Introduction to Data Communication and Networking

Discuss the ethical of using network tools such as privacy. Provide examples from your outside research to support your comments.  Use at least two outside sources other than your textbook.

Below are two articles to help with developing a coherent discussion:

Writing Requirements

  • APA format, 2-3 pages in length (excluding cover page, abstract, and reference list)
  •  Minimum of 2-3 peer reviewed resources
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.

IDM W 6 D

 Consider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster? 

400 words required

Assignment

 

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Risk assessment in physical security

1. Describe effective risk assessment approaches and frameworks related to physical security.  Address responsible parties, regulatory compliance, security in layers (defense in depth), and expected key controls.  Assume a large organization with multiple sites responsible for sensitive / confidential data.  (500 words)

2. Discuss regulatory requirements related to physical security, such as HIPAA and PCI.  What approaches from a testing and security maturity standpoint are beneficial to overall risk management and why.

MIS Assignments

 1) What are your overall impressions?
2) Describe what is meant by ERP systems.
3) Describe how the video relates to specific topics in the textbook.
4) Do you agree with what Dr. Word is proposing?
5) Could a possible minor in MIS be of benefit in your career?

Here is the video (copy and paste into your browser):

https://uhdmediasite.uhd.edu/Mediasite/Play/70bd29f9d1d14c0ca444cfa9c6bb36581d 

MAKE SURE there is no more than 25% plagiarism 

week-9

  

Week 10 (Final Paper Outline including at least ten references from the Annotated Bibliography — week 8 assignment)

Project Outline
 

This is Part III of 4 towards the Final Project.
 

Using APA format, create an outline (headers and 1-2 sentence description of content) for your paper. Make sure you pull info as your citations’ plan from your annotated bibliography. Submit an attachment to this assignment. 

Cloud Computing

 

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.

  • Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
  • Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements: The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 3 – 5 pages in length. The Title and Reference pages do not count towards the page count requirements.

Cloud Computing Research paper

  

Perform a search in Google or in the school’s online library database for four or five companies that have been victims of cloud-related security breaches AND/OR cloud providers that have been victims of security breaches.

Required:

Minimum 2500 words— (not including Title page, Abstract, TOC, and Reference page). Each group participant is required to write at least 500 words and to label which section below written about. Review items II through VI and each member chooses a topic to write about.

Include:

I. Company Name—Ancestry.com

type of company—

brief history—

Industry— 

Customers (consumer, business, or both)

II. Type of threat 

III. What or (who) caused the threat 

IV. How the threat was discovered

V. How the threat was resolved 

VI. Explain what and how you would have implemented to have prevented the intrusion. Use third person: eg. One may argue; It may be concluded.

VII. Known repercussions from the threat (monetary, reputation, brand, customer loss, etc).

Include:

· Title page with names of all group members

· Abstract

· Introduction

· Body

· Conclusion

· Reference page

· Minimum 8 references—DO NOT USE Wikipedia!

· USE APA 7.All in-text citations must be represented on the Reference page

· All papers will be checked for plagiarism in SafeAssign—ONLY SafeAssign at or below 20% will be accepted

5s week 10 assignment PL

Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, eliminates their jobs in a process called ‘ Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contractor under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship between BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Include references, do not copy paste. Use your own words.