4/3 Discussion

There will be a final project due in Workshop Six. Note the information below related to the completion of the final project.

You will complete the final paper in the form of a compliance and governance plan for an organization. You may use your own organization (although you must change the name for confidentiality purposes) or use a fictitious company. You may use the internet to look for examples of privacy policies and compliance and governance plans; however, the plan you develop must be in your own words. The plan must cover the issues and concerns that need to be addressed by the plan, including the following:

  • Privacy issues of customers
  • Protection of intellectual property your organization possesses (assume the company has some copyrighted or patented material [e.g., software] or some product)
  • Cyberlaws that will apply to your organization

The paper should be outlined as follows:

  • Executive summary/introduction, including the issues and concerns to be addressed by the plan
  • Sections that address each of the concerns noted above
  • Conclusion

The paper should be about 15 pages in length (double-spaced), and transitions between sections should be addressed. Any graphics or tables do not count toward the page count. Make sure to use 7th edition of the APA style guide where required. The paper should include credible references that are cited according to the 7th edition of the APA style guide. You may and should use research to develop your plans, but make sure to cite your sources.

Topic: Organizational IT security management Strategy

    

Topic: Organizational IT security management Strategy 

  1. Background: Describe the issue, discuss the problem, and elaborate on any previous attempts to examine that issue.
     
  2. Research Questions: In your identified problem area that you are discussing, what were the research questions that were asked?
     
  3. Methodology: What approach did the researcher use, qualitative, quantitative, survey, case study? Describe the population that was chosen.
     
  4. Data Analysis: What were some of the findings, for example, if there were any hypotheses asked, were they supported?
     
  5. Conclusions: What was the conclusion of any data collections, e.g., were research questions answered, were hypotheses supported?
     
  6. Discussion: Here you can expand on the research and what the big picture means, how do the results found in the literature review help organizations in the Information Technology strategy planning. What do you see as long-term impacts and what further research could be done in the field
     

Write a Python program to find the duplicate elements

Write a Python program to find the duplicate elements in a given array of integers. Return -1 If there are no such elements. 2. Write a Python program to select all the Sundays of a specified year. 3. Python files reading and writing. Download the “exercise_02_data _collection.zip” to your local and un-zip it. Write a program to read all the txt files and save the sentences in all the files into one csv file with two columns, the first column is sentence id (txt file name+sentence line number), the second column is the sentence text content. (4 points) Remove all the punctuations from the sentences, save the processed sentences into a new column in the same csv file. Ask the user to enter a word, return all the sentences that include this word, three kinds of information should be returned: sentence id, sentence text content, the count that user input word appear in the sentence. 4.Install packages nltk, numpy, scipy, pandas, and sklearn on Google Colab. Write a program to test whether they are installed successfully.

emerging 3

 Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

ref

  

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Discussion question, 350 words and 3 references.

Protection of patient data has become a critical part of the scope of practice of all healthcare professionals. Routine data breaches underscore the importance of training clinical employees in protecting these data. However, beyond exposure to HIPAA regulations, little is done to educate the healthcare student about the risks and vulnerabilities of the online environment as it pertains to health data” (Swede, Scovetta, & Eugene-Colin, 2018). 

Search the peer-reviewed literature for examples of this. You may select any topic relating to technology that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature

Explain how to develop null and alternative hypotheses.

   Provide detailed answers for each
1. Explain the central limit theorem. (Ch 22(07), 10 points)
2. Describe the advantages and disadvantages of stratified random sampling, cluster sampling, and systematic sampling. (Ch 22(07), 10 points)
3. Describe hypothesis testing and explain how to develop null and alternative hypotheses. (Ch 23(09), 10 points)
4. Compare type I and type II errors. (Ch 23(09), 10 points)
5. Explain and compare independent simple random samples and matched samples. (Ch 24(10), 10 points) 

Ethics

 

“Human beings are made in the image of God” (Gen 1:27), so they should be treated as unique and special creations, and any organization should exercise compassion, dignity, fairness, and respect for all. This assignment asks students to consider the ethics behind data and its collection. It asks the fundamental question of whether or not it is acceptable for information to be gathered on private citizens for use of a greater purpose.

