JA1 Business ethics

  1. How would you personally define ethics?
  2. How do business ethics differ from your personal ethics?
  3. What is the biggest influence on your personal ethics? Why?
  4. Do you try to always be ethical? Why or why not?
  5. Do you think you have a high personal standard?
  6. Do you know an adult that has lied, cheated, or stolen anything? How might an adult justify this type of behavior?

Requirements:

  • Answer each question not less than 100 words.
  • Include the list of references used.
  • Avoid Plagiarism.

Research paper

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Understanding RSA

In this project assignment, you will create a program with any high-level programming

languages as you prefer (e.g. Java/C++/Python/Go …) to implement a simplified

version of RSA cryptosystems. To complete this project, you may follow the steps

listed below (demonstrated in Java code) to guide yourself through the difficulties .

Step I Key-gen: distinguish a prime number (20 pts)

The generation of RSA’s public/private keys depends on finding two large prime

numbers, thus our program should be able to tell if a given number is a prime number

or not. For simplicity, we define both prime numbers p and q within range 0 < p, q <

10,000,000 so that a 64 bits primitive type (e.g. long in Java) should be sufficient

to handle most arithmetics calculations involved.

Therefore, your first step is to implement a method that takes such a number in range

as input and output a boolean type value to indicate whether it’s a prime number:

Pick one of the following for your Big Data Research paper?

 Articles to read:

 

Marcu, D., & Danubianu, M. (2019). Learning Analytics or Educational Data Mining? This is the Question. BRAIN: Broad Research in Artificial Intelligence & Neuroscience, 10, 1–14. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=139367236&site=eds-live

Hariri,  R.H., Fredericks, E.M. & Bowers, K.M. (2019). Uncertainty in big  data analytics: survey, opportunities, and challenges. Journal of Big Data, 6: 44. https://doi.org/10.1186/s40537-019-0206-3

Question:

While  this weeks topic highlighted the uncertainty of Big Data, the author  identified the following as areas for future research.  Pick one of the  following for your Research paper:

  • Additional  study must be performed on the interactions between each big data  characteristic, as they do not exist separately but naturally interact  in the real world.
  • The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
  • New  techniques and algorithms must be developed in ML and NLP to handle the  real-time needs for decisions made based on enormous amounts of data.
  • More  work is necessary on how to efficiently model uncertainty in ML and  NLP, as well as how to represent uncertainty resulting from big data  analytics.
  • Since  the CI algorithms are able to find an approximate solution within a  reasonable time, they have been used to tackle ML problems and  uncertainty challenges in data analytics and process in recent years.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. The UC Library is a  great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Application Assignment: Blogs and Defamation

As an avid user of online social media, you identify a very untrue blog written by an anonymous writer. The blog contains many horrible accusations that are unfounded and untrue. After identifying this blog, you feel violated and confused. What steps can you take to have the blog removed? What defamation charges can be filed against the creator of the blog? 

Three Required Headers:

Blog Scenario

Procedure

Defamation Charges 

Introduction to Systems Thinking

 For this assignment, complete the following: Choose a system in your own life. In one paragraph, describe the purpose of this system and describe how it meets the definition of a system. For your chosen system: identify its parts, define their relationships to each other, and describe any feedback loops present in the system. Using Microsoft Visio, construct a model of this system. 

QUANTITATIVE Journal Article Review

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References  QUANTITATIVE Journal Article Review – SUBMIT HERE

Ethical Hacking

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.