week 5 discussion

Operation Security 

You are learning about policies for IT infrastructure.  Examine each of the domains. Choose a domain and write one standard or procedure for that domain.  For example,  you may choose LAN domain and write the Wi-FI Access point Security Standard.  You may choose any standard or procedure from the chapter.   

– Word count of 300 words.

-No plagiarism

-References  

Big Data and Data Analytics on Social Media

  Write a 12 pages research paper on Big Data and Data Analytics on Social Media

Big Data and Data Analytics on Social Media

     

Cover: 

Include   the names of those who participated in the project

Table   of contents: 

Use   a Microsoft Enabled Table of Contents feature.

Background:   

Describe   the issue, discuss the problem, and elaborate on any previous attempts to   examine that issue.

Research   Questions:

In   your identified problem area that you are discussing, what were the research   questions that were asked?

Methodology:

What   approach did the researcher use, qualitative, quantitative, survey, case   study? Describe the population that was chosen.

Data   Analysis:

What   were some of the findings, for example, if there were any hypotheses asked,   were they supported?

Conclusions:

What   was the conclusion of any data collections, e.g., were research questions   answered, were hypotheses supported?

Discussion:

Here   you can expand on the research and what the big picture means, how do the   results found in your literature review help organizations with the problems   of handling, managing and safeguarding all this data. What do you see as   long-term impacts and what further research could be done in the field?

References:

Include   at least ten scholarly references in APA format.

(a) Provide a background of the company chosen. 

(b) Determine the problems or opportunities that that this project will solve. What is the value of the project? 

(c) Describe the impact of the problem. In other words, is the organization suffering financial losses? Are there opportunities that are not exploited? 

(d) Provide a clear description regarding the metrics your team will use to measure performance. Please include a discussion pertaining to the key performance indicators (KPIs). 

(e) Recommend a big data tool that will help you solve your problem or exploit the opportunity, such as Hadoop, Cloudera, MongoDB, or Hive. 

(f) Evaluate the data requirements. Here are questions to consider: What type of data is needed? Where can you find the data? How can the data be collected? How can you verify the integrity of the data? 

(g) Discuss the gaps that you will need to bridge. Will you need help from vendors to do this work? Is it necessary to secure the services of other subject matter experts (SMEs)? 

(h) What type of project management approach will you use this initiative? Agile? Waterfall? Hybrid? Please provide a justification for the selected approach. 

(i) Provide a summary and conclusion. 

(j) Your written paper must have at least 10 reputable sources and 10-to-15-pages. 

(k) Please write the paper in APA Style

1 page in APA 6th Format On human resource management

1 page in APA 6th Format On human resource management NO PLAGIARISM

Reflect on a few key concepts with at least one scholarly (peer-reviewed) resource :

  1. Discuss the key components of human resource management.  Pick at least four concepts from chapter nine and describe how these concepts interrelate to individual performance on a team.
  2. Review table 9.2 and select one of the dimensions listed, note why it was chosen and how you relate to this behavior.  If you have a personal experience, please share.
  3. How do leaders select the best talent? What are some tools they can use to select the best-talent?

cysweek2!

explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability. Why are these factors so important to businesses?

Detailing experience in the Java developer job

Need a summary for a internship on “Java” programming language. With a few responsibilities involved in the job. Like detailing the experiences.600 words in total (2 separate documents with 300 words each )

requirements are 300 words double-spaced using times new roman, 12 pt. font

Project

 

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. 

This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives. In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction – What is an ERM?
  • Why Should an Organization Implement an ERM Application?
  • What are some Key Challenges and Solutions to Implementing an ERM?
  • What is Important for an Effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework/application.
  • Conclusion – Final thoughts/future research/recommendation

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least FIVE scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Final Project

Overview:

In the meeting with your executives, your CEO announced that you would need to

prepare a PowerPoint presentation of your department achievements for the last quarter

and present it in front of the hospital’s board of trustees who will be visiting your hospital

by the end of the month.

Instructions:

Based on that information, your IT Director asked you to prepare a 12-15-page

PowerPoint presentation which will take a fifteen-minute time slot where you discuss the

following:

• As you have opted for Windows-based computers, what are the significant

differences between a Mac and a Windows-based computer?

• What are the main differences between the leading operating systems: Windows,

Mac OS, and Linux?

• What are the measures that you are taking to keep computers safe and to avoid

health hazards from computer use?

• Is the hospital safe and immune from online annoyances such as spam and

adware? How can you further secure your system from malware?

• The advantages of your recent implementation of VoIP?

• Describe the improvements you have implemented in the hospital’s customer

relationship management (CRM) and how are you managing your relationship

with your vendors.

• Discuss whether the adoption of a medical expert system could be beneficial to

the doctors at your Hospital.

• Describe how social media can be effectively used as part of the hospital’s web

strategies and improve its position in the market?

Requirements:

• This assignment is a PowerPoint presentation consisting of 12-15 slides, using

APA formatting and citations.

• Include four references.

• Record voice narration and include closed captioning or script saved to the notes

in PowerPoint.

o For instructions to add narration to a slideshow: https://support.office.com/enus/article/record-a-slide-show-with-narration-and-slide-timings-0b9502c6-5f6c-40aeb1e7-e47d8741161c#OfficeVersion=Office_365

etc wk11

 There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?