Case Study and Lab work

Case Study 3.1

-Complete 3.4

Southwest Border Apprehensions and Unemployment 

Write a Summary Analysis of the problems and answers

Writing Requirements 

3-4 pages in length

APA formatting 

LAB 3

Chapter 4 

Problems 43 and 44 (Tableau table is optional , Create an excel chart in the line of the tableau chart

The Assignment must be an APA formatted paper with embedded excel files.

HR 5

minimum 500 words

Discuss the following questions: 1. What is Blockchain’s potential for application in the HR functions of recruitment and selection. 2. How might Blockchain technology impact job repositories. Use the following headings to organize your paper: Introduction, Question 1, Question 2, Conclusion, References.

Writing Requirements for All Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper 
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Data Analytics

 

1. Explain what analytics are? What are business analytics? Do they differ from other analytics and how? Explain why or why you cannot do analytics without data?  Explain why or why you cannot do analytics without big data?

2. Where do you get the data for analytics? Is all of it internal to the company? Identify at least 5 sources of external data and explain when you might be able to use them.

 

1. What is data mining? Why is data mining so popular? 

2. What are the privacy issues associated with data mining? Do you think they are substantiated? Why or why not? — ignore this question — already responded to in the discussion. 

3. Distinguish data mining from other analytical tools and techniques.

4. Discuss at least 3 data mining methods. What are the fundamental differences among them

The above assignments should be submitted in one-word document. Include an APA cover page and a reference page.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations)

R

 

Assessment  002 R Analysis and Report (maximum 3000 words)

In this assignment you are going to simulate data from an area chosen by yourself. It can be cyber related, healthcare, industrial, financial/credit card fraud, commerce – anything. However, run your ideas past me first before diving in. If you recall from the dplyr tutorials we were able to simulate small amounts of data based on several dataframes. We then linked the data we required using join() commands, etc. We then obtained summaries of the data and could use ggplot2 to highlight trends, etc.  

  1. Carefully, choose your domain. Give a rationale for simulating it.
  2. Define your data frames, generate them using sample_n and/or other commands. There is a package called charlatan you may find useful for generating personal names and other values. About 4-5 dataframes will suffice.
  3. Think about seeding trends and patterns in your simulated data that you can “detect” later.
  4. Use dplyr to extract the columns you need from the dataframes.
  5. Use some sort of analysis such as summaries to get statistics on your data. Break it down by a category variable such as e.g. time, gender, fraudulent V normal, etc.
  6. In the write-up, I will expect to see an introduction section, methods, and then sections for Simulation of data and transforming data, Analysis of data; marks for plots should of course be in the Analysis section.

Part 1: Analysis of the Data (70 marks)

You will need to develop R code to support your analysis, use dplyr where possible to get the numeric answers. Regarding ggplot2, be careful as to what type of plot you use and how you use them as you have many records and want the charts to be readable. You should place the R code in an appendix at back of the report (it will not add to word count).  Section each piece of code with # comments and screenshots of outputs.

  • Simulation of data (20 marks)
  • Transforming data (10 marks)
  • Analysis of data and plots (20 marks)
  • Write-up of the data analysis (similar format of my R tutorials) (20 marks)

Part 2: Scale-up Report (30 marks)

The second part will involve writing a report. Now assuming your Part 1 was an initial study for your organisation, what are the issues when you scale it up and start using it in practice?

  • Discussion of Cyber security, big data issues, and GDPR issues (20 marks)
  • Structure of report, neatness, references. Applies to both Part 1 and Part 2 (10 marks)

Penalties: Do not go over word limit of 3,000 (other than ±10%) as loss of marks will occur according to the university guidance on penalties.

Output: Submit PDF electronic copy to Canvas before the deadline, along with a file containing your R code. The data should be generated from the R code, so do not submit any data.

RSA Applications

 

You have taken courses in the key encryption created by Rivest,  Shamir, and Adelman (RSA) and have identified that many of the  associated applications that they offer could benefit the corporation in  cryptography.  You have been asked to present your recommendation for  an RSA application to the Board of Directors to consider purchasing at  least two of their associated applications, and you know that you must  present a strong case for such a purchase. 

  • Research the RSA associated applications and identify the associated benefits and costs. 
  • Your multimedia presentation must be a minimum of 10 slides with a minimum of four supporting APA references.  
  • Include charts and graphs if they support your recommendation

Cloud Computing Discussion 9

  

Describe in 500 words the shared security responsibility model that a dba must be aware of  when moving to the cloud.

Use at least three sources. Do not use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

discussion

 

Do you believe Artificial Intelligence or Machine Learning is the future of cybersecurity? Explain why or why not.