It can be as simple as negotiating with a toddler to get
them to do what you want, making a deal with your team if you
reach a certain goal, or even contracting a negotiation.
There are three forms of negotiation:
· Soft negotiation
· Hard negotiation
· Principled negotiation
According to Fisher et al., (2011), the soft negotiator is
determined to avoid any type of personal conflict at all costs.
These individuals will make concessions readily in order to be
able to make an agreement. The outcome for this type of
negotiation is typically unpleasant and the soft negotiator nearly
always walks away feeling completely exploited.
For some individuals, using the hard approach creates a better
outcome though potentially at a higher cost, straining the
relationship that actually began the negotiation in the very first
place. For the hard negotiator, this is a battle of the wills.
Neither side is willing to retreat, ultimately resulting in a stale
mate, since neither side is willing to give concession to their
own demands.
The final type of negotiation is a strategic combination of soft
and hard skills. The objective is to look at the mutual gains
wherever possible and when there is conflict, ensure that the
results are based on some form of fair standard that is
“independent of the will” on either side: Hard on merits, and
soft on people. This is deemed to be the fairest and most
satisfactory form of negotiation and both parties walk away
feeling quite successful regardless of the outcomes.
Groupthink
Groupthink is a psychological phenomenon that occurs when a
group of individuals actively focus on minimizing any type of
conflict. It is the influence to which these individuals have the
overall desire for conformity rather than conflict. It is the
conscientious ability to reach a consensus decision without any
form of critical evaluation or even counter viewpoints. For
smaller organizations, the concept of Groupthink may be
considered beneficial but for larger organiza tions which deal
with much more complex issues, avoiding Groupthink may be
beneficial to their business practices, since it cultivates open
discussion rather than conformity (Cain, 2012).
The Manager’s Hot Seat: Problem Solving
Building critical thinking and decision making skills is an
integral part of organizational communication. On a daily basis
we are faced with distractions and yet it appears that there is
never enough time to dedicate to effective problem solving. For
many leaders, being able to solve the problem quickly and move
on, alleviates the immediate issues at hand. Yet, whether we see
the glass as half-full or half-empty, determines how we view
problems that are presented to us. For many it is one more
obstacle, but for others it is yet another opportunity to improve.
Llopis (2014) noted that problem solving is the essence of what
leaders do. He further states that, “As leaders, the goal is to
minimize the occurrence of problems—which means we must be
courageous enough to tackle them head-on before circumstances
force our hand. “
The Employee Brand
While a brand is an organization’s identity, an organization
does not have the luxury of creating its own brand. Its brand
evolves through the product and the type of clientele that it
attracts. Furthermore, employee branding actually shapes its
employees behavior so that they emulate the brand identity
through their everyday work behavior.
A strong brand, not only serves to position the organization at a
desired level but invokes trust and loyalty enabling
organizations to create long term sustainable relationships with
their employees and customers.
Conclusion
Today’s challenges in the workplace include incorporating
innovative and engaging ways to involve and motivate
employees while at the same time, meeting and enhancing the
organization’s bottom line. Organizational communication is a
critical element in a company’s success, especially if a leader is
to lead and be the perpetrator of change. Valuable skills of
organizational communication include interpersonal
communication, small group communication, conflict
management, inter-cultural communication, writing, and
managing organizational change.
Great leadership starts at the top. It is this type of leadership
that is indicative in an organization when problem solving
appears completely seamless. Such an ability, enables both
employee and organization to continually grow and improve,
strategically. When problem solving results in chaos, sadly, it is
indicative of a serious leadership deficiency.
To stay true, organizations must concentrate on developing
organizational leaders who will stay focused on their core
mission, maintain effective management practices and
communication, drive “program” effectiveness, and hold team
members accountable. Effective organizational communication
is the backbone of corporate success. It is through this, that
employees become more committed and loyal to their
organization with the knowledge that they are a valued and
essential component of their company’s success.
References
Cain, S. (2012, January 13). The Rise of the New Groupthink.
Retrieved September 26, 2016,
from http://www.nytimes.com/2012/01/15/opinion/sunday/the-
rise-of-the-new-
groupthink.html?_r=0
Coutts, P. (n.d.). Leadership vs. Manageme nt. Retrieved
September 28, 2016, from
http://www3.telus.net/public/pdcoutts/leadership/LdrVsMngt.ht
m
Davenport, B. T. (2015, February 20). The 4 Stages of the
Employee Value Proposition.
Retrieved September 26, 2016, from
http://www.eremedia.com/tlnt/the-4-stages-of-the-
employee-value-proposition/
Dosch, V. (2016). Quotes About Organizational Leadership (73
quotes). Retrieved September
26, 2016, from
http://www.goodreads.com/quotes/tag/organizational-leadership
Fisher, R., & Ury, W. (2011). Getting to yes: Negotiating
agreement without giving in (p. xxviii).
New York, NY: Penguin.
Ionescu, G. G., & Negrusa, A. L. (2007, December). The Study
about Organizational Life Cycle
Models. The Study about Organizational Life Cycle
Models,8(4), 5-17. Retrieved
September 20, 2016, from
http://www.rmci.ase.ro/Login/no8vol4/Vol8_No4_Article1.pdf
Kinicki, A, Fugate, M. (2016). Organizational Behavior: A
Practical, Problem Solving Approach
(p.256). New York, NY. McGraw Hill.
LLopis, G. (2013, November 4). The 4 Most Effective Ways
Leaders Solve Problems. Retrieved
September 26, 2016, from
http://www.forbes.com/forbes/welcome/?/sites/glennllopis/2013
/11/04/the-4-
most-effective-ways-leaders-solve-problems/
Mosley, R. (2015, May 11). CEOs Need to Pay Attention to
Employer Branding. Retrieved
September 26, 2016, from https://hbr.org/2015/05/ceos-need-
to-pay-attention-to-
employer-branding
Nasar, S. (1993, March 20). Kenneth Boulding, an Economist,
Philosopher and Poet, Dies at 83.
Retrieved September 28, 2016, from
http://www.nytimes.com/1993/03/20/obituaries/kenneth-
boulding-an-economist-
philosopher-and-poet-dies-at-83.html
Organizational communication Definition in the Cambridge
English Dictionary. (n.d.). Retrieved
September 28, 2016, from
http://dictionary.cambridge.org/us/dictionary/english/organizati
onal-communication
Organizational Life Cycle. (n.d.). Retrieved September 25,
2016, from
http://www.inc.com/encyclopedia/organizational-life-cycle.html
Soci110 module 5. (n.d.). Retrieved September 28, 2016, from
http://www.unc.edu/~nielsen/soci410/nm8/nm8.htm
Souba, W. W. (2006, December 30). The Leadership Dilemma.
Journal of Surgical Research,
138(1), 1-9. doi:10.1016/j.jss.2007.01.003
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade71… 1/23
%43
%9
SafeAssign Originality Report
Summer 2021 - InfoTech Import in Strat Plan (ITS-831-A02) -
First Bi-… • Week 6 Research Paper: COSO Framework
%77Total Score: High riskSharath Kumar Goud Madgula
Submission UUID: 8833a14a-8789-6ac7-e006-69653026b6e2
Total Number of Reports
4
Highest Match
93 %
Wk6 COSOFramework.docx
Average Match
77 %
Submitted on
06/11/21
12:20 PM EDT
Average Word Count
1,360
Highest: WK5 HealthcareComputerandInt…
%52Attachment 1
Institutional database (7)
Student paper Student paper Student paper
My paper Student paper Student paper
Student paper
Internet (3)
techtarget jasa-cari-buku yourtermpapers
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 619
PCA2.docx
7 1 5
4 3 6
2
10 8 9
7 Student paper 1 Student paper 5 Student paper
Running Head: PRACTICAL CONNECTION 1
PRACTICAL CONNECTION 4
Practical Connection Assignment
Sharath Kumar Goud Madgula
InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term
Term - Summer 2021
University of the Cumberlands
I have learned that security policy is termed as a group of
policies issued by a specific organization. The policy ensures
that all the IT individuals within the organ-
ization have to comply with rules associated with the security of
the information. All in all, these policies play an important role
in the overall security of an organiza-
tion. Security policy plays an important role in risk
management. Normally, it prevents or possibly reduce the
likelihood of unapproved access, use, cancellation as
well as abuse. Information comes in various forms, hard copy
and soft copy are the common forms of data types (Peltier,
2019). Security policy mainly concentrate on
ensuring privacy, integrity as well as accessibility of
information on the same time ensuring easy approach execution,
all without hampering organization productivity.
Any security policy is tasked with identifying any
organization’s assets as well as all the potential risks to those
assets. In business, security policy may comprise a sat-
isfactory use strategy, a portrayal of how the organization
intends to instruct its staff about securing the organization's
resources, a clarification of how security
policies will be upheld, and a system for assessing the viability
of the security strategy to guarantee that important amendments
will be made. Knowledge in
server virtualization will help me in creating multiple instances
of an operating system - or even multiple different operating
systems - on a single server hardware
system. With this knowledge I can comfortably purchase server
hardware with higher RAM sizes in relation to CPU, and create
maybe 10 or so ‘virtual’ servers - in-
stances of an operating system - and run these on one ‘piece of
tin’. Doing that, you could now use more of the available CPU
and memory, and get a better return on
your hardware investment. Ten individual servers could be
replaced by one slightly larger server. I am aware that as
virtualization systems became more advanced, it
became possible to build clusters of virtual systems with the
ability to restart virtual machines on a different physical server
if one server were to fail (Reynolds & Mc-
1
2
3
4
5
4
6
7
1
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport?attemptId=26751137-
169d-4a21-86d3-
7b6fade71823&course_id=_140054_1&download=true&include
Deleted=true&print=true&force=true
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade71… 2/23
Source Matches (12)
Student paper 100%
Student paper 100%
Student paper 100%
My paper 100%
Student paper 100%
My paper 100%
Student paper 100%
Crory, 2018). Having knowledge in server virtualization plays a
huge role since prior to this, when a server had a hardware
failure it could takes days or weeks to get
the application back up and running. And not much later the
ability to migrate a virtual machine from one physical server to
another without any downtime took the
concept up a notch. Now I can easily perform hardware
maintenance as well as even replacements without taking any
business applications offline. Virtualization
means better use of hardware by allowing multiple operating
systems to run in parallel on it, thus imposing a much more
strict application separation than the one
provided by a “regular operating system” only. You still need
the different applications, so you may have only one piece of
hardware, but now you have to pay for the
hardware, you have to pay for the hypervisor, you have to pay
for the applications that you need and you have to pay for the
necessary operating systems (one li-
cense per VM). The big advantage is the better use of hardware,
you have only 1 piece of hardware where you run what
previously was running on a 1 hardware - 1
OS type of relationship.
Reference
Peltier, T. R. (2019). Information Security Policies, Procedures,
and Standards: Guidelines for Effective Information Security
Management. Boca Raton, FL: CRC
Press. Marshall, D., Reynolds & McCrory, D. (2018). Advanced
Server Virtualization: VMware and Microsoft Platforms in the
Virtual Data Center. Boca Raton,
FL: CRC Press.
8
9 10
1
Student paper
PRACTICAL CONNECTION 1
Original source
PRACTICAL CONNECTION 1
2
Student paper
PRACTICAL CONNECTION 4
Original source
PRACTICAL CONNECTION 4
3
Student paper
Practical Connection Assignment
Original source
Practical Connection Assignment
4
Student paper
Sharath Kumar Goud Madgula
Original source
Sharath Kumar Goud Madgula
5
Student paper
InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term
Original source
InfoTech Import in Strat Plan (ITS-831-A02) - First Bi-Term
4
Student paper
Term - Summer 2021
Original source
Term - Summer 2021
6
Student paper
University of the Cumberlands
Original source
University of the Cumberlands
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade71… 3/23
%67
%7
Student paper 90%
Student paper 66%
jasa-cari-buku 88%
yourtermpapers 100%
techtarget 100%
%74Attachment 2
Institutional database (9)
Student paper Student paper Student paper
Student paper My paper Student paper
Student paper Student paper Student paper
Internet (1)
chromeinfotech
Top sources (3)
Excluded sources (0)
7
Student paper
I have learned that security policy is termed as a group of
policies issued by a specific or-
ganization. The policy ensures that all the IT individuals within
the organization have to
comply with rules associated with the security of the
information. All in all, these policies
play an important role in the overall security of an organization.
Original source
A BYOD security policy is termed as a group of policies issued
by a specific organization
The policy ensures that all the IT individuals within the
organization have to comply with
rules associated with the BYOD security of the information
(Rai, 2015 All in all, these
policies play an important role in the overall security of an
organization
1
Student paper
Knowledge in server virtualization will help me in creating
multiple instances of an oper-
ating system - or even multiple different operating systems - on
a single server hardware
system.
Original source
Importance of Physical Security and Server Virtualization,
which allows us to create mul-
tiple different instances of an operating system on a single
server hardware system
8
Student paper
Information Security Policies, Procedures, and Standards:
Original source
Peltier Information Security Policies, Procedures, and Standards
9
Student paper
Advanced Server Virtualization:
Original source
Advanced Server Virtualization
10
Student paper
VMware and Microsoft Platforms in the Virtual Data Center.
Original source
VMware and Microsoft Platforms in the Virtual Data Center
Word Count: 1,516
WK4 ServerVirtualization.docx
1 2 4
5 3 10
8 7 9
6
1 Student paper 2 Student paper 6 chromeinfotech
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade71… 4/23
Running Head: SERVER VIRTUALIZATION 1
SERVER VIRTUALIZATION 8
Lynknet Case Study for Virtualization Sharath Kumar Goud
Madgula
InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term
Term - Summer 2021
University of the Cumberlands
Lynknet Case Study for Virtualization
Lynket is an imaginary firm in the storage manufacturing
industry. This research study intend to elaborate the server
virtualization concept using Microsoft virtu-
alization software from Windows server 2012R2.
Organization’s Preparedness for Virtualization. Currently, the
Lynket IT system design is a mishmash of legacy frameworks
that were obtained through vari-
ous acquisitions of different providers in the storage industry.
In any case, these old frameworks are aging and will soon need
to be upgraded. These old frame-
works however support Lynknet applications that have been in
service for the last decade. The IT system situated in one of
Lynket branch in Asia for instance
comprise of old servers that have been in service for the last
decade. These legacy servers were installed to host various
company applications. The cost for
license of these old applications are presently being inspected to
check whether they can be dropped and the information moved
to current Lynknet Enterprise Re-
source Planning (ERP) applications. Consequently, since several
IT related components are potential contender for upgrading,
this makes the likelihood of changing
over current physical server farms into virtualized computing
resources appropriate.
Microsoft Licensing of Virtualized Environments
Microsoft cline have an option to license a Windows Server
Standard or Windows Server Datacenter. In any case every
physical server component must be licensed.
Windows Server license allow clients to run more than two
instances of Standard per license Server or two guest unlimited
instances of Windows Server Datacenter
per License Server (Reynolds & McCrory, 2016). Clients in
need of more than two virtual machines on a server licensed for
Standard version have the alternative of
relicensing the entirety of the physical centers on the server to
allow two extra running instances. Furthermore, if the Physical
OSE is used distinctly to help vir-
tual machines remaining load, similar licenses grant utilization
of Windows Server as the host working framework. On the off
chance that clients are moving workload
between Licensed Servers, every one of those servers must be
completely authorized to help the remaining load. License
Mobility across Server Farms isn't accessible
for Windows Server, so every server must be licensed for top
limit consistently.
Shared Storage Considerations
In deciding which shared storage to use there are several factors
that one must put into consideration. To start with one must
consider the provider, provider
must be well established as well as have proper knowledge of
the services and also have trained staff to assist in times of
breakdown. Bandwidth is another
factor to consider, shared storage needs high bandwidth to
enable easy access as well as retrieval of information at any
time. Shared storage service cost should also
be considered where by it should be reasonable as well as
negotiable. Storage capacity as well as resilience to failure must
also be put into consideration. There
should be enough storage capacity to address any future
expansion, the system should also be solid and able to withstand
failure.
Building High-Availability (HA) into Shared Storage. High
availability (HA) comprise building redundancy into shared
storage that ensures that in an event one
gadget fails, others will take charge and ensures that the entire
system doesn’t fail. This is same as having a backup power
generator where in an event of blackout
the generator will take charge. Building high availability in
shared storage start with making use of available components
within the system. For instance, availability
of routers as well as switches gives you an upper hand in
building high availability. Many of this connectivity devices
support protocol that enhance redundancy. Main
protocol to use so as to enhance high availability include
standby router protocol as well as virtual routing redundancy
protocol which enable back up router to take
over in an event of failure (Blokdyk, 2019). Next, one need to
extend redundancy on the entire tiers within the network. In an
event there are some files and docu-
ment that are regularly accessed, then they should be easily
accessed internally as well as remotely. This can be achieved by
adding a second internet link from your
provider. NIC teaming where several network cards appears as
one interface on a server enhances high availability by
providing a backup card in case one fails.
Building Redundancy into Shared Storage. Erasure coding (of
which RAID is a simple subset) only applies when data is
replicated, and allows protection against N
failures to be achieved with far less total storage than N+1
copies. Downsides include the need to read/modify/write
(instead of just write) when updating, and a high
I/O cost for rebuilding data after a failure.
1
2
3
2
1
2
1 2
1
2
1 2
1
4
1
1
5
1
1
2
Again, these effects are magnified in a distributed system.
Compression takes advantage of the redundancy within each
piece of data (eg block or file) to encode it
more efficiently. Hitches include having to
decompress/recompress objects when they're rewritten, plus a
more complex relationship between user-perceived offsets
and actual storage offsets. Care must also be taken when
combining compression with encryption (Blokdyk, 2019).
Deduplication takes advantage of the redund-
ancy between pieces of data to store multiple copies once and
then keep pointers to that one copy. Downsides include the high
cost of detecting duplicates and the
need to keep reference counts on the stored chunks to know
when they can be deleted. Both of these costs are magnified if
the storage system is distributed.
Windows Azure Cloud Services
Windows Azure enables subscribers to create no-code web apps
and code based web apps. It provides Artificial Intelligence
components in building those apps. It en-
ables you to host and migrate, your databases to the Cloud.
Doing this means your databases are accessible, to you, via a
browser. Analysis services including Ma-
chine Learning prediction are provided via the Azure Machine
Learning Studio hosted by Azure (Luescher & Flynn, 2018).
Virtual Machines are made available to host
your applications and data if you need to use them. Cloud
Storage is also available without having to purchase expensive
VM’s. You pay for what you use, not for, one-
1
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade71… 5/23
Source Matches (38)
Student paper 100%
Student paper 100%
My paper 89%
Student paper 100%
Student paper 72%
off, purchasing fees. Below is a list of Azure cloud services
A. Messaging Services: One of the interesting features of
Microsoft Azure is the Azure Service Bus which facilitates
Software Applications running either on
premise or off-premise to communicate with the Azure Cloud
facility. B. Mobile Engagement Services: This feature facilitates
Users to monitor and manage the User
Engagement that their Mobile applications are drawing in. It
also supports real-time tracking of data analytics which
provides a deeper perspective into User behavior.
C. WebApps: Webapps is a high-density Website hosting
Service that allows developers to quickly build Web
applications using ASP.NET | Open-source web
framework for .NET, PHP, Node.Js, Python and also deploy it
to the Azure Cloud. D. Availability of Virtual Machines: Falling
under Azure’s IaaS facility, this feature
enables Users to launch their general-purpose Virtual Machines
that are developed in either Windows or Linux Platform. E.
Availability of App Services: This falls under
Azure’s PaaS Service Section. Through the Azure App Services
one can easily publish as well as manage their Business Web
Applications and Websites.
Why Lynknet Should Consider Windows Azure
For an international companies like Lynknet, Windows Azure
will provides easy access to data on any device. Data created on
premise model and lost due to the
crash of the website or because of any disaster is too hard to
recover whereas one can recover data very easily if it was made
available on the Microsoft Azure. Most
of the companies feel trepidation in using the cloud services as
data created over on premise models allow direct control over
security measures but one can use the
Azure cloud services because they provide 24/7 unified security
management across hybrid cloud networks. One of the key
reason for using Azure is cost saving. Cre-
ating data over on premise models involves the deployment of
myriads of resources whereas Azure markets up to 72% saving
with pay-as-you-go pricing. Any type of
information stored on Azure meets regulatory standards, this
make Azure accommodating mostly for the legal or the
monetary sectors. On top of that, it is developed
with security aspect in mind hence favorable for any business.
Azure is well known for having a few server farms and
conveyance focuses. That conveys the content
quicker, and on top of that helps users in sharing information
across the globe with ease.
Reference
Marshall, D., Reynolds & McCrory, D. (2016). Advanced Server
Virtualization: VMware and Microsoft Platforms in the Virtual
Data Center. Boca Raton, FL: CRC
Press. Carpenter, T. (2018). Microsoft Windows Server
Administration Essentials. Hoboken, NJ: John Wiley & Sons.
Blokdyk, G. (2019). Shared Storage A Complete
Guide - 2020 Edition. NJ: 5starcooks. Savill, J. (2019).
Microsoft Azure Infrastructure Services for Architects:
Designing Cloud
Solution
s. Hoboken, NJ: John Wiley &
Sons. Finn, Luescher & Flynn. (2018). Windows Server 2012
Hyper-V Installation and Configuration Guide. Hoboken, NJ:
John Wiley & Sons.
6
6
6
6
7
1
1
8
8
9 10 8
1
Student paper
SERVER VIRTUALIZATION 1
Original source
SERVER VIRTUALIZATION 1
2
Student paper
SERVER VIRTUALIZATION 8
Original source
SERVER VIRTUALIZATION 8
3
Student paper
Lynknet Case Study for Virtualization Sharath Kumar Goud
Madgula InfoTech Import in
Strat Plan (ITS-831-A02) – First Bi-Term Term - Summer 2021
Original source
Sharath Kumar Goud Madgula InfoTech Import in Strat Plan
(ITS-831-A02) – First Bi-Term
Term - Summer 2021
2
Student paper
University of the Cumberlands
Original source
University of the Cumberlands
1
Student paper
Lynknet Case Study for Virtualization
Original source
Econet Case Study for Virtualization
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade71… 6/23
Student paper 91%
Student paper 100%
Student paper 92%
Student paper 71%
Student paper 85%
Student paper 78%
Student paper 93%
Student paper 89%
2
Student paper
This research study intend to elaborate the server virtualization
concept using Microsoft
virtualization software from Windows server 2012R2.
Original source
This paper intend to elaborate the server virtualization concept
using Microsoft virtualiza-
tion software from Windows server 2012R2
1
Student paper
Organization’s Preparedness for Virtualization.
Original source
Organization’s Preparedness for Virtualization
2
Student paper
Currently, the Lynket IT system design is a mishmash of legacy
frameworks that were ob-
tained through various acquisitions of different providers in the
storage industry. In any
case, these old frameworks are aging and will soon need to be
upgraded.
Original source
As of now, the IT system design is a mishmash of old
frameworks that were obtained
through various acquisitions of different providers in the
storage industry In any case,
these old frameworks are aging and will soon need to be
upgraded
1
Student paper
These old frameworks however support Lynknet applications
that have been in service
for the last decade.
Original source
These legacy frameworks, however, support Econet applications
that have been in service
for the last twenty years
2
Student paper
The IT system situated in one of Lynket branch in Asia for
instance comprise of old serv-
ers that have been in service for the last decade.
Original source
The IT system situated in one of Technet branch in Asia for
instance comprise of old serv-
ers that have been in service for the last 5 years
1
Student paper
These legacy servers were installed to host various company
applications.
Original source
Econet installed these old servers to host various company
applications
2
Student paper
The cost for license of these old applications are presently
being inspected to check
whether they can be dropped and the information moved to
current Lynknet Enterprise
Resource Planning (ERP) applications. Consequently, since
several IT related components
are potential contender for upgrading, this makes the likelihood
of changing over current
physical server farms into virtualized computing resources
appropriate.
Original source
The expense for permit of these old applications are presently
being inspected to check
whether they can be dropped and the information moved to
current Technet Enterprise
Resource Planning (ERP) applications Consequently, since
several IT related components
are potential contender for upgrading, this makes the likelihood
of changing over current
physical server farms into virtualized computing resources
appropriate
1
Student paper
Microsoft Licensing of Virtualized Environments Microsoft
