Advances in data collection

 Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer. 

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for online behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Computer Science IT 501-3 assignment

You are required to submit a 1,000-word, double-spaced on: 

Three applications of GIS (Geographic Information Systems).

You will use your textbook, the university digital library and online resources with proper citations.

You must have three parts:

  1. Review of source(s)
  2. Opinion and commentary
  3. Citations

Trademark

Research and discuss a company’s trademark that has been awarded protection by the U.S. Patent and Trademark Office. You may select the company that you work for, or a company you aspire to work for. You’re welcome to select one simply from a company you admire or that intrigues you in any way. Have fun making a choice.

Describe the trademark, its application (e.g., does it cover merchandise, a service, a website … what does the mark relate to?). Was there any objections or litigation surround the trademark application or award? If so write about that. Do you believe there is a risk of infringement? Are there international IP implications? What other interesting information surrounded its application or award? In [too?] many cases, it’s not so simple as designing a mark and completing governmental documents, so help your classmates learn about the complicated, challenging process of filing for and attaining IP protection from the U.S. government.

500 words.APA format needed.

case study, essay type

 

You  are an employee at D&B Investigations, a firm that contracts with  individuals, companies, and government agencies to conduct computer  forensics investigations. D&B employees are expected to observe the  following tenets, which the company views as the foundation for its  success:

  • Give concerted attention to clients’ needs and concerns.
  • Follow proper procedures and stay informed about legal issues.
  • Maintain the necessary skill set to apply effective investigative techniques using the latest technologies.

Your  manager has just scheduled a meeting with an important prospective  client, and she has asked you to be part of the team that is preparing  for the meeting. The prospective client is Brendan Oliver, a well-known  celebrity. Last night, Mr. Oliver’s public relations team discovered  that someone obtained three photos that were shot on his smartphone, and  tried to sell the photos to the media. Due to the sensitive nature of  the photos, Mr. Oliver and his team have not yet contacted law  enforcement. They would like to know if D&B can provide any guidance  or support related to the investigation—or, at the very least, if  D&B can help them prevent similar incidents from occurring in the  future. At this time, they do not know how the photos were acquired. The  public relations team is wondering if a friend, family member, or  employee could have gained direct access to Mr. Oliver’s phone and  obtained the photos that way, although the phone is usually locked with a  passcode when Mr. Oliver is not using it. In addition, Mr. Oliver  emailed the photos to one other person several months ago. He has not  spoken with that person in the last few weeks, but he does not believe  that person would have shared the photos with anyone else. 

Your  manager plans to use this initial meeting with Mr. Oliver and his  public relations team to establish rapport, learn more about the case,  and demonstrate the firm’s expertise. The company sees this as an  opportunity to build the future business, regardless of whether they are  retained to help with the investigation of this case.

Tasks

To  help the team prepare for the meeting, your manager asks you (and your  colleagues) to consider and record your responses to the following  questions:

  • What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation? 
  • Based  on the limited information provided in the scenario, what is the  rationale for launching an investigation that uses computer forensic  activities? Would D&B and/or law enforcement need
  • additional information in order to determine if they should proceed with an investigation? Why or why not?
  • What  would you share with the client about how investigators prepare for and  conduct a computer forensics investigation? Identify three to five key  points that are most relevant to this case.
  • What sources of evidence would investigators likely examine in this case? Provide concrete examples and explain your rationale. 
  • What  should the client, investigators, and others do—or not do—to ensure  that evidence could be used in a court of law? Using layman’s terms  explains laws and legal concepts that should be taken into account  during the collection, analysis, and presentation of evidence.
  • What questions and concerns do you think the client will have?
  • What questions should the team ask the client to learn more about the case and determine the next steps?

Required Resources

  • Course textbook
  • Internet access

Submission Requirements

  • Format: Microsoft Word (or compatible) 
  • Font: Arial, 12-point, double-space 
  • Citation Style: Follow your school’s preferred style guide
  • Length: 5–7 pages

Self-Assessment Checklist 

  • I effectively documented the causes for investigation.
  • I effectively documented key points related to the collection, analysis, and presentation of computer forensic evidence.
  • I successfully identified potential sources of evidence.
  • I summarized laws and legal concepts that apply to this case.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

PYTHON PROGRAM RELATED TO INFORMATION RETRIEVAL AND WEB SEARCH

 

Problem 1 [30 points]. Write a (Python) program that preprocesses a 

collection of documents using the recommendations given in the

Text Operations lecture. The input to the program will be a directory

containing a list of text files. Use the files from assignment #3 as

test data as well as 10 documents (manually) collected from news.yahoo.com .

The yahoo documents must be converted to text before using them.



Remove the following during the preprocessing:

- digits

- punctuation

- stop words (use the generic list available at ...ir-websearch/papers/english.stopwords.txt)

- urls and other html-like strings

- uppercases

- morphological variations
Above mentioned assignment 3# file is also attached and by running this code in anaconda spider you can see the output

4/2 Reading

  1. Read Chapters 14–17 in your textbook.
  2. Using the discussion link below, respond to the following questions:
    1. What was the most useful takeaway for you from this workshop’s reading?
    2. What concept from the reading is the most applicable to you now in your profession, and how might you implement it?

own words/easy words only please own simple words

  

OWN WORDS easy words / self work / OWN WORds please…

1) Discuss what ethical leadership is and how it impacts the organizational culture.

2) What are the various dimensions of ethical leadership?

3) Note some failures in ethical leadership, please find an example, explain the failure and note possible solutions to fix the issue with leadership.

100 words (1-3 question) 

4)How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 

5)How does servant leadership assist with transferring knowledge in an organization?

6)When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. 

The organization of this paper must include: a title page; an introduction; headings for each section (for this paper those sections should be Knowledge Sharing, Servant Leadership, Transformational Leadership); a conclusion; and a reference page.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

browser cookies

 

Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

Optional: install Windows Historian and see the sites visited by a particular user.