There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data.

 

The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data.

Conclude your paper with a detailed conclusion section. 

The  paper needs to be approximately 6-8 pages long, including both a title  page and a references page (for a total of 8-10 pages). Be sure to use  proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the  readings from the course and at least two scholarly journal articles to  support your positions, claims, and observations, in addition to your  textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise,  and logical, using excellent grammar and style techniques. You are  being graded in part on the quality of your writing.

Business Intelligence – End-of-Chapter questions

Chapter 5 – Discussion question #1, #2, #3, & #4 and
                   Exercise #6 and
                   Internet Exercise #7 (go to   neuroshell.com  click on the examples and look at the current examples.  The Gee Whiz example is no longer on the page.)

Chapter 6 – Discussion question #1, #2, #3, #4, & #5 and
                   Exercise 4

– Each answer must be at least 100 words

– 2 references apa format

– no plagiarism

– write only answers, do not mention questions

Emerging threats_3.1

 Question:

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Internet security policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

Business Intellegence

 Discussion: Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses. 

Question for discussion: 

1. Explain why it is useful to describe group work in terms of the time/place framework. 

2. Describe the kinds of support that groupware can provide to decision-makers. 

3. Explain why most groupware is deployed today over the Web. 

4. Explain in what ways physical meetings can be inefficient. Explain how technology can make meetings more effective 

Exercise:
1. Compare Simon’s four-phase decision-making model to the steps in using GDS 

professional righting

Select 10 Articles that support your Topic.

Write a review of all the articles and submit.

APA 7TH Edition   12 Font Times New Roman 

The basis precepts for formatting the pages and paragraphs are:
Margins: 1-inch margins
Spacing: double spaced
Font-Size: Times New Roman – 12-point font
Running head (text and page #) noted on header

References (include in text citations) 7the Edition

The specific use of the APA style is to write with clarity, precision, and inclusions. The APA style provides a uniformed platform for research papers to be better structured and organized. In this class, “The term “plagiarism” includes, but is not limited to, the use, by paraphrase or direct quotation, of the published or unpublished work of another person without full and clear acknowledgment.” The specific need is the APA standard writing style helps you to reduce bias languages and show you how to cite references correctly so that you can avoid charges of plagiarism.

Mechanics: Includes complete sentences, proper formatting of margins, spacing, indentation, etc.; typeface and use of emphasis are appropriate to task. Includes thorough documentation or citation as necessary; supports all claims within either text or appendix; properly identifies outside material. Possible Point Deductions 1- 10 pts.

MIPS

 Create a MIPs program to simulate playing multiple games of “Craps” (a popular casino game) to determine an approximate winning percentage.: To simulate throwing two independent dice, you need to get two random numbers in the range of 1 to 6 and add them together. Do not get a single random number in the range of 2 to 12, as each value will not reflect the odds of rolling a particular number 

Errors Failures and Risks

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?

 

Required Readings

From A Gift of Fire by Sara Baase and Timothy M. Henry:

Chapter 8 – Errors, Failures, and Risk