plain view doctrine

 

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

mid

 

You have been asked by management (manufacturing, healthcare, retail,  financial, and etc. ) to create a demo using a data analytic or BI  tool. It is your responsibility to download and produce outputs using  one of the tools. You will need to focus your results on the data set  you select.  

Ensure to address at least one topic covered in Chapters 1-5 with  the outputs. The paper should include the following as Header sections.

Introduction
History of Tool [Discuss the benefits and limitations] Review of the Data [What are you reviewing?] Exploring the Data with the tool
Classifications Basic Concepts and Decision Trees
Classifications Alternative Techniques
Summary of Results
References

Ensure to use the Author, YYYY APA citations with any outside content.

Types of Data Analytic Tools

https://www.octoparse.com/blog/top-30-big-data-tools-for-data-analysis/
Excel with Solver, but has limitations

R Studio
Tableau Public has a free trial
Microsoft Power BI
Search for others with trial options

Examples of Dataset

https://www.forbes.com/sites/bernardmarr/2016/02/12/big-data-35-brilliant-and-free-data-sources-for-2016/#4b3e96f1b54d

Discussion 7 – Response to Peers

Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Discussion post – Blockchain

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies.

question1) In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. 

question2) Lastly, discuss if you have any experience using any cryptocurrencies. 

Note: Minimum 250 words. Use atleast one google scholarly article. Intext citation should be added.

Organization Intelligence

  

1. What does it mean for a company to have a competitive advantage? Use at least three unique references. Length: 2 paragraphs. 

2. What is an ERP system? How does an ERP system enforce best practices for an organization? Use at least three unique references. Length: 2 paragraphs.

3. What are the advantages and disadvantages of centralizing the IT function? Use at least three unique references. Length: 2 paragraphs. 

What is the difference between the pilot implementation methodology and the parallel implementation methodology?  Use at least three unique references. Length: 2 paragraphs.  

article

 

Using search engines,  find one (1) recent PEER REVIEWED ACADEMIC ARTICLE involving the use of databases in business. Describe the role of “databases” in the text using your own words. Here is an example of an article citation as I would expect to see it in your write up. The writeup for your citation should be at least one paragraph long (7-9 sentences). 

Source Example:

Ekren, G., & Erkollar, A. (2020). The Potential and Capabilities of NoSQL Databases for ERP Systems. In Advanced MIS and Digital Transformation for Increased Creativity and Innovation in Business (pp. 147-168). IGI Global.

 

  • Your entry on Blackboard should equal about 1-2  pages in length, double spaced, 12 point font Times New Roman.
  • Your paper must contain a UNIQUE topic (see example above). 
  • Your paper must contain a MINIMUM of three unique academic journal articles and research sources. Blogs, Wikis, and Online News Sources will NOT be accepted. 
  • You must cite all references using APA and apply APA Style throughout the entire paper. 10% of your grade is based on APA Style.
  • You must spell check / grammar check your paper. 10% of your grade is based on following this criteria. 

One Page outline of a Term Paper on are there any loopholes in the IT ACT 2000?

 Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. The term paper details are listed below. ALL TOPICS MUST BE APPROVED. A FAILURE TO HAVE THE TOPIC APPROVED WILL RESULT IN A ZERO GRADE FOR THE TERM PAPER OUTLINE AND THE TERM PAPER. You can send a message with the topic for approval.

This project provides you with the opportunity to increase and demonstrate your understanding of cyberlaw theory and practice. You will need to choose a law(s) that you are interested in researching. The paper must be 4-6 pages in length detailing the below questions. Before completing the below steps, please make sure that the topic is approved.

1. Thesis: What law are you researching (You are to choose a specific law. Please do not choose a topic)? What position do you want to take in regard to your chosen law? You will need to decide if you agree or disagree with the current way the law is written. You can choose to like certain aspects of the law and not others.

2. Background: What is the existing point you want to challenge or support, and how did the law get to be that way (This is where you would need to find cases, background information, etc.)?

3. Inadequacies: What are the deficiencies in the present way of doing things, or what are the weaknesses in the argument you are attacking?

4. Adequacies: Discuss the positive aspects of the law?

5. Proposed Changes: How will we have a better situation, mode of understanding or clarity with what you are advocating? In short, how can the law be improved (or not diminished)? (This is where you have the chance to change the law with your own ideas of how it should be written).

6). Conclusion: Why should and how can your proposal be adopted?

A detailed implementation plan is NOT expected, but you should provide enough specifics for practical follow-up. In making recommendations, you are expected to draw on theories, concepts, and reading 

Use the information below to help with the outline for the term paper

 Are there any loopholes in the IT ACT 2000?

Yes, there are many weaknesses and loopholes revolving around Information Technology Act, 2000 even after the 2008 amendments. They are as follows:

  1. ITA 2000 does not deal with Proper Intellectual Property Protection for Electronic Information and Data. Contentious yet very important issues concerning online copyrights, trademarks, and patents have been left unnoticed by the law, thereby leaving many loopholes.
  2. It does not pay any heed to Domain Name related issues. It does not deal with the rights and liabilities of domain name holders.
  3. It does not cover various evolving forms and manifestations of cybercrimes such as:
  • Cyber theft;
  • Cyberstalking;
  • Cyber harassment;
  • Cyber defamation;
  • Cyber fraud;
  • Chat room abuses;
  • Misuse of credit card numbers.

4. It does not touch upon antitrust issues.

5. It is not explicit about the regulations of electronic payments.

And the biggest flaw is the improper implementation of the cyber laws as the police stations are not well equipped with the required technology and technical skills associated with them.

cc-10

 
Describe in 500 words discuss the scope of a cloud computing audit for your business. 

ns-12-p

  • 12.1 List three design goals for a firewall.
  • 12.2 List four techniques used by firewalls to control access and enforce a security policy.
  • 12.3 What information is used by a typical packet filtering firewall?
  • 12.4 What are some weaknesses of a packet filtering firewall?
  • 12.5 What is the difference between a packet filtering firewall and a stateful inspection firewall?
  • 12.6 What is an application-level gateway?
  • 12.7 What is a circuit-level gateway?
  • 12.9 What are the common characteristics of a bastion host?
  • 12.10 Why is it useful to have host-based firewalls?
  • 12.11 What is a DMZ network and what types of systems would you expect to find on such networks?
  • 12.12 What is the difference between an internal and an external firewall?

Legislated Privacy concerns

 

Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

Using WORD, in your OWN WORDS, write an ORIGINAL brief essay of 300 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter