4 Week Masters' Program Cybercrime Class

Are you able to complete the remaining 4 weeks of the class?

Mid term due by 11/8/2020- In the form of discussion question for past chapters ( will provide info)

Complete a book review by November 23rd on a Specific book? (Book Review no less than 2300 words) 

3 quizzes (requires log-in and completion by central time 6:00 p.m. Saturdays?

Discussion question weekly posted on Sunday by professor to be completed by central time 10:00 a.m. Wednesday with 450 word minimum, in-text citations and proposed class question?

Please see instruction below.

 Need to complete both 3 & 4 assignments. 

  1. Read the Final Assignment direction to understand the scope of your final assignment.
  2. Use FAIR Basic Risk Assessment Guide to follow the steps as a guideline.
  3. Complete the Risk Management Plan document to attach/include in your final paper.
  4. Complete the Business Impact Analysis document to work on your business impact analysis.

CRM PowerPoint

IT and business managers see inefficiencies in everyday processes, as these inefficiencies are often related to current systems in place. As such, IT and business managers need to identify these issues to senior management and offer solutions.

In this interactive assignment, you will analyze the role of CRM systems in business and assess the issues that make a CRM system necessary for successful customer relationship management. Assume the role of an IT Manager working for an organization where there is no CRM in place. You may use a business scenario of your choice (this may be a real world scenario with which you are familiar or one you create). For your initial post, you will create PowerPoint presentation and screencast video of your PowerPoint. This presentation will be created for your CIO and should provide all pertinent information.

Your PowerPoint presentation must include a minimum of four inefficient processes you have identified related to recent customer interactions. Consider the CRM research you conducted and present to your CIO the CRM that best meets your needs. Include a rationale as to how it will alleviate the identified inefficiencies, providing a minimum of four reasons why the CRM and the vendor chosen would be the solution for your organization. Support your statements with evidence from your required and researched sources.

Data visualization

According to Kirk (2016), most of your time will be spent working with your data.  The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw materialData examination: Identifying physical properties and meaningData transformation: Enhancing your data through modification and consolidationData exploration: Using exploratory analysis and research techniques to learnSelect 1 data action and elaborate on the actions performed in that action group.

– apa

– 2 pages

– strictly plagiarism free

Research paper: Mastering Blockchain

Deadline: 1/16 

Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. You should use the UC library ( https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles ( https://scholar.google.com/ )Once you find the article, you will read it and write a review of it.  This is considered a research article review.Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Case Study and Lab work

Case Study 3.1

-Complete 3.4

Southwest Border Apprehensions and Unemployment 

Write a Summary Analysis of the problems and answers

Writing Requirements 

3-4 pages in length

APA formatting 

LAB 3

Chapter 4 

Problems 43 and 44 (Tableau table is optional , Create an excel chart in the line of the tableau chart

The Assignment must be an APA formatted paper with embedded excel files.

HR 5

minimum 500 words

Discuss the following questions: 1. What is Blockchain’s potential for application in the HR functions of recruitment and selection. 2. How might Blockchain technology impact job repositories. Use the following headings to organize your paper: Introduction, Question 1, Question 2, Conclusion, References.

Writing Requirements for All Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper 
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Data Analytics

 

1. Explain what analytics are? What are business analytics? Do they differ from other analytics and how? Explain why or why you cannot do analytics without data?  Explain why or why you cannot do analytics without big data?

2. Where do you get the data for analytics? Is all of it internal to the company? Identify at least 5 sources of external data and explain when you might be able to use them.

 

1. What is data mining? Why is data mining so popular? 

2. What are the privacy issues associated with data mining? Do you think they are substantiated? Why or why not? — ignore this question — already responded to in the discussion. 

3. Distinguish data mining from other analytical tools and techniques.

4. Discuss at least 3 data mining methods. What are the fundamental differences among them

The above assignments should be submitted in one-word document. Include an APA cover page and a reference page.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations)

R

 

Assessment  002 R Analysis and Report (maximum 3000 words)

In this assignment you are going to simulate data from an area chosen by yourself. It can be cyber related, healthcare, industrial, financial/credit card fraud, commerce – anything. However, run your ideas past me first before diving in. If you recall from the dplyr tutorials we were able to simulate small amounts of data based on several dataframes. We then linked the data we required using join() commands, etc. We then obtained summaries of the data and could use ggplot2 to highlight trends, etc.  

  1. Carefully, choose your domain. Give a rationale for simulating it.
  2. Define your data frames, generate them using sample_n and/or other commands. There is a package called charlatan you may find useful for generating personal names and other values. About 4-5 dataframes will suffice.
  3. Think about seeding trends and patterns in your simulated data that you can “detect” later.
  4. Use dplyr to extract the columns you need from the dataframes.
  5. Use some sort of analysis such as summaries to get statistics on your data. Break it down by a category variable such as e.g. time, gender, fraudulent V normal, etc.
  6. In the write-up, I will expect to see an introduction section, methods, and then sections for Simulation of data and transforming data, Analysis of data; marks for plots should of course be in the Analysis section.

Part 1: Analysis of the Data (70 marks)

You will need to develop R code to support your analysis, use dplyr where possible to get the numeric answers. Regarding ggplot2, be careful as to what type of plot you use and how you use them as you have many records and want the charts to be readable. You should place the R code in an appendix at back of the report (it will not add to word count).  Section each piece of code with # comments and screenshots of outputs.

  • Simulation of data (20 marks)
  • Transforming data (10 marks)
  • Analysis of data and plots (20 marks)
  • Write-up of the data analysis (similar format of my R tutorials) (20 marks)

Part 2: Scale-up Report (30 marks)

The second part will involve writing a report. Now assuming your Part 1 was an initial study for your organisation, what are the issues when you scale it up and start using it in practice?

  • Discussion of Cyber security, big data issues, and GDPR issues (20 marks)
  • Structure of report, neatness, references. Applies to both Part 1 and Part 2 (10 marks)

Penalties: Do not go over word limit of 3,000 (other than ±10%) as loss of marks will occur according to the university guidance on penalties.

Output: Submit PDF electronic copy to Canvas before the deadline, along with a file containing your R code. The data should be generated from the R code, so do not submit any data.

RSA Applications

 

You have taken courses in the key encryption created by Rivest,  Shamir, and Adelman (RSA) and have identified that many of the  associated applications that they offer could benefit the corporation in  cryptography.  You have been asked to present your recommendation for  an RSA application to the Board of Directors to consider purchasing at  least two of their associated applications, and you know that you must  present a strong case for such a purchase. 

  • Research the RSA associated applications and identify the associated benefits and costs. 
  • Your multimedia presentation must be a minimum of 10 slides with a minimum of four supporting APA references.  
  • Include charts and graphs if they support your recommendation