Usability Journal

 Each day, we use the Internet on our personal computers and mobile devices to access information and purchase goods. Websites often have their own mobile form factor while others maintain the same Website user experience, creating challenges when trying to use navigation, overcome errors, search, and complete the most mundane tasks. For this assignment, you are to review a website as well as a Mobile Site. For example, you would evaluate Amazon.com on Microsoft Edge (PC) and Amazon.com on your iPhone using Safari. Conducting a heuristic evaluation (self-evaluation), you will write an assessment on each Website answering the following questions: 

  1. What Website did you evaluate?
  2. What industry does the company participate in?
  3. Looking at the online website, address three issues that require revision? For each issue, please provide a screenshot and explicitly mark why you feel this issue is problematic.
  4. Looking at the online website, how would you suggest that the issues requiring revision are corrected based on what you have learned in the class so far?
  5. Moving to the mobile site, compare those same three features. Did you find the user experience to be problematic or better suited for the mobile form factor?
  6. With the mobile site, how would you enhance the experience for those same issues you found on the Website to be problematic. 

This paper length is 4 -6 pages. Since this is a personal review of a website, sources are not necessary. However, you are still to follow the APA format in presenting the paper. 

Exception Handling in Java

Please respond below with a minimum of 200 words and site your references.

 In addition to what we have learned from the course materials, there are  other ways to categorize exceptions in Java such as checked and  unchecked exceptions. Please conduct online research on these two  categories, share what you find. Of these two kinds of exceptions  (checked and unchecked), which method do you prefer? Which method is  easier? 

Discussion – Theory

Discuss the theoretical framework you think helps explains your topic and problem you will address in your dissertation. Remember, this will also be cited in the literature as well, so make sure to include scholarly resources from a peer reviewed journal. 

Topic :  The Smart Phone as a Dangerous Technology  

APA format with references needed. 500 words

Practical Assignment

Course:  Operations Security 

Textbook:  Title: Security Policies and Implementation Issues 

 The course examines controls over personnel, hardware, software, and systems. It also covers possible abuse channels and proper countermeasures.

 Identify the appropriate security measures and controls for creating a more secure workspace, including policy and procedure development and compliance with laws and regulations.

Recognize the activities involved in securing the operations of an enterprise and identify the technologies used to maintain network and resource availability.

Recognize key reconnaissance attack methods and identify different types of administrative management and media storage control. 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Final Paper on Securing Social Network Data from Privacy Threats

Answer the 6 questions who, when, where, why (all together in 1-2 sentences) then HOW and WHAT in 2-3 sentences EACH -we need detail), then write an objective summary using the sample in the resource manual as a template

My final research question : What have researchers learned about how best to secure social network data from privacy threats?

1 Objective summary for the article below 

Reference

Garside, D., Ponnusamy, A., Chan, S., & Picking, R. (2021). Secure military social networking andrapid sensemaking in domain specific concept systems: Research issues and future solutions. Future Internet, 4(1), 253-264. https://doi.og/10.3390/fi4010253

2.Literature Review 

Please fill out this form (also available in this week’s folder) to compare and contrast your three research articles (do not include your news article). 

Compare and contrast articles – Form to fill out

  Please write part 2 of your literature review. You will be essentially cutting and pasting your three objective summaries under Level II headings (see p 13 in your manuals)

Put them in an order that makes sense given how you compared and contrasted them.

Use your transition compare and contrast words (similiar to…etc) !!! (this is also available in this week’s folder)

compare and contrast words.

Submit BOTH assignments here.

3. Complete Literature review 

Assignment Content

Put it all together in 1, 2, 3 order! Write your Literature review!

Use the checklist to be sure you have everything by checking off each item and fixing your draft as you go.

Submit the marked-up checklist and your literature review here, with a title and references page.

4. Discussion 3 paragraphs 

Your hard work has paid off (!!!), You will use the following workshop activities completed in class to help you write your complete draft of your discussion section:

  • Activity: Discussion, Para. 1
  • Activity: Discussion, Para. 2
  • Activity: Discussion, Para. 3

Cloud Computing

 Chapter 10 topics:

  • Define and describe business continuity.
  • Define and describe disaster recovery.
  • Discuss pros and cons of cloud-based backup operations.
  • Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks.

 Chapter 11 topics:

  • Define software architecture.
  • Define and describe SOA.
  • Compare and contrast a web page and a web service.
  • Search the Web for companies that offer web services and then describe three to five web services that programmers might integrate into the applications they create.

 Chapter 12 topics:

  • Discuss key items that should be included in an SLA.
  • Define predictive analytics and discuss how an IT manager might use such analytics.
  • Discuss how an IT manager might use load testing on a site.
  • Define and discuss vendor lock-in and identify steps a company should take to mitigate this risk.

 Chapter 13 topics:

  • List and describe common system requirements one should consider before moving an application to the cloud.
  • Discuss why a company should consider using a consultant to oversee a cloud migration and list specific skills you would expect the consultant to have.
  • List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
  • List possible training requirements for an SaaS solution integration, a PaaS application migration, and an IaaS application migration.