Week-14

  

Week 14 Research Paper Final

Project Paper needs to have the following:

1. This is Part IV of 4 – the Final Paper: This Final Project Paper must be been pre-approved in earlier weeks by your instructor, using knowledge gained in the course. 

2. The Paper Topic must be the one approved earlier

3. It must follow the Paper Outline submitted earlier

4. It must utilize the Paper Bibliography submitted earlier

o your references must be formatted according to APA Guidelines

o you must use all 10 sources you supplied as Annotated Bibliography sources

o these sources should be from industry articles, journals, academic and professional textbooks, and case studies

o you may not use Wikipedia or Webopedia as a reference

5. The Project Paper

· must be around 10 to 15 pages – with full APA formatting 

· will follow a conventional report format (introduction, abstract (optional), body, conclusion, and references)

· rubric in the syllabus will be used for the paper

· Turnitin % must be below 15%

· Rubric in syllabus will be used to grade your paper – please review

Assignments 1) Post Assessment 2) Case study

1) Assignment 1  ( 2 Pages )

 Post-Assessment:

Mr. Fahad Naseem, and Mr. Ronald Joseph FBI Agent.

 Mr. Fahad Naseem was arrested in connection with the kidnapping and killing of journalist Daniel Pearl and admitted sending ransom e-mails using his Laptop. The laptop and handwritten versions of the e-mails were found in his possession. 

  • On the Contrary-A, Naseem later retracted his confession and the defense attorney asserted that logs from Mr. Naseem’s Internet Service Provider (ISP) indicated that Mr. Naseem’s account was not active and connected to the Internet at the time the e-mails were sent. 
  • On the Contrary-B

Naseem’s defense attorney claimed that the compromised Laptop produced in court had a different serial number from the one that was initially recorded in police records; hence, documentation relating to the computer and evidence in the case was inconsistent. 

  • On the Contrary-C

Documentation presented in court indicated that the Federal Bureau of Investigation (FBI) agent, Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002. In contrast, documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002, and the court denied the appeal, including the following explanation.

  • On the Contrary-D

The lead investigator Mr. Shaikh Naeem recovered the Laptop labeled (connection No. 66) retrieved from the accused, Mr. Fahad Naseem, on November 2, 2002, was provided to Mr. Ronald Joseph, FBI agent, who examined, conducted the forensic investigation, formulated his report, and conveyed evidence to the Consulate General of the United States of America. 

  • The report’s content asserted that the Black Soft Computer came with “Proworld” written on the exterior of the Laptop, and upon opening the case, a Dell Latitude Cpi laptop was discovered. 
  • The Laptop was identified in the report produced by this witness to be of model PPL with Serial number ZH942 located inside the Laptop as an IBM travel star hard driver [sic], confirmed to have been removed from the Laptop.
  • During examination, the label on the hard drive was identified as a system with 4.3 GB storage capacity, and serial number OKLA24302 on the outside of the laptop.  
  • After examining Exhibits, Mushernama who recovered the Laptop asserted that without a doubt whatever, the compromised Laptop is the same equipment that was seized from the accused, Mr. Fahad Naseem on November 2, 2002. 
  • On the Contrary-E

The forensic investigation report confirmed that the same Laptop was recovered on April 2, 2002 by the defense team. Availability of the Laptop at the American Consulate on April 2, 2002 is not unnatural and impossible because Marianne Pearl filed a complaint with the police on April 2, 2002, hours when the case was in the at the hands of the Investigating Agency.

Questions 1. As an Aspirant and Hopeful Digital Forensic Investigator:

1:1. Submit concluding evidence to the public and the court substantiating that Mr. Fahad Naseem is guilty of kidnapping and killing Mr. Daniel Pearl, the journalist.

1:2. Submit concluding evidence to the public and the court demonstrating that Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002, whereas documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002.

1:3. Submit concluding evidence to the public and the court attesting that Mr. Naseem’s Laptop’s availability at the American Consulate on April 2, 2002, is unnatural and unrealistic occurrences. 

Academic Integrity/Plagiarism

At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:

  • Cheating – using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities.
  • Lying – falsifying, fabricating, or forging information in either written, spoken, or video presentations.
  • Plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation

Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.

Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The potential penalty for academic dishonesty includes a failing grade on an assignment, a failing grade for the entire course, or charges against the student with the appropriate disciplinary body.

Reference

Casey, E (2011). Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, Elsevier.

2 ) Assignment 2 ( 2 Pages )

Many people think of the Internet as separate from the physical world. This is simply not the case–crime on the Internet is closely tied to crime in the physical world. There are a couple of reasons for this cautionary note. A crime on the Internet usually reflects a crime in the physical world, with human perpetrators. and victims and should be treated with the same gravity. To neglect the very real and direct link between people and the online activities that involve them limits one’s ability to investigate and understand crimes with an online component.

Students think about the impact of auction and check fraud in this modern era of digital shopping. This about how a combination of evidence from the virtual and physical worlds is used to apprehend a criminal.

