Sampling Distribution

 

  1. What are the advantages and disadvantages of non-probability samples?
  2. What are the worst forms of non-probability samples? Explain the difference between the systematic sampling and cluster sampling.
  3. Explain the Central Limit Theorem.  What effect does increasing the sample size have on the accuracy of an estimator?

Data Breach

Before any health information system can be successfully implemented, there must be a team of experts who understand the vision and mission of both the health care organization and its stakeholders. Strategic health care leaders are positioned to propose system upgrades and/or implementations that can withstand inevitable organizational changes. Health information systems’ leaders understand that data is the overall management of the availability, usability, integrity and security of the data. From your weekly readings, choose at least three health information systems’ leaders and/or stakeholders, and define their role in the implementation of health information systems.

All the following items must be addressed in your paper:  The Breached vs Uncompromised Data paper 

  • Compare and contrast the limitations and opportunities in enterprise-wide data. Defend your technology infrastructure’s ability to support organizational leadership and end-user needs.
  • Explain the economic impact of your proposed system acquisition.
  • Predict the impact of quality improvement as it relates to the improvement of electronic health records.

The Breached vs Uncompromised Data paper

  • Must be three double-spaced pages in length (not including title and references pages) 
  •  Must begin with an introductory paragraph that has a succinct thesis statement.
  • Must address the topic of the paper with critical thought.
  • Must end with a conclusion that reaffirms your thesis.
  • Must use at least at least three scholarly or peer-reviewed sources in addition to the course text.
  • APA format 

Final Project (Research Paper) – Enterprise Risk Management

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. 

This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives. In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction – What is an ERM?
  • Why Should an Organization Implement an ERM Application?
  • What are some Key Challenges and Solutions to Implementing an ERM?
  • What is Important for an Effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework/application.
  • Conclusion – Final thoughts/future research/recommendation

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least FIVE scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

PPT write Up

Pleas write up as I am explaining the slides 2,3,4 to professor 

Please write accordingly explain the contents on those slides 

Assignment (500 Words)

Go online and search for information about companies that have been harmed or bankrupted by a disaster. Choose one such company and create a brief case study about it. Successful narratives will focus on the manner in which the organization was impacted, including financial losses, losses of sales, or the need for layoffs. Your assignment should be 6 paragraphs in length.

Practical Connection Infer Stats in Decision-Making

it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where you will demonstrate how this course( Infer Stats in Decision-Making ) research has connected and put into practice within your own career.

Assignment:  
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:  

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.  
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.  
  • Share a personal connection that identifies specific knowledge and theories from this course.  
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.   
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

AI with reinforcement Learning

 Your task, put simply, is to design a reinforcement learning algorithm to teach the mouse how to find the food. The fundamental task is as follows: • There is a 100×100 matrix representing a grid where any space can either be occupied by a mouse or a piece of food. There is only one mouse, and an arbitrary amount of food. • The mouse is able to sense the food with a 3×3 matrix representing its sense of smell, the range of which is the full grid, and stacks (Two foods next to each other will generate twice as much smell). This will be the input for your algorithm. Note that the center of this matrix will always be 0, as that space represents the mouse itself. • The mouse has a limited amount of energy, which is fully replenished when it finds food. If it runs out of energy, it dies, and the game is over. • The mouse is able to move in any cardinal direction (North, South, East, and West). The goal is for them to eat all of the food in the grid as quickly as possible. This simulation is visually represented using PyGame. This task can also be solved by a trivial algorithm using nothing but simple arithmetic, as the ‘scent’ of food is a function of distance from the mouse. You can try to find a non RL solution and compare it to the best version of the RL algorithm’s results. For each frame, a forward pass is run through your model. The input for each frame is an array (or tuple) with four numbers between 0 and 1. These are the probabilities generated from your model. These will determine how the mouse moves. QUESTIONS:  (The questions are not graded by correct/incorrect. They are just here to get the student thinking.)  Q: Does the order matter for the reinforcement learning model? (Ex: Inputting (N,S,E,W) vs (N,E,S,W))   Q: Does the order matter for a closed form solution?  Q: What would be better for reinforcement learning; taking the highest value from the array as the movement choice, or choosing a random direction weighted by the given probabilities? Why? Tasks for the students • Write a reward function.  You have access to the current game state, as well as the number of previous frames (Ex: 50) of input matrices, food level, and number of food tiles found. This number of frames will be the same number of frames it takes to starve from a full energy level.  This can be very simple, like just using the number of food tiles found, or use reward shaping using multiple frames of previous input matrices to create more frequent positive/negative rewards (Ex: when the mouse moves closer or farther away from food.)  QUESTIONS:  Q: What would be a sparse reward function for this model?   Q: How can the reward function be improved?  • Write a model:  As described above, write a model that takes in 8 inputs (The mouse’s sensory matrix minus the center), and outputs four probabilities for each cardinal direction.  In addition, you will be handling when to back-propagate a reward, or when to keep running. Additional task (Optional worth extra credit):  There are many variables that you can mess around with to complicate the problem to make it more suitable to Reinforcement learning. One of them is decreasing the range of the mouse’s scent with the variable SCENT_RANGE. Another is the variable VARIABLE_TERRAIN which gives the mouse a second sense (sight) and adds a value to each terrain section which indicates how much energy is spend by stepping over that tile.  Q: How does the reward function change if you add the new variables?  

Internet of things Article – Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things:

 For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 2 to 3 pages (600 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Malicious Activities 3.0

The three major types of malicious activities that organizations’ information systems face include:

  1. Hostile or malicious insider activity.
  2. Theft of private, proprietary, or sensitive data, by insiders or external attackers.
  3. Large scale DoS (denial-of-service) attacks.
    Based on your research:
  • Describe a present-day example of your selected type of malicious activity and its impact on the organization.
  • Specify the countermeasures the organization took to address the malicious activity.
  • Recommend at least one additional preventative countermeasure and at least one countermeasure organizations could take to address this type of activity once it has occurred.