The Future of Your Personal Data - Privacy vs Monetization | Stuart Lacey | TEDxBermuda

all assignments for professor foley

1.Prepare a one to two page paper on some of the various types of data mining and statistical software and the features thereof.  Please double space your paper and cite your sources.

2.  After observing the TED Talk on Big Data, prepare a one page paper on the TED Talk

https://www.ted.com/talks/tricia_wang_the_human_insights_missing_from_big_data/reading-list?rss

3.  Prepare a one page paper on Data Mining Methods. You may research the internet for more information. Please double space your paper and cite your sources. 

4.  

After viewing the following Ted Talk on Big Data and privacy, prepare a one page paper on this Ted Talk topic “The Future of your Personal Data”.

The Future of Your Personal Data – Privacy vs Monetization | Stuart Lacey | TEDxBermuda (Links to an external site.)The Future of Your Personal Data - Privacy vs Monetization | Stuart Lacey | TEDxBermuda 

What are some steps that you can do to protect yourself online?

Please double space your paper and cite your sources.

Discussion 1

Resistance to change is a normal everyday aspect in the workplace.  Note what happens to the organizational climate when this resistance occurs and any tactics to reduce negative connotations when dealing with change.

Note: The first post should be made by Wednesday 11:59 p.m., EST. 

Need it in APA Format 

NO Plagiarism 

1 Page, Remember the APA cover page and the references 

IT

 

Ethic 

Et 

Ethical Issues That May Arise In Information Management

 ethical Issues That May Arise In Information Management

Discussion

 

Write a brief paper on the following topics: What is the Dark Web? How is it accessed? How is it used by criminals? How can it be used in a positive way? How can be used by law enforcement and the intelligence services. How can be used by private individuals.

 300 words.

database

create a data in IBM database with students transcripts data in it and create a front end page  and connect it to database so that we can retrieve data from database through frontend page. 

Discuss Malware

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. What is malware? 
    1. Discuss at least five types, describing each.
    2. Discuss what they are and what they do.
    3. Discuss a notable instance of each type
  2. What impact can malware have on an organization
  3. How can an organization reduce risks associated with malware?  (Hint: talk about appropriate types of policies, procedures, and the use of technology)
  4. What is software piracy or license violations?
    1. What can an organization do to avoid it?
    2. What are the potential consequences of it?
    3. What relationship does it have with malware?

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

week 8 discussion NS

Select a specific phishing attack tool/method (NOT vishing, BEC, CEO fraud) such as Emotet, Blackhole etc. etc. and explain how the attack works along with how we, as defenders, can prevent this attack from being successful.