R3. Review of a Quantitative Research Study ON DATA ANALYTICS

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there. There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism.)  Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data were gathered and analyzed.  What research questions or hypotheses were the researchers trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability, and the implications of the results.  Does the piece lead to further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References
  • By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the  Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Assignment

Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment.

 Required Reading material 

 The Benefits of Learning Ethical Hacking (Posted in Penetration Testing on August 29, 2018)

https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/

 When Ethical Hacking Can’t Compete

https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

 https://youtu.be/eNQycQwKV7Y 

 

Unit 9 Assignment 300 words paper

 Provide me turnitin.com report.

GEL 6.06: Apply research to create original insights and/or solve real-world problems.

Purpose

All disciplines require that practitioners know how to undertake research to fulfill their job responsibilities and keep current in their field. This Assignment requires you to do some research on how to handle a malware infection.

Assignment Instructions

In a 300–500 word paper, explain the steps you would take if one of your organization’s main servers was infected by malware. Use outside research to support your solution to this real-world problem. Your paper must demonstrate an assessment of the problem, your decision-making process, and a justification for your conclusion in relation to your research. You must provide at least three appropriate resources for your paper. Be sure to cite the resources you use in proper APA style formatting

Core and Distinctive Competencies

1. From a long-term strategic standpoint, explain the core and distinctive competencies from either a previous or current workplace of your choosing. 

2. Specifically, describe the organization’s resources and capabilities and how they align with the current strategy. 

3. Is their internal environment strong enough to continue to compete within the market?

5/3 Peer Review

  1. Conduct a critical analysis of two of your classmates’ posts and each response to your classmates should be at least 150 words in length and include a citation to one credible information source. The response citation should follow APA formatting.

Please find the attached document. 

Data base security

  

Read three articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.

Use at least three sources.   Use the Research Databases available from the Danforth Library, not Google.  

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  

Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraph’s. 

Write an essay format not in bulleted, numbered or other list format.