Physical Security – individual project

When we think of ethics, we usually think of guidelines for differentiating between what is right and what is wrong. For example, consider the Golden Rule (“Do unto others as you would have them do unto you”) or the Hippocratic Oath (“First, do no harm”). We are exposed to ethical norms for behavior in many settings (home, school, church, etc.) and from an early age.

In this assignment, answer the following question 7-10 full pages, not including citations and title pages:

If ethical norms for behavior are so commonplace, and guidelines for ethical decision making are common sense, why must we consider the ethical implications of research in this course or any information technology class?

APA 6th Edition formate with in text citation

Research Paper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Python Discussion

1. Describe outliers and pick a technique that can be used to handle outliers

2. Describe missing values and pick a technique that we have not discussed in this class to handle them

3. Discuss why and when do we need to use data normalization and standardization

enterprise risk management/ discussion

 

After reading this week’s article, and any other relevant research you locate, please discuss the following in your main post:.

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Choose Only “ONE” question from these three, and write 4 pages Research Paper: 1.”The Mythology of Computers: The Early Day” OR 2. “Do You Know Where You Computer's Been? Protecting your Computer” OR 3. “Internet Freedom Versus Security: Who Wins?”

  Choose Only “ONE” question from these three, and write 4 pages Research Paper plus annotation: 

 1.”The Mythology of Computers: The Early Day”  

2. “Do You Know Where You Computer’s Been? Protecting your Computer” 

 3. “Internet Freedom Versus Security: Who Wins?”

Make sure to do all of the following:

  1. The annotated bibliography will contain six (6)sources using the MLA style for the reference citations. 
  2. Your sources must include at least one book, one article, and one web source. 
  3. Each source listed will also include a 3-5-sentence annotation that will describe the relevance between the information in the source and your topic. 
  4. Your annotations identify how the source relates to your topic. Spelling, grammar, and writing style will be evaluated. The annotated bibliography should be typed in MLA style, double-spaced with one-inch margins (top, bottom, left, and right). Include your name and page number in the header (top-aligned right); include your name, Prof. Name, Class Name, the date on the left side.  

BSWA FP

Final Project Topic Name:  Security and the Cloud

In 100 words (1)

1.  Include a short paragraph describing your project (  Security and the Cloud ) and how you intend to research it. 

In 200 words (2)

2. Brief abstract describing final project (  Security and the Cloud ).

3. 500-600 words, double spaced, written in APA format, showing sources and a bibliography

Please include the following:  

 What is ( Security and the Cloud ).

Advantages/Disadvantages

Challenges one might face

Conclusion:

References:

Homework Help

 

Final Exam DPEE

Note: 

· For demonstrating conceptual understanding, you are required to work on the model that is easier to handle or compute, not necessarily the more suitable (or more complicated) model for the dataset. Follow the question description. 

· You don’t need to check the assumption of a model unless the question asks for it. For example, if the question asks you to make prediction based on a model, you don’t need to check the assumption for the model before making prediction. 

· For any of the testing (hypothesis test) problem, define Ho/Ha, compute the test statistic, report the exact p value, and state the conclusion. The default alpha value is 5%, unless specify. 

· Elaborate your reasoning clearly and show relevant plots, R results, and tables to support your opinion in each step and conclusion. 

· Submit the Rmd file and the corresponding pdf file knitted from it, along with your answer, this format is similar to your homework. 

· The data is real, just like the project you are working on. Hence it is possible that even after the remedial method has been done, the model is still not perfect. When this happens, evaluation will be based on the level you execute the methods covered in Stat512 to improve the model. Don’t worry if your model is not perfect, try your best to demonstrate the skill set you learn in this class. 

Study the data with a linear analysis and complete the problems. The data set, dataDPEE.csv has 3 continues predictors and two categorical predictors. 

Problem 1. Consider only the first order model with X1, X2 and X3, perform the following hypothesis. 

a. (10) whether X1 can be dropped from the full model. 

