PLEC Week 10

 Answer each these questions in a paragraph with at least 3-4 sentences: Include the question and number your responses accordingly. Provide a citation for each answer.   

 

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘ Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Discussion and Assignment 6

Discussion:

Focus on globalization concepts. Please explain the concept of globalization and the role information technology has in the global market.

Need 125 words on this topic with references and in a separate document.

Assignment 1 (Information Systems for Business and Beyond):

Q1::

Compare the concept of Friedman’s “Globalization 3.0″ with Nielsen empowerment stage of the digital divide. 

Q2::

Provide one example of how information technology has created an ethical dilemma that would not have existed before the advent of information technology.

The above assignments should be one page submitted in a single Word document with references. 

Assignment 2:

Chapter 9: Review the section on Establishing a Security Culture. Review the methods to reduce the chances of a cyber threat noted in the textbook. Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization. (Information Technology and Organizational Learning)

Chapter 10: Review the section on the IT leader in the digital transformation era. Note how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate. What are some methods or resources leaders can utilize to enhance their change attitude? (Information Technology and Organizational Learning)

The above submission should be two pages in length (one page for each question) and adhere to APA formatting standards with references included. 

Assignment 3:

Select an organization that has a Global platform (they operate in more than one country: Organization selected is Amazon and write on this company), that has demonstrated operational excellence. In this paper, perform the following activities:

1) Name the organization and briefly describe what good or service they sell and where they operate.

2) Note how they are a differentiator in the market.

3) Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).

4) Explain what actions the company took to achieve operational excellence.

The above submission should be three pages in length. There should be at least three APA approved references to support work.

Termpaper on Rockwell Automation – Factory Talk (SCADA)

 

Term Paper Requirements

REQUIREMENTS AND GRADING

Each student will be required to write their own research paper – no teaming, partnering, or study group papers are permitted. This is an individual assignment and copying or plagiarizing will not be tolerated and will be subject to University disciplinary action up to and including a failing grade for this course. 

The paper shall be at least five (5) and no more than ten (10) pages in length excluding figures, tables, and references. The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1″ margins on the sides and double-spacing between lines with 0.5″ indentation on first line of paragraphs. 

The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.

All tables and figures shall be captioned and specifically referenced in the body of the document. All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:

  • No more than two (2) citations shall be from Wikipedia
  • At least two (2) references shall be from United States government sites (e.g. CISA, NIST)
  • At least two (2) references from vendor web (html) or printed (pdf) material
  • At least two (2) references shall be from independent sources including but not limited to
    • News Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)
    • Industry Publications (e.g. Automation, ISSSource, Control)
    • Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)
    • Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.

A template has been provided meeting these requirements.

A list of 11 different vendors and systems have been offered. Selection begins on October 6, 2020 (Week 7) and is expected to be completed by November 17, 2020 (Week 13). You are free to change your selection until the cut-off date. No more than three (3) students can choose the same vendor and system topic, so all selections may not be available at any given time. Failure to complete the selection process early could reduce the number of choices available and not provide sufficient time to complete the term paper and associated presentation.

You will also be required to prepare a short PowerPoint presentation summarizing your paper suitable for presentation. This presentation is expected to have no more than one (1) slide summarizing each of the subject areas aligning with the paper and should be limited to 15 minutes. A PowerPoint template has been prepared and is available for download.

Your paper must be submitted by 7:00pm (end of class) on Tuesday, November 24, 2020 (Week 14), and your presentation must be submitted by 8:00am on Tuesday, December 1, 2020 (Week 15). Eight (8) students will be randomly selected to present their presentation via Zoom Meeting during class time on Tuesday, December 1, 2020. Drawing will occur on December 1, and students will be notified by 10:00am.

The term research paper and associated presentation comprise 20% of your overall course grade and will be assigned a numerical percentage grade based on the following scale:

     A = 90% – 100%
     B = 80% – 89%
     C = 70% – 79%
     D = 60% – 69%
     F = 59% or less

Grading for term research paper and associated presentation will be based on the following metrics:

     20% = Ideas and Analysis
     20% = Organization
     20% = Development and Support
     10% = Style
     20% = Mechanics
     10% = Presentation

Spelling and grammatical correctness will be used as marking against Mechanics. Use of current review editors such as those included with Microsoft Word are strongly encouraged.

