Iowa State University Use of Information Technology Paper

Question Description

There should be no plagiarism. You need to answer only one question and write at least 1000 words. You have to research and also put the sources in references and in-text citation. It has to be 100% unique. There should be no plagiarism. I have attached the document and also the rubric below. Please follow the instructions.

Iowa State University Use of Information Technology Paper
doc2.jpg

Unformatted Attachment Preview

Document1SADAF TARANNUM03/12/2019 18:18:00 Answer any one question. You will be expected to use the materials provided to and those contributed by you to develop your essay. To gain maximum credit, you should actively use those materials to develop concise and cogent responses to the questions. Questions begin overleaf. Page 1 of 2 Document1SADAF TARANNUM03/12/2019 18:18:00 Final Examination 1. Explain how social engineering might be used to undermine the security of information systems. [type your answer here…] 2. “IT professionals are beset by ongoing changes in technology and business practices. Some commentators have suggested that, in order to stay competitive, IT professionals should retool themselves to gain competency in specific in-demand technical skills” (Prabhakar, B., Litecky, C.R. and Arnett, K., Communications of the ACM 48 10 pp9194 October 2005) Explain the idea of ‘requisite variety’ and how it relates to the categorization of skills and the process of ‘retooling’ [OR type your answer here…] 3. Investigate an organization that is using or planning to use IT in innovative ways to transform its business processes. Analyze the situation and structure your analysis as follows: • The Goal: Explain the organization’s goal(s) and the significance of the IT plan from an overall business perspective • Technology: Explain in managerial terms how the underlying technologies work and how they are (or can be) used to achieve the goal • Transferability: identify the challenges involved in this plan and possible risks the organization faces (or might have faced) as a result of poor project or resource management [OR type your answer here…] Page 2 of 2 …