cline have an option to license
a Windows Server Standard or Windows Server Datacenter. In
any case every physical
server component must be licensed. Windows Server license
allow clients to run more
than two instances of Standard per license Server or two guest
unlimited instances of
Windows Server Datacenter per License Server (Reynolds &
McCrory, 2016).
Original source
Microsoft Licensing of Virtualized Environments Microsoft
clients have an option to either
license a Windows Server Standard or Windows Server
Datacenter Initially, every physical
server component must be licensed Windows Server license
allows clients to run more
than two instances of Standard per license Server or two guest
unlimited instances of
Windows Server Datacenter per License Server (Lamping, 2014)
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade71… 7/23
Student paper 97%
Student paper 82%
Student paper 100%
Student paper 70%
Student paper 90%
Student paper 100%
Student paper 95%
1
Student paper
Clients in need of more than two virtual machines on a server
licensed for Standard ver-
sion have the alternative of relicensing the entirety of the
physical centers on the server
to allow two extra running instances.
Original source
Clients in need of more than two virtual machines on a server
licensed for Standard ver-
sion have the alternative of relicensing the entirety of the
physical centers on the server
to allow two other running instances
4
Student paper
Furthermore, if the Physical OSE is used distinctly to help
virtual machines remaining
load, similar licenses grant utilization of Windows Server as the
host working framework.
On the off chance that clients are moving workload between
Licensed Servers, every one
of those servers must be completely authorized to help the
remaining load. License Mo-
bility across Server Farms isn't accessible for Windows Server,
so every server must be li-
censed for top limit consistently.
Original source
Moreover, if the Physical OSE is utilized distinctly to help VM
outstanding burdens, similar
licenses grant utilization of Windows Server as the host
working framework On the off
chance that clients are moving remaining tasks at hand between
Licensed Servers, every
one of those servers must be completely authorized to help the
outstanding burdens Per-
mit Mobility across Server Farms isn't accessible for Windows
Server, so every server
must be authorized for top limit consistently
1
Student paper
Shared Storage Considerations
Original source
Shared Storage Considerations
1
Student paper
To start with one must consider the provider, provider must be
well established as well as
have proper knowledge of the services and also have trained
staff to assist in times of
breakdown.
Original source
First of all, one must consider the provider, the provider must
be well-vetted, and they
must have proper knowledge of the services and also have
trained staff to provide
support
5
Student paper
Bandwidth is another factor to consider, shared storage needs
high bandwidth to enable
easy access as well as retrieval of information at any time.
Shared storage service cost
should also be considered where by it should be reasonable as
well as negotiable.
Original source
Bandwidth is another factor to consider, and shared storage
needs high bandwidth to en-
able easy access and retrieval of information at any time
(Paulsen, 2019) Shared storage
service cost should also be considered, whereby it should be
reasonable as well as
negotiable
1
Student paper
Storage capacity as well as resilience to failure must also be put
into consideration.
Original source
Storage capacity, as well as resilience to failure, must also be
put into consideration
1
Student paper
Building High-Availability (HA) into Shared Storage. High
availability (HA) comprise build-
ing redundancy into shared storage that ensures that in an event
one gadget fails, others
will take charge and ensures that the entire system doesn’t fail.
This is same as having a
backup power generator where in an event of blackout the
generator will take charge.
Building high availability in shared storage start with making
use of available components
within the system.
Original source
Building High-Availability (HA) into Shared Storage High
availability (HA) comprises build-
ing redundancy into shared storage that ensures that in an event
one gadget fails, others
will take charge and ensures that the entire system doesn’t fail
This is the same as having
a backup power generator wherein an event of blackout the
generator will take charge
Building high availability in shared storage starts with maki ng
use of available compon-
ents within the system
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade71… 8/23
Student paper 89%
Student paper 100%
Student paper 94%
Student paper 84%
Student paper 82%
Student paper 62%
chromeinfotech 69%
chromeinfotech 63%
1
Student paper
For instance, availability of routers as well as switches gives
you an upper hand in build-
ing high availability. Many of this connectivity devices support
protocol that enhance
redundancy.
Original source
For instance, the availability of routers as well as switches
gives you an upper hand in
building high availability Many of these connectivity devices
support protocol that en-
hances redundancy
2
Student paper
Building Redundancy into Shared Storage.
Original source
Building Redundancy into Shared Storage
1
Student paper
Care must also be taken when combining compression with
encryption (Blokdyk, 2019).
Deduplication takes advantage of the redundancy between
pieces of data to store mul-
tiple copies once and then keep pointers to that one copy.
Downsides include the high
cost of detecting duplicates and the need to keep reference
counts on the stored chunks
to know when they can be deleted. Both of these costs are
magnified if the storage sys-
tem is distributed.
Original source
Care must also be taken when combining compression with
encryption Deduplication
takes advantage of the redundancy between pieces of data to
store multiple copies once
and then keep pointers to that one copy (Leep, 2015) Downsides
include the high cost of
detecting duplicates and the need to maintain reference counts
on the stored chunks to
know when they can be deleted Both of these costs are
magnified if the storage system is
distributed
1
Student paper
Windows Azure Cloud Services Windows Azure enables
subscribers to create no-code
web apps and code based web apps. It provides Artificial
Intelligence components in
building those apps. It enables you to host and migrate, your
databases to the Cloud.
Original source
Windows Azure Cloud Services Windows Azure enables users
to create no-code web apps
and code-based web apps It provides smart components in
building those apps It allows
users to host and migrate their databases to the Cloud
1
Student paper
Doing this means your databases are accessible, to you, via a
browser. Analysis services
including Machine Learning prediction are provided via the
Azure Machine Learning Stu-
dio hosted by Azure (Luescher & Flynn, 2018). Virtual
Machines are made available to
host your applications and data if you need to use them. Cloud
Storage is also available
without having to purchase expensive VM’s.
Original source
Doing this means your database is accessible via a browser
Analysis services, including
Machine Learning prediction, are provided via the Azure
Machine Learning Studio hosted
by Azure (Redkar, 2015) Virtual Machines are made available
to host applications as well
as data Cloud Storage is also available without having to
purchase expensive VM’s
1
Student paper
You pay for what you use, not for, one-off, purchasing fees.
Original source
You pay for what you use
6
Student paper
One of the interesting features of Microsoft Azure is the Azure
Service Bus which facilit-
ates Software Applications running either on premise or off-
premise to communicate
with the Azure Cloud facility.
Original source
Yes, Microsoft Azure features list also consists of an Azure
Service bus through which
software applications that run on either Azure on-premises or
even off-premises commu-
nicate with the Azure cloud facility
6
Student paper
Webapps is a high-density Website hosting Service that allows
developers to quickly build
Web applications using ASP.NET | Open-source web framework
for .NET, PHP, Node.Js,
Python and also deploy it to the Azure Cloud.
Original source
Through this, developers and programmers can build websites
and web applications us-
ing Asp.Net | PHP | Node.JS | Python and quickly deploy to the
Azure cloud using the
FTP, Git, Team foundation server and Mercurial also
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade71… 9/23
chromeinfotech 64%
chromeinfotech 91%
Student paper 80%
Student paper 75%
Student paper 65%
Student paper 100%
Student paper 100%
Student paper 73%
6
Student paper
Falling under Azure’s IaaS facility, this feature enables Users to
launch their general-pur-
pose Virtual Machines that are developed in either Windows or
Linux Platform.
Original source
Users can launch their general-purpose virtual machines
developed in windows or Linux
platforms
6
Student paper
Through the Azure App Services one can easily publish as well
as manage their Business
Web Applications and Websites.
Original source
Through Azure App Services, you can easily publish as well as
manage your websites and
business web applications
7
Student paper
Why Lynknet Should Consider Windows Azure
Original source
Why The Organization Should Consider Windows Azure
1
Student paper
For an international companies like Lynknet, Windows Azure
will provides easy access to
data on any device.
Original source
Windows Azure provides easy access to data on any device
1
Student paper
Advanced Server Virtualization:
Original source
SERVER VIRTUALIZATION 1
8
Student paper
John Wiley & Sons.
Original source
John Wiley & Sons
8
Student paper
John Wiley & Sons.
Original source
John Wiley & Sons
9
Student paper
Finn, Luescher & Flynn.
Original source
(Finn, Lownds, Luescher & Flynn, 2013)
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade7… 10/23
%89
%0
Student paper 100%
Student paper 100%
%89Attachment 3
Institutional database (9)
Student paper Student paper Student paper
Student paper Student paper Student paper
Student paper Student paper My paper
Global database (1)
Student paper
Top sources (3)
Excluded sources (0)
10
Student paper
Windows Server 2012 Hyper-V Installation and Configuration
Guide.
Original source
Windows Server 2012 Hyper-V Installation and Configuration
Guide
8
Student paper
John Wiley & Sons.
Original source
John Wiley & Sons
Word Count: 1,740
WK5 HealthcareComputerandInternetPolicy.docx
1 6 5
8 4 9
7 3 2
10
1 Student paper 6 Student paper 5 Student paper
Running Head: HEALTHCARE SECURITY POLICY 1
HEALTHCARE SECURITY POLICY 9
Healthcare Security Policy
Sharath Kumar Goud Madgula
InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term
Term - Summer 2021
University of the Cumberlands
Purpose This security policy highlights guidelines and
provisions for maintaining data security and technology
infrastructure. The more we rely on technology to
gather, store as well as manage information, the more exposed
we are to security breaches. Mistakes caused by humans, system
flaws and attacks by hackers can
cause a serious financial as well as national security harm. This
security policy have introduced several security measures as
well as guidelines that can be used to
mitigate security risks.
Scope
This policy applies to all employees within the organization,
suppliers, interns as well as anyone who has permanent or
temporary access to organization sys-
tems as well as network.
General Policy and Guidelines
Technet embraces a decent computer use policy. Technet
doesn’t have assets to screen every day network action, record
use, email, internet access or a large num-
ber of different things that help employees at their work. In any
case, Technet claim all authority to step in and authorize rules
that haven't been adhered to and ad-
vice recurrent guilty parties. The requirement for a policy
emerges to some degree from the need to give employees a
predictable, steady, secure workplace. To attain
1
1
2
3
2
4
5
5
6
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade71… 11/23
this, Technet have to set up general standards of conduct
concerning PC, applications and system use in order to
productively use the restricted resources accessible.
Responsibilities
The Chief Information Security Officer: is liable for creating,
maintaining, implementing and overseeing Technet information
frameworks security policy. While
obligation regarding information frameworks security on a daily
basis is each user obligation, specific direction and authority for
information system security is integ-
rated for the entire department information. Information system
threat assessment will be conducted by the IT department so as
to come up with information sys-
tem action plans, assess system security as well as perform
different actions critical to guarantee a secured information
frameworks setup. Information Security Man-
ager: is liable for planning assessment related to any computer
security breaches, attacks or issues with the IT infrastructure
services. Any breaches or potential
breaches must be reported immediately to the IT department.
Infrastructure administrator: is answerable for updating the
security administrator. They are an-
swerable for acting as local data system security controllers.
They are answerable for building up proper user rights,
monitoring access control logs as well as con-
ducting comparable security actions for the systems they
monitor. They are also answerable for listing all suspicious PC
and system security-based actions to the Se-
curity Administrator. System heads also implements the
prerequisites of this and other information system security
policies, benchmarks, rules, and methodology. If
a framework is monitored or owned by a third party, the
department chief of the group renting the administrations plays
out the activities of the system adminis-
trator. IT heads: are liable for ensuring that all departments
adhere to the set system safety measures. Apart from
distributing necessary assets as well as user
time to attain the prerequisites of these policies, department
supervisors are answerable for guaranteeing that all users are
conversant to the Technet policies related
to system security. All Heads of departments: are liable in
ensuring that proper system safety efforts are observed by all
users. Department heads are answer-
able in ensuring that all users are aware of Technet computer
system policies. Users are answerable for consenting to
different Technet system security policies. They
are additionally answerable for reporting any system
vulnerability they come across while working on the system.
Password Protection Policy
The password is one of the important factors of security.
Password is used to protect data and personal information.
Every gadget as well as system connected to
Technet network must be password protected (Seitz, 2019). The
password must contain more than 8 characters and should be
combination of uppercase, lowercase
letters, numbers, and special symbols. The reason behind this is
that it makes password strong and hard to guess. Employees are
discouraged to use obvious inform-
ation as password, for example your name or surname, birth
date, address etc. The general idea of password is for user
verification, that’s why it’s important to have
a strong, at least 8 characters alphanumeric password.
Passwords are they key to your finances or any sensitive and
personal things. Passwords must contain special
characters to maintain the strength of the password. A secure
password must have alphanumeric character and special symbol
and keep your account safe from
hacking. Users are discouraged to use their name, nickname and
mobile number as their password because this type of password
is easily guessable.
1
1
1
1
1
Employees are advised to use something as random and complex
as possible, but make sure it still relates to something so you
can remember it (sdfkj830#$$#sdf is
not as good a password as th1515apa$$word). Computer and e-
mail Use Acceptable Policy
Technet staff are urged to send personal email and carryout
similar exercises individually at whatever point conceivable
(Macdonald, 2019). In any case, the peri-
odic personal use of email as well as other shared information
systems while at work is allowed within sensible limits. ·
Personal messages are dealt with equivalent
to other messages in the system, which could conceivably be
archived every once in a while and along these lines subject to
recovery considerably after the user be-
lieves to have erased them. · Technet reminds each employee
that every visit to the internet as well as email exchange uses
Technet name. Therefore use of any re-
sources must be precise, proper, and ought not to subject
Technet to potential risk. · Technet employees must protect
their email passwords, known distinctly to
themselves whenever. In any case, the IT department holds the
capacity to erase an employee’s secret key in any way
comprising resetting the password whenever
forgotten or to check an account’s mail if important. Technet
internet should not be used to get to or get or download any
material that might be viewed as annoying,
problematic, or hostile by other people.
Email Attachment · Any unknown email attachments is deleted
without opening. On the off chance that the attachment appears
to be suspicious, contact the IT De-
partment. · Email attachments that come from a known source
must be scanned for viruses. It is an offence to disable scanning
settings from any computer. · Attach-
ments are not to surpass 1.5 M, or ~1500K. Attachments bigger
than this are probably going to crash your email server and
additionally cause issues with the mail
server. · In the event that you realize you will need to send a
huge file ahead of time, notify the IT department for
arrangements. Computer Use Acceptable Policy
Users must keep affirmed and latest anti-virus program installed
on their PCs. This programs must be applied to check all third
party applications or different
Technet units and must occur before the new applications are
used. Users must not sidestep scanning process that could stop
the transmission of PC virus (Peltier,
2019). Users are answerable for harm happening in light of
virus on PC frameworks under their control. When a virus is
recognized, the involved user must quickly re-
port to the IT department to guarantee that no further spread
takes place and that any specialists expected to annihilate the
virus are expeditiously locked in.
Computer as well as communication system rights of every user,
system and programs must be confined dependent on nature of
work. This means that rights
must not be extended unless the user needs such rights
(Anandarajan & Simmers, 2019). Default user file
authorizations ought not to automatically permit everyone
on the system to read, write, execute or erase a file record. Even
if the user may reset consents on a file by-document premise,
such sensitive default document rights
are disallowed. Default file consents granted to limited group of
users who have a veritable need to know are permitted.
Internet Acceptable use Policy
Only approved personnel can access Technet network. Users are
given certain rights and unique user passwords. None of these
information can be revealed or par-
taken in any way with other individuals or carelessly stored in a
place where it can be seen by everyone. Users must change their
passwords after every four weeks
following the organization password policy. Users must also
ensure that their wireless devices are installed with anti-virus
and firewall software before joining the or-
ganization network (Schou & Shoemaker, 2019). In an event of
any inquiries or doubts, it is prescribed to refer to Information
security support group for help.
Wireless Network Acceptable use Policy · Every Access Points
must adhere to all national regulations concerning Wireless
gadget. · Every Access Points on the network
must follow the suggested provisions as dictated by Information
security. · Procurement of new Access Points must be approved
by Information security department,
as defined by the current procurement policy as well as the
organization Information Technology Standardization initiative.
· Every Access Points on the network must
observe the standard Access Points configuration set by
information security team. · Information Security forbid the
installation of any Access points that does not
meet the agreed standards. · Wireless networks control and
management will be carried out by Information · Security on a
daily basis and any unapproved Access
Point will be deactivated from the network. Policy Enforcement
7
6
7
1
8
1
7
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemp tId=26751137
-169d-4a21-86d3-7b6fade7… 12/23
Source Matches (39)
Student paper 81%
Student paper 64%
My paper 100%
Student paper 100%
My paper 100%
Student paper 100%
There is need for all involved parties to comply with this policy
and where requested to exhibit such compliance. Failure to
observe this policy will be
viewed as a disciplinary incident and one may face disciplinary
action which may including termination of employment.
9 1
Reference
Peltier, T. R. (2019). Information Security Policies, Procedures,
and Standards: Guidelines for Effective Information Security
Management. Boca Raton, FL: CRC
Press. Schou & Shoemaker, D. (2019). Information assurance
for the enterprise: A roadmap to information security. Boston:
McGraw-Hill Irwin. Mac-
donald, L. (2019). Email and internet policies and guidance
notes. Tolley's Managing Email & Internet Use, 218-278.
doi:10.1016/b978-0-7545-2443-4.50010-
9
Anandarajan & Simmers. (2019). Managing Web Usage in the
Workplace: A Social, Ethical and Legal Perspective. Hershey,
PA: IGI Global. Organizational in-
formation security policies: a review and research framework.
(2018, February 15). Retrieved from
https://www.tandfonline.com/doi/abs/10.1057/s41303-017-0059-
9
Shim, J. K., Qureshi & Siegel. (2018). The international
handbook of computer security. Chicago: Glenlake Pub. Seitz,
T. (2019). Supporting users in password
authentication with persuasive design. Tobias Seitz. Rhodes-
Ousley & Strassberg, K. (2018). Network security: The
complete reference. McGraw-Hill Osborne Media.
1
5 5 5
4 10
6 6
5 5
1
Student paper
HEALTHCARE SECURITY POLICY 1
Original source
SECURITY POLICY 1
1
Student paper
Healthcare Security Policy
Original source
IT Security Policy
2
Student paper
Sharath Kumar Goud Madgula
Original source
Sharath Kumar Goud Madgula
3
Student paper
InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term
Original source
InfoTech Import in Strat Plan (ITS-831-A02) - First Bi-Term
2
Student paper
Term - Summer 2021
Original source
Term - Summer 2021
4
Student paper
University of the Cumberlands
Original source
University of the Cumberlands
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ul tra?attemptId=26751137
-169d-4a21-86d3-7b6fade7… 13/23
Student paper 95%
Student paper 79%
Student paper 89%
Student paper 91%
Student paper 89%
Student paper 96%
5
Student paper
Purpose This security policy highlights guidelines and
provisions for maintaining data se-
curity and technology infrastructure. The more we rely on
technology to gather, store as
well as manage information, the more exposed we are to
security breaches. Mistakes
caused by humans, system flaws and attacks by hackers can
cause a serious financial as
well as national security harm. This security policy have
introduced several security meas-
ures as well as guidelines that can be used to mitigate security
risks.
Original source
Purpose of the Policy This security policy highlights guidelines
and provisions for main-
taining data security and technology infrastructure The more we
depend on technology
to gather, store as well as manage information, the more
vulnerable we are to security
breaches Mistakes caused by humans, system flaws and attacks
by hackers can cause a
serious financial as well as national security harm This security
policy have introduced
several security measures as well as guidelines that can be used
to mitigate security risks
5
Student paper
This policy applies to all employees within the organization,
suppliers, interns as well as
anyone who has permanent or temporary access to organization
systems as well as
network.
Original source
Scope This policy applies to all our workers, suppliers, interns
as well as anyone who has
permanent or temporary access to our systems and network
6
Student paper
General Policy and Guidelines Technet embraces a decent
computer use policy. Technet
doesn’t have assets to screen every day network action, record
use, email, internet access
or a large number of different things that help employees at
their work. In any case, Tech-
net claim all authority to step in and authorize rules that haven't
been adhered to and ad-
vice recurrent guilty parties.
Original source
General Policy and Guidelines Econet embraces a decent
computer use policy Econet
doesn’t have assets to screen everyday network action, record
use, email, internet access
or a large number of different things that help employees at
their work In any case, we
claim all authority to step in and authorize rules that haven't
been adhered to and advise
recurrent guilty parties
6
Student paper
The requirement for a policy emerges to some degree from the
need to give employees a
predictable, steady, secure workplace. To attain this, Technet
have to set up general
standards of conduct concerning PC, applications and system
use in order to productively
use the restricted resources accessible.
Original source
The requirement for a policy emerges to some degree from the
need to give you a pre-
dictable, steady, secure workplace To do that, we have to set up
general standards of
conduct concerning PC, applications and system use in order
productively use the restric-
ted resources accessible
1
Student paper
is liable for creating, maintaining, implementing and overseeing
Technet information
frameworks security policy. While obligation regarding
information frameworks security
on a daily basis is each user obligation, specific direction and
authority for information
system security is integrated for the entire department
information. Information system
threat assessment will be conducted by the IT department so as
to come up with inform-
ation system action plans, assess system security as well as
perform different actions crit-
ical to guarantee a secured information frameworks setup.
Original source
The Chief Information Security Officer is liable for creating,
maintaining, implementing,
overseeing as well as deducing DoD information frameworks
security policy, benchmar ks,
rules, and strategies While obligation regarding information
frameworks security on a
daily basis is each user obligation, specific direction and
authority for information system
security is integrated for the entire department information
Information system threat
assessment will be conducted by the IT department so as to
come up with information
system action plans, assess system security as well as perform
different actions critical to
guarantee a secured information frameworks setup
1
Student paper
is liable for planning assessment related to any computer
security breaches, attacks or
issues with the IT infrastructure services. Any breaches or
potential breaches must be re-
ported immediately to the IT department.
Original source
Information Security Manager is liable for planning assessment
related to any computer
security breaches, attacks or issues with the IT Infrastructure
Services Any breaches or
potential breaches must be reported immediately to the IT
department
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade7… 14/23
Student paper 94%
Student paper 97%
Student paper 94%
Student paper 91%
Student paper 69%
Student paper 88%
1
Student paper
is answerable for updating the security administrator. They are
answerable for acting as
local data system security controllers. They are answerable for
building up proper user
rights, monitoring access control logs as well as conducting
comparable security actions
for the systems they monitor. They are also answerable for
listing all suspicious PC and
system security-based actions to the Security Administrator.
Original source
Infrastructure administrator is answerable for updati ng the
Security Administrator They
are answerable for acting as local data system security
