2 Discussions and 3 Case Studies

Discussion 4.1 (Cyber)

Due: Initial Post due Wednesday, Replies due Sunday

Provide the requirements of the Sarbanes-Oxley Act.  Do you think this Act is good or bad?  Explain your answer and uses sources to support your points. 

Discussion 4.1 (Hacking)

Due: Initial Post due Wednesday, Replies due Sunday

What are some things you should consider when using Python as a Hacking tool?  Why?  What things should you avoid?  Why? 

Case Study ( Cyber Crime)

Due: Sunday, End of Module by 11:55 p.m. EST

  • Individual Paper:
    • In chapter 8 you should have read about the Federal Information Security Management Act (FISMA).  Assume that this Act hasn’t been enacted yet and you are the one that is in charge of either getting this Act passed or in charge of making sure this act doesn’t get passed (You are pro FISMA or against FISMA).  In a 4 to 5 page paper describe FISMA, list the pros and cons, and make a decision on your support or non-support for the act.  Make sure you follow APA format and cite all of your sources.
  • Team Presentation:
    • Build a PowerPoint presentation on what you just discussed in your paper about FISMA.  Your presentation should contain 10 to 20 slides including the title and reference slides.  When you present your project remember that you are trying to convince people to either approve or disapprove FISMA.

Writing Requirements: 

  • Team PowerPoint presentation 10-20 slides
  • 4-5 page paper in APA format, for citations and refereneces

Intro to Python Completion 

Due: Sunday, End of Module by 11:55 p.m. EST

Midterm Requirements

  • Individual Paper:
    • We will be completing the Intro to Python Primer. Your goal will be to write a 3 to 4-page paper where you discuss the use of Python in the field of Data Analytics.         

Writing Requirements: 

  • 4-5 page paper in APA format, for citations and references

Paper (Individual) Python Used in Hacking

  • Individual Paper:
    • Write a 3 to 4-page paper where you discuss the uses of Python in hacking. This will require you to find an article on the use of Python in Hacking and explain how the article covers the use of Python in the hacking process.       

Writing Requirements: 

  • 4-5 page paper in APA format, for citations and references

Operational excellence

Discussion:

 This week we focus on the productivity paradox.  Please define the productivity paradox and explain current thinking on this topic 

Assignment: 

  Information Systems for Business and Beyond Questions:

  • Chapter 7 – study questions 1-10, Exercise 2
  • Chapter 8- study questions 1-10, Exercise 2

Information Technology and Organizational Learning 

Assignment:Chapter 6 – Review the section on knowledge creation, culture, and strategy.  Explain how balance scorecards impact knowledge creation, culture, and strategy.  Why are these important concepts to understand within an organization? 

Exp19_Excel_Ch08_CapAssessment_Employee_Satisfaction

Exp19_Excel_Ch08_CapAssessment_Employee_Satisfaction

Exp19 Excel Ch08 CapAssessment Employee Satisfaction 

Excel Chapter 8 Capstone Assessment – Employee Satisfaction

 

Project Description:

You work as a data analyst for Camino Marketing, a U.S.-based web marketing company. You have been asked to conduct an employee satisfaction survey. As part of the survey, you will collect sample data to help provide insight into employee salaries, productivity within the three national offices, and to predict the growth of the New York office’s client base by 2025.

1

Start Excel. Download and open   the file named Exp19_Excel_Ch08_CapAssessment_EmployeeSatisfaction.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

2

Ensure the Employee Satisfaction   worksheet is active, then use the FREQUENCY function to calculate the   frequency distribution of job satisfaction in column D. Place your results in   the range G5:G9.

3

Enter a function in cell G12 to   calculate the standard deviation of column c.

4

Enter a function in cell G13 to   calculate the variance between salaries. 

5

Enter a function in cell G14 to   calculate the Covariance of the salaries and job satisfaction in the data   set. Note this is a sample of data not a population.

6

Enter a function in cell F17 to   calculate the correlation coefficient between employee salary and job   satisfaction.

7

Ensure the Data Analysis ToolPak   add-in is active. Use the Data Analysis ToolPak to create a histogram based   on the salaries in column C. Use the range I4:I9 as the Bin Range. Ensure   that Cumulative percentage, column labels, and chart output are included in   the results. Place the results in cell K4. Edit the result text in cell K4 to   display   Salary, if   necessary.

8

Ensure the Office_Data worksheet   is active. Use the Data Analysis ToolPak to perform a single factor ANOVA on   the range C3:E35. Place the results starting in cell G3. Be sure to include   column labels. Resize columns G:M as needed.

9

Create a Forecast Sheet that   depicts year over year growth in customer growth. Set the Forecast end year   as 2025 and place the results on a new worksheet named 2025Forecast.

10

Ensure the Customers worksheet   is active then create a scatter plot chart that places the Years on the X   axis and the Clients on the Y axis. Add a linear trendline to the chart that   also shows the Equation and the R-square. Add the title Customer   Growth.

11

Enter a function in cell E4 to   calculate the intercept of the linear trendline created in the prior step.

12

Enter a function in cell F4 to   calculate the Slope of the linear trendline.

