Discussion 2

 

The United States v. Dioguardi

428 F.2d 1033, 1038 (C.A.N.Y. 1970).

At least, a minimum standard of trustworthiness must be established to eliminate the theory of accuracy, the integrity of computer used to generate evidence, and the admissibility of such records in court. The original contents of free and fair evidence are deep-rooted in writing panache, recording, and photograph required by court standards to ensure that court decisions are based on reliable, and authentic evidence. The advent of photocopiers, scanners, related technology that can be used to create identical acceptable duplicates in place of the original and in the market.  A genuine question on the authenticity of the original and accuracy of a photocopy could be unfair to accept in place of the original. Presenting a copy of digital evidence is usually more desirable because it eliminates the risk that the original copy being unintentionally altered.

A paper printout of a digital document may be considered equivalent to the original unless essential portions of the original are not visible in printed format. Hearsay Digital evidence cannot be admitted in court if the author of the evidence is not present to verify and authenticate the evidence’s integrity. Computers is an electronic device can be programed to store and output information with limited human intervention; hence, the computer system can initiate the hosting, emitting errors and uncertainty in various ways in any location and at any time. Digital evidence is generally a suggestive of human activities; for example, the system clock on a computer can be incorrect, and date-time stamps can be misinterpreted. Furthermore, the source internet protocol (IP) address on network traffic may be assigned to a proxy device rather than the actual originating computer.

Scenario:   A genuine question on the authenticity of the original and accuracy of the photocopy of an evidence could be unfair to admit in place of the original copy.  Furthermore, presenting a photocopy of digital evidence is usually more desirable because it eliminates the risk of original being unintentionally altered. As an organization lead forensic investigator, which of this conclusive evidence will you present in court:

  1. Provide a comprehensive narrative on the importance of the original copy of the evidence in court?
  2. Provide a comprehensive narrative on the incongruity of a photocopy of evidence in place of the original copy in court?

IT incident response wk4 discusion

 

Week 4 Discussion

1919 unread replies.1919 replies.

With the concepts presented in this week’s reading, detail two tools you would use to effectively monitor network traffic and the type of traffic you would monitor.  Please provide your rationale for your choices.

Participate in the weekly discussion. Post your initial 250 word minimum response to the discussion question and reply with a substantial contribution to the posts of other students.

Remember to use APA citations and references if you refer to information such as statistics or information you used in your response from other sources. DO NOT directly copy from a website or other source and paste. In this course I will only accept paraphrasing not direct quotation on all work.

Week 3 Assignment

Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs and almost 350 words in length and uploaded as a TEXT DOCUMENT. Please see the sample EXAMPLE summary report that is attached to this post which shows you the format requirements. Please use it to draft yours.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. Use only one inline citation.

10-1 Discussion: Reflection

In this course, we have covered a lot of ground. What have you learned about technical and business communications over the last nine weeks. In your post, address some or all of the following:

How is technical (or business) communication different from other types of communication?

Why is collaboration so important in technical communication?

What are some of the things you need to know about your intended audience?

Describe some of the channels and vehicles of communication available for communication with various audiences. How do you determine which ones to use?

How do you determine the message that needs to be delivered to an intended audience?

How can you find out whether your message was delivered successfully?

What are the roles of websites and social media in technical communications?

Annotated Bibliography

Annotated Bibliography

In order to complete this program, you will need to do research. One of the more useful tools in conducting research is the annotated bibliography.  An annotated bibliography combines the citations found in the References list at the end of documents in APA format with annotations about each of the sources.  For this final assignment, you will construct an annotated bibliography to help build your personal citation “database” to use as your move forward and (hopefully) for your dissertation.  Take this time to start on the right foot and be prepared when the time comes.  You should have a general ideal of your research topic, if not, take this time to think about what area you want to do research and find article to help shape that path.  

Audience: This assignment should be directed at your scholarly peers, and you may assume that they have only a casual familiarity with your topic or issue.

Constraints:  The annotated bibliography is a fairly rigid genre.  Your citations must adhere to APA format.  This will be one of the central components of the grade for this assignment.  Failure to follow APA format exactly will harm your grade.  The annotations for each source should follow an academic style.  This means that you must construct, with elevated and sophisticated language, correct grammatical sentences that effectively summarize what each source has to say.  Additionally, you should explain how each source is relevant to the issue that you have selected and what it adds to your knowledge about your issue.

Follow with a brief annotation that summarizes the source (approx. 100-150 words). You may NOT quote from the source; Ideally, all of the annotation should be in your own words.  In 1 or 2 sentences, explain the source’s relevance and importance to your issue.

Specific guidelines to follow when completing this assignment are:

·  15 sources of various types (book, article, website, etc.)
1. No wikis

2. No more than 3 can be website citations

3. At least 5 must be peer reviewed.

·  Adherence to APA format for all citations.

·  Sources in alphabetical order according to author.

·  Thoughtful and complete annotations of 100-150 words each. (Min 7pages).

·  Correct grammar, punctuation, and spelling.

·  No late assignments can be accepted due to University policy.  I will make this due towards the end of the semester, final grades are due 24 hours after the end of the semester, so I do not have a large time frame to accept late work, since I cannot grade after I have to submit your final grade to the University Registrar.  You have multiple weeks to finish, finish sooner, rather than later.

Cybersecurity

In your own words, explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability. Why are these factors so important to businesses?

Discussion 8-TM

 

Reflection/Critical Evaluation of Your Learning Outcomes

Write a critical evaluation of your learning outcomes. In your response, consider:

1. The content of this class as they relate to Team Management and managerial decision making.

2. Base on the course content, discuss new skills you acquired from this class? How relevant are the new skills to your current and/or future profession?

3. How would you apply your new knowledge?

 Response should be in 300 words. Please add references in APA format. 

Home work 4

 

Each student will conduct a search online Library resources to find 1 recent peer reviewed article (within the past 3 years) that closely relates to Power as it relates to negotiation. Your submission must include the following information in the following format:

Key Term:

  • Power as it Relates to Negotiation

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: 

 Write a full paragraph responding to each of the following questions:

1. Explain why you selected this particular article among all the articles you could have chosen on your selected term.

2. Explain why you agree or disagree with the author’s key positions in the article. 

3. Explain how the article was easy or difficult to understand and why? 

4. What did the author do well in your opinion? Explain.

5. Describe what you believe the author could have done better in your opinion?

6. What else should the author have included in the article and would the article benefit from a different perspective (such as from a different nationality or different industry or experience perspective). Explain. 

7. What other sources or methods could the author have used to improve the research in the article?  (Hint: look up the types of qualitative and types of quantitative research methods). 

8. What information / in-depth study / or further research should the author focus on as a follow up to this article and why? 

9. Explain what audience would gain the most benefit from your selected article and how they could apply it in their professional lives. 

10. What did you personally gain from this article and how has it shaped your thinking on the topic? 

11. What are the conflicting or alternative viewpoint to the author’s position? Or  What additional research backs up and confirms or adds to the author’s position?  (Hint: this will require you to find another peer-reviewed article that challenges, confirms, or adds to, or provides a different perspective to your chosen article.   

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

DAta mining week 2 assignment

Youtube link:

Watch video of Ted Talk about Social Media Analytics 

stop the video at 4:27 and try to come up with the answer Dr. Golbeck is asking:

“How come liking a picture of curly fries could be the indicative of how smart you are?”

First, try to come up with your own predictions and post it here. Also add overall your reflection on what you learned about Social Media Analytics after watching this video.