Business Intelligence

1. How do you describe the importance of data in analytics? Can we think of analytics without data? Explain.

2. Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?

3. Where do the data for business analytics come from? What are the sources and the nature of those incoming data?

4. What are the most common metrics that make for analytics-ready data?

5. Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education, climate to public safety. Pick a topic that you are most passionate about. Go through the topic- specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.

 When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week. 

Organization leadership Research paper

  • Read 

https://www.researchgate.net/profile/Yuanchang_Liu/publication/227487108_ALIGNMENT_OF_BUSINESS_AND_ISIT_STRATEGY_AT_TELENOR_SWEDEN/links/555cba6008ae8c0cab2a6599/ALIGNMENT-OF-BUSINESS-AND-IS-IT-STRATEGY-AT-TELENOR-SWEDEN.pdf

  • Select a company of your choice and perform a case study similar to the Telenor case study described in the above article.
    • You may not have direct access to the company you select, which means you may not be able to conduct interviews, and you may not have access to all the information you would like access to.
  • Your case study must follow APA guidelines 
  • Your case study paper must be organized with the following level two headings. Use level one and level three headings as needed). 
    • Company Background
    • Company Business Strategy
    • Company IS/IT Strategy
    • IS Strategy Triangle (Read Shanardi https://sis.binus.ac.id/2018/02/13/is-strategy-triangle/ and find other resources )
    • Strategic Alignment Model (Read https://pdfs.semanticscholar.org/e840/2b65103442e2517982e5e3eb330f72886731.pdf and find other resources )
    • Strategic Alignment Maturity Model (Read CIO wiki https://cio-wiki.org/wiki/Strategic_Alignment_Maturity_Model and find other resources)
    • Strategic Grid (Read McFarlan, McKenney, and Pyburn https://hbr.org/1983/01/the-information-archipelago-plotting-a-course and find other resources )
    • Limitations (Cover the limitations of your study and paper)
    • Conclusions
  • Your paper must include at least five scholarly sources beyond the resources provided 

Discussion 3 – Info Tech

Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist in the next ten years? Why or why not?

Please make your initial post of 500 to 600 words 

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Writing assignment

Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment.

Your written assignment should consist of 2-3 paragraphs.

Malicious Activities 2.0

The three major types of malicious activities that organizations’ information systems face include:

  1. Hostile or malicious insider activity.
  2. Theft of private, proprietary, or sensitive data, by insiders or external attackers.
  3. Large scale DoS (denial-of-service) attacks.

Based on your research:

  • Describe a present-day example of your selected type of malicious activity and its impact on the organization.
  • Specify the countermeasures the organization took to address the malicious activity.

Assignment and Discussion

 

Week 10 – Discussion

Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?

Writing Assignment – Wk 10

Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs. 

Week-10 Discussion

 In no less than 250 words, describe a hacking tool that is used to gain access to a network.  Explain how the tool is used, how it works and how a netwoprk administrator can prevent this tool from access the network 

 

Week 10 Assignment

  • 10.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?