QUANTITATIVE Journal Article Review

 

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References  

Security Policy Plan

 

This is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on information as an asset and logical security techniques for a hypothetical law firm. The goal of this deliverable is to secure an information security policy, suggesting the fundamental guidelines should an untoward event occur. It can be seen that information assets security management can be reduced down to three basic principles: integrity, confidentiality, and availability. Structure a policy around and within computers and associated equipment, as well as the people using it. Note: You may create or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements

 

Write a 3–5 page paper in which you:

  • Create a cybersecurity policy describing the principle, the objective, and policy statement for the law firm’s company network.
  • Describe the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities.
  • Suggest the cybersecurity policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial.
  • Determine the security testing methodology you would use to facilitate the assessment of technical controls.
Section 2

Complete the following:

  • Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include:
    • Tasks, subtasks, resources, and predecessors.
    • An outline of the planning, analysis, design, and implementation phases.
    • The use of cybersecurity in the information systems development life cycle.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

The specific course learning outcome associated with this assignment is:

Research Paper

Need a research paper. Please open the word file to see the guidelines. I have provided a template so you can follow that or you can have your own style. But strictly follow the guidelines provided. I need someone who has knowledge in cybersecurity. 

webstore

Pine Valley Furniture’s board of directors is ready to review how to implement and maintain the new webstore system.

Write a 6- to 8-page implementation and maintenance plan for the new webstore. Include the following:

Recommend an installation strategy for PVF’s student furniture webstore. The installation strategies are direct installation, single-location, parallel installation, and phased installation. Justify your recommendation by stating the advantages and disadvantages as compared to the other three installation strategies.

Outline the documentation that you would suggest being created to document the system, train, and support users.

Outline the testing plan for the system. Include brief descriptions of the activities for each element of your testing plan.

Summarize the maintenance needs of the PVF webstore, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management.

Cite any references according to APA guidelines. For maximum points, include 3 academically acceptable references.

Internet security policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

CC Week 14 DB

Hello,

i need this paper by 08/12 afternoon.

Strictly No plagiarism please use your own words.

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources. Use the Research Databases available from the Danforth Library (https://libguides.nec.edu/az.php) not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Strictly No plagiarism

Cloud computing

Answer the following question in 150-200 words.  Then, respond using 50-75 words.

Discuss the role Sarbanes/Oxley has played with respect to corporate governance.

week 1 Managerial Finance

Part 1: Financial Acumen

Keeping abreast of the financial measures and metrics employed by a company allows employees to better understand its health and position at any given time.

1. Review at least three (3) articles on financial acuity. Summarize the articles in 400 – 600 words. Use APA formatting throughout including in-text citations and references.

2. Discuss the benefits of establishing solid financial acumen in a company? Discuss your personal experiences in a situation where financial acumen was either not supported as an organizational hallmark or, conversely, was built into the company’s culture.

Part 2: Sarbanes-Oxley (SOX)

Write a 200-word commentary on Sarbanes Oxley and the importance this act has for American businesses today. Your commentary should include the following:

A. Rationale for SOX
B. Provisions of SOX
C. Enforcement of SOX 

B) 3 replies each 150 words

4 discussions due in 24 hours

 4 DISCUSSIONS DUE IN 24 HOURS – 50 WORDS EACH

Browsers 

All browsers can retrieve and display webpages, but their features and ease of use vary. Many factors can affect the decision to choose the browser that best fits your needs.

Many browsers are included by default with some mobile devices and smartphones. Their features vary greatly. Some allow users to zoom and use keyboard shortcuts with most websites, while others display only websites optimized for mobile devices. The more popular mobile browsers are Chrome, Firefox, Internet Explorer, Edge, Safari, and Opera Mini. 

View the below YouTube video on Alternative Browsers

 

Browsers 

All browsers can retrieve and display webpages, but their features and ease of use vary. Many factors can affect the decision to choose the browser that best fits your needs.

Many browsers are included by default with some mobile devices and smartphones. Their features vary greatly. Some allow users to zoom and use keyboard shortcuts with most websites, while others display only websites optimized for mobile devices. The more popular mobile browsers are Chrome, Firefox, Internet Explorer, Edge, Safari, and Opera Mini. 

View the below YouTube video on Alternative Browsers

 https://youtu.be/WL2YkK5dvkg 

 Research and discuss the advantages and disadvantages of popular browsers available today? 

 

INSTRUCTIONS: 

  • Respond to the following topic in a minimum of 50 words. 

 

Files and Directories

A root directory is the very base of a file system, under which all other directories are sub-directories. The root directory changes for different volumes. In other words, the root directory for the C: volume is different from the root directory of the D: volume because each volume has its own root directory. 

View the below YouTube video which demonstrates working with Windows files and folders.

  https://youtu.be/4-MF7t5KGuQ 

Why should folders be created on a hard drive instead of placing every file in the root directory?

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words. 

 

Protection from Viruses and Other Malware

Click the link below to view the video from TEDTalks  as computer security expert Mikko Hyppönen tells us how we can stop these new viruses from threatening the internet as we know it.  

TedTalk Video: Fighting viruses

It is impossible to ensure a virus or malware never will attack a computer, but you can take steps to protect your computer.

What precautions do you take to prevent viruses and other malware from infecting your computer? 

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words. 

 

Would You Connect to an Unsecured Network? 

View the below YouTube video on WiFi (wireless) security.

 https://youtu.be/WZaIfyvERcA 

 What would you do if you found out that someone was using your wireless home network without your permission? How should legal authorities address such abuse? What punishment should violators receive? Should those leaving their networks unsecured receive punishment, too? Why or why not?  

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words.