Category: Information Systems

Week 4 Discussion & Respond To Discussion Board

Attached below is:

WEEK 4: As always, include references. As always,   no plagiarism, cite and list in apa format   

 Respond To Discussion Board: They are 2 discussion boards post below. read and Reply to each discussion post 100 words per each response so total 200words.  Responses should demonstrate critical thinking and comprehension of the discussion topic and are strengthened when they are supported by additional research. You are expected to provide supporting details for your response; that support may come from the points covered in the readings and additional external research all source must be cited and listed  (appropriately cited) in APA      

IS – Week 5 Dis

 

Based on Chapter 6 lecture, in your OWN opinion what department or role do you believe should own the IG development policy process? IT? Legal? HR? Risk Management? Records Management?  Once the IG policy is developed what would be your Communication strategy plan for your organization? 250 to 300 words with APA and Scholarly refreences

Information Systems Infrastructure

Discussion 3

Research at least two articles on the topic of big data and its business impacts. Write a brief synthesis and summary of the two articles. How are the topics of the two articles related? What information was relevant and why?

Provide the references.

Discussion

  •  
  • Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist in the next ten years? Why or why not?
  • Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.
  • At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Information System Security

  

Chapter 3

Q8. If you work for a financial services organization such as a bank or credit union, which 1999 law affects your use of customer data? What other effects does it have?

Q11.What is intellectual property (IP)? Is it afforded the same protection in every country of the world? What laws currently protect IP in the United States and Europe?

Q14. How is due diligence different from due care? Why are both important?

Chapter 4

7. What Web resources can aid an organization in developing best practices as part of a security framework?

11. What is contingency planning? How is it different from routine management planning? What are the components of contingency planning?

20. List and describe the six site and data contingency strategies identified in the text.

Need 4+ Pages In APA6 With No Plagiarism With 3+ Schoarly Journal Reference And Follow All Instructions Below.

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references with no plagiarism in addition to the course textbook.  . At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

Be approximately four to six pages in length with no plagiarism, not including the required cover page and reference page.

Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook attached below. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

Functional Dependencies

Assignment Instructions

Required Reading
1. Pratt – Concepts of Database Management – Chapter 5

Assignment:
Complete the Premiere Products Exercises in Chapter 5 on page 180/181 (exercises 1 & 2). The % after an instruction indicates the % of grade for this exercise.

Include the below numbers and letters to organize the submission do not include the questions.

1) For Exercise 1
A) Copy the definition of functional dependency (from the text), then explain it in your own words including an example not in the text or this exercise. (5%)

B) Submit one complete set of functional dependencies (use the notation found on the bottom of page 162, ensure all fields are included at least once). (15%)

In your own words and using field names from this exercise, explain one row of functional dependencies (this demonstrates an understanding of how to apply the concept).

C) Submit the 3NF table(s) (use the shorthand table notation found on page 34, and 162). The tables and fields on those pages are similar to those assignment. That is because they are also based on Premier Products example. The main point in referencing those pages and tables is to provide examples of the notation format there may be similarities in content but base your submission on fields in the exercise. (15%)

D) For each 3NF table:  
Include a statement, in your own words that explains the primary key selection: why is that field a good choice for the primary key? (10%)<o:p>

2) For Exercise 2
A) Submit one complete set of functional dependencies (use the notation found on the bottom of page 162, ensure all fields are included at least once). (15%)

In your own words and using field names from this exercise, explain one row of functional dependencies (this demonstrates an understanding of how to apply the concept).

B) Submit the 3NF table(s) (use the shorthand table notation found on page 34, and 162). (15%)

C) For each 3NF table:  
Include a statement, in your own words that explains the primary key selection: why is that field a good choice for the primary key? (10%)

Writing APA/Org/Clarity/Spelling (15%)

Data Mining

Question 1:

Three pages APA format. Two journal article references, In-Text Citations.

  

Topic: Cluster analysis: challenges, trends, and tools

Overview: The purpose of this assignment is to explore the current challenges, trends, and tools that are associated with the process of conducting a cluster analysis.

Primary challenges: Describe and explain one or two of the primary challenges associated with data clustering techniques that the modern organization or data scientist faces in the current data mining environment.

Current trends: Describe one current trend in data science that can help organizations overcome todays data clustering challenges.

DM tools and real-world scenario: Describe one tool that can support the process of data clustering and provide a real-world example or scenario where this tool has helped an organization overcome their data clustering challenges.

Ethical Hacking

 No plagiarism very important

Need responses to my teamates discussion

Cryptography is used to protect confidential data in many areas. Chose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext, chosen-ciphertext attack, timing attack, rubber hose attack, adaptive attack).

Info Tech In Global Economy

 

Chapter 9 discussed the importance of stakeholder engagement in policy making. The author presented several benefits and an analysis of five cases in which stakeholder engagement added value to the policy making process. If you were leading a project to develop a comprehensive policy for managing pedestrian traffic flow in a popular downtown metropolitan district, what measures would you take to engage stakeholders in that project? Your answer should outline your suggestions and clearly explain why each one would add value.

Use class materials or open web credible resources for this discussion. (Maximum 150 words, initial post latest by Thursday). References and in-text citations must be APA compliant. Please, respond substantially to a minimum of two colleagues’ posts