Assign 10

Please open the chapter 10 book is attached below and follow all the codes mentioned in chapter 10 and Here is the Dataset on which you have to work.

https://www.kaggle.com/sudalairajkumar/covid19-in-usa

Applying all the code on your selected dataset, complete all codes from Chapter 10.

 Make sure you submit to this link two things

1. Your report file showing screenshots of all commands from Rstudio GUI

Make sure you show all Rstudio GUIs

2. Submit your R script code

Assignment week 3 InfoTech Global Economy

 

Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use the Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

No Plagirsam 

Rights To Privacy

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • What are the principles and limitations to an individual’s right to privacy?
  • What are the trade offs between security and privacy?
  • What is the issue of freedom of speech versus the protection of children online?

Research paper: COSO Framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

NO plagiarism at any cost. 

Due on Friday (10/02/2020)

Course textbook:

Title: Managing and Using Information Systems

ISBN: 9781119560562

Authors: Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta

Publisher: John Wiley & Sons

Publication Date: 2019-12-05

Enterprise Risk Management

 Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

Content must be a minimum of 300 words.

Module 6 – Disaster Recovery Plan

Please see attached. 45 pages

Must include two attachments the draft and final

Please do not use use books or journals as references. Use online sources

60.0 to >54.0 pts

Excellent

Plan includes the following for one data center and the global network: • Clear, concise, and detailed recovery plan with specific recovery process objectives. • List of disaster recovery teams for each data center and the global network, with rationale for team assignments. • Contact list for each of the teams and backup team members with their names, job titles, work and home contact information, and their roles and responsibilities; rationale for assignment of each team member • Inventory list of hardware and software (with version numbers) for the IT infrastructure • Alternate recovery site location(s) with descriptions of what equipment and/or resources should be at the site and why • Escalation call tree of IT leaders based on the severity event levels with names, job titles, work and home contact information; detailed explanation of call tree