controllers They are answerable
for building up proper user rights, monitoring access control
logs as well as conducting
comparable security actions for the systems they monitor
(Blokdyk, 2020) They are also
answerable for listing all suspicious PC and system security-
based actions to the Security
Administrator
1
Student paper
System heads also implements the prerequisites of this and
other information system se-
curity policies, benchmarks, rules, and methodology. If a
framework is monitored or
owned by a third party, the department chief of the group
renting the administrations
plays out the activities of the system administrator.
Original source
System heads also implements the prerequisites of this and
other information system se-
curity policies, benchmarks, rules, and methodology If a
framework is overseen or owned
by a third party, the department chief of the group renting the
administrations plays out
the activities of the system administrator
1
Student paper
are liable for ensuring that all departments adhere to the set
system safety measures.
Apart from distributing necessary assets as well as user time to
attain the prerequisites of
these policies, department supervisors are answerable for
guaranteeing that all users are
conversant to the Technet policies related to system security.
Original source
IT heads are liable for ensuring that all departments adhere to
the set system safety
measures Apart from distributing necessary assets as well as
user time to attain the pre-
requisites of these policies, department supervisors are
answerable for guaranteeing that
all users are conversant to the DoD policies related to system
security
1
Student paper
are liable in ensuring that proper system safety efforts are
observed by all users. Depart-
ment heads are answerable in ensuring that all users are aware
of Technet computer sys-
tem policies. Users are answerable for consenting to different
Technet system security
policies. They are additionally answerable for reporting any
system vulnerability they
come across while working on the system.
Original source
All Heads of departments are liable in ensuring that proper
system safety efforts are ob-
served by all users Department heads are answerable in ensuring
that all users are aware
of DoD computer system policies Users are answerable for
consenting to different DoD
system security policies They are additionally answerable for
reporting any system vul-
nerability they come across while working on the system
7
Student paper
Computer and e-mail Use Acceptable Policy
Original source
Computer and email acceptable use policy
6
Student paper
Technet staff are urged to send personal email and carryout
similar exercises individually
at whatever point conceivable (Macdonald, 2019). In any case,
the periodic personal use
of email as well as other shared information systems while at
work is allowed within sens-
ible limits. · Personal messages are dealt with equivalent to
other messages in the sys-
tem, which could conceivably be archived every once in a while
and along these lines sub-
ject to recovery considerably after the user believes to have
erased them. · Technet re-
minds each employee that every visit to the internet as well as
email exchange uses Tech-
net name.
Original source
Econet staff are urged to send personal emails and carry out
similar exercises individually
at whatever point conceivable In any case, the periodic personal
use of email as well as
other shared information systems while at work is allowed
within sensible limits · Per-
sonal messages are dealt with equivalent to other messages in
the framework, which
could conceivably be archived every once in a while and along
these lines subject to re-
covery considerably after the user believes to have erased them
· Econet reminds each
employee that every visit to the internet as well as email
exchange uses Econet's name
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/ mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade7… 15/23
Student paper 89%
Student paper 95%
Student paper 100%
Student paper 81%
Student paper 96%
Student paper 100%
Student paper 100%
6
Student paper
Therefore use of any resources must be precise, proper, and
ought not to subject Tech-
net to potential risk. · Technet employees must protect their
email passwords, known dis-
tinctly to themselves whenever. In any case, the IT department
holds the capacity to erase
an employee’s secret key in any way comprising resetting the
password whenever forgot-
ten or to check an account’s mail if important. Technet internet
should not be used to get
to or get or download any material that might be viewed as
annoying, problematic, or
hostile by other people.
Original source
Therefore the use of any resources must be precise, proper, and
ought not to subject
Econet to potential risk (Anandarajan & Simmers, 2003) ·
Econet employees must protect
their email passwords, known distinctly to themselves whenever
In any case, the IT de-
partment holds the capacity to erase an employee’s secret key in
any way comprising re-
setting the password whenever forgotten or to check an
account’s mail if important (De-
veloping an Information Security Policy · Econet internet
should not be used to get to or
get or download any material that might be viewed as annoying,
problematic, or hostile
by other people
6
Student paper
Email Attachment · Any unknown email attachments is deleted
without opening. On the
off chance that the attachment appears to be suspicious, contact
the IT Department. ·
Email attachments that come from a known source must be
scanned for viruses. It is an
offence to disable scanning settings from any computer.
Original source
Email Attachment · Any unknown email attachments are deleted
without opening On the
off chance that the attachment appears to be suspicious, contact
the IT Department ·
Email attachments that come from a known source must be
scanned for viruses It is an
offense to disable scanning settings from any computer
6
Student paper
· Attachments are not to surpass 1.5 M, or ~1500K. Attachments
bigger than this are
probably going to crash your email server and additionally
cause issues with the mail
server. · In the event that you realize you will need to send a
huge file ahead of time, no-
tify the IT department for arrangements.
Original source
· Attachments are not to surpass 1.5 M, or ~1500K Attachments
bigger than this are prob-
ably going to crash your email server and additionally cause
issues with the mail server ·
In the event that you realize you will need to send a huge file
ahead of time, notify the IT
department for arrangements
7
Student paper
Computer Use Acceptable Policy
Original source
Computer and email acceptable use policy
1
Student paper
Users must keep affirmed and latest anti-virus program installed
on their PCs. This pro-
grams must be applied to check all third party applications or
different Technet units and
must occur before the new applications are used. Users must not
sidestep scanning pro-
cess that could stop the transmission of PC virus (Peltier, 2019).
Users are answerable for
harm happening in light of virus on PC frameworks under their
control.
Original source
Users must keep affirmed and latest anti-virus program installed
on their PCs This pro-
grams must be applied to check all third party applications or
different DoD units and
must occur before the new applications are used Users must not
sidestep scanning pro-
cess that could stop the transmission of PC virus Users are
answerable for harm happen-
ing in light of virus on PC frameworks under their control
1
Student paper
When a virus is recognized, the involved user must quickly
report to the IT department to
guarantee that no further spread takes place and that any
specialists expected to annihil-
ate the virus are expeditiously locked in.
Original source
When a virus is recognized, the involved user must quickly
report to the IT department to
guarantee that no further spread takes place and that any
specialists expected to annihil-
ate the virus are expeditiously locked in
8
Student paper
Computer as well as communication system rights of every user,
system and programs
must be confined dependent on nature of work.
Original source
Computer as well as communication system rights of every user,
system and programs
must be confined dependent on nature of work
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade7… 16/23
Student paper 96%
Student paper 100%
Student paper 100%
Student paper 100%
Student paper 100%
Student paper 86%
Student paper 100%
Student paper 100%
Student paper 92%
1
Student paper
This means that rights must not be extended unless the user
needs such rights (Ananda-
rajan & Simmers, 2019). Default user file authorizations ought
not to automatically permit
everyone on the system to read, write, execute or erase a file
record. Even if the user may
reset consents on a file by-document premise, such sensitive
default document rights are
disallowed. Default file consents granted to limited group of
users who have a veritable
need to know are permitted.
Original source
This means that rights must not be extended unless the user
needs such rights Default
user file authorizations ought not to automatically permit
everyone on the system to
read, write, execute or erase a file record Even if the user may
reset consents on a file by-
document premise, such sensitive default document rights are
disallowed Default file
consents granted to limited group of users who have a veritable
need to know are
permitted
7
Student paper
Internet Acceptable use Policy
Original source
Acceptable internet use policy
9
Student paper
There is need for all involved parties to comply with this policy
and where requested to
exhibit such compliance.
Original source
There is need for all involved parties to comply with this policy
and where requested to
exhibit such compliance
1
Student paper
Failure to observe this policy will be viewed as a disciplinary
incident and one may face
disciplinary action which may including termination of
employment.
Original source
Failure to observe this policy will be viewed as a disciplinary
incident and one may face
disciplinary action which may including termination of
employment
1
Student paper
Information Security Policies, Procedures, and Standards:
Guidelines for Effective Inform-
ation Security Management. Boca Raton, FL:
Original source
Information Security Policies, Procedures, and Standards
Guidelines for Effective Informa-
tion Security Management Boca Raton, FL
5
Student paper
Schou & Shoemaker, D.
Original source
Schou, C., & Shoemaker, D
5
Student paper
Information assurance for the enterprise: A roadmap to
information security.
Original source
Information assurance for the enterprise A roadmap to
information security
5
Student paper
McGraw-Hill Irwin.
Original source
McGraw-Hill Irwin
4
Student paper
Email and internet policies and guidance notes. Tolley's
Managing Email & Internet Use,
218-278.
Original source
Email and Internet Policies and Guidance Notes Tolleys
Managing Email & Internet Use,
218–278
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade7… 17/23
%93
%0
Student paper 90%
Student paper 100%
Student paper 100%
Student paper 71%
Student paper 100%
%93Attachment 4
Institutional database (7)
Student paper Student paper Student paper
Student paper Student paper My paper
Student paper
Internet (1)
knowledgeleader
Top sources (3)
Excluded sources (0)
10
Student paper
doi:10.1016/b978-0-7545-2443-4.50010-9
Original source
idoi:10.1016/b978-0-7545-2443-4.50010-9
6
Student paper
Managing Web Usage in the Workplace: A Social, Ethical and
Legal Perspective.
Original source
Managing Web Usage in the Workplace A Social, Ethical and
Legal Perspective
6
Student paper
Organizational information security policies: a review and
research framework. (2018,
February 15). Retrieved from
https://www.tandfonline.com/doi/abs/10.1057/s41303-017-
0059-9
Original source
Organizational information security policies a review and
research framework (2018, Feb-
ruary 15) Retrieved from
https://www.tandfonline.com/doi/abs/10.1057/s41303-017-
0059-9
5
Student paper
K., Qureshi & Siegel.
Original source
K., Qureshi, A
5
Student paper
The international handbook of computer security.
Original source
The international handbook of computer security
Word Count: 1,563
Wk6 COSOFramework.docx
2 5 6
1 7 3
4
8
2 Student paper 5 Student paper 6 Student paper
Running Head: COSO FRAMEWORK 1
COSO FRAMEWORK 8
1
2
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade7… 18/23
COSO Framework
Sharath Kumar Goud Madgula
InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term
Term - Summer 2021
University of the Cumberlands
The COSO model comprises of various basic advances carried
out in phases to deliver ground-breaking outcome. These
outcomes incorporate assessment of
threat, viability of current projects, and the effect of future
activities on accomplishment of key objectives (Moeller, 2018).
The test for the COSO system team is to val-
idate the effortlessness of the means in the model to leaders, to
guarantee their comprehension of the idea and implement the
model. If need be, a few phases can
be expelled, and the model exposed to its risk assessment
segment if different level of evaluation are considered not to
increase management value, without tamper-
ing with model effectiveness. Robustness is one of COSO model
strength. This strength originate from system model assessing
main objectives as well as targets.
Regardless of whether management changed their priority list,
the model would consequently adopt and prepare for any change
and on the same time update
threat register and different outcomes appropriately. Other
models needs a top to bottom audit of each threat in light of
such a change (Graham, 2018). COSO's focus
is on giving an adaptable standard against which to assess an
association's present ERM process instead of concentrating on
the particular exercises of the risk man-
agement procedure itself. Internal auditors are entrusted to
independently evaluate these controls, operating as board of
directors in the interest of the direct-
orate so as to alleviate the chance of the management acting on
their own good instead of the organization, exposing internal
control framework to be easily ex-
ploited and in some cases doing as such so as to allow illegal
personal gains (Moeller, 2018). COSO framework is used as a
perceived system, which, whenever actual-
ized. Organizations that intend to execute the COSO ERM
structure should survey ISO 31000 (and different systems) for
extra point of view and direction on us-
age contemplations.
COSO Components
1. Risk Assessment
Although event identification work along evaluation, evaluation
all alone is recommended as a segment to stress on inter-linked
threats role. The system puts a great
deal of significance on this part by pushing both on subjective
strategies just as quantifiable ones of threat evaluation
(Cendrowski & Mair, 2019). Organization
management ought to consider all threats according to this
component that could imply that goals are not attained. Besides,
dangers that fiscal summaries could be
physically misquoted ought to likewise be thought of. This
component also allude that management should appraise the
criticalness of risk, decide the probability of
threat happening and decide the effect or result of the defined
dangers within the organization. It is significant for the
management to define control activities to re-
lieve the defined dangers. 2. Information and Communication
It is a part of the overall risk management strategy, managers
and other staff are required to communicate the risky event
when they occur to the top manage-
ment. The communication must be timely and be seamless
(Graham, 2018). Information is vital and required at all levels
within the organization to guarantee
successful internal control and attain its goals Information and
communication component stress that significant guidelines as
well as other relevant information
must be defined and shared among people in charge in the
organization at the right time. Hence, a lot of pertinent and
dependable information must be defined in a
suitable structure and time span with the goal that workers can
conduct internal control as well as other obligations. With the
end goal for the management to be
powerful, all information must be suitable, explicit, auspicious,
precise, planned, usable and similar and available. 3.
Monitoring
If ERM isn’t an on-going process, the outcome will never be
optimal. The organization should put resources into continually
observing as well as altering the plan.
This component suggest that organization ought to depend on
viable regulatory monitoring of controls if need arise.
Organization management should use spe-
cial case reports to distinguish deviations from approaches and
strategies and use reports created by working staff as an
instrument in determining nonconformities.
Organizations operate in a dynamic environment, which implies
that the dangers confronting organization continually change,
henceforth the controls could get out-
dated; in this manner observing these conditions is imperative
to guarantee that organization goals are accomplished by
guaranteeing controls are significant and
working successfully. 4. Internal Environment
The ability to accept measured risks just as the capacity to go
the extra mile when the circumstance demands truly matters,
given the vulnerabilities that accom-
pany portfolios that length various divisions.
3
4
5
5
2
5
2
2
6
2
6
2
7
This components address the integrity as well as the moral
values of the organization; the strictures allowing organization
top managerial workers to carry out
its administrative oversight functions. The managerial functions
as well as exercising authority and power; the procedure for
drawing in, developing and holding re-
sponsible people; and the strictness around implementation
measures, inspiring forces as well as prizes to drive
performance accountability (Cendrowski & Mair,
2017). The consequent control environment widely affects the
general internal control system within an organization.
5. Control Activities
The main role played by guidelines and strategies to ensure that
feedbacks don't exceed the foreordained extent of things
(Cendrowski & Mair, 2019). When planned
carefully, controls envelop rules and frameworks as well as go
into the actual backbone of the association's control of
circumstances. According to this compon-
ent, all policies and strategies ought to be written and stored in
form of manual and procedures for every action in the
organization to be used if need be. These set
policies and procedures ought to be looked into and updated all
the time. Administrative staff should audit the working of
controls concerning the pertinent strategy.
Any deviations from the methodology that are distinguished
ought to be imparted to pertinent entities and remedied
timeously. Authority over resources ought to be
discrete from the bookkeeping function. The obligation
regarding operations and accounting must be distinct.
COSO Integration
Elements within the internal control structure relate to those
listed in the COSO system. COSO and internal control work
along with each other, internal control is crit-
ical for COSO. One upholds the other: having solid inner
controls empowers supervisors to zero in on activities and
business goals, realizing that the organization has
a robust threat management program and is in compliance with
applicable laws, guidelines, and norms (Graham, 2018).
Management is entrusted with the plan,
2
2
2
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade7… 19/23
Source Matches (30)
Student paper 100%
Student paper 63%
My paper 100%
Student paper 100%
adoption as well as upkeep of internal control frameworks.
Internal auditors are entrusted to independently evaluate these
controls, operating as board of directors
in the interest of the directorate so as to alleviate the chance of
the management acting on their own good instead of the
organization, exposing internal control
framework to be easily exploited and in some cases doing as
such so as to allow illegal personal gains (Moeller, 2018).
COSO framework is used as a perceived system,
which, whenever actualized. IT Audit
IT Auditors attention may differ from the type of audit he/she is
performing at the moment. However the focus goes on
materially significant amounts of data passing
through the system and checking whether the protocol of the
process itself been correctly implemented. By this program, the
auditor creates charts for each division
in the statements and for the materially significant amounts
demands a proof (Cendrowski & Mair, 2019). The auditor
should always be objective when going through
different analysis and consider different situations. Due to the
fact that the auditor checks different risky processes- he/she
often finds the possible mistakes or
frauds made by the organization. The auditor is allowed by the
law to give independent view about the state of the system and
offer an arrangement as a potential
answer for the current circumstance of the actual system. On the
off chance that the auditor doesn't offer and target independent
input and the actual extortion is
found later on, the inspector might be considered as concealing
certain misdeeds. IT Auditors are the one who carry out in-
depth check of the processes and figure
whether all the policies of the business are being followed or
there is some laps in the same (Graham, 2018). They are also
figure out the area of improvement in the
existing policies which at times proves to be very crucial in
achieving organizational goals such as profitability, quality,
customer satisfaction, production efficiency, etc.
They are tasked with defining complex problems, providing
well researched solutions, executing the decided action plan,
and also evaluating and testing the results
with the objectives. They are expected to be expert and
experienced professionals, who are habituated with long
working hours, increased workload, and dealing with
uncertainty.
Reference
Moeller, R. R. (2018). Executive's guide to COSO internal
controls: Understanding and implementing the new framework.
John Wiley & Sons. Cendrowski, H., &
Mair, W. C. (2019). Enterprise risk management and COSO: A
guide for directors, executives and practitioners. John Wiley &
Sons. Graham, L. (2018). Internal con-
trol audit and compliance: Documentation and testing under the
new COSO framework. John Wiley & Sons. COSO internal
control components: Control environ-
ment. (2018). Executive's Guide to COSO Internal Controls, 41-
57. doi:10.1002/9781118691656.ch4
Importance of the COSO internal control framework. (2013).
Executive's Guide to COSO Internal Controls, 1-4.
2
2
2
2 1
8 2
doi:10.1002/9781118691656.ch1
Evaluating audit findings, audit evidence, and deficiencies in
internal control. (2017). Audit Guide, 271-300.
doi:10.1002/9781119448648.ch7
1
1
1
Student paper
COSO FRAMEWORK 1
Original source
COSO FRAMEWORK 1
2
Student paper
COSO FRAMEWORK 8
Original source
COSO Framework Components
3
Student paper
Sharath Kumar Goud Madgula InfoTech Import in Strat Plan
(ITS-831-A02) – First Bi-Term
Term - Summer 2021
Original source
Sharath Kumar Goud Madgula InfoTech Import in Strat Plan
(ITS-831-A02) – First Bi-Term
Term - Summer 2021
4
Student paper
University of the Cumberlands
Original source
University of the Cumberlands
6/11/2021 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137
-169d-4a21-86d3-7b6fade7… 20/23
Student paper 90%
Student paper 100%
Student paper 85%
Student paper 100%
Student paper 100%
Student paper 99%
Student paper 100%
5
Student paper
The COSO model comprises of various basic advances carried
out in phases to deliver
ground-breaking outcome. These outcomes incorporate
assessment of threat, viability of
current projects, and the effect of future activities on
accomplishment of key objectives
(Moeller, 2018). The test for the COSO system team is to
validate the effortlessness of the
means in the model to leaders, to guarantee their comprehension
of the idea and imple-
ment the model. If need be, a few phases can be expelled, and
the model exposed to its
risk assessment segment if different level of evaluation are
considered not to increase
management value, without tampering with model effectiveness.
Original source
The COSO model comprises of various basic advances carried
out in phases to deliver
ground-breaking outcome These outcomes incorporate
assessment of threat, viability of
current projects, and the effect of future activities on
accomplishment of key objectives
The test for the ERM team is to demonstrate the effortlessness
of the means in the model
to leaders, to guarantee their comprehension of the idea and
implement the model (Mo-
nahan, 2016) If need be, a few phases can be expelled, and the
model stripped to its
threat assessment segment if different level of evaluation are
considered not to increase
the value of the management, without losing the effectiveness
of the model
5
Student paper
Robustness is one of COSO model strength.
Original source
Robustness is one of COSO model strength
5
Student paper
Regardless of whether management changed their priority list,
the model would con-
sequently adopt and prepare for any change and on the same
time update threat register
and different outcomes appropriately. Other models needs a top
to bottom audit of each
threat in light of such a change (Graham, 2018). COSO's focus
is on giving an adaptable
standard against which to assess an association's present ERM
process instead of con-
centrating on the particular exercises of the risk management
procedure itself.
Original source
Regardless of whether management changed the prioritization of
the objectives, the
model would consequently adjust for this change and update the
threat register and dif-
ferent outcomes appropriately Other models would require a top
to bottom audit of each
threat in light of such a change COSO's focus is on giving an
adaptable standard against
which to assess an association's present ERM process instead of
concentrating on the
particular exercises of the risk management procedure itself
2
Student paper
Internal auditors are entrusted to independently evaluate these
controls, operating as
board of directors in the interest of the directorate so as to
alleviate the chance of the
management acting on their own good instead of the
organization, exposing internal con-
trol framework to be easily exploited and in some cases doing
as such so as to allow il-
legal personal gains (Moeller, 2018). COSO framework is used
as a perceived system,
which, whenever actualized.
Original source
Internal auditors are entrusted to independentl y evaluate these
controls, operating as
the board of directors in the interest of the directorate so as to
alleviate the chance of the
management acting on their own good instead of the
organization, exposing internal con-
trol framework to be easily exploited and in some cases doing
as such so as to allow il-
legal personal gains (Moeller, 2018) COSO framework is used
as a perceived system,
which, whenever actualized
5
Student paper
Organizations that intend to execute the COSO ERM structure
should survey ISO 31000
(and different systems) for extra point of view and direction on
usage contemplations.
Original source
Organizations that intend to execute the COSO ERM structure
should survey ISO 31000
(and different systems) for extra point of view and di rection on
usage contemplations
2
Student paper
Organization management ought to consider all threats
according to this component that
could imply that goals are not attained. Besides, dangers that
fiscal summaries could be
physically misquoted ought to likewise be thought of. This
component also allude that
management should appraise the criticalness of risk, decide the
probability of threat hap-
pening and decide the effect or result of the defined dangers
within the organization. It is
significant for the management to define control activities to
relieve the defined dangers.
Original source
Organization management ought to consider all threats
according to this component that
could imply that goals are not attained Besides, dangers that
fiscal summaries could be
physically misquoted ought to likewise be thought of This
component also alludes that
management should appraise the criticalness of risk, decide the
probability of threat hap-
pening, and decide the effect or result of the defined dangers
within the organization It is
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be
CROSS CULTURAL COMMUNICATION5A Winning Concept The Be

