Organization leader and decision making

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

short answer

 

  • JavaScript has numerous ways of maintaining session state information, including query strings, hidden form fields, and cookies. Discuss the method you believe to be the most secure. Include in your response an example of how these methods can be exploited.
  • Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.

Discussion Post BPaas-4

 

Discuss, in your own words using 500 words or more, how business process as a service (BPaaS) reduces risk for commercial enterprises. 

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post.

APA References and Citations

Cyber Crime Final Project

Final Project

*****

This is an individual project or max, two team project in which you will conduct research on computer/digital forensics to learn more about associated underpinnings.

*****

The research you select should cover a forensics topic discussed or presented in the course. The topic you select is entirely up to you. I have included 6 examples below.  You can select one of these (first come/first serve) or submit your own.

Post in the Discussion Forum your Forensics Project. No Duplicate Forensics Project allowed.

*****

Post your Forensics Project Name in the Discussion Forum with the names of your team-mates by Tuesday, October 6th.

*****

The deliverable is (1) a report (PowerPoint) submitted to me in Blackboard (Final Project dropbox on Week 12 & Discussion Board thread) by Nov 10, and (2) a ten minute presentation in class on deliverable including any demo in Nov 10. The report should include:

– Project Description

– Project Goal/Objectives

– Details of Work Performed

– Outcomes

– Conclusion

Grading Rubric – 25 Points towards Final Grade:

– 15    points for Complexity of Project (High = 3, Medium = 2, Low = 1)

– 5    points for Report

– 5    points for Presentation

TOPIC:

(10) Image File Tampering

Create an image file tampering using either a FaceSwap app, Photo Editing application to change the image file. Compare the hash, EXIF (Exchangeable Image File) metadata of all the files you have tampered from the original.

The project requires a brief paper and a power point document. 

Paper needs to be no more than 2 pages.

Need both assignments by 4pm Eastern. 11/17
Paying $30 for both. 

building an AI machine/Deep learning applicationPart 1 – Following is the link of the Project and Dataset :https://www.analyticsvidhya.com/blog/2018/05/24-ultimate-data-science-projects-to-boost-your-knowledge-and-skills/

 Part 1 –

Following is the link of the Project and Dataset :

https://www.analyticsvidhya.com/blog/2018/05/24-ultimate-data-science-projects-to-boost-your-knowledge-and-skills/

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide output for the following:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data…

[9:28 PM, 12/10/2020] Mohammed Monroe: Part 1 –

Following is the link of the Project 

1. Iris Data Set

https://www.analyticsvidhya.com/blog/2018/05/24-ultimate-data-science-projects-to-boost-your-knowledge-and-skills/

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide output for the following:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data, 50%-50% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Part 2 – Updated Code…

Now that you have a working base of code, let’s apply it to a “real world” scenario…

Find an article or video that shows a potentially SIMILAR usage of the application you created in Part 1…

Update the original application so that it “works” for the NEW application…

In this “Movie Recommendation” project, you might find an article on “book recommendations” …you would then update the original program to handle the new scenario…

YOU MUST UPDATE THE ORIGINAL CODE…do not provide entirely new code base.

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide the same output for THIS application, as you did for the ORIGINAL application…specifically:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data, 50%-50% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

                                                    (OR)

building an AI machine/Deep learning applicationPart 1 –

Following is the link of the Project and Dataset :

https://www.analyticsvidhya.com/blog/2016/06/quick-guide-build-recommendation-engine-python/

https://grouplens.org/datasets/movielens/100k/

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide output for the following:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data, 50%-50% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Part 2 – Updated Code…

Now that you have a working base of code, let’s apply it to a “real world” scenario…

Find an article or video that shows a potentially SIMILAR usage of the application you created in Part 1…

Update the original application so that it “works” for the NEW application…

In this “Movie Recommendation” project, you might find an article on “book recommendations” …you would then update the original program to handle the new scenario…

YOU MUST UPDATE THE ORIGINAL CODE…do not provide entirely new code base.

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide the same output for THIS application, as you did for the ORIGINAL application…specifically:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data, 50%-50% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

essay

 In an essay (no more than 500 words) please discuss the following topic:

 

Describe your academic and career plans and any special interests that you are eager to pursue as an undergraduate in Informatics and Computing. If you encountered any unusual circumstances, challenges, or obstacles in completing your education, share those experiences and how you overcame them. 

 

Bank Enterprise Information Security Policy

  The organization that we will use is a small community bank. This type of organization was selected because everyone in the course should have some familiarity with banks, a community bank has a smaller scope, the banking industry has regulatory requirements to follow, and public trust in banking is very important. (Maryland SECU is an example of this type of bank.)Here are some technical parameters of the Bank of Bowie.· Headquarters is located in Bowie, MD· Headquarters building has corporate offices and a branch on the lower level· Two branch offices are located in Bowie and Laurel
· Each of the three branches employees the following staffo Branch Managero Branch Security Officero Six Tellerso Two Loan Officers
· Corporate Headquarters employs the following staffo Officers and Directors§ Chairman/CEO/President/Director§ Vice-President/Secretary/Director§ Financial Officer/Treasurer§ Assistant Treasurer § Six Directors – Corporate Strategy, Branch Oversight, Personnel Oversight, Regulatory Implementation, Customer Focus, Policy/Standards/Processes§ Chief Compliance Officer
o Employees§ Head Loan Officer § Senior Loan Administrator§ Two Loan Processors§ Escrow Processor§ Eight Customer Service Representatives§ Internal Auditor§ Compliance Officer§ Two Human Resources Personnel§ Five Information Technology Personnel
· Bank Offeringso Savings and Checking Accountso Loanso Deposit Products such as IRAso Online Banking
Information Technology Landscape· Primary corporate databases are maintained at the Headquarters and a backup location· Data is replicated routinely from the branches to the Headquarters· Headquarters and branch personnel use desktops for their day-to-day activities· Software consists of a number of standard applications, e.g., Office, and customized banking applications· The Bank of Bowie website provides static information about the bank· Electronic banking activities are outsourced to other providers· Data is archived by a third-party provider· Data protection mechanisms include encryption, digital signatures, access control firewalls, and other measures
Vision/MissionBank of Bowie is built on weeks of dedication to the community, Bank of Bowie will “continue in our rich tradition of providing impeccable customer service within a community environment.”[1]
RegulationWe will simplify the government regulations for this activity. You must account for federal requirements for the following.· All financial transactions must have integrity.· All financial transactions must be audited and audit data must be retained for a period of six years.· Social Security Numbers must be kept confidential.· Customers must have access to their accounts at least every 48 hours.· Interest rates and other loan terms and conditions must be clearly disclosed to customers.

Submission One – Policies

Bank of Bowie requires a set of policies to guide their efforts. Write an Enterprise Information Security Policy for the Bank of Bowie. See Page 148, Table 4-1 for an example. Make certain the policy includes what the information security needs are and not how to achieve them. Include the five federal requirements and three additional requirements based on market competitors (local banks – such as MECU, SECU, PointBreeze Credit Union, 1st Mariner Bank, Rosedale Federal Savings and Loan). Please detail the mission, vision, and values to support the justification for the “information security needs”. Create an Issue-specific security policy (ISSP) on a relevant topic of your choosing. It can be for internal system users or for customers or services provided to customers. Create a system specific policy that addresses audit logs and backup of the audit logs. Make certain that it is compliant with the laws indicated in the background. Each policy document should be well organized per the outlines presented in the text or another reference. Each policy should be between 2 and 4 pages and it will be graded based on its completeness in addressing the topic, not on its length. Finally, it should follow all of the guidelines for each policy type in the text.