Written Assignment 3

 

  • Who uses extended support features?
  • Why is it important to keep backups of your SQL software?
  • What did you learn about SQL after watching Brent Ozar’s video?
  • How can you keep your skills aggressively current?
  • Be specific and provide examples.

Click the link above to submit your completed assignment.Requirements:

  • A minimum of 350 words. 
  • Use APA format. 
    • Times New Roman 12 pt font, double spaced with 1″ margins.

Data Classification and Data Loss Prevention

 

Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf

It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?

The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.

After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.

Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)

Legal Reg, Compliance, Invest

For this assignment, submit a 5-6 page paper that addresses the following questions as completely as possible.

  1. What is Information Security Governance?
  2. What are some of the common organizational roles involved in Security Governance?
  3. What documentation is associated with Security Governance?
  4. What are some of the policies use within the Information Security Governance process?
  5. What are some of the measures, metrics, and methods to ensure governance compliance?

Title page and References pages do not count towards the total.  No abstract or table of contents is required, but please observe all other aspects of the APA guidelines with regard to spacing, page number, margins, headings, fonts and reference citations

At least 4 valid references must be supplied.  Wikipedia and Techopedia are not allowed.

Assignment (500 WORDS MINIMUM)

  

Web Analytics – Labeling Visitors, Sessions, Pages, and Web Server Log Files vs. Java Scripting

Assignment Instructions:

· Define the importance of custom variables, attached chapter 9 (Advanced Web Metrics with Google Analytics by Brian Clifton) explains the importance of each variable, and how each is restricted to one particular scope level.

· Explain in as much detail as you can regarding the scope of each of these levels; Visitor Level, Session Level and Page Level.

· Compare and contrast web server log files vs. JavaScript tagging

· What would you recommend in terms of the variables you would set for an ecommerce site? Would this recommendation be dependent on the type of business or any other factors?

Please submit a Word Doc with your answers, in 500 words or more, and use references in support of your answers.

Social Media

 

This week, you watched the Social Media Revolution 2019 #Socialnomics and read The Beginner’s Guide to Social Media.  https://moz.com/beginners-guide-to-social-media

Discussion:
As you review the multiple statistics that display in Social Media Revolution 2019 #Socialnomics, and reflecting on what you read about social media, assess the impact of social media in your life.
Question #1: 
What role does Social Media play in your life? Are you aware of the social media policies of the organizations where you work, attend school, or volunteer? Have you used social media to resolve problems, participate in a cause you are passionate about, or to learn about UMGC? How does Social Media impact your personal and professional communications?

 

Topic 2: Digital Humanitarianism

This week you also watched Innovations in Humanitarian Relief (PBS online video) https://www.pbs.org/video/innovation-humanitarian-relief-e6xivw/

Discussion:
In the wake of natural disasters and acts of terror, several tech companies are making an effort to improve traditional responses effort in humanitarian relief.

Question #1: 
Do you think that humanitarian aid workers constantly need new ways of thinking, new products and new processes to better respond to disasters? Why or why not?

 

Topic 3: Cyber Psychology

This week you read: Cyber psychology and cyber behavior of adolescents-the need of the contemporary era  https://www.sciencedirect.com/science/article/pii/S1877050917326704

Discussion:

Cyber psychology evaluates how we interact with others using technology, how we can develop technology to best fit our requirements, and how our behavior and psychological states are influenced by technology. Cyber psychology applies psychological theory to explain how individuals interact in cyberspace and how these interactions might affect our offline lives. It offers a new way to define the self and society.

Question #1: 

How does technology impact psychology? List at least three advantages and at least three disadvantages.

Question #2: 

Do you present yourself differently in different online spaces? In what ways are you different and in what ways are you consistent? Why do you think this is?

Project Assignment

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • What are social networks, how do people use them, and what are some of their practical business uses?
  • What are some of the key ethical issues associated with the use of social networking Web sites?
  • What is a virtual life community, and what are some of the ethical issues associated with such a community?

Provide three articles to substantiate the above three questions.

Using the APA format provide a citation for each of the articles you read

Suggestion: Use a search engine (Google) and keywords

PLE week1 DB

 

Hello,

i need this paper by 1/13 afternoon.

Strictly No plagiarism please use your own words.

Read this article  (https://www.wired.com/story/cambridge-analytica-facebook-privacy-awakening/) about Cambridge Analytica in Wired Magazine. Discuss whether you think the premise of the (300 words) article is correct and that people are more aware of privacy concerns.  

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism