Docuementation for E-commerce website application development

The first part of the project – (Completed)

Build an E-commerce website application (final documentation attached)

The second part  – Open! 

Document how the web application is working and show 3 months progress of sales/operations, etc. 

Update existing word documentation with the below:

1) Gantt Chart showing the past 3 months’ timeline of sales/ operations and activities involved accordingly.

2) Updated ER /Network diagram showing the same

3) Update the final report with additional information showing progressive with  web application.

To do:

  

1) Updated project charter/ proposal

2) Project plan- Gantt chart – At this point, you should have started the Development phase of your project. Update your project plan (Gantt chart) to reflect completed tasks/sub-tasks.

3) ER diagram/Network diagram/Front -end design – 

You must submit all items as they apply to your project.

Note: Do not mistake or submit data flow diagrams as any of these.

4) Interview/ Presentation – 

INTERVIEW/PRESENTATION GUIDELINES

Presentations should be clear and precise. Briefly introduce the topic including any background information, describe the investigation, development, or experimentation that was conducted, and provide any demonstrations developed as part of the project.

The following format is suggested:

(1) Title: Name the project and all the team members.

(2) Outline: Summarize the full presentation.

(3) Introduction: Introduce the purpose and goals of the project. Provide any background material necessary to understand the presentation.

(4) Investigation, development, or experimentation conducted: Describe the actual work performed during the project.

(5) Results: Show any demonstrations developed or results achieved in the project.

(6) Conclusion

(7) Questions and discussion.

5) Final Documentation 

Wk 4 – Security Risk Mitigation Plan

 Use week 4 template attached.  I attached week 1 assignment I did also.

Take on the role of Risk Management Analyst for the organization you chose in Week 1.

Using the Security Risk Mitigation Plan Templatecreate a 4- to 5.5-page Security Risk Mitigation Plan for the organization you chose.

Research and include the following: 

  • Security Risk Mitigation Plan:
  • Select and document security policies and controls.
  • Create password policies.
  • Document administrator roles and responsibilities.
  • Document user roles and responsibilities.
  • Determine an authentication strategy.
  • Determine an intrusion detection and monitoring strategy.
  • Determine virus detection strategies and protection.
  • Create auditing policies and procedures.
  • Develop education plan for employees on security protocols and appropriate use.
  • Provide risk response.
  • Avoidance
  • Transference
  • Mitigation
  • Acceptance
  • Address change Management/Version Control.
  • Outline acceptable use of organizational assets and data.
  • Present employee policies (separation of duties/training).
  • Explain incident response.
  • Incident types/category definitions
  • Roles and responsibilities
  • Reporting requirements/escalation
  • Cyber-incident response teams
  • Discuss the incident response process.
  • Preparation
  • Identification
  • Containment
  • Eradication
  • Recovery
  • Lessons learned 

Week 8 Assignment

 

Complete the following assignment in one MS word document:

Chapter 14–discussion question #1, #3, #4 & exercise 2

APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

  

Discussion Question:

1. Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view. 

3. What are some of the major privacy concerns in employing intelligent systems on mobile data?

4. Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.

Excercise:

2. Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork.

Cloud computing

PAPER: CLOUD MIGRATION STRATEGIES :

Write a paper discussing the obstacles, difficulties, and other criteria that should be considered when migrating infrastructure and data from a private data center to a public cloud provider.  

Apply APA Edition 6 formatting.

Use at least three properly documented references (do NOT use wikis).

Correctly cite your references using APA Edition 6 formatting.

Your paper should be at least 500 words in length using good grammar.

Use complete sentences and paragraphs. Do not use bullets.

Be sure and use a spelling and grammar checker.

Your paper will be checked by SafeAssign for originality. With the exception of quoted material, all writing should be your own.

Discussion

Discussion: 1. Some people say that chatbots are inferior for chatting. Others disagree. 

Discussion:2. Discuss the financial benefits of chatbots.

pract wk-7

 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of “Data Science and Big Data Analysis” course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

COPPA, CIPA or FERPA cover this situation with photography

 

I’d like to take a little different tack here.  There are several laws designed to protect the rights of children and students, COPPA, CIPA and FERPA.  With those laws in place to protect children, is it legal to take pictures of children in a public place without the parent’s consent?  The situation has come up several times where individuals were taking pictures of children at playgrounds.  The parents objected but did the courts uphold the parents or the photographers?  I understand that different local jurisdictions will have different laws but let’s keep our discussion to general laws in the US.  

Let me ask this, would COPPA, CIPA or FERPA cover this situation with photography in a public or private location?  Why or why not?