Discussion question #1-4 When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week. All work must be original (not copied from any source).

 Choose any two questions write 200-300 words thats  

Discussion #1: How do you describe the importance of data in analytics? Can we think of analytics without data? Explain.

 Discussion #2: Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?

 Discussion #3: Where do the data for business analytics come from? What are the sources and the nature of those incoming data?

 Discussion #4: What are the most common metrics that make for analytics-ready data? 

Term Paper

Excluding diagrams, figures, and references it must be 5 pages.

Follow .dox file for more details.

Only accept bid if you have cybersecurity knowledge including Control System, System architecture, HMI, Servers, Controllers, Nodes

ARTIFICAIL INTELLIGENCE

You will argue that health care’s increasing reliance on artificial intelligence will have a negative effect on health and society.

Present your assigned case against artificial intelligence in a PowerPoint presentation with speaker notes

At minimum, address each of the following elements.

· Explain how artificial intelligence is used in health care.

· Analyze how artificial intelligence and related technologies are effecting change in health care.

· Compare and contrast clinical decision support systems in terms of implementation of artificial intelligence.

· Examine the legal and ethical considerations of the use of artificial intelligence in health care.

· Summarize the key points supporting your point of view within your slides, adding additional detail within your speaker notes.

CIS

 

Assignment 4: Mobile Devices and Self-Service e-Commerce
Due Week 10 and worth 260 points

Imagine that you have been hired by the startup e-Commerce company Sports R US to provide a convenient self-service solution for customers accessing sports products. The Web application would need to be available on mobile devices (e.g., smartphones, tablets, laptops, notebooks). The application also needs to work on multiple Web browsers (i.e.., Chrome, Internet Explorer, Firefox, Safari and others to support self-service tasks. Sports- R-US has asked you to provide a Human-Computer Interaction (HCI) guide for design and implementation of this service.

Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

This assignment must address the following topics:

  • Information Gathering
  • Design Strategy
  • Prototyping
  • Implementation

Write a six to eight (6-8) page paper in which you:

1. Describe the following:

  1. Purpose and goals of a mobile self-service.
  2. Target segment (audience).
  3. Audience needs and wants.
  4. Resources necessary to achieve the desired outcome.
  5. Design of the Website for mobile devices
  6. Interfaces applicable to mobile devices.

2. Design each of the following using Microsoft Visio or any open source wire framing or mockup tool. Note: The graphically depicted solution is not included in the required page length.

  1. The Sports R US home page for a mobile device.
  2. The self-service Web page to review products and checkout using mobile devices.

3. Recommend one (1) prototype that could be created.
4. Determine the type of evaluation method to use in a Web design for the best user experience.
5. Provide key details of how the mobile self-service will be implemented on various mobile devices.
6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
7. Format your assignment according to the following formatting requirements:

  1. This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details.
  2. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  3. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.
  4. Include a reference page. Citations and references must follow SWS format. The reference page is not included in the required page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the differences in developing user interfaces for different application environments.
  • Compare and contrast the different types of interactive environments.
  • Use technology and information resources to research issues in human-computer interaction.
  • Write clearly and concisely about human-computer interaction topics using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using this rubric.

Week-14

  

Week 14 Research Paper Final

Project Paper needs to have the following:

1. This is Part IV of 4 – the Final Paper: This Final Project Paper must be been pre-approved in earlier weeks by your instructor, using knowledge gained in the course. 

2. The Paper Topic must be the one approved earlier

3. It must follow the Paper Outline submitted earlier

4. It must utilize the Paper Bibliography submitted earlier

o your references must be formatted according to APA Guidelines

o you must use all 10 sources you supplied as Annotated Bibliography sources

o these sources should be from industry articles, journals, academic and professional textbooks, and case studies

o you may not use Wikipedia or Webopedia as a reference

5. The Project Paper

· must be around 10 to 15 pages – with full APA formatting 

· will follow a conventional report format (introduction, abstract (optional), body, conclusion, and references)

· rubric in the syllabus will be used for the paper

· Turnitin % must be below 15%

· Rubric in syllabus will be used to grade your paper – please review

Assignments 1) Post Assessment 2) Case study

1) Assignment 1  ( 2 Pages )

 Post-Assessment:

Mr. Fahad Naseem, and Mr. Ronald Joseph FBI Agent.

 Mr. Fahad Naseem was arrested in connection with the kidnapping and killing of journalist Daniel Pearl and admitted sending ransom e-mails using his Laptop. The laptop and handwritten versions of the e-mails were found in his possession. 

  • On the Contrary-A, Naseem later retracted his confession and the defense attorney asserted that logs from Mr. Naseem’s Internet Service Provider (ISP) indicated that Mr. Naseem’s account was not active and connected to the Internet at the time the e-mails were sent. 
  • On the Contrary-B

Naseem’s defense attorney claimed that the compromised Laptop produced in court had a different serial number from the one that was initially recorded in police records; hence, documentation relating to the computer and evidence in the case was inconsistent. 