Information is collected on private citizens, as well as large and small companies. How this information is used has been, and still is, controversial. In 500 words or more, discuss ethics in the use of information with the Edward Snowden leak. Was it ethical for the CIA and other organizations to collect data on these citizens? Was it justified? What might this surveillance have prevented? From the Christian worldview, we are to support and encourage each other (John 13:35; 15:17; Ephesians 4:32). When necessary, we are to admonish and confront each other. If you were the judge for this case, how would you interpret this case, done in love, and with caution about our own shortcomings (Proverbs 27:5; Matthew 18:15-17; Galatians 6:1)?

Lab 1: Creating an Acceptable Use Policy

Part 1: Research Acceptable Use Policies (0/1 completed)

Note: In this part of the lab, you will review scholarly research on AUPs in order to form a basis for their purpose and usage. Understanding the reason for developing an AUP is key to understanding its component policies and procedures. Please take the time to review the research thoroughly and think through the concepts of the policy itself.

1. Using your favorite search engine, locate and read the following scholarly, peer-reviewed research article referencing AUPs:

Cramer, M., & Hayes, G. R. (2010). Acceptable use of technology in schools: Risks, policies, and promises. IEEE Pervasive Computing, 9(3), 37–44. https://doi.org/10.1109/MPRV.2010.42

Note: If you are unable to locate or access this research, find a similar scholarly, peer-reviewed article and provide a citation in your response.

2. Write a brief summary of the article. In your summary, focus on the need for an AUP and its key elements.

Part 2: Design an Acceptable Use Policy (0/1 completed)

Note: In this part of the lab, you will use what you learned from your research to design your own acceptable use policy.

  1. Review the example of an AUP on the SANS site: https://www.sans.org/reading-room/whitepapers/policyissues/acceptable-policy-document-369.

Note: While you evaluate the document, notice the following items:

  • The policy mentions positions rather than specific names.
  • The policy provides an overview of the topic but does not provide specifics on how a task will be completed. This point is the difference between a policy and a procedure.
  • The policy provides references to other policies or resources that were used to create it.

Keep this example in mind as you prepare for the next steps.

2. Consider the following fictional organization, which needs an acceptable use policy (AUP):

 

  • The organization is a local credit union with several branches and locations throughout the region.
  • A major focus for the organization is online banking.
  • The organization’s most critical business function is its customer service department.
  • The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
  • The organization wants to monitor and control use of the internet by implementing content filtering.
  • The organization wants to eliminate personal use of organization-owned IT assets and systems.
  • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
  • The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into its annual security awareness training.

Note: The best style for writing IT policy is straightforward and easy to understand. Avoid unnecessary wording and phrasing that could be understood more than one way. Write in concise, direct language.

3. Design an AUP for this fictional credit union, using the online example of the AUP as a template. Your policy does not need to be exhaustive, but it should outline the key components of an AUP and provide policy statements that address the above requirements. You may want to create your policy using word processing software on your local computer and then copy and paste the text into the deliverable field.

Challenge Exercise (0/3 completed)Note: The following exercise is provided to allow independent, unguided work using the skills you learned earlier in this lab – similar to what you would encounter in a real-world situation.

For this portion of the lab, you will utilize the AUP that you designed in Part 2. This exercise is designed to challenge your creativity by not providing industry guidelines or clues as provided in Part 2.

Select an industry other than banking. For example, you could choose manufacturing, higher education, or utilities.

Create a list of unique attributes of the business in your chosen industry.

Instead of creating an AUP, write a formal letter to the company’s CEO and board to explain the need for an AUP and your suggestions on the content of that policy.