Each student will locate and review an article relevant to the topic of the class. The review is between 400-to-550 words and should summarize the article. Please include how it applies to our topic, and why you found it interesting.
Homework Assignment #7
Need help in implementing and modifying the missing functions within the C++ programming code tree.cpp according to the attached problem description.
Case study
Read the Innovation at International Foods Case Study on pages 234-238 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed and in APA format.
Discussion
Instructions
Post 1 thread of at least 300 words. Also, reply to the thread below in of at least 150 words.
Thread Topic
Research and develop a thread that describes the concept of defense in depth. Your thread must include: an introduction statement/paragraph, body paragraph(s), and a conclusion statement/paragraph. Additionally, you are required to comment on at least 1 other student’s thread
Reply
Defense in Depth or (DiD) in cybersecurity refers to a series of defensive methods layered to protect data and information in case of security control fails or other vulnerabilities. DiD origins are from a military strategy which delays the progress of an attacks rather than defeating the enemy with one strong line of defense. In other words, if one method fails, another steps in to combat an attack. This multi-layered tactic with its redundancies increases security and focusses on other attack routes. A opposite principle to defense in depth is simplicity-in-security which states too many security measures will cause complications or holes that attackers can exploit.
Defense in depth security design is based on controls used to protect the physical and administrative properties of a network. A layered security can be applied to all IT systems. A desktop on a network or the network of bank cash dispensers all qualify for defense in depth. An organization that is relying on a single layer of security will find that hackers will find their vulnerabilities very quickly. Using multiple defenses such as malware scanners, firewalls, and data encryption software will close attack routes making it more difficult for a hacker to gain access to your network.
Security guards, attack dogs, barbed wire fences, semi-automatic weapons and cameras cannot protect you against hackers gaining access to private information on a network. A hacker with physical access to your infrastructure can see your data you were trying to hide. Defense in depth eliminates blind spots. Just like a home security system the more sensors you have the safer your home will be. The theory behind defense in depth shares the same principles, the more sensors you have that monitor, detect, and eliminate would be disruptions or data breaches the least likely a cybercriminal will try to invade. A multi-line of defense or defense in depth is one way to defend against enemies on all fronts.
Research Paper
Summary:
Select a topic from the following list on which you would like to conduct an in-depth investigation:
- Information systems infrastructure: evolution and trends
- Strategic importance of cloud computing in business organizations
- Big data and its business impacts
- Managerial issues of a networked organization
- Emerging enterprise network applications
- Mobile computing and its business implications
Note: The above topics are also the basis of the discussion questions. You may use up to three resources found by yourself or your peers as peers as resources for the paper.
Research paper basics:
- 8-10 pages in length
- APA formatted
- Minimum six (6) sources – at least two (2) from peer reviewed journals
- Include an abstract, introduction, and conclusion
- See rubric for more detailed grading criteria
Some good questions to ask yourself before turning in your research paper:
- Is the paper of optimal length?
- Is the paper well organized?
- Is the paper clear and concise?
- Is the title appropriate?
- Does the abstract summarize well?
- Are individual ideas assimilated well?
- Are wording, punctuation, etc. correct?
- Is the paper well motivated?
- Is interesting problem/issue addressed?
- Is knowledge of the area demonstrated?
- Have all key reference been cited?
- Are conclusions valid and appropriate?
PLE W3
Answer each these questions 2-3 sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. What is privacy?
2. What risks, if any, does facial recognition software raise?
3. How much information about you can be found on-line with a simple google search?
4. How much information about you can be found by searching government and commercial databases?
5. Describe informed consent.
6. Should secondary use of consumer provided data be available without notice to the consumer?
7. How do data mining and predictive analytics work?
8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will?
9. Should Facebook be regulated, at least as far as it’s privacy and data policies?
10. How many public cameras is too many?
500 Words Minimum Assignment
In this assignment, you are going to visit the Google Web Analytics Demo site. Please follow these steps:
- Be sure to have a Google email account this makes it much easier. Create free Google email account here. ( https://accounts.google.com/signup/v2/webcreateaccount?service=mail&continue=https%3A%2F%2Fmail.google.com%2Fmail%2F%3Fpc%3Dtopnav-about-en&flowName=GlifWebSignIn&flowEntry=SignUp )
- Go to the link below and read the simple instructions to access the Google Analytics Demo site at this link. You will see the link named “ACCESS DEMO ACCOUNT” (https://support.google.com/analytics/answer/6367342?hl=en )
- Review the document above and go to the demo account “ACCESS DEMO ACCOUNT”:
- You will be asked for your Google email account information to access the demo.
- Once in the Google Analytics Demo, review the many areas and explore, check out the blue boxes when you first enter, they will be helpful. Now explore the many data metrics.
- Create a summary Word Document of your experience in the setup, how easy or hard was it to you. Take at least three (3) screenshots of the Google Analytics pages to attach to the summary.
Please submit a Word Doc with your answers, in 500 words or more, and use references in support of your answers.
Assignment
- Now that you have R installed on your computer, you will begin to get some experience (hands-on) with the software. For this assignment, you are exposed to just 4 features of R: Arithmetic Operations; Operations on vectors; the Recycle Rule for adding/subtracting vectors; and Creating a S3 Class Object. A separate screen shot is required for execution of each feature. Open R (either command line or RStudio). Enter code that will handle the following (show all code, comment for each code line and the computed results in your screen shots). These are instructions; do NOT just write the instructions – actually show this within R and capture a readable screen shot to show that it works properly!!
