Information Infrastructure and Systems

Information Infrastructure and SystemsIn this week, your task for the final project is to research in the South University Online Library and on the Internet to identify a case study of your choice with a pertinent information system application.Some examples could be: a health care organization, such as a health care insurance company, a major hospital, or medical laboratory; an academic institution, such as a university or a professional institute; a commerce and transportation center, for example a major airport, or maritime port; a transportation carrier, such as an airline company, a railroad company, or even a car transportation service; a network service provider, such as a telecommunications service carrier/provider, an Internet and voice digital service provider, or a cloud service provider; a major media organization, such as television network, or a multimedia service operator; an industry firm that manufactures products, such as a computer products manufacturer, a car manufacturer, or a hardware manufacturer; a major retailer, for example a food retailer, a home maintenance retailer, or clothes outlet; an entertainment complex, such as a hotel, a vacation resort, or a large recreation and entertainment complex; a financial institution, for example a banking system, a credit card service, or an investment trading service.The above are examples to guide you with your research, but you are not limited to these areas. It is important that you arrive at your own case study based on your personal interests, and that it is well suited for an information systems analysis. Some criteria that you should consider in arriving at your case study are listed below:Your case study may be based on an actual company or organization, using facts from research, or it could be based on a fictional company or organization that you entirely define yourself as a hypothetical case with your own assumptions.Your case study must require an underlying information system as an essential element for its operation.The information system must be reasonably complex. One way to determine whether an information system is reasonably complex is to think in terms of entities and relationships that you will need to model. Even without knowing exactly how the data model will look, having some early notion of how many entities and relationships you should expect to model the information in your case will give you an appreciation for your case’s complexity. A reasonable complexity would be at least ten entities and ten relationships.At some point in your research you must be able to think in terms of use cases for your information system. Think of use cases as transactions that different end users will invoke when interacting with your information system. At the time you select your research area and define your case study, you need not know exactly the use cases you will be working with, but you should have some appreciation for the types of scenarios that you will explore as you progress with your project.Finally, you must submit your area of study to the professor via e-mail and have your professor’s approval that you may go ahead with your selection.Once you have selected your study area and case, and have received approval from your professor, you may proceed to the next steps described below. Create a report that focuses on the IS used to support the operation of your organization in your case study and answer the following questions.What events trigger the flow of information in and out of your system?What tracking mechanisms are in place?What technologies are being used for tracking the underlying events?What is the information infrastructure for handling the information flow?Diagrammatically represent the flow of information between your organization and adjacent entities (for example, these could be suppliers, customers, support organizations, government agencies, or partnering organizations).What security mechanisms are in place for obtaining information on events pertaining to your case study?What security mechanisms are in place in the organization? Who handles violations of organizational policies? What is the range of their responsibilities? Who do these officers respond to? Which office oversees the operations of the business for your organization?What are brokers? What types of precautions are taken in order to establish minimum trust with brokers?Which standard organizations or governmental agencies oversee the operation of your organization?Submission Details:Create your report in approximately 5–7 pages in a Microsoft Word document and save it as W1_A3_LastName_FirstInitial.doc.Cite any sources you use using correct APA format on a separate page.

Read more

Biometric System Evaluation

400 words of contentNo-plagiarismAPA Format with referencesDiscussion: Biometric System EvaluationLearning Objectives and OutcomesIdentify the correct advantages of each biometric methodIdentify the correct disadvantages of each biometric methodAssignment RequirementsRead the worksheet attached below and address the following:Using what you have learned about the biometric method, identify the correct advantages and disadvantages of each listed biometric type.Use the following checklist to support your work on the assignment:I have articulated my position clearly and logically.I have supported my argument with data and factual information.I have provided relevant citations and references to support my position on the issue discussed.I have compared and contrasted my position with the perspectives offered by my peers and highlighted the critical similarities and differences.

