hw11

  

· How will you apply the skills acquired from Analyzing and Visualizing data to your job?

· How will Analyzing and Visualizing data assist you in your professional or/and academic development?

· If the skills acquired in Analyzing and Visualizing data will not directly apply to your job environment, in what other ways are you hoping to apply them to your personal or academic portfolio?

Choose any 2 questions each week: Must provide a heading to identify which Chapter and which Questions were chosen. Must be a WORD document with APA formatting.

 Discussion #1: What is Big Data? Why is it important? Where does Big Data come from?

 Discussion #3: What is Big Data analytics? How does it differ from regular analytics?

 Discussion #4: What are the critical success factors for Big Data analytics? 

Discussion #5: What are the big challenges that one should be mindful of when considering implementation of Big Data analytics? 

 
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source). 

Practical connection to the Subject

Subject Name : Business Intelligence

Assignment:

Provide a reflection of at least 500 words  (double spaced) of how the knowledge, skills, or theories of  this course have been applied, or could be applied, in a practical  manner to your current work environment. If you are not currently  working, share times when you have or could observe these theories and  knowledge could be applied to an employment opportunity in your field of  study. 

Requirements:

Provide a 500 word (double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you  are not employed, demonstrate a connection to your desired work  environment. 

Note:  I am currently not applied so you can write this assignment as how the subject knowledge is used for  future 

Discussion

Assume that An agency has focused its system development and critical infrastructure data collection efforts on separate engineering management systems for different types of assets and is working on the integration of these systems. In this case, the agency focused on the data collection for two types of assets: water treatment and natural gas delivery management facilities. Please identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities. 

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities. 

Solving the Cybersecurity workforce crisis

Solving the Cybersecurity workforce crisis

For this project, you will research and report on the cybersecurity workforce crisis as it affects state governments. Your audience will be the members of an organization for state government officials such as the National Governor’s Association and the National Association of State Chief Information Officers. The results of your research project will help develop a one-day workshop on strategies for developing and growing the cybersecurity workforce at the state government level. 

Research:

1. Read / Review the Week 5 readings.

2. Research authoritative sources which discuss the reasons why the cybersecurity workforce crisis exists.

a. Hiring Cybersecurity Staff is Hard for States http://https://www.pewtrusts.org/en/research-and-analysis/blogs/stateline/2015/5/11/hiring-cybersecurity-staff-is-hard-for-states

b. NGA Releases Report Advising States on Decreasing the Skills Gap in the Labor Force https://www.nga.org/wp-content/uploads/2018/07/NGA_Talent-Driven-Economy_RoadMap.pdf

c. Comparing Private Sector and Government Worker Salaries http://reason.org/news/show/public-sector-private-sector-salary (This source argues both sides of the compensation / education arguments.)

d. Budgetary Constraints (p. 3, Figure 1.4) http://www.csg.org/knowledgecenter/docs/ta0210workshortage.pdf 

e. IT Workforce hiring issues: http://www.nascio.org/Portals/0/Publications/Documents/NASCIO_ITWorkforce_UnderPressure.pdf 

f. State vs Private Compensation (see “Conclusions” on p. 15) https://www.aei.org/wp-content/uploads/2014/04/-biggs-overpaid-or-underpaid-a-statebystate-ranking-of-public-employee-compensation_112536583046.pdf 

g. Global talent gap http://thehill.com/blogs/congress-blog/technology/239113-cybersecurity-talent-worse-than-a-skills-shortage-its-a 

3. Review the best practice recommendations from the NICE report. Select three to five best practices which state governments could benefit from implementing. https://niccs.us-cert.gov/sites/default/files/documents/pdf/best_practices_for_planning_a_cybersecurity_workforce_white%20paper_0_0.pdf   

4. Review alternative recommendations for attracting and retaining qualified talent (workers) to a state or region. Select 3 or more recommendations that you believe would be beneficial for state government hiring efforts for cybersecurity personnel.

