Assignment

ASSESS YOUR CURRENT WORKFLOW

Reflect on your most recent visualization project and try to sketch or write out the approach you took. What stages of activity did you undertake and in what sequence? Did it feel efficient or chaotic? Was it interrupted by changes, uncertainty, or a sense of too much choice? Before you can seek to improve your ongoing approach it is worth unpicking what you currently do and how you do it.

Assignment Link: http://book.visualisingdata.com/chapter/chapter-2

Assignment Length (word count): At least 500 words (not including direct quotes).

References: At least three peer-reviewed, scholarly journal references.

week 5

1)  An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case and numbers in passwords
  2. Reauthenticate before changing passwords
    • user must enter old pw before creating new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations? Would you change, add or delete any of these?  Add additional criteria as you see necessary.

2) Discuss in 500 words your opinion whether Fair Use of copyrighted material should be expanded, contracted, or left alone. Justify your choice. 

dicsussion 300 words

 

When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement?

Assignment should follow all APA rules and include a min. of (1) citation/reference.

Enterprise-9-P

 

Pick a topic relevant to Disaster Recovery and Business Continuity Planning and write a 10 page paper.  The format of your paper will need to follow the following outline in APA format (include title page, abstract page, content pages, and reference page):

INTRODUCTION

  • State the topic you are attempting to cover
  • State the issues involved
  • State why we should be concerned with resolving whatever issues are involved
  • State how answering the issues will help us
  • State the implications and consequences of dealing with or resolving the issues involved

REVIEW OF THE LITERATURE (5 sources minimal, at least 3 needs to be peer-reviewed)
Identify who has tried to answer the question before by doing the following:

  • Summarize how each of the sources presents and deals with the subject
  • Explain how each source presents and deals with its findings or results
  • Explain the relevancy of each source to your topic
  • State what you learned from each of your sources
  • State in what way(s) each source contributes to answering your issues

DISCUSSION

  • State your answer to your issue
  • State how and elaborate on how, explain how, illustrate how each of the sources you previously reviewed help you answer your issue
  • State what questions about your topic you still have that your sources may not have answered

CONCLUSIONS

  • Indicate how each of the sources have contributed to your conclusions (and clearly, accurately, correctly document those sources within your text)
  • State the implications of your conclusions
  • State what might be the possible consequences of your conclusions
  • State the significance these implications and consequences might have in the information technology / information security realm 

DOCUMENTATION

  • On a separate page, include a section labeled References which provides the full publication information for all the sources you used in your paper
  • You should have a MINIMUM of five (5) sources for your paper, at least 3 source needs to be peer-reviewed
  • Not meeting this minimum requirement of five (5) sources will lead to a lower evaluation of your paper for each missing source
  • Use APA format for documenting your sources

-For APA help: Purdue OWL
-For more details on journal types, refer to this link:  Rutgers Library

discussion post – Global technology

Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence.  Why or why not? 

Minimum 250 words.  At least one scholarly source should be used .

Creating a Use Case

 In the textbook, Systems Analysis and Design in a Changing World, refer to the RMO CSMS marketing subsystem Figure 3-10d on page 83.

Write a paper in which you research use case diagrams:

e

  • Use Figure 3-12 on page 84 and Figure 3-14 on page 86 as exemplars. 
  • Remember to paste a copy of the diagram in the paper.
  • You need to create the diagram, not take one from the Internet. 

     2.  Write an analysis of the use case drawing that you created. Analyze the actors and how they relate to the use cases in the diagram. Your answer should show the purpose and importance of use case diagrams.

     3.  Use at least four quality resources. Note: Wikipedia and similar websites do not qualify as quality resources. 

The specific course learning outcome associated with this assignment is:

  • Create a use case diagram with supporting documentation that describes the use case and actors in detail.

Data science and Big data discussion 9

his week’s discussion centers around the concept of Blockchain.  There is still much confusion regarding what Blockchain is and what it is not.  Please discuss the following:

1.  Your explanation of Blockchain to include why it has been gaining so much popularity.  In your own words please.2.  Using a blockchain as a data source, what data science project do you think would be interesting?

  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your

cloud computing

 

Discuss in 500 words, why institutions are reluctant to move their IT to the cloud. Consider specific industries like education, medicine, military, etc. 

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.