Information Security Roles and Responsibilities

This is associated with the Twitter hack of 2020 and is a continued assurance plan to mitigate weakness while outlining the key roles of leaders and their responsibilities. See Below and Attached.

You will submit your roles and responsibilities portion of the final project. Who are the key leaders of the organization specific to how their responsibilities are connected to the security of the organization’s information? You must also identify key ethical considerations. What are the ramifications of key leaders not properly accounting for ethical and legal considerations? What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information. 

BI WK8

Chapter – 14 Textbook attached

1. Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view. 200 words

2. What are some of the major privacy concerns in employing intelligent systems on mobile data? 200 words

3. Identify some cases of violations of user privacy from current literature and their impact on data science as a profession. 200 words

4. Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork. 1 page

Misleading Graphs

 1 page

For this discussion, you are to choose one graph, and complete these steps based on the graph you chose:

Steps

  • State the graph you chose.
  • Discuss how you interpreted the graph when you first saw it.
    • What did it tell you about the data represented?
    • Did you find it confusing?
  • Now, study the graph. Use your understanding of the topics Graphs, Pie Charts, and Bar Charts to interpret what is being presented.
  • Compare your first impression with your second more informed interpretation and answer the following:
    • Is the information presented in a biased way (that is, is it misleading?)
    • What information is being misinterpreted here? How?
    • What type of graph was used and was it used correctly?
    • How could you correct the graph so that it more accurately represents the data?
  • Discuss why someone might intentionally use a graph to mislead?

discusssion

 

1. Personal Responsibility includes the ability to connect choices, actions, and consequences to ethical decision-making.  Read the article attached defining how programmers need to take personal responsibility for their work.  After reading, write a 200 word reflection on this article.  Question you might answer:  Did you know this?  Things that surprised you about the article (things you did not know).  Research more about this topic and include anything else you learned.  List your sources.

2. What do you think you should do if you are working on a team and one member fails to take personal responsibility?  You have a deadline and the team member decides to leave work before the deadline is met.

Part 2: 5 Points

Reply to another students post.

8-2 Memo: Creating Effective Web Communications

In your role as communications manager at International Gadgets, you have been tasked with establishing communication standards for the new corporate website. In a memo to your staff, develop a 2–4-page guide for your staff outlining the basics for successful web communications, including issues such as:

The characteristics of online communication

Accessibility issues

Establishing corporate credibility

Privacy and security

Ethical considerations

Allowances for access by various devices

Online help areas

Assignment Paper

 Pick an industry/company to focus on for this assignment.  Based upon the given information you can find on the company and any past issues/breaches the company has gone through, create Crisis Management Plan

Document Format

  1. Title Page: Title/Name/School/Class/Professor/Date
  2. TOC-Generated by MS Word modified to APA 7 (see video)
  3. Introduction (not a Heading) – brief background of company and any issues the company has had in the past such as data breaches.
  4. Heading 1-Strategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company)
  5. H1-Risk Analysis – political analysis, environmental analysis (more or less depending upon company)
  6. H1-Crisis Management Plan:
  7. Heading 2-Purpose
  8. H2-Committee for crisis management planning
  9. H2-Crisis types
  10. H2-Structure of the Crisis Management Team
  11. H2-Responsibility and control
  12. H2-Implementation Plan
  13. H2-Crisis Management Protocols
  14. H2-Crisis Management Plan Priorities
  15. H1-Conclusion
  16. Reference page (Generated by MS Word)
  17. Divide the work on the plan amongst your group members.

PLEASE USE THE ATTACHED TEMPLATE

Apache Pig Hadoop Assignment1

Do online research and find out one case study where Apache Pig was used to solve a particular problem.

Expecting 4 page write-up including diagrams. Please provide as much technical details as possible about solution through Apache Pig.

Must:

1) Technical diagrams to explain the solution. own diagram not from internet.

2) Maximum one page for business problem and 3 pages of technical solution.

3) No plagiarism.

Research Paper

  

Appropriate Topics:

The Research Report, select one of the following research areas:

i) Cloud Computing (Intranet, Extranet, and Internet)

ii) Machine Learning

iii) Artificial Intelligence

iv) Internet of Things (IoT)

v) Robotics

vi) Medical Technology

vii) Artificial Intelligence

viii) Business Intelligence

ix) Brain Linked Virtual Reality

x) Nanotechnology

xi) Game Programming Algorithms

xii) Video Gaming Algorithms

xiii) Knowledge Management Systems

Instructions:

  

· The research paper must be at least 2,500 words supported by evidence (citations from peer-reviewed sources). 

· A minimum of four (4) peer-reviewed journal citations are required. 

· Formatting should be double-spaced, one-inch boarders, no extra space for headings, no extra white space, no more than two levels of heading, page numbers, front and back matter).

· All images, tables, figures are to be included in the appendices and IS NOT included in the 15 page requirement. This means appendices are not included in the 15 page requirement.

· Long quotations (i.e. paragraphs) are NOT permitted. Only one quoted short sentence (less than 14 words) is permitted per page.  

· Footnotes are NOT permitted.

  

Document Details

This area provides additional details about the content of each of the needed Research Report Chapters (5). For those instructing in Hybrid format, the instructor may want to consider having the instantiated teams work on: 1) an outline of the final research report and 2) a preliminary research report that includes Chapters 1 and 2. For those instructing in Online or F2F formats the instructor may want to consider using the Hybrid format (teams) or single student submission format. The final submission should include DETAILS of each of following: 

1) Chapter 1 – Introduction

2) Chapter 2 – Literature Review

3) Chapter 3 – Methodology Specifics (comparative analysis)

4) Chapter 4 – Findings and Results

5) Chapter 5 – Conclusion and Future Recommendations

6) References – APA

7) Appendices