Cryptography(subject) – Two page assignment for explaining and identifying differences between symmetric and asymmetric encryption and identify which one is the best

 In the second milestone writing assignment, you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.  

End search 1

Research project manager’s positions and please post the following. Please do not copy and paste from web sites.

  1. Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area. 
  2. In your opinion was any of the information that you uncovered in your search interesting or surprising?

Corporate Ethics Portfolio

 

The corporate Board of Directors has asked you to provide a portfolio of your research into the expansion of the company into the country you presented on in Wk 4.

Include an overall corporate code of ethics based on your review of professional associations, such as IEEE, ACM, SANS, ISACA, ASIS, and ISC(2). Include the following in your portfolio:

  • Based on the ethical challenges identified in Week 4, choose and depict 2 risks to the corporation related to each challenge in a 1-page table using either Microsoft Word, PowerPoint, or Excel.
  • A 1- to 2-page corporate code of ethics using Microsoft Word based on your review of professional associations, such as IEEE, ACM, SANS, ISACA, ASIS, and ISC(2), and the ethical challenges identified
  • A 1- to 2-page concise synopsis of classical ethical theories
  • A 1- to 2-page process to logically evaluate ethical dilemmas as they arise with the expansion of the company into the country you have chosen. Ensure that the process reflects the code of ethics you provide; for example, your process could start with identifying which part of the code applies to a particular new dilemma and move through assessing the various choices you could make along with any resulting consequences. The end goal is to help your corporation manage complex ethical questions with a variety of stakeholders.

All references need to adhere to APA guidelines and images should not be copied unless you’ve obtained author permission or used copyright-free images. 

Submit your assignment.

Hillclimbing and simulated anealing algorithms

write a hillclimbing algorithm to find maximum value of function f=|13.value(v)-170| where v is the input binary variable of 40bits and one counts the number of 1’s in v. set Max at 100 and thus reset algorithm 100 times for the global maximum and print the found maximum value for each reset separated by a comma in the output.txt file.

Note:For this the output should be local maxima,global maxima and so on… example:350,170,350,170,350,170

write a Simulated Anealing algorithm to find maximum value of function f=|14.value(v)-190| where v is the input binary variable of 50bits and one counts the number of 1’s in v. set Max at 200 and thus reset algorithm 100 times for the global maximum and print the found maximum value for each reset separated by a comma in the output.txt file.

Describe how to run the code. Write the code in Python.

Week

Association Analysis: Advanced Concepts

Cluster Analysis: Basic Concepts and Algorithms

Please pick a concept from above and   Explain why it was selected and note the various importance to data analytics.

Provide a summary of the research methods in each dissertation.

 

1. Provide a summary of the research methods in each dissertation.

Quantitative Methodology:
Dominguez, A. (2013). Evaluating the acceptance of cloud-based productivity computer solutions in small and medium enterprises (Order No. 3557596). Available from Dissertations & Theses @ Capella University; ProQuest Central; ProQuest Dissertations & Theses A&I; ProQuest Dissertations & Theses Global. (1346194891).

Qualitative Methodology:
Burkhead, R. L. (2014). A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management (Order No. 3682325). Available from Dissertations & Theses @ Capella University; ProQuest Central; ProQuest Dissertations & Theses A&I; ProQuest Dissertations & Theses Global. (1657429053).

Mixed Methods:
Srinivas, S. K. (2018). Security analytics tools and implementation success factors: Instrument development using delphi approach and exploratory factor analysis (Order No. 10807845). Available from Dissertations & Theses @ Capella University; ProQuest Dissertations & Theses A&I; ProQuest Dissertations & Theses Global. (2050214687).

2.  

  

Describe your concentration in the Ph.D. program. Then identify the top journals in your concentration. Here is a list of journals that are considered top journals.

Journal Databases on the UC Library Proquest, ACM, and IEEE:

Journal of the ACM

Communications of the ACM IEEE Transactions on Pattern Analysis

IEEE Transactions on Neural Networks

IEEE Transactions on Fuzzy Systems

Journal of Cryptology

Software and Systems Modeling

Journal of Machine Learning Research

IEEE Transaction on Software Engineering

Journal of Systems and Software

MIS Quarterly

Information Systems Research

Management Science

Journal of Management Info. Systems

Decision Sciences

Communications of the ACM

Decision Support Systems

European Journal of Info. Systems

ACM Transactions

Journal of AIS

Information Systems

ACM Computing Surveys

Journal of Information Systems

Journal of Strategic Info. Systems

Information and Management

Communications of the AIS

Journal of Database Management

Journal of Information Management

DATA BASE

Journal of Computer Info. Systems

Info. Resources Management Journal

Journal of Management Systems

Journal of the ACM

Omega

Journal of Info. Systems Management

Journal of Information Science

Human-Computer Interaction

Operations Research

Interfaces (INFORMS)

Int’l Journal of Human-Computer Studies

Journal of Information Systems Educ.

Knowledge Based Systems

Journal of Operations Research

Journal of Data Base Administration

Journal of Systems and Software

Expert Systems with Applications

Organizational Behavior and Human Decision

Journal of Systems Management

INFORM

Expert Systems Review

Journal of End-User Computing

Behavior and Information Technology

Communication Research

Simulation

AI Expert

Journal of Software Maintenance

Computers and Automation

Computers in Human Behavior

Look at these journals and identify two journals that have articles in your area of interest. Discuss why you selected each journal.

3.  Select two articles related to your area of interest(AI in IoT) from your top journals. Provide an annotated bibliography for each article and discuss how these articles identify a gap in the literature that you wish to address in your dissertation. 

Research paper and discussion

 Part 1: Research paper(7-10 pages).

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. 

This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives. In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction – What is an ERM?
  • Why Should an Organization Implement an ERM Application?
  • What are some Key Challenges and Solutions to Implementing an ERM?
  • What is Important for an Effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework/application.
  • Conclusion – Final thoughts/future research/recommendation

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism

Part 2: Discussion (500 words) & 2 responses

The article on IRB this week discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the University’s institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article.  

Please answer the following questions in your main post:

  • What are the main issues that the article addresses?
  • What is the Common Rule?
  • How is this issue related to information systems and digital privacy?