Final Research Paper – ERM

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.

In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction
  • Why should an organization Implement an ERM application?
  • What are some key challenges and solutions to Implementing an ERM?
  • What is Important for an effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
  • Conclusion, final thoughts for future research
  • Recommendation

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

1 page in APA 6th Format Operational Excellence

1 Page in APA 6th format with at least one professional references:

Which software-development methodology would be best if an organization needed to develop a software tool for a small group of users in the marketing department? Why? Which implementation methodology should they use? Why?

frameworks

 

Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6.  https://ieeexplore.ieee.org/document/8760937?arnumber=8760937 

Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43.

 The required article readings of above articles give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches. For research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Systems Thinking Project Milestone using microsoft visio

 

  1. Define the following systems-thinking concepts in your own words:
    1. Systems thinking
    2. Collection
    3. Feedback loop
    4. Stock and flow diagram
    5. Causal loop diagram
  2. The following scenario describes the system used for fulfilling an online order at Lost Pines Outfitters, a medium-sized outdoor clothing store. Read this scenario and create a basic map of the system using Microsoft Visio.

  3. Once you have mapped this system, you will map relationships contained within the system. First, identify relationships within your system diagram that represent feedback loops, and represent those loops within your model. Then, identify a relationship within the system that could be modeled with a stock and flow or causal loop diagram, and model that diagram in Visio. 

4.Compose a brief, 250- to 500-word summary of the given system, as well as the relationships present in this system. In your summary, describe the system, feedback loops, and other archetypes you identified within the system.

Web applications

 You are the webmaster for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words. 

Research Paper: Server Virtualization and Cloud Computing

 Research Paper: Server Virtualization and Cloud Computing 

This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Implement a ramdisk as a kernel module.

 In this final project, you will implement a simple ramdisk module that you can format with “mkfs.ext2” and mount and unmount with “mount” and “umount”. The ram disk should be of a fixed size stored entirely in memory. It should appear as a block device in the system. This project is an example of a block device driver, which handles data a block at a time. Your project should satisfy the following requirements. 

– Implement a ramdisk as a kernel module. 

– Allow an ext2 filesystem to be installed onto the ramdisk. 

– Allow the filesystem to be mounted and unmounted with “mount” and “unmount” 

  

While submitting your project, please make sure you include the following:

  1. your source code,
  2. a makefile,
  3. a short report describing your work.

final case

 

Chapter 5 exercises

20. Consider the task of building a classifier from random data, where the attribute values are generated randomly irrespective of the class labels. Assume the data set contains records from two classes, “+” and “−.” Half of the data set is used for training while the remaining half is used for testing.

(a) Suppose there are an equal number of positive and negative records in the data and the decision tree classifier predicts every test record to be positive. What is the expected error rate of the classifier on the test data?

(b) Repeat the previous analysis assuming that the classifier predicts each test record to be positive class with probability 0.8 and negative class with probability 0.2.

(c) Suppose two-thirds of the data belong to the positive class and the remaining one-third belong to the negative class. What is the expected error of a classifier that predicts every test record to be positive?

(d) Repeat the previous analysis assuming that the classifier predicts each test record to be positive class with probability 2/3 and negative class with probability 1/3.

Chapter 6 exercises

5. Prove Equation 6.3 in the book. (Hint: First, count the number of ways to create itemset that forms the left hand side of the rule. Next, for each size k itemset selected for the left-hand side, count the number of ways to choose the remaining d − k items to form the right-hand side of the rule.)

17. Suppose we have market basket data consisting of 100 transactions and 20 items. If the support for item a is 25%, the support for item b is 90% and the support for itemset {a, b} is 20%. Let the support and confidence thresholds be 10% and 60%, respectively.

(a) Compute the confidence of the association rule {a} -> {b}. Is the rule interesting according to the confidence measure?

(b) Compute the interest measure for the association pattern {a, b}. Describe the nature of the relationship between item a and item b in terms of the interest measure.

(c) What conclusions can you draw from the results of parts (a) and (b)?

(d) NOT NEEDED FOR THE TEST

Chapter 7 exercises

5. For the data set with the attributes given below, describe how you would convert it into a binary transaction data set appropriate for association analysis. Specifically, indicate for each attribute in the original data set.

(a) How many binary attributes it would correspond to in the transaction data set,

(b) How the values of the original attribute would be mapped to values of the binary attributes, and

(c) If there is any hierarchical structure in the data values of an attribute that could be useful for grouping the data into fewer binary attributes. The following is a list of attributes for the data set along with their possible values. Assume that all attributes are collected on a per-student basis:

• Year : Freshman, Sophomore, Junior, Senior, Graduate: Masters, Graduate: PhD, Professional

• Zip code : zip code for the home address of a U.S. student, zip code for the local address of a non-U.S. student

• College : Agriculture, Architecture, Continuing Education, Education, Liberal Arts, Engineering, Natural Sciences, Business, Law, Medical, Dentistry, Pharmacy, Nursing, Veterinary Medicine

• On Campus : 1 if the student lives on campus, 0 otherwise

• Each of the following is a separate attribute that has a value of 1 if the person speaks the language and a value of 0, otherwise.

- Arabic
- Bengali
- Chinese Mandarin
- English
- Portuguese
- Russian
- Spanish

Chapter 8 exercises

1. Consider a data set consisting of 2^(20) data vectors, where each vector has 32 components and each component is a 4-byte value. Suppose that vector quantization is used for compression and that 2^(16) prototype vectors are used. How many bytes of storage does that data set take before and after compression and what is the compression ratio?

8. Consider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster?

9. Give an example of a data set consisting of three natural clusters, for which (almost always) K-means would likely find the correct clusters, but bisecting K-means would not.

11. Total SSE is the sum of the SSE for each separate attribute. What does it mean if the SSE for one variable is low for all clusters? Low for just one cluster? High for all clusters? High for just one cluster? How could you use the per variable SSE information to improve your clustering?

13. The Voronoi diagram for a set of 1( points in the plane is a partition of all the points of the plane into K regions, such that every point (of the plane) is assigned to the closest point among the 1( specified points. (See Figure 8.38.) What is the relationship between Voronoi diagrams and K-means clusters? What do Voronoi diagrams tell us about the possible shapes of K-means clusters?