Use of medical information online and barriers facing telehealth

Week 5 Written Assignment

Each assignment will be an essay written in APA format (see below). Each essay should be no less than 1500 words on the topic (s) noted below.

The title page and bibliography do not count towards the word count.

Complete the assignment in a Word document using APA formatting with your last name as part of the file name. Omit the abstract and outline. A Word APA template and APA sample paper are provided for reference

After completing the essay, save and upload the document in the Assignments section of the e-classroom.

Each essay will be checked by Turnitin automatically upon submission. You will have access to the originality reports.

Topic: After conducting independent research using at least three sources not used in the class write an essay that examines the use of medical information found online and current barriers facing telehealth or telemedicine.

3-1 Project One

Directions

You decide to research several organizations and focus on one to start. Select one organization from the Business Organizations document in the Supporting Materials section below. You will compare and contrast Currier Grocery (the organization you currently work for) and the one organization you select. To guide your research and personal job notes, address the following in the template provided:

  • An organization’s form is the overarching characteristics that define the type of organization, including how and why the organization formed; the organization’s location(s), size, and type of ownership; whether the organization is nonprofit or for-profit; the goods and services the organization offers; how long the organization has been in business; and the organization’s mission, vision, and core values. Compare and contrast the characteristics of each organization’s form. Specifically, be sure to identify the characteristics of each organization’s form and take note of the similarities and differences between each.
  • Organizations are typically organized or structured into groups of functional areas. These functional areas develop groups of staff, or departments, to ensure the smooth flow of information and operations within the organization structure. Describe the role of key functional areas within each organization. Consider the following:
    • What key functional areas exist within each organization?
    • What role does each function play within the organization?
    • How might a data professional support the organization’s functions?
  • Discuss the relationship between each organization’s form and its functions within the organization. Specifically, address the following:
    • How might the purpose of each functional area vary based on the form of the organization?
    • What functional areas might a data analyst work closely or consult with?

 Review the business organizations in Supporting Materials and select one. You will compare and contrast your current employer, Currier Grocery, to the organization you selected. Prepare and organize your notes into 2 to 3 pages. All references must be cited in APA format. 

Cis

In a virtual world (VW) of massively multiplayer online role-playing games (MMORPGs), collaboration and communication are provided through the Internet between MMORPG-ready devices such as the Microsoft Xbox, and Sony PlayStation, and by using the Web browser. Gamers around the world can play against other gamers without seeing their opponent face-to-face. The Internet and MMORPG devices have become a social phenomenon. For example, a mobile game, called “Game of War” enables players to play against each other anywhere around the world. Other diversions include Second Life which isn’t really a game at all, but rather just that, another life people can live online through their online persona. 

Before you begin this assignment, engage in an online game or experience such as Game of War, Second Life, or Words with Friends, which has a phone app you can download free or play from your computer on the internet or even as a Facebook app.  Any game where you are playing against a live person over the web.  If you have difficulty finding an online multiplayer game, reach out to your instructor for guidance.

Write a paper with screen shots from your experience in which you complete the items below. Be sure to include what your choice was in the introduction paragraph. 

  1. Describe cognitive social phenomena that occur specifically to the context of the MMORPG that wouldn’t happen in a face-to-face checkers game.
  2. Compare and contrast the MMORPG user interaction environment to the face-to-face environment where a board game like Scrabble is being played. Next, identify whether or not the environment has an impact on the player’s ability to play Words With Friends in an online environment.
  3. Outline and describe the user interface requirements that a game designer needs to include in order to engage players in a MMORPG environment.
  4. Use at least (3) quality resources in this assignment. NOTE:Wikipedia and similar Websites do not qualify as quality resources
  5. Format your assignment according to the following formatting requirements:
    1. This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details.
    2. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    3. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.
    4. Include a reference page. Citations and references must follow SWS format. The reference page is not included in the required page length.

