Need Practical Connection Assignment
Provide a summary of the research methods in each dissertation.
1. Provide a summary of the research methods in each dissertation.
Quantitative Methodology:
Dominguez, A. (2013). Evaluating the acceptance of cloud-based productivity computer solutions in small and medium enterprises (Order No. 3557596). Available from Dissertations & Theses @ Capella University; ProQuest Central; ProQuest Dissertations & Theses A&I; ProQuest Dissertations & Theses Global. (1346194891).
Qualitative Methodology:
Burkhead, R. L. (2014). A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management (Order No. 3682325). Available from Dissertations & Theses @ Capella University; ProQuest Central; ProQuest Dissertations & Theses A&I; ProQuest Dissertations & Theses Global. (1657429053).
Mixed Methods:
Srinivas, S. K. (2018). Security analytics tools and implementation success factors: Instrument development using delphi approach and exploratory factor analysis (Order No. 10807845). Available from Dissertations & Theses @ Capella University; ProQuest Dissertations & Theses A&I; ProQuest Dissertations & Theses Global. (2050214687).
2.
Describe your concentration in the Ph.D. program. Then identify the top journals in your concentration. Here is a list of journals that are considered top journals.
Journal Databases on the UC Library Proquest, ACM, and IEEE:
Journal of the ACM
Communications of the ACM IEEE Transactions on Pattern Analysis
IEEE Transactions on Neural Networks
IEEE Transactions on Fuzzy Systems
Journal of Cryptology
Software and Systems Modeling
Journal of Machine Learning Research
IEEE Transaction on Software Engineering
Journal of Systems and Software
MIS Quarterly
Information Systems Research
Management Science
Journal of Management Info. Systems
Decision Sciences
Communications of the ACM
Decision Support Systems
European Journal of Info. Systems
ACM Transactions
Journal of AIS
Information Systems
ACM Computing Surveys
Journal of Information Systems
Journal of Strategic Info. Systems
Information and Management
Communications of the AIS
Journal of Database Management
Journal of Information Management
DATA BASE
Journal of Computer Info. Systems
Info. Resources Management Journal
Journal of Management Systems
Journal of the ACM
Omega
Journal of Info. Systems Management
Journal of Information Science
Human-Computer Interaction
Operations Research
Interfaces (INFORMS)
Int’l Journal of Human-Computer Studies
Journal of Information Systems Educ.
Knowledge Based Systems
Journal of Operations Research
Journal of Data Base Administration
Journal of Systems and Software
Expert Systems with Applications
Organizational Behavior and Human Decision
Journal of Systems Management
INFORM
Expert Systems Review
Journal of End-User Computing
Behavior and Information Technology
Communication Research
Simulation
AI Expert
Journal of Software Maintenance
Computers and Automation
Computers in Human Behavior
Look at these journals and identify two journals that have articles in your area of interest. Discuss why you selected each journal.
3. Select two articles related to your area of interest(AI in IoT) from your top journals. Provide an annotated bibliography for each article and discuss how these articles identify a gap in the literature that you wish to address in your dissertation.
CPSC 355 Assignment 3
Armv8 Assembly
Lab activity – computer science
Work through the Module 8: Lab Activity (located in this module) and submit the deliverables listed in the document
Research paper and discussion
Part 1: Research paper(7-10 pages).
Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial.
This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives. In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:
- Introduction – What is an ERM?
- Why Should an Organization Implement an ERM Application?
- What are some Key Challenges and Solutions to Implementing an ERM?
- What is Important for an Effective ERM?
- Discuss at least one real organization that has been effective with implementing an ERM framework/application.
- Conclusion – Final thoughts/future research/recommendation
The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism
Part 2: Discussion (500 words) & 2 responses
The article on IRB this week discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the University’s institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article.
Please answer the following questions in your main post:
- What are the main issues that the article addresses?
- What is the Common Rule?
- How is this issue related to information systems and digital privacy?
term project
Instructions are attached.
2 Discussions and 1 case Study
Discussion 7.1
What are the 5 pillars of Cyberwarfare?
