Information System
The Internet of Things
1. Do the narrators explain the concept of ” The Internet of Things” clearly? Explain your reason.2. The narrator explains that the planet has “grown a central nervous system.” What does this statement mean?3. What have you learned about how technology helps or hurts society from watching this video?
Selective Browsing
Do not just answer the questions. You should be able to explain the logic behind your answer and point to a credible source to support your position, even if it is just the textbook. You are expected to spend at least 6 hours studying the questions, finding and studying good sources, and understanding the nature of the answers and at least an additional 6 hours answering these questions and polishing your writing, so the answers are compelling. Invest your time wisely, giving more time to the complex answers in order to ensure that you demonstrate that you truly understand the answer. Answer in 350 words or more per question. No short answer questions. Choose your sources carefully. Must be in APA format.1. What is Information overloading and when does it occur?2. How can we implement a Publishing policy?3. What are the procedures to enhance web content?4. What is selective browsing?
Financial Benefits
Please help with following written assignment, do not give nonsense word salads as answer, be concise:Chapter 12:· Discussion 1: Some people say that chatbots are inferior for chatting. Others disagree. Discuss.· Discussion 2: Discuss the financial benefits of chatbots.· Discussion 3: Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.· Exercise 1: Compare the chatbots of Facebook and WeChat. Which has more functionalities?· Exercise 12: Research the role of chatbots in helping patients with dementia.· Exercise 16: Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.Chapter 13:· Discussion 1: Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view.· Discussion 2: Diagnosing infections and prescribing pharmaceuticals are the weak points of many practicing physicians. It seems, therefore, that society would be better served if analytics-based diagnostic systems were used by more physicians. Answer the following questions:· Why do you think such systems are used minimally by physicians?· Assume that you are a hospital administrator whose physicians are salaried and report to you. What would you do to persuade them to use an intelligent system?· If the potential benefits to society are so great, can society do something that will increase doctors use of such intelligent systems?· Discussion 3: What are some of the major privacy concerns in employing intelligent systems on mobile data?· Discussion 4: Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.· Exercise 3: Investigate the American Bar Associations Technology Resource Center (americanbar.org/groups/departments_offices/legal_technology_resources.html) and nolo.com. What are the major legal and societal concerns regarding intelligent systems? How are they being dealt with?· Exercise 4: Explore several sites related to healthcare (e.g., WebMD. com, who.int). Find issues related to AI and privacy. Write a report on how these sites suggest improving privacy.Exercise 6: Research the issue of voice assistants and privacy protection. Start by reading Collins (2017) and Huff (2017).Your paper should meet these requirements:· Minimum 5 pages length, not including the required cover page and reference page. Also do not include questions, just number and the answer.· Run your submission on a grammar check before submitting· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations.· References should be relevant and recent (in last 3 years). No bogus and made-up references· If you need to quote from reference, do not exactly quote, rephrase the quote as direct quote increases plagiarism percentage.· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.
R Script Code
Applying all the code on your selected dataset, complete all codes from Chapter 7 Time-dependent graphs. Make sure you submit to this link two things1. Your report file showing screenshots of all commands from Rstudio GUIMake sure you show all Rstudio GUIs2. Submit your R script code
IT Infrastructure
Several stores, such as Barnes and Noble, operate under the click-and-mortar modelthey have online as well as physical existence. Analyze one such store other than Barnes and Noble by researching it on the Web and answer the following questions:What factors affect competition between the online and brick-and-mortar divisions of the business?Why would customers choose one or the other as a primary choice?Which customer base (online or brick-and-mortar) do you predict to eventually dominate? Justify your choice.What do you think is the competitive advantage of a company with a strong brand identity such as Intel or Coke? How can the use of technology advance such a brand identity? Give specific examples. What advantage can be offered to competitors against such a brand identity through technology?Before any IS can be utilized effectively, it must be analyzed in the context of the IT infrastructure. Briefly describe two considerations that must be taken into account before an IS can be deployed within the environment of the current IT infrastructure. What are possible solutions if these considerations are not met? Support your answers with examples.
