Discussion

 

1) Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Organizational structure

create a one-page essay answering the question noted below.    

  • Define the IT organizational structure and how the IT organizational structure impacts culture and change management practices.  Additionally, how does the organizational structure impact competitive advantage?

Twitter Data Analysis

 

 

NF 160 Introduction to Data Science

Twitter Data Analysis

Due Date: Nov 5, 2020

Points: 22

Objective:

Examine students’ ability to create Twitter applications in order to download tweets by using the R platform for data science projects.

Tasks:

Students will create a Twitter application for scraping tweets by using the R platform. They will use this application to download a total of 200 tweets by searching with their chosen hashtag and from a user profile. The first 100 tweets will be collected by using a student-chosen hashtag/keyword and the rest 100 tweets will be collected from a student-chosen Twitter user profile.

Deliverables:

Two files:

  • One word processing/PDF file explaining the steps of Twitter application creation
  • The RStudio file that contains codes for Twitter data collection 

Submission:

Upload both of these files in Canvas Assignment section.

Points and Rubrics:

Word Processing/PDF file:

  • The word processing/PDF file explaining the steps of Twitter application creation will get a maximum of 5 points
  • Inclusion of comprehensive application creation steps will get a maximum of 5 points
  • Inclusion of minimal application creation steps will get a maximum of 3 points
  • No explanation of Twitter application creation will get 0 point

RStudio File:

  • The RStudio file will get a maximum of 6 points
  • 150-199 tweets comprising of a hashtag and user profile will get 5 points
  • 50-149 tweets comprising of a hashtag and use profile will get 3 points
  • Less than 50 tweets comprising of a hashtag and user profile will get 2 points
  • No tweet will get 0 points

Assignment

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the annotation choices:

  1. Start by identifying all the annotation features deployed, listing them under the headers of either project or chart annotation
  2. How suitable are the choices and deployment of these annotation features? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential annotation features, what would you do differently or additionally?

Risk Assessment

I need help with creating a risk assessment based on Equifax breach that occured in 2017. I have attached the milestone three rubric, aswell as milestone one and milestone two that was completed by me. 

Emerging Information Tech

 

Paper Requirements 

  • 4 pages (including title page, 2 pages of content,  and reference page) 
  • 1 Inch Margins 
  • Running Header
  • 12 pt font
  • double spacing
  • References from the text
  • Use of outside references 

Some questions to consider to help you draft your response 

  • What are the main lessons that have resonated with me?
  • Why did these lessons resonate with me?
  • What concepts were easy to learn and why?
  • What concepts were more challenging to understand and why?
  • How could I use this in now and in the future?
  • What lessons do I have direct experience with and why?

Please ask any questions in this week’s discussion. 

cloud computing

 

Please develop a recommendation to acquire outsourcing services for the purposes of having a totally external IT operation for one of the companies provided below. Identify the needs of the company based on the scenario to select the appropriate cloud service (PaaS, IaaS, or Identity as a Service). Include the following: define the scope of the problem, review of the cloud provider, estimated cost, describe the services to be provided, and explain the justification.

Paper Requirements:

  • Select a valid cloud vendor
  • Specify which scenario you are addressing by naming the business from the scenario in your paper.
  • Paper length: 2-2.5 
  • Minimum References: 3
  • APA

Select from one of the following scenarios and research a cloud platform to address its needs. The solution must be of the following: PaaS, IaaS, or Identity as a Service

  1. Stark Accounting Inc. – Stark Accounting plans to merge with another company, DGT Inc. As a part of the planning process, Stark wants to identify an appropriate method to provide authentication for both companies during the merge. They both currently use Active Directory (SAML). They are open to a Federated system or moving to a new shared authentication method as long as it does not require centralized hardware in either location.
  2. Emerald Consulting LLC – Emerald Consulting has 5 massive data centers which has a high cost to the IT operations budget. The CTO of the company has mandated a 25% reduction in cost over the next year. As the director of IT, you are required to identify possible solutions to present to the executives showing options to reduces the cost associated with the data centers. Also, the company expects to expand globally which may create more stress on the IT budget.
  3. JML DevOps Inc. – JML is working on a major project with limited funding. The project requires the build on new servers for their developers to create, design, and deploy a new web application. JML does not have any server administrators available to work on the hardware infrastructure which leaves the developers in a critical bind. The project will also need storage for its content as the application will collect over 10Gb of data daily. Although, the project has limited funds, if a solution is found to complete the project in a timely fashion without pulling from the server admins, they are open to additional funding for the project.

Paper on Sql Injection

 

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.    P lace the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one  full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. 

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.