Quantitative Methodology vs Qualitative Methodology

Background: Quantitative data can be measured and documented with numbers. Additionally, quantitative data can be represented as quantities. On the other hand, qualitative data is not measured with numbers, but it is represented by qualities. For example, I use quantitative methods to conduct my PhD research because I like working with counts and measures.

Assignment: Write a research paper the contains the following:

  • Discuss Quantitative Methodology
  • Discuss Qualitative Methodology
  • Compare and contrast qualitative data vs quantitative data

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). 

portfolio project

 

Your final project paper is broken down into 4 parts, worth a total of 125 points towards your final grade. This milestone is worth 25 points.

For this piece of that assignment, you will write the introduction to your final portfolio project (1-2 pages), comprehensively describing the industry you are choosing to use in the paper and preliminary challenges with information governance that you have identified. Be sure to utilize 2-3 sources from the UC Library.

Review the instructions in the Final Paper document first (attached here). Each milestone is a separate writing assignment, leading up to the Final Paper.

Expectations are that it will be a scholarly work, using largely peer-reviewed resources, formatted to APA 7 style. Grammar, spelling, and punctuation are significantly weighted. Any instance of plagiarism will result in a 0 on the activity (first offence) or failing the course (2nd offence).

Week 3 Assignment – Business Intelligence

Complete the following assignment in one MS word document:

Chapter 5 –discussion question #1-4 & exercise 6 & internet exercise #7 (go to  neuroshell.com click on the examples and look at the current examples.  The Gee Whiz example is no longer on the page.)

Chapter 6– discussion question #1-5 & exercise 4

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Discussion 1

Create a discussion thread (with your name) and answer the following question:

Discussion 1 (Chapter 5): What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Discussion 2

Create a discussion thread (with your name) and answer the following question:

Discussion 2 (Chapter 6): List and briefly describe the nine-step process in con-ducting a neural network project.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Data Mining

Topic: Security, Privacy and Ethics in Data Mining.

In this task, you are required to read the journal articles provided below and write a short discussion paper based on the topic of security, privacy and ethics in data mining. You must:

identify the major security, privacy and ethical implications in data mining;

evaluate how significant these implications are for the business sector; and

support your response with appropriate examples and references (at least 2 additional references should be sought in addition to the ones below).

The recommended word length for this task is 700 to 1000 words.

Journal articles:

Ryoo, J. ‘Big data security problems threaten consumers’ privacy’ (March 23, 2016) theconversation.comhttp://theconversation.com/big-data-security-problems-threaten-consumers-privacy-54798

Tasioulas, J. ‘Big Data, Human Rights and the Ethics of Scientific Research’ (December 1, 2016) abc.net.auhttp://www.abc.net.au/religion/articles/2016/11/30/4584324.htm

final paper

  

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

IS331 COMPUTER NETWORKING

                                                                      TERM PAPER

                                                                       TOPIC: EIGRP (Enhanced Interior Gateway Routing Protocol)

 

The term paper for this class is worth 200 points, and it requires you to do a research and write a 2500 word paper describing one of the following TCP/IP routing protocols, RIPv2, OSPF or EIGRP. The paper will include the following:

  • The paper must have a distinct and well written Introduction, Supporting Body and Conclusion;
    • In the body include the following
      • The history of the protocol chosen;
      • The programmable parameters of the protocol and how they affect traffic flow;
      • The major differences between the routing protocol chosen and the others that were not chosen;
      • How the chosen protocol can be used in a modern day routed network environment.

THAT IS TEN PAGES IN DOUBLE SPACE EXCLUDING WORKS CITED AND NO PLAGIARISM. THE INSTRUCTIONS FOR THE ASSIGNMENT EMBEDDED IN THE UPLOAD FILE.

Comparison Outline

Software engineering tools for soft computing: MATLAB, R Tool and DTREG. Comparison should focus on how they are able to model neural networks. Also, pick criteria that compares things they all have in common.