Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger print?

 

Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger print?

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.  Make your initial post by Thursday 11:59 pm EST. Respond to two of your classmates by Sunday 11:59 pm EST.  

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.

Security Design Principles

  

Compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organization’s security posture.  

Please refer below links for more info

https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf

Portfolio Assignment

Students will create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future.  The plan will follow the template/example provided.

**Even though this is a technical document, for academic purposes, all sources should be cited and referenced.

***Student may modify some of the sections per the company they have selected but all students will need to complete a DR Plan for the Portfolio Requirement.  

****SafeAssign should be turned on and reviewed since it will flag a lot of the common elements but we want to make sure the students are writing the content from scratch.

Week 7 Assignment

 

Complete the following assignment in one MS word document:

Chapter 12 –discussion question #1-3 & exercise 1 & 12 & 16

Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Chapter 12:

Discussion question 1-3:

1. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.

2. Discuss the financial benefits of chatbots.

3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.

Exercise 1,12,16:

1. Compare the chatbots of Facebook and WeChat. Which has more functionalities?

12. Research the role of chatbots in helping patients with dementia.

16. Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.

Chapter 13:

Discussion question 1-4:

1. Compare the IoT with regular Internet.

2. Discuss the potential impact of autonomous vehicles on our lives.

3. Why must a truly smart home have a bot?

4. Why is the IoT considered a disruptive technology?

Exercise 3, 4, 6:

3. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary.

4. It is said that the IoT will enable new customer service and B2B interactions. Explain how.

6. Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities.

computer science

Work through the Module 1: Lab Activity (located in this module) and submit the deliverables listed in the document to this assignment submission folder for a grade.

Network Security

5.1 Provide a brief definition of network access control.

5.2 What is an EAP?

5.3 List and briefly define four EAP authentication methods.

5.4 What is EAPOL?

5.5 What is the function of IEEE 802.1X?

5.6 Define cloud computing.

5.7 List and briefly define three cloud service models.

5.8 What is the cloud computing reference architecture?

5.9 Describe some of the main cloud-specific security threats.

part 4: Administration and Validation

 

Assignment Content

  1. Based on your previous work in the previous week, create a 700-word entry in your Database Management Plan. You will use information from this entry in your presentation due in Week 6. Ensure you:
    • List the benefits of data administration compared to database administration.
    • Propose an effective data governance program.
    • Define the standards and approaches for the validation of database and application code.These include coding standards, expectations for what has been checked at each stage of testing (unit test, system test, user test), expectations for code review or inspection, etc.
    • Submit your assignment.