case study

 This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

 

  • 3 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles

Microsoft Access Problem

Need help with Microsoft Access

 

For the Week 3 Microsoft Access Module 1 Lab Assignment, you will develop a database for the gift shop at your local science museum. Use skills/techniques/concepts learned in the Microsoft Access Module 1. HINT: The finished Lab Assignment should include: 2 tables, 1 query, 1 form, and 1 report.

Problem: The Milledgeville, Georgia, science museum operates a gift shop that sells science-related products. The gift shop purchases the products from vendors that deal in science-related games, toys, and other merchandise. Currently, the information about the items and the vendors is stored in two tables. You are to create a database that will store the item and vendor information.

Perform the following tasks:

  1. Create a new blank database in which to store all data for the gift shop and save the database as LastnameFirstnameAccessLab1.accdb
  2. Import the Vendor table AND the Item table from the database (Module 1 Lab Assignment.accdb) into the new blank database you created in Step 1.
  3. Open the Vendor table.
    • Change the field size for the Vendor Code field to 2
    • Change the field size for the Vendor Name field to 25
    • Change the field size for the Telephone Number field to 12
    • Assign the caption VC to the Vendor Code field
    • Resize the columns to best fit the data
    • Save the changes to the table and close the table
  4. Open the Item table.
    • Change the field size for the Vendor Code field to 2
    • Change the field size for the Item Number field to 4
    • Change the field size for the Description field to 28
    • Add the caption Wholesale for the Wholesale Cost field, the caption Retail for the Retail Price field, and the caption VC for the vendor code
    • The On Hand field should be an Integer field
    • Resize the columns to best fit the data
    • Save the changes to the table and close the table
  5. Create a query for the Item table. Include the Item Number, Description, Wholesale Cost,
    Retail Price, and Vendor Code. Save the query as Item Query.
  6. Create a form for the Item table. Save the form as Item.
  7. Create a report for the Item table. Include the Item Number, Description, On Hand, and Wholesale Price. Save the report as Item Status Report.
  8. Change the telephone number for Asherton Wholesalers to 999-999-9999.
  9. Update the author (use your name) and title (use ‘Week 3 Microsoft Access Module 1 Lab Assignment’) in the document properties.

cryptography

  

Scenario

ABC Insurance Company is one of the largest insurance companies in U.S. It has several branches/agents across the nation. Their branches can communicate with the central company headquarters and with each other through computer network. Customer information and company sensitive data has to be protected at all times. ABC Insurance Company has database servers, J2EE application server, and web application server for its employers to access. It allows the customers to access insurance policy information, purchase, and change or cancel insurance policies online, and other services. The customers include individual policy holders and business policy holders. 

The company employees and the customers need login accounts to access the company servers. The company adopts the JRA architecture for the log-in capability. This infrastructure has many components. Many of the components consist of active directories, web servers, and databases. Each of the JRA architectures has a Business to Enterprise connection which is internal, Business to Customers which is individual policy customers and Business to Business which is business customers with the insurance company. These connections are called realms. Each realm is located at a different physical location. 

ABC Insurance Company holds customer information which is a valued asset to the company. The company has to ensure that this information is confidential to have the customers’ trust. The company has to protect the customers’ insurance policies which are the drive for the company’s success. Agents’ login credentials and data needs to be secure too. 

A problem with ABC Insurance Company is the amount of hours needed to maintain the architecture. ABC Insurance Company wants a different way to implement this architecture. It was suggested to virtualize the JRA architecture. Virtualization can enable processes to share resources more efficiently. This would have different operating systems, web servers, and databases run on a virtual machine. Each realm would run on one machine as a virtual realm. This would cut down component costs, and cut down manpower to maintain the architecture. Two or more realms can run on one machine if they face the same kind of risks.

Case Objectives:

  • Identify the vulnerabilities involved      in implementing a new technology. Refer to NIST RMF as you will need to      include this plan for this assignment.
  • Determine the      likelihood for a potential vulnerability. 
  • Create a plan for Enterprise      Governance, Risk and Compliance (eGRC) which shall also include a support      plan.
  • Should include process integration      for eGRC, workflows and enterprise change processes. For example, could      look ServiceNow Enterprise Management platform.
  • Assess risk considering the      likelihood of the occurrence of vulnerability, the information asset      value, current controls and the uncertainty of current knowledge.
  • Determine the      adverse impact resulting from a successful threat exercise of      vulnerability.
  • Formulate a      cost benefit analysis on adopting a new technology.
  • Assess risk      level according to the likelihood of a vulnerability being exploited, and      the impact of the vulnerability.
  • Recommend      risk mitigation strategies for controlling risks.
  • Evaluate      the risk mitigation strategies.