Discussion 7.2
Describe the 5 stages of APT
100-130 Words only for discussions
Case Study 7.1
Describe 3 theories/ideas that you think characterize the future of Cyberwarfare, and explain their significance.
Writing Requirements
- 3-4 pages in length (excluding cover page, abstract, and reference list).
Refrences should not be older than 2015
Refrences should not be older than 2015
Refrences should not be older than 2015
Refrences should not be older than 2015
Article Summary
– Find 2-3 recent peer-reviewed articles (within the past 3 years) that ‘closely relate to Impact of Mobile Computing on Businesses’
– Should be a minimum of 750 words
– There should be no plagiarism. Attach a Turnitin report with a 0% similarity index.
Assembly Language
Write an assembly language program that reads move review information from a text file and reports the overall scores for each movie as well as identifying the movie with the highest total score. There are four movie reviewers numbered from 1 to 4. They are submitting reviews for five movies, identified by the letters from “A” through “E”. Reviews are reported by using the letter identifying the movie, the review rating, which is a number from 0 to 100, and the reviewer’s identifying number. For example, to report that movie B was rated a score of 87 by reviewer 3, there will be a line in the text file that looks like this:
B,87,3
The fields within each record are separated from each other by a comma.
Your program must store the movie review scores in a two-dimensional array (4 rows by 5 columns). Each row represents a reviewer. Each column represents a movie. Initialize the array to zeroes and read the movie review information from a file. After reading and processing the whole file, display a report that shows the total score for each movie and the movie that had the highest total score.
Section 9.4 of our textbook discusses two-dimensional arrays. Section 9.4.2 discusses Base-Index Operands and even contains an example of how to calculate a row sum for a two-dimensional array.
Chapter 11 contains an example program named ReadFile.asm that will show you how to prompt the user for a file name, open a file, read its contents, and close the file when you are done. Look in section 11.1.8, Testing the File I/O Procedures.
Each record in a text file is terminated by the two characters, Carriage Return (0Dh) and Line Feed (0Ah).
Assume that you wish to process a text file named “reviews.txt” that is stored on the “C:” drive in the “Data” folder. If you are using a Windows computer, you have two ways to identify the path to the file’s location:
C:/Data/reviews.txt OR C:\Data\reviews.txt
Double backslash characters () are needed because a single backslash is defined as being the first part of an escape sequence such as newline (n).
This code can be used to load a reviewer’s score into the array of movie reviews:
; Insert score at reviews[rowIndex][colIndex]
mov edx,rowSize ; row size in bytes
mov eax,rowIndex ; row index
mul edx ; row index * row size
mov index,eax ; save row index * row size
mov eax,colIndex ; load col index
shl eax,2 ; eax = colIndex * 4
add eax,index ; eax contains offset
mov edx,score ; edx = reviewer’s score
mov ebx,OFFSET reviews ; array of review scores
mov [ebx + eax],edx ; Store score for movie
Sample Data for Review.txt
D,84,2
A,90,3
A,87,4
B,35,4
B,100,1
C,75,1
D,84,1
B,87,2
A,0,2
C,25,2
D,45,3
E,35,3
A,90,1
B,100,3
C,75,3
E,35,1
C,78,4
E,35,2
D,100,4
E,0,4
Project 5
Scenario
After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.
Consider the following questions for collecting and handling evidence:
1. What are the main concerns when collecting evidence?
2. What precautions are necessary to preserve evidence state?
3. How do you ensure evidence remains in its initial state?
4. What information and procedures are necessary to ensure evidence is admissible in court?
Tasks
Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.
Address the following in your policy:
§ Description of information required for items of evidence
§ Documentation required in addition to item details (personnel, description of circumstances, and so on)
§ Description of measures required to preserve initial evidence integrity
§ Description of measures required to preserve ongoing evidence integrity
§ Controls necessary to maintain evidence integrity in storage
§ Documentation required to demonstrate evidence integrity
Required Resources
§ Internet access
§ Course textbook
Submission Requirements
§ Format: Microsoft Word (or compatible)
§ Font: Times New Roman, size 12, double-space
§ Citation Style: APA
§ Length: 3 pages
Self-Assessment Checklist
§ I created a policy that addressed all issues.
§ I followed the submission guidelines.