a. 7 Ways to Attract and Retain Talent (without having to compete on salaries) http://www.oyginc.com/articles/attractarticle1/  

b. Government Needs to Rethink How They Attract IT Talent http://www.governing.com/columns/tech-talk/gov-remaking-your-workforce.html 

c. Desperate for Cybersecurity Workers, States Help Build the Next Generation https://www.governing.com/topics/mgmt/sl-cybersecurity-women-veterans-students.html 

d. About Good Neighbor Next Door (ask yourself if this program or something similar should be extended to cybersecurity personnel) http://portal.hud.gov/hudportal/HUD?src=/program_offices/housing/sfh/reo/goodn/gnndabot 

5. A separate closing section in which you summarize your research and recommendations.

Write:

Write a three- to four-page research report that includes a summary of your research, findings, and recommendations. At a minimum, your paper must include the following:

1. An introduction or overview of the cybersecurity workforce issues which impact State governments. This overview should address the political, economic, socio-cultural (including education), and technological factors that contribute to the perceived lack of qualified cybersecurity workers. This introduction should be suitable for an executive audience.

2. A separate section that addresses five specific reasons why states have difficulty hiring enough trained and qualified cybersecurity workers for positions in state agencies and offices. 

3. A separate section that addresses five specific “non-cybersecurity” reasons why a workforce shortage affecting state governments may currently exist. Consider and discuss whether the workforce shortage arises out of state budget problems rather than training and education or salary.

4. A recommendations section which identifies and discusses at least five training, education, marketing, or hiring actions that state governments could take to attract cybersecurity talent and reduce or alleviate a cybersecurity workforce shortage for trained and qualified cybersecurity personnel. These recommendations should include several alternative practices which deemphasize salary.

5. A separate Summary section in which you present a summary of your research and recommendations.

Submit for Grading

Submit your work in MS Word format (.docx or .doc file) using the Project 4 entry in your assignment folder. (Attach the file.)

Additional Information

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your 3- to 4-page paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. 

3. Your paper should use standard terms and definitions for cybersecurity. See Course Resources > Cybersecurity Concepts Review for recommended resources.

4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.  

5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count. 

6. You should write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.  

7. You must credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). 

discussion

 Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability has been controlled? If not, what mechanisms were in place to protect against the intrusion. 

PLE week3 p3

 

Hello,

i need this paper by 1/27 afternoon.

Strictly No plagiarism please use your own words.

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

reference link:  https://hackablepodcast.com/episodes/locked-out

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Chapter Reading Reflections Journal Chapters 4-6

 

Chapter Readings Reflections Journal – Chapter 4,5 and 6

 

Need to prepare Chapter Readings Reflections Journal from chapter 4-6 in the attached text book.

The reflection papers should be a minimum of 6 pages (two full pages for each chapter), double-spaced, in proper APA formatting using citations when appropriate.   

Please find attachments contains Text book and referral document about the how the assignment should be.

Each Chapter Reading Reflection should address the following prompts:

  • Summarize the content of the chapter addressed.
  • What were some of the highlights in this chapter and learning opportunities?
  • Share some new ideas and/or thoughts that you developed from the reading of the chapter.
  • How do you think you can apply this chapter’s concepts into your home, school, personal-life or work environment?

Please make sure that you look at the example that is also attached!!

Cloud Computing

For this week’s assignment, create a 3-4 page paper that discusses how Sarbanes-Oxley affects those organizations with a cloud presence and what areas they need to be cognizant of to ensure compliance with the law.

Assignments should be clear and detailed with a minimum of 500 words, sources must be cited in APA format and must have clear organization and flow.

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams

 

Required Reading:

Read (2016). Empowering Leadership and Effective Collaboration in Geographically Dispersed Teams. Personnel Psychology, 69(1), 159–198. https://doi.org/10.1111/peps.12108

http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=eue&AN=112508299&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Assignment:

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

How do geographically dispersed teams collaborate effectively?

Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team. Please note the pros and cons of each tool. 

Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why. 

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.