personal computing

 

Submit a paper with two or three pages of information in APA format. including a cover page, an abstract statement, and references  the paper will be five pages total.

Describe in-depth, one future computing technology, trend or prediction and tell for how it will affect the way we work, live and collaborate. How will businesses and jobs be  affected?

Examples: (You do not have to choose one of these topics.)

Give a general outlook for the technology, then give information that is industry specific. If you write about robotics, give an overview, then tell how robotics will affect health care, for example. How might robotics affect the field you are planning to pursue? Will robots be able to write creative code?

Other examples; Describe how artificial intelligence will affect privacy and personal freedoms.  (This is already happening.) With AI, will computers ever be able to read our thoughts? Will we ever be able to make video recordings through our eyes? So, your topic can be a bit out there, as long as you have supporting resources. Have fun with this.

Preview the document

IT project needs

 

Instructions:

  1. Search the internet for tips on how to distinguish software needs versus software wants.
  2. From your research, summarize 3 of the most common tips.
  3. Describe in your own words what happens with a technology project that fails to define the needs of the project.
  4. Research what makes a technology solution focused and easy to use (focused on the NEEDS).

From this week’s supporting links, review Five tips for any technology project’s needsPreview the document 

  • Which one of the tips is the most important in your eyes?
  • Why?
  • Which tip is the least important?
  • Why?

Research project need it by oct 12

Project. Students will write a final paper that answers a research question by utilizing risk models. The paper should consist of an introduction section that clearly states motivation and research question or hypothesis, data and methodology section that includes discussion on strengths and weaknesses of your method/model, results section that presents the findings of the model, and conclusions section that answers the research question and highlights valuable takeaways. The final paper should be no longer than 10 pages double spaced using Arial font size 11 with 1” margins and submitted by the due date as indicated. The written paper is worth 200 points, while the presentation is worth 100 points.

Examples of successful research papers: “Investment Risk and Firm’s Market Capitalization”, “Are Islamic Banking Compliant ETFs safer than the Traditional ETFs?”, “Comparing the Risk of Companies with Male CEOs to the Risk of Companies with Female CEOs”, “Is energy industry safer than the automotive industry?”, etc.

law enforcement

Topic: When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement?

Assignment should follow all APA rules and include a min. of (1) citation/reference.[500 words 

Recommendations and Global Considerations (Recent Twitter Hack)

This paper is on the Twitter hack that happened in July of this year.

Submit the Recommendations and Global Considerations portion of the final project. In this assignment, you will suggest relevant changes to the organization itself and changes to the ethical guidelines that could have prevented the incident. Standards external to the organization that may have helped prevent the incident should also be proposed. This assignment will also address international compliance standards and how they would have been relevant to the incident. The impact of the incident on global communication and commerce will be analyzed, as well as the impact on the global technology environment. 

Critical Elements (Headers):

For the below recommendation headers ensure to:

a) Propose relevant changes to the organization that may have prevented the incident. How would these changes have helped to prevent the occurrence?

b) Propose reasonable ethical guidelines that could have helped prevent the incident and that might help the organization preven tfuture incidents. Propose changes to the standards external to the organization that might have helped prevent the incident. This can include changes to regulations and regulatory and ethical standards that might exist today but did not exist or were not properly delivered at the time of theincident. Be sure to support your conclusion

Recommendations: Organizational Change

Recommendations: Ethical Guidelines

Recommendations: External Standards

For the below global consideration headers ensure to:

a) What international compliance standards (either at the time of the incident or today) would have been relevant to the incident, and how? If your company is not global, imagine that is.

b) Analyze the impact of the incident on global communication and commerce (again, if your organization is not global, imagine otherwise).In other words, what impact did (or would) the incident have on views and use of information technology and communication in global contexts?

c) Global Technology Environment: Based on your research and analysis of this case, determine the global legal and regulatory impacts this case had on the information technology overall. In other words, determine the relationship between this case and the global regulatory standards that are now in place, will be put in place shortly, or should be put in place as a result of this or related incident

Global Considerations: International Compliance

Global Considerations: Cultural Impacts

Global Considerations: Global Technology Environment

Discussion-virusus and malicious code . Due today

  • Explain the key differences between viruses and other malicious codes. Identify at least three different types of viruses and describe the main differences between each one. Next, explain both the potential threat posed by viruses and other malicious codes and their main effects on computers and productivity.
  • Discuss the fundamental lesson(s) that we can learn from the attacks of viruses and other malicious codes. Speculate on the main steps that both individuals and businesses can take in order to protect themselves from attacks that may occur in the future.

DAta mining week 2 assignment

Youtube link:

Watch video of Ted Talk about Social Media Analytics 

stop the video at 4:27 and try to come up with the answer Dr. Golbeck is asking:

“How come liking a picture of curly fries could be the indicative of how smart you are?”

First, try to come up with your own predictions and post it here. Also add overall your reflection on what you learned about Social Media Analytics after watching this video.

700 words: Leadership & AI

The journal article focus on the how positive team culture can correct the impact of lagging leadership creativity.  Additionally, discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

1. What is your definition of AI?  Please explain.

2. What is your opinion of AI, is the technology currently available? Why or why not?

3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.

4. How is AI perceived as different in various industries and locations? Please explain.