Data Analytics

Question 1 

This week you learned about the four types of Data Analytics

  • Descriptive – answers the question “what happened?”
  • Diagnostic – answers the question “why did this happen?”
  • Predictive – answers the question “what might happen?”
  • Prescriptive – answers the question “what is the best that could happen?”

Research any area that interests you and identify real examples for TWO of the four data analytics in practice. 

Each example must reflect an actual use of the analytic in practice, and should answer the question associated to the analytic type (e.g. your “Descriptive” example should answer the question “what happened?”)

Please include the following for full credit:

  • A detailed description of each analytic example in your own words.
  • Analyze each example. Identify the important data elements that are used in the analytic(s). If available, call out how the data was analyzed to gain the insight. 
  • Write min. one page for each analytical type you choose (total 2 pages, single spaced, Times New Roman 12 pt)
    • Citation information, i.e. where did you find this example. Use The American Psychological Association Citation Format. 
    • You may consult any source, e.g. current news, research papers, press releases, etc.

Question 3 

You learned why analytics and insights are useful for a business. You also learned about the four types of analytics that a business can apply to the data of a problem. Use this knowledge to answer the below analytical prompt. Make sure you have read module material (The Four Types of Analytics) before completing this question.

Case

Congratulations! You were just hired at Sephora to analyze sales data. Just in time for Valentine’s Day! You have access to what products were purchased, when they were purchased, and who purchased them. Your first task is to look over the data from the last four months (November – February). As you look through the data, you notice a giant increase in sales and then a giant drop in sales within those months. Your boss wants you to identify patterns and trends to figure out what happened.

After you read the case study above, describe and elaborate on how Sephora could use either descriptive, diagnostic, predictive, or prescriptive analytics to understand the increase and decrease in sales over the four-month period.

Need Response 2 to below discussion-IT cloud

Please read the below discussion and provide the response in 75 to 100 words for each discussion post

Post1#

 

The education industry has been selected for this discussion. The clouding technology trend is increasing in the modern world. Companies prefer the use of cloud computing technology for saving their data and services and all the work performed on a day to day basis. But, when we look forward to the use of this technology in the education industry, in higher educational institutions there are some risks and confusion associated with it. The decision making of technology is on the basis of three main factors. If technology is able to meet those requirements then it is good to use otherwise it requires some changes. The three main factors are data security, customization, and lastly financial ties. These are well explained below:

            Data security and control: the decision-makers hesitate with the use of cloud computing technology as the data security and control is provided to them via on-premises computer systems structure and server rooms. From these rooms, the decision-makers can save, edit, or delete the data very easily without the requirement of the extra efforts. When a service is provided by a third party then it is always considered as it can be breached and the staff can lose control over it. The person using technology has to share the access key as the same space would have used but the whole college staff and students are also allowed to save on it to make the data secure. Companies like Microsoft spend $1billion on data security. “Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent” (Chaudhary, 2018).

Customization: the customization of cloud computing technology is very difficult. The staff members are less prone to changes and thus feel happy to use old methods. The companies producing clouding technology have considered one and developed SaaS but everywhere demand is different depending upon the structure of the institution. The old traditional way of decision making is much cheaper and time-saving in comparison to cloud computing technology. “A systematic review of these heterogeneous contributions, which provide a coherent taxonomy, can be considered interesting for HEIs to identify opportunities to use CC in its own context” (Qasem, 2019).

Financials: the cloud computing is a cost-consuming technology that disturbs the financial structure of the company when they think fit. The main decision that institutes have to take is about deciding the use of information that is already saved in the servers. The institutes decide the usage of cloud technology when they suffer from the lack of storage of large amounts of data. The movement of such data is very difficult. There can be compatibility issues also which institutes might suffer from the service provider companies. “With these inclusions, the model is appropriate and relevant in explaining users’ adoption and usage behavior of social media” (Dumpit, 2017).

Post2#

 

The public cloud provides many advantages over on-site virtualization, including cost savings, fast deployments, increased efficiency, scalability and flexibility, or the ability to shift budgets from capital spending to operational spending. Every organization has its own reason to dump VMware to the cloud, but few can disagree. 
In terms of cloud, higher education is also a long way behind other sectors. But slowly but surely the tide turns, and further institutions move from the cloud to the cloud. Globally, organizations are also under financial pressure but little money is available to build new and established programs. Therefore, cloud computing is mostly an understanding framework for enabling new services without needing significant hardware , software and infrastructure investments.

