research paper

Role of Data Mining in the Retail Sector.
1.what is the problem of the paper. Previous solution.( consider peer-reviewed papers in google scholars)
2. proposed solution and model
3.Testing/proves/ Experiments.
4. Results and Analysis.
5. Conclusion.
2000 words APA FORMATTING PROPER CITATIONS ALONG WITH REFERENCES MIN 6 REFERENCES…………………..

and I also need power point with minimum 12 slides for the research paper

I WANT IN 15 HOURS 

I NEED ABSTRACT IN 7 HOURS …. i am attaching just reference paper

Team managment dis 7

 Leadership Paradox and Inter-team Relations

A.     What is the leadership paradox? Give an example of the leadership paradox?   Support your discussion with material from our text book and from one external scholarly source. 

B.    List and define three serious biases or misassumptions that   groups involved in inter-team conflict sometimes experience? How do these biases and prejudices affect the ability of teams to accomplish their goals? Use our textbook for your material.  

Need min 300 word content excluding references

Research project on why organizations should implement Enterprise Risk Management (ERM), how it is effective, challenges, solutions and one real organization where ERM is applied?

 

Risk management is one of the most important components in  empowering an organization to achieve its ultimate vision. With proper  risk management culture and knowledge, team members will be “speaking”  the same language, and they will leverage common analytical abilities to  identify and mitigate potential risks as well as exploit opportunities  in a timely fashion. In order to consolidate efforts, the existence of  an integrated framework is crucial. This is why an ERM is necessary to  the fulfillment of any organization’s goals and objectives.

In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction
  • Why should an organization Implement an ERM application?
  • What are some key challenges and solutions to Implementing an ERM?
  • What is Important for an effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
  • Conclusion, final thoughts for future research
  • Recommendation

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course  textbook, and at least ten scholarly journal articles to support your  positions, claims, and observations, in addition to your textbook. The  UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Cloud_computing_week_15

Discussion Topic – Define Scalability and list five (5) to ten (10) potential relationships that align with the Pareto principle, such as how 80% of sales come from 20% of customers. 

 

Paper:

write a paper on governing the cloud. The following are the items to discuss in the paper (please use a different section heading for each topic):

  • List and describe five ways you think the cloud will change the future of TV.
  • List and describe five potential uses for intelligent fabric.
  • List and describe five ways the cloud will influence the mobile application market or vice versa.
  • Discuss the importance of HTML 5.
  • Discuss how the cloud will impact future operating systems.
  • List and describe three potential location-aware applications.
  • List and describe five ways intelligent devices may work together.

Paper requirements:

  • Minimum 1500 words (excluding title page, table of contents, abstract, and references pages)
  • Minimum of seven (7) references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitting as an attached MS Word document.

Devices into the workplace

 

Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment.

Your written assignment should consist of 2-3 paragraphs.

QUALITATIVE Journal Submit Article

Please don’t copy someone works from Internet

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References   

Emerging threats and countermeasures

You are the starting a consulting company that focuses on penetration testing. You have to present a presentation to a group who is thinking about hiring you to test their network systems. Create 15 powerpoint slides explaining and describing why:

  • Penetration is important
  • Vulnerability assessment is needed.
  • What will be tested
  • Reporting

Must have a reference page in APA

counter-reasearch

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

ETCM-Research-2

Four to six pages in length, not including the required abstract, cover page and reference page.

APA 7 format (Remember, APA is double spaced)) , citation are key. (No Need of replies.)This is a research paper not discussion. 

 

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.