What are some of the security issues with IM? What can businesses do to address these issues? Can IM be secured? If so, how? If not, what can organizations do to protect themselves from insecure IM applications?

Description

Graded assignment submissions such as this assignment need to be completed on your own, i.e. individual work. There are 4 questions on this assignment. Answer all 4 questions and be sure and cite your references, including textbooks.

#1) What are some of the security issues in wireless communications? What can be done to address the issues? How is WiMax different from WiFi in the context of security concerns?

#2) Define the terms WBS, projectitis and negative feedback loop. What are the attributes of the tasks of a WBS? Can WBS “cure” projectitis? If so, how? Can a negative feedback loop cure projectitis? If so, how? If you answered “NO” to both WBS and negative feedback loop in curing projectitis, what else can be used to minimize the impact of projectitis on a project?

#3) What are some of the security issues with IM? What can businesses do to address these issues? Can IM be secured? If so, how? If not, what can organizations do to protect themselves from insecure IM applications?

#4) Do the Case at the end of Chapter 10 in the textbook, starting on page 576. Here are the questions that appear on page 577 (not the case problem statement) for reference:

(a) What project management tasks should Kelvin perform before his next meeting?

(b) What change management tasks should Kelvin perform before his next meeting, and how do these tasks fit within the project management process?

(c) Had you been in Kelvin’s place, what would you have done differently to prepare for this meeting?