Contenu connexe

Similaire à CROSS CULTURAL COMMUNICATION5A Winning Concept The Be

MODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docx
MODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docxMODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docx
MODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docxroushhsiu
 
MODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docx
MODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docxMODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docx
MODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docxaudeleypearl
 
Leadership Is Effective And Ineffective
Leadership Is Effective And IneffectiveLeadership Is Effective And Ineffective
Leadership Is Effective And IneffectiveStefanie Yang
 
Contingency Management
Contingency ManagementContingency Management
Contingency ManagementAlyssa Dennis
 
Leadership communication a communication approach for senior-level managers...
Leadership communication   a communication approach for senior-level managers...Leadership communication   a communication approach for senior-level managers...
Leadership communication a communication approach for senior-level managers...fleurich
 
Principal of Management Report : Pharmaplex Company
Principal of Management Report :  Pharmaplex  CompanyPrincipal of Management Report :  Pharmaplex  Company
Principal of Management Report : Pharmaplex CompanyShahzeb Pirzada
 
COMMUNICATION OF LEADERS IN AN ORGANIZATION.docx
COMMUNICATION OF LEADERS IN AN ORGANIZATION.docxCOMMUNICATION OF LEADERS IN AN ORGANIZATION.docx
COMMUNICATION OF LEADERS IN AN ORGANIZATION.docx4934bk
 
Personal Reflection Of Personal Values In An...
Personal Reflection Of Personal Values In An...Personal Reflection Of Personal Values In An...
Personal Reflection Of Personal Values In An...Diana Oliva
 
The art of building a winning team - Construction Manager Article
The art of building a winning team - Construction Manager ArticleThe art of building a winning team - Construction Manager Article
The art of building a winning team - Construction Manager ArticleDonnie MacNicol
 
Running Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docx
Running Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docxRunning Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docx
Running Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docxglendar3
 
Running Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docx
Running Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docxRunning Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docx
Running Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docxtodd581
 
Introduction to Organizational Development
Introduction to Organizational DevelopmentIntroduction to Organizational Development
Introduction to Organizational DevelopmentDr Anju Chawla
 
Sustainable leadership perennial philosophy
Sustainable leadership perennial philosophySustainable leadership perennial philosophy
Sustainable leadership perennial philosophyTim Casserley
 
Executive summary The traditional leadership styles a.docx
Executive summary            The traditional leadership styles a.docxExecutive summary            The traditional leadership styles a.docx
Executive summary The traditional leadership styles a.docxgitagrimston
 

Similaire à CROSS CULTURAL COMMUNICATION5A Winning Concept The Be (20)

internal communications
internal communicationsinternal communications
internal communications
 
MODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docx
MODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docxMODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docx
MODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docx
 
MODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docx
MODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docxMODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docx
MODULE 1COMMUNICATION IS BUSINESSWEEK 1LEADERSHI.docx
 
Leadership Is Effective And Ineffective
Leadership Is Effective And IneffectiveLeadership Is Effective And Ineffective
Leadership Is Effective And Ineffective
 
Effective Leadership
Effective LeadershipEffective Leadership
Effective Leadership
 
Essay About Leadership
Essay About LeadershipEssay About Leadership
Essay About Leadership
 
Organization and Management
Organization and ManagementOrganization and Management
Organization and Management
 
Contingency Management
Contingency ManagementContingency Management
Contingency Management
 
Leadership communication a communication approach for senior-level managers...
Leadership communication   a communication approach for senior-level managers...Leadership communication   a communication approach for senior-level managers...
Leadership communication a communication approach for senior-level managers...
 
MGT 500 - Final Exam - FA 14 (1)
MGT 500 - Final Exam - FA 14 (1)MGT 500 - Final Exam - FA 14 (1)
MGT 500 - Final Exam - FA 14 (1)
 
Principal of Management Report : Pharmaplex Company
Principal of Management Report :  Pharmaplex  CompanyPrincipal of Management Report :  Pharmaplex  Company
Principal of Management Report : Pharmaplex Company
 
COMMUNICATION OF LEADERS IN AN ORGANIZATION.docx
COMMUNICATION OF LEADERS IN AN ORGANIZATION.docxCOMMUNICATION OF LEADERS IN AN ORGANIZATION.docx
COMMUNICATION OF LEADERS IN AN ORGANIZATION.docx
 
Personal Reflection Of Personal Values In An...
Personal Reflection Of Personal Values In An...Personal Reflection Of Personal Values In An...
Personal Reflection Of Personal Values In An...
 
The art of building a winning team - Construction Manager Article
The art of building a winning team - Construction Manager ArticleThe art of building a winning team - Construction Manager Article
The art of building a winning team - Construction Manager Article
 
Running Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docx
Running Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docxRunning Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docx
Running Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docx
 
Running Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docx
Running Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docxRunning Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docx
Running Head ORGANIZATIONAL CULTURE AND CHANGEORGANIZATIONAL CU.docx
 
Introduction to Organizational Development
Introduction to Organizational DevelopmentIntroduction to Organizational Development
Introduction to Organizational Development
 
Sustainable leadership perennial philosophy
Sustainable leadership perennial philosophySustainable leadership perennial philosophy
Sustainable leadership perennial philosophy
 
Executive summary The traditional leadership styles a.docx
Executive summary            The traditional leadership styles a.docxExecutive summary            The traditional leadership styles a.docx
Executive summary The traditional leadership styles a.docx
 
Cultures of Engagement Insights Paper
Cultures of Engagement Insights PaperCultures of Engagement Insights Paper
Cultures of Engagement Insights Paper
 

Plus de MargenePurnell14

Introduction              Ideally, program andor policy interventio.docx
Introduction              Ideally, program andor policy interventio.docxIntroduction              Ideally, program andor policy interventio.docx
Introduction              Ideally, program andor policy interventio.docxMargenePurnell14
 
INTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docx
INTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docxINTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docx
INTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docxMargenePurnell14
 
IntroductionGDD’s ResultsCandidate’s ResultsGDD C.docx
IntroductionGDD’s ResultsCandidate’s ResultsGDD C.docxIntroductionGDD’s ResultsCandidate’s ResultsGDD C.docx
IntroductionGDD’s ResultsCandidate’s ResultsGDD C.docxMargenePurnell14
 
IntroductionDefine the individual client or community populati.docx
IntroductionDefine the individual client or community populati.docxIntroductionDefine the individual client or community populati.docx
IntroductionDefine the individual client or community populati.docxMargenePurnell14
 
Introduction to Public SpeakingWeek 6 AssignmentIn.docx
Introduction to Public SpeakingWeek 6 AssignmentIn.docxIntroduction to Public SpeakingWeek 6 AssignmentIn.docx
Introduction to Public SpeakingWeek 6 AssignmentIn.docxMargenePurnell14
 
Introduction about topic Intelligence phaseWhat is the .docx
Introduction about topic Intelligence phaseWhat is the .docxIntroduction about topic Intelligence phaseWhat is the .docx
Introduction about topic Intelligence phaseWhat is the .docxMargenePurnell14
 
Introduction A short summary is provided on the case subject and.docx
Introduction A short summary is provided on the case subject and.docxIntroduction A short summary is provided on the case subject and.docx
Introduction A short summary is provided on the case subject and.docxMargenePurnell14
 
Introduction Illiteracy is the inability to read and write a.docx
Introduction Illiteracy is the inability to read and write a.docxIntroduction Illiteracy is the inability to read and write a.docx
Introduction Illiteracy is the inability to read and write a.docxMargenePurnell14
 
Intro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docxIntro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docxMargenePurnell14
 
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docxIntro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docxMargenePurnell14
 
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docxINTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docxMargenePurnell14
 
Interview Each team member should interview an educator about his.docx
Interview Each team member should interview an educator about his.docxInterview Each team member should interview an educator about his.docx
Interview Each team member should interview an educator about his.docxMargenePurnell14
 
IntroductionRisk management is critical to protect organization.docx
IntroductionRisk management is critical to protect organization.docxIntroductionRisk management is critical to protect organization.docx
IntroductionRisk management is critical to protect organization.docxMargenePurnell14
 
Interview two different individuals regarding their positions in soc.docx
Interview two different individuals regarding their positions in soc.docxInterview two different individuals regarding their positions in soc.docx
Interview two different individuals regarding their positions in soc.docxMargenePurnell14
 
