CSIA 459

The technology acceptance model (TAM) is a two-factor model that describes user acceptance of new or replacement technology solutions (Davis, 1989). This evaluation model has withstood the test of time and is widely used. The model is based upon perceptions and beliefs of individuals and measures two types of factors: (a) perceived ease of use and (b) perceived usefulness.

Prepare an analysis (briefing paper) (5 to 7 strong paragraphs) in which you explain how cybersecurity researchers could use the TAM model to explore the factors which affect employee acceptance of biometrics used for access to facilities and/or computing systems. What research questions might they ask? What measurements would be needed?

Post your briefing paper as a reply to this topic. Remember to cite your sources (3 minimum) and include a reference list at the end of your posting.

Reference

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340. https://ezproxy.umgc.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=4679168&site=ehost-live&scope=site

Business_Intelligence_week5

Discussion

 Carefully review and use either of the book options below as a reference for various aspects of analytics.

  • Sharda, R., Delen, D., & Turban, E. (2015) Business intelligence and analytics: Systems for decision support (10th ed.). Boston: Pearson. Print: ISBN-13: 978-0-13-305090-5
  • Sharda, R., Delen, D., & Turban, E. (2020) Analytics, data science, & artificial intelligence: Systems for decision support (11th ed.). Boston: Pearson. Print: ISBN-13: 978-0-13-519201-6
  • Important Note:  All students are welcome to use outside research in aspects of analytics.

After reading and analyzing content from book references and or from outside research, select “one” of the research options below and respond.

  • Go to www.IBM.com and find at least three customer case studies on Big Data and write a report where you discuss the commonalities and differences of these cases.
  • Go to www.cloudera.com and find at least three customer case studies on Hadoop implementation, and write a report where you discuss the commonalities and differences of these cases.
  • Go to www.google.com/scholar, and search for articles on stream analytics. Find at least three related articles. Read and summarize your findings.
  • Go to www.google.com/scholar, and search for articles on data stream mining. Find at least three related articles. Read and summarize your findings.
  • Go to www.google.com/scholar, and search for articles that talk about Big Data versus data warehousing. Find at least five articles. Read and summarize your findings.

Discussion Expectations

Please make sure to proofread your post prior to submission. They should be well written and free of grammatical or typographical errors.

Knowledge and skills paper:

 

Graded Assignment:  Knowledge and Skills Paper

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 7, 8, 9, and 10.  This section of the paper should be a minimum of two pages. 

Paper Section 2:  Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 7, 8, 9, and 10 to descriptively address and answer the problems below.  Important Note:  Dot not type the actual written problems within the paper itself.

  1. Survey and compare and possibly test some text mining tools and vendors. Start with clearforest.com and megaputer.com. Also consult with dmreview.com to further identify some text mining products to explore and even test?
  2. Survey and compare and possibly test some Web mining tools and vendors. Identify some Web mining products and service providers that could potentially be useful in a work environment you may want to be part of.
  3. Investigate via a Web search how models and their solutions are used by the U.S. Department of Homeland Security in the “war against terrorism.” Also investigate how other governments or government agencies are using models in their missions.
  4. Search online to find vendors of genetic algorithms and investigate the business applications of their products and even possibly test them where applicable. What kinds of applications are most prevalent and why?
  5. Important Note:  With limited time for a college class, perfection is not expected but effort to be exposed to various tools with attempts to learn about them is critical when considering a career in information technology associated disciplines.

Important Note:  There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.

Paper Section 3:  Conclusions

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward.  This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.

Paper Section 4:  APA Reference Page

The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.

Paper Review and Preparation to submit for Grading

Please make sure to proof read your post prior to submission. This professional paper should be well written and free of grammatical or typographical errors. Also remember not to plagiarize!!!!!!!!!!!!

Important Reminder:  Assessment of discussion boards and other writing assignments account for 75% of overall grading and below are how grades will be assessed for this assignment:

Journal Article (1 Paper Each)

 

  •  QUALITATIVE Journal
       You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research  piece.  I suggest choosing a topic that is at least in the same family  as your expected dissertation topic so that you can start viewing what  is out there.  There are no hard word counts or page requirements as  long as you cover the basic guidelines.  You must submit original work,  however,  and a paper that returns as a large percentage of copy/paste  to other sources will not be accepted.  (Safe Assign will be used to  track/monitor your submission for plagiarism. Submissions with a Safe  Assign match of more than 25% will not be accepted.) 

