ITS-630: Organ Leader & Decision Making – Week 4 Research Paper

Reading Resources:

Research Paper:

This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization; please review these concepts and answer the following questions:

  1. How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  2. How does servant leadership assist with transferring knowledge in an organization?
  3. When thinking about data analytics, how does transformational leadership assist with building good data structures?

Google Scholar is a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3+ pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Note: plagiarism check required, APA7 format, include References, within 8hrs

module 5

Half a page

Locate a case study that describes how a honeypot was used—successfully or not—in an attempt to catch an intruder.  Be resourceful!!  

HW

 

External Factor Evaluation (EFE)

 In this opening paragraph, explain what the significance is regarding an External Factor Evaluation for an organization (see Table 7). This explanation must include the rankings 1 to 4 as well as the weighting 0.00 to 1.00. This paragraph must have 5 to 6 academic sentences with 2 to 3 current scholarly sources. In addition, explain the results of your EFE analysis regarding the total weighted score. Indicate whether the value you obtained was greater than the average (2.5), less than or equal to and what this means. You should include Table 7, which will include the matrix of the evaluation of the 20 external factors.

Technology and art

 Referencing the Learning Resources for this module, choose a different question from the previous discussion in the research project list and answer it in relation to an issue in art and technology. 

  1. What is the problem for which this technology is the solution?
  2. Whose problem is it?
  3. Which people and what institutions might be most seriously harmed by a technological solution?
  4. What new problems might be created because we have solved this problem?
  5. What sort of people and institutions might acquire special economic and political power because of technological change?
  6. What changes in language are being enforced by new technologies, and what is being gained and lost by such changes?

Resources:

https://aeon.co/essays/digital-art-is-what-you-can-do-not-how-you-did-it

https://aeon.co/essays/what-do-we-uncover-when-we-look-through-digital-eyes

Scientism in the Arts and Humanities

i need in 2 hours

Need 500 Words Paper On Analyzing And Visualizing Data( This Is Not A Research Paper It Has Be Perspective)

Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Be sure to not self-plagiarize as this assignment is similar in multiple courses.

research project

You and your group will research an advanced telecommunications and network security topic. For this paper, you can pick your own research topic as long as it relates to the objectives of this course. When you decide your topic, you need to obtain my approval. Your task is to write a report summarizing your research (about 6-10 pages). The writing should be original. Before you begin writing your report, you need to read as many references related to the subject as you can. Basically, you would feel a bit insecure writing about a topic until you have digested and completely understood several references. You will have a table of contents for the paper with sections as shown in the suggestions below:: • Abstract section summarizing your research • Introduction section: this section provides an overview or background of the topic and its purpose, including o Define the subject area, and why is this subject important? • Body of work sections: o What are the key issues (pros/cons, if appropriate)? o Identify benefits, obstacles, innovations as appropriate o Methodology: key ideas, summaries, measures, analytical discussions, etc. • Conclusion section: analyze and summarize your findings, state your opinions, conclusions, recommendations. It is common for such a paper to suggest new ideas, critique some of the existing ideas, and propose some new directions. • References section: Sources and references need to be cited properly using APA format. Around 10 or more references are appropriate, some of which must be scholarly peerreviewed articles

Cybersecurity Threat Landscape Paper

Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.

Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, which she will assign to the team.

.  

Your  report should use The Cybersecurity Threat Landscape Team Assignment Resources to cover the following five areas:

Part 1: Threat Landscape Analysis

  • Provide a      detailed analysis of the threat landscape today.
  • What has changed in the past few years?
  • Describe common tactics, techniques, and procedures to include threat actor types.
  • What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?

Part 2: APT Analysis

  • Provide detailed analysis and description of the APT your group was assigned.      Describe the specific tactics used to gain access to the target(s).
  • Describe the tools used. Describe what the objective of the APT was/is. Was it successful?

Part 3: Cybersecurity Tools, Tactics, and Procedures

  • Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.
  • Consider the hardware and software solutions deployed today in the context of defense-in-depth.
  • Elaborate on why these devices are not successful against the APTs.

Part 4: Machine Learning and Data Analytics

  • Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field.
  • Are there companies providing innovative defensive cybersecurity measures based on these technologies? If so, what are they? Would you recommend any of these to the CTO?

Part 5: Using Machine Learning and Data Analytics to Prevent APT

  • Describe how machine learning and data analytics could have detected and/or prevented the APT you analyzed had the victim organization deployed these technologies at the time of the event. Be specific.

Part 6: Ethics in Cybersecurity.  Ethical issues are at the core of what we do as cybersecurity professionals. Think of the example of a cyber defender working in a hospital. They are charged with securing the network, medical devices, and protecting sensitive personal health information from unauthorized disclosure. They are not only protecting patient privacy but their health and perhaps even their lives. Confidentiality, Integrity, Availability – the C-I-A triad – and many other cybersecurity practices are increasingly at play in protecting citizens in all walks of life and in all sectors. Thus, acting in an ethical manner is one of the hallmarks of cybersecurity professionals.