Internet ExerciseVisit the homepage of Microsoft at www.micros.docx
Internet ExerciseVisit the homepage of Microsoft at www.micros.docxInternet ExerciseVisit the homepage of Microsoft at www.micros.docx
Internet ExerciseVisit the homepage of Microsoft at www.micros.docxMargenePurnell14
 
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docx
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docxInterpersonal Violence Against Women, The Role of Men by Martin Schw.docx
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docxMargenePurnell14
 
Internet of Vehicles-ProjectIntroduction - what you plan t.docx
Internet of Vehicles-ProjectIntroduction - what you plan t.docxInternet of Vehicles-ProjectIntroduction - what you plan t.docx
Internet of Vehicles-ProjectIntroduction - what you plan t.docxMargenePurnell14
 
Interview an ELL instructor from a Title I school about how assessme.docx
Interview an ELL instructor from a Title I school about how assessme.docxInterview an ELL instructor from a Title I school about how assessme.docx
Interview an ELL instructor from a Title I school about how assessme.docxMargenePurnell14
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docxMargenePurnell14
 
International Finance Please respond to the followingBased on.docx
International Finance Please respond to the followingBased on.docxInternational Finance Please respond to the followingBased on.docx
International Finance Please respond to the followingBased on.docxMargenePurnell14
 

Plus de MargenePurnell14 (20)

Introduction              Ideally, program andor policy interventio.docx
Introduction              Ideally, program andor policy interventio.docxIntroduction              Ideally, program andor policy interventio.docx
Introduction              Ideally, program andor policy interventio.docx
 
INTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docx
INTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docxINTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docx
INTRO TO PUBLIC ADMINISTRATIONCase Study 11  Who Brought Bern.docx
 
IntroductionGDD’s ResultsCandidate’s ResultsGDD C.docx
IntroductionGDD’s ResultsCandidate’s ResultsGDD C.docxIntroductionGDD’s ResultsCandidate’s ResultsGDD C.docx
IntroductionGDD’s ResultsCandidate’s ResultsGDD C.docx
 
IntroductionDefine the individual client or community populati.docx
IntroductionDefine the individual client or community populati.docxIntroductionDefine the individual client or community populati.docx
IntroductionDefine the individual client or community populati.docx
 
Introduction to Public SpeakingWeek 6 AssignmentIn.docx
Introduction to Public SpeakingWeek 6 AssignmentIn.docxIntroduction to Public SpeakingWeek 6 AssignmentIn.docx
Introduction to Public SpeakingWeek 6 AssignmentIn.docx
 
Introduction about topic Intelligence phaseWhat is the .docx
Introduction about topic Intelligence phaseWhat is the .docxIntroduction about topic Intelligence phaseWhat is the .docx
Introduction about topic Intelligence phaseWhat is the .docx
 
Introduction A short summary is provided on the case subject and.docx
Introduction A short summary is provided on the case subject and.docxIntroduction A short summary is provided on the case subject and.docx
Introduction A short summary is provided on the case subject and.docx
 
Introduction Illiteracy is the inability to read and write a.docx
Introduction Illiteracy is the inability to read and write a.docxIntroduction Illiteracy is the inability to read and write a.docx
Introduction Illiteracy is the inability to read and write a.docx
 
Intro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docxIntro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docx
 
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docxIntro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
 
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docxINTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
 
Interview Each team member should interview an educator about his.docx
Interview Each team member should interview an educator about his.docxInterview Each team member should interview an educator about his.docx
Interview Each team member should interview an educator about his.docx
 
IntroductionRisk management is critical to protect organization.docx
IntroductionRisk management is critical to protect organization.docxIntroductionRisk management is critical to protect organization.docx
IntroductionRisk management is critical to protect organization.docx
 
Interview two different individuals regarding their positions in soc.docx
Interview two different individuals regarding their positions in soc.docxInterview two different individuals regarding their positions in soc.docx
Interview two different individuals regarding their positions in soc.docx
 
Internet ExerciseVisit the homepage of Microsoft at www.micros.docx
Internet ExerciseVisit the homepage of Microsoft at www.micros.docxInternet ExerciseVisit the homepage of Microsoft at www.micros.docx
Internet ExerciseVisit the homepage of Microsoft at www.micros.docx
 
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docx
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docxInterpersonal Violence Against Women, The Role of Men by Martin Schw.docx
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docx
 
Internet of Vehicles-ProjectIntroduction - what you plan t.docx
Internet of Vehicles-ProjectIntroduction - what you plan t.docxInternet of Vehicles-ProjectIntroduction - what you plan t.docx
Internet of Vehicles-ProjectIntroduction - what you plan t.docx
 
Interview an ELL instructor from a Title I school about how assessme.docx
Interview an ELL instructor from a Title I school about how assessme.docxInterview an ELL instructor from a Title I school about how assessme.docx
Interview an ELL instructor from a Title I school about how assessme.docx
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
 
International Finance Please respond to the followingBased on.docx
International Finance Please respond to the followingBased on.docxInternational Finance Please respond to the followingBased on.docx
International Finance Please respond to the followingBased on.docx
 