Case Study

Case Example inspired by a case in (Casey, 2011)

A buyer on Amazon complained to police that he sent payment to a seller but received no merchandise. The seller requested that the buyer also send a cashier’s check for shipping and additional costs. Over a period of weeks, several dozen similar reports were made to the Internet Fraud Complaint Center against the same seller. To hide his identity, the seller used a Gmail account for online communications and several mail drops to receive checks. Logs obtained from Gmail revealed that the seller was accessing the Internet through a subsidiary of AT&T. When served with a subpoena, AT&T disclosed the suspect’s Google account and associated address, credit card, and telephone numbers. Investigators also obtained information from the suspect’s bank with a subpoena to determine that the cashier’s checks from the buyers had been deposited into the suspect’s bank account. A subpoena to Amazon for customer order history and complaints and supporting evidence from each of the buyers helped corroborate direct connections between the suspect and the fraudulent activities. Employees at each mail drop recognized a photograph of the suspect obtained from the Department of Motor Vehicles. A subpoena to the credit card number and a search of real estate property indicated where he conducted most of his fraud. A 3rd company revealed the suspect’s Social Security the suspect’s name turned up an alternate residence the opportunity to uncover crimes in the physical Internet.

Students respond to the following questions related to this case in your Cybertrail_YourLastName.docx document.

Question 1 – Following the Cybertrail

Comment on the interconnectedness of the digital world. To what extent does cyber-criminal have anonymity in their transactions? Be detailed in your response. 

Question 2 – Following the Cybertrail

By what means of your expertise in Digital Forensic Evidence provide a critical forensic investigation approach that will play a key role in protecting consumers in this scenario from digital fraud such as this?

Discussion

 

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Practical Connection Assignment

 Provide a reflection of at least 500 words (or 2 pages double spaced) of  how the knowledge, skills, or theories of this course have been  applied, or could be applied, in a practical manner to your current work  environment. If you are not currently working, share times when you  have or could observe these theories and knowledge could be applied to  an employment opportunity in your field of study.     

research 1

 

The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business values while it can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data.

For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

Your paper should meet the following requirements:

• Be approximately 3-5 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations. 

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Duscussion

 

Conduct independent research to find a targeted recruiting strategy. Then answer the following:

  • Describe the strategy.
  • Who does it target?
  • Does it work?

Also share other recruiting strategies you personally think are worth using.

  • Please describe them
  • Share why you think they work

Cite sources.

current and emerging technologies

  

The research report must include materials found in at least 2 chapters of the assigned Wharton textbook. The research report must be based on your reading of the assigned textbooks and literature research (peer reviewed journals and conference proceedings, etc.).

Write an original research report consisting of one of the following topic areas: 1) Virtual Organizations, 2) Network Organizations, 3) Spin-out Organizations, 4) Ambidextrous Organizations, 5) Front-Back Organizations, 6) Sense and Response Organizations.

Your research report topic area is to include a comparative analysis of at least 4 organizations that have either succeeded or failed. Success and failure should be measured according to factors that you establish and reasonably supported by the literature.

NOTE: NO ARTICLE PUBLISHED ON THE INTERNET THAT IS NOT DIRECTLY CONNECTED TO AN ESTABLISHED PEER-REVIEWED PROFESSIONAL CONFERENCE, JOURNAL OR MAGAZINE IS ACCEPTABLE AS A CITED REFERENCE SOURCE.  Your

paper is to have a title page, introduction, well defined literature review (body), findings,

conclusion, and reference pages. The paper must be at least 2,500 words.

Always keep in mind the intended reader(s) of your research paper when developing and writing your paper. The reader must receive value from your research and what you write. Utilize graphs, charts, tables or figures if it enhances the point(s) you are making. Plagiarism will be checked and if found, will result in a zero grade for the Research Report

Your research paper must be written at the graduate level and should demonstrate a high degree of understanding of the topic being discussed. 

Research Paper

 

Prepare

The writing style is almost like a reference for every sentence to every other sentence. If you state a term, idea, or concept that is not your own, you need to provide a reference. Each paragraph should focus one idea and should do so in a way that it connects back to helping readers understand either the topic of your study, the complexity of your problem, or the main research question in your study. 

These are references that need to be embedded in your paragraphs. If you talk about an idea, concept, or model or term, you need to provide a reference at the end of that sentence. You mention a static or state something as a fact; you need a reference at the end of that sentence. Your thoughts about the topic might be true, but if you cannot find a reference that supports it and allows you to write in a way that does not read like it is your own bias and opinion, then you need to remove the sentence. 

You cannot list terms and concepts unless you connect them to your problem statement, purpose statement, and research questions. 

The case

Introduction consist of 1-2 page overview  explaining  what is currently concerning   happening. < you can repurpose week two assignment  to complete this section>

 Remember, this is a culmination of all the work you’ve done throughout this course.

Research

Literature review 

Remember, many of these theories and concepts can come from your course text or from university on-line library from articles that you get using the following search terms. Present an 8 to 9 pages of theories, models, and concepts describing how you fix or address the problem in the selected case study.

Suggested Search Terms 

Kotter Change Management Model

Strategic planning, Disaster Recovery planning

Business Continuity Planning

Servant Leadership

Employee Engagement

Organizational Pandemic Planning

Workforce Staffing Planning, Emergency Response Planning

Cybersecurity Risks with Telework, Organizational Planning

Organizational Development

and Agile Project Management

< I encourage you to add some terms of your own here>

Tasks

Write your final paper consisting of 15 to 17 pages refining the draft paper for the case study solution (s) presented in week 4. 

As you work on your final paper, I would like to reiterate the importance of use the APA writing style and Grammarly to enhance your document. 

Submission

You are required to write at the graduate level with meaningful writing. Your paper should be in the following format:

  • APA Style
  • A cover page and Reference page
  • double spaced 12 point Times Roman New in APA format. 
  • A minimum of 20 different references, which could include your course textbook
    • majority of your reference should be scholastic resources
    • Wikipedia  is not an acceptable source of reference 
  • Paragraphs should be written in the MEAL writing style for clarity in terms of making the argument. See resource page in this course.