Bab And Sainith – CS And PM Replies

Responsive Centered Red Button

Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.

I don’t know how to handle this Computer Science question and need guidance.

please read below 4 student posts and provide response(based on the post) in each 125 words.

Project management:

priyan -The Project Management Office (PMO) is the department or group that defines and maintains the standards of process, generally related to project management, within the organization. The PMO strives to standardize and introduce economies of repetition in the execution of projects. The office is also the source of documentation, guidance, and metrics on the practice of project management and execution. In economically uncertain times, however, the PMO is being asked to do more with less, to provide even more visibility into them spend, to continually demonstrate value to their business customers, to deliver the right services on time, on budget and on specs and to manage a complex environment of technology and people.

While developing a process improvement programmed can be costly, studies have shown that the resulting benefits of improved time-to-market, productivity, and quality far outweigh the initial investment costs. A Project Management Office (PMO) is key to successfully implementing process improvements and ensures development teams finish projects on time and on budget through the use of established best practices, while at the same time ensuring the finished project or product meets stakeholder requirements. (Pande, A. 2012)

Not exclusively CAN the PMO quicken the usage procedure, the PMO ought to be ACCOUNTABLE for quickening the execution procedure. The PMO is an impetus for the business. Every one of the procedures, controls, formats, and methodology ought to have however one purpose behind existing – that is to influence the execution to process speedier (Christopher N. 2007). The PMO ought to characterize an undertakings conveyance structure that encourages venture supervisors to explore the frameworks and storehouses of the association without getting stumbled up or impede.
Can a PMO accelerate the implementation process?
19 hours ago

1 reply

Last 5 hours ago

If implemented correctly, PMO has a good chance to accelerate the project implementation process. The basic aim of PMO is to make a standardized process for all projects within the organization. When PMO is appropriately supported by the leadership, it can efficiently analyze the collected relevant data and disseminate throughout the organization. This in turn will help the project management process.

PMO improves the decision-making process by projecting a united vision of the project management team and the leadership. The PMO must create a blueprint for the projects at departmental level which creates a recurring process. This ensures that best practices are incorporated in the project. It optimizes the resources of the project, reducing the cost and fast-tracking the implementation. PMO defines a set of rules to follow for the project management team of every project. To achieve the strategic goals of the company, that are in sync with the corporate management, all the standardized information is communicated effectively with transparency.

The integrated process shown by the PMO will serve as a model for accountability and implementation process to achieve the strategic goals set by the leadership. According to an improvement methodology called Theory of Constraints by Eli Goldratt – a project in place is initiated to have a positive effect on the organization will reap its benefits the quicker the project is completed.

PMO can fail if the there isn’t a feasible business case and choose ineffective personnel for implementing the PMO. PMO should not have a model which loans project managers to departments. Such model will sabotage PMO as each department will work on their own projects which not necessary align with the vision of the leadership.

Cyber security :

main que :Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented

no need to provide answer for main question,please read below student posts and reply accordingly..

gangarma – In 2016, a social engineering attack was made against the United States, Department of Justice. Following this attack, the hacker released the files that he stole and made them public. The files included personal information regarding 9335 employees of the DHS (Department of Homeland Security) Staff Directory. Apart from this, he also released information of about 20000 FBI (Federal Bureau of Investigation) agents. It came as a big blow when the hacker revealed how he got access to this information.

Apparently he had sent phishing emails to the employees and one of the employees fell for the trap and he was able to access the email account. Following this, he tried to use the same login credentials to access the web portal. He failed to do so because he did not have the access code. In order to gain the code, he called the department and posed as a newcomer and asked for help. He was then given the code and he got his hands onto the complete information present which was around 1 TB. The hacker only took around 200 GB of data.

This incident drew lot of attention and the employees of the department were heavily criticized for their foolish act. Any employee at such an important department is at least expected to have basic training about cyber security and should be capable enough to notice one. The Department did have an access code for the web portal to prevent any such attack and the employee simply gave the access code over a simple phone call asking for help. Though this whole incident bought shame to the entire department, it was an important lesson for everyone. And we must pay a lot of attention on what is happening around us and how can we stay safe and prevent any such attacks from happening.

prasanna – Social engineering can be described as various malicious activities which succeed through the human interactions. The attackers manipulate the users psychologically to provide the secured information. It may be different types such as baiting, phishing, email spoofing, dumpster diving, pretexting, scameware and so on. There are several instances where the social engineering techniques were successful in data breach. I would like to cite the Yahoo security breach which happened in 2014 and 2016.

