BI_Assignment_2

 

Complete the following assignment in one MS word document:

Chapter 2 – Exercises 4 and 15

Exercise 4:

In 2017, McKinsey & Company created a five part video titled “ Ask the AI Experts: What Advice Would you give to executives About AI” View the Video and summarize the advice given to the major issues discussed.

Exercise 15:

There are a few AI applications for tourism, such as Bold360 and AltexSoft, for dealing with customers and offering consultancy services. Discuss these in a report.

Include an APA cover page and include at least two APA formatted references

case study

Using Security Policies and Controls to Overcome Business Challenges

Learning Objectives and Outcomes

  • Understand the importance of information security policies and the role they play in business activities to ensure sound, secure information.
  • Identify four IT security controls for a given scenario.

Scenario

  • The organization is a regional XYZ Credit Union/Bank that has multiple branches and locations throughout the region.
  • Online banking and use of the Internet are the bank’s strengths, given limited its human resources.
  • The customer service department is the organization’s most critical business function.
  • The organization wants to be in compliance with Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
  • The organization wants to monitor and control use of the Internet by implementing content filtering.
  • The organization wants to eliminate personal use of organization-owned IT assets and systems.
  • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
  • The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into an annual security awareness training program.

Assignment Requirements

Using the scenario, identify four possible information technology (IT) security controls for the bank and provide rationale for your choices.

Length: 1–2 pages

Discussion question

In this week’s reading, the concept of 3-F Method is introduced.  Discuss the purpose of this concept and how it is calculated.  Also perform your own research/analysis using these factors and provide your assessment on whether the United States need to introduce top talents in the field of big data and cloud computing by using bibliometrics.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

W1. Discussion

 

After this weeks readings and your own research, describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data? Feel free to argue for and against, just make sure to back up your statements with scholarly support.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Cloud Computing Discussion 7

Discuss in 500 words, why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc. 

Use at least three sources. Do not use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) these quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Standalone quotes will not count toward the 3 required quotes.

SQL presentation assignment

 

create a presentation, covering the following objectives:

  • Explain the  basic commands and functions of SQL
  • How to use SQL for data administration (to create tables, indexes, and views)
  • How to use SQL for data manipulation (to add, modify, delete, and retrieve data)
  • How to use SQL to query a database to extract useful information

  • Use PowerPoint. Prezi or a similar presentation tool.

Explore data, Python

Advanced filtering

To filter by date ranges we need to get fancy with Boolean operators

Strip out all other values except one

Sort the new baby dataframe on multiple keys

Sort the new baby dataframe with string concatenation to narrow the display

Assignment 12

Using a Microsoft Word document, please discuss the case involving the United States of America versus Ross Ulbrecht.

The minimum word count shall be not less than 500 words with APA and references and citations.