Data Mining

Topic: Security, Privacy and Ethics in Data Mining.

In this task, you are required to read the journal articles provided below and write a short discussion paper based on the topic of security, privacy and ethics in data mining. You must:

identify the major security, privacy and ethical implications in data mining;

evaluate how significant these implications are for the business sector; and

support your response with appropriate examples and references (at least 2 additional references should be sought in addition to the ones below).

The recommended word length for this task is 700 to 1000 words.

Journal articles:

Ryoo, J. ‘Big data security problems threaten consumers’ privacy’ (March 23, 2016) theconversation.comhttp://theconversation.com/big-data-security-problems-threaten-consumers-privacy-54798

Tasioulas, J. ‘Big Data, Human Rights and the Ethics of Scientific Research’ (December 1, 2016) abc.net.auhttp://www.abc.net.au/religion/articles/2016/11/30/4584324.htm

final paper

  

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

IS331 COMPUTER NETWORKING

                                                                      TERM PAPER

                                                                       TOPIC: EIGRP (Enhanced Interior Gateway Routing Protocol)

 

The term paper for this class is worth 200 points, and it requires you to do a research and write a 2500 word paper describing one of the following TCP/IP routing protocols, RIPv2, OSPF or EIGRP. The paper will include the following:

  • The paper must have a distinct and well written Introduction, Supporting Body and Conclusion;
    • In the body include the following
      • The history of the protocol chosen;
      • The programmable parameters of the protocol and how they affect traffic flow;
      • The major differences between the routing protocol chosen and the others that were not chosen;
      • How the chosen protocol can be used in a modern day routed network environment.

THAT IS TEN PAGES IN DOUBLE SPACE EXCLUDING WORKS CITED AND NO PLAGIARISM. THE INSTRUCTIONS FOR THE ASSIGNMENT EMBEDDED IN THE UPLOAD FILE.

Comparison Outline

Software engineering tools for soft computing: MATLAB, R Tool and DTREG. Comparison should focus on how they are able to model neural networks. Also, pick criteria that compares things they all have in common. 

Write a program to provide the following tasks for a Dictionary object

Write a program to provide the following tasks for a Dictionary object:

  • Create and print a dictionary
  • Accessing items in a dictionary
  • Looping items through a dictionary
  • Change a value in a dictionary
  • Check if key exists in a dictionary
  • Print a dictionary length
  • Adding Items to a dictionary
  • Removing Items in a dictionary

Requirements:

  • Maximum four to five pages in length is required.
  • You must include program code and results.
  • You must include an explanation about how the program works.
  • You must show your work for full credit.
  • You must include a minimum of three credible sources. Use the Saudi Electronic Digital Library to find your resources.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

Disuccsion

How would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI?

250 words in APA format

Discussion

Discussion 4 – What is the role of NLP in text mining? Discuss the capabilities and limitations of NLP in the context of text mining.

Internet Exercise 7 – Go to kdnuggets.com. Explore the sections on applications as well as software. Find names of at least three additional packages for data mining and text mining.

Needs to be APA 7 formatted

APA Sources *

*Full PDF *

https://apastyle.apa.org/products/publication-manual-7th-edition-introduction.pdf?_ga=2.183019553.642115030.1600870599-379008561.1600870599

Sample Paper 

https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_sample_paper.html

*APA 6 vs APA 7 *

https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_changes_7th_edition.html

Risk Assessment

Briefly provide an overview/description of your fictitious company.

Identify and discuss the importance of risk assessment to the organization’s security framework? Discuss the five layers of risk.

word document edit

 