Yahoo is used by people all over the world. The users search for the information, use the Yahoo emails, Yahoo chat and so on. The data breach was done in 2014 and 2016. These are considered as the largest discoveries in the history. In 2014, a half-a billion user accounts were breached and in 2016 over a billion accounts were breached. This is done by a spear – phishing email to an engineer. The hackers were able to gain access to the users and stole the private emails and contacts. The data was kept in the dark web and was used by many scammers. It took 3 years for the Yahoo to come to a conclusion that the breach was done. The sales of other organization were lost. Verizon lost over 350 million dollars. By being extra careful, the situation would have never happened. If the employee was careful and not opened the suspicious email, the data breach would have been stopped. There must be frequent education and training to the employees about the new social engineering attacks. the organization must send the spear-phishing emails and see if the employees open them or not. There must be proper email filter to prevent the unwanted emails.Make a Gantt chart and a PERT chart about WBS.: nursing coursework help
I’m working on a Computer Science exercise and need support.

At Bayside Financial, where you work as a project manager, you have been asked to conduct user training sessions for a new information system. You must develop a specific schedule for the tasks (the estimated task duration for each is shown in parentheses):
First, confirm arrangements for the training facility you plan to use (3 days). After you have confirmed the training facility, two tasks can begin at the same time: you need to send an e-mail message to all department managers announcing the training sessions (1 day) and you can develop the training material (5 days). As soon as the training material is complete, you can work on two tasks at once: arrange to have copies of handout material printed (2 days) and develop a set of PowerPoint slides (5 days). When the PowerPoint slides are ready, you conduct a practice training session with the instructor who will assist you (2 days). Finally, when the practice session is over and the handout material is ready, you can conduct the user training sessions (4 days).
Tasks
(5 pts) What is the correct total time? (35 pts) Create a Gantt chart that shows the WBS. (you may create your diagram in powerpoint or word) (15 pts) Analyze the fact situation carefully to determine which tasks are concurrent and which ones are dependent on other tasks. (35 pts) Create a PERT chart that shows the project. Use a format similar to Figure 3-18 on page 82. (you may create your diagram in powerpoint or word) (10 pts) What is the critical path for this project? How do you know?
If the chart is made in word or PPT, please also send me the word file and PPT file

Please do not directly copy the answers online.

you can refer to the chapter 3 in the book.

ebook: https://drive.google.com/file/d/1K2KWDoKjpdPl2_phY…Please write a 150 word peer response for Answer 1 and another 150 word peer response for Answer 2.
Need help with my Business question – I’m studying for my class.

Answer 1

Preliminary research indicates that internal auditors’ judgments are influenced by management and consequently risk assessment. This study examines the impact of tone on the risk assessment of fraud and the compatibility of internal auditors with external auditors. (Wang, 2017). When the results of an experiment involving the Internal Auditor 64 are found to be worse than management but poor at the top, it indicates that internal auditors are at risk of deliberate misinterpretation and that the agreement with external auditors reduces the risk of deliberate misstatement.

Cultural audits are a high-level audit and assess internal control and ethical decision-making. Such an audit plays a key role in assessing the effectiveness of internal control by management and directors and auditors to establish an ethical environment in the organization. For that purpose, the Board of Directors requires that the authors establish an external body once every three years. In addition, external auditors need to have a process of evaluating internal control and risk management profiles and assessing the impact on company culture. Similarly, internal auditors must adequately and appropriately review and coordinate their company’s risk management actions, as high-quality internal audit leads to effective RMP.

Recent corporate scandals have turned the attention of many voters toward corporate governance reform. Legal reforms that do not adequately address moral obligations are in vain. The moral character of directors is crucial. Directors are responsible for corporate ethics and compliance programs. Modeling and acting on top is an important part of their company’s overall ethical environment. (Schwartz et al., 2005) This role is strengthened by their legal obligations to track the financial performance of the company. The framework has several ethical values: (1) honesty; (2) integrity; (3) honesty; (4) liability; (5) justice; And (6) citizenship. The document concludes with a presentation of key issues to be resolved based on the Code of Conduct of Directors.

