Explain three different ways that freedom of expression is limited in spite of the unequivocal language of the First Amendment.
Explain how common law state court rulings prompted Congress to pass the Communications Decency Act. What does the CDA do?
What constitutional and statutory protections of privacy existed before the Internet became prevalent?
Team managment dis 4
Communication and Team Decision Making
Part 1: Sharpening the Team Mind: Communication and Collective Intelligence
A. What are some of the possible biases and points of error that may arise in team communication systems? In addition to those cited in the opening of Chapter 6, what are some other examples of how team communication problems can lead to disaster?
B. Revisit communication failure examples in Exhibit 6-1. Identify the possible causes of communication or decision-making failure in each example, and, drawing on the information presented in the chapter, discuss measures that might have prevented problems from arising within each team’s communication system.
Part 2: Team Decision-Making: Pitfalls and Solutions
A. What are the key symptoms of groupthink? What problems and shortcomings can arise in the decision-making process as a result of groupthink?
B. Do you think that individuals or groups are better decision-makers? Justify your choice. In what situations would individuals be more effective decision-makers than groups, and in what situations would groups be better than individuals?
Grader Project
Finish HW MyLab IT Excel Project Ch 6 Assignment
AI with reinforcement Learning
Your task, put simply, is to design a reinforcement learning algorithm to teach the mouse how to find the food. The fundamental task is as follows: • There is a 100×100 matrix representing a grid where any space can either be occupied by a mouse or a piece of food. There is only one mouse, and an arbitrary amount of food. • The mouse is able to sense the food with a 3×3 matrix representing its sense of smell, the range of which is the full grid, and stacks (Two foods next to each other will generate twice as much smell). This will be the input for your algorithm. Note that the center of this matrix will always be 0, as that space represents the mouse itself. • The mouse has a limited amount of energy, which is fully replenished when it finds food. If it runs out of energy, it dies, and the game is over. • The mouse is able to move in any cardinal direction (North, South, East, and West). The goal is for them to eat all of the food in the grid as quickly as possible. This simulation is visually represented using PyGame. This task can also be solved by a trivial algorithm using nothing but simple arithmetic, as the ‘scent’ of food is a function of distance from the mouse. You can try to find a non RL solution and compare it to the best version of the RL algorithm’s results. For each frame, a forward pass is run through your model. The input for each frame is an array (or tuple) with four numbers between 0 and 1. These are the probabilities generated from your model. These will determine how the mouse moves. QUESTIONS: (The questions are not graded by correct/incorrect. They are just here to get the student thinking.) Q: Does the order matter for the reinforcement learning model? (Ex: Inputting (N,S,E,W) vs (N,E,S,W)) Q: Does the order matter for a closed form solution? Q: What would be better for reinforcement learning; taking the highest value from the array as the movement choice, or choosing a random direction weighted by the given probabilities? Why? Tasks for the students • Write a reward function. You have access to the current game state, as well as the number of previous frames (Ex: 50) of input matrices, food level, and number of food tiles found. This number of frames will be the same number of frames it takes to starve from a full energy level. This can be very simple, like just using the number of food tiles found, or use reward shaping using multiple frames of previous input matrices to create more frequent positive/negative rewards (Ex: when the mouse moves closer or farther away from food.) QUESTIONS: Q: What would be a sparse reward function for this model? Q: How can the reward function be improved? • Write a model: As described above, write a model that takes in 8 inputs (The mouse’s sensory matrix minus the center), and outputs four probabilities for each cardinal direction. In addition, you will be handling when to back-propagate a reward, or when to keep running. Additional task (Optional worth extra credit): There are many variables that you can mess around with to complicate the problem to make it more suitable to Reinforcement learning. One of them is decreasing the range of the mouse’s scent with the variable SCENT_RANGE. Another is the variable VARIABLE_TERRAIN which gives the mouse a second sense (sight) and adds a value to each terrain section which indicates how much energy is spend by stepping over that tile. Q: How does the reward function change if you add the new variables?
Discussion
The article on IRB this week discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the University’s institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article.
Please answer the following questions in your main post:
- What are the main issues that the article addresses?
- What is the Common Rule?
- How is this issue related to information systems and digital privacy?
Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
- Explain, define, or analyze the topic in detail provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
Assignment
Learn About Defending Against DDoS
Using WORD, write an ORIGINAL brief essay of 300 words or more:
- Find a DoS attack that has occurred in the last six months
- You might find some resources at www.f-secure.com.
- Note how that attack was conducted.
- Write a brief explanation of how you might have defended against that specific attack.
Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.
Attach your WORD doc and then hit SUBMT.
glb quiz
read the attached file
security vulnerablities
Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.
Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Do not use attachments as a submission.
Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’. You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due.
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.
Network
Based on the knowledge you have achieved thus far in this class, compose a brief synopsis compiling what you have learned about today’s networks. Describe how you would create a better network at your home or office utilizing the knowledge you’ve gained with this class. An example of this knowledge would be the cabling selected, as well as the IP address scheme utilized.
Parameters/Expectations:
- At least 4 paragraphs in length not counting the title page, include a title page, double space, font size 10 or 12
- Includes a highly developed viewpoint, purpose and exceptional content
- Demonstrates superior organization, is well ordered, logical and unified
- Free of grammar and spelling errors 5. No evidence of plagiarism
Write an Essay on motivation for pursuing Cyber Security Degree.
Your essay should be 500-800 words, single-spaced, and should address the following prompt: Describe your motivations for pursuing your graduate degree and your ability to be successful in the program.