discussion

Raw data is often dirty, misaligned, overly complex, and inaccurate and not readily usable by analytics tasks. Data preprocessing is a data mining technique which is used to transform the raw data in a useful and efficient format.

The main data preprocessing steps are:

•          Data consolidation

•          Data cleaning

•          Data transformation

•          Data reduction

  1. Research each data preprocessing step and briefly explain the objective for each data preprocessing step.  For example, what occurs during data consolidation, data cleaning, data transformation and data reduction?
  2. Explain why data preprocessing is essential to any successful data mining.  Please be sure to provide support for your answer.

Discussion – Enterprise Risk Management (350 words)

 

After reading both articles this week (see below), and any other relevant research you locate, please discuss the following: 

Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

**************************************——————**************

Reading Assignments

Reading Assignments

Security Risk Mitigation Plan

  

Take on the role of Risk Management Analyst for Capital One Finance.  

Using the attached Segregation of Duties Matrix, create a 6- to 8-page Security Risk Mitigation Plan for the Capital One Finance.

Research and include the following: 

· Refer to additional resources below and attached, and the grading rubric.

· Security Risk Mitigation Plan:

· Select and document security policies and controls.

· Provide authentication recommendations.

· Document administrator roles and responsibilities.

· Document user roles and responsibilities.

· Determine authentication strategy.

· Determine intrusion prevention and detection strategy.

· Determine virus detection strategies and protection.

· Create auditing policies and procedures.

· Recommend an education plan for employees on security protocols and appropriate use.

· Provide recommendations for managing identified risk

· Avoidance

· Transference

· Mitigation

· Acceptance

· Address change Management/Version Control.

· Outline acceptable use of organizational assets and data.

· Present employee policies (separation of duties/training).

· Incident response process

· Preparation

· Detection

· Containment/analysis

· Eradication

· Restoration/Recovery

· Lessons learned (root cause analysis and action plan)

Additional Resources

· Intrusion prevention begins with an IPS that can automatically detect and stop intrusions. However, no control can stop all intrusions. Consequently, we need strong detection controls, including

· Log Management

· User Behavior Analysis

· Network Behavior Analysis

· The purpose of separation of duties is to ensure no one person can perform all tasks associated with a critical business process. This helps prevent fraud and mistakes. A common way to do this is the creation of roles (RBAC) and the assignment of tasks in an access matrix (spreadsheet). This allows data owners to understand who can do what and how to remove one or more tasks to ensure no role can perform all business process tasks. A separation of duties tool is attached below. The tabs along the bottom take you to the various business processes included. Adapt this to any set of business processes.

· Employee training is typically focused on the contents of the acceptable use policy.

DM Dis-3

Questions:

1) The rule-based classification can be used to refer to any classification scheme that make use of IF-THEN rules for class prediction. Discuss the rule-based classification schemes and what is Rule Pruning in data mining?

2) Bayesian classification is based on Bayes’ Theorem. Bayesian classifiers are the statistical classifiers. Discuss what is Bayesian classification in data mining? How do Bayesian networks work? What do Bayesian networks predict?

Write in 2 pages and everything in APA format.

on time delivery.

plagiarism free.

DS Hw-10

Q: Go through the Google Machine Learning Crash Course (free)

https://developers.google.com/machine-learning/crash-course

And write a paper describing the following exercises:

a.  Explain the stochastic gradient descent algorithm for reducing loss

https://developers.google.com/machine-learning/crash-course/reducing-loss/gradient-descent

b.With the playground exercise explain the relationship between learning rate and convergence

https://developers.google.com/machine-learning/crash-course/reducing-loss/playground-exercise

c.Explain the anatomy of a neural network in your paper

https://developers.google.com/machine-learning/crash-course/introduction-to-neural-networks/anatomy

d.Review playground exercises on neural networks and explain in your paper

https://developers.google.com/machine-learning/crash-course/introduction-to-neural-networks/playground-exercises

Review the course in your paper and explain how it helps in understanding what neural networks are

bi13

1. Some people say that chatbots are inferior for chatting.Others disagree. Discuss.

2. Discuss the financial benefits of chatbots.

3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.

4. Compare the chatbots of Facebook and WeChat. Which has more functionalities?

5. Research the role of chatbots in helping patients with dementia

6. Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.

APA format with 2 references.
2 pages

4s week 13 assignment IA

In 350 Words

What are some of the industry-standard certifications that exist.  Which ones are the most sought after in the IT security field and why? What are the requirements for the certifications, test, number of questions, duration, domain, years of experience required?

Include references.

No copy-paste, use your own words.
 

Assignment 2 research Infotech Global

 

Question: You have read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s a strategy for staying global if it is.
  • Research other company’s strategy for going global and explain if this will or will not work for your company. 
  • Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

Submit paper as a single document. Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

No Plagisram 

implement a “prototype” database system application / ERD diagram for an eCommerce social-network system

 

The goal of the project is to implement a “prototype” database system application / ERD diagram for an eCommerce social-network system called UCOnline where users can explore information about books/music/software, rate your purchase, identify purchase price and see ratings of their friends.

 The project will require you to complete the assignment individually. Below you will find the ERD deliverable requirements. There are two parts to the assignment. You must create a diagram using a diagramming tool AND provide a written text-based document explaining your relationship mapping (systems analysis use case document). The assignment is worth 350 points. See rubric for grading scheme. 

BUSINESS REQUIREMENTS ACROSS ALL ASSIGNMENTS

You will work with book/music/media information, user information, ratings of books, and users’ social network

  • Each book has an id, title, publication date, publisher, ISBN, functional category, page count, price (publisher), and product description
  • There are 3 categories of book: fiction, non-fiction, and specialty
  • There are 2 categories of music: digital and media-based
  • An author can write one or more books.
  • A musician can be a solo artist, part of a group, or both
  • An author can also be associated with one or more publishers.
  • A musician/group/act can be associated with one or more music houses
  • An author’s book can have one or more editions.
  • A song and or album can have more than one version/edition (i.e. EP, LP, CD, DVD etc)
  • A publisher can have many authors and many books.
  • A record company can have many artists associated and many albums associated with it. 
  • A record company can also be the publishing company (i.e. self-publishing)
  • Many ISBNs can also be associated with a given publisher but only one ISBN per form of medium (ie the ISBN is the PK no matter what).
  • An author can write many books.
  • An artist can write many songs, albums etc.

UCOnline needs to keep track of user ratings for each item sold in the online store (e.g., 1-5 and 1 for ‘Dislike’, to 5, for ‘Awesome!’).

A particular user rates a particular item at a given time.

A user CANNOT rate the same multiple times unless there are multiple editions of the item. Each edition can be rated separately.

Each user who submits a rating will be identified by a unique id and has a name, gender, age, and location. Nothing is anonymous.

There is also a social network between users. Users can send communication requests (i.e. instant messages/emails) to other users. Such requests can be accepted or ignored. Once accepted, the two users are considered ‘book buddies.’ If ignored, the user can send the request again. We want to add a store when the requests were sent (timestamp), the result of the requests and when the request was answered (timestamp).