  • Do you think the vulnerability(ies) exploited by the APT constitutes an ethical failure by the defender? Why or why not? 
  • For the      APT scenario your group studied, were there identifiable harms to privacy or property? How are these harms linked to C-I-A? If not, what ethically significant harms could result from the scenario your group researched? 
  • For the      APT scenario, your group studied when the targeted organization identified in the breach were they transparent in their disclosure? Do you feel the organization acted ethically? 
  • Use additional sources of information but also describe the concept in layman’s terms.
  • Use visuals where appropriate.
  • While quality is valued over quantity, it is expected that a quality paper will result in a minimum length of 10–15 pages.

Who got me on this?

I completed the 2 previous assignment required for this essay. Now need to write a draft essay based on my selected sources. Check out the graded previous assignment, the guideline and the sample for more details.

Guessing game

 

The programming assignment for the final week, due on the final day of the course, if not before, has been modified in an attempt to allow for more creativity in the coding process.  An outline of the new assignment will follow as I do not have the ability to modify the template of the course.  I’d begin looking at it now and ask questions as you move forward. 

Programming Assignment #3 (25 points) *modified at the end*

This assignment will give you practice with while loops and pseudorandom numbers. You are
going to write a program that allows the user to play a simple game in which your program thinks
up an integer and allows the user to try to determine the number with a minimum number of tries.
For each incorrect try you will tell the user whether the right answer is higher or lower. Your
program is required to exactly reproduce the format and behavior of the log of execution at the end
of this write-up, so you may want to look that over first.

At a minimum, your program should have the following static methods in addition to method
main:
a method to give instructions to the user

a method to report overall results to the user

You may define more methods than this if you find it helpful, although you will find that the
limitation that methods can return only one value will tend to limit how much you can
decompose this problem.

You are to define a class constant for the maximum number used in the game. The sample below
selects a number from 1 to 100, but the choice of 100 is arbitrary. By introducing a constant for
100, you should be able to change just the value of the constant to make the program play the
game with a range of 1 to 50 or a range of 1 to 250 or some other range starting with 1.

When you ask the user whether or not to play again, you should use the “next()” method of the
Scanner class to read a one-word answer from the user. You should continue playing if this
answer begins with the letter “y” or the letter “Y”. Notice that the user is allowed to type words
like “yes”. You are to look just at the first letter of the user’s response and see whether it begins
with a “y” or “n” (either capitalized or not) to determine whether to play again.

Assume that the user always types an integer when trying, that the integer is always in an
appropriate range and that the user gives you a one-word answer beginning with “y”, “Y”, “n” or
“N” when asked whether to play again.

You will notice at the end of the log that you are to report various statistics about the series of
games played by the user. You are to report the total number of games played, the total number of
tries made (all games included), the average number of tries per game and the maximum number
of tries used in any single game. You should also report the user’s best game(s) indicating which
game(s) had the minimum number of tries and what that minimum was.

Here are a few helpful hints to keep in mind:

this program needs to generate pseudorandom numbers

To deal with the yes/no response from the user, you might want to use some of the String class
methods. You will want to use the next() method of the Scanner class to read a word from the
console.

Because this program uses pseudorandom numbers you won’t be able to recreate this exact
log. The key requirement is that you reproduce the format of this log and that your calculations
for overall statistics are correct for your log.

It’s a good idea to change the value of your class constant and run the program to make sure
that everything works right with the new value of the constant. For example, turn it into a
game for numbers between 1 and 5.

This program is more difficult than most to decompose into methods, so you may end up having
methods that are longer than 15 lines. You are required to have a while loop in main that plays
multiple games and prompts the user for whether or not to play another game. You shouldn’t
have all the code in main because you are required to have the methods described at the
beginning of this write-up.

You are expected to make appropriate choices about when to store values as int versus double,
which if/else constructs to use, what parameters to pass, and so on.

Your program should be stored in a file called Guess.java.

Include a comment at the beginning of your program with basic information and a description of
the program. This includes having an adequate comment header, commenting every line, and the
integrity statement.   The integrity statement must be included or the max score will be cut in half.

Turn in your screenshot in Word of the output with filename
JonBrownCIS1501ScreenShotsProgrammingAssignment3Jan122017 (your name, the course
name, the content of the file, and the date), Guess.java and Guess.class (Please make sure to
name your files exactly, including identical capitalization.) Then put all three files in one zip file.
The zip file should be named: your name, the course name, the content of the file, and the date
and then submit to the Assignments link on the course web page.

Log of execution (user input underlined)

This program allows you to play a game.
I will think of a number between 1 and 100
and will allow you to try to determine it.