 

CONTENTS AND STRUCTURE

The term research paper and associated presentation should be logically divided into sections that follow sound research paper style and address each of the following areas. You are free to organization the paper and presentation as appropriate, however a template has been provided for both the paper and presentation to help start the initial paper structure. The section titles (paper) and slide titles (presentation) in the templates are for reference only.

Your paper and presentation shall address and develop each of the following items:

  1. System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assets
  2. Communication protocols used by the system
  3. Industry sectors that use the system
  4. Vulnerabilities publicly disclosed for the system and the publication of any exploitation packages
  5. Potential or actual impact of the vulnerabilities discovered to the industry sectors served
  6. Cyber security measures taken by the vendor to secure the system
  7. Additional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)

Portfolio project

  • The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  
    The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.
    Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  
    There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.
    Conclude your paper with a detailed conclusion section which discusses both limitations and emerging concepts. 
    The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
    Your paper should meet the following requirements:

    • Be approximately seven to ten pages in length, not including the required cover page and reference page.
    • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

paper

Follow the doc for questions and concepts on which the questions must be answered 

Data Mining in Work Environment

Elaborate on how the knowledge and skills of Data Mining could be helpful in Real Life Work Environment. 

Requirement:

Paper should have at least 5 pages excluding Reference page (or 2 pages double spaced excluding references) in APA Format with Proper Citations.

Must: It should include the Plagiarism report.

Building an AI machine/Deep learning application

 

  1. Part 1 –
    1. Following is the link of the Project and Dataset :

Quick Guide to Build a Recommendation Engine in Python & R

MovieLens 100K Dataset

  1. Run the code several times and show the intended output…you also need to EXPLAIN the output…
  2. You will also need to provide output for the following:
    1. Python file containing your code…
    2. Dimensions of the data…
    3. Sample of the data…
    4. Statistical summary of the data…
    5. Class distribution…
    6. One univariate and one multivariate diagram…
    7. Decision Tree…explain the best depth and why?…
    8. Results of training and new data, 80%-20% split…
      1. Accuracy report…what is it telling us?…
      2. Confusion matrix…what is it telling us?…
      3. Classification report…what is it telling us?…
    9. Results of training and new data, 50%-50% split…
      1. Accuracy report…what is it telling us?…
      2. Confusion matrix…what is it telling us?…
      3. Classification report…what is it telling us?…
  3. Part 2 – Updated Code…
    1. Now that you have a working base of code, let’s apply it to a “real world” scenario…
    2. Find an article or video that shows a potentially SIMILAR usage of the application you created in Part 1…
    3. Update the original application so that it “works” for the NEW application…
    4. In this “Movie Recommendation” project, you might find an article on “book recommendations” …you would then update the original program to handle the new scenario…
    5. YOU MUST UPDATE THE ORIGINAL CODE…do not provide entirely new code base.
    6. Run the code several times and show the intended output…you also need to EXPLAIN the output…
    7. You will also need to provide the same output for THIS application, as you did for the ORIGINAL application…specifically:
      1. Python file containing your code…
      2. Dimensions of the data…
      3. Sample of the data…
      4. Statistical summary of the data…
      5. Class distribution…
      6. One univariate and one multivariate diagram…
      7. Decision Tree…explain the best depth and why?…
      8. Results of training and new data, 80%-20% split…
        1. Accuracy report…what is it telling us?…
        2. Confusion matrix…what is it telling us?…
        3. Classification report…what is it telling us?…
      9. Results of training and new data, 50%-50% split…
        1. Accuracy report…what is it telling us?…
        2. Confusion matrix…what is it telling us?…
        3. Classification report…what is it telling us?…

1: Business strategy Analysis

 

Imagine you are preparing for an interview with a company as an IT manager. Part of the interview process is providing a work sample. You must provide an analysis of Amazon’s business strategy and explain what part IT governance functions in Amazon reaching their strategic goal to demonstrate your understanding of IT governance and IT strategic vision.  

Research at least 2 articles on Amazon’s business strategy.

Develop a 1- to 2-page checklist detailing the main points Amazon’s IT department should consider to be properly aligned to Amazon’s strategic business plan. Include relevant laws, regulations, and industry standards that would impact the business plan, such as PCI standards and SOX regulations. 

Write a 1- to 2-page summary of how Amazon’s IT Governance works with the Strategic Business Plan to achieve continued success and growth.

Format your citations according to APA guidelines.

Submit your assignment.