Study Questions 19476021

atleast 150 words each question with 2 refs:

1)              

After reading the article “Artificial Intelligence and Its   Impact on Cyber Security,” what do you believe are the implications of “innovation and   machine learning and the threat of ‘modification of facts’ to cyber security”?

2)in this frenetic climate, we tend to focus on developing individuals’   cybersecurity knowledge and talent and putting them on the front line   as quickly as possible. In the mad rush, we often forget to consider   how new recruits could potentially abuse these abilities on the job or   in the wild. Lacking context on cybersecurity ethics, individuals must   defer to their personal moral compass. How does this lead to good   decisions as often as it leads to mistakes?

Research Paper Topic Proposal And Outline Instructions

  

Research Paper Instructions

The research paper will provide you with an opportunity to learn more about a topic of particular interest regarding information security systems. The technical focus and level of research for the chosen topic must be well planned and researched. With that in mind, be sure to choose a focused topic to ensure in-depth research.

The research paper will allow exposure to technical literature for exploration of the body of research as a whole, as well as practice navigating your way around it. Thus, a well-written paper will show your ability not only to research, but also to communicate via the written word. How well your document conforms to the required form and format will demonstrate your attention to detail and instruction.

Each paper must:

· Have a length of 2750–3250 words (Note: the word count does not include words used in figures, tables, diagrams, or the bibliography)

· Be formatted according to current APA standards including:

o A properly formatted APA Title Page including paper name, institution, class name and paper date. 

o A Proper Title Page Header (Running Head: First 40 Characters of the paper title) and the page number (on the FIRST page).

o The name of the paper and page number on each additional page (no Running Head).

o Section Headers (i.e. First Level Headers) which are bold and centered

o Indented paragraphs for each paragraph.

o No contractions or use of personal pronouns such as “You, me, your” (except in the Conclusions page)

o Proper APA formatted in-text citations and Bibliography

· Include figures, tables, or diagrams, where appropriate (Note: the words in the figures, tables, or diagrams are not part of the word count)

· Include an in-text citation whenever the source to which you refer is changed

· Attribute quotes to the source obtained, but quotes may not make up a significant portion of the body of the text

· Include at least 5 sources for citation, 2 of which must be peer-reviewed journals. 

· Use an in-text citation to support any opinion that is not otherwise known as a ‘fact’ by your audience or by the general public. 

o For example, if you state: “…all IT Systems should be reviewed yearly as a best practice…” you need to support that with a citation. Such as ‘According to (source), “all IT systems should be reviewed yearly…”

o As a graduate student, you are not yet considered an expert in your field but are striving to become one by your degree. 

o If your statement is a known fact such as “Computers are designed for processing electronic information” or “IT Security is important” then you do not need to cite as your audience will likely agree that this is a fact.

o When in doubt, cite! J

 

Each paper must include these 4 sections in this order as the ‘first level sections’:

1. Research Objectives:

What specifically do you want to learn about or prove as you do this research? 

a. List the research topics that you included as at least 3–4 bullets in the Research Paper: Topic Proposal/Outline at the top of this section. This list is to appear as the first section in your paper. 

b. After placing your bulleted list on the paper, you must now explain those bullet points as separate paragraphs placed directly after the complete list rather than inline with your list.

c. For each bullet in the list above, devote a paragraph or two to the research topic to provide detailed information about that topic Including your research sources. (Note: your paper must be very focused to allow in-depth research in so few words. ) and remember to include biblical integration as you are able.

d. The research topics are stated as bullets in this first section to help sharpen your focus and hopefully ensure that focus is maintained as the paper develops. But are only to serve as a guide for your paragraphs.

 

2. Literature Search Results:

What do other academic sources say about this subject? 

a. This section will show the depth of your research. 

b. All entries in your bibliography must be cited at least once in this section. 

c. When detailing your literature search results, each declarative idea/concept (not each sentence) must be cited. You are stating other authors’ ideas and concepts and must provide the source from which they come. 

d. Remember to link the results to Christian concepts via biblical integration.

e. Often this is the largest section of the paper. The time to state your own ideas will come in the following section.

3. Conclusions:

What have you learned from your research? 

1. The purpose of this section is not simply to reiterate the previous sections, but for some thoughtful reflection. Now is the time to state your own conclusions. Don’t forget to provide biblical integration on the topics when you state your conclusions. 

2. In this section, each of the specific research questions you selected in the Research Paper: Topic Proposal/Outline must be restated and directly answered, even if the conclusion for an objective is uncertain. Doing so will help ensure that you have addressed all your original research questions. This, however, does not mean you are limited in this section to only answering your initial research questions. More often than not, your research will open new lines of thought that should be discussed. 

3. Most poor grades are earned because this section does not include your conclusions, but only repeats data from the previous sections.

4. Bibliography:

1. Your bibliography section must show at least 5 sources you cited from with a minimum of two (2) peer-reviewed journals as sources. 

2. Both the in-text citations and the accompanying bibliographic information must be in current APA format. 

3. You must cite professionally edited, peer-reviewed sources. You are permitted to use webpages ONLY as secondary sources that support the aforementioned peer reviewed sources. 