    Please use APA formatting and include the following information:
     

  • Introduction/Background:  Provide  context for the research article.  What led the author(s) to write the  piece? What key concepts were explored? Were there weaknesses in prior  research that led the author to the current hypothesis or research  question?
  • Methodology:  Describe  how the data was gathered and analyzed.  What research questions or  hypotheses were the researcher trying to explore? What statistical  analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate  the article in terms of significance, research methods, readability and  the implications of the results.  Does the piece lead into further  study? Are there different methods you would have chosen based on what  you read? What are the strengths and weaknesses of the article in terms  of statistical analysis and application? (This is where a large part of  the rubric is covered.) 
  • References 

    QUANTITATIVE Journal Article Review – SUBMIT HERE
       You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research  piece.  I suggest choosing a topic that is at least in the same family  as your expected dissertation topic so that you can start viewing what  is out there.  There are no hard word counts or page requirements as  long as you cover the basic guidelines.  You must submit original work,  however,  and a paper that returns as a large percentage of copy/paste  to other sources will not be accepted.  (Safe Assign will be used to  track/monitor your submission for plagiarism. Submissions with a Safe  Assign match of more than 25% will not be accepted.) 

    Please use APA formatting and include the following information:
     

  • Introduction/Background:  Provide  context for the research article.  What led the author(s) to write the  piece? What key concepts were explored? Were there weaknesses in prior  research that led the author to the current hypothesis or research  question?
  • Methodology:  Describe  how the data was gathered and analyzed.  What research questions or  hypotheses were the researcher trying to explore? What statistical  analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate  the article in terms of significance, research methods, readability and  the implications of the results.  Does the piece lead into further  study? Are there different methods you would have chosen based on what  you read? What are the strengths and weaknesses of the article in terms  of statistical analysis and application? (This is where a large part of  the rubric is covered.) 
  • References  

COMPUTER SECURITY_week10

Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Write the strengths and weaknesses of the Microsoft Windows firewall.

In 400 words

security architecture 9

 Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves? 

Digital Forensics Tools and Tech – New England

 

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

300 Words

You have three attempts.

CC W 5 A

Write a 3-5 page double space paper about how this course is relevant  to your current or future job.

Course – Cloud Computing

Job – Salesforce Developer / Software Developer / Software Programmer

3 – 5 pages are mandatory

Compare and Contrast essay (RENG 92)

Develop a three page essay that compare and contrast the lives of the two individuals you selected for the assignment.( File is attached for 2 individual I have selected). You have the freedom to focus on the different areas of the individuals lives of your choice. However, below is a list of suggestions:

  • Compare and Contrast-Childhood
  • Compare and Contrast-Education Background
  • Compare and Contrast-Career

Please type the essay, per MLA Format (Times New Roman Font, Double Spacing, Size 12 Font, Page Numbers, Direct Quotes and In-Text Citations-in each body paragraph, and Works Cited Page) and end with the works cited page. Also, start the thesis statement, each body paragraph, as well as the conclusion paragraph with a transitional word or phrase. Friendly reminder–do not include the following:

  • Contractions
  • First Person, “I”
  • Second Person, “You”
  • Third Person, “We”

2 Assignments (Malware Attacks and Online Interactions)

 Assignment #1

Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, or diagrams, all of which make it easy to follow troubleshooting instructions. 

Throughout the next 4 weeks, you will develop a playbook for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company.  

Outline a 2- to 3-page playbook in which a malware attack of your choice occurs.  

Complete the following in your outline: 

  • Provide details of the malware. 
  • Identify the exploited vulnerability and its attack vector. 
  • Analyze the vulnerability to determine 2 risks of this malware. 
  • Outline step-by-step instructions on how to resolve the malware attack. 

Remember, numbered or bulleted steps or guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps and guidelines. 

Note: You will use content from this #1 assignment as part of the #2 Signature Assignment

Assignment #2

Online interactions pose a threat to all servers. Some risks can occur when employees use social networking, web browsing, and email. Playbooks typically cover a section related to threats and defenses of online interactions.  

In this next section of your playbook, outline steps to take when an employee reports clicking on a website that appeared in an email that was received.  

Include the following information in this section: 

  • Describe 2 threats this interaction poses on the company.
  • Provide step-by-step instructions on how to mitigate each interaction. 

Remember, numbered or bulleted steps or guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps or guidelines. 

Combine This assignment #2 with your revised assignment #1 – 

Apply: Malware Attacks sections of your Playbook

Cite at least 2 resources to support each assignment.

Format each assignment according to APA guidelines.