project

1. Museum Background and Visit Experience (25 points):

This portion should be comprised of information about the museum you selected to visit.  What was your personal experience of walking through the facility? How did you feel, particularly while taking this course?  What senses did this stimulate? What works caught your eye? Also include a light background on the museum and description of the space and format of the galleries as it pertains to viewing the artworks.    

* Length:  At least 500 words, no more than 750 words.

2. Artist (25 points): This portion should be comprised of information about the artist of your choice as well as why you selected them. Begin with: Who is the artist? Why did you choose the artist – what is generally interesting to you about it? Additional suggestions for material: date and place of birth and death, family information, lifetime accomplishments, famous art pieces, effects or impact on society, or historical significance. 

* Length:  At least 500 words, no more than 750 words.

3. Critical Analysis Artwork: Objective Response (25 points):  

This portion of the writing assignment should be your own objective critical response to a work of art by the same artist you chose.  You must base your opinion on formal elements of art (EOA) and the principles of design (POD) – using this specific vocabulary throughout. Describe the of the artwork = use descriptive adjectives = a description is what you see in the artwork, NOT an interpretation. provide appropriate background information about the artwork.  Your objective interpretation/POV should be supported through an explanation of HOW the FEA, POD & context support your interpretation. Which media that we have learned about is utilized to create this artwork?  How does the artist’s use of their selected media (material) emphasize and support their content – the meaning of the work? Does it align to your subjective response?

Things to consider: how does the artist’s use of the EOA and POD to emphasize and support their content – the meaning of the work?  Be sure to not simply describe the work, but rather, elaborate with specific details from the work that illustrate your analysis.  Answering the “HOW” part is crucial to your analysis. It is not enough to just identify the characteristics and list a few historical facts; you have to synthesize the information into a cohesive interpretation.

* Include the title of the work (in italics) and a picture of the artwork

* Length:  At least 500 words, no more than 750 words

4. Critical Analysis Artwork Subjective Response (25 points):  

This portion should be your own subjective response to a work of art (the same you selected above) by the same artist you selected.  Why did you choose the artwork – what is generally interesting to you about it? What was your initial, subjective interpretation of the artwork?  What is the artwork saying to its audience, to you? What does the artwork mean? Did it change as you found out more about the context of the artwork? What emotions, concepts, or ideas did it provoke in you?  Do not simply describe the work or state whether or not you “like” the work; but rather, elaborate with specific details from the work that illustrate your response. Are there broader thematic messages conveyed by the artwork? What are they?

* Length:  At least 500 words, no more than 750 words.

5. Bibliography (25 points):  You must provide a bibliography in one of the formal the correct citation styles that includes at least 5 sources.  Online sources are ok, but at least one source must be a book/journal/periodical/catalog and must be in addition to your textbook, and remember, Wikipedia doesn’t count. You are encouraged to research the artwork at your school’s library by searching through books and articles, written by scholars in the field of art and art history. Check out your campus’s library online and ask a librarian or tutor for help. 

BMIS 664 – Final Project

  Final Project Assignment Instructions

Overview

In order to fully comprehend the many aspects that factor into information forensics and risk management, you must examine a situation from the perspective of a computer forensic specialist. For the Final Project Assignment, you will be placed in a hypothetical scenario in which you must utilize all of the information gained throughout this course.

Instructions

Assume that you are the Chief Information Security Officer (CISO) of Corporation.  If your name is “Mariah Smith” the name of the company should be named the Mariah Smith Corporation. While performing your regularly scheduled duties, you receive a call from the Senior Vice President of the Human Resources Department informing you that, in the past 4 days, there have been 4 occurrences of money transfer to unauthorized recipients. Given your position and your understanding of recent cyber and information security attacks, you assume that an attack of some sort is at fault for the unauthorized transfers.

During the conversation, you are given the name of the department where the fund transfers have occurred.  The department is internal to the organization but only certain fund transfers were committed internal to the network. In addition, you know the external public IP address of the system that executed the transfers. Privilege escalation, man-in-the-middle attacks, buffer overflows, and malicious code were all present during the Information Assurance Team’s initial investigation.  Some of this is puzzling, given the IP address location that seems to be the source. You are given specific instruction not to engage anyone from the department where the money transfer have occurred; however, you are permitted to engage law enforcement and third party agencies if appropriate. This is to preserve any ongoing investigations and to allow the greatest opportunity to catch the suspect. 

Refer to the Final Project Network Diagram.  The enterprise network is much larger, with many additional pieces of hardware. Regardless, these are the only systems the initial investigation indicated were affected. The organization fund/money transfer systems are comprised of Microsoft, Linux, and Solaris servers. The firewall prior to the Cisco core switch only allows access to necessary web facing application ports. The Microsoft servers are responsible for authentication through directory services. Despite one firewall and some group policy being verified as sound and uncompromised by the investigation, the current information system components identified play certain roles in the unauthorized transfers.

