discussion

 Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability has been controlled? If not, what mechanisms were in place to protect against the intrusion. 

PLE week3 p3

 

Hello,

i need this paper by 1/27 afternoon.

Strictly No plagiarism please use your own words.

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

reference link:  https://hackablepodcast.com/episodes/locked-out

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Chapter Reading Reflections Journal Chapters 4-6

 

Chapter Readings Reflections Journal – Chapter 4,5 and 6

 

Need to prepare Chapter Readings Reflections Journal from chapter 4-6 in the attached text book.

The reflection papers should be a minimum of 6 pages (two full pages for each chapter), double-spaced, in proper APA formatting using citations when appropriate.   

Please find attachments contains Text book and referral document about the how the assignment should be.

Each Chapter Reading Reflection should address the following prompts:

  • Summarize the content of the chapter addressed.
  • What were some of the highlights in this chapter and learning opportunities?
  • Share some new ideas and/or thoughts that you developed from the reading of the chapter.
  • How do you think you can apply this chapter’s concepts into your home, school, personal-life or work environment?

Please make sure that you look at the example that is also attached!!

Cloud Computing

For this week’s assignment, create a 3-4 page paper that discusses how Sarbanes-Oxley affects those organizations with a cloud presence and what areas they need to be cognizant of to ensure compliance with the law.

Assignments should be clear and detailed with a minimum of 500 words, sources must be cited in APA format and must have clear organization and flow.

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams

 

Required Reading:

Read (2016). Empowering Leadership and Effective Collaboration in Geographically Dispersed Teams. Personnel Psychology, 69(1), 159–198. https://doi.org/10.1111/peps.12108

http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=eue&AN=112508299&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Assignment:

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

How do geographically dispersed teams collaborate effectively?

Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team. Please note the pros and cons of each tool. 

Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why. 

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

DBMS project

I need someone to work on a database project. project include making entities, relationship schema, populate the database with the data, write SQL query for 10 questions (any). 

Physical Security

 Discuss the Privacy issues related to the use of Biometric devices and comment on a classmates report.
For the remaining Assignments you must have at least 3 references and 1 must be from the text. The others may be from the text or web sites. I will NOT accept any references from any other sources including journals UNLESS you provide the written proof of the reference with your submission.

Case study

 

Submit a report summarizing your work on your case study

1. Minimum size 1000 words (excluding header page and references).

2. Introduce your case study in your own words

3. Answer in details all discussion questions raised in your selected case study 

discussion

 

Your readings in Chapter 9 this week, as well as the handout discussing the risk companies face over unstructured data raises concerns that need to be addressed when a company uses social media. 

With your industry in mind, identify and discuss these concerns and address how this can be effectively handled. Support with references and do your usual critical review of at least 2 other students’ posts.