Internet Crime and Virus Hoaxes

Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #4). Use examples from the readings, lecture notes, and outside research to support your answers. The assignment must be a minimum of a 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

1. How do pedophiles and other child exploiters use the Internet to commit their crimes?

2. What are virus hoaxes? Why are the hoaxes sometimes more dangerous than an actual virus?

MM G1

students will develop a marketing plan for a small business (either real or fictional).

Topic:

Pricing and Positioning Strategy 

1. Should be in APA format with references.

2. Should be 400- 500 words with references

information system

  

Q4 ) In Wikipedia, IT governance is a part of corporate governance  (https://en.wikipedia.org/wiki/Corporate_governance_of_information_technology).  In a page or less, what is IT governance and why is it important to the IT manager? Make sure you describe who has precedence, the company or the company’s IT function.

Q5 ) In a page or so, write a job description for an IT manager that incorporates at least one area of IT governance that you covered in Question 4 above. Monster.com has an example template http://hiring.monster.com/hr/hr-best-practices/recruiting-hiring-advice/job-descriptions/information-technology-manager-job-description-sample.aspx [1]. The template can be edited to use the terms, definitions, principles, methodology, etc. of our readings, e.g., risk management, IT value delivery, IT strategic alignment, etc.

Q6 ) In Wikipedia (http://en.wikipedia.org/wiki/Information_technology_management), Information Technology Management is defined as “… the discipline whereby all of the technology resources of a firm are managed in accordance with its needs and priorities.” [2] I suggest this is an excellent definition and also allows a broad spectrum of ways to achieve the course objectives listed in the syllabus.  In a page or so, please take a deeper dive into this from A1 and comment on this definition, and clearly state whether you agree with it or do not agree with it and why. Use our course material in your commentary.   

hw11

  

· How will you apply the skills acquired from Analyzing and Visualizing data to your job?

· How will Analyzing and Visualizing data assist you in your professional or/and academic development?

· If the skills acquired in Analyzing and Visualizing data will not directly apply to your job environment, in what other ways are you hoping to apply them to your personal or academic portfolio?

Choose any 2 questions each week: Must provide a heading to identify which Chapter and which Questions were chosen. Must be a WORD document with APA formatting.

 Discussion #1: What is Big Data? Why is it important? Where does Big Data come from?

 Discussion #3: What is Big Data analytics? How does it differ from regular analytics?

 Discussion #4: What are the critical success factors for Big Data analytics? 

Discussion #5: What are the big challenges that one should be mindful of when considering implementation of Big Data analytics? 

 
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source). 

Practical connection to the Subject

Subject Name : Business Intelligence

Assignment:

Provide a reflection of at least 500 words  (double spaced) of how the knowledge, skills, or theories of  this course have been applied, or could be applied, in a practical  manner to your current work environment. If you are not currently  working, share times when you have or could observe these theories and  knowledge could be applied to an employment opportunity in your field of  study. 

Requirements:

Provide a 500 word (double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you  are not employed, demonstrate a connection to your desired work  environment. 

Note:  I am currently not applied so you can write this assignment as how the subject knowledge is used for  future 

Discussion

Assume that An agency has focused its system development and critical infrastructure data collection efforts on separate engineering management systems for different types of assets and is working on the integration of these systems. In this case, the agency focused on the data collection for two types of assets: water treatment and natural gas delivery management facilities. Please identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities. 

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, identify what type of critical infrastructure data collection is needed for pavement and storm water management facilities. 

Solving the Cybersecurity workforce crisis

Solving the Cybersecurity workforce crisis

For this project, you will research and report on the cybersecurity workforce crisis as it affects state governments. Your audience will be the members of an organization for state government officials such as the National Governor’s Association and the National Association of State Chief Information Officers. The results of your research project will help develop a one-day workshop on strategies for developing and growing the cybersecurity workforce at the state government level. 