Screen shot 1: Arithmetic Operations- assign a value of 144 to x
- assign a value of 6 to y
- add x and y
- subtract y from x
- multiply x times y
- divide x by y
- find the square root of x
- Screen shot 2: Operations on vectors
- create a vector (afc) and assign values 2,6,3
- create a vector (nfc) and assign values 6,4,2
- add afc and nfc
- Screen shot 3: Recycle Rule for adding and subtracting vectors
- assign values 2,1,8,3 to vector x
- assign values 9,4 to vector y
- add x to y
- notice the warning message – use the Recycle Rule for adding vectors; then
- add x to y and show results
- subtract 1 from x – apply the Recycle Rule for subtracting vectors; then
- subtract y from x and show results
- Screen shot 4: Create an S3 Class Object
- create a list – with components: name = Your name, date = today’s date, and score = score you desire on Assignment 2.
- name the class as “graduate student”
- Save the screen shots as a MS Word document (*.docx). Then, click the “Write Submission” link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the “.docx” extension to the filename).
Ethics, Law and Cybersecurity
Instructions: There are four (4) topic areas listed below that are designed to measure your knowledge level specific to learning outcome (LO 2) shown in your course syllabus. You must respond to #2 and select any other two of these topic areas providing appropriate responses in essay form. In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.
Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text. Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well. You cannot use information from the text book or any book/article by the author of the text book as a current event. Make sure that your reference has a date of publication. For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question. This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified.
Question no 2 Mandatory
Choose any 2 from question 1,3,5.
You should type your responses directly under the appropriate question. Be sure to include your name on your quiz. Only the first three (3) questions with answers will be graded. Include your name in the document filename. Your completed quiz must be uploaded into the appropriate eCollege Dropbox, no later than 11:59pm on the due date. Do well.
1. How do religion, law, and philosophy each provide different grounds for justifying a moral principle? How can each perspective be applied in analyzing the moral principle “Stealing is wrong”? Be sure to elaborate and provide your “theoretical” rationale in support of your position. (knowledge)
2. You have just been appointed to the board of directors of TAMU.com, however, the dot.com company has been experiencing some difficult financial times that have resulted in revenue losses in three of the last four quarters. As you take your new position, you discover that two proposals are on the table. Each proposal has been put forth as a means for dealing with TAMU’s immediate financial problems. Proposal #1 recommends all employees be retained, but that an immediate wage freeze for all employees be imposed for the next six months. (Employees may even be asked to take a 5 percent cut in pay if things do not improve by the end of that period.) Proposal #2 recommends that wages not be frozen, but that 5 percent of the company’s workforce be laid off. (One piece of reasoning behind this proposal is that taking more drastic measures will “protect” 95 percent of TAMU’s workers and will send a message to Wall Street and local investors that TAMU is serious about improving its financial position and that it will soon be a stable company once again.) The board is evenly split, seven members for proposal #1 and seven for proposal #2. Yours will be the tie-breaking vote. In your deliberation, describe how an act utilitarian, a rule utilitarian, a rule deontologist, and act deontologist would reach each solution to this dilemma and on what basis. Which solution seems most plausible? Be sure to elaborate and provide your “theoretical” rationale in support of your position. (comprehension)
3. Do you feel that any of the four traditional ethical theories examined in chapter two are adequate to handle moral issues that arise as a result of cybertechnology? Is a brand new ethical theory needed, as some have argued, for the Internet age; or can a comprehensive, integrated theory, such as the one proposed by James Moor (i.e., his theory of “just consequentialism”) be used successfully to resolve moral issues involving cybertechnology? Explain your answer. Be sure to elaborate and provide your “theoretical” rationale in support of your position. (comprehension)
4. Consider a case in which the United States government, with the approval of the majority of Americans, decides to round up all Arab-Americans and relocate them into internment camps. Imagine that you have a friend who is an American citizen of Arab descent. She asks you to protect her from the authorities. You have known this person all of your life, and you are convinced that she is a loyal American. You agree to hide her in the third floor of your house. A United States federal agent knocks on your door and asks if you know the whereabouts of the person you are hiding. How would you respond to that agent? You now face a genuine moral dilemma because you cannot both keep your promise to your friend and tell the truth to the federal agent. Initially, your gut reaction might suggest that the solution to your dilemma is really quite simple. For example, you might believe that a far greater good will be served by lying to the federal agent than by breaking your promise to your friend. However, to embrace the moral principle inherent in that line of reasoning is to fall back into utilitarianism. We have already seen some of the difficulties that can result from trying to be a consistent and thoroughgoing utilitarian. Could you consistently universalize a moral principle that states: “Whenever you must choose between telling the truth to authorities and breaking a promise to a friend, always honor your promise”? Will that principle work in every case? Will Ross’s theory help in this situation? Explain your answer. Be sure to elaborate and provide your “theoretical” rationale in support of your position. (comprehension)
Grading Rubric for Quizzes
Grading criterion Unit Points Total Points
Uploaded to correct Dropbox 2 2
Submitted on time 15 15
Document Filename:
Your Last Name,first and middle initial with correct quiz number 5 5
(Example only: Creider_RD_q1)
Rationally expressed opinions, experiences (personal or observed), 8
arguments and premises (where appropriate) to support responses
(did not simply restate/summarize author/textbook
Clearly presented classical ethics theories relative to topic 8
Included ‘URL’ for appropriate verifiable current event 12 28
(i.e., example of topic being discussed WITH EXPLANATION)
NOTE: Must be less than 4 years old
Grammatically correct and appropriate tone 10
(professional, non offensive language)
Typographically correct 10 20
Included full citations as needed 3
Used correct APA format 7 10
Addressed each item within selected topic area 20 20
Maximum grade 100 100
NOTE: POINTS WILL BE DEDUCTED FROM TOTAL ASSIGNMENT GRADE IF EACH QUESTION YOU SELECTED IS NOT INCLUDED IMMEDIATELY BEFORE EACH ANSWER.
FOR MOKUL NETW 230
COURSE OVER vIEW IS ATTACH