Week#1 Discussion

 

After reading the article this week, and any other relevant research you locate, please discuss the following: 

Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

Questions Need to be Completed in 10 hours

1. (250 words)

 

Before an organization considers scaling, it should understand the organizational system performance and potential system bottlenecks. Web Page Test (https://webpagetest.org/) is a site evaluator that creates a detailed report. The report helps identify images that can be further compressed and the impact of the systems cache, as well as potential benefits of compressing text. 

Use WebPagetest to evaluate two or more websites. In one page, discuss how the report’s findings align with your user experience.

The paper must adhere to APA guidelines including Title and Reference pages.  The Title and Reference pages do not count towards the page count requirement. There should be at least one scholarly source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:

  • A title page
  • 12-point Time New Roman font
  • Your paper should be typed and double-spaced with 1″ margins on all sides
  • The first sentence of each paragraph should be indented one tab space
  • All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.
  • APA 7th edition in-text citations
  • Reference page

2. (250 words)

 

This week’s assigmnet is based on Chapter 6 & 7. Please complete the following assignment. You should have acquired the require text book for course.

Week 5 Assignment .pdf (Please Find attached Document)

3. (250 words)

 

Some partitional clustering algorithms that automatically determine the number of clusters claim that this is an advantage.  Using your required textbook, Chapters 6 & 7 as a guide, discuss two (2) situations in which this is not the case.

PLEASE PROVIDE PAGE NUMBER from your textbook in your citation.

create Crisis Management Plan

1.  Introduction – brief background of company and any issues the company has had in the past such as data breaches-

2.  Strategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company)

3.  Risk Analysis – political analysis, environmental analysis (more or less depending upon company)

4.  Crisis Management Plan:

a.  Purpose

b.  Committee for crisis management planning

c.  Crisis types

d.  Structure of the Crisis Management Team

e.  Responsibility and control

f.  Implementation Plan

g.  Crisis Management Protocols

h.  Crisis Management Plan Priorities

5.  Conclusion

6.  You must have a total of 10 unique references.

7..  The paper must be in APA format.

8.  There is a MINIMUM of 15 pages, required, and does not include references or title page.

9.  Limit pictures, diagrams, charts, and graphics to no more than 2 pages in total. 

ARTIFICAIL INTELLIGENCE

You will argue that health care’s increasing reliance on artificial intelligence will have a negative effect on health and society.

Present your assigned case against artificial intelligence in a PowerPoint presentation with speaker notes

At minimum, address each of the following elements.

· Explain how artificial intelligence is used in health care.

· Analyze how artificial intelligence and related technologies are effecting change in health care.

· Compare and contrast clinical decision support systems in terms of implementation of artificial intelligence.

· Examine the legal and ethical considerations of the use of artificial intelligence in health care.

· Summarize the key points supporting your point of view within your slides, adding additional detail within your speaker notes.

InfoTech Import in Strat Plan (ITS-831)

Course name: InfoTech Import in Strat Plan (ITS-831)

Discussion Topic: Physical Security

Word Count: 300+ words

Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.

Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

At least one scholarly source should be used in the discussion. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

Reading resources:

Chapter 7, “Security”. Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons 

Chapter 7, “Security”. Khelf, R., & G-Z, N. (2018). IPsec/Firewall Security Policy Analysis: A Survey. 2018 International Conference on Signal, Image, Vision, and Their Applications (SIVA), 1. Retrieved from https://doi.org/10.1109/SIVA.2018.8660973

plagiarism check required, Good work, APA format, within 8hrs

bi13

 

Examine Alexa’s skill in ordering drinks from Starbucks.

 
Your response should be350 words. 
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts.

Computer Forensics-SP21

You are a digital forensics intern at Azorian Computer Forensics, a privately owned forensics investigations and data recovery firm in the Denver, Colorado area.

Your company creates a quarterly newsletter for its clients, many of which are law enforcement agencies, law firms, corporations, and insurance companies. It’s a Tuesday morning and you are sitting in a meeting with the team that produces the newsletter. While everyone is discussing which new section could be added to the newsletter, the senior editor turns to you and asks for your opinion. This is your chance to come up with a brilliant idea! You suggest that the company includes an insert containing contact information for and brief descriptions of government agencies to which computer crimes should be reported. The information would be very helpful to clients and could increase readership. She likes your idea and asks you to create the document. The document should include contact information for:

The local police department

The county sheriff’s office

The state police agency

Because the upcoming newsletter issue has several articles on cybercrime in particular, your document should also include the federal investigative law enforcement agencies that handle the following types of Internet-based crime:

Internet fraud and spam

Internet harassment

Create the document, presenting the local, county, and state contact information in one table and the Internet-based crime federal agency information in a second table.