Question 1:
After reviewing Chapters 8 and 9 of the course text and other resources, Discuss Key Concepts in IT Budgeting
Note: Your initial post will be your answer to the Question and is to be 250 – 300 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.
References: 
McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson. 
Question 2:
Read the RR Communications Case Study on pages 156-159 in the textbook. Answer Discussion Questions 1-3 at the end of the Case Study. Your responses must be complete, detailed and in APA format. 
Discussion Questions 
1. List the advantages of a single customer service center for RR Communications.
2. Devise an implementation strategy that would guarantee the support of the divisional presidents for the shared customer service center. 
3. Is it possible to achieve an enterprise vision with a decentralized IT function?
Note: Your initial post will be your answer to the Question and is to be 500 – 550 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.
References: 
McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson. 
Question 3:
What steps would you include in order to maintain the chain of custody?
Note: Your initial post will be your answer to the Question and is to be 250 – 300 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.
References: 
Malin, Cameron, Casey, Eoghan, and Aquilina, James (2012). Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides. Syngress
Question 4:
This assignment will be associated with Legal & Technical Issues in the cloud based computing environment.  How does being in a cloud based environment change data forensics techniques in your opinion?  Does legal concerns also change from being in the cloud than being on a local device in your opinion?  If legal aspects change, how does it change associating with the investigation.  I am not expecting you to know step by step on how to proceed with an incident like this or even attempt describe the steps…  This is more of a research type of an assignment in order to be more prepared for a cloud based incident.  Please, include at least three references including the following one that can be found at (https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6159124)   Please, provide two more additional references.  Even your textbook may serve as a reference if you choose to use it.  Remember, like all other assignments…must be in APA formatting.  
Note: Your initial post will be your answer to the Question and is to be 500 – 550 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.
References: 
Malin, Cameron, Casey, Eoghan, and Aquilina, James (2012). Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides. Syngress
Birk, D., & Wegener, C. (2011, May). Technical issues of forensic investigations in cloud computing environments. In 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (pp. 1-10). IEEE.