Homework

Assignment 2: Crime Control vs. Due Process
For many years, New York City suffered from very high rates of both violent and property crime. In 2001, the September 11 attack brought down the World Trade Center towers. Since then, there have been several attempted acts of terrorism as well.
In response to these difficult challenges, the New York Police Department (NYPD) implemented several new procedures, including:
Stop and frisk
“Mosque crawling” (undercover surveillance of city mosques)
Prepare a report in Microsoft Word that addresses the following points:
Describe the two programs listed above.
Analyze whether these programs have been effective. To do this, you will need to locate crime statistics for New York City and determine whether crime and terrorism have increased or decreased.
Discuss how these programs relate to the issue of crime control versus due process.
Explain how the presence of crime or the potential for terrorism might impact New York economically.
Recently, the stop-and-frisk program has been suspended by a federal judge. Do you agree with this decision? Explain your reasoning.

Discussion Post-good regulatory compliance

 

Describe in 500 words what a dba must be aware of to maintain good regulatory compliance when moving to the cloud.

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

APA references with citiaitons

musyokiones

I need an ethical dilemma using the ACM code of ethics and the following title:

“Does the Fourth Amendment extend to Digital Data?”

Discussion: Communication Strategies

In this discussion, we will focus on best strategies for reaching these audiences. How would you communicate with various audiences? Would you use emails? Training videos? Manuals with graphics? Websites? Blogs? Other channels? For this discussion, pick two target audiences, one technical (customer support, research and development, etc.) and one nontechnical (management, marketing, sales, customers, etc.), and describe how you would educate them on a new technical product that was being developed and launched.

Big Data and Cloud Computing _ Discusion

As outlined within this weeks topic, there are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry. Pick one of the four concepts below and then identify the benefits and challenges associated with that concept. Do not simply list the benefits and challenges but detail them in a substantive, thorough post as it relates to that concept in the e-healthcare industry.

  • Data Gathering
  • Storage and Integration
  • Data Analysis
  • Knowledge Discovery and Information Interpretation

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

application security

 

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. Describe operating system hardening
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment?
  2. Describe system restoration methods and procedures
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence
      1. Describe why evidence is collected,
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

Response 3-3

Note: Please go through the attached document. we need to respond to that like whether we are agreeing or not. If yes why we are agreeing if not why we are not agreeing. 

Need it in APA format with peer reviewed references.

Password complexity policy (Cybersecurity)

 For this week’s discussion,explain the purpose of a password complexity policy.  Give an example of a complete one that you may have used or have seen used.  Also, give an example of one that is not complete and where there may be holes that could cause issues.  Give full details of each example.  

Assignment

 Discussion #1: What are some of the major privacy concerns in employing intelligent systems on mobile data? 

Discussion #2: Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.