Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Case 4 – 25

I need help pls

Module 4 – Case

Virtual Teams and Protecting Information Assets

Assignment Overview

The Case Assignment for this module involves your analysis of what is known, somewhat known, not known, or “known but wrong” in the area of the management of virtual teams. Since this phenomenon has become the norm, more knowledge on managing these teams is needed. Most of the advice about virtual teams comes from one or more of four types of sources:

· The small number of academically respectable research studies on virtual teams

· The very large body of research done on the management of teams generally (dating back to the 1930s and of somewhat questionable generalizability  due to differences in tools, culture, society, and just about everything else)

· The modest but steadily increasing body of informal or “practice wisdom” information, generally made available through blogs or other Internet sources

· The quite large body of essentially uninformed but ready-to-be-shared opinion about the topic, also Internet-available

The first two bodies of information are generally easy to identify and distinguish; they’ll be found in academic journals, conference transactions, and other such sources. Unfortunately, distinguishing between the latter two types of information is much more complicated, since they may look a great deal like each other, depending on the technical abilities of the respective website designers.

Mortensen, M., & Hadley C. (2020). 

How to prepare your virtual teams for the long haul
. Harvard Business Review.

Alexander, A., De Smet, A., & Mysore, M. (2020). 

Reimagining the post pandemic workforce
. McKinsey & Company.


Managing Virtual Teams
 from LinkedIn Learning


Leveraging Virtual and Hybrid Teams for Improved Effectiveness
 from LinkedIn Learning


Leading Remote Projects and Virtual Teams
 from LinkedIn Learning

In addition, the optional readings expand on many of the central points; you may also want to do some independent research of your own to clarify any issues that concern you.

Your task is to 
identify 3 to 5 significant questions regarding the management of virtual teams that relate to “practice wisdom” advice found in the readings, that you believe are sufficiently important that good quality research might help resolve their validity. Trivial questions don’t really warrant research, because the research costs money and other resources that are in scarce supply. We want to reserve our research resources to address those questions that really seem important to practice—particularly issues where the practice wisdom might be divided, with one group saying one set of things and one group another, or where there is no advice available at all. So what you’re looking for in the blogs are situations where advice seems to contradict other advice, or where advice given seems to contradict your own intuition or common sense, or otherwise where ambiguity seems to exist. The two systematic research studies will give you an idea of how such research might be done.

When you identify some topic of interest, you should be able to specify:

The research question itself; what are we trying to find out?

Why is this question interesting? Who might care what the results would be?

Where might we do such a study? How might we carry it out? (Please note: You’re not being assessed here on the quality of your research expertise; just give us some general ideas about how you think we might answer your question.)

What would you expect the results to be?

Any other thoughts or ideas you might have regarding this research issue.

So your paper is to consist of your thoughts on these questions regarding each of the 3 to 5 issues that you have been able to identify from your perusal of the readings of virtual teams.

Case Assignment

Thus, when you have read through the articles and related material, compose a 4- to 6-page critical analysis paper as outlined above, on the topic:

· Three to five significant ideas about the management of virtual teams that could be usefully assessed by conducting systematic organizational research

As we said, your research recommendations need to be supported by the literature and the evidence. Obviously, as noted below, this will obligate you to actually be able to present such evidence in an academically respectable manner.

You Will Be Particularly Assessed On

· Your ability to see what the module is all about and to structure your paper accordingly.

· Your informed commentary and analysis—simply repeating what your sources say does not constitute an adequate paper.

· Your ability to apply the professional language and terminology of management and virtual teams correctly and in context; you are expected to be familiar with this language and use it appropriately.

· Your effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Refer to Trident’s “Writing Style Guide” for guidance on APA formatting and style. The guide can be accessed under “My Resources” in the TLC Portal.

Assignment Expectations

Length: Follow the number of pages required in the assignment excluding cover page and references. Each page should have about 300 words.

Assignment-driven criteria (25 points): Demonstrates clear understanding of the subject and addresses all key elements of the assignment.

Critical thinking (10 points): Demonstrates mastery conceptualizing the problem. Shows analysis, synthesis, and evaluation of required material.

Scholarly writing (5 points): Demonstrates writing proficiency at the academic level of the course; addresses the Learning Outcomes of the assignment.

Quality of references (4 points) and assignment organization (3 points): Uses relevant and credible sources to support assertions. Assignment is well organized and follows the structure of a well-written paper.

Citing sources (3 points): Uses in-text citations and properly formats references in APA style.

Please use Trident’s 

Introduction to APA
 for proper formatting and style.

Module 4 – Resources

Virtual Teams and Protecting Information Assets

Required Reading

Murray, B., Dulebohn, J. H., & Stone, D. L. (2022). 
Managing team centricity in modern organizations (1st ed.). Information Age Publishing, Incorporated.

Mortensen, M.,& Hadley C. (2020). 

How to prepare your virtual teams for the long haul.
 Harvard Business Review.

Alexander, A., De Smet, A., & Mysore, M. (2020). 

