Discuss a particular type of Malware and how has it been used in “todays news” and the respective impact on cyber security. Add to your discussion ways the Malware could have been detected and potentially avoided.
week 8 business intellegence
Complete the following assignment in one MS word document:
Chapter 14–discussion question #1, #3, #4 & exercise 2
APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
Text BOOK Author,
Analytics, Data Science, & Artificial Intelligence
Ramesh Sharda
Dursun Delen
Efraim Turban
attribution theory and how it influences the implementation of innovation technologies.
This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies. Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:
- Provide a high-level overview/ summary of the case study
- Note how constructive intentionality impacts innovation implementations
- Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations. Please be explicit and detailed in answering this question.
Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.
The paper should meet the following requirements:
- 3-5 pages in length (not including title page or references)
- APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
- A minimum of five peer-reviewed journal articles.
The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing
Assignment
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be include at least two references.
As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?
Access Control
Discuss the threats and vulnerabilities to Access Control and what business must do to be protected.
Length, 2 – 3 pages.
All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.
All paper are checked for plagiarism using SafeAssign, you can review your score.
assignment
Assignment1– Analyzing and visualization
Select any visualization/infographic and looking at any individual chart included. Try to extract and write down in language terms what this chart shows across the angle, the framing, and (where relevant) the focus?
Does it feel that the definition you have arrived at is consistent with the aims/claims of the chart as it is published? In other words does the chart show and include what you think it is actually supposed to be doing or is there a disconnect?
Assignment2 — business intelligence- data science discipline
Provide a personal reflection, supported by research information and ideas, of how the knowledge, skills, and/or theories of this course have been applied, or could be applied, in a practical manner to your current work/employment environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Entry level networking
I have a timed packet tracer assignment that I would like to complete after 10pm this evening. I will not know the details until I open the assignment and then clock starts. My guess is that it will be building a small network with 7 or less devices and will involve some subnetting and will require to ping a device. I will need somebody that can be on the phone with me for 40 minutes to help me. I can copy and email the assignment once it is opened.
Business Intellegence
Discussion: List and briefly describe the nine-step process in con-ducting a neural network project.
Questions:
1.What is deep learning? What can deep learning do that the traditional machine-learning method cannot?.
2. List and briefly explain different learning paradigms/ methods in AI.
3. What is representation learning, and how does it relate to machine learning and deep learning?
4. List and briefly describe the most commonly used ANN activation functions.
5. What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.
Exercise: Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/ computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real-world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.