Peer Review Article

 

Find a peer reviewed article pertaining to Blockchain and HR. Write a critical review of the article. Your review should  be at least 3 pages long from introduction to conclusion. Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow the writing requirements for this course when preparing the paper. Use the following format for the paper:

1.  Introduction, including the purpose of your paper and a preview of your paper. Be sure to also provide the article’s title and author(s)’ name(s) in the introduction of your paper.

2. Discuss the purpose and problem the article is addressing.

3. Elaborate on the content of the article.

4. Discuss the findings and conclusion(s) drawn by the article’s author.

5. Discuss the author’s point of view and assumptions. Indicate whether unsubstantiated assumptions were made and whether there is bias that exists in the article.

6. Discuss the significance of the article. Why it is important? On what do you base your assertions?

7. Conclude your paper. Summarize the important aspects of the review.

8. References

Your paper should include 8 centered and bolded headings that correspond to each of the required sections (Introduction, Article’s Purpose and Problem, Content, Article’s Findings and Conclusions, Point of View and Assumptions, Significance, Conclusion, References).

Assignment

 Chapter 3 –discussion question #1-4 & exercise 12 (choose any two)

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source). 

Discussion: 

1. How do you describe the importance of data in analytics?

Can we think of analytics without data? Explain.

2. Considering the new and broad definition of business

analytics, what are the main inputs and outputs to the

analytics continuum?

3. Where do the data for business analytics come from?

What are the sources and the nature of those incoming

data?

4. What are the most common metrics that make for

analytics-ready data?

Exercise:

12: Go to data.gov—a U.S. government–sponsored data

portal that has a very large number of data sets on a

wide variety of topics ranging from healthcare to education,

climate to public safety. Pick a topic that you

are most passionate about. Go through the topic- specific

information and explanation provided on the site.

Explore the possibilities of downloading the data, and

use your favorite data visualization tool to create your

own meaningful information and visualizations.

Python Coding

 

Problem 1: Create a Python program to solve a simple pay calculation. Calculate the amount of pay, given employee name, hours worked, and hourly rate. (The formula to calculate payroll is pay = hourly rate * hours worked.) Display employee name, hourly rate, hours worked, and pay. (Do not add any rules such as overtime)

Problem 2: Create a Python program to calculate the average miles per gallon obtained on a trip. Input car name, the amount of gas used and the number of miles driven. (The formula to calculate miles per gallon is miles per gallon = number of miles driven / amount of gas used. ) Display car name, gas used, miles driven and MPG. Use your own values to test the. You can hard code the values or you can use the input() function. See announcement  for sample code.

123

Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved.

Blockchain Technology could be proposed as a solution

 After working on Blockchain literature review, pick one area where you think Blockchain Technology could be proposed as a solution. Briefly explain your proposed solution. Your final document should include an Abstract and a Conclusion. This assignment should be in APA format and have to include at least six references. Also a required template is included, make sure to use it. 

 Length: Minimum of 1000 words.  

ethics

 

Discuss in five hundred words or more a situation at work where you felt you had to consider the ethics of something you were being asked to do. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

WK-2

  

Assignment 1

Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.

Refer to Chapter 3 in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

Requirement: 

****Separate document for each assignment.****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add references separately for each assignment question.

Double Spaced and APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Assignment 2:

What are the privacy issues with data mining? Do you think they are substantiated?

Refer to Chapter 4  in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Requirement: 

****Separate document for each assignment.****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add references separately for each assignment question.

Double Spaced and APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

1-2 page in APA 6th standard- Using virtualization to protect subscriber data

Using virtualization to protect subscriber data-In your initial discussion post, recommend two options or approaches that cloud service providers can implement to protect subscriber data. Keep in mind, there is a balance to be struck between relying on trusted processes and security policies, and achieving operational agility –especially when subscriber data is at stake

Discussion-2

After this weeks readings and your own research, describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data? Feel free to argue for and against, just make sure to back up your statements with scholarly support.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Main Post is due by the end of Thursday (250 words minimum).

2 Responses (100 words minimum) using at least one of the following:

  • Ask a probing question.
  • Offer a suggestion.
  • Elaborate on a particular point.
  • Provide an alternative opinion.