Data Security
Residency Research Makeup ProjectAcme Enterprise Scenario Residency WeekAcme Enterprise is a private company that is gearing up for an initial public offering (IPO). Prior to going public Acme must be in compliance with: GDPR, PCI DSS, and SOX. Acme is in the water purification business with new technologies that purify water in any form whether it is sewage, ocean, lake etc.Part of its IPO process is to show due diligence and due care. Acme has identified your team to conduct a risk assessment and analysis of its information technology infrastructure to uncover any threats and exposures and provide mitigations and controls to reduce those uncovered threat/exposures, so it can have a successful IPO.Using the Network Infrastructure design of the Acme Enterprise you are to assess risk of Acmes:1. Perimeter Security2. Network Security3. Endpoint Security4. Application Security5. Data Security6. Operations7. Policy ManagementAcme Perimeter SecurityAcme is currently protected by two dual Dynamic Stateful Inspection Firewalls that are configured in active and stand by mode. Acme is also configured to use PAT (port address translation) where 200.200.200.1 represents Acme on the public Internet. Acme translates this public IP through its clustered firewall to the internal IP space of 10.100.0.0/16 giving Acme 65334 useable IP addresses.As part of Acmes infrastructure, it also accesses cloud services for its business office tools through Office 365 and uses Dropbox for end users storage. Acme uses a web hosting service for its web front end and ecommerce which is connected to a back-end Oracle Database using enterprise MySQL. The database administrators have full access to all database information, but they lack oversight from anyone else.There are two DMZs, but they are not utilized.Network SecurityAcme has a collapsed core design which means all internal LAN routing and Internet access occurs on its distribution level devices. This means, wireless access, web proxy access, access control lists and entries are located at this layer of the infrastructure. Currently Acme is using WPA 2 (wireless protected access 2) for is wireless security. The web proxy is configured with the following: General, Limited, and Exclusive Internet access. Each of these categories dictates what type of Internet access an end user will experience if belongs to one of these groups.The Local area network uses the IP block in the following way: 10.100.1.0/24 User VLAN, 10.100.2.0/24 Research and Development VLAN.Current access control lists are permit 10.100.2.0 0.0.0.255, permit 10.100.1.0 0.0.0.255. All other devices use the rest of the unallocated IP block of 10.100.0.0/16.Also, all IP space is statically assigned. There is one default route to Internet but users of complain about access to internal services.Endpoint SecurityThere is a mixture of MAC and Windows systems, XP, 7, and 10. JAMF is used to control and monitor MAC systems, the Windows devices rely on its end users to patch and update systems. The current endpoint security is signature-based MacAfee with no centralized control.Application SecurityDevOps is responsible for secure coding and development of applications, but it has no formal oversight. Policy for application monitoring tracking is adhoc there are no formalized procedures. The server farm houses all applications, the operating systems range from Server 2003 to 2016. Mobile device management, media server, content management, file server, directory services, database, are all the services being offered from the server farm. This server architecture is all hardware based there are no hypervisor systems in place.Data SecurityData has not been classified, identity access management relies on one factor authentication; encryption, digital signatures, PKI rely on self-signed certificates, protection in the cloud is also missing and there is a lack of DLP (data loss prevention). Acme does store financial information in its data center as well as personal identifiable information.OperationsInformation technology is responsible for security however there is a security team under the IT department. The Chief Information Security Officer reports to the Chief Information Officer.Policy ManagementAcme has one Information Security Policy that addresses its information security architecture and program. It is not based on any of the existing information security management frameworks such as: IS0 27002, NIST CSF, or COBIT 5.You are going to conduct a risk assessment on Acme Enterprise using the risk assessment concepts we have learned about thus far. Each of the areas of the infrastructure mentioned above is where you will concentrate your assessments. After you have completed your risk assessment, you will then provide recommendations for each area that you assessed to reduce risk, exposure, and threat. Also, as part of your final submission demonstrate through a redesign where your mitigations will take place within the architecture. You can use the image below as guide for your risk analysis of each area.
Review of Literature
MAKE AN DRAFT FOR CHAPTER1 CHAPTER2 AND CHAPTER3Dissertation Chapters:Chapter I: Introduction.Chapter II: Review of Literature.Chapter III: Methodology (Research Design & Methods)750 words with APA Formet
Data Visualisation
As noted by Kirk (2016), angle, framing, and focus are useful perspectives that help to shape your editorial thinking.Select 1 of these perspectives and mention why you selected it. ***Please note this is YOUR perspectives. This is YOUR opinion, YOUR views. Do not copy from any research/resource.Remember your initial post on the main topic should be posted by Wednesday 11:59 PM (EST). Your 2 following posts should be commenting on your classmates post on different days by Sunday 11:59 PM (EST). You should end the week with 3 total discussion posts.A quality post is more than stating, I agree with you. Maybe you should state why you agree with your classmates post. Additionally, post some examples or find a related topic on the internet or Universitys library and comment on it in the discussion post.Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.
Technology Solutions
Competitors and Technology[In the section below, you will describe two competing companies that operate in the same industry as your business. You will also explain how a company uses the two technologies that you are investigating, to determine if the technology may be appropriate for your business to use. Remember that a list of competing companies was provided to you in the final project case scenario.]Technology One [Replace heading with the technology selected (e.g., Social Media)][Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples.]Technology Two [Replace heading with the technology selected (e.g., Social Media)][Select one company in the same industry as your own that uses this technology. Briefly describe what that company does and how it uses this technology to support its business in general. Include specific examples.]Technology Benefit[Referring to what you learned in your research on the companies above, explain one specific way in which one of the companies is benefitting from technology, and describe the potential benefit to your business if you were to adopt the same approach.]Technology Solutions[In the section below, you will discuss how each of the two technologies meets the technology requirements that you identified in section II. Use your decision matrix to guide your responses.]Technology One[Explain how well this technology meets the technology requirements of your business. Be sure to address which technology requirements the technology meets, and where there are gaps.]Technology Two[Explain how well this technology meets the technology requirements of your business. Be sure to address which technology requirements the technology meets, and where there are gaps.]
Academic Sources
Prepare a paper discussing the advantages and disadvantages of being on a team.The paper needs to be 4-6 pages (excluding title, abstract and references), utilizing a minimum of 5 academic sources and adhering to APA format.
Use Promo Code: FIRST15