Dernier

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 

Dernier (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 

CROSS CULTURAL COMMUNICATION5A Winning Concept The Be

  • 1. CROSS CULTURAL COMMUNICATION 5 A Winning Concept: The Benefits of Organizational Communication Prepared by Student Name Date New England College Course MG5415 Organizational Communication for Leaders Julie Zink, Ph.D. Abstract Communication is a critical and effective medium that conveys information to a recipient or a group. While it is important to convey a message concisely, an effective communicator commands undivided attention. The benefits of effective organizational communication when executed well, cultivates a sense of commitment and loyalty within its employees, as well as instilling that they are an essential component to the overall success of the organization. Keywords: Organizational communication, strategy, leader, vision, mission, goals, management A Winning Concept: The Benefits of Organizational Communication
  • 2. “One of the greatest responsibilities of an organization’s leadership is to communicate with unwavering clarity the values on which the organization has been built (Vern Dosch, 2016).” Introduction Communication is a fundamental and essential function of civilization from the cradle to the grave. It is the backbone of the universe’s existence as we know it, creating and cultivating a type of social bondage that occurs between human beings and living things alike. In the business world, it is the absolute nucleus that determines how effectively we will communicate, react, interact, and share information with each other. In fact, if we are to consider organizational communication as a field in its own right, it would be apt to label it as a subcategory of a much larger and broader discipline of communication studies. As a subcategory, organizational communication’s composition comprises analysis, consideration, and criticism of the role of communication in organizational contexts. Defined, organizational communication is, “the way in which an organization gives the public and its employee’s information about its aims and what it is doing (Cambridge, n.d.).” Organizational communication is also a component of effective management in a workplace environment. The main functions are not only to inform but persuade and promote both support and goodwill. Communication is the lifeline of an organization, always providing the necessary information to ensure effective performance in all business activities. Communication in an organization is fundamental to running a successful business. It also requires active participation that encompasses the Board of Trustees and or Directors, Chief Executive Officer and or President, C-Suite leaders, management, and the teams that report to the managers. While management is the means to achieving organizational goals, efficiency and effectiveness of management depends on effective communication. Every minute aspect of management hinges upon successful communication.
  • 3. Without effective communication, an organization cannot feasibly create and convey its credo: its vision and mission statement, the strategic plan, conveying how one shares or disseminates information, or even actively communicating within the organization, one’s clients, providers, and even vendors. Factors That Contribute to Successful Organizational Communication Factors that contribute to successful organization communication include a clear vision and mission statement, a current strategic plan, clear goals and objectives, and a steadfast commitment to the company’s success. In fact there are a number of areas that support successful organizational communication that include processes, structures, and even forms of communication that transpire between the Board of Directors, the leadership, and of course the different layers of management. In order to set up a safe structure for an organization to successfully promote effective organizational communication, it should be readily adaptable to the situations at hand and responsive to the needs of the outside environment. There should be open and frequent communication within the organization through various mediums, in addition to potentially developing internal/external newsletters, media campaigns, and holding meetings or even conferences depending on the size of the organization. Within the structure itself, there should be clearly defined roles and policy guidelines for the employees. By empowering employees with open decision making at all tiers, members should also share a stake in the organization’s process and outcomes. Leaders should lead by example which means leadership should begin at the very top. Membership of the Board should exhibit
  • 4. not only mutual respect but understanding and trust as a whole. They should demonstrate a willingness to compromise or collaborate in the best interests of the organization. Effective Leadership and the Management Paradox The term “Leadership” is somewhat loosely defined, since there is no clear or consistent language to determine the meaning of leadership. For many, it denotes providing a clear vision, the ability to lead others, completing tasks, or motivating others to succeed within their defined roles and goals. It is important to note that while there are leaders, there are also leaders who are not so effective in their roles. Leaders need to be visionaries who steadfastly steer a course for their organization regardle ss of the obstacles they will need to overcome. While a leader may not be born with the necessary abilities or skill sets, they may be acquired along the way by learning through experience and through example. In fact, by relying on different types of behavioral traits, a leader may successfully influence others, in addition to executing and accomplishing the organizations goals regardless of the circumstances. Souba (2006), suggests that there is a clearly defined misalignment between that of leadership and its management. While leadership is focused on change, creating a new strategic vision, and transforming the corporate culture, management’s focus is more aligned with creating and maintaining order, maintaining a level of consistency, standardization, meeting goals and budget, in addition to being ever efficient and effective. Bernard Bass, a specialist in transformational leadership, once stated that, "Leaders manage and managers lead, but the two activities are not synonymous (Coutts, n.d.).” Paradoxically, this equates to managers not actually making good leaders and good leaders not actually making good managers.
  • 5. Managers are typically responsible for the planning, investigating, and organization of business processes. Leaders deal with the interpersonal aspect of a manager’s position. To be a good leader, we need to be confident within ourselves. The Four Stages of Organizational Change (OLC) The concept of organizational change was first introduced in 1950 by British economist and philosopher, Kenneth Boulding (Nasar, 1993). More than half a century later, Boulding’s concept has been adapted to fit many different disciplines that include, but are not limited to, management, marketing, and public administration. According to Boulding’s concept, the organizational life cycle may be segmented into four stages similar to that of a natural living life cycle: Birth, youth, maturity, and decline/death (Ionescu et al., 2007). Organizations, like all living things, have a limited lifespan. While some lives span a longer duration than others, each stage of development is both predictable and sequential, from the cradle to the grave. In order for an organization to be successful, it must have a strong foundation in organizational communication. Furthermore, it is important for leaders to truly understand and realize exactly which phase their organization is in, in order for them to adopt strategies that best suits their current situation. It is important to note, however, that both external environmental events and internal circumstances can clearly impact the success of an organization. According to an article by Inc., (n.d.), “The OLC model's prescription is that the firm's managers must change the goals, strategies, and strategy implementation devices to fit the new set of issues. Thus, different stages of the company's life cycle require alterations in the firm's objectives, strategies, managerial processes (planning, organizing, staffing, directing, controlling), technology, culture, and decision-making.”
  • 6. Organization Stages of Development (Daft E5-6 p.175) Source: www.unc.edu The Power of Negotiation Negotiation is prevalent everywhere throughout our daily lives be it at a personal level or through the daily business communications that we conduct internally or with the outside world. It can be as simple as negotiating with a toddler to get them to do what you want, making a deal with your team if you reach a certain goal, or even contracting a negotiation. There are three forms of negotiation: · Soft negotiation · Hard negotiation · Principled negotiation According to Fisher et al., (2011), the soft negotiator is determined to avoid any type of personal conflict at all costs. These individuals will make concessions readily in order to be able to make an agreement. The outcome for this type of negotiation is typically unpleasant and the soft negotiator nearly always walks away feeling completely exploited. For some individuals, using the hard approach creates a better outcome though potentially at a higher cost, straining the relationship that actually began the negotiation in the very first place. For the hard negotiator, this is a battle of the wills. Neither side is willing to retreat, ultimately resulting in a stale mate, since neither side is willing to give concession to their own demands.
  • 7. The final type of negotiation is a strategic combination of soft and hard skills. The objective is to look at the mutual gains wherever possible and when there is conflict, ensure that the results are based on some form of fair standard that is “independent of the will” on either side: Hard on merits, and soft on people. This is deemed to be the fairest and most satisfactory form of negotiation and both parties walk away feeling quite successful regardless of the outcomes. Groupthink Groupthink is a psychological phenomenon that occurs when a group of individuals actively focus on minimizing any type of conflict. It is the influence to which these individuals have the overall desire for conformity rather than conflict. It is the conscientious ability to reach a consensus decision without any form of critical evaluation or even counter viewpoints. For smaller organizations, the concept of Groupthink may be considered beneficial but for larger organiza tions which deal with much more complex issues, avoiding Groupthink may be beneficial to their business practices, since it cultivates open discussion rather than conformity (Cain, 2012). The Manager’s Hot Seat: Problem Solving Building critical thinking and decision making skills is an integral part of organizational communication. On a daily basis we are faced with distractions and yet it appears that there is never enough time to dedicate to effective problem solving. For many leaders, being able to solve the problem quickly and move on, alleviates the immediate issues at hand. Yet, whether we see the glass as half-full or half-empty, determines how we view problems that are presented to us. For many it is one more obstacle, but for others it is yet another opportunity to improve. Llopis (2014) noted that problem solving is the essence of what leaders do. He further states that, “As leaders, the goal is to
  • 8. minimize the occurrence of problems—which means we must be courageous enough to tackle them head-on before circumstances force our hand. “ The Employee Brand While a brand is an organization’s identity, an organization does not have the luxury of creating its own brand. Its brand evolves through the product and the type of clientele that it attracts. Furthermore, employee branding actually shapes its employees behavior so that they emulate the brand identity through their everyday work behavior. A strong brand, not only serves to position the organization at a desired level but invokes trust and loyalty enabling organizations to create long term sustainable relationships with their employees and customers. Conclusion Today’s challenges in the workplace include incorporating innovative and engaging ways to involve and motivate employees while at the same time, meeting and enhancing the organization’s bottom line. Organizational communication is a critical element in a company’s success, especially if a leader is to lead and be the perpetrator of change. Valuable skills of organizational communication include interpersonal communication, small group communication, conflict management, inter-cultural communication, writing, and managing organizational change. Great leadership starts at the top. It is this type of leadership that is indicative in an organization when problem solving appears completely seamless. Such an ability, enables both employee and organization to continually grow and improve, strategically. When problem solving results in chaos, sadly, it is
  • 9. indicative of a serious leadership deficiency. To stay true, organizations must concentrate on developing organizational leaders who will stay focused on their core mission, maintain effective management practices and communication, drive “program” effectiveness, and hold team members accountable. Effective organizational communication is the backbone of corporate success. It is through this, that employees become more committed and loyal to their organization with the knowledge that they are a valued and essential component of their company’s success. References Cain, S. (2012, January 13). The Rise of the New Groupthink. Retrieved September 26, 2016, from http://www.nytimes.com/2012/01/15/opinion/sunday/the- rise-of-the-new- groupthink.html?_r=0 Coutts, P. (n.d.). Leadership vs. Manageme nt. Retrieved September 28, 2016, from http://www3.telus.net/public/pdcoutts/leadership/LdrVsMngt.ht m Davenport, B. T. (2015, February 20). The 4 Stages of the Employee Value Proposition. Retrieved September 26, 2016, from http://www.eremedia.com/tlnt/the-4-stages-of-the- employee-value-proposition/ Dosch, V. (2016). Quotes About Organizational Leadership (73 quotes). Retrieved September 26, 2016, from http://www.goodreads.com/quotes/tag/organizational-leadership
  • 10. Fisher, R., & Ury, W. (2011). Getting to yes: Negotiating agreement without giving in (p. xxviii). New York, NY: Penguin. Ionescu, G. G., & Negrusa, A. L. (2007, December). The Study about Organizational Life Cycle Models. The Study about Organizational Life Cycle Models,8(4), 5-17. Retrieved September 20, 2016, from http://www.rmci.ase.ro/Login/no8vol4/Vol8_No4_Article1.pdf Kinicki, A, Fugate, M. (2016). Organizational Behavior: A Practical, Problem Solving Approach (p.256). New York, NY. McGraw Hill. LLopis, G. (2013, November 4). The 4 Most Effective Ways Leaders Solve Problems. Retrieved September 26, 2016, from http://www.forbes.com/forbes/welcome/?/sites/glennllopis/2013 /11/04/the-4- most-effective-ways-leaders-solve-problems/ Mosley, R. (2015, May 11). CEOs Need to Pay Attention to Employer Branding. Retrieved
  • 11. September 26, 2016, from https://hbr.org/2015/05/ceos-need- to-pay-attention-to- employer-branding Nasar, S. (1993, March 20). Kenneth Boulding, an Economist, Philosopher and Poet, Dies at 83. Retrieved September 28, 2016, from http://www.nytimes.com/1993/03/20/obituaries/kenneth- boulding-an-economist- philosopher-and-poet-dies-at-83.html Organizational communication Definition in the Cambridge English Dictionary. (n.d.). Retrieved September 28, 2016, from http://dictionary.cambridge.org/us/dictionary/english/organizati onal-communication Organizational Life Cycle. (n.d.). Retrieved September 25, 2016, from http://www.inc.com/encyclopedia/organizational-life-cycle.html Soci110 module 5. (n.d.). Retrieved September 28, 2016, from http://www.unc.edu/~nielsen/soci410/nm8/nm8.htm Souba, W. W. (2006, December 30). The Leadership Dilemma. Journal of Surgical Research, 138(1), 1-9. doi:10.1016/j.jss.2007.01.003 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-
  • 12. BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade71… 1/23 %43 %9 SafeAssign Originality Report Summer 2021 - InfoTech Import in Strat Plan (ITS-831-A02) - First Bi-… • Week 6 Research Paper: COSO Framework %77Total Score: High riskSharath Kumar Goud Madgula Submission UUID: 8833a14a-8789-6ac7-e006-69653026b6e2 Total Number of Reports 4 Highest Match 93 % Wk6 COSOFramework.docx Average Match 77 % Submitted on 06/11/21 12:20 PM EDT Average Word Count 1,360 Highest: WK5 HealthcareComputerandInt… %52Attachment 1
  • 13. Institutional database (7) Student paper Student paper Student paper My paper Student paper Student paper Student paper Internet (3) techtarget jasa-cari-buku yourtermpapers Top sources (3) Excluded sources (0) View Originality Report - Old Design Word Count: 619 PCA2.docx 7 1 5 4 3 6 2 10 8 9 7 Student paper 1 Student paper 5 Student paper Running Head: PRACTICAL CONNECTION 1 PRACTICAL CONNECTION 4
  • 14. Practical Connection Assignment Sharath Kumar Goud Madgula InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term Term - Summer 2021 University of the Cumberlands I have learned that security policy is termed as a group of policies issued by a specific organization. The policy ensures that all the IT individuals within the organ- ization have to comply with rules associated with the security of the information. All in all, these policies play an important role in the overall security of an organiza- tion. Security policy plays an important role in risk management. Normally, it prevents or possibly reduce the likelihood of unapproved access, use, cancellation as well as abuse. Information comes in various forms, hard copy and soft copy are the common forms of data types (Peltier, 2019). Security policy mainly concentrate on ensuring privacy, integrity as well as accessibility of information on the same time ensuring easy approach execution, all without hampering organization productivity. Any security policy is tasked with identifying any organization’s assets as well as all the potential risks to those assets. In business, security policy may comprise a sat- isfactory use strategy, a portrayal of how the organization intends to instruct its staff about securing the organization's resources, a clarification of how security policies will be upheld, and a system for assessing the viability of the security strategy to guarantee that important amendments will be made. Knowledge in
  • 15. server virtualization will help me in creating multiple instances of an operating system - or even multiple different operating systems - on a single server hardware system. With this knowledge I can comfortably purchase server hardware with higher RAM sizes in relation to CPU, and create maybe 10 or so ‘virtual’ servers - in- stances of an operating system - and run these on one ‘piece of tin’. Doing that, you could now use more of the available CPU and memory, and get a better return on your hardware investment. Ten individual servers could be replaced by one slightly larger server. I am aware that as virtualization systems became more advanced, it became possible to build clusters of virtual systems with the ability to restart virtual machines on a different physical server if one server were to fail (Reynolds & Mc- 1 2 3 4 5 4 6 7 1 https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport?attemptId=26751137-
  • 16. 169d-4a21-86d3- 7b6fade71823&course_id=_140054_1&download=true&include Deleted=true&print=true&force=true 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade71… 2/23 Source Matches (12) Student paper 100% Student paper 100% Student paper 100% My paper 100% Student paper 100% My paper 100% Student paper 100% Crory, 2018). Having knowledge in server virtualization plays a huge role since prior to this, when a server had a hardware failure it could takes days or weeks to get the application back up and running. And not much later the ability to migrate a virtual machine from one physical server to another without any downtime took the concept up a notch. Now I can easily perform hardware maintenance as well as even replacements without taking any business applications offline. Virtualization
  • 17. means better use of hardware by allowing multiple operating systems to run in parallel on it, thus imposing a much more strict application separation than the one provided by a “regular operating system” only. You still need the different applications, so you may have only one piece of hardware, but now you have to pay for the hardware, you have to pay for the hypervisor, you have to pay for the applications that you need and you have to pay for the necessary operating systems (one li- cense per VM). The big advantage is the better use of hardware, you have only 1 piece of hardware where you run what previously was running on a 1 hardware - 1 OS type of relationship. Reference Peltier, T. R. (2019). Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management. Boca Raton, FL: CRC Press. Marshall, D., Reynolds & McCrory, D. (2018). Advanced Server Virtualization: VMware and Microsoft Platforms in the Virtual Data Center. Boca Raton, FL: CRC Press. 8 9 10 1 Student paper PRACTICAL CONNECTION 1
  • 18. Original source PRACTICAL CONNECTION 1 2 Student paper PRACTICAL CONNECTION 4 Original source PRACTICAL CONNECTION 4 3 Student paper Practical Connection Assignment Original source Practical Connection Assignment 4 Student paper Sharath Kumar Goud Madgula Original source Sharath Kumar Goud Madgula 5
  • 19. Student paper InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term Original source InfoTech Import in Strat Plan (ITS-831-A02) - First Bi-Term 4 Student paper Term - Summer 2021 Original source Term - Summer 2021 6 Student paper University of the Cumberlands Original source University of the Cumberlands 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade71… 3/23
  • 20. %67 %7 Student paper 90% Student paper 66% jasa-cari-buku 88% yourtermpapers 100% techtarget 100% %74Attachment 2 Institutional database (9) Student paper Student paper Student paper Student paper My paper Student paper Student paper Student paper Student paper Internet (1) chromeinfotech Top sources (3) Excluded sources (0) 7 Student paper
  • 21. I have learned that security policy is termed as a group of policies issued by a specific or- ganization. The policy ensures that all the IT individuals within the organization have to comply with rules associated with the security of the information. All in all, these policies play an important role in the overall security of an organization. Original source A BYOD security policy is termed as a group of policies issued by a specific organization The policy ensures that all the IT individuals within the organization have to comply with rules associated with the BYOD security of the information (Rai, 2015 All in all, these policies play an important role in the overall security of an organization 1 Student paper Knowledge in server virtualization will help me in creating multiple instances of an oper- ating system - or even multiple different operating systems - on a single server hardware system. Original source Importance of Physical Security and Server Virtualization, which allows us to create mul- tiple different instances of an operating system on a single server hardware system
  • 22. 8 Student paper Information Security Policies, Procedures, and Standards: Original source Peltier Information Security Policies, Procedures, and Standards 9 Student paper Advanced Server Virtualization: Original source Advanced Server Virtualization 10 Student paper VMware and Microsoft Platforms in the Virtual Data Center. Original source VMware and Microsoft Platforms in the Virtual Data Center Word Count: 1,516 WK4 ServerVirtualization.docx 1 2 4 5 3 10
  • 23. 8 7 9 6 1 Student paper 2 Student paper 6 chromeinfotech 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade71… 4/23 Running Head: SERVER VIRTUALIZATION 1 SERVER VIRTUALIZATION 8 Lynknet Case Study for Virtualization Sharath Kumar Goud Madgula InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term Term - Summer 2021 University of the Cumberlands Lynknet Case Study for Virtualization Lynket is an imaginary firm in the storage manufacturing industry. This research study intend to elaborate the server virtualization concept using Microsoft virtu- alization software from Windows server 2012R2.
  • 24. Organization’s Preparedness for Virtualization. Currently, the Lynket IT system design is a mishmash of legacy frameworks that were obtained through vari- ous acquisitions of different providers in the storage industry. In any case, these old frameworks are aging and will soon need to be upgraded. These old frame- works however support Lynknet applications that have been in service for the last decade. The IT system situated in one of Lynket branch in Asia for instance comprise of old servers that have been in service for the last decade. These legacy servers were installed to host various company applications. The cost for license of these old applications are presently being inspected to check whether they can be dropped and the information moved to current Lynknet Enterprise Re- source Planning (ERP) applications. Consequently, since several IT related components are potential contender for upgrading, this makes the likelihood of changing over current physical server farms into virtualized computing resources appropriate. Microsoft Licensing of Virtualized Environments Microsoft cline have an option to license a Windows Server Standard or Windows Server Datacenter. In any case every physical server component must be licensed. Windows Server license allow clients to run more than two instances of Standard per license Server or two guest unlimited instances of Windows Server Datacenter per License Server (Reynolds & McCrory, 2016). Clients in need of more than two virtual machines on a server licensed for Standard version have the alternative of
  • 25. relicensing the entirety of the physical centers on the server to allow two extra running instances. Furthermore, if the Physical OSE is used distinctly to help vir- tual machines remaining load, similar licenses grant utilization of Windows Server as the host working framework. On the off chance that clients are moving workload between Licensed Servers, every one of those servers must be completely authorized to help the remaining load. License Mobility across Server Farms isn't accessible for Windows Server, so every server must be licensed for top limit consistently. Shared Storage Considerations In deciding which shared storage to use there are several factors that one must put into consideration. To start with one must consider the provider, provider must be well established as well as have proper knowledge of the services and also have trained staff to assist in times of breakdown. Bandwidth is another factor to consider, shared storage needs high bandwidth to enable easy access as well as retrieval of information at any time. Shared storage service cost should also be considered where by it should be reasonable as well as negotiable. Storage capacity as well as resilience to failure must also be put into consideration. There should be enough storage capacity to address any future expansion, the system should also be solid and able to withstand failure. Building High-Availability (HA) into Shared Storage. High availability (HA) comprise building redundancy into shared
  • 26. storage that ensures that in an event one gadget fails, others will take charge and ensures that the entire system doesn’t fail. This is same as having a backup power generator where in an event of blackout the generator will take charge. Building high availability in shared storage start with making use of available components within the system. For instance, availability of routers as well as switches gives you an upper hand in building high availability. Many of this connectivity devices support protocol that enhance redundancy. Main protocol to use so as to enhance high availability include standby router protocol as well as virtual routing redundancy protocol which enable back up router to take over in an event of failure (Blokdyk, 2019). Next, one need to extend redundancy on the entire tiers within the network. In an event there are some files and docu- ment that are regularly accessed, then they should be easily accessed internally as well as remotely. This can be achieved by adding a second internet link from your provider. NIC teaming where several network cards appears as one interface on a server enhances high availability by providing a backup card in case one fails. Building Redundancy into Shared Storage. Erasure coding (of which RAID is a simple subset) only applies when data is replicated, and allows protection against N failures to be achieved with far less total storage than N+1 copies. Downsides include the need to read/modify/write (instead of just write) when updating, and a high I/O cost for rebuilding data after a failure. 1 2
  • 27. 3 2 1 2 1 2 1 2 1 2 1 4 1 1 5 1 1 2 Again, these effects are magnified in a distributed system. Compression takes advantage of the redundancy within each piece of data (eg block or file) to encode it
  • 28. more efficiently. Hitches include having to decompress/recompress objects when they're rewritten, plus a more complex relationship between user-perceived offsets and actual storage offsets. Care must also be taken when combining compression with encryption (Blokdyk, 2019). Deduplication takes advantage of the redund- ancy between pieces of data to store multiple copies once and then keep pointers to that one copy. Downsides include the high cost of detecting duplicates and the need to keep reference counts on the stored chunks to know when they can be deleted. Both of these costs are magnified if the storage system is distributed. Windows Azure Cloud Services Windows Azure enables subscribers to create no-code web apps and code based web apps. It provides Artificial Intelligence components in building those apps. It en- ables you to host and migrate, your databases to the Cloud. Doing this means your databases are accessible, to you, via a browser. Analysis services including Ma- chine Learning prediction are provided via the Azure Machine Learning Studio hosted by Azure (Luescher & Flynn, 2018). Virtual Machines are made available to host your applications and data if you need to use them. Cloud Storage is also available without having to purchase expensive VM’s. You pay for what you use, not for, one- 1 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-
  • 29. BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade71… 5/23 Source Matches (38) Student paper 100% Student paper 100% My paper 89% Student paper 100% Student paper 72% off, purchasing fees. Below is a list of Azure cloud services A. Messaging Services: One of the interesting features of Microsoft Azure is the Azure Service Bus which facilitates Software Applications running either on premise or off-premise to communicate with the Azure Cloud facility. B. Mobile Engagement Services: This feature facilitates Users to monitor and manage the User Engagement that their Mobile applications are drawing in. It also supports real-time tracking of data analytics which provides a deeper perspective into User behavior. C. WebApps: Webapps is a high-density Website hosting Service that allows developers to quickly build Web applications using ASP.NET | Open-source web framework for .NET, PHP, Node.Js, Python and also deploy it to the Azure Cloud. D. Availability of Virtual Machines: Falling under Azure’s IaaS facility, this feature enables Users to launch their general-purpose Virtual Machines
