Democracy and Ethics

Watch the Ted Talks regarding Democracy and Ethics in Module 4. Simply discuss the key points from each video and state what you agree with and disagree with.The discussion and original post will occur in groups. All students must respond to one of the other group member’s posting.Each discussion’s original post into the group DB should be a minimum of 300 words in length and the responses to another colleague in the Group DB should approximate 200 words

Read more

Fully Developed Content

For this assignment, review the article:Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414Address the following:· What did the authors investigate, and in general how did they do so?· Identify the hypothesis or question being tested· Summarize the overall article.· Identify the conclusions of the authors· Indicate whether or not you think the data support their conclusions/hypothesis· Consider alternative explanations for the results· Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)· The relevance or importance of the study· The appropriateness of the experimental designWhen you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation.Your paper should meet the following requirements:· Be approximately four to six pages in length, not including the required cover page and reference page.· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Read more

Quantitative Research

Article ReviewsQuantitative researcTopic: Your choice but recommend choosing a topic that is in the same family as your expected dissertation topic in order to explore what is out thereNo hard word counts or page requirements but rubric will be provideSafe Assign will be used to track/monitor submission for plagiarism.Submissions with a Safe Assign match of more than 25% will not be acceptedAn example of a quantitative and qualitative article will be posted in the iLearn course page soon.Please use APA formatting and include the following information:Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?Study Findings and Results: What were the major findings from the study? Were there any limitations?Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)References

Read more

Selective Browsing

Do not just answer the questions. You should be able to explain the logic behind your answer and point to a credible source to support your position, even if it is just the textbook. You are expected to spend at least 6 hours studying the questions, finding and studying good sources, and understanding the nature of the answers and at least an additional 6 hours answering these questions and polishing your writing, so the answers are compelling. Invest your time wisely, giving more time to the complex answers in order to ensure that you demonstrate that you truly understand the answer. Answer in 350 words or more per question. No short answer questions. Choose your sources carefully. Must be in APA format.1. What is Information overloading and when does it occur?2. How can we implement a Publishing policy?3. What are the procedures to enhance web content?4. What is selective browsing?

Read more

Uses of Email Filters

Discuss uses of Email filters, Rerouting ‘spam’ and selective browsing. Answer must be 400 words.

Read more

Financial Benefits

Please help with following written assignment, do not give nonsense word salads as answer, be concise:Chapter 12:· Discussion 1: Some people say that chatbots are inferior for chatting. Others disagree. Discuss.· Discussion 2: Discuss the financial benefits of chatbots.· Discussion 3: Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.· Exercise 1: Compare the chatbots of Facebook and WeChat. Which has more functionalities?· Exercise 12: Research the role of chatbots in helping patients with dementia.· Exercise 16: Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.Chapter 13:· Discussion 1: Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view.· Discussion 2: Diagnosing infections and prescribing pharmaceuticals are the weak points of many practicing physicians. It seems, therefore, that society would be better served if analytics-based diagnostic systems were used by more physicians. Answer the following questions:· Why do you think such systems are used minimally by physicians?· Assume that you are a hospital administrator whose physicians are salaried and report to you. What would you do to persuade them to use an intelligent system?· If the potential benefits to society are so great, can society do something that will increase doctors’ use of such intelligent systems?· Discussion 3: What are some of the major privacy concerns in employing intelligent systems on mobile data?· Discussion 4: Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.· Exercise 3: Investigate the American Bar Association’s Technology Resource Center (americanbar.org/groups/departments_offices/legal_technology_resources.html) and nolo.com. What are the major legal and societal concerns regarding intelligent systems? How are they being dealt with?· Exercise 4: Explore several sites related to healthcare (e.g., WebMD. com, who.int). Find issues related to AI and privacy. Write a report on how these sites suggest improving privacy.Exercise 6: Research the issue of voice assistants and privacy protection. Start by reading Collins (2017) and Huff (2017).Your paper should meet these requirements:· Minimum 5 pages length, not including the required cover page and reference page. Also do not include questions, just number and the answer.· Run your submission on a grammar check before submitting· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations.· References should be relevant and recent (in last 3 years). No bogus and made-up references· If you need to quote from reference, do not exactly quote, rephrase the quote as direct quote increases plagiarism percentage.· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.

Read more

Smart Home Devices

Write a discussion post on following three topics. Each one should be in a separate file, each post should have 2 (scholarly) journal citations, min 300 words each, additional requirements also specified below:Discussion 1:Examine Alexa’s skill in ordering drinks from Starbucks.Discussion 2):Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.Please make your posts substantive. A substantive post will do at least two of the following:· Ask an interesting, thoughtful question pertaining to the topic· Answer a question (in detail) posted by another student or the instructor· Provide extensive additional information on the topic· Explain, define, or analyze the topic in detail· Share an applicable personal experience· Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)· Make an argument concerning the topic.Run you submission through grammar check before submitting.At least 2 (scholarly) journal source should be used for each post.Make your references in correct APA 7 format and cite each reference at least once, but as many times as you rely on it. Citations support each sentence relying on a reference, not an entire paragraph. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. Initial posts need to be 300 words minimum .

Read more

Modern Society

Impacts of technology in the modern society

Read more

Kentucky Evaluation System

Research Question: What impact has Kentucky education reform had on potential teacher burnout?Background or Distantly Related Work: Early Ages· 1957-1958 Frustration with US Department of Education which led to more math and science· 1960-1965 Johnson Reform (inclusion)· 1980’s Regan’s “A Nation at Risk” which began accountability· Early 2000’s No Child Left Behind (Assessment)· 2010+ Race to the TopNarrow Categories that are closer to the work you are doing: Modern days· How did this change education in Kentucky?· What wad its impact on KY Teachers and profession· Did this change how we taught?Specific Categories: Recent Days· KPREP – High Stakes Testing· TPGES – Kentucky Evaluation system for teachersMost Specific and Similar Studies: Burnout· What causes job burnout in general?· What causes teacher burnout?

Read more

Computer Networks.

Step 2: Identify Examples of Vulnerabilities, Threats, andRisksIn the previous step, you familiarized yourself with the concepts ofvulnerability, threat, and risk. You now understand their relationship toone another and how they relate to security. In this step, you are goingto identify at least two examples of a vulnerability, two examples of athreat, and two examples of a risk in each of the following categories:? technology? people (human factors)? policyIdentify a minimum of 18 examples. This will assist you in conductingthe vulnerability assessment and developing the educational brochure.Review topics such as basic elements of communication and computernetworks.In the next step, you will look more closely at current vulnerabilities andthreats.Step 3: Identify Current Vulnerabilities and ThreatsAfter defining and identifying examples of vulnerabilities, threats, andrisks in the first two steps, you should understand the basic concepts ofvulnerabilities and threats as they apply to general cybersecurity.However, vulnerabilities and threats are dynamic: They can evolve withchanges in technologies, changes in adversary capabilities orintentions, or changes in human behaviors and organizational policies.It is important to understand current vulnerabilities and threats andtheir applicability to the larger community as well as to yourorganization (e.g., critical infrastructure protection), so that you canmake informed recommendations on how/whether to mitigate them.Identify current known vulnerabilities and threats that could affect yourorganization. The vulnerabilities and threats that you identify will benecessary for your final presentation.List a minimum of two current known vulnerabilities and threatsinvolving the following:? people (human factors)? technology? policyWhen complete, move to the next step, where you will take part in asimulation.

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information