It is horizontal and interrelated and uses firm-level data from a survey of 62 financial services firms in Uganda. The results of effective RMPs, such as the quality of top management and the quality of the internal audit, are crucial. However, the high level of effective management is reduced when the quality of the internal audit is obtained. From agency theory, these findings support the idea that top management should monitor and reevaluate organizational risks as an effective RMP management method. (Kabuye et al., 2019) HealthSouth is an example of financial reporting crises over the past three years. In many cases, the role of management, and in particular the voice set by the CEO and CFO, has been instrumental in fraud and fraud. Wall Street magazine reported that several leaders tried to persuade Scrush to stop manipulation in the fall of 1997, but prosecutors said they were concerned and refused the Scrushy stock price. (“Using”, n.d.)

References

Kabuye, F., & Ntim, C. J. (2019). The impact of internal management and internal audit quality on risk management efficiency in the financial management sector. Cogent Business & Management, 6 (1), 1-21.

Schwartz, M. S., (2005). Above: Code of Conduct of Directors? Journal of Business Ethics, 58 (1), 79.https: //doi.org/10.1007/s10551-005-1390-y

Using Cultural Audit to rate high-end music – ProQuest. (n.d.). Retrieved 20 February 2020 from http://search.proquest.com/docview/212225362?pq-or…

Wang, I.Z., & Farger, N. (2017). The combination of tone at the top with the influence of an external auditor on the risk assessment of internal auditors’ fraud. Accounting and Finance, 57 (4), 1177-1202. https://doi.org/10.1111/acfi.12191

—————————————————————————————————————————————-

Answer 2

The Commission on the Tread Method stated that “the tone at the top is an important component of the integrity of the financial reporting process.” Although top-down voice is widely regarded as an important ICT attendant of ethical behavior in organizations, we believe that recent research has ignored various conflicting ethical issues encountered in many organized work environments. In addition, in many organizations and professional associations, we propose that the decision-making processes used to resolve this conflict raise the tone at the bottom or at the top of the employee’s organization, and both approaches differ in tone. (Warren et al., 2015) Here we outline the comprehensive principles of integrated social contract theory to provide a multifaceted reconciliation process that emphasizes antagonistic ethics based on the characteristics of the organization and society. Using three methods of contextualization (overwork, employee safety, and customer protection), we demonstrate the potential of a multi-tonal comparison process over existing processes. Therefore, the Commission admits that the above background is an important factor in the preparation of correct (false) financial statements. In the same study, top management identified a financial management-oriented corporate environment or culture. From that point on, the perception from above has been integrated into the internal audit system and the audit standards committee of COSO.

The big voice at the top should make financial statements more transparent and transparent, and the regulator’s response depends on why they are pushing management. (Bradley Lail et al., 2015) The theory that agency theory works in the best interests of managers requires compliance, high oversight and desired behavior by reducing managerial desire. At the same time, management-oriented approach to maximize opportunities, look at managers as trusted caregivers and give them a large dispensary without heavy external oversight. In fact, the rules are based on the continuity between these two perspectives. To illustrate the relationship between compliance and opportunity, we present three conditions in the financial and tax reporting frameworks and examine the outcomes of those regulatory responses. We provide a conclusion on how each rule affects the organization.

The concepts of personal ethics (94%) and the Code of Professional Ethics (90%) are important factors that help a person to resist attempts to make significant changes in financial results. The results are like the above accent, the internal audit function, or the code of conduct. (“THE TONE AT THE TOP”, n.d.) As for ethics, no company is trying to be the next poster company. Although many discussions are based on corporate ethics, few studies have focused on the impact that accent has on accounting or significant change in results. To address this issue closely, the authors mainly investigated voice and its effects on accounting performance, as well as about the audit service and whether respondents had a written code of ethics. There has been much debate about how these three issues affect corporate ethics. For example, professional accounting firms such as the IMA, the American Institute of Certified Public Accountants (AICPA) and the Institute of Internal Auditors (IIA) say that management plays an important role in reducing the risk of accounting violations.

References

Bradley Lail. (2015). The Effect of Regulatory Approach on Tone at the Top. Journal of Business Ethics, 126 (1), 25.

Tone at the Top & Ethical Conduct Connection – ProQuest. (n.d.). Retrieved February 20, 2020 from https://search.proquest.com/docview/229786113?pq-o…

Warren, D. E., (2015). When there are moral tones in the top conflict: adopting priority rules to reconcile conflict tones. Business Ethics Quarterly, 25 (4), 559-582. https://doi.org/10.1017/beq.2015.40

How to create Testimonial Carousel using Bootstrap5

Clients' Reviews about Our Services