Urgent needed

 

Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Readings:

https://www.youtube.com/watch?v=i-HIXgjWd-E

Discussion

 

The article on IRB this week discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the University’s institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article.  

Please answer the following questions in your main post:

  • What are the main issues that the article addresses?
  • What is the Common Rule?
  • How is this issue related to information systems and digital privacy?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Explain, define, or analyze the topic in detail provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Data mining

  You are a data mining consultant hired by your organization to implement a data mining process. What challenges does your organization face in ensuring that the data mining models are receiving clean data?

Your assignment must adhere to APA guidelines. There should be at least one scholarly source listed on the reference page. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. Your paper should be 2-3 pages in length.

Explore data, Python

Advanced filtering

To filter by date ranges we need to get fancy with Boolean operators

Strip out all other values except one

Sort the new baby dataframe on multiple keys

Sort the new baby dataframe with string concatenation to narrow the display

The computer did it! Discussion board

 1414 unread replies.1414 replies.

When human beings and computers are both involved in accomplishing a task and something goes wrong, we tend to blame the computer.

There is little question about the existence of software bugs, but can all real-world problems involving computers (such as erroneous bank transactions, military training incidents, or privacy breaches) be attributed to errors in the software program?

Today, do you think it is more likely that a computer or a human being would be responsible for a serious system problem?

Why?

Answer with complete sentences for full credit.

Benchmark – Framework Findings and Recommendations

This assignment serves to benchmark competency 2.1: Establish a risk management framework using industry standards for compliance.

Based on an executive level report, deliver the findings of the Topic 4 “Demonstrating the Gap” assignment.

Include the following in your report (add sections to the template as needed):

  1. An overview of why the report is being written
  2. A paragraph description of the system
  3. A paragraph outlining the framework governing the enterprise
  4. Major gaps that were found
  5. Remediation that is recommended
  6. A high-level diagram that represents the current state of the system
  7. An equal diagram depicting the proper end state

Refer to the “Security Assessment Report (SAR),” within the required readings. This resource provides detailed explanations of each section that should be included within the assessment report. 

APA style is not required, but solid academic writing is expected.

Refer to the “System Security Assessment Report Template” and the “Framework Findings and Recommendations Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

Discussion Question

Take a position on the ethical concerns raised by employees who are upset about organizations monitoring their e-mail or Internet access for security purposes.

  • Assess whether you believe it is fair for an employee to undergo this type of surveillance.
  • Suggest an alternative approach for an organization to control security without monitoring employee actions.