Information System
Journal Citations
Write a discussion post on following three topics. Each one should be in a separate file, each post should have 2 (scholarly) journal citations, min 300 words each, additional requirements also specified below:Discussion 1:Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.Identify one cryptographic attack and how you can protect against it.?Discussion 2):Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?Discussion 3):What are the common business problems addressed by Big Data analytics? In the era of Big Data, are we about to witness the end of data warehousing? Why?Please make your posts substantive. A substantive post will do at least two of the following:· Ask an interesting, thoughtful question pertaining to the topic· Answer a question (in detail) posted by another student or the instructor· Provide extensive additional information on the topic· Explain, define, or analyze the topic in detail· Share an applicable personal experience· Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)· Make an argument concerning the topic.Run you submission through grammar check before submitting.At least 2 (scholarly) journal source should be used for each post.Make your references in correct APA 7 format and cite each reference at least once, but as many times as you rely on it. Citations support each sentence relying on a reference, not an entire paragraph. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. Initial posts need to be 300 words minimum .
Traditional Laptop
iscussion Question:The use of smart phones is growing rapidly. What could be the possible limitations of using a smart phone instead of a traditional laptop? Identify at least two limitations. Are these limitations surmountable?There is currently no standardization in the operating system (OS) used in a cell phone. What problems does this pose to the use of cell phones for serious m-commerce such as banking? Provide a possible solution along with a sound rationale to overcome the problems without the requirement of imposing a standard.Consider the case of mobile computing used to automate checkout at a retail store, where a mobile device identifies its owner and a device such as RFID on each of the products being purchased identifies the products and automatically bills the customer for the products in his/her cart. What issues can you foresee with technological limitations when two customers leave at the same time? What ethical issues must be addressed to prevent charging another customer for goods purchased by someone malicious? Justify whether these issues can be addressed, and if so, how?
Owens Valley Water
View the Port of Los Angeles 4-part documentary and read the material in the Owens Valley water website, https://www.inyowater.org/documents/reports/owens-valley-water-history-chronology/. Simply answer this question. Based on what you have learned and/or know about fiscal capacity and Tragedy of the Commons should the City of Los Angeles exist in its present form when considering its inherent geographic location and natural resources? Note: it was an arid semi-desert pueblo before 1900.The discussion and original post will occur in groups.Each discussions original post into the group DB should be a minimum of 300 words in length and the responses to another colleague in the Group DB should approximate 200 words.
Collaborative Technologies
Critical Thinking Collaborative Technologies and the Internet of Things (IoT) (105 points)Conduct research and write a paper on either mobile technologies or the Internet of Things (IoT). In your paper, address the following:Briefly define the technology (collaborative technologies or IoT technologies).How and why are organizations applying this technology? Identify and describe one real-world example.What are the benefits of the technology to organizations? For example, does the technology reduce costs?How does the technology benefit the organizations internal and external users?What are some challenges or potential problems of the technology to the organization?In your opinion, do the benefits outweigh these concerns? Explain.Your well-written report should be 4-5 pages in length, not including the cover and reference pages. Use APA style academic writing
Threat Modeling
Threat ModelingA new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this weeks readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:· User authentication and credentials with third-party applications· 3 common security risks with ratings: low, medium or high· Justification of your threat model (why it was chosen over the other two: compare and contrast)You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.Your paper should meet the following requirements:· Be approximately 5 to six pages in length, not including the required cover page and reference page.· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
People with Special Needs
Examine IoT systems and how they may assist people with special needs. Special needs individuals is a broad term that could encompass a wide variety of individuals ranging from those who are deaf/hard of hearing, have vision issues, or have other different abilities that will affect how they use computing devices.Part A)You should begin by reading the work by Ferati et al. that discusses requirements gathering for users with special needs. For this first part of this assignment, you will take a position on the arguments made in this paper, and examine the following:What position does the paper take? What are some of the primary arguments they are making, and what reasons do they have for backing up these claims?Do you agree with the position taken in this paper? Use external sources to back up your argument.How could the paper be improved? How could you expand upon this work?This assignment will serve to help acclimate you to some of the challenges faced by special needs computing users.Part B)For the second part of this weeks assignment, you should propose a new way in which IoT devices can help a group of users with special needs. Your proposal should include:What group(s) of special needs users do you intend to target? Define the group(s) and the challenges encountered by the group(s).How will the IoT device assist this special needs group?Demonstrate a development plan. How will you accomplish your goals?What risks will you encounter, and how will you overcome them?How will you measure the effectiveness of this proposal?Be sure to include external references (at least 5) to support your proposal.Lengths: Position paper: 2-3 pages; New IoT proposal: 1-2 pages; Total: 3-5 pages, not including title page and referencesYour paper should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards. Be sure to adhere to Northcentral University’s Academic Integrity Policy.
Marketing Technology
Read the attached PDF article entitled, “How Blockchain Technology Can Benefit Marketing: Six Pending Areas Research Areas”After reading the article in full, select one of the mentioned six areas of research and write an article reflection minimum 8-9 maximum page paper identifying the following;1) Describe and provide the overall research area mentioned in the article in a synopsis2) What did the article state in how Blockchain can benefit that marketing area overall?3) What further research did the article recommend?4) What do you think can be the approach to further research the topic? What approach would you recommend to take and what type of research method would make sense?5) What is an example of a company that you believe would benefit from this type of research and why?6) Outside of Blockchain, what other pieces of marketing technology can help this area?7) What do you recommend is the best way to approach for a company to implement this area of research into their company?NOTE: for all the questions above, just pick one research area, and first part- give summary and stick to the same topic while answering all the 7 questions. Choose a company and relate that area to the company.
Measure Your Life
How Will You Measure Your Life?This is by necessity an individual project. Two of the key learning objectives for this course are to 1) learn about individual behavior and 2) learn about interpersonal behavior. One subcomponent of interpersonal behavior is leadership. And yet one of the most difficult people to learn to lead is oneself; what I refer to as that guy or girl that we see in the mirror every morning.As leaders of organizations, we frequently participate in strategic planning wherein, we document the organizations values, purpose, mission, and strategy. In this project, you will reflect upon and document your personal values. You will think about your purpose and propose a mission. You will develop a life and career strategy based on your own strengths and weaknesses. We will effectively answer for each of ourselves, the question that Harvard Professor Clayton Christensen asked of the HBS class of 2010, How will you measure your life (Links to an external site.)?The good news is that there are no wrong answers because only you can answer these questions for yourself. However, the bad news is that nobody can give you the answers either. Your grade on this project will be based on the level of thought that you put into it. This type of reflection can positively affect the trajectory of your career and your life. You will get out of it, only what you put into it. Carpe Diem!Essay format with text of 4-5 Pages, Double Spaced, 12 point font.Rubric:MGMT 5113How Will You Measure Your LifeGrading RubricOverviewThe HWYMYL project is the first and often the most popular assignment in MGMT 5113. It is an assignment that students prepare individually. Students are assigned to apply strategic planning concepts to their careers and personal lives.The assignment is usually 4-5 pages in length. However, there is not a hard and fast rule on the length of the paper. Rather the focus of the grader should be on how well the student applies the specific concepts presented in the assigned reading and videos.Students are assigned to:Read the HBS article, How will you measure your life?Document 4-6 core values.Write a statement of purpose.Write a mission statement.Perform a SWOT analysis.Based upon the students vision (values, purpose & mission) and their SWOT analysis, they should develop a life strategy that includes Objectives, aka SMART Goals.Document how they will measure their progress going forward.The paper includes 4 – 6 core values that are such that the values are likely to never change; i.e. not dependent on technology, the economy etc.+ / -The paper includes a statement of purpose that is such that it could potentially last the person their entire life.+ / -The paper includes a mission statement such that it can be clearly evaluated whether or not it has been achieved by the date indicated; i.e. has a clear finish line.+ / -The paper includes an analysis of the students strengths, weaknesses, opportunities, and threats (SWOT). Note that the strengths should meet Marcus Buckinghams definition in that they are not simply something the person is good at. Strengths are activities that make the person feel stronger.+ / -The paper includes specific Objectives that meet with definition of a SMART Goal; i.e. specific, measurable, attainable, results oriented, time-bound.+ / -The student has indicated what type of Measurement System that they will use to track their progress toward their Mission+ / -There is a particular consistent theme between the different components of the students submission; i.e. innovation, adventurousness, conservatism, frugality etc. The particular theme is not as important as the fact that there is a consistency between the different components that indicates a coherent strategy.+ / –
Network Security Analysis
You are in networking at a large international company. Your company recently decided to implement a cross-training initiative and you have been selected to give a presentation to an audience of non-networking professionals working at various departments in your company.Your presentation must be clear and concise enough to convey technical information to professionals who have a limited understanding of how networking actually works. However, it must also be accurate enough that your audience can understand how their company roles (such as scheduling resource-hogging reports, allowing contractors access to the system, and setting the hours international customers can place orders on your companys system) can impact the companys network, particularly in terms of security.You decide to use the OSI model to explain the fundamental characteristics and components of networks because it is visual and presents the complexity of network communication in 7 layers.Draft your speaker notes to hand off to an assistant who will turn your notes into a graphic-rich presentation. Each of your answers should be about 150-250 words long.Note: Your assignment is to draft speaker notes. Do not create a presentation and do not write a paper.1. Overview of Networking and SecurityYou decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why it is important for all company roles to assist in securing the companys network.Discuss the potential security risks for each layer of the OSI model and the risks in each of the following:· Distributed vs. centralized computer systems and why your department chose to be distributed/centralized· Different network topologies and why your department chose the topology it did· Why standards bodies are essential in networking and how your department complies with standards· The importance of communication protocols and which one(s) your department chose· The differences between LAN, WAN, and wireless technologies, and how your department incorporated each· The responsibilities associated with providing telecommunications services such as security, privacy, reliability, and performanceClick or tap here to enter your speaker notes.2. Routing and SwitchingDescribe basic routing and switching in the context of the OSI model (i.e., in which layer routing, switching, and cabling occur). To underscore your departments commitment to achieving 24/7 availability, describe 3 strategies your department uses to ensure the availability of network access in switched and routed networks.Click or tap here to enter your speaker notes.3. Effective Security PolicyDescribe at least 3 characteristics of an effective security policy, emphasizing the ways in which all departments in the company are responsible for helping secure the company network.Click or tap here to enter your speaker notes.4. Security StrategiesExplain strategies your department used to build security directly into the design of your company network.Click or tap here to enter your speaker notes5. MalwareDefine malware in layperson-friendly language and identify at least 2 strategies your department has put into place to protect your companys network against malware.Click or tap here to enter your speaker notes.6. ClosingSummarize your presentation.Click or tap here to enter your speaker notes.
Desired Work Environment.
Practical Connection :Subject Name: Emerging Threats & Countermeasit is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own IT career.Assignment:Provide a reflection of (or 3 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.Requirements:Provide a (or 3 pages double spaced) minimum reflection.Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.Share a personal connection that identifies specific knowledge and theories from this course.Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).
Use Promo Code: FIRST15