Case Study 2.1

Case Study 2.1

Read “Can Technology Save Sears?” Case Study (see attached file)
Answer Questions.

Please use this strategy when you analyze a case:

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)

Writing Requirements

  • 3–5 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Project papers

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

Research information about two current data mining projects being conducted.

  • What are possible benefits that these projects offer?
  • What are criticisms of the projects?
  • What techniques could be implemented to improve on the criticisms?

Due: Check Course Schedule for due date.

  • Provide three articles to substantiate the above three questions.
  • Use APA format to provide a citation for each of the articles you read.
  • Suggestion: Use a search engine (Google) and keywords.

1 Discussion , 1 Case Study and weekly summary

Discussion 4.1

What are some methods used to identify attackers? (How can we attribute an attack to a person or organization?)

Case Study 

Midterm Requirements

  • Individual Paper:
    • Describe each of the following Non-State Actors: NGOs, Organized Crime, Corporations, Terrorists, Activists, Individuals

Writing Requirements: 

  • 4 full pages paper in APA format, for citations and refereneces
  • Use the APA template located in the Student Resource Center to complete the assignment.
  • Each team member submits the team assignment

References should not be older than 2015

References should not be older than 2015

Weekly Summary 4.1

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

Information Governance discussion 3

Chapter Eight (8): Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas that impact legal functions most. Failure to meet them could be literally put an organization out of business or land executives in prison.   Privacy, security, records management, information technology (IT), and business management functions are very important.  However, the most significant aspect of all of these functions relates to legality and regulatory compliance from a critical perspective.  

Q1: When we take a close look at the author’s point of view, under the Federal Rules of Civil Procedures (FRCP) amendments dating back to 1938 there has been governance and the discovery of evidence in lawsuits and other civil cases.  Please name and briefly discuss the three (3) reasons why corporations must proactively manage the e-discovery process?

chapter Nine (9): Information Governance (IG) and Records and Information Management Functions.  From the Chapter, we have learned from that Records Management (RM) is a key impact area of IG – so much that in the RM space, IG is often thought of as synonymous with or a single superset of RM.  From that perspective, the International Organization for Standardization (ISO) defined business records as “information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations or in the transaction in the form of records.” 

Q1: To further enhance our knowledge and understanding of RM, ISO provided a more refined definition of RM to a granular level as “[the] field of management responsible for the efficient and systematic control of what…? Identify and complete the missing phrase to directly complete the granular definition? 

File

Cyber Security planning&mgmt Final project

 

Final Written Project

Attached Files:

Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment. Please complete this and upload your work by clicking the BLUE LINK ABOVE (as a WORD DOCUMENT).

final grad project : Ethical Hacking

 

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Web application using ReactJS

 

You are a graduating software engineer who is looking to apply to a few software engineering positions at various Fortune 500 companies. You decide to make a personal portfolio website that showcases some of your work so that you stand apart from the other applicants.

Using React, create a web application that has the following:

  1. A home page with a short description of yourself, what you are looking for in a position, and one project that you’ve worked on.
  2. A contact page with a text box and a submit button that shows a success message when the user submits a query.
  3. A navigation bar and footer.

You must use client side routing to handle page navigation.

Final Paper

1)  Surveillance state might be dangerous 

Abstract

 Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey.  

2)  Surveillance capitalism-Centered around commodification 

Abstract

 Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. 

3)   Car Hacking  

4) Disaster recovery

 5)  Do some research on Threat Response software. Find one particular software package to investigate.

  • What does the software do?
  • What are it’s major features?
  • What kind of training is required?
  • How much does the software cost?

Do not do the same software as everyone else. 

Write 200-300 of your own words 

Organizational Theory : Journal Article Summary 8

 Pick one of the following terms for your research: authority, competition, confrontation, dependency, empowerment, intergroup conflict, negotiation, organizational politics, power, or rational model. 

 

find 1 recent peer reviewed article (within the past 3 years) that closely relate to the concept.

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

DISCUSSION: Using 300 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. (continued) Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.