> dpeemod <- lm(y ~ x1 + x2 + x3)

> plot(dpee)

> summary(dpeemod)

Call:

lm(formula = y ~ x1 + x2 + x3)

Residuals:

Min 1Q Median  3Q Max 

-15.948 -11.640 -1.480 6.402 31.650 

Coefficients:

Estimate Std. Error t value Pr(>|t|) 

(Intercept) 90.79017 22.07408 4.113 0.00106 **

x1 -0.68731 0.47959 -1.433 0.17377 

x2 -0.47047 0.24227 -1.942 0.07254 . 

x3 -0.06845 0.46523 -0.147 0.88513 

Signif. codes: 0 ‘***’ 0.001 ‘**’ 0.01 ‘*’ 0.05 ‘.’ 0.1 ‘ ’ 1

Residual standard error: 14.75 on 14 degrees of freedom

Multiple R-squared: 0.6257, Adjusted R-squared: 0.5455 

F-statistic: 7.8 on 3 and 14 DF, p-value: 0.002652

Ho: X1 is significant and cannot be dropped from the model.

Ha: X1 can be dropped from the model. 

Using the model Y~X1 + X2 + X3, 

b. (10) whether X1 can be dropped from the model containing only X1 and X2. 

Problem 2 (10) Consider the first order model with X1, X2 and X3, simultaneously estimate parameters (beta1, beta2 and beta3)  with a confidence level of 75%. 

Problem 3 (20) Perform appropriate analysis to diagnose the potential issues with the first order full mode with X1 X2 and X3, improve the model as much as possible with the methods covered in Stat512. You should also consider the assumption checking for your revised model.  

Problem 4 

a. (10) Compute AIC, BIC, and PRESSP to compare the following two models. 

· The model on the first order terms for X1 and X2 and the interaction term X1X2.

· The model on the first order terms for X1, X2 and X3 

Do they all yield the same better model? If not, explain. 

b. (10) Select the model that you think is better to predict the mean response value, then predict the mean response for the following case, at a confident level of 99%. 

x1

x2

x3

45

36

45

Problem 5 

X4 and X5 are two factors on Y.

a. (10) Is there any significant interaction effect between X4 and X5 on Y? 

b. (10) With the ANOVA method, compute the 95% confidence interval for the following difference, respectively: 

D1= The difference in the mean of Y when (X4=high, X5=less) and (X4=high, X5=more) 

D2= The difference in the mean of Y when (X4=low, X5=less) and (X4=low, X5=more) 

c. (10) With the ANOVA method, compute the 95% confidence interval for 

D1-D2

Where D1 and D2 are described in b. 

How is your result related to a? 

There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices?

Please write 350 words essay on following

 There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices? 

Research paper 7

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare the paper as one research paper. Be sure to include at least one library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

1) Start your paper with an introductory paragraph.

2) Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

3) Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

4) Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

5) Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

NO plagiarism at any cost. 

Due on Thursday (10/08/2020)

Course textbook:

Title: Managing and Using Information Systems

ISBN: 9781119560562

Authors: Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta

Publisher: John Wiley & Sons

Publication Date: 2019-12-05

Week 3 Office Talk – Access Discussion

 

Topic Questions
As per our textbook, Access, a relational database application, is the most widely used PC-based database management system (DBMS) software for both personal and business users. Like other database systems, the structure of the database file is of the utmost importance. For this exercise, you must demonstrate your understanding of the Access database system by describing how you would begin to create a database file with one of its tables (No templates). Your example may be a personal or business database. In addition, what are the advantages of managing database information in Access versus using an Excel spreadsheet?

Thread Directions
Students are required to participate in these weekly online classroom discussion threads. Students should post at least 1 post on 3 separate days in the active week’s discussion thread. Please make sure to read all topic questions, thread directions, and assignment rubric criteria to ensure that responses are accurate and complete. Points may be deducted, at the discretion of the instructor, for not adhering to any of the following guidelines. Discussion posts will be graded according to the assignment rubric provided below.

How to Post:

1. First Post – Respond to the discussion topic questions listed above. Click on the Reply link listed below to make your response. Minimum word count=100 words