pract wk-7

 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of “Data Science and Big Data Analysis” course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

COPPA, CIPA or FERPA cover this situation with photography

 

I’d like to take a little different tack here.  There are several laws designed to protect the rights of children and students, COPPA, CIPA and FERPA.  With those laws in place to protect children, is it legal to take pictures of children in a public place without the parent’s consent?  The situation has come up several times where individuals were taking pictures of children at playgrounds.  The parents objected but did the courts uphold the parents or the photographers?  I understand that different local jurisdictions will have different laws but let’s keep our discussion to general laws in the US.  

Let me ask this, would COPPA, CIPA or FERPA cover this situation with photography in a public or private location?  Why or why not?

Information Technology in Global economy

 Chapter 8 – Value Sensitive Design of Complex Product Systems 

 Chapter 9 – Stakeholder Engagement in Policy  Development: Observations and Lessons  from International Experience 

For your initial post, address the four sections below, and write NO more than 500 words. Your contributions should be in your own words; quote very sparingly. Be concise. All other contributions would be a reflection of the contributions of your classmates.  After your initial post, reply to the contributions by your classmates and follow the guidelines for the frequency and quality of your contributions. 

  • CHAPTER SUMMARY: Summarize chapter presented during the week. Identify the main point (as in “What’s your point?”), thesis, or conclusion of the key ideas presented in the chapter.
  • SUPPORT: Do research outside of the book and demonstrate that you have in a very obvious way. This refers to research beyond the material presented in the textbook. Show something you have discovered from your own research. Be sure this is obvious and adds value beyond what is contained in the chapter itself. 
  • EVALUATION: Apply the concepts from the appropriate chapter. Hint: Be sure to use specific terms and models directly from the textbook in analyzing the material presented and include the page in the citation.
  • SOURCES: Include citations with your sources. Use APA style citations and references. 

 Examples of quality posts include:

  • Providing additional information to the discussion;
  • Elaborating on previous comments from others;
  • Presenting explanations of concepts or methods to help fellow students,
  • Presenting reasons for or against a topic in a persuasive fashion,
  • Sharing your own personal experiences that relate to the topic, and
  • Providing a URL and explanation for an area you researched on the Internet. 

500 words minimum assignment

  

For this assignment, complete the following:

1. For this assignment, you will explore the demo site (https://demo.matomo.org/index.php?module=CoreHome&action=index&idSite=62&period=day&date=yesterday#?idSite=62&period=day&date=yesterday&segment=&category=Dashboard_Dashboard&subcategory=1 )and its features.

2. Now locate the date range tool and select date range. (left side of page)

3. Choose Jan 1, 2014 through Jan 31, 2014 and apply the date range.

4. From the date range select the following metrics to track, Visits Unique Visitors and Avg Time on Website. (see attached screenshot)

5. Roll your mouse over the plot peak points to discover the total each color graph line means something important be sure to note the totals for the days.

6. Create an on page screenshot of the chart and post with your assignment Word Document submission.

Explain what the metrics for the date range within these 30 days is telling you about your website visitors, how long are they staying on the site, how many unique visitors were there, is there a best day of the week with the most visitors. Report what you found from the metrics date range and submit a Word Document with your analysis.

MINIMUM 500 WORDS

paper

 

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Risk management study

Perform an abbreviated risk management study on your personal computer. Conduct an asset identification, threat identification, vulnerability appraisal, risk assessment, and risk mitigation. Under each category, list the elements that pertain to your system. What major vulnerabilities did you uncover? How can you mitigate the risk? What is your plan for securing your personal system? Are you going to implement the plan? Why? Or Why Not? {50-70 WORDS}

 Research at least 3 port scanner applications that you can download on to your computer or virtual machine VM. Install and run each of them. Examine the results. Based on your study, what are the strengths and weaknesses of each? Which one of these scanners would you recommend to your organization? Why? Which would you prefer for personal use? Is your recommendation different for professional or personal use? Why? {50-70 WORDS}