Reimagining the post pandemic workforce
. McKinsey & Company.


Managing Virtual Teams
 from LinkedIn Learning


Leveraging Virtual and Hybrid Teams for Improved Effectiveness
 from LinkedIn Learning


Leading Remote Projects and Virtual Teams
 from LinkedIn Learning

Ocker, R. J., & Fjermestad, J. (2008). Communication differences in virtual design teams: Findings from a multi-method analysis of high and low performing experimental teams, 
ACM SIGMIS Database, 39(1), 51-67. Available from ProQuest in the Trident Online Library.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

III

see attached. For this assignment, you will write a critique of the article “9/11: Look Back and Learn,” which appears in the Required Unit Resources section of this unit. Your article critique must address the components listed below. · The article’s premise, significant points in support of the premise, and

Technology and Ethics

· Please read all of the instructions and review the linked documents at the end of the assignment. You will need to use the paper template for your paper. · Assignment purpose: · As technical professionals, we are often called to research and report on topics associated with our projects.

ITEC final powerpoint

   TOPICS TO DISCUSS: PROJECT STAKE HOLDERS, CHANGE MANAGEMENT, PROJECT PROCUREMENT MANAGEMENT PLANNING. (POWERPOINT MUST INCLUDE PRESENTER NOTES)

Unit IV

See attached Unit IV Journal In what ways have telecommunications and networks transformed organizational strategies, particularly in the realms of data management and information security? Provide specific examples and explain the importance of telecommunications technology in organization. How should organizations adapt their strategies to leverage these advancements while mitigating associated

Unit III

See attachment Unit III Case Study It is important to understand what information systems are and why they are essential for running and managing a business. It is also important to understand the different systems that support different groups or levels of management. In addition, digital technology and the Internet

DB 2

See Attached Discussion Board 2 • Your initial post should be at least 300 words in length. • Your initial post should include at least one APA-formatted scholarly, professional, or textbook reference with accompanying in-text citation to support any paraphrased, summarized, or quoted material. There has been much legal activity

power point

 Using your GA2 project plan as a basis, you are to create a 20-minute slide show presentation for your clients, as if you were ‘selling’ your product/service. 

Operating System Host Firewalls

  There are many recommendations, guidelines, and best practices for firewall management. Some argue that an operating system’s host firewall software may offer sufficient security. Therefore, they suggest, all options should be evaluated before discounting the operating system’s host firewall software. List and explain five typical firewall guidelines or best

ITEC

procurement management Choose a project with a relatively simple description (building a LAN, designing a web page, inventing a new communication device, etc.).  Which type of contract structure (Fixed total price, Fixed unit price, Fixed price with incentive, Fixed fee with price adjustment) and what procurement documents (Request for Proposal,

VIII

see attached. What kind of steps would you take to illustrate how an organization could use the Cybersecurity Framework to create a new cybersecurity program or improve an existing program. What are some of the key messages and ideas that you will take away from this course? What surprised you

Design a web frame

Based on the site map I give you have to be able to design a web frame. Prompt given: After you’re done with your Site map, the next step for your term project is to design wireframes based on your site map. Use any drawing tools, such as Visio or

public finance

Module 1 Assignment Details · Due Sunday by 11:59pm   Weekly Objectives Students will: · Define public administration and why it is important. · Define and explain key terminology related to public budgeting and finance administration.  · Differentiate between the four stages of public budgeting (preparation, approval, execution, and audit/evaluation) and describe their

VII

see attached. CybersecurityPolicies Without Borders This assignment measures your mastery of ULOs 2.1, 2.2, 2.3, 5.3, and 6.2. Unlike countries, the Internet is not confined to specific national borders or geopolitical boundaries defying traditional governance. Perform research in the CSU Online Library and the Internet, and answer the following questions:

Information Systems VI Aassignment

see attached. Course Textbook(s) Lewis, T. G. (2020). Critical infrastructure protection in homeland security: Defending a networked nation (3rd ed.). Wiley.

power point

Video Presentation As a synthesis of the prior five weeks, each student will create an informational video presentation. The video presentation must be a Senior Executive Level presentation to a real world company/organization. If students are unfamiliar with that style of presentation, they are to research it.  Application of Learning:

V

see attached During the Bush and Obama administrations and because of 9/11, the Department of Homeland Security (DHS) assumed lead responsibilities for many of the CIKR sectors assigning Sector-Specific Agencies (SSAs) to establish sector-specific protocols for protection. However, most of these sectors have the DHS as its SSA. Under this

IV Journal

see attached. Should the private sector be proactively involved in all phases of preparedness for attack avoidance (either physical or cyber-based) or should the private sector act solely as a resource when called upon by the public/government sector? Why, or why not? Your journal entry must be at least 200

SA

see attached  Begin by researching and identifying a critical infrastructure sector or component (there are 18 of them to choose from) such as power, finance and banking, or municipal services. Perform an analysis of the selected component, identifying its vulnerabilities. After conducting your research, either in the CSU Online Library