13

Enter a function in cell G4 to   calculate the R-square of the linear trendline.

14

Enter a function in cell H4 to   calculate the Standard Error. 

15

Use the FORECAST.LINEAR function   in cell E7 to the total number of customers by the end of 2021. 

16

Complete your analysis by added   formulas in the range F7:G7 to calculate the high and low thresholds of the   forecast.

17

Save and close Exp19_Excel_Ch08_CapAssessment_EmployeeSatisfaction.xlsx.   Exit Excel. Submit the file as directed.

ITS-836 – Data Science & Big Data Analytics – Blockchain Initiatives Literature Review

Reading resources:

Alkadi, Moustafa, N., & Turnbull, B. (2020). A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions. IEEE Access, 8, 104893–104917.

Duran, Yarleque-Ruesta, D., Belles-Munoz, M., Jimenez-Viguer, A., & Munoz-Tapia, J. L. (2020). An Architecture for Easy Onboarding and Key Life-Cycle Management in Blockchain Applications. IEEE Access, 8, 115005–115016.

Mohamed, & Al-Jaroodi, J. (2019). Applying Blockchain in Industry 4.0 Applications. 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), 0852–0858. 

Literature Review: Blockchain Initiatives

While most applications of blockchain technology have emerged in the financial sector (for example, Zcash, Circle, and Abra), its practical applications go beyond finance, because essentially any type of digital asset can be tracked and traded through a blockchain. Many different industries are experimenting in the blockchain space, even though this experimentation is still in its early stages. Examples range from medical records (MedRec, PokitDok), to digital rights and micropayments (Brave Browser, Ascribe, Open Music Initiative), identity systems (uPort), and supply chains (Everledger, Hyperledger).

For your literature review this week, you are required to choose a blockchain initiative that interests you. It could be an existing application that you have come across in your own research, one of the examples listed above, or an idea that you may have for blockchain technology as a solution to a business problem.

You are to review the literature on your blockchain initiative and discuss problems and gaps that have been identified in the literature. You will expand on the issue and how researchers have attempted to examine that issue by collecting data – you are NOT collecting data, just reporting on how researchers did their collection. 

Paper Layout:

– Title Page

– Table of contents: Use a Microsoft Enabled Table of Contents feature.

– Background:  (minimum 1 page)

Describe the issue, discuss the problem, and elaborate on any previous attempts to examine that issue. Be sure to discuss similar blockchain initiatives here.

– Research Questions: (minimum 1.5 pages)

In the identified problem area that you are discussing, what were the research questions that were asked? Be sure to include main research questions from all the literature you are reviewing.

– Methodology:  (minimum 2 page)

What approach did the researcher use, qualitative, quantitative, survey, case study? Describe the population that was chosen. You will discuss the methodology for all the literature you are reviewing.

– Data Analysis:  (minimum 2 page)

What were some of the findings, for example, if there were any hypotheses asked, were they supported?

– Conclusions:  

What was the conclusion of any data collections, e.g., were research questions answered, were hypotheses supported? Be sure to also include the similarities and differences between the literature. Also discuss here the future of this blockchain initiative and if it is a viable initiative.

Paper requirements:

– Be a minimum of 7 pages in length, not including the required cover page, table of contents and reference pages.

– Follow APA 7 guidelines. Be sure to conduct research on formatting literature reviews.

– Your literature review should include a minimum of 8 scholarly peer-reviewed journal articles.

– Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. You can use Grammarly for help with your grammar and spelling.

Note: plagiarism check required, APA7 format, include References, within 8hrs 

Redundant Array of Inexpensive Disks (RAID) array

W8LIN 

3. Why would we ever want to use a Redundant Array of Inexpensive Disks (RAID) array?  Include in your answer an explanation of the various types of RAID configurations and why some configurations might be chosen over others.

250 words

1 qtn

 You are the IT manager of a large corporation. You are planning to use Python to develop statistical models to aid in analyzing your sales data. You are preparing a report for management. Here are the basic requirements for your report:

  • Prepare in APA format
  • Include references
  • Report length: 500 – 700 words
  • Briefly describe your company
  • Briefly describe Python
  • Give overview of Machine Learning
  • Report on:’
    • Implementation plans
    • Technical training
    • Python libraries required
    • How Python will be used
    • Types of reports that will be produced

In addition, prepare a PPT presentation related to your Research Project 

Python

Please read the FE.dox to see the 5 questions that need to be done. 

Price can negotiate.

Cloud computing – Architecture challenges, Platforms and Applications

I need a research paper on this with minimum of 10 to 15 pages.

The format should be as following;  

RESEARCH COMPONENTS

Table of Contents

Abstract (after the study)

Introduction

Research Question

Purpose Statement

Nature of Research Study

Conceptual Framework

Literature Review

Research Method and Design

Research Method (CASE STUDY METHOD)

Summary of the Findings

Assumptions and Limitations

Conclusion

References – APA style format and the names of authors in alphabetical order

The components will also depend on the type of research and the topic and resources available to the researcher.

Check out this site: https://libguides.bc.edu/edpaper/sections