Employee Policy

Assignment Content

A policy should specify the kind of employees covered, the kind of health organization (clinic, hospital, etc.) it is for, and the Do’s and Don’ts when handling electronic healthcare information.

Create a 2- to 3-page policy for the employees of a health organization which protects the privacy and security of patients when handling electronic healthcare information. In addition the policy should discuss how legislation on the privacy of electronic health information has evolved and what the future of Health IT holds.

Create an accompanying 2-page Frequently Asked Questions (FAQ) document to anticipate some of the questions from readers of the policy and the answers to these questions. Be sure to include questions around how this new policy might bring up new security and privacy issues and how those could be resolved.

Payroll(casestudy)

  

Case Study:

You work for a large multinational technology organization. The company has determined they need to create a disaster recovery plan.

As a team, pick one of the following department in your organization: 

· Computer Operations 

· Accounting 

· Marketing 

· Payroll 

· Sales 

· Distribution

· Human Resources

· Purchasing 

· Service (i.e., Vehicle Maintenance)

· Administration (i.e., Executive Branch)

Requirements: 

Describe the services that your department provides to the organization, the types of disasters will most affect your department, and what you and your department can do to prepare for a disaster situation. Perform a limited risk analysis for your department (because any given department in an organization can be considered an organization on its own) for the types of disasters that will most affect your department.

After you conducted your limited risk analysis for your department, the company decided to make you the captain for your company’s disaster recovery team. You know that working as a team is important and therefore you’re trying to figure out how to build both the team and friendships within the new team. As a team, you should discuss why you need to create a contingency policy and plan. You should describe what you need to start the contingency planning process and finally, define business impact analysis and describe each of its components.

Now that you know what goes into making up your plan, you should discuss the relationships between the overall use of contingency planning and the subordinate elements of incident response, business resumption, disaster recovery, and business continuity planning. Additionally, you will describe the techniques used for data and application backup and recovery.

To conclude the project, you are going to describe the process you will use to organize the incident response planning process, explain the techniques that can be employed when formatting a security incident response team, and describe the processes used in making decisions about incident detection and escalation.

Deliverables:

Prepare a report to address all aspects of the case study. This report should be no less than 20 pages of content and no more than 25 pages of content. You need to include outside sources and properly cite and reference your sources. You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. The 20 pages of content, includes title page and a reference sheet. This report needs to be in proper APA format.

Project Proposal in cloud computing – Research Methods

The project proposal must be on the topic: Carbon footprint reduction in Cloud Data Centers using natural direct air free cooling implementation.

At least 20 references needed. The citation and references should be in IEEE style.

The Project proposal document should be done in latex editors like overleaf. The corresponding pdf generated along with the latex code should be shared. Also, a ppt of the project proposal is needed. 

The required structure of the paper is attached. Also, a couple of previous sample have been attached for reference. 

Discussion 3 cryptography

Evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.  How does this affect the way business is done? How have you used it?

You must use at least one scholarly resource.

– discussion posting must be properly APA formatted.

– 400 words

– No plagiarism 

– References

Computer Science

Find and view several online videos on recent cyberattacks (less than 2 years ago). Identify the URLs for 2 videos that you think do a particularly good job of illustrating (1) the worst case scenario and (2) the best case scenario when it comes to cybersecurity. Briefly describe each situation and what the worst case scenario could learn from the best case scenario?

1 response with 300 words and 2 responses with 150 words each. All with references(don’t include references towards total words count)

Autopsy digital forensics tool research

Do a bit of research using Google or any other search engine and write an article of 250 words on Autopsy digital forensics tool. Please be aware that the article will be Plagiarism checked. Also include the references in APA format.

Policy and legal_Project

Abstract for the project

Your Research Project on the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.

Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software. 

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the Danforth Library Research Databases.

Submit all documents at on time. Do not zip or otherwise compress them. Do not use .rar. Use .doc and .ppt extensions

DM AW-4

  

Atleast 3 pages in APA format.

On time delivery.

Plagiarism free

1. What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means? (Chapter 8)

2. Compare the membership weights and probabilities of Figures 8.1 (626 page) and 8.4 (635 page), which come, respectively, from applying fuzzy and EM clustering to the same set of data points. What differences do you detect, and how might you explain these differences? (Chapter 8)

3. Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases. (Chapter 9)

please refer the link given below

 https://icourse.club/uploads/files/154047b04cec59e96abf82fd882236d39f0e3be7.pdf  

Analyzation and Data Visualization

The Final Paper for this course will enable you to identify 2 data sets and discuss appropriate structures of the datasets.

Your final paper should meet the outlined criteria:

Topic based on dataset

Describe the dataset fields

Summary of the data in the dataset

Research content (at least 1000 words and 4 references – 3 must be scholarly peer-reviewed articles)

Create visualizations using R Language (ggplot2) (Discuss findings)

You are free to utilize an available dataset online or to use one of the data sets provided in this folder.

research

: Write a research paper the contains the following:

  • Discuss Quantitative Methodology
  • Discuss Qualitative Methodology
  • Compare and contrast qualitative data vs quantitative data

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

Submit your assignment on or before the due date.