· Assignment: Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
· Provide a 500 word (or 2 pages double spaced) minimum reflection.
· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
· Share a personal connection that identifies specific knowledge and theories from this course.
· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
· You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
· Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).
· Week 1
· (May 02 – May 08)
Beasley, M. S. (2016). What is enterprise risk management? Enterprise risk management initiative. Retrieved from Poole College of Management, NCSU.
(May 09 – May 15)
Hopkin, P. (2010). Fundamentals of Risk Management: Understanding, Evaluating, and Implementing Effective Risk Management , (pp. 36-46). Kogan Page.
(May 16 – May 22)
Do, H., Railwaywalla, M., & Thayer, J. (2016). Integration of ERM with strategy (p. 35). Enterprise risk management initiative. Retrieved from Poole College of Management, NCSU.
(May 23 – May 29)
COSO. (2017) Enterprise Risk Management Integrating with Strategy and Performance [Executive Summary].
(May 30 – June 05)
Lopes, Guarda, T., & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance . 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), 1–6
(June 06 – June 12)
Residency Activities on (06/10/2022, 06/11/2022 & 06/12/2022)
Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards . International Journal of Information Security Science, 2(2), 28–43.
(June 13 – June 19)
Mackita, M., Shin, S.-Y., & Choe, T.-Y. (2019). ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing . Future Internet, 11(195), 1-21.
Week 8 (June 20 – June 26)
Terry Puchley, & Chris Toppi. (2018). ERM: evolving from risk assessment to strategic risk management . Healthcare Financial Management, 72(4), 44–49.
(June 27 – July 03)
Chen, J. & Zhu, Q. (2019). Interdependent Strategic Security Risk Management with Bounded Rationality in the Internet of Things . IEEE Transactions on Information Forensics and Security, 14(11), 2958-2971.
(July 04 – July 10)
Hou, Li, Y., Yu, J., & Shi, W. (2020). A Survey on Digital Forensics in Internet of Things . IEEE Internet of Things Journal, 7(1), 1–15.
(July 11 – July 17)
Montasari, & Hill, R. (2019). Next-Generation Digital Forensics: Challenges and Future Paradigms . 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), 205–212.
Sahinoglu, Stockton, S., Barclay, R., & Morton, S. (2016). Metrics-Based Risk Assessment and Management of Digital Forensics . Defense Acquisition Research Journal, 23(2), 152–177.
(July 18 – July 24)
Nnoli, Lindskog, D., Zavarsky, P., Aghili, S., & Ruhl, R. (2012). The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches . 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, 734–741.
(July 25 – July 31)
Lynch, Wolf, L. E., & Barnes, M. (2019). Implementing Regulatory Broad Consent Under the Revised Common Rule: Clarifying Key Points and the Need for Evidence . The Journal of Law, Medicine & Ethics, 47(2), 213–231.
(August 01 – August 07)
Vincent, N. E., Higgs, J. L., & Pinsker, R. E. (2017). IT Governance and the Maturity of IT Risk Management Practices . Journal of Information Systems, 31(1), 59–77.
(August 08 – August 14)
Etges, A. P. B. da S., Grenon, V., Lu, M., Cardoso, R. B., de Souza, J. S., Kliemann Neto, F. J., & Felix, E. A. (2018). Development of an enterprise risk inventory for healthcare . BMC Health Services Research, 18(1), 578–578.
(August 15 – August 19)
Schiller, F., & Prpich, G. (2014). Learning to organise risk management in organisations: what future for enterprise risk management? Journal of Risk Research, 17(8), 999–1017.
SHORT WEEK, Last day of term is 08/19/2022
All assignments must be completed by 08/19/2022 End of Day