The Final Project Network Diagram will be used as a point of reference in determining what is necessary to determine how this incident could occur in a real organization; this includes applications, information systems, human experts, and any other stakeholder involved in such an incident. Your goal is to identify where vulnerabilities and threats could exist specific to anauthorized transfers in this scenario and how to mitigate future occurances. 

The final plan must identify the technology and equipment and all access and file data that is compulsory—including log files, auditing, group policies, firewall rules, and other information system elements—to determine the root cause. Upon the successful completion of the investigation plan, a subsequent plan will determine a superior information system and plan for future mitigation and prevention. This can include everything from firewall rules to policy.

Before being graded, all code, access control rules, diagrams, and/or Visio diagrams (each) must include screenshots with a valid date and piece of data that shows completion on the student’s personal computer. The Final Project Assignment must be comprehensive and include a minimum of 5,000 words (excluding the title page, diagrams, and reference page). Each project deliverable should be well supported by related, relevant, and current scholarly literature. In total, it should contain at least 20 peer-reviewed sources. The Final Project Assignment must also be written in current APA format, include a title page, table of contents, introduction, conclusion, references, and appendixes with appropriate data. You are encouraged to utilize Microsoft Visio or a similar application in order to provide visual aides to assist in your assessment of the situation as well as Microsoft Project and/or valid alternatives. In your analysis, be sure to include the following:

· A comprehensive literature review of unauthorized transactions, how this can occur, and a comprehensive review of the affected IT infrastructure;

· A project adhering to an industry standard methodology (such as PMBOK) to manage the Final Project completion;

· An appraisal of the situation using the knowledge gained from this course and personal experience;

· A thorough assessment of the Information Assurance Team’s initial findings;

· A performance of a forensic investigation on the matter;

· An illustration of your strategy for conducting this investigation;

· The formulation of a complete plan including: a proposed personnel structure/team, mechanisms of defense, budget, schedule, risk management, procurement management, secure systems analysis, and design to prevent this incident from occurring in the future; 

· Over two (2) new unique IT architecture diagrams using at least two (2) network security frameworks that highlight the new strategy and design that could mitigate future unauthorized transactions. Diagrams must have screenshots from the user’s computer in the program they were designed and include the operating system date and time from the student’s person computer.

· A strong attempt to integrate a biblical worldview into the secure enterprise solution. 

Introduction  More than 3 scholarly sources and 250 words 

Review of literature – 2,500 words 10 scholarly journal articles

Mitigation Plan – Over two (2) new comprehensive network architecture diagrams with proper screenshots and over 20 pieces of hardware that 2,000 words 10 scholarly sources

Conclusion – More than 2 scholarly sources and 250 words 

Total Overall – Over 5,000 words and Over 20 unique scholarly sources

Question

Question 1 

Which of the following would NOT be part of a GUI? 

icon 

menu 

button 

typing a command 

Question 2 

Which of the following data sets is NOT stored in sequential order? 

employees sorted by last name 

cars sorted by color 

tax records sorted by year 

customer records entered by two typists who split the list in half alphabetically 

Question 3 

What is the name of the array in the below housekeeping module?

score 

inScore 

while 

Question 4 

A use case variation that shows functionality outside the base case is a(n) ____. 

generalization 

specification 

extend 

scenario 

Question 5 

Assume a customer record contains the fields: 

custId

custName

custPhoneNum

custNextCustAddress

You could conclude this is part of a(n) ____. 

index 

linked list 

insertion sort 

swap 

Question 6 

In object-oriented programming, data fields are called ____. 

methods 

attributes 

modules 

details 

Question 7 

A basic query is: ____ custId, lastName FROM tblCustomer WHERE state = “WI” 

SELECT 

GRAB 

GROUP 

INSERT 

Question 8 

In a(n) ____ program the user could type either a letter or a number to select the same menu-option. 

default 

batch 

elegant 

user-friendly 

Question 9 

Usually a program that process an array uses a ____. 

decision 

 black box 

batch 

loop 

Question 10 

Collections of classes that serve a related purpose are stored in ____. 

modules 

libraries 

objects 

instances 

Question 11 

When updating a master file with a transaction file, you encounter a situation in which the master record key is larger than the transaction record key. What type of operation would be valid at this point? 

update 

addition 

deletion 

merge 

Question 12 

When you merge records from two or more files, the records (almost) always contain ____. 

the same data 

the same fields in the same order 

related information 

unrelated information 

Question 13 

A(n) ____ is an occurrence that sends a message to an object. 

event 

command 

prompt 

GUI 

Question 14 

When all of the code in a module accomplishes one task, it has ____. 

pathological coupling 

normal cohesion 

 functional cohesion 

normal coupling 

Question 15 

Assume an array has the following values: 90, 85, 65, 95, 75. What are the values in the array after the first operation in the bubble sort? 

