I am giving two questions please go through that

 1) Choose any two questions

  Discussion #1: Explain the relationship among data mining, text mining, and sentiment analysis. Discussion #2: In your own words, define text mining, and discuss its most popular applications. Discussion #3: What does it mean to induce structure into text-based data? Discuss the alternative ways of inducing structure into them.

Discussion #4: What is the role of NLP in text mining? Discuss the capabilities and limitations of NLP in the context of text mining.

2) This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

  1. What is your definition of AI?  Please explain.
  2. What is your opinion of AI, is the technology currently available? Why or why not?
  3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
  4. How is AI perceived as different in various industries and locations? Please explain.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-4 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. 

Discussion – Are machine learning based intrusion detection system always secure? An insight into tampered learning.

Provide a summary of the attached paper by going through the hypothesis and conclusion (attached paper link). Discussion post has to on where you discuss? what you found interesting? in the dissertation.

http://eds.a.ebscohost.com/eds/detail/detail?vid=5&sid=31a624dc-02d8-443c-9bbe-886bfcc3a1a5%40sessionmgr4007&bdata=JkF1dGhUeXBlPXNoaWImc2l0ZT1lZHMtbGl2ZQ%3d%3d#AN=132098629&db=buh

1 page is needed.

APA format

Citation is needed.

References should also be added.

Cyber Law

1)  Using a Microsoft Word document, please discuss the case involving the United States of America versus Ross Ulbrecht. Please include what took place at the United States Supreme Court. The minimum word count shall be not less than 500 words.

2)  Using a Microsoft Word document, please review ONE of the following films  and tell how that film represents a contribution to the field of CyberLaw.
War Games (1983)Citizen Four (2014AlphaGo (2017)Google and the World Brain (2013) .The minimum word count shall be not less than 1000 words.

3)  Using a Microsoft Word document, please list in order of your preference the five top areas in which you think computer-based laws should be passed or strengthened by legislatures, and a brief description of  why you chose this law and its ranking. The minimum word count shall be not less than 250 words.

4s week 3 assignment EH

Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack:  1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption. 

 Include references, no copy-paste strictly. use your own words. 

discussion 11/21

 

Review the video below and write a two-page review plus cover page and reference page.  The first page of your paper should be a summary of the video.  The second page is an opinion page covering how your company does or should use the information provided.

The Secret to Successful Crisis Management in the 21st Century – Melissa Agnes TEDx Talk

https://www.youtube.com/watch?v=VQGEPEaEWtgoutube.com

transformational leadership and knowledge and knowledge sharing within an organization

 

This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

  1. How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  2. How does servant leadership assist with transferring knowledge in an organization?
  3. When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Here are the links for the journals:

 

scenario 4

Due Week 4 and worth 100 points

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.

Read the article titled, “If you shopped at these 16 stores in the last year, your data might have been stolen” located at https://www.businessinsider.com/data-breaches-2018-4 Choose 2 stores from the list and research the specific attack or breach.

Write a paper in which you:

  1. Summarize the attacks, providing details on the effects of the breach. 
  2. Identify the common purpose of attacks on point-of-sale (POS) systems. 
  3. Assess why and how these POS systems have become a prime target for hacking groups. 
  4. Examine the forensics challenges that exist for investigations on POS systems.
  5. Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. 

Position Paper

 2. Introduction 

 a. Describe the ethical issue 

 b. Describe the 2 positions (ethical and unethical) 

 c. Describe why ethical and unethical positions exist. 

 d. Describe why the ethical issue is important. 

 3. Background on the ethical issue including: 

 a. Background on the ethical issue, the 2 positions, and the individuals who have the opposing positions. 

 a. Background on operations, i.e. accounting, financial reporting, as an electrical power supplier, information technology (IT), emissions testing, human resources, and any other operational area that is pertinent to each position. 

 b. Background on leaders, i.e. Chief Executive Officer, Chief Financial Officer, Chief Operations Officer, and any other leader who is pertinent to your position. 

 4. Operations: Ethical or Unethical Actions and Decisions 

 a. Describe at least 3 areas of operations from an ethical position (using the ethics theories). Present at least 3 arguments for each position you take, explain each argument, and support each argument with 3 research sources. 

 b. Describe counter arguments (or arguments in disagreement with your argument), support the counter arguments with research, explain why you disagree with the counter argument, support your disagreement with the counter argument with research.  

 c. Answer Question 1: Explain “what went wrong”? 

 5. Leadership: Ethical or Unethical Actions and Decisions 

 a. Describe at least 3 leaders from an ethical position (using the ethics theories). Present at least 3 arguments for each position you take, explain each argument, and support each argument with 3 research sources 

 b. Describe counter arguments (or arguments in disagreement with your argument), support the counter arguments with research, explain why you disagree with the counter argument, support your disagreement with the counter argument with research.  

 c. Answer Question 2: Is myopic (narrow minded) thinking responsible for the issue? 

 6. Lessons Learned 

 a. Answer Question 3: What lessons can one learn from this scandal with regard to ‘ethics and leadership’, and the role of government in corporate America?  

 7. Conclusion 

 a. Describe the positions of the members of the group and close the paper 

 8. References Page