Category: Information Systems

given the ever-growing number of data breaches in the US, Is this sufficient, or should there be new laws enacted to secure privacy? Should we strive for a constitutional amendment guaranteeing along with the existing rights the right to privacy?

Posts are assessed on a rubric with equal weight given to 3 assessable items: Comprehension, Critical Thinking, and APA/Mechanics

The concept of consumer privacy has evolved from the idea of personal privacy, it is important to note there is no explicit protection for this in the U.S. Constitution.  However, it has been considered to be an essential right in a number of legal decisions, beginning in the 1920s.

 

Legislation in Europe has enforced high standards of data privacy protection, but data privacy protection in the United States has been primarily the domain of the Federal Trade Commission (FTC), whose regulations only require companies to disclose their corporate privacy policies to their customers. The FTC can take legal action against companies that violate customer privacy policies or companies that compromise their customers’ sensitive personal information.

 

Most of this information was extracted from https://searchdatamanagement.techtarget.com/definition/consumer-privacy

 

The question is this:  given the ever-growing number of data breaches in the US, Is this sufficient, or should there be new laws enacted to secure privacy?  Should we strive for a constitutional amendment guaranteeing along with the existing rights the right to privacy? 

Support your responses with valid research

cyber security emerging threats

 Separation

In today’s world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.

It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States.The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.

Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.

D3_Need 2+ Pages With 3 References Cited In APA Format – NO PLAGIARISM- Attach Plagiarism Report

There are several steps in Information Risks planning.  How can you utilize these steps to create a “Security Data Policy for employees storing personal data on their work computers.” Describe how you will use each step. Will you need to use all the steps, if not what steps would be eliminated and why?  

D3.2_Need 2+ Pages With 3 References Cited In APA Format – NO PLAGIARISM- Attach Plagiarism Report

 Please answer below questions

 Measuring Performance at Intuit: A Value-Added Component in ERM Programs 

  1. How do Key Risk Indicators help companies identify emerging risks?
  2. How do Key Performance Indicators help companies to manage existing risks?
  3. If measuring performance is not a component of an ERM program, what is the effect on the overall quality of the program?

Research Paper: Business Process Redesign

 

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

Be approximately 4-6 pages in length, not including the required cover page and reference page.

Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

ROI Implementation

 

Assignment Content

  1. ROI is one of the most common financial measuring tools. Being able to calculate the ROI or expected ROI allows us to make the best decisions about where to invest our funds for the most return on our investment over time.

    Part 1

    Using the numbers in Course Scenario: Phoenix Fine Electronics, which was provided in Week 1, calculate the estimated ROI for an ERP implementation.

    Calculate the estimated productivity as a result of implementing ERP system.

    Note: If you need help calculating ROI, review this weeks activity, LinkedIn Learning: Content Marketing ROI by Honigman.

    Part 2

    Complete your business case to present to the management team of Phoenix Fine Electronics. Incorporate your analysis and instructor feedback from the previous weeks assignments. Include the following in your final business case:

    • Executive summary
    • High-level overall business needs and desired outcomes
    • Scope of project
    • Measurable values of new system
    • An explanation of the strategic alignment
    • Estimated ROI and productivity (from Part 1)
    • Final recommendation
    • Submit your assignment.

       

Discussion Board

What are the factors that influence the selection of access control software and/ or hardware? Discuss all aspects of access control systems.

DQ requirement: Note that the requirement is to post your initial response no later than Thursday and you must post one additional post during the week (Sunday). I recommend your initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference.

Week 3 Questions

Question 1:

Discuss the Foundation of Strong Business-IT Relationship.

Note: Your initial post will be your answer to the Question and is to be 250 300 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

References: 

McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson. 

Question 3:

At the end of Chapter 3 in your textbook (Pgs. 185 201), choose one of the tools listed and briefly discuss what the tool of your choosing does and also why did you choose this tool to discuss. 

Note: Your initial post will be your answer to the Question and is to be 250 300 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

References: Malin, Cameron, Casey, Eoghan, and Aquilina, James (2012). Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides. Syngress

Question 4:

At the end of Chapter 3 in your textbook (Pgs. 177 184), Windows System Examination: Field Notes.  Write 1-2 paragraphs concerning this form including answering the following questions:   Do you find it useful?  Would you consider using a form like this in your own work?

Note: Your initial post will be your answer to the Question and is to be 500 550 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

References: Malin, Cameron, Casey, Eoghan, and Aquilina, James (2012). Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides. Syngress

Planning the Systems development

Intsructions:

You will write a paragraph with context introducing the concepts from the attached file , followed by a question that is not from the text book or too generic for others to answer based off the information you have provided. The question can be interesting, controversial, or both (make your question attractive for others to reply to your question and initiate a conversation)

This discussion board requires

1.  Posting at least one structured question: provide a paragraph with the context introducing the concept(s), followed by a question that either be interesting, controversial, or both (make your question attractive for others to reply to your question and initiate a conversation)

2.  ]

3.  Using an external reference, properly cited, to support your reply to question(s).

Activity:

Module 2, which includes chapters 4 and 5, focuses on the planning stage of the systems development life cycle. Chapter 4 introduces you to the first phase of the systems development life cycle, identifying and selecting systems development projects. The premise is that organizations benefit by following a formal process for identifying and selecting projects that align with its strategic objectives. During the first step of information systems planning, a senior manager, a business group, an IS manager, or a steering committee identifies all possible systems development projects that an organizational unit can undertake. During the second step, projects are classified and ranked according to some criteria that are important to the organization. During the third step, those projects deemed most likely to yield significant organizational benefits, given available resources, are selected for subsequent development activities.

Next, Chapter 5 introduces project initiation and planning. Project initiation includes those activities that assist in organizing a team to conduct project planning. During project initiation, one or more analysts work with a customer to establish work standards and communication procedures. Project planning is the process of defining clear, discrete activities and the work needed to complete each activity. An important aspect of the project initiation and planning process focuses on the assessment of a projects feasibility and risk. Chapter 5 describes several types of feasibility, including economic, technical, operational, schedule, legal and contractual, and political.

Based on the previously discussed context, you will post at least one question and respond or comment to at least one question or comment posted by other participants in the discussion board. Your question(s) or comment(s) should go beyond the conceptual domain but also describe or explore how this knowledge can be applied to your current or future professional activities or endeavors.

I expect your posts to be original in all aspects. Consequently, you should not use questions from your textbook for your posting. Further, use secondary references that provide additional information or support a better understanding of chapters covered in the module.

01D41D20.182BCE30

data science and big data analytics-R language

 

1. How do you use pair wise plots to evaluate the effectiveness of the clustering?

2. The attributes of a data set are purchase decision (Yes/No), Gender (M/F), income group (<10K, 10 50K, >50K). Can you use K means to cluster this data set?

3. Please review and implement the example “Computing Confidence and Lift” given on page 10 (3b – Association Rule) in “R” language

PLEASE SHOW/UPLOAD ALL YOUR WORK – SOURCE CODE ETC..

textbook: