Preview the document

read the articles and answer the following question.

1. Read the attached article “Why the Future Doesn’t Need Us”Preview the document by Bill Joy. Appeared in Wired, issue 8.04, April 2000;
2. Read a summary of Professor Peter Singer’s lecture on ethics and technology; (Links to an external site.)

3. Read Tech Ethics Issues We Should All Be Thinking About In 2019 (Links to an external site.).

4. Write a paper containing answer to the following questions. Your paper should present your understanding of ethical dimensions and unintended consequences of technology.

  • What do you strongly agree with in the articles? and Why? (20 points)
  • What do you disagree with in the articles? and Why? (20 points)
  • What kind of person Bill Joy seems to you, an idiot, a Luddite, or a genius? and Why? (5 points)
  • Are the assumptions in both the articles sound? (5 points)

Requirements:

Please make your analytic points specific; The paper cannot be just a collection of generalities and cannot contain too many direct quotes from the articles. Find something interesting to say. Reference any ideas that are not your own in APA format.

The paper should be at least 1 page but no more than 2 pages long, single line spacing, use a font size of minimum 10 points but no larger than 12 point. Set margins to 1 inch on all sides. Use correct grammar.

Save your paper in a Word document and name it as P4_FL.docx where FL are your first and last name initials. Use the link Assignments -> Project 4 to submit your document.

emerging threats and measures discussion

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

At least two scholarly sources should be used in the initial discussion thread. Use proper citations and references in your post.

Forensics

 A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary? Please explain. 

Tres

1.  BCP Scope – Submit a brief description for feedback (one page or less) of the topic areas to be covered in the BCP.

2.  Business Impact Analysis – use template 

3.  Key Resources and Stakeholders – use template

4.  Preventive Controls List – write a description of the preventative controls that you considered in the previous step

5.  Viable Recovery Strategies – to create a drawing or descriptive list that follows both options to each decision of “yes” or “no” or “success” or “failure” to the reconstructive effort.

6.  Contingency Plan – steps 9 thru 11

7.  Business Continuity Plan 5-7 pages

Research Paper on Risk Modeling

Research paper discussing the concept of risk modeling. Also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.

Data Science & Big Data Analysis – Power Point Presentation

Instead of assigning a traditional exam for your “Final Exam”, you will demonstrate your understanding of the importance of the final two phases of the Data Analytics Lifecycle: Communicating the Results and Operationalizing. You have studied various analytic methods, along with surveying various available tools and techniques. But as a Data Scientist, you must also communicate what your team has accomplished.

For your Final “Exam”, you will create a Final Sponsor Presentation. You have been hired by Aetna to use big data to improve patient health. The case study you will use can be found at: https://gigaom.com/2012/11/20/how-aetna-is-using-big-data-to-improve-patient-health/ .

Python, Pandas, Matplotlib Project

Top 50 countries life expectancy and population size, 

* Compare the top 50 countries and the least happiness 10 countries. 

Graphs to visualize:  

line chart of life expectancy for all countries 

line chart of population size for all countries

*bar graph of regions versus life expectancy 

* Calculate Correlation and linear regression between: Happiness and life expectancy  and Happiness and population. 

Answer the following questions:

Are there some regions that seem to live longer or less than others? Do these countries have a lower or happier happiness score?

Is there a relationship in population size to happiness or not?

Write- up summarizing major findings; short description to each question & plots 

Must use Python, Pandas, Matplotlib to analyze and visualize data. 

Week 5 Discussion 2

 “Service Delivery Models” Please respond to the following:

  • Evaluate the service delivery models. Select the options that, in your opinion, are most efficient together regardless of industry. Additionally, select the models that work best in particular industries. Justify your response.
  • Determine how a company’s selection of a Service Delivery Model could impact business value. Provide an example to justify your response.

security architecture 17

 

Select an organization that has leveraged Cloud Computing technologies to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

  • Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
  • Conclusion:  Summarize the most important ideas from the paper and make recommendations or how they might have achieved even greater success.

Use the following databases for your research:

  • ACM Digital Library
  • IEEE/IET Electronic Library
  • SAGE Premier
  • Other reputable sources are OK.

URL: https://ucumberlands.libguides.com/security

  • The paper must adhere to APA guidelines including Title and Reference pages.
  • There should be at least three scholarly sources listed on the reference page. 
  • Each source should be cited in the body of the paper to give credit where due. 
  • Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.
  • The body of the paper should be 4 pages in length. 
  • The Title and Reference pages do not count towards the page count requirements.