Classification techniques

Review the article by Hemmatian (2019), on classification techniques and answer the following questions:

  1. What were the results of the study?
  2. Note what opinion mining is and how it’s used in information retrieval.
  3. Discuss the various concepts and techniques of opinion mining and the importance to transforming an organizations NLP framework.

Follow APA7 format.  There should be headings to each of the questions above and include Introduction and conclusion as well.  Ensure there are at least two-peer reviewed sources to support your work. The paper should be at least 2-3 pages of content (this does not include the cover page or reference page).

Easy own words, APA with citations

  • Read the Starbucks case study. This case study uses Porter’s Value Chain and Five Forces models and a SWOT (strengths-weaknesses-opportunities) analysis to develop strategic recommendations (review videos posted in week 1). 
  • On page 7 of the Starbucks case study there are 10 recommendations. Choose 3 of the recommendations and identify how IT could be used as part of the implementation of that recommendation.
  • Research in the library how other companies have done something similar for each of your 3 recommendations.
  • Your paper should be at least 3 pages, not counting the title and reference pages. The paper must include at least 3 references from peer-reviewed articles in academic journals or authoritative sources (include an author and publish date).
  • Make sure you have in-text citations and a reference page. You can include additional references from websites and books. 
  • Quotes should be used minimally and support the view you are presenting in the assignment.

https://scholar.harvard.edu/files/nithingeereddy/files/starbucks_case_analysis.pdf

Same day turn around please

Due Thursday 

Respond to the following in a minimum of 175 words: 

  • Discuss ways in which social media platforms can be used to advance your career or open new career opportunities.
  • How can they hurt your chances for advancement in the workplace?

HIPAA Compliance planning

Your company is a security service contractor that consults with businesses in the U.S. that require assistance in complying with HIPAA. You advertise a proven track record in providing information program security management, information security governance programs, risk management programs, and regulatory and compliance recommendations. You identify vulnerabilities, threats, and risks for clients with the end goal of securing and protecting applications and systems within their organization.

Your client is Health Coverage Associates, a health insurance exchange in California and a healthcare covered entity. The Patient Protection and Affordable Care Act (ACA) enables individuals and small businesses to purchase health insurance at federally subsidized rates. In the past 6 months, they have experienced:

  • A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client protected health information (PHI) that allowed access to PHI stored within the database
  • An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized to have access to the PHI
  • An unauthorized access to client accounts through cracking of weak passwords via the company’s website login

Health Coverage Associates would like you to develop a security management plan that would address the required safeguards to protect the confidentiality, integrity, and availability of sensitive data from the attacks listed above and protect their assets from the vulnerabilities that allowed the attacks to occur. 

Write a 1- to 2-page high-level executive summary of the legal and regulatory compliance requirements for Health Coverage Associates executives. The summary should provide

  • Accurate information on the HIPAA requirements for securing PHI
  • FISMA and HIPAA requirements for a security plan
  • Scope of the work you will perform to meet the Health Coverage Associates’ requests

Compile a 1-to 2-page list of at least 10 of the CIS controls that provide key alignment with the administrative (policies), physical (secured facilities), and technical safeguards required under HIPAA to protect against the attacks listed above. Include corresponding NIST controls mapped to the selected CIS controls.

Write a 1- to 2-page concise outline of the contents of the security management plan. Include

  • Policies Health Coverage Associates will need to manage, protect, and provide access to PHI
  • The recommended risk management framework Health Coverage Associates should adopt
  • Key elements Health Coverage Associates should include in its plan of actions and milestones

Cite all sources using APA guidelines.

DAT/305

Respond to the following required content in a minimum of 175 words:

  1. Discuss the Boyer-Moore string search algorithm bad character and good suffix rule.
  2. Discuss how you would implement the Boyer-Moore string search algorithm to carry out a string search in literature or provide and thoroughly discuss a real-life example where a Boyer-Moore string search could be used.

Draw an ER diagram for the following scenario:

Anglo Coal RSA is creating a database to keep track of all the employees in the company. Each employee’s name, surname, contact information and employees start date needs to be kept. There are different positions at Anglo Coal that indicate a different salary, medical aid and if you qualify for danger pay. There are different departments over the country. Anglo would like to know who works in what department and where that department is.  

Submissions should be a maximum of 500 words or 125 words per question/prompt.

Ph.D. candidates should provide authentic personal statements to each of the five following questions/prompts reflecting on their own personal interests. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to respond to each prompt/question individually for the clarity of the reviewer. Documents should be submitted in Microsoft Word format.
 

1. Provide a brief introduction focusing on your education, career, and decision to apply to the X University.

2. In relation to your doctoral program application, what area of recent research in the field would you want to study, and why?

3. How does your current vocation relate to your application to the doctoral program?

4. How will your experiences and personal skills help you to be successful in your program?

5. What long-term goals do you have for applying your learning from your doctoral program?

Using the Cloud at Scale

There are many ways to utilize the cloud. Using the concept of microservices, explain how the cloud can help scale your application from 10 users to a billion. Why do microservices and web services (REST) enable this, whereas an application running on a single server or group of clustered servers does not?

Parameters:

  • 4 paragraphs