Data Mining Project

 

Project: Need it in 20 hours

You have been asked by management (manufacturing, healthcare, retail, financial, and etc. ) to create a demo using a data analytic or BI tool. It is your responsibility to download and produce outputs using one of the tools. You will need to focus your results on the data set you select.  

Ensure to address at least one topic covered in Chapters 1-5 with the outputs. The paper should include the following as Header sections.

Introduction
History of Tool [Discuss the benefits and limitations] Review of the Data [What are you reviewing?] Exploring the Data with the tool
Classifications Basic Concepts and Decision Trees
Classifications Alternative Techniques
Summary of Results
References (minimum of 2 – each must be cited at least once (of course)).

Ensure you adhere to APA7 

Types of Data Analytic Tools

https://www.octoparse.com/blog/top-30-big-data-tools-for-data-analysis/
Excel with Solver, but has limitations
R Studio
Tableau Public has a free trial
Microsoft Power BI
Search for others with trial options

Examples of Dataset

https://www.forbes.com/sites/bernardmarr/2016/02/12/big-data-35-brilliant-and-free-data-sources-for-2016/#4b3e96f1b54d

Discussion : Need in 12 hours:

This week, I want you to post the particular data analytics tool that you used for the midterm project. Provide the benefits and limitations of the tool. 

Replies and Explanation: Need in 2 days

You need to make the initial post and also respond to two of your peers. You’ll also need to go back and do the midterm project and explain why no one told me it wasn’t available :o|

Please include the Data Analytic Vendor Name and URL. It will also be helpful to list the pricing and trial options.

Reflection R1

 Submit a 5 page paper (APA style) detailing the how Blockchain technology can be implemented to reduce ad fraud and cost while meeting consumers’ increasing expectation for excellent customer service? 

Sources :

6-2 Application Assignment: Online Fraud

Specifically the following critical elements must be addressed:

1. Analyze a recent news headline of a retail chain that has been breached recently.
2. Assess the cause of the retail chain breach.
3. Determine steps that can be taken moving forward to resolve the breach.

Guidelines for Submission: Your paper must be submitted as a two- to three-page Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least two sources cited in APA format

Three Required Headers:

Breach Analysis

Cause

Resolution

The majority of online fraud occurs through electronic communication. We receive emails daily that represent some type of phishing scheme or web spoofing, which can be deleted with a simple click of the delete button. But what happens when your personal information has been stolen through a third-party vendor’s technical error while you made a purchase from your local retail store, who stores your credit card and personal information within a remote database?

Research a recent news headline of a retail chain that has been breached recently and analyze the scenario. What caused the issue? What steps can be taken moving forward to resolve the issue? Use research and specific examples to support your resolution recommendations.  

Review Article

 review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

Address the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. 

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Improving risk management capabilities

Discuss actions required to develope an effective risk management capability.

Forum rules:

  • Post your answer to the forum questions by 11:59pm EST on Saturday
    • Your answer must be substantive, which usually requires 300 words or more
    • Your answer must be well written and well organized
    • Your answer must include one properly formatted APA in-text citation to a scholarly reference. The full reference must be provided at the end of your answer with a link if one is available. 

Post two replies to your classmates by 11:59pm EST on Sunday 

  • Your replies should be meaningful, which means they should engage your classmate in discussion focused on the forum questions. Usually this requires 150 words or more.
  • No forum posts made after 11:59pm EST on Sunday will be graded 

Security Alternatives

According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (2-4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words.