Information Systems
[SOLVED] Damn Vulnerable Web Application
Discuss the advantages and disadvantages of (DVWA)
[SOLVED] Computer Technology
Give your opinion about the advantages and disadvantages of the EHR, remember that the technology has made it possible to access a patient’s information in seconds through computer technology, however this technology may be vulnerable in terms of privacy so the confidential information of the patients could be in danger.The format must be APA, give at least two references, one of them can be the textbook and the other within a 5 year span, a minimum of 150 words
[SOLVED] Sprint Planning and Burndown Chart
SCRUM Project, Part 5: Sprint Planning and Burndown ChartPrior to beginning work on this assignment, watch the Spring planning (Links to an external site.) video, which demonstrates how VSO can be used to plan your first sprint for weekly SCRUM project.Continue with your chosen project from last week by planning your very first iteration. In other words, you will estimate the hours needed to satisfy a product backlog item, calculate team capacities, and assign tasks to team members using Visual Studio Online (VSO).Follow the steps below to complete this assignment:Determine which product backlog items (user stories) need to be included in the very first iteration.Add the above user stories to the first iteration backlog.Select one of the iteration backlog items and break it down into tasks that team members can work on.Assign hours to complete to each task. Form your iteration team and determine the capacity of each team member and the whole team. Assign the tasks of your selected iteration backlog item to members of your team.Assume that you have only 1 SCRUM development team made of three developers.Once you have planned your first iteration in VSO, take one screenshot showing the hours assigned to each task, and a second screenshot showing the capacities of each team members of your project.In addition to your two screenshots, include a 750- to 1250-word (3-5 page) paper with the following:Summary of your selected user story to include in the first sprint, its tasks, hours on task, team member composition and capacities· Explanation of your approach to completing this assignment, including why you selected the user stories you did and how they support the business needs Summary of personal reflection and lessons learned in completing this assignmentThe assignment· Must be 750-1250 words (3-5 pages) in length (not including title and references pages, or the screenshots of your first iteration) and formatted according to APA style as outlined in the Ashford Writing Center.
[SOLVED] Cyberbullying
Read all the directions before continuing.Read the following:Cyberbullying and a Student’s Suicide athttp://www.nytimes.com/roomfordebate/2010/09/30/cyberbullying-and-a-students-suicide?hp.Colleges Face Legal Limits in Policing Online Misbehavior at https://www.lawyers.com/legal-info/research/education-law/off-campus-student-speech-be-careful-what-you-post.html How should we deal with cases like the suicides of TylClementi(http://www.nytimes.com/2010/09/30/nyregion/30suicide.html?_r=0) and Phoebe Princehttp://www.nytimes.com/2010/04/02/us/02bully.html)?”All of the Supreme Courts student speech cases have involved speech occurring on school grounds or during school-sponsored activities. As a result, there is no clear indication of whether schools can punish cyberbullying occurring outside of a school context. The Supreme Court must confront the issue of whether a school violates a students free speech rights by punishing them for creating, on their own time and using their own computers, electronic material that mocks or insults school officials or classmates. Until they do, lower courts will continue to struggle with the resolution of this issue.”From Cyberbullying: https://www.abajournal.com/magazine/article/is_cyberbullying_free_speechNow, answer both of the following questions:Have you thought about your own digital footprint? Have you posted photos, videos, or comments you would like to erase? Google your name and see what comes up. What level of privacy did you expect as an Internet user? “Do colleges and schools have any authority when students misuse electronic devices both on and off school property? If there are cases of cyberbullying involving computers, cellphones, and social-network sites like Facebook and Twitter, does an institution have a legal basis to step in? Or is it stepping on free speech?” In order to earn the full points for this assignment, you must:Directly and completely answer the questions.Clearly and accurately explain your answer.Include examples, quotes and/or paraphrases in your answer. Compose a unified paragraph using effective sentence structure, word choice, and grammatical correctness. Respond to another student’s post explaining the reason for your agreement or disagreement. Use effective sentence structure, word choice, and grammatical correctness.Reminder: Please make sure to comply with all Netiquette Guidelines listed in the Getting Started module.
[SOLVED] Development of Strategic Risks
From the below link, select two categories for this discussion. You will note the tabs at the top of the online site as these are the categories (e.g., Attractions & Events, City Government, etc.)For the categories you have selected, discern at least two strategic risks for each category. Develop a value map for one category.https://www.edmonton.ca/city_government/city-vision-and-strategic-plan.aspxGrading:25% on identification and explanation of the strategic risks you selected. You will work with two risk categories your selected. (main post).30% on the application of tools: value map, and selected tool. You must apply a value map and another tool to your selected categories. (main post)15% on the development of strategic risks with explanation (response post)10% on the use of research20% on good collegiate level writing and application of APA format. (Note: for the discussion, the only required APA format will be with citations.)
[SOLVED] Business Objectives and Legal Obligations
An Information Technology (IT) security policy framework supports business objectives and legal obligations. It also promotes an organizations core vales and defines how it identifies, manages and disposes of risk.1. See page 225 – “Private Sector Case Study” – How are security frameworks applied in this Case Study?2. See page 226 – “Public Sector Case Study” – How are security frameworks applied in this Case Study?3. See page 228 – “Critical Infrastructure Case Study – How are security frameworks applied in this Case Study?
[SOLVED] Value Sensitive Design of Complex Product Systems
Using at least 300 words, (1) Discuss the benefits of Value Sensitive Design of Complex Product Systems (2) Discuss the limitations of Value Sensitive Design of Complex Product Systems and (3) Describe an example of a design process for Value Sensitive Design of Complex Product SystemsYour document should be a Word document. To receive full credit for this individual project, you must include at least two references (APA) from academic resources
[SOLVED] Virtualization and Cloud Computing
You have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or other organization if more applicable) that will address the following prompts: Describe the organizations environment and evaluate its preparedness for virtualization. Explain Microsoft (or another product) licensing for virtualized environments. Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization. Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azures Internet as a Service (IaaS) and storage capabilitiesMake a recommendation for cloud computer use in the organization, including a justification for your recommendations.Submit your research paper as a single document. Your paper should meet the following requirements: Be approximately 3 pages in length, not including the required cover page and reference page Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources. Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
[SOLVED] Data Encryption Standards in Cryptography and Healthcare Sector
For this project, propose a 7-page research paper. Your paper will consist of an introduction, a literature review, a methodology and a result. The research topic is Data Encryption standards in Cryptography and Healthcare Sector,Focus on a broad view of data encryption techniquesblock cipher algorithm techniques for encrypting and decrypting the dataePHI data encryption techniques and preventing data breaches· Discuss about DES key lengths and brute force attacks, triple DES.· What are the problems faced by healthcare industries and how DES will help
[SOLVED] Implemented Database
We all had the unfortunate experience of seeing how computers can, at times, make life’s journey about more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly implemented database that you’ve encountered (or read about) that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide citations from the literature.Discussion post should be about 300 words with 2-3 APA citations and matching references. Please use APA format throughout.
Use Promo Code: FIRST15