It’s more the cloud hype and confusion that generated a certain amount of fear, ambiguity, and doubt and thus slowed progress. Some vendors also use interchangeably the words “hosted solution” and “SaaS,” contributing to misunderstanding between institutions. Moreover, not all suppliers have done great work to show to organizations that they are more capable of handling the service than they can. The concept of cloud and the advantages it can offer for organisations to move forward must be clarified clearly by providers.
While only a few factors prevent the adoption of on-demand model delivery for business applications , it is necessary for vendors to consider and build strategies for overcoming these factors:

Institutions are concerned about security and lack of control:
“Institutions have long been familiar with the on-premise delivery model for most applications, because it is the legacy of software and because of their need to have control over their data and information” (Johal, 2015).
The reasons for institutional respect for hosts or SaaS delivery models are most frequently stated. The greatest obstacle in implementing on-demand applications has therefore emerged to resolve corporate security issues. Vendors deliver solutions through protected data centres, often using numerous firewalls and backup procedures to guarantee that data and information are never lost. Many suppliers possess the ability to hire data protection specialists, although most institutions do not.

Institutions with unique needs may have concerns about flexibility:
The ability to adjust company applications on demand to suit individual institutional needs is still obvious. Institutions have specific processes and specifications that technology vendors must meet. As many of these criteria have already been addressed by some vendors, the performance today is primarily determined by the ability of a vendor to provide better quality and reliability at lower cost. That’s where SaaS joins. A request service can help an institution provide students and faculty with better experience and save time , money and energy.
“Some institutions may argue that it reduces the freedom and flexibility to customize the application to meet their specific needs. However, it would be wise for institutions to avoid customization because it is costly to maintain, and institutions hardly ever see a return on investment (ROI)” (Johal, 2015).

Large investments have already been made in on-premise delivery models:
On-demand offerings continue to be relatively new on the technology market , particularly among higher education vendors. Some vendors like Salesforce.com have a strong reputation and all types of software solutions have a SaaS option. But several institutions are also reluctant to adapt to on-demand models. In the past, early technology adopters have made substantial investments in its on-site data centers and IT infrastructure due to the lack of distribution options available.

wk3_531_A

1. How do you describe the importance of data in analytics? Can we think of analytics without data? Explain.

2. Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?

3. Where do the data for business analytics come from? What are the sources and the nature of those incoming data?

4. What are the most common metrics that make for analytics-ready data?

The Software Factory

It is necessary to explore all of the stakeholders involved within a software’s development to understand the pedigree of the software from a security standpoint. This will then allow a security professional to make informed decisions toward risk management.

Explore where and how the Adobe reader software is developed. In 500-750 words, report your findings. Make sure to address the following:

  1. Where does Adobe indicate their product is located/headquartered?
  2. Where is the software really developed and by whom?
  3. How many are involved in the development of Adobe and what threat might that pose to end users?
  4. What best practices should be considered during the development of the software to reduce security issues in reference to Software Development Life Cycle (SDLC)?

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

User Training

Topic: What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  Make sure to cite your sources.[500 words]

Assignment should follow all APA rules and include a min. of (1) citation/reference

Net Neutrality Discussion Board

The term net neutrality refers to the equality of data as it is transferred over the Internet. For instance, the data from an individual and the data from Microsoft are treated the same. A recent controversy surrounding the cable giant Comcast brought up the possibility of ISPs interfering with the delivery of Internet data. According to complaints by customers, Comcast has been blocking the use of P2P sites like BitTorrent to download movies, music, and other large files. Comcast, like most ISPs, includes a statement in its terms of service that allows it to use tools to “efficiently manage its networks,” in order to prevent those customers using a higher than normal level of bandwidth from interfering with the access of other customers. However, the Comcast issue was considered by many to be a blatant net neutrality issue—blocking access to multimedia from sources other than its own cable sources.

Do you think the actions taken by Comcast were ethical?

Does an ISP have a right to block selected Internet traffic? Why or why not?

Was there a more ethical way Comcast could have handled the problem of some users consuming a higher than normal level of bandwidth?

cloud computing

What is one significant data breach through the cloud that has occurred in the field you are interested in?  How was this breach launched, what was lost and how could that breach have been prevented? Minimum 700 words

Emerging Threats

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.