Week 3 discussion

 1. Are you comfortable with giving away some of your privacy for increased security? Why or why not? How far would you let the government go in examining people’s private lives?

2. How much access should we have to certain aspects of others’ private lives?  For example, should States share criminal databases?  But should a database of people paroled or released for crimes be made public?  Why or why not? 

Analyzing and visualization data – Research paper

Research: Annotation and Color

Background: According to Kirk (2016), typography will have a significant role in your visualizations. You have to be careful with your text, but you must also be concerned with how the text looks. This then leads to color and functional harmony. You must provide the balance of colors in your visualizations (Kirk, 2016).  The harmony of colors you select during design will impact many aspects of the overall visualization.

Assignment: Write a research paper that contains the following:

  • Discuss Typography and the importance of appearance of text
  • Discuss the following color harmonies: (Usage, Pros, and Cons)
  • Complementary colors
  • Analogous colors
  • Triadic colors

Your research paper should be at least 2 pages (600 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

PLEC Week 6

 Answer each these questions in a paragraph with at least 3-4 sentences: Include the question and number your responses accordingly. Provide a citation for each answer. 

1. what do each of these terms refer to: copyright, patent, trademark, trade secret? 

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century? 

4. What is the Fair Use doctrine?

 5. Make an argument for legalizing the copying of music or software. 

6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?

 7. What was the 1984 Sony Supreme Court case about? 

8. Was Napster responsible for the actions of its users? 

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?

IW2D1

In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management steps is to develop metrics and measure results. From your required readings, discuss the value that metrics brings to the organization, and identify critical measures of success that should be tracked.

250-300 words with a minimum of 2 references in APA format

Cyber Security

Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

Discussion

 A detailed statement discussing  how you obtained this CPT employment(Java Developer) as well as how this CPT employment is directly related to  major area of study(Masters in Information Technology).

OE Discussion#3 – Post + Replies

Here is a questionnaire for you to take on your “Change Readiness”. Provide feedback on how it relates to you and your style.

*** Assume your self as a software engineer/developer and take the questionnaire. Based on the results write the discussion initial post. 

http://www.ecfvp.org/files/uploads/2_-change_readiness_assessment_0426111.pdf

You will be writing three or more discussion posts per week. Your main post must be two to three substantive paragraphs (250+ total words) and include at least one APA-formatted external citation/reference. Please follow up with two subsequent replies to colleagues. Each reply should consist of a relevant paragraph containing 50 words or more.

Your posts should be substantive, demonstrate independent thought relevant to the topic, and encourage continued discussion. Please avoid simply repeating previous posts and agreeing. Provide supporting evidence for your ideas and opinions through the use of personal or work examples, relevant articles or websites, or concepts covered in the week’s readings.

Cybersecurity Planning and Management Creating Company E-mail/WIFI/Internet Use Policies

  

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.