Provide a summary of the research methods in each dissertation.

 

1. Provide a summary of the research methods in each dissertation.

Quantitative Methodology:
Dominguez, A. (2013). Evaluating the acceptance of cloud-based productivity computer solutions in small and medium enterprises (Order No. 3557596). Available from Dissertations & Theses @ Capella University; ProQuest Central; ProQuest Dissertations & Theses A&I; ProQuest Dissertations & Theses Global. (1346194891).

Qualitative Methodology:
Burkhead, R. L. (2014). A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management (Order No. 3682325). Available from Dissertations & Theses @ Capella University; ProQuest Central; ProQuest Dissertations & Theses A&I; ProQuest Dissertations & Theses Global. (1657429053).

Mixed Methods:
Srinivas, S. K. (2018). Security analytics tools and implementation success factors: Instrument development using delphi approach and exploratory factor analysis (Order No. 10807845). Available from Dissertations & Theses @ Capella University; ProQuest Dissertations & Theses A&I; ProQuest Dissertations & Theses Global. (2050214687).

2.  

  

Describe your concentration in the Ph.D. program. Then identify the top journals in your concentration. Here is a list of journals that are considered top journals.

Journal Databases on the UC Library Proquest, ACM, and IEEE:

Journal of the ACM

Communications of the ACM IEEE Transactions on Pattern Analysis

IEEE Transactions on Neural Networks

IEEE Transactions on Fuzzy Systems

Journal of Cryptology

Software and Systems Modeling

Journal of Machine Learning Research

IEEE Transaction on Software Engineering

Journal of Systems and Software

MIS Quarterly

Information Systems Research

Management Science

Journal of Management Info. Systems

Decision Sciences

Communications of the ACM

Decision Support Systems

European Journal of Info. Systems

ACM Transactions

Journal of AIS

Information Systems

ACM Computing Surveys

Journal of Information Systems

Journal of Strategic Info. Systems

Information and Management

Communications of the AIS

Journal of Database Management

Journal of Information Management

DATA BASE

Journal of Computer Info. Systems

Info. Resources Management Journal

Journal of Management Systems

Journal of the ACM

Omega

Journal of Info. Systems Management

Journal of Information Science

Human-Computer Interaction

Operations Research

Interfaces (INFORMS)

Int’l Journal of Human-Computer Studies

Journal of Information Systems Educ.

Knowledge Based Systems

Journal of Operations Research

Journal of Data Base Administration

Journal of Systems and Software

Expert Systems with Applications

Organizational Behavior and Human Decision

Journal of Systems Management

INFORM

Expert Systems Review

Journal of End-User Computing

Behavior and Information Technology

Communication Research

Simulation

AI Expert

Journal of Software Maintenance

Computers and Automation

Computers in Human Behavior

Look at these journals and identify two journals that have articles in your area of interest. Discuss why you selected each journal.

3.  Select two articles related to your area of interest(AI in IoT) from your top journals. Provide an annotated bibliography for each article and discuss how these articles identify a gap in the literature that you wish to address in your dissertation. 

Research paper and discussion

 Part 1: Research paper(7-10 pages).

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. 

This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives. In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction – What is an ERM?
  • Why Should an Organization Implement an ERM Application?
  • What are some Key Challenges and Solutions to Implementing an ERM?
  • What is Important for an Effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework/application.
  • Conclusion – Final thoughts/future research/recommendation

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism

Part 2: Discussion (500 words) & 2 responses

The article on IRB this week discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the University’s institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article.  

Please answer the following questions in your main post:

  • What are the main issues that the article addresses?
  • What is the Common Rule?
  • How is this issue related to information systems and digital privacy?

2 Discussions and 1 case Study

Discussion 7.1

What are the 5 pillars of Cyberwarfare?

Discussion 7.2

Describe the 5 stages of APT 

100-130 Words only for discussions 

Case Study 7.1

Describe 3 theories/ideas that you think characterize the future of Cyberwarfare, and explain their significance.

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list).

Refrences should not be older than 2015

Refrences should not be older than 2015

Refrences should not be older than 2015

Refrences should not be older than 2015

Article Summary

 

– Find 2-3 recent peer-reviewed articles (within the past 3 years) that  ‘closely relate to Impact of Mobile Computing on Businesses’  

– Should be a minimum of 750 words

– There should be no plagiarism. Attach a Turnitin report with a 0% similarity index.

Assembly Language

 Write an assembly language program that reads move review information from a text file and reports the overall scores for each movie as well as identifying the movie with the highest total score. There are four movie reviewers numbered from 1 to 4. They are submitting reviews for five movies, identified by the letters from “A” through “E”. Reviews are reported by using the letter identifying the movie, the review rating, which is a number from 0 to 100, and the reviewer’s identifying number. For example, to report that movie B was rated a score of 87 by reviewer 3, there will be a line in the text file that looks like this:

B,87,3

The fields within each record are separated from each other by a comma.

Your program must store the movie review scores in a two-dimensional array (4 rows by 5 columns). Each row represents a reviewer. Each column represents a movie. Initialize the array to zeroes and read the movie review information from a file. After reading and processing the whole file, display a report that shows the total score for each movie and the movie that had the highest total score.

Section 9.4 of our textbook discusses two-dimensional arrays. Section 9.4.2 discusses Base-Index Operands and even contains an example of how to calculate a row sum for a two-dimensional array.

Chapter 11 contains an example program named ReadFile.asm that will show you how to prompt the user for a file name, open a file, read its contents, and close the file when you are done. Look in section 11.1.8, Testing the File I/O Procedures.

Each record in a text file is terminated by the two characters, Carriage Return (0Dh) and Line Feed (0Ah).

Assume that you wish to process a text file named “reviews.txt” that is stored on the “C:” drive in the “Data” folder. If you are using a Windows computer, you have two ways to identify the path to the file’s location:

C:/Data/reviews.txt        OR C:\Data\reviews.txt

Double backslash characters () are needed because a single backslash is defined as being the first part of an escape sequence such as newline (n).

This code can be used to load a reviewer’s score into the array of movie reviews:

; Insert score at reviews[rowIndex][colIndex]

mov      edx,rowSize           ; row size in bytes

    mov      eax,rowIndex         ; row index

    mul      edx                   ; row index * row size

    mov      index,eax             ; save row index * row size

    mov      eax,colIndex         ; load col index

    shl      eax,2                 ; eax = colIndex * 4

    add      eax,index             ; eax contains offset

    mov      edx,score             ; edx = reviewer’s score

    mov      ebx,OFFSET reviews   ; array of review scores

    mov      [ebx + eax],edx       ; Store score for movie

Sample Data for Review.txt

D,84,2
A,90,3
A,87,4
B,35,4
B,100,1
C,75,1
D,84,1
B,87,2
A,0,2
C,25,2
D,45,3
E,35,3
A,90,1
B,100,3
C,75,3
E,35,1
C,78,4
E,35,2
D,100,4
E,0,4

Project 5

  

Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

§ Description of information required for items of evidence

§ Documentation required in addition to item details (personnel, description of circumstances, and so on)

§ Description of measures required to preserve initial evidence integrity

§ Description of measures required to preserve ongoing evidence integrity

§ Controls necessary to maintain evidence integrity in storage

§ Documentation required to demonstrate evidence integrity

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 3 pages

Self-Assessment Checklist

§ I created a policy that addressed all issues.

§ I followed the submission guidelines.