· Describe Twofish and El Gamal

o Functions

o Strengths and Weaknesses

o Structure and processes

o Alternatives besides tables to thwart timing attacks 

o Relevant examples of modern applications/industry that utilize each algorithm

  • All      must be formulated within a risk management plan cover each section.

Requirements:

• Minimum of 1,250 words / Maximum 1,800 words (Double spaced)

• APA style

• At least 7 works cited 

• At least 5 of your references have to be scholarly peer-reviewed articles

Blockchain

 We have viewed how Blockchain has made a significant impact on businesses and industries.  Select one industry and highlight the advancements Blockchain has had on that single industry.Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Two separate questions

 If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?  500 words 

 Consider the data flow “octopus,”. How can the analysis system gather data from all these sources that, presumably, are protected themselves? 300 words

 

computer sceince question

   The collection of data has changed not only the way which we live and work, but also how we communicate. Social media generates tremendous amounts of data which are used from everything from advertising to urban planning.Your assignment for the week is to perform a brief analysis on the Facebook data provided by Leskovec. Your analysis should include the following:

  • Explain how the data were created.
  • Determine weaknesses/areas of improvement in the data.
  • Identify what research is based off this data.
  • Predict what future research could be based off of this data.
  • Summarize how the data are structured/stored.

Your submission should also include a brief sample research area in which the information could be used. In short, you should actually perform a study using this data. However, for this sample exercise, it may be kept brief (1-2 pages of the final assignment submission).Support your assignment with at least five scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.  Total Length: 8-10 pages, not including title and reference pagesYour assignment should demonstrate thoughtful consideration of the ideas and concepts presented in the course by providing new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards. Be sure to adhere to Northcentral University’s Academic Integrity Policy.  

Paper On employment challenge in the digital era

 Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as time goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

The paper should be one page in length and adhere to APA formatting standards.

**Remember the page length does not include the APA cover page or any references**

 

TextBook: 

Information Technology and Organizational Learning

ISBN: 9781498775755

Authors: Arthur M. Langer

Publisher: CRC Press: Taylor & Francis Group

Publication Date: October 2017

Edition: 3rd ED.

security control

 

Module 03 Content

  1. For this part of your Course Project, you will use the following Trust Service Principle:
    “Logical access security software, infrastructure, and architectures have been implemented to support (1) identification and authentication of authorized users; (2) restriction of authorized user access to system components, or portions thereof, authorized by management, including hardware, data, software, mobile devices, output, and offline elements; and (3) prevention and detection of unauthorized access.”
    Add at least 5 security controls into the XYZ Security Controls Matrix which can be used by XYZ Technologies to adhere to the above trust service principle. Each column of information should include the following:
    XYZ Security Control Matrix.docx

    • Control Activity – The written security control for XYZ Technologies
    • Evidence of Performance of Control – A description of the evidence used to validate the function of the control.
    • Test Plan – How the control will be tested to determine is operating effectiveness.
    • Review Interval – How often the control will be tested throughout the recording period: Daily, Weekly, Monthly, Quarterly, Bi-Annual, Annually
    • Additional requirements are: all three criteria in the trust service principle should be addressed by at least one control.
      Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.
NLU LOGO

Why Data Analysis

 

Module 1: What is Data Analytics?

Project Proposal Instructions

For your final project and presentation in this course, you will need to propose a dataset to analyze. This proposal has four parts, in which you will choose your dataset, provide the background for that dataset including why you chose it and from where, provide information on the data itself, and provide an image from your imported data.

This assignment is due by 11:59 CT on Sunday.

Deliverables:

A word document containing writing, tables, and images from Part 1, Part 2, Part 3 and Part 4.
Your chosen dataset

PART 1: CHOOSING A DATASET

For the project in this course you will need to choose a dataset to analyze. This dataset will need to meet the following requirements:

  • has at least 5 fields (at least three should be numeric)
  • has at least 100 rows
  • data is labeled

Recommended sites to find a dataset:

PART 2: DATASET BACKGROUND

Write a summary describing the topic of the dataset. Include: why you chose that dataset, where it came from, and what kind of problem you could solve with it.

PART 3: DATASET INFO

Provide information on the dimensions of the dataset. Include information on the fields and their data types. Be sure to state if they are continuous/numeric or categorical?

PART 4: IMPORT YOUR DATASET

Provide an image of the results of importing your dataset and using the head() function for printing.

National Louis UniversityNLU LOGO