  • On the Contrary-C

Documentation presented in court indicated that the Federal Bureau of Investigation (FBI) agent, Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002. In contrast, documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002, and the court denied the appeal, including the following explanation.

  • On the Contrary-D

The lead investigator Mr. Shaikh Naeem recovered the Laptop labeled (connection No. 66) retrieved from the accused, Mr. Fahad Naseem, on November 2, 2002, was provided to Mr. Ronald Joseph, FBI agent, who examined, conducted the forensic investigation, formulated his report, and conveyed evidence to the Consulate General of the United States of America. 

  • The report’s content asserted that the Black Soft Computer came with “Proworld” written on the exterior of the Laptop, and upon opening the case, a Dell Latitude Cpi laptop was discovered. 
  • The Laptop was identified in the report produced by this witness to be of model PPL with Serial number ZH942 located inside the Laptop as an IBM travel star hard driver [sic], confirmed to have been removed from the Laptop.
  • During examination, the label on the hard drive was identified as a system with 4.3 GB storage capacity, and serial number OKLA24302 on the outside of the laptop.  
  • After examining Exhibits, Mushernama who recovered the Laptop asserted that without a doubt whatever, the compromised Laptop is the same equipment that was seized from the accused, Mr. Fahad Naseem on November 2, 2002. 
  • On the Contrary-E

The forensic investigation report confirmed that the same Laptop was recovered on April 2, 2002 by the defense team. Availability of the Laptop at the American Consulate on April 2, 2002 is not unnatural and impossible because Marianne Pearl filed a complaint with the police on April 2, 2002, hours when the case was in the at the hands of the Investigating Agency.

Questions 1. As an Aspirant and Hopeful Digital Forensic Investigator:

1:1. Submit concluding evidence to the public and the court substantiating that Mr. Fahad Naseem is guilty of kidnapping and killing Mr. Daniel Pearl, the journalist.

1:2. Submit concluding evidence to the public and the court demonstrating that Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002, whereas documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002.

1:3. Submit concluding evidence to the public and the court attesting that Mr. Naseem’s Laptop’s availability at the American Consulate on April 2, 2002, is unnatural and unrealistic occurrences. 

Academic Integrity/Plagiarism

At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:

  • Cheating – using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities.
  • Lying – falsifying, fabricating, or forging information in either written, spoken, or video presentations.
  • Plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation

Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.

Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The potential penalty for academic dishonesty includes a failing grade on an assignment, a failing grade for the entire course, or charges against the student with the appropriate disciplinary body.

Reference

Casey, E (2011). Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, Elsevier.

2 ) Assignment 2 ( 2 Pages )

Many people think of the Internet as separate from the physical world. This is simply not the case–crime on the Internet is closely tied to crime in the physical world. There are a couple of reasons for this cautionary note. A crime on the Internet usually reflects a crime in the physical world, with human perpetrators. and victims and should be treated with the same gravity. To neglect the very real and direct link between people and the online activities that involve them limits one’s ability to investigate and understand crimes with an online component.

Students think about the impact of auction and check fraud in this modern era of digital shopping. This about how a combination of evidence from the virtual and physical worlds is used to apprehend a criminal.

Case Study

Case Example inspired by a case in (Casey, 2011)

A buyer on Amazon complained to police that he sent payment to a seller but received no merchandise. The seller requested that the buyer also send a cashier’s check for shipping and additional costs. Over a period of weeks, several dozen similar reports were made to the Internet Fraud Complaint Center against the same seller. To hide his identity, the seller used a Gmail account for online communications and several mail drops to receive checks. Logs obtained from Gmail revealed that the seller was accessing the Internet through a subsidiary of AT&T. When served with a subpoena, AT&T disclosed the suspect’s Google account and associated address, credit card, and telephone numbers. Investigators also obtained information from the suspect’s bank with a subpoena to determine that the cashier’s checks from the buyers had been deposited into the suspect’s bank account. A subpoena to Amazon for customer order history and complaints and supporting evidence from each of the buyers helped corroborate direct connections between the suspect and the fraudulent activities. Employees at each mail drop recognized a photograph of the suspect obtained from the Department of Motor Vehicles. A subpoena to the credit card number and a search of real estate property indicated where he conducted most of his fraud. A 3rd company revealed the suspect’s Social Security the suspect’s name turned up an alternate residence the opportunity to uncover crimes in the physical Internet.

Students respond to the following questions related to this case in your Cybertrail_YourLastName.docx document.

Question 1 – Following the Cybertrail

Comment on the interconnectedness of the digital world. To what extent does cyber-criminal have anonymity in their transactions? Be detailed in your response. 

Question 2 – Following the Cybertrail

By what means of your expertise in Digital Forensic Evidence provide a critical forensic investigation approach that will play a key role in protecting consumers in this scenario from digital fraud such as this?

Discussion

 

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Practical Connection Assignment

 Provide a reflection of at least 500 words (or 2 pages double spaced) of  how the knowledge, skills, or theories of this course have been  applied, or could be applied, in a practical manner to your current work  environment. If you are not currently working, share times when you  have or could observe these theories and knowledge could be applied to  an employment opportunity in your field of study.