Preview the document

web development and usability

You are to turn in an MS Word document that summarizes the Totterdale usability study found here: T08_11186_Final Printed Version from Conference.pdfPreview the document.  Ensure that you address all of the relevant information from the paper. The summary is to be one page (MAX), single-spaced,  1.5-inch margins. Should you go over the allotted amount of space, I’ll just stop reading and start deducting points.  You may use bullets point sparingly.  

As you read these studies, you need to consider that you’ll be writing something similar.  So, pay attention to the methodology, scripts that were used to collect data, access to data, how the results were presented, etc.  You don’t have to know everything at this point, but you need to start thinking about your study.

Save one paragraph to discuss what you think you may use in your own study.  Demonstrate synthesis of the information by reflecting on what instruments and techniques you might use in your own usability study. 

NOTE that there is a distinct lack of a quantitative survey, it is mixed methods with emphasis on a qualitative study.  The PDF file is in drag and drop box. NO PLAGIARISM

Elliptic Curve Cryptography

 1 page discussion

  • Perform research on Elliptic Curve Cryptography. Define what  Elliptic Curve Cryptography is and identify the associated benefits and  the associated negatives.
  • Would the implementation of Elliptic Curve Cryptography be a good  option for the HU Investment Firm? Fully explain your comments.

vision of Airport security

Thesis statement: We Believe Artificial Intelligence is going to be the future of security at the Airport. It will immensely reduce human interaction thereby enhancing protocols.

Requirement :  

Your research should include speculation on where the state-of-the-art will be in the near future for one

of the following technologies. The group paper could include a description of the state-of-the-art in

physical security technology, a discussion of where the sources that you read believe the physical

security technology is heading in the near future, and a discussion of how this technology will affect the

choices you would make if you were making purchase recommendations for a client. Although there is

room for personal opinion in your paper, you must justify your conclusions.

The team needs to consider all the possible roles that need to be supported in this organization that

includes Access Control with CCTV Cameras, Surveillance cameras, Facilities Security Plan, Biometrics,

Glass, Window, Fences, Chain-Link Fence Standards, Floor Plan, and customer support.

The overall assignment is to develop a comprehensive plan for this fictitious organization in a form that

would be appropriate for a Word Document and as a PowerPoint slideshow for management. You may

consider this as the means of presenting your conceptual plan.

Malware Analysis

  

Please research on Remote Collection Tool like crypt cat & volatile data collection and analysis tools like forensic acquisition utilities & MoonSols Windows Memory Toolkit/Win32dd. Afterward, write a brief summary concerning this tool. Also, describe the tool and what functions it performs.  Did you find it helpful?  Was it easy to use?  What is your opinion on the tool? If you use any references please cite them per APA guidelines. 

paper main

  

Watch the Youtube video Deming at Pontiac. Research W. Edwards Deming and the Total Quality Movement (TQM). 

Read the article Netflix vs Blockbuster – 3 Key Takeaways https://www.drift.com/blog/netflix-vs-blockbuster/ and

A Blockbuster Failure: How an Outdated Business Model Destroyed a Giant

https://trace.tennessee.edu/cgi/viewcontent.cgi?article=1010&context=utk_studlawbankruptcy

Research Blockbuster versus Netflix. Consider the effect that cloud computing has had on Netflix’s business model. Consider also how Deming and TQM would have dealt with (or avoided) the problems that occurred at Blockbuster. What does a TQM initiative look like in an IT department? How would IT support Total Quality at your company?

The paper must be at least 5 pages plus the cover and reference pages and be in APA format.

Each paper must have at least 3 academic sources. Academic sources do not include wikis, message boards, support forums, etc. Do not copy and paste large blocks of text from your sources! 

As with any research project, make sure to take a position, defend with works cited, and conclude.

Discus7-350 words

Research the ethical issues of self-driving cars and offer opinions based on findings.

Note:

need proper APA format

reference

Active Directory GPO and MBSA

All posts must be a minimum of 250-300 words. APA reference. 100% original work. no plagiarism.

1. Using Active Directory Group Policy Objects (GPO) or Microsoft Baseline Security Analyzer (MBSA) discuss how one would use them to secure the network.

2. Describe the importance of having privileged and non-privileged states within an organization.