  • 30. that are developed in either Windows or Linux Platform. E. Availability of App Services: This falls under Azure’s PaaS Service Section. Through the Azure App Services one can easily publish as well as manage their Business Web Applications and Websites. Why Lynknet Should Consider Windows Azure For an international companies like Lynknet, Windows Azure will provides easy access to data on any device. Data created on premise model and lost due to the crash of the website or because of any disaster is too hard to recover whereas one can recover data very easily if it was made available on the Microsoft Azure. Most of the companies feel trepidation in using the cloud services as data created over on premise models allow direct control over security measures but one can use the Azure cloud services because they provide 24/7 unified security management across hybrid cloud networks. One of the key reason for using Azure is cost saving. Cre- ating data over on premise models involves the deployment of myriads of resources whereas Azure markets up to 72% saving with pay-as-you-go pricing. Any type of information stored on Azure meets regulatory standards, this make Azure accommodating mostly for the legal or the monetary sectors. On top of that, it is developed with security aspect in mind hence favorable for any business. Azure is well known for having a few server farms and conveyance focuses. That conveys the content quicker, and on top of that helps users in sharing information across the globe with ease. Reference Marshall, D., Reynolds & McCrory, D. (2016). Advanced Server
  • 31. Virtualization: VMware and Microsoft Platforms in the Virtual Data Center. Boca Raton, FL: CRC Press. Carpenter, T. (2018). Microsoft Windows Server Administration Essentials. Hoboken, NJ: John Wiley & Sons. Blokdyk, G. (2019). Shared Storage A Complete Guide - 2020 Edition. NJ: 5starcooks. Savill, J. (2019). Microsoft Azure Infrastructure Services for Architects: Designing Cloud Solution s. Hoboken, NJ: John Wiley & Sons. Finn, Luescher & Flynn. (2018). Windows Server 2012 Hyper-V Installation and Configuration Guide. Hoboken, NJ: John Wiley & Sons. 6 6 6 6
  • 32. 7 1 1 8 8 9 10 8 1 Student paper SERVER VIRTUALIZATION 1 Original source SERVER VIRTUALIZATION 1 2 Student paper
  • 33. SERVER VIRTUALIZATION 8 Original source SERVER VIRTUALIZATION 8 3 Student paper Lynknet Case Study for Virtualization Sharath Kumar Goud Madgula InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term Term - Summer 2021 Original source Sharath Kumar Goud Madgula InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term Term - Summer 2021 2 Student paper
  • 34. University of the Cumberlands Original source University of the Cumberlands 1 Student paper Lynknet Case Study for Virtualization Original source Econet Case Study for Virtualization 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade71… 6/23 Student paper 91%
  • 35. Student paper 100% Student paper 92% Student paper 71% Student paper 85% Student paper 78% Student paper 93% Student paper 89% 2 Student paper This research study intend to elaborate the server virtualization concept using Microsoft virtualization software from Windows server 2012R2. Original source
  • 36. This paper intend to elaborate the server virtualization concept using Microsoft virtualiza- tion software from Windows server 2012R2 1 Student paper Organization’s Preparedness for Virtualization. Original source Organization’s Preparedness for Virtualization 2 Student paper Currently, the Lynket IT system design is a mishmash of legacy frameworks that were ob- tained through various acquisitions of different providers in the storage industry. In any case, these old frameworks are aging and will soon need to be upgraded.
  • 37. Original source As of now, the IT system design is a mishmash of old frameworks that were obtained through various acquisitions of different providers in the storage industry In any case, these old frameworks are aging and will soon need to be upgraded 1 Student paper These old frameworks however support Lynknet applications that have been in service for the last decade. Original source These legacy frameworks, however, support Econet applications that have been in service for the last twenty years 2
  • 38. Student paper The IT system situated in one of Lynket branch in Asia for instance comprise of old serv- ers that have been in service for the last decade. Original source The IT system situated in one of Technet branch in Asia for instance comprise of old serv- ers that have been in service for the last 5 years 1 Student paper These legacy servers were installed to host various company applications. Original source Econet installed these old servers to host various company applications 2
  • 39. Student paper The cost for license of these old applications are presently being inspected to check whether they can be dropped and the information moved to current Lynknet Enterprise Resource Planning (ERP) applications. Consequently, since several IT related components are potential contender for upgrading, this makes the likelihood of changing over current physical server farms into virtualized computing resources appropriate. Original source The expense for permit of these old applications are presently being inspected to check whether they can be dropped and the information moved to current Technet Enterprise Resource Planning (ERP) applications Consequently, since several IT related components are potential contender for upgrading, this makes the likelihood of changing over current physical server farms into virtualized computing resources
  • 40. appropriate 1 Student paper Microsoft Licensing of Virtualized Environments Microsoft cline have an option to license a Windows Server Standard or Windows Server Datacenter. In any case every physical server component must be licensed. Windows Server license allow clients to run more than two instances of Standard per license Server or two guest unlimited instances of Windows Server Datacenter per License Server (Reynolds & McCrory, 2016). Original source Microsoft Licensing of Virtualized Environments Microsoft clients have an option to either license a Windows Server Standard or Windows Server Datacenter Initially, every physical server component must be licensed Windows Server license allows clients to run more
  • 41. than two instances of Standard per license Server or two guest unlimited instances of Windows Server Datacenter per License Server (Lamping, 2014) 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade71… 7/23 Student paper 97% Student paper 82% Student paper 100% Student paper 70% Student paper 90% Student paper 100% Student paper 95%
  • 42. 1 Student paper Clients in need of more than two virtual machines on a server licensed for Standard ver- sion have the alternative of relicensing the entirety of the physical centers on the server to allow two extra running instances. Original source Clients in need of more than two virtual machines on a server licensed for Standard ver- sion have the alternative of relicensing the entirety of the physical centers on the server to allow two other running instances 4 Student paper Furthermore, if the Physical OSE is used distinctly to help virtual machines remaining
  • 43. load, similar licenses grant utilization of Windows Server as the host working framework. On the off chance that clients are moving workload between Licensed Servers, every one of those servers must be completely authorized to help the remaining load. License Mo- bility across Server Farms isn't accessible for Windows Server, so every server must be li- censed for top limit consistently. Original source Moreover, if the Physical OSE is utilized distinctly to help VM outstanding burdens, similar licenses grant utilization of Windows Server as the host working framework On the off chance that clients are moving remaining tasks at hand between Licensed Servers, every one of those servers must be completely authorized to help the outstanding burdens Per- mit Mobility across Server Farms isn't accessible for Windows Server, so every server must be authorized for top limit consistently 1
  • 44. Student paper Shared Storage Considerations Original source Shared Storage Considerations 1 Student paper To start with one must consider the provider, provider must be well established as well as have proper knowledge of the services and also have trained staff to assist in times of breakdown. Original source First of all, one must consider the provider, the provider must be well-vetted, and they must have proper knowledge of the services and also have trained staff to provide
  • 45. support 5 Student paper Bandwidth is another factor to consider, shared storage needs high bandwidth to enable easy access as well as retrieval of information at any time. Shared storage service cost should also be considered where by it should be reasonable as well as negotiable. Original source Bandwidth is another factor to consider, and shared storage needs high bandwidth to en- able easy access and retrieval of information at any time (Paulsen, 2019) Shared storage service cost should also be considered, whereby it should be reasonable as well as negotiable 1
  • 46. Student paper Storage capacity as well as resilience to failure must also be put into consideration. Original source Storage capacity, as well as resilience to failure, must also be put into consideration 1 Student paper Building High-Availability (HA) into Shared Storage. High availability (HA) comprise build- ing redundancy into shared storage that ensures that in an event one gadget fails, others will take charge and ensures that the entire system doesn’t fail. This is same as having a backup power generator where in an event of blackout the generator will take charge. Building high availability in shared storage start with making use of available components within the system.
  • 47. Original source Building High-Availability (HA) into Shared Storage High availability (HA) comprises build- ing redundancy into shared storage that ensures that in an event one gadget fails, others will take charge and ensures that the entire system doesn’t fail This is the same as having a backup power generator wherein an event of blackout the generator will take charge Building high availability in shared storage starts with maki ng use of available compon- ents within the system 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade71… 8/23 Student paper 89%
  • 48. Student paper 100% Student paper 94% Student paper 84% Student paper 82% Student paper 62% chromeinfotech 69% chromeinfotech 63% 1 Student paper For instance, availability of routers as well as switches gives you an upper hand in build- ing high availability. Many of this connectivity devices support protocol that enhance redundancy. Original source
  • 49. For instance, the availability of routers as well as switches gives you an upper hand in building high availability Many of these connectivity devices support protocol that en- hances redundancy 2 Student paper Building Redundancy into Shared Storage. Original source Building Redundancy into Shared Storage 1 Student paper Care must also be taken when combining compression with encryption (Blokdyk, 2019). Deduplication takes advantage of the redundancy between pieces of data to store mul-
  • 50. tiple copies once and then keep pointers to that one copy. Downsides include the high cost of detecting duplicates and the need to keep reference counts on the stored chunks to know when they can be deleted. Both of these costs are magnified if the storage sys- tem is distributed. Original source Care must also be taken when combining compression with encryption Deduplication takes advantage of the redundancy between pieces of data to store multiple copies once and then keep pointers to that one copy (Leep, 2015) Downsides include the high cost of detecting duplicates and the need to maintain reference counts on the stored chunks to know when they can be deleted Both of these costs are magnified if the storage system is distributed 1 Student paper
  • 51. Windows Azure Cloud Services Windows Azure enables subscribers to create no-code web apps and code based web apps. It provides Artificial Intelligence components in building those apps. It enables you to host and migrate, your databases to the Cloud. Original source Windows Azure Cloud Services Windows Azure enables users to create no-code web apps and code-based web apps It provides smart components in building those apps It allows users to host and migrate their databases to the Cloud 1 Student paper Doing this means your databases are accessible, to you, via a browser. Analysis services including Machine Learning prediction are provided via the Azure Machine Learning Stu- dio hosted by Azure (Luescher & Flynn, 2018). Virtual
  • 52. Machines are made available to host your applications and data if you need to use them. Cloud Storage is also available without having to purchase expensive VM’s. Original source Doing this means your database is accessible via a browser Analysis services, including Machine Learning prediction, are provided via the Azure Machine Learning Studio hosted by Azure (Redkar, 2015) Virtual Machines are made available to host applications as well as data Cloud Storage is also available without having to purchase expensive VM’s 1 Student paper You pay for what you use, not for, one-off, purchasing fees. Original source You pay for what you use
  • 53. 6 Student paper One of the interesting features of Microsoft Azure is the Azure Service Bus which facilit- ates Software Applications running either on premise or off- premise to communicate with the Azure Cloud facility. Original source Yes, Microsoft Azure features list also consists of an Azure Service bus through which software applications that run on either Azure on-premises or even off-premises commu- nicate with the Azure cloud facility 6 Student paper Webapps is a high-density Website hosting Service that allows developers to quickly build
  • 54. Web applications using ASP.NET | Open-source web framework for .NET, PHP, Node.Js, Python and also deploy it to the Azure Cloud. Original source Through this, developers and programmers can build websites and web applications us- ing Asp.Net | PHP | Node.JS | Python and quickly deploy to the Azure cloud using the FTP, Git, Team foundation server and Mercurial also 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade71… 9/23 chromeinfotech 64% chromeinfotech 91% Student paper 80%
  • 55. Student paper 75% Student paper 65% Student paper 100% Student paper 100% Student paper 73% 6 Student paper Falling under Azure’s IaaS facility, this feature enables Users to launch their general-pur- pose Virtual Machines that are developed in either Windows or Linux Platform. Original source Users can launch their general-purpose virtual machines developed in windows or Linux platforms
  • 56. 6 Student paper Through the Azure App Services one can easily publish as well as manage their Business Web Applications and Websites. Original source Through Azure App Services, you can easily publish as well as manage your websites and business web applications 7 Student paper Why Lynknet Should Consider Windows Azure Original source Why The Organization Should Consider Windows Azure
  • 57. 1 Student paper For an international companies like Lynknet, Windows Azure will provides easy access to data on any device. Original source Windows Azure provides easy access to data on any device 1 Student paper Advanced Server Virtualization: Original source SERVER VIRTUALIZATION 1 8 Student paper
  • 58. John Wiley & Sons. Original source John Wiley & Sons 8 Student paper John Wiley & Sons. Original source John Wiley & Sons 9 Student paper Finn, Luescher & Flynn. Original source
  • 59. (Finn, Lownds, Luescher & Flynn, 2013) 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade7… 10/23 %89 %0 Student paper 100% Student paper 100% %89Attachment 3 Institutional database (9) Student paper Student paper Student paper Student paper Student paper Student paper
  • 60. Student paper Student paper My paper Global database (1) Student paper Top sources (3) Excluded sources (0) 10 Student paper Windows Server 2012 Hyper-V Installation and Configuration Guide. Original source Windows Server 2012 Hyper-V Installation and Configuration Guide 8
  • 61. Student paper John Wiley & Sons. Original source John Wiley & Sons Word Count: 1,740 WK5 HealthcareComputerandInternetPolicy.docx 1 6 5 8 4 9 7 3 2 10 1 Student paper 6 Student paper 5 Student paper Running Head: HEALTHCARE SECURITY POLICY 1 HEALTHCARE SECURITY POLICY 9
  • 62. Healthcare Security Policy Sharath Kumar Goud Madgula InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term Term - Summer 2021 University of the Cumberlands Purpose This security policy highlights guidelines and provisions for maintaining data security and technology infrastructure. The more we rely on technology to gather, store as well as manage information, the more exposed we are to security breaches. Mistakes caused by humans, system flaws and attacks by hackers can cause a serious financial as well as national security harm. This security policy have introduced several security measures as well as guidelines that can be used to mitigate security risks. Scope This policy applies to all employees within the organization,
  • 63. suppliers, interns as well as anyone who has permanent or temporary access to organization sys- tems as well as network. General Policy and Guidelines Technet embraces a decent computer use policy. Technet doesn’t have assets to screen every day network action, record use, email, internet access or a large num- ber of different things that help employees at their work. In any case, Technet claim all authority to step in and authorize rules that haven't been adhered to and ad- vice recurrent guilty parties. The requirement for a policy emerges to some degree from the need to give employees a predictable, steady, secure workplace. To attain 1 1 2 3
  • 64. 2 4 5 5 6 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade71… 11/23 this, Technet have to set up general standards of conduct concerning PC, applications and system use in order to productively use the restricted resources accessible. Responsibilities The Chief Information Security Officer: is liable for creating,
  • 65. maintaining, implementing and overseeing Technet information frameworks security policy. While obligation regarding information frameworks security on a daily basis is each user obligation, specific direction and authority for information system security is integ- rated for the entire department information. Information system threat assessment will be conducted by the IT department so as to come up with information sys- tem action plans, assess system security as well as perform different actions critical to guarantee a secured information frameworks setup. Information Security Man- ager: is liable for planning assessment related to any computer security breaches, attacks or issues with the IT infrastructure services. Any breaches or potential breaches must be reported immediately to the IT department. Infrastructure administrator: is answerable for updating the security administrator. They are an- swerable for acting as local data system security controllers. They are answerable for building up proper user rights, monitoring access control logs as well as con- ducting comparable security actions for the systems they monitor. They are also answerable for listing all suspicious PC
  • 66. and system security-based actions to the Se- curity Administrator. System heads also implements the prerequisites of this and other information system security policies, benchmarks, rules, and methodology. If a framework is monitored or owned by a third party, the department chief of the group renting the administrations plays out the activities of the system adminis- trator. IT heads: are liable for ensuring that all departments adhere to the set system safety measures. Apart from distributing necessary assets as well as user time to attain the prerequisites of these policies, department supervisors are answerable for guaranteeing that all users are conversant to the Technet policies related to system security. All Heads of departments: are liable in ensuring that proper system safety efforts are observed by all users. Department heads are answer- able in ensuring that all users are aware of Technet computer system policies. Users are answerable for consenting to different Technet system security policies. They are additionally answerable for reporting any system vulnerability they come across while working on the system. Password Protection Policy
  • 67. The password is one of the important factors of security. Password is used to protect data and personal information. Every gadget as well as system connected to Technet network must be password protected (Seitz, 2019). The password must contain more than 8 characters and should be combination of uppercase, lowercase letters, numbers, and special symbols. The reason behind this is that it makes password strong and hard to guess. Employees are discouraged to use obvious inform- ation as password, for example your name or surname, birth date, address etc. The general idea of password is for user verification, that’s why it’s important to have a strong, at least 8 characters alphanumeric password. Passwords are they key to your finances or any sensitive and personal things. Passwords must contain special characters to maintain the strength of the password. A secure password must have alphanumeric character and special symbol and keep your account safe from hacking. Users are discouraged to use their name, nickname and mobile number as their password because this type of password is easily guessable. 1
  • 68. 1 1 1 1 Employees are advised to use something as random and complex as possible, but make sure it still relates to something so you can remember it (sdfkj830#$$#sdf is not as good a password as th1515apa$$word). Computer and e- mail Use Acceptable Policy Technet staff are urged to send personal email and carryout similar exercises individually at whatever point conceivable (Macdonald, 2019). In any case, the peri- odic personal use of email as well as other shared information systems while at work is allowed within sensible limits. · Personal messages are dealt with equivalent to other messages in the system, which could conceivably be archived every once in a while and along these lines subject to recovery considerably after the user be- lieves to have erased them. · Technet reminds each employee
  • 69. that every visit to the internet as well as email exchange uses Technet name. Therefore use of any re- sources must be precise, proper, and ought not to subject Technet to potential risk. · Technet employees must protect their email passwords, known distinctly to themselves whenever. In any case, the IT department holds the capacity to erase an employee’s secret key in any way comprising resetting the password whenever forgotten or to check an account’s mail if important. Technet internet should not be used to get to or get or download any material that might be viewed as annoying, problematic, or hostile by other people. Email Attachment · Any unknown email attachments is deleted without opening. On the off chance that the attachment appears to be suspicious, contact the IT De- partment. · Email attachments that come from a known source must be scanned for viruses. It is an offence to disable scanning settings from any computer. · Attach- ments are not to surpass 1.5 M, or ~1500K. Attachments bigger than this are probably going to crash your email server and additionally cause issues with the mail server. · In the event that you realize you will need to send a huge file ahead of time, notify the IT department for arrangements. Computer Use Acceptable Policy
  • 70. Users must keep affirmed and latest anti-virus program installed on their PCs. This programs must be applied to check all third party applications or different Technet units and must occur before the new applications are used. Users must not sidestep scanning process that could stop the transmission of PC virus (Peltier, 2019). Users are answerable for harm happening in light of virus on PC frameworks under their control. When a virus is recognized, the involved user must quickly re- port to the IT department to guarantee that no further spread takes place and that any specialists expected to annihilate the virus are expeditiously locked in. Computer as well as communication system rights of every user, system and programs must be confined dependent on nature of work. This means that rights must not be extended unless the user needs such rights (Anandarajan & Simmers, 2019). Default user file authorizations ought not to automatically permit everyone on the system to read, write, execute or erase a file record. Even if the user may reset consents on a file by-document premise, such sensitive default document rights
  • 71. are disallowed. Default file consents granted to limited group of users who have a veritable need to know are permitted. Internet Acceptable use Policy Only approved personnel can access Technet network. Users are given certain rights and unique user passwords. None of these information can be revealed or par- taken in any way with other individuals or carelessly stored in a place where it can be seen by everyone. Users must change their passwords after every four weeks following the organization password policy. Users must also ensure that their wireless devices are installed with anti-virus and firewall software before joining the or- ganization network (Schou & Shoemaker, 2019). In an event of any inquiries or doubts, it is prescribed to refer to Information security support group for help. Wireless Network Acceptable use Policy · Every Access Points must adhere to all national regulations concerning Wireless gadget. · Every Access Points on the network must follow the suggested provisions as dictated by Information security. · Procurement of new Access Points must be approved by Information security department, as defined by the current procurement policy as well as the
  • 72. organization Information Technology Standardization initiative. · Every Access Points on the network must observe the standard Access Points configuration set by information security team. · Information Security forbid the installation of any Access points that does not meet the agreed standards. · Wireless networks control and management will be carried out by Information · Security on a daily basis and any unapproved Access Point will be deactivated from the network. Policy Enforcement 7 6 7 1 8 1 7
  • 73. 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemp tId=26751137 -169d-4a21-86d3-7b6fade7… 12/23 Source Matches (39) Student paper 81% Student paper 64% My paper 100% Student paper 100% My paper 100% Student paper 100% There is need for all involved parties to comply with this policy and where requested to exhibit such compliance. Failure to observe this policy will be
  • 74. viewed as a disciplinary incident and one may face disciplinary action which may including termination of employment. 9 1 Reference Peltier, T. R. (2019). Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management. Boca Raton, FL: CRC Press. Schou & Shoemaker, D. (2019). Information assurance for the enterprise: A roadmap to information security. Boston: McGraw-Hill Irwin. Mac- donald, L. (2019). Email and internet policies and guidance notes. Tolley's Managing Email & Internet Use, 218-278. doi:10.1016/b978-0-7545-2443-4.50010- 9 Anandarajan & Simmers. (2019). Managing Web Usage in the Workplace: A Social, Ethical and Legal Perspective. Hershey, PA: IGI Global. Organizational in-
  • 75. formation security policies: a review and research framework. (2018, February 15). Retrieved from https://www.tandfonline.com/doi/abs/10.1057/s41303-017-0059- 9 Shim, J. K., Qureshi & Siegel. (2018). The international handbook of computer security. Chicago: Glenlake Pub. Seitz, T. (2019). Supporting users in password authentication with persuasive design. Tobias Seitz. Rhodes- Ousley & Strassberg, K. (2018). Network security: The complete reference. McGraw-Hill Osborne Media. 1 5 5 5 4 10 6 6 5 5 1
  • 76. Student paper HEALTHCARE SECURITY POLICY 1 Original source SECURITY POLICY 1 1 Student paper Healthcare Security Policy Original source IT Security Policy 2 Student paper Sharath Kumar Goud Madgula Original source
  • 77. Sharath Kumar Goud Madgula 3 Student paper InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term Original source InfoTech Import in Strat Plan (ITS-831-A02) - First Bi-Term 2 Student paper Term - Summer 2021 Original source Term - Summer 2021 4
  • 78. Student paper University of the Cumberlands Original source University of the Cumberlands 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ul tra?attemptId=26751137 -169d-4a21-86d3-7b6fade7… 13/23 Student paper 95% Student paper 79% Student paper 89% Student paper 91% Student paper 89%
  • 79. Student paper 96% 5 Student paper Purpose This security policy highlights guidelines and provisions for maintaining data se- curity and technology infrastructure. The more we rely on technology to gather, store as well as manage information, the more exposed we are to security breaches. Mistakes caused by humans, system flaws and attacks by hackers can cause a serious financial as well as national security harm. This security policy have introduced several security meas- ures as well as guidelines that can be used to mitigate security risks. Original source Purpose of the Policy This security policy highlights guidelines and provisions for main- taining data security and technology infrastructure The more we
  • 80. depend on technology to gather, store as well as manage information, the more vulnerable we are to security breaches Mistakes caused by humans, system flaws and attacks by hackers can cause a serious financial as well as national security harm This security policy have introduced several security measures as well as guidelines that can be used to mitigate security risks 5 Student paper This policy applies to all employees within the organization, suppliers, interns as well as anyone who has permanent or temporary access to organization systems as well as network. Original source Scope This policy applies to all our workers, suppliers, interns as well as anyone who has permanent or temporary access to our systems and network
  • 81. 6 Student paper General Policy and Guidelines Technet embraces a decent computer use policy. Technet doesn’t have assets to screen every day network action, record use, email, internet access or a large number of different things that help employees at their work. In any case, Tech- net claim all authority to step in and authorize rules that haven't been adhered to and ad- vice recurrent guilty parties. Original source General Policy and Guidelines Econet embraces a decent computer use policy Econet doesn’t have assets to screen everyday network action, record use, email, internet access or a large number of different things that help employees at their work In any case, we claim all authority to step in and authorize rules that haven't been adhered to and advise