Research:

1. Read / Review the Week 5 readings.

2. Research authoritative sources which discuss the reasons why the cybersecurity workforce crisis exists.

a. Hiring Cybersecurity Staff is Hard for States http://https://www.pewtrusts.org/en/research-and-analysis/blogs/stateline/2015/5/11/hiring-cybersecurity-staff-is-hard-for-states

b. NGA Releases Report Advising States on Decreasing the Skills Gap in the Labor Force https://www.nga.org/wp-content/uploads/2018/07/NGA_Talent-Driven-Economy_RoadMap.pdf

c. Comparing Private Sector and Government Worker Salaries http://reason.org/news/show/public-sector-private-sector-salary (This source argues both sides of the compensation / education arguments.)

d. Budgetary Constraints (p. 3, Figure 1.4) http://www.csg.org/knowledgecenter/docs/ta0210workshortage.pdf 

e. IT Workforce hiring issues: http://www.nascio.org/Portals/0/Publications/Documents/NASCIO_ITWorkforce_UnderPressure.pdf 

f. State vs Private Compensation (see “Conclusions” on p. 15) https://www.aei.org/wp-content/uploads/2014/04/-biggs-overpaid-or-underpaid-a-statebystate-ranking-of-public-employee-compensation_112536583046.pdf 

g. Global talent gap http://thehill.com/blogs/congress-blog/technology/239113-cybersecurity-talent-worse-than-a-skills-shortage-its-a 

3. Review the best practice recommendations from the NICE report. Select three to five best practices which state governments could benefit from implementing. https://niccs.us-cert.gov/sites/default/files/documents/pdf/best_practices_for_planning_a_cybersecurity_workforce_white%20paper_0_0.pdf   

4. Review alternative recommendations for attracting and retaining qualified talent (workers) to a state or region. Select 3 or more recommendations that you believe would be beneficial for state government hiring efforts for cybersecurity personnel.

a. 7 Ways to Attract and Retain Talent (without having to compete on salaries) http://www.oyginc.com/articles/attractarticle1/  

b. Government Needs to Rethink How They Attract IT Talent http://www.governing.com/columns/tech-talk/gov-remaking-your-workforce.html 

c. Desperate for Cybersecurity Workers, States Help Build the Next Generation https://www.governing.com/topics/mgmt/sl-cybersecurity-women-veterans-students.html 

d. About Good Neighbor Next Door (ask yourself if this program or something similar should be extended to cybersecurity personnel) http://portal.hud.gov/hudportal/HUD?src=/program_offices/housing/sfh/reo/goodn/gnndabot 

5. A separate closing section in which you summarize your research and recommendations.

Write:

Write a three- to four-page research report that includes a summary of your research, findings, and recommendations. At a minimum, your paper must include the following:

1. An introduction or overview of the cybersecurity workforce issues which impact State governments. This overview should address the political, economic, socio-cultural (including education), and technological factors that contribute to the perceived lack of qualified cybersecurity workers. This introduction should be suitable for an executive audience.

2. A separate section that addresses five specific reasons why states have difficulty hiring enough trained and qualified cybersecurity workers for positions in state agencies and offices. 

3. A separate section that addresses five specific “non-cybersecurity” reasons why a workforce shortage affecting state governments may currently exist. Consider and discuss whether the workforce shortage arises out of state budget problems rather than training and education or salary.

4. A recommendations section which identifies and discusses at least five training, education, marketing, or hiring actions that state governments could take to attract cybersecurity talent and reduce or alleviate a cybersecurity workforce shortage for trained and qualified cybersecurity personnel. These recommendations should include several alternative practices which deemphasize salary.

5. A separate Summary section in which you present a summary of your research and recommendations.

Submit for Grading

Submit your work in MS Word format (.docx or .doc file) using the Project 4 entry in your assignment folder. (Attach the file.)

Additional Information

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your 3- to 4-page paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. 

3. Your paper should use standard terms and definitions for cybersecurity. See Course Resources > Cybersecurity Concepts Review for recommended resources.

4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.  

5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count. 

6. You should write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.  

7. You must credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).