4. Do not cite the course texts, encyclopedias (online or otherwise), news sites, or articles from user-edited sources such as Wikipedia (however, this type of resource can be used for initial uncited research which will often lead you to acceptable sources). 

5. You must use resources with a specific technical focus on your topic.

The Policy Research Paper: Final is due by 11:59 p.m. (ET) on Sunday of Module/Week 4.

The Technology Research Paper: Final is due by 11:59 p.m. (ET) on Friday of Module/Week 8.

Using the “Tell Them…” Method

One of the most tried and true standards for good quality papers is to use the “Tell Them” model for crafting information. The model is broken out like this:

1. Tell Them what you are going to tell them. (introduction)

2. Tell Them about it (body of the paper)

3. Tell Them what you told them. (conclusions)

To put this into perspective of a research paper, in the introduction you will “Tell Them What you are going to tell them”. This gives the reader an idea of what to expect and helps setup a good structure for your paper. Obviously, don’t use the words “I am going to tell you” but make it clear what the purpose of the paper is.

In the body of the paper, you will “Tell them about it.” Okay, you have explained at the beginning the topics you want to use and a broad overview of the information. Now you need to answer each piece of what you need to tell them. If you made it clear that you are going to talk about 4 specific things in the “Tell Them what you are going to tell them” section, then you should make sure to address all 4 items in detal.

Finally, in the conclusion of the paper, “Tell Them What You Told Them.” This means that you can re-iterate what you talked about (don’t repeat it word for word but summarize the ‘big ideas’). Use this section to tie in each things you said you would talk about into a unified ending to your paper. 

Why do this? It is scientifically proven that if information is repeated at least three times, the audience is most likely to remember it more quickly than if it was stated one time or less. If you give your readers a solid structure, follow it and drive it home, your audience will likely stay more engaged with your subject. 

Practical Connection Assignment 19676227

I need 300-350 words practical connection assignment for Information technology  in a Global economy. So i need an assignment which will connect Hadoop developer roles and infotech in a global economy.

First Response Digital Forensics

You have been assigned to investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.

Resources:
Read Chapter 6 of the Graves, First Response and the Digital Investigator

Primary topics: Comparing digital and physical evidence Handling evidence Computer systems

Lab 6 Completion

 

In this Lab #6, you reviewed the article titled “Risk Impact Assessment and Prioritization. ”  You also reviewed the results of the assessments in the table and noted how the risks were categorized and prioritized for the IT infrastructure.  You also reviewed Chapter 9 in our text pg. 226 NIST Control families and pg. 227 Functional Controls.

Please answer the following three questions pertaining to Lab #6:
1. Describe the purpose of prioritizing the risks prior to creating a risk-mitigation plan.
2. Describe the difference between Preventive Controls, Detective Controls and Corrective controls. (Be sure to define each type of functional control in your own words)
3. Provide an overview for any 2 (out of the 18 listed in our text) control families.  Please be sure to mention how each of the 2 controls you identified helps an organization.

Practical Connection 19677885

Write or reflect on how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment or personal life. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study or your personal life. 

Write a 500 word (or 2-page double-spaced) minimum reflection which is APA compliant.

Assignment Questions 19521093

Assignment Questions:
1) Explain why it is essential to use multi-factor authentication when banking online.
2) Are there other more secure methods to ensure data security or authenticity?
3) Other than banking, can you list another method that would provide a more secure transaction?

Infotech In Global Economy 19573215

 

This week, you have read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s strategy for staying global if it is.

• Research other company’s strategy for going global and explain if this will or will not work for your company. 

Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Final Exam 19598349

FINAL EXAMS -INFORMATION GOVERNANCE – ITS833 POSSIBLE POINTS: 175  Use standard APA writing and the application of the Blooms taxonomy and 5 pages without the cover page and references, answer the following questions. 1. Define and discuss the meaning Information Governance in context of Enterprise

 2. Identify 5 or more questions organizations are asking themselves about Information Governance (IG), and provide possible answers to those questions. 

3. What is Continuous Improvement and why is it critical to the success of IG program? Name 5 or more success factors for Information Governance.  

4. In line with the differences in terminologies and definitions between Information Governance (IG), Data Governance (DG) and Information Technology Governance (ITG), how do you see these whole areas of IT evolving in the next 5- 10 years? What framework will you suggest to implement and IG program. Feel free to use adopt a best practice or depict yours with a diagram.  

5. How do you see yourself evolving with the developments in IG and what difference(s) do you see this discipline making in your career? Do you think practitioners of IG should be restricted to a specific group or spread across an organization?  

  I need the answer as q&a individually answer must satisfy all the requirements in the question and plagiarism check using safe-assign 

Data Mining Assignment 19565843

     

Data Mining Clustering Analysis: Basic Concepts and   Algorithms Assignment

1) Explain the following types of Clusters:

· Well-separated clusters

· Center-based clusters

· Contiguous clusters

· Density-based clusters

· Property or Conceptual

2) Define the strengths of Hierarchical Clustering and then explain the two main types of Hierarchical Clustering.

3) DBSCAN is a dentisy-based algorithm. Explain the characteristics of DBSCAN.

4) List and Explain the three types of measures associated with Cluster Validity.

5) In regards to Internal Measures in Clustering, explain Cohesion and Separation.