RM-RESEARCH-DISCUSS-6-7

DISCUSSION:

Should be between 250-to-300 words. 

DUE DATE: Saturday End of Day USA time ( 5 days from now)

Reply: I need 2 replies. Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO) 

DUE DATE: Saturday End of Day USA time (5 days from now)

Topic:

After reading the below article this week, please answer the following two questions with references:

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

Article:

https://www.mdpi.com/1999-5903/11/9/195

RESEARCH:

Need this research paper by Monday USA time. (7 days from now).

5 pages excluding references and cover page. Follow APA 7 format and citations.

TOPIC:

Please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately 5 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

term paper

Write a 7-8-page  (of content not including the abstract, title, or reference pages) APA formatted paper on a business problem that requires data mining, why the problem is interesting, the general approach you plan to take, what kind of data you plan to use, and finally how you plan to get the data. You should describe your problem, approach, dataset, data analysis, evaluation, discussion, references, and so on, in sufficient details, and you need to show supporting evidence in tables and/or figures. You need to provide captions for all tables and figures. Please be sure to provide the title of the paper, and then note the business problem that requires data mining, note why the problem is interesting to you as well.  Please be sure to list 3-5 references as well this week.

Research paper – APA format – Intro to data Mining

  

Week 2 Individual Project

Please be sure to review Chapter #2 and Chapter #3.  After reviewing the content, please answer the following 5 questions.  Please be sure to provide adequate support for your answer. 

Please be sure to list at least 2 references in APA format.

Going outside the classroom and researching can enhance the learning. 

1. Can you think of a situation in which identification numbers would be useful for prediction? (15 pts)

 

2. Give at least two advantages to working with data stored in text files instead of in a binary format (15 pts)

3. Identify at least two advantages and two disadvantages of using color to visually represent information. (15 pts)

 

4. Discuss the advantages and disadvantages of using sampling to reduce the number of data objects that need to be displayed. Would simple random sampling (without replacement) be a good approach to sampling? Why or why not? (15 pts)

 

5. Describe one advantage and one disadvantage of a stem and leaf plot with respect to a standard histogram. (15 pts)

Textbook : Introduction to Data Mining by Pang-Ning Tan,Michael Steinbach and Vipin Kumar 

Data mining

 

DATA MINING AND ANALYTICAL TECHNOLOGIES

Assignment Overview

There are two principal sources for this module’s Case:

NY Times article on data mining

http://www.nytimes.com/2007/05/20/business/yourmoney/20compute.html

Kurt Thearling (1997) Understanding Data Mining: It’s All in the Interaction. DSStar. December 9 [available at http://www.thearling.com/text/dsstar/interaction.htm]

As noted earlier, you should consult material from the Background Readings or related other materials you find yourself (be sure to reference properly whatever specific sources you draw on.

Case Assignment

Read through the articles and related material, scanned the websites, and thought about it carefully, please compose a 4- to 5-page paper on the topic noted above — that is:

How to keep the data miners from overwhelming the organization.

For writing help, refer to Trident guidelines at the Student Guide to Writing a High-Quality Academic Paper

discussion

1. Provide an example of an IT project from your readings, experience, and/or other sources and discuss some of the challenges faced in its implementation. Suggest ways to overcome such challenges to achieve successful outcomes.(Eight or so sentences of ORIGNAL writing)

2. Discuss the Service Oriented Architecture (SOA) and microservices. How are they similar? Different? Why are they important? Where are they used? What are some examples? (Eight or so sentences of ORIGNAL writing)

Computer Science

Write about Operation security Course Importance ( covering segregation of duties, Enterprise data breach causes, challenges )

Should be in APA format with references around 500 words. 

Discussion 13

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 14  (Jamsa, 2013).Chapter 14 topics:

  • Define and describe the mobile web.
  • Describe the different generations of cell phones.
  • Describe how smartphones differ from ordinary cell phones.
  • Select a mobile or traditional website that interests you. Describe the site in terms of the ecosystem that makes up the site’s user experience.
  • Describe how web pages differ from apps and how apps differ from widgets.
  • Discuss why developers say that HTML5 will drive mobile solutions.
  • Describe some development best practices for designing solutions for the mobile cloud.

Chapter 15 topics:

  • Define corporate governance.
  • Discuss the events that led up to the need for increased corporate governance.
  • Define business strategy. List five possible business strategies.
  • Discuss the purpose of the Capability Maturity Model.
  • Define auditing.
  • Define internal control and provide an example of control.
  • Discuss the role Sarbanes/Oxley has played with respect to corporate governance.
  • Define IT governance.
  • List factors one should consider with respect to governing the cloud.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  

Security related components

For this assignment research and discuss the various security related components that must be addressed when implementing any system (HINT: the first is policy).  Include citations and sources in APA style. 

500 words.

Difference between a risk, vulnerability, and threat?

 Question A

  • Explain the difference between a risk, vulnerability, and threat?

Question B

Each week, research a unique news story or article related to Information Security/Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source

500 words

APA format