  • 82. recurrent guilty parties 6 Student paper The requirement for a policy emerges to some degree from the need to give employees a predictable, steady, secure workplace. To attain this, Technet have to set up general standards of conduct concerning PC, applications and system use in order to productively use the restricted resources accessible. Original source The requirement for a policy emerges to some degree from the need to give you a pre- dictable, steady, secure workplace To do that, we have to set up general standards of conduct concerning PC, applications and system use in order productively use the restric- ted resources accessible 1
  • 83. Student paper is liable for creating, maintaining, implementing and overseeing Technet information frameworks security policy. While obligation regarding information frameworks security on a daily basis is each user obligation, specific direction and authority for information system security is integrated for the entire department information. Information system threat assessment will be conducted by the IT department so as to come up with inform- ation system action plans, assess system security as well as perform different actions crit- ical to guarantee a secured information frameworks setup. Original source The Chief Information Security Officer is liable for creating, maintaining, implementing, overseeing as well as deducing DoD information frameworks security policy, benchmar ks, rules, and strategies While obligation regarding information frameworks security on a
  • 84. daily basis is each user obligation, specific direction and authority for information system security is integrated for the entire department information Information system threat assessment will be conducted by the IT department so as to come up with information system action plans, assess system security as well as perform different actions critical to guarantee a secured information frameworks setup 1 Student paper is liable for planning assessment related to any computer security breaches, attacks or issues with the IT infrastructure services. Any breaches or potential breaches must be re- ported immediately to the IT department. Original source Information Security Manager is liable for planning assessment related to any computer security breaches, attacks or issues with the IT Infrastructure
  • 85. Services Any breaches or potential breaches must be reported immediately to the IT department 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade7… 14/23 Student paper 94% Student paper 97% Student paper 94% Student paper 91% Student paper 69% Student paper 88% 1
  • 86. Student paper is answerable for updating the security administrator. They are answerable for acting as local data system security controllers. They are answerable for building up proper user rights, monitoring access control logs as well as conducting comparable security actions for the systems they monitor. They are also answerable for listing all suspicious PC and system security-based actions to the Security Administrator. Original source Infrastructure administrator is answerable for updati ng the Security Administrator They are answerable for acting as local data system security controllers They are answerable for building up proper user rights, monitoring access control logs as well as conducting comparable security actions for the systems they monitor (Blokdyk, 2020) They are also answerable for listing all suspicious PC and system security- based actions to the Security
  • 87. Administrator 1 Student paper System heads also implements the prerequisites of this and other information system se- curity policies, benchmarks, rules, and methodology. If a framework is monitored or owned by a third party, the department chief of the group renting the administrations plays out the activities of the system administrator. Original source System heads also implements the prerequisites of this and other information system se- curity policies, benchmarks, rules, and methodology If a framework is overseen or owned by a third party, the department chief of the group renting the administrations plays out the activities of the system administrator 1
  • 88. Student paper are liable for ensuring that all departments adhere to the set system safety measures. Apart from distributing necessary assets as well as user time to attain the prerequisites of these policies, department supervisors are answerable for guaranteeing that all users are conversant to the Technet policies related to system security. Original source IT heads are liable for ensuring that all departments adhere to the set system safety measures Apart from distributing necessary assets as well as user time to attain the pre- requisites of these policies, department supervisors are answerable for guaranteeing that all users are conversant to the DoD policies related to system security 1 Student paper
  • 89. are liable in ensuring that proper system safety efforts are observed by all users. Depart- ment heads are answerable in ensuring that all users are aware of Technet computer sys- tem policies. Users are answerable for consenting to different Technet system security policies. They are additionally answerable for reporting any system vulnerability they come across while working on the system. Original source All Heads of departments are liable in ensuring that proper system safety efforts are ob- served by all users Department heads are answerable in ensuring that all users are aware of DoD computer system policies Users are answerable for consenting to different DoD system security policies They are additionally answerable for reporting any system vul- nerability they come across while working on the system 7
  • 90. Student paper Computer and e-mail Use Acceptable Policy Original source Computer and email acceptable use policy 6 Student paper Technet staff are urged to send personal email and carryout similar exercises individually at whatever point conceivable (Macdonald, 2019). In any case, the periodic personal use of email as well as other shared information systems while at work is allowed within sens- ible limits. · Personal messages are dealt with equivalent to other messages in the sys- tem, which could conceivably be archived every once in a while and along these lines sub- ject to recovery considerably after the user believes to have erased them. · Technet re- minds each employee that every visit to the internet as well as
  • 91. email exchange uses Tech- net name. Original source Econet staff are urged to send personal emails and carry out similar exercises individually at whatever point conceivable In any case, the periodic personal use of email as well as other shared information systems while at work is allowed within sensible limits · Per- sonal messages are dealt with equivalent to other messages in the framework, which could conceivably be archived every once in a while and along these lines subject to re- covery considerably after the user believes to have erased them · Econet reminds each employee that every visit to the internet as well as email exchange uses Econet's name 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/ mdb-sa-
  • 92. BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade7… 15/23 Student paper 89% Student paper 95% Student paper 100% Student paper 81% Student paper 96% Student paper 100% Student paper 100% 6 Student paper Therefore use of any resources must be precise, proper, and ought not to subject Tech- net to potential risk. · Technet employees must protect their email passwords, known dis-
  • 93. tinctly to themselves whenever. In any case, the IT department holds the capacity to erase an employee’s secret key in any way comprising resetting the password whenever forgot- ten or to check an account’s mail if important. Technet internet should not be used to get to or get or download any material that might be viewed as annoying, problematic, or hostile by other people. Original source Therefore the use of any resources must be precise, proper, and ought not to subject Econet to potential risk (Anandarajan & Simmers, 2003) · Econet employees must protect their email passwords, known distinctly to themselves whenever In any case, the IT de- partment holds the capacity to erase an employee’s secret key in any way comprising re- setting the password whenever forgotten or to check an account’s mail if important (De- veloping an Information Security Policy · Econet internet should not be used to get to or get or download any material that might be viewed as annoying,
  • 94. problematic, or hostile by other people 6 Student paper Email Attachment · Any unknown email attachments is deleted without opening. On the off chance that the attachment appears to be suspicious, contact the IT Department. · Email attachments that come from a known source must be scanned for viruses. It is an offence to disable scanning settings from any computer. Original source Email Attachment · Any unknown email attachments are deleted without opening On the off chance that the attachment appears to be suspicious, contact the IT Department · Email attachments that come from a known source must be scanned for viruses It is an offense to disable scanning settings from any computer
  • 95. 6 Student paper · Attachments are not to surpass 1.5 M, or ~1500K. Attachments bigger than this are probably going to crash your email server and additionally cause issues with the mail server. · In the event that you realize you will need to send a huge file ahead of time, no- tify the IT department for arrangements. Original source · Attachments are not to surpass 1.5 M, or ~1500K Attachments bigger than this are prob- ably going to crash your email server and additionally cause issues with the mail server · In the event that you realize you will need to send a huge file ahead of time, notify the IT department for arrangements 7 Student paper
  • 96. Computer Use Acceptable Policy Original source Computer and email acceptable use policy 1 Student paper Users must keep affirmed and latest anti-virus program installed on their PCs. This pro- grams must be applied to check all third party applications or different Technet units and must occur before the new applications are used. Users must not sidestep scanning pro- cess that could stop the transmission of PC virus (Peltier, 2019). Users are answerable for harm happening in light of virus on PC frameworks under their control. Original source Users must keep affirmed and latest anti-virus program installed
  • 97. on their PCs This pro- grams must be applied to check all third party applications or different DoD units and must occur before the new applications are used Users must not sidestep scanning pro- cess that could stop the transmission of PC virus Users are answerable for harm happen- ing in light of virus on PC frameworks under their control 1 Student paper When a virus is recognized, the involved user must quickly report to the IT department to guarantee that no further spread takes place and that any specialists expected to annihil- ate the virus are expeditiously locked in. Original source When a virus is recognized, the involved user must quickly report to the IT department to guarantee that no further spread takes place and that any specialists expected to annihil-
  • 98. ate the virus are expeditiously locked in 8 Student paper Computer as well as communication system rights of every user, system and programs must be confined dependent on nature of work. Original source Computer as well as communication system rights of every user, system and programs must be confined dependent on nature of work 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade7… 16/23 Student paper 96%
  • 99. Student paper 100% Student paper 100% Student paper 100% Student paper 100% Student paper 86% Student paper 100% Student paper 100% Student paper 92% 1 Student paper This means that rights must not be extended unless the user needs such rights (Ananda- rajan & Simmers, 2019). Default user file authorizations ought not to automatically permit
  • 100. everyone on the system to read, write, execute or erase a file record. Even if the user may reset consents on a file by-document premise, such sensitive default document rights are disallowed. Default file consents granted to limited group of users who have a veritable need to know are permitted. Original source This means that rights must not be extended unless the user needs such rights Default user file authorizations ought not to automatically permit everyone on the system to read, write, execute or erase a file record Even if the user may reset consents on a file by- document premise, such sensitive default document rights are disallowed Default file consents granted to limited group of users who have a veritable need to know are permitted 7 Student paper
  • 101. Internet Acceptable use Policy Original source Acceptable internet use policy 9 Student paper There is need for all involved parties to comply with this policy and where requested to exhibit such compliance. Original source There is need for all involved parties to comply with this policy and where requested to exhibit such compliance 1 Student paper
  • 102. Failure to observe this policy will be viewed as a disciplinary incident and one may face disciplinary action which may including termination of employment. Original source Failure to observe this policy will be viewed as a disciplinary incident and one may face disciplinary action which may including termination of employment 1 Student paper Information Security Policies, Procedures, and Standards: Guidelines for Effective Inform- ation Security Management. Boca Raton, FL: Original source Information Security Policies, Procedures, and Standards Guidelines for Effective Informa- tion Security Management Boca Raton, FL
  • 103. 5 Student paper Schou & Shoemaker, D. Original source Schou, C., & Shoemaker, D 5 Student paper Information assurance for the enterprise: A roadmap to information security. Original source Information assurance for the enterprise A roadmap to information security 5
  • 104. Student paper McGraw-Hill Irwin. Original source McGraw-Hill Irwin 4 Student paper Email and internet policies and guidance notes. Tolley's Managing Email & Internet Use, 218-278. Original source Email and Internet Policies and Guidance Notes Tolleys Managing Email & Internet Use, 218–278 6/11/2021 Originality Report
  • 105. https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade7… 17/23 %93 %0 Student paper 90% Student paper 100% Student paper 100% Student paper 71% Student paper 100% %93Attachment 4 Institutional database (7) Student paper Student paper Student paper
  • 106. Student paper Student paper My paper Student paper Internet (1) knowledgeleader Top sources (3) Excluded sources (0) 10 Student paper doi:10.1016/b978-0-7545-2443-4.50010-9 Original source idoi:10.1016/b978-0-7545-2443-4.50010-9 6 Student paper
  • 107. Managing Web Usage in the Workplace: A Social, Ethical and Legal Perspective. Original source Managing Web Usage in the Workplace A Social, Ethical and Legal Perspective 6 Student paper Organizational information security policies: a review and research framework. (2018, February 15). Retrieved from https://www.tandfonline.com/doi/abs/10.1057/s41303-017- 0059-9 Original source Organizational information security policies a review and research framework (2018, Feb- ruary 15) Retrieved from https://www.tandfonline.com/doi/abs/10.1057/s41303-017-
  • 108. 0059-9 5 Student paper K., Qureshi & Siegel. Original source K., Qureshi, A 5 Student paper The international handbook of computer security. Original source The international handbook of computer security Word Count: 1,563 Wk6 COSOFramework.docx
  • 109. 2 5 6 1 7 3 4 8 2 Student paper 5 Student paper 6 Student paper Running Head: COSO FRAMEWORK 1 COSO FRAMEWORK 8 1 2 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade7… 18/23
  • 110. COSO Framework Sharath Kumar Goud Madgula InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term Term - Summer 2021 University of the Cumberlands The COSO model comprises of various basic advances carried out in phases to deliver ground-breaking outcome. These outcomes incorporate assessment of threat, viability of current projects, and the effect of future activities on accomplishment of key objectives (Moeller, 2018). The test for the COSO system team is to val- idate the effortlessness of the means in the model to leaders, to guarantee their comprehension of the idea and implement the model. If need be, a few phases can be expelled, and the model exposed to its risk assessment segment if different level of evaluation are considered not to increase management value, without tamper- ing with model effectiveness. Robustness is one of COSO model
  • 111. strength. This strength originate from system model assessing main objectives as well as targets. Regardless of whether management changed their priority list, the model would consequently adopt and prepare for any change and on the same time update threat register and different outcomes appropriately. Other models needs a top to bottom audit of each threat in light of such a change (Graham, 2018). COSO's focus is on giving an adaptable standard against which to assess an association's present ERM process instead of concentrating on the particular exercises of the risk man- agement procedure itself. Internal auditors are entrusted to independently evaluate these controls, operating as board of directors in the interest of the direct- orate so as to alleviate the chance of the management acting on their own good instead of the organization, exposing internal control framework to be easily ex- ploited and in some cases doing as such so as to allow illegal personal gains (Moeller, 2018). COSO framework is used as a perceived system, which, whenever actual- ized. Organizations that intend to execute the COSO ERM structure should survey ISO 31000 (and different systems) for
  • 112. extra point of view and direction on us- age contemplations. COSO Components 1. Risk Assessment Although event identification work along evaluation, evaluation all alone is recommended as a segment to stress on inter-linked threats role. The system puts a great deal of significance on this part by pushing both on subjective strategies just as quantifiable ones of threat evaluation (Cendrowski & Mair, 2019). Organization management ought to consider all threats according to this component that could imply that goals are not attained. Besides, dangers that fiscal summaries could be physically misquoted ought to likewise be thought of. This component also allude that management should appraise the criticalness of risk, decide the probability of threat happening and decide the effect or result of the defined dangers within the organization. It is significant for the management to define control activities to re- lieve the defined dangers. 2. Information and Communication
  • 113. It is a part of the overall risk management strategy, managers and other staff are required to communicate the risky event when they occur to the top manage- ment. The communication must be timely and be seamless (Graham, 2018). Information is vital and required at all levels within the organization to guarantee successful internal control and attain its goals Information and communication component stress that significant guidelines as well as other relevant information must be defined and shared among people in charge in the organization at the right time. Hence, a lot of pertinent and dependable information must be defined in a suitable structure and time span with the goal that workers can conduct internal control as well as other obligations. With the end goal for the management to be powerful, all information must be suitable, explicit, auspicious, precise, planned, usable and similar and available. 3. Monitoring If ERM isn’t an on-going process, the outcome will never be optimal. The organization should put resources into continually observing as well as altering the plan.
  • 114. This component suggest that organization ought to depend on viable regulatory monitoring of controls if need arise. Organization management should use spe- cial case reports to distinguish deviations from approaches and strategies and use reports created by working staff as an instrument in determining nonconformities. Organizations operate in a dynamic environment, which implies that the dangers confronting organization continually change, henceforth the controls could get out- dated; in this manner observing these conditions is imperative to guarantee that organization goals are accomplished by guaranteeing controls are significant and working successfully. 4. Internal Environment The ability to accept measured risks just as the capacity to go the extra mile when the circumstance demands truly matters, given the vulnerabilities that accom- pany portfolios that length various divisions. 3 4
  • 115. 5 5 2 5 2 2 6 2 6 2 7 This components address the integrity as well as the moral values of the organization; the strictures allowing organization
  • 116. top managerial workers to carry out its administrative oversight functions. The managerial functions as well as exercising authority and power; the procedure for drawing in, developing and holding re- sponsible people; and the strictness around implementation measures, inspiring forces as well as prizes to drive performance accountability (Cendrowski & Mair, 2017). The consequent control environment widely affects the general internal control system within an organization. 5. Control Activities The main role played by guidelines and strategies to ensure that feedbacks don't exceed the foreordained extent of things (Cendrowski & Mair, 2019). When planned carefully, controls envelop rules and frameworks as well as go into the actual backbone of the association's control of circumstances. According to this compon- ent, all policies and strategies ought to be written and stored in form of manual and procedures for every action in the organization to be used if need be. These set policies and procedures ought to be looked into and updated all the time. Administrative staff should audit the working of
  • 117. controls concerning the pertinent strategy. Any deviations from the methodology that are distinguished ought to be imparted to pertinent entities and remedied timeously. Authority over resources ought to be discrete from the bookkeeping function. The obligation regarding operations and accounting must be distinct. COSO Integration Elements within the internal control structure relate to those listed in the COSO system. COSO and internal control work along with each other, internal control is crit- ical for COSO. One upholds the other: having solid inner controls empowers supervisors to zero in on activities and business goals, realizing that the organization has a robust threat management program and is in compliance with applicable laws, guidelines, and norms (Graham, 2018). Management is entrusted with the plan, 2 2 2
  • 118. 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade7… 19/23 Source Matches (30) Student paper 100% Student paper 63% My paper 100% Student paper 100% adoption as well as upkeep of internal control frameworks. Internal auditors are entrusted to independently evaluate these controls, operating as board of directors in the interest of the directorate so as to alleviate the chance of the management acting on their own good instead of the organization, exposing internal control framework to be easily exploited and in some cases doing as
  • 119. such so as to allow illegal personal gains (Moeller, 2018). COSO framework is used as a perceived system, which, whenever actualized. IT Audit IT Auditors attention may differ from the type of audit he/she is performing at the moment. However the focus goes on materially significant amounts of data passing through the system and checking whether the protocol of the process itself been correctly implemented. By this program, the auditor creates charts for each division in the statements and for the materially significant amounts demands a proof (Cendrowski & Mair, 2019). The auditor should always be objective when going through different analysis and consider different situations. Due to the fact that the auditor checks different risky processes- he/she often finds the possible mistakes or frauds made by the organization. The auditor is allowed by the law to give independent view about the state of the system and offer an arrangement as a potential answer for the current circumstance of the actual system. On the off chance that the auditor doesn't offer and target independent input and the actual extortion is found later on, the inspector might be considered as concealing certain misdeeds. IT Auditors are the one who carry out in- depth check of the processes and figure
  • 120. whether all the policies of the business are being followed or there is some laps in the same (Graham, 2018). They are also figure out the area of improvement in the existing policies which at times proves to be very crucial in achieving organizational goals such as profitability, quality, customer satisfaction, production efficiency, etc. They are tasked with defining complex problems, providing well researched solutions, executing the decided action plan, and also evaluating and testing the results with the objectives. They are expected to be expert and experienced professionals, who are habituated with long working hours, increased workload, and dealing with uncertainty. Reference Moeller, R. R. (2018). Executive's guide to COSO internal controls: Understanding and implementing the new framework. John Wiley & Sons. Cendrowski, H., & Mair, W. C. (2019). Enterprise risk management and COSO: A guide for directors, executives and practitioners. John Wiley & Sons. Graham, L. (2018). Internal con- trol audit and compliance: Documentation and testing under the
  • 121. new COSO framework. John Wiley & Sons. COSO internal control components: Control environ- ment. (2018). Executive's Guide to COSO Internal Controls, 41- 57. doi:10.1002/9781118691656.ch4 Importance of the COSO internal control framework. (2013). Executive's Guide to COSO Internal Controls, 1-4. 2 2 2 2 1 8 2 doi:10.1002/9781118691656.ch1 Evaluating audit findings, audit evidence, and deficiencies in internal control. (2017). Audit Guide, 271-300. doi:10.1002/9781119448648.ch7
  • 122. 1 1 1 Student paper COSO FRAMEWORK 1 Original source COSO FRAMEWORK 1 2 Student paper COSO FRAMEWORK 8 Original source COSO Framework Components 3
  • 123. Student paper Sharath Kumar Goud Madgula InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term Term - Summer 2021 Original source Sharath Kumar Goud Madgula InfoTech Import in Strat Plan (ITS-831-A02) – First Bi-Term Term - Summer 2021 4 Student paper University of the Cumberlands Original source University of the Cumberlands
  • 124. 6/11/2021 Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa- BB5a31b16bb2c48/originalityReport/ultra?attemptId=26751137 -169d-4a21-86d3-7b6fade7… 20/23 Student paper 90% Student paper 100% Student paper 85% Student paper 100% Student paper 100% Student paper 99% Student paper 100% 5 Student paper The COSO model comprises of various basic advances carried
  • 125. out in phases to deliver ground-breaking outcome. These outcomes incorporate assessment of threat, viability of current projects, and the effect of future activities on accomplishment of key objectives (Moeller, 2018). The test for the COSO system team is to validate the effortlessness of the means in the model to leaders, to guarantee their comprehension of the idea and imple- ment the model. If need be, a few phases can be expelled, and the model exposed to its risk assessment segment if different level of evaluation are considered not to increase management value, without tampering with model effectiveness. Original source The COSO model comprises of various basic advances carried out in phases to deliver ground-breaking outcome These outcomes incorporate assessment of threat, viability of current projects, and the effect of future activities on accomplishment of key objectives The test for the ERM team is to demonstrate the effortlessness of the means in the model
  • 126. to leaders, to guarantee their comprehension of the idea and implement the model (Mo- nahan, 2016) If need be, a few phases can be expelled, and the model stripped to its threat assessment segment if different level of evaluation are considered not to increase the value of the management, without losing the effectiveness of the model 5 Student paper Robustness is one of COSO model strength. Original source Robustness is one of COSO model strength 5 Student paper Regardless of whether management changed their priority list, the model would con-
  • 127. sequently adopt and prepare for any change and on the same time update threat register and different outcomes appropriately. Other models needs a top to bottom audit of each threat in light of such a change (Graham, 2018). COSO's focus is on giving an adaptable standard against which to assess an association's present ERM process instead of con- centrating on the particular exercises of the risk management procedure itself. Original source Regardless of whether management changed the prioritization of the objectives, the model would consequently adjust for this change and update the threat register and dif- ferent outcomes appropriately Other models would require a top to bottom audit of each threat in light of such a change COSO's focus is on giving an adaptable standard against which to assess an association's present ERM process instead of concentrating on the particular exercises of the risk management procedure itself
  • 128. 2 Student paper Internal auditors are entrusted to independently evaluate these controls, operating as board of directors in the interest of the directorate so as to alleviate the chance of the management acting on their own good instead of the organization, exposing internal con- trol framework to be easily exploited and in some cases doing as such so as to allow il- legal personal gains (Moeller, 2018). COSO framework is used as a perceived system, which, whenever actualized. Original source Internal auditors are entrusted to independentl y evaluate these controls, operating as the board of directors in the interest of the directorate so as to alleviate the chance of the management acting on their own good instead of the organization, exposing internal con- trol framework to be easily exploited and in some cases doing
  • 129. as such so as to allow il- legal personal gains (Moeller, 2018) COSO framework is used as a perceived system, which, whenever actualized 5 Student paper Organizations that intend to execute the COSO ERM structure should survey ISO 31000 (and different systems) for extra point of view and direction on usage contemplations. Original source Organizations that intend to execute the COSO ERM structure should survey ISO 31000 (and different systems) for extra point of view and di rection on usage contemplations 2 Student paper
  • 130. Organization management ought to consider all threats according to this component that could imply that goals are not attained. Besides, dangers that fiscal summaries could be physically misquoted ought to likewise be thought of. This component also allude that management should appraise the criticalness of risk, decide the probability of threat hap- pening and decide the effect or result of the defined dangers within the organization. It is significant for the management to define control activities to relieve the defined dangers. Original source Organization management ought to consider all threats according to this component that could imply that goals are not attained Besides, dangers that fiscal summaries could be physically misquoted ought to likewise be thought of This component also alludes that management should appraise the criticalness of risk, decide the probability of threat hap- pening, and decide the effect or result of the defined dangers within the organization It is