Read more

Predicting The Oscars

Description:Please download the Oscar_2000_2018.csv dataset provided.This dataset amounts to a total of 1,235 movies from 2000 to 2018, where each film has 100+ features including:It sports 20 categorical, 56 numeric, 42 items, and 1 DateTime field totaling 119 fields giving you plenty of details about various aspects of the past nominees and winners.The dataset is organized such that each record represents a unique movie identified by the field movie_id.The first 17 fields have to do with the metadata associated with each movie e.g., release_date, genre, synopsis, duration, metascore.Tasks:Part 1: EDA1. Using a scatterplot or a pair plot show the relationship between features “user_reviews” and “critic_reviews”. Find the Pearson’s correlation coefficient(r) between the 2 features.2. Plot the average “duration” per “certificate” feature. In other words, x-axis would be “certificate” and the y-axes would be the average duration.3. Plot a histogram for the “genre” feature. Note that the field “genre” needs to be split first to find the frequency for each individual genre type; “Comedy”, “Romance”, “Action” etc. (Hint: Functions like “strsplit” in R or “split” in Python can be used)Part 2: Model Building1. You are going to predict “Oscar_Best_Picture_won” feature; this will be your target variable. Remove all of the features which has the convention “Oscar_Best_XXX_won” except for the target variable “Oscar_Best_Picture_won”.2. Convert the target variable’s type to a numerical type by doing the transformation, “Yes” = 1, “No” = 0.3. Remove columns with high cardinality, i.e., for every column that has a unique value frequency of 70% or higher, remove them from the dataset.4. Perform a time split and create a training dataset spanning the period 2000-2017 and a test dataset for the movies released in 2018 – use “year” feature for the data split5. Create a tree-based model to predict the target “Oscar_Best_Picture_won”6. Use the model to predict the test dataset and find the maximum predicted valueOptional: Go back to the initial dataset and find the movie in 2018 that is associated with the maximum predicted value.

Read more

Audit of Web Servers

Write a discussion post on following topic:Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege.Please make your posts substantive. A substantive post will do at least two of the following:· Ask an interesting, thoughtful question pertaining to the topic· Answer a question (in detail) posted by another student or the instructor· Provide extensive additional information on the topic· Explain, define, or analyze the topic in detail· Share an applicable personal experience· Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)· Make an argument concerning the topic.At least 2 (scholarly) journal source should be used. Be your references in correct APA 7 format and cite each reference at least once, but as many times as you rely on it. Citations support each sentence relying on a reference, not an entire paragraph. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. Initial posts need to be 300 words minimum .

Read more

Managing Products

What role do you feel that VR/AR/MR will play in the future for managing products within an enterprise supply chain system? Please elaborate on how new technologies can be applied in various areas across supply chains in detail with business use casesI have attached few files and link for research. please use research articles for addition research purpose.i need detailed work.. 350+ words.

Read more

Blockchain Technology

This week’s reading discussed the current state of blockchain technology and suggested what the technology may look like in the near future. The author provided several suggestions that would increase blockchain’s value to the enterprise. write a discussion and choose whether you would consider interoperability or scalability to be more important to blockchain’s future. Explain your decision and use examples from Chapter files given below. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities.Discussion 350 words + Three question

Read more

Board of Directors

SUMMARIZE the composition (in terms of functional background, education, experience, demographics, etc.) of TMT (top management team) and BoD (board of directors) of your assigned company. What conclusions—related to corporate governance issues—can you draw?

Read more

Data Visualization

Review different available BI tools ,and choose one to investigate in detail.Create a PowerPoint Presentation summarizing the tool ,and include the following details:What is the purpose of the tool?What features does the tool have?What industries benefit most from this type of tool?What similar tools are available from competing BI solution provides?Who are the “big” data visualization tool providers in the space?Presentation should be only on one BI tool. So choose wisely. Add some advantages and disadvantages too. If possible also add topic on security of that tool.Everything in APA format. Original work. With references and conclusion.Time limit 6 to 8 Hrs.

Read more

Social Media Analytics

This assessment of a 4,000 word research paper is designed to demonstrate a student’s completion of the following Learning Outcomes:1. Demonstrate an understanding of concepts underlying social media analytics and be able to apply them appropriately in business settings;2. Critically evaluate and implement specialist technologies to harvest, analyse and visualise “social data” from individuals to corporate perspectives;3. Synthesise and apply social analytics and appropriate techniques on social information;4. Critically evaluate, design, prototype and implement social media applications and visualization for business story telling.

Read more

Augmented Reality Exercise System

As the CEO of an organization, you just learned that the information technology (IT) security department hired a convicted hacker who used to write malicious code as a security consultant. Would you overturn this decision? Why, or why not?Recall the Augmented Reality Exercise System (ARES) scenario discussed at the beginning of Chapter 11 of the textbook in uCertify. As the manager of this project, would you approve the decision to use an offshore contractor to outsource the development of AR headset applications? Why, or why not?

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information