For each try, I will tell you whether the
right answer is higher or lower than your
try.
I’m thinking of a number…

Your try? 20
higher

Your try? 40
higher

Your try? 60
higher

Your try? 80
higher

Your try? 100
lower

Your try? 90
lower

Your try? 88
lower

Your try? 86

Game #1: You got it right in 8 tries

Do you want to play again? Yes
I’m thinking of a number…

Your try? 20
higher

Your try? 40
higher

Your try? 60
higher

Your try? 80
higher

Your try? 82
higher

Your try? 84
higher

Your try? 86
higher

Your try? 88
higher

Your try? 90
higher

Your try? 92
higher

Your try? 94
lower

Your try? 93

Game #2: You got it right in 12 tries
Do you want to play again? YES
I’m thinking of a number…

Your try? 20
higher

Your try? 40
higher

Your try? 60
lower

Your try? 58
lower

Your try? 56

Game #3: You got it right in 5 tries
Do you want to play again? No
Overall results:

total games = 3
total tries = 25

tries/game = 8.333333333333334
max tries = 12

Your best game was Game#3 in 5 tries

Here are the modifications for this term.

  1. user must play at least 3 games and no more than 5
  2. you must ask the user how many games they wish to play right from the start; if they say less than 3 or more than 5, you must prompt them again, this time with instructions on the limits
  3. now you must capture the maximum value for each game offering a choice of 50, 100, 200 or 500 (other entries are not allowed)
  4. you must keep track of the number of guesses AND accumulate how far off each guess was from the given number (25 is 10 off from 35 and so is 45 (no negative values))

Sample output:

Let’s play a number guessing game.

How many games do you want to play?

6

I’m sorry.  We must play between 3 and 5 games.

How many do you want to play?

3

For these 3 games, what is the range of numbers we are going to use?  1 to __?

75

Acceptable answers are 50, 100, 200 or 500.  Please respond:

100

Good luck!

Game 1:

This program allows you to play a game.
I will think of a number between 1 and 100 <- display the user’s entered range max
and will allow you to try to determine it.

For each try, I will tell you whether the
right answer is higher or lower than your
try.
I’m thinking of a number…

(back and forth until the user gets the correct answer)

Your try? 20
higher

Your try? 40
higher

Your try? 60
higher

Your try? 80
higher

Your try? 82
higher

Game 1:

You got it right 5 guesses.

You were off by an average of 25.6 per guess.

(note: the answer was 82 and the guesses were off by 62, 42, 22, 2 and 0 which total 128/5 guesses = 25.6) **don’t print this

Good luck!

Game 2 begins now:

repeat the process

reset (or renew?) the counter for the number of tries/guesses

reset (or renew?) the counter for tracking the average amount off

Game 2:

output for the # of guesses and the off by an average of

repeat the process for the 3rd game and possibly the 4th and the 5th

output as well

For the final output:

Your best game in terms of lowest guesses was Game # (insert the number of the game with the least number of guesses) when you solved the game in ___ guesses.

Your best game in terms of closest guesses was Game # (insert the number of the game with the lowest average “off guess”) when you were off by an average of ___.

IF the #s of the best games match, the user should receive some special message from you.  For example, if your best game in terms of lowest guesses and closest guesses was, let’s say game #2, the user should see some sort of special message noting how well game #2 was played.

Doctoral candidates should provide an authentic personal statement to each of the five following questions/prompts reflecting on their own personal interest. In the event that any outside resources are used, resources should be cited in APA format. Submis

 

WRITTEN INTERVIEW QUESTIONS

Doctoral candidates should provide an authentic personal statement to each of the five following questions/prompts reflecting on their own personal interest. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to response to each prompt/question individually for clarity of the reviewer. Writing sample should be submitted in Microsoft Word format and include candidate’s name.

PhD IT

  1. Tell us about yourself and your personal journey that has lead you to University of the Cumberlands.
  2. What are your research interests in the area of information technology? How did you become interested in this area of research?
  3. What is your current job/career and how will this program impact your career growth?
  4. What unique qualities do you think you have that will help you in being successful in this program?
  5. How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC?

PhD/EdD Leadership

  1. Tell us about yourself and your personal journey that has lead you to University of the Cumberlands.
  2. What are your research interests in the area of leadership? How did you become interested in this area of research?
  3. What is your current job/career and how will this program impact your career growth?
  4. What unique qualities do you think you have that will help you in being successful in this program?
  5. How can obtaining a doctorate impact your contribution to the practices of leadership? Where do you see yourself after obtaining a doctorate from UC?

DBA/PhD Business

  1. Tell us about yourself and your personal journey that has lead you to University of the Cumberlands.
  2. What are your research interests in the area of business administration? How did you become interested in this area of research?
  3. What is your current job/career and how will this program impact your career growth?
  4. What unique qualities do you think you have that will help you in being successful in this program?
  5. How can obtaining a doctorate impact your contribution to the practices of business administration? Where do you see yourself after obtaining a doctorate from UC?

Its should be like really high-quality work. Focus on my education and background and interest for P.hd. Please note this is not a regular essay. It should be impressive one.