Computer Crime

1. What advantages are offered by commercial forensic packages? Are there any disadvantages to using them? If so, what are they?

2. Define the following terms and describe how they relate to information security: integrity, authenticity, confidentiality, and availability.

Johari Window Assignment

For this assignment you will need to find 2 partners: One should be someone you know, but not very well. This may be a class mate or co-worker. The other should be someone who knows you very well. A best friend or family member would work well for this. 

With a person whom you know or have some familiarity with, face each other for 5 minutes. Without speaking, write down everything you know about this person and have them write down everything they know about you. Do not talk during this time. When the 5 minutes is up, briefly go over the list you wrote about them and have them go over what they wrote about you. While discussing your lists, if you decide that you were incorrect about something on their list, you may change what you wrote about them. They may also change something about you if they decide they were not correct. YOU MAY NOT CHANGE WHAT THEY WROTE ABOUT YOU. Exchange lists so that you have what the other person wrote about you. 

With a person that you know well, repeat this same activity. You should now have two lists that identify characteristics about you.

Use MS Word to create a Johari Window. Create four window panes labeled according to the model on page 55 in your text. Using the two lists fill in each window with the appropriate characteristics. Things that you know about yourself that are on the list should be in the open window. Things on the list that you disagree with or did not realize goes in the blind window. Things you know about yourself that are not on the list likely goes in the hidden window. (Don’t get too personal, but put something there to show you understand the theory). What goes in the unknown window? Give examples of something that may be appropriate for that window. 

HW – DDOS Attack

  

Goal: The goal of this assignment is to bring about an understanding of how DDOS attacks are real and happen on October 21, 2016.

Requirement: Students will be required to research and analyze the following event and describe how DDOS and other attacks are actual threats to companies and individuals. What is the importance of having security on a network? Who is at risk? What are the possible implication if a network is attacked in the US? Sam Thielman in New York and Chris Johnston in London of the Guardian News Outlet written on Friday 21 October 2016 17.06 BST.

Citing: All sources should be cited. Students will have be required to use at least 2 literary sources. (The textbook of the class will be considered 1 source.)  The student will have the option of citing in MLA or APA format, but is required to cite.

Grading: Points will be assigned for clear, concise, and complete thoughts that are written grammatically correct. The length of the paper should be more than 5 pages.Higher marks will be given for developed thoughts and thorough research and analysis.

Deliverable: Electronic format uploaded through Moodle. Students can save their documents as a Word (.doc or .docx) or as a PDF file. The assignment should be uploaded into Moodle for grading. All student work should be titled with the assignment and their name. I.e. AssignmentTitle-M.Simmons.doc

  

Description: 2016-10-21 Major Cyber Attack Disrupts Internet Service.pdf 2016-10-21 Major   Cyber Attack Disrupts Internet Service.pdf

Submission status

week 8 MM

Discuss the phrase “let the buyer beware” and its relationship to an ethical marketing perspective.( 350 words and in APA format)

b) 1 reply of 250 words 

SyncSession Assignment 2 Pages with proper citation and APA

 

Reading Assignment:

  • Trochim/Donnelly: Ch 1-1d, 1-1e, and 1-4

Assignment:

In Document Sharing you will find a copy of the following study:

Unauthorized Copying of Software – An Empirical Study of Reasons For and Against by Siponen and Vartiainen.

Using this study, prepare a short paper 2 pages which summarizes the following:

  • The practical problem that created the need for research
  • The research problem that the study addressed
  • The research question(s) that guided the study

Physical Security Control

What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Discuss this question and provide support for your answer.

&
 

Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment.

Your written assignment should consist of 2-3 paragraphs.

Research Paper

 

While this weeks topic highlighted the uncertainty of Big Data, the author identified the following as areas for future research.  Pick one of the following for your Research paper:

  • Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world.
  • The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
  • New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data.
  • More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics.
  • Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to tackle ML problems and uncertainty challenges in data analytics and process in recent years.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.