disucssion

Write 500 words each for the below two questions. Please follow latest APA format and add more intext citations and provide the full references with the link in hanging indent format

1. What are some of the major privacy concerns in employing intelligent systems on mobile data?

2. Identify common violations of user privacy from current literature and their impact on data science as a profession.

isi discussion 7

 Find and view several online videos on recent cyberattacks (less than 2 years ago). Identify the URLs for 2 videos that you think do a particularly good job of illustrating (1) the worst case scenario and (2) the best case scenario when it comes to cybersecurity. Briefly describe each situation and what the worst case scenario could learn from the best case scenario?
 

Need Minimum 300 words excluding references

Research Paper

 

Pick an industry/company to focus on for this assignment.  Based upon the given information you can find on the company and any past issues/breaches the company has gone through, create Crisis Management Plan

  1. Introduction – brief background of company and any issues the company has had in the past such as data breaches
  2. Strategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company)
  3. Risk Analysis – political analysis, environmental analysis (more or less depending upon company)
  4. Crisis Management Plan:
    1. Purpose
    2. Committee for crisis management planning
    3. Crisis types
    4. Structure of the Crisis Management Team
    5. Responsibility and control
    6. Implementation Plan
    7. Crisis Management Protocols
    8. Crisis Management Plan Priorities
  5. Conclusion

References – APA format

Page Count Range should be 20 pages not including:

Title page, Table of Contents and References page

Week 6 Assignment

 

Complete the following assignment in one MS word document:

Chapter 10 –discussion question #1-2 & exercise 1 & 7

Chapter 11- discussion question #1-4 & exercise 4

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Chapter 10

Discussion question 1-2

1. Based upon the current state of the art of robotics applications, which industries are most likely to embrace robotics? Why?

2. Watch the following two videos: https://www.youtube.com/watch?v=GHc63Xgc0-8 and https://www.youtube.com/watch?v=ggN8wCWSIx4 for a different view on impact of AI on future jobs. What are your takeaways from these videos? What is the more likely scenario in your view? How can you prepare for the day when humans indeed may not need to apply for many jobs?

Exercise 1 & 7

1. Identify applications other than those discussed in this chapter where Pepper is being used for commercial and personal purposes.

7. Conduct research to identify the most recent developments in self-driving cars.

Chapter 11

Discussion question 1-4

1. Explain why it is useful to describe group work in terms of the time/place framework.

2. Describe the kinds of support that groupware can provide to decision makers.

3. Explain why most groupware is deployed today over the Web.

4. Explain in what ways physical meetings can be inefficient. Explain how technology can make meetings more effective.

Exercise 4

4. Compare Simon’s four-phase decision-making model to the steps in using GDSS.

Access Control Systems

 Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not? 

Final Project: US Naturalization Practice Test

Please note: It is just a given in our industry that your code has to run! If your code does not run, you will not receive any points.

You will be creating a PHP-driven web site that is a practice quiz for people taking the civics portion of the United States Naturalization Test. There are 100 possible questions for this portion of the test; however, in practice applicants are given only 10 questions, chosen randomly. An applicant must answer 6 out of 10 questions correctly to pass the civics portion of the naturalization test.

Your task is to use the 100 sample questions provided in the official Civics (History and Government) Questions for the Naturalization Test document. (Dr. Alfaro will provide a PHP code snippet with two arrays, one of questions and one of answers, which you may use.) Your application should display ten questions at random along with a text input box for each answer. The user should be able to input a short answer, and the script will compare the user’s answers against the correct answers. Be sure to convert any special characters to HTML!

When checking for correct answers, CASE SHOULD NOT MATTER. Also, your code should check to see if the answer string is included anywhere within the answer. So, if a correct answer is “Constitution”, any of the following answers should score as correct:

  • the constitution
  • our Constitution
  • The Constitution is the supreme law of the land
  • CONSTITUTION

It is up to you how you want to store and retrieve the questions. However, your project must meet these minimum requirements:

  1. Displays 10 questions chosen at random (by the PHP; not by you!) and ten corresponding text boxes for short answers.
  2. When the user submits the test, the user will see their grade and whether they passed or failed the practice exam (60% is passing). It will also indicate which questions the user got wrong so they can go back and study!
  3. Upon submission, the page should also display a date-time stamp stating when the exam was submitted.
  4. Your code must include an array, and this array must actually be used to create the quiz. (No creating an array that is never accessed!)
  5. Your code must contain a PHP include to show that you know how to do this.
  6. Your code must contain at least one function that is actually utilized in the application.
  7. Your code must utilize at least one loop (for, while, do-while, or foreach).
  8. On the page which displays the user’s score, there should be a link or button that allows the user to go back and take the quiz again with a new set of 10 random questions.
  9. Use semantic HTML code and best practices (an h1, at least one h2, alt text for images, etc.).
  10. Add CSS as appropriate to make this a professional-looking portfolio piece. (We may be showing this to clients in the capstone next term!)

NO SQL!! DO NOT USE SQL. 

ONLY PHP, HTML, and CSS

Submit your completed file final-yourlastname.tar.gz below. 

productivity paradox

Discussion: This week we focus on the productivity paradox.  Please define the productivity paradox and explain current thinking on this topic

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

research paper

The structure of  paper should be about six pages, not including the title, abstract, and reference pages. That’s six pages of content. Y submission must be in full APA 7th Edition format.

  • Title page (no Running Head):
  • Abstract
  • Body (7-8 pages)
    • Introduction
    • Literature Review with appropriate citation
    • Discussion
    • Conclusion
    • Proper Section Headers
  • References (at least four)
  • Correct grammar, spelling, form, and format.

Attached case project and below is what I need.

___________

Select a case study of your choice from the textbook related to threats against the national critical infrastructure sector and research it. For example, you may decide that since we talked about state sponsored malware in last week’s lecture, that you want to return to Chapter 2 and use the Case Project presented there where the United States is hit by a large-scale coordinated attack organized by China. The problem is presented to you with a specific scenario where parts of the US critical infrastructure, such as the power grid and telephone systems are debilitated. You will research the type of attack that may be launched in this scenario, what is China’s motivation for this attack, how the attack would be introduced and proliferated, what defenses may intercede from some sector clients, what remediation might be applied, and how long it should take to recover. What else can you come up with? In this case, an attack like this may escalate. Would the US military respond with a cyber counterattack? What would be the likelihood of a kinetic response from the US military? How would we attempt to cool this incident? Then write up a conclusion that ties all this together.