MS 3

Scenario:

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Requirements:

The paper should include the following sections:

a. Program and technology recommendations, including:

1. Metrics

2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.

3. Regulatory, security, and privacy compliance expectations for your company

4. Email and social media strategy

5. Cloud Computing strategy

b. Conclusion

c. References

Notes:

1. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.

2. Must cite at least 5 peer reviewed scholarly journals.

3. This paper should be in APA format and should be a minimum of 4 pages in length

Policy, Legal, Ethics

  

1) You are the web master of a college website. You share a server with other school departments such as accounting and HR.Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security. your own work and use your own words.  Write min of 300 words.

2) Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  Write in essay format not in bulleted, numbered or other list format. Discuss in 500 words your opinion, Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraph.

3) Answer below questions, each of these questions in a paragraph with at least five to six sentences.Include the question and number your responses accordingly. Min 1 citation for EVERY question and it needs to be referenced. References & citations should be less than 6 years old. They also need to be an academic source something from the library or scholar Google not just any random website. It must be a peer reviewed academic source or an industry recognized type reference. Make sure your citations and your references use proper APA formatting if you are unsure consult the OWL website. 

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Assignment Seven

Week 7 Written Assignment

Each assignment will be an essay written in APA format (see below). Each essay should be no less than 1500 words on the topic (s) noted below.

The title page and bibliography do not count towards the word count.

Complete the assignment in a Word document using APA formatting with your last name as part of the file name. Omit the abstract and outline. A Word APA template and APA sample paper are provided for reference

After completing the essay, save and upload the document in the Assignments section of the e-classroom.

Each essay will be checked by Turnitin automatically upon submission.You will have access to the originality reports.

Topic: After conducting independent research using at least three sources not used in the class write an essay that illustrates the impact of the  Internet on Human Rights (In a pinch you should review the UN Declaration on Human Rights if you get stuck).

Foundations of Cybersecurity-SP21

 

This application assignment involves investigating two recent cybersecurity topics/events covered on the website KrebsOnSecurity.comKrebsOnSecurity.com presents the latest news and investigative reports on cybersecurity. This site is managed by Mr. Brian Krebs, who worked as a reporter for The Washington Post from 1995 to 2009 authoring over 1,000 blog posts for the Security Fix blog and well over 200 articles for The Washington Post newspaper and washingtonpost.com. 

Select two articles from the Website–one that details an information security concern and one that explains a new cybersecurity skill or knowledge.  The articles must have been published in the last six months.  For each of the two articles, you will then go find another article on the same topic from outside the KrebsOnSecurity.com site.  Referencing both articles (e.g., the one from Krebs and the one from somewhere else), your job is to provide a summary of the topic–largely in your own words–explaining how you as a cybersecurity professional would use/apply the information.  Limit your writeups to no more than one page for each of the two topics.  When complete, submit your two writeups as a single Word document via the submission functionality.

To summarize, this assignment involves identifying two articles from KrebsOnSecurity.com–one related to an information security concern and one related to a new security skill or knowledge base.  For each of the two articles, find one other article about the topic from somewhere else, providing you with two perspectives on the same topic.  Then, for each of the two topics you identified, write up a one page summary that incorporates information from both articles (the Krebs one and the non-Krebs one) you found.  Submit the separate writeups via a single, two-page document that clearly delineates between the two different writeups.  

Machine learning Project

Machine Learning Course Project 

 

 This course project is an opportunity for you to explore a machine learning problem of your choice. 

 There are many datasets out there. UC Irvine has a repository that could be useful for you project: 

  using this link (http://archive.ics.uci.edu/ml/index.php)

Project guideline

**Classifier Implementation 

Implement a classifier or classification algorithm. It can be any classification algorithms we learned or have not learned in the class. 

1. Project Proposal should be 1 page long and Include the following information: 

-Project title; 

-The name of classifier or classification algorithm that you will implement; 

-The programming language you will use; 

-The format of training data you will use, i.e., the source of data set, the attributes’ types, the range of attributes’ values, the size of training set, etc. 

2. Project Report should be maximally 8 pages long and be written by using this link( https://nips.cc/Conferences/2020/PaperInformation/StyleFiles) 

and Include the following information: 

-Abstract 

-The description of implementation process, such as flowchart, functions, pseudocode, or partial codes;

-The description about 1) using training set to build the classifier, and 2) applying the classifier on a small amount of test instances. That is to show how your classifier works, as well as the training errors and test errors. 

-Conclusion 

3. Presentation (10 ~ 20 pages)

-Explain the source code files; 

-Present how your classifier works; 

-Evaluate your classifier. 

Enterprise risk management subject

For your week 6 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Opposing Shadow IT

Organizations do not always provide information systems that allow their staff to perform their responsibilities efficiently and effectively. Read the article, “Lifting the Veil Off Shadow IT.” Then, respond to the following:

  • Take a position favoring or opposing shadow IT.
  • If you are in favor, give one reason that shadow IT should be allowed. If you are not in favor, provide one way that the organization can reduce the risks of shadow IT.

week 1

Define and describe PaaS. In the description be sure to list the benefits and potential disadvantages. Locate an article that supports the benefits of PaaS in an organization and/or the failures of PaaS implementation. Be sure to cite in APA format.