Practical Connection- Applications Security

it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection. 

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

· Share a personal connection that identifies specific knowledge and theories from this course. 

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

week-2

 

Visit the OWASP website.  and Describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Hearsay Rule in Legal Proceedings

 

Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.

Write a short paper, 200-300 words, using WORD and submit here.

Marketing Strategies

This is the first of three papers that will lead you to, and be part of, your final paper.Using the approved company and product/service, you will answer the following questions:    

  • Who are the competitors in this space? 
  • What are the overarching benefits they have to offer the consumer? What do they offer that is different or attractive to the consumer?
  • What gap will you fill by offering your redefined or new product or service?

Paper length should be 3 to 4 pages in length using APA formatting and should include a cover page and reference page which are not included in the page count. Writing Assignments are due on day seven at 11:59 pm EST. See this reference for more details on APA style.

6/3 Second Paper

Resources: 

The following websites provide some guidance on compliance and governance planning:

Example plans:

Remember, these are examples. You are not producing a lengthy plan. Use these resources as guidance in developing your project plan. 

Instructions. 

  1. You will complete this paper in the form of a compliance and governance plan for an organization. You may use your own organization (although you must change the name for confidentiality purposes) or use a fictitious company. You may use the internet to look for examples of privacy policies and compliance and governance plans; however, the plan you develop must be in your own words. The plan must cover the issues and concerns that need to be addressed by the plan, including the following:
    1. Privacy issues of customers
    2. Protection of intellectual property your organization possesses (assume the company has some copyrighted or patented material [e.g., software] or some product)
    3. Cyberlaws that will apply to your organization
  2. The paper should be outlined as follows:
    1. Executive summary/introduction: Include the issues and concerns to be addressed by the plan. Provide four to five paragraphs introducing the plan, including the rationales for developing a compliance plan and the goals of doing so.
    2. Sections: Include sections that address each of the concerns noted above. See the bulleted points on topics the plan should cover. Provide a paragraph at the beginning of each section. Include any additional sections you believe necessary to develop a comprehensive plan.
    3. Conclusion: Provide a four- or five-paragraph conclusion to the plan. A bulleted list of recommendations would help to summarize the plan. Include suggestions for implementing the plan.
  3. The paper should be about 15  pages in length (double-spaced), and transitions between sections should be addressed.
  4. Any graphics or tables do not count toward the page count.

Gifting Problem

 

Gifting Problem
 Problem statement:

Suppose you are in charge of a non-profit organization that receives donated gifts and distributes them to
needy children. You are given a list of children with their ages (0 to 16 years old).
 For each gift, you are given the following information:
Retail price
Size of gift (cubic feet)
Range of suitable ages

Let: P = sum of retail prices of the gifts
N = total number of children
ei = | P/N – sum of retail prices for gifts given to child i |
You must minimize Σ ei  for the N children, subject to the following constraints:
1. Each gift must be given to exactly one child.
2. No child may be given a gift that is not intended for their age.
3. Each child must receive at least one large and one medium gift, where 1 ft3 <= medium gift <= 2 ft3, and
2 ft3 < large gift.
4. The number of gifts received by each child can be no less than the average – 1 and no more than the
average + 1.

Important:
The sum of the e_i values MUST be the absolute lowest value that is possible for the given input file.

Command line: ./gifting inputFileName outputFileName

Rubric:
Compiles, good programming style, processes command line arguments 15 pts.
Produces  correctly  formatted  output  file  with  all  children  and  gifts  included  10  pts.
Produces optimal solution 70 pts.
Compute time/space efficiency, creativity 5 pts. + extra credit possible
Notes:
1. Extra credit could possibly be large
2. Programming style based on Department Standards (see Programming Standards file on Canvas)
3. A signed Academic Integrity statement must be submitted to receive credit
Programs that do not compile and produce an executable on Clark will not be graded
Programs MUST be written in C/C++

Input format:

Plain text tab-delimited file. See example on next page. Child1 age 8
Child2 age 6
Child3 age 4

Gifts Price Size Ages
G1 12 1.3 7-14
G2 15 2.5 any
G3 8 1.5 0-5
G4 22 2.8 6-16
G5 10 1.5 any
G6 11 2.1 any

Output format:

The output should be a plain text tab-delimited file. It must begin with ‘Sum_e_i x’, where x is the sum of the ei
values. This should be followed by N rows, one for each child (in order), with their assigned gifts and ei value
as follows:

Sum_e_i 12.0   
Child1 G1 G6 3
Child2 G5 G4 6
Child3 G3 G2 3

 

Current Event Journal Assignment U5-6

 Why do we study history? You’ve probably heard many references to the idea that we need to study history because history repeats itself. While this does hold validity in certain cases, it is also important to understand that history connects today to yesterday. Political decisions today are based on past decisions or events, we continue to work on social justice, and we see new interpretations of past legislation and primary source documents. History surrounds us. Over the course of the class, you will be retrieving and evaluating current event articles (in the last 5 years); making connections between the units we are currently studying and today. You will be responsible for finding an online article from a reputable news source. For example: Time.com, USA Today, The New York Times, etc.