  1. Open the EmergencyProcedures-02.docx start file. If the document opens in Protected View, click the Enable Editing button so you can modify it.
  2. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  3. Change the theme to Integral and the theme color to Red.
  4. Change the top, bottom, left, and right margins to 0.75″.
  5. Select the entire document and change the font size to 12 pt.
  6. Format the title of the document.
    1. Select the title of the document and apply Heading 1 style.
    2. Open the Font dialog box, apply All caps effect, and change the font size to 16 pt.
    3. Change the Before paragraph spacing to 0 pt.
    4. Add a bottom border to the title using the Borders drop-down list.
  7. Apply and modify the Heading 2 style and delete blank lines.
    1. Apply the Heading 2 style to each of the bold section headings.
    2. Select the first section heading (“Emergency Telephones [Blue Phones]”).
    3. Change Before paragraph spacing to 12 pt. and After paragraph spacing to 3 pt.
    4. Apply small caps effect.
    5. Update Heading 2 style to match selection. All the section headings are updated.
    6. Turn on Show/Hide and delete all the blank lines in the document.
  8. Select the bulleted list in the first section and change it to a numbered list.
  9. Apply numbering format and formatting changes, and use the Format Painter.
    1. Apply numbering to the text below the section headings in the following sections: “Assaults, Fights, or Emotional Disturbances”; “Power Failure”; “Fire”; “Earthquake”; and “Bomb Threat.”
    2. Select the numbered list in the “Bomb Threat” section.
    3. Open the Paragraph dialog box, set Before and After paragraph spacing to 2 pt., deselect the Don’t add space between paragraphs of the same style check box, and click OK to close the dialog box.
    4. Use the Format Painter to copy this numbering format to each of the other numbered lists.
    5. Reset each numbered list so it begins with 1 (right-click the first item in each numbered list and select Restart at 1 from the context menu).
  10. Customize a bulleted list and use the Format Painter.
    1. Select the text in the “Accident or Medical Emergency” section.
    2. Create a custom bulleted list and use a double right-pointing triangle symbol (Webdings, Character code 56).
    3. Open the Paragraph dialog box and confirm the left indent is 0.25″ and hanging indent is 0.25″. If not, change the settings.
    4. Set Before and After paragraph spacing to 2 pt. and deselect the Don’t add space between paragraphs of the same style check box.
    5. Use the Format Painter to apply this bulleted list format to the following text in the following sections: “Tips to Professors and Staff” and “Response to Students.”
  11. Change indent and paragraph spacing and apply a style.
    1. Select the text below the “Emergency Telephone Locations” heading.
    2. Set a 0.25″ left indent.
    3. Set Before and After paragraph spacing to 2 pt.
    4. Confirm the Don’t add space between paragraphs of the same style box is unchecked (Paragraph dialog box).
    5. Apply Book Title style to each of the telephone locations in the “Emergency Telephone Locations” section. Select only the location, not the text in parentheses or following text.
  12. Change left indent and paragraph spacing and set a tab stop with a dot leader.
    1. Select the text below the “Emergency Phone Numbers” heading.
    2. Open the Paragraph dialog box and set a 0.25″ left indent for this text.
    3. Set Before and After paragraph spacing to 2 pt. and confirm the Don’t add space between paragraphs of the same style box is unchecked.
    4. Open the Tabs dialog box, set a right tab stop at 7″, and use a dot leader (2).
    5. Press Tab before the phone number (after the space) on each of these lines. The phone numbers align at the right margin with a dot leader between the text and phone number.
  13. Apply the Intense Reference style to the paragraph headings in the “Accident or Medical Emergency” section (“Life-Threating Emergencies” and “Minor Emergencies”). Include the colon when selecting the paragraph headings.
  14. Use the Replace feature to replace all instances of “Phone 911” with “CALL 911” with bold font style. Note: If previous Find or Replace criteria displays in the Replace dialog box, remove this content before performing this instruction.
  15. Insert a footer with document property fields and the current date that appears on every page.
    1. Edit the footer on the first page and use the ruler to move the center tab stop to 3.5″ and the right tab stop to 7″.
    2. Insert the Title document property field on the left. Use the right arrow key to deselect the document property field.
    3. Tab to the center tab stop and insert the Company document property field at center. Use the right arrow key to deselect the document property field.
    4. Tab to the right tab stop, insert (not type) the date (use January 1, 2020 format), and set it to update automatically.
    5. Change the font size of all the text in the footer to 10 pt.
    6. Add a top border to the text in the footer using the Borders drop-down list and close the footer.
  16. Use the Borders and Shading dialog box to insert a page border on the entire document.
    1. Use Shadow setting and solid line style.
    2. Select the fifth color in the first row of the Theme Colors (Dark Red, Accent 1) and 1 pt. line width.
  17. Center the entire document vertically (Hint: use the Page Setup dialog box).
  18. View the document in Side to Side page movement view [View tab, Page Movement group] and then return to Vertical page movement view.
  19. Save and close the document (Figure 2-119).
  20. Upload and save your project file.
  21. Submit project for grading.