85, 90, 95, 75, 65 

85, 90, 65, 95, 75 

65, 85, 90, 95, 75 

65, 75, 85, 90, 95 

Question 16 

A(n) ____ is unique among all records in a file. 

flag 

logical order 

key field 

index 

Question 17 

After the below code has executed, the ____ variable will hold the number of elements in the array.

inScore 

numberOfEls 

score 

files 

Question 18 

What type of variable controls the main loop of a file merging program? 

 temporary 

file 

flag 

character 

Question 19 

In an object-oriented program, one object can ____ another. 

define 

interpret 

inherit from 

own 

**********************************************************

Many programming languages provide the ability to generate ____ numbers. 

complete 

random 

long 

hidden 

When merging two files, what condition terminates the main loop of the program? 

when the first file reaches eof 

when the second file reaches eof 

when both files reach eof 

when 100 records have been processed 

What happens during a merging program when both input files contain the same value? 

an error occurs 

the program exits 

two identical records will appear in the merged file 

only one record will appear in the merged file 

The acronym ____ is used by computer professionals to mean that if you enter invalid input data into an application, the output results will be worthless. 

FIFO 

GIGO 

MIMO 

NIMP 

When using a case structure to process a menu selection, a program with four menu options will require ____ cases. 

Which of the following would be the best numeric high value? 

-999 

99 

 99999999999 

What is the purpose of the flag variable in a bubble sort? 

to eliminate unnecessary swaps 

to eliminate unnecessary comparisons 

to stop as soon as the list is sorted 

to sort an array of unknown size 

When merging, a ____ is used to determine which file the next record comes from. 

comparison 

loop 

sequence 

flag 

What step is present in coding an event-driven program but not part of creating a procedural program? 

Understand the problem. 

Code the program. 

Translate the program into machine language. 

Create storyboards. 

The questions that cause the database software to extract the appropriate records from a table and specify the fields to be viewed are called ____. 

reports 

queries 

keys 

indexes 

Assume an array has the following values: 90, 85, 65, 95, 75. What are the values in the array after the first complete pass through the list of the bubble sort? 

85, 65, 90, 75, 95 

85, 90, 65, 75, 95 

65, 85, 90, 75, 95 

65, 75, 85, 90, 95 

Which of the following is responsible for the initiation of a method in an event-driven program? 

a loop 

a conditional statement 

a sequential statement 

a mouse click 

You need to understand a subroutine’s ____ in order to use it. 

internal structure 

local variables 

programming style 

interface 

The numbers 1 3 5 6 7 10 15 are stored in ____ order. 

descending 

random 

ascending 

physical 

A diagram that shows which screen leads to another is called a(n) ____. 

storyboard 

object dictionary 

interactivity diagram 

flowchart 

What are signs of amateur design in a GUI? 

menus placed on the top of the screen 

icons that represent real-world objects 

fancy fonts and weird color combinations 

allowing the user to customize the background color 

What is the largest unit in a data hierarchy? 

character  

field 

record 

file 

Which of the following is an example of an interactive program? 

payroll processing system 

billing system 

inventory system 

library catalog 

A(n) ____ use case is indicated with an open-headed dashed arrow. 

extend 

include 

generalization 

modification 

In an object-oriented program, ____ are passed to ____. 

methods, classes 

messages, objects 

modules, actions 

objects, methods 

****************************************************

A(n) ____ sort works by finding an element that is “out of order”. 

bubble 

selection 

insertion 

swap 

Which of the following is NOT a UML diagram? 

Use case 

Activity diagram 

Implementation diagram 

Component diagram 

What is the loosest style of coupling? 

data 

external 

data-shared 

control 

Methods in object-oriented programs have ____ access. 

private 

public 

derived 

overloaded 

When writing a module containing statements that repeat but may contain different variable values, you can use a(n) ____ to create a more elegant solution. 

decision statement 

stub 

array 

batch 

What action does a merging program take after it writes a record from file 1? 

writes the next entry from file 1 

writes the next entry from file 2 

reads the next entry from file 2 

reads the next entry from file 1 

A ____ file can be used to update a master file. 

merge 

data 

transaction 

detail 

____ columns can hold any type of charactersletters or digits. 

Text 

Character 

String 

Number 

Creating a many-to-many relationship in the database involves ____. 

creating a link table 

placing the foreign key in the related table 

placing the foreign key in the base table 

ensuring each table should have a foreign key to the other 

What is the mean value for the following numbers?

1 2 20 30 40 50 100 

30 

34.71 

50 

100 

A class diagram illustrating a single class contains a rectangle divided into three sections: the top section contains the ____, the middle section contains the ____, and the bottom section contains the ____. 

name of the class, names of the attributes, names of the methods 

name of the class, names of the methods, names of the attributes 

class header, names of the methods, names of the attributes 

name of the class, names of the exceptions, names of the subclasses 

What is the most common table relationship? 

one-to-one 

one-to-some 

one-to-many 

many-to-many 

Data records are stored in ____ order. 

sequential 

shared 

default 

grouped 

Another name for data coupling is ____ coupling. 

normal 

data-structure 

external 

internal 

In a batch program records are always ____. 

saved and processed at one time 

processed as they come in 

typed in by a user and processed 

loaded from a database 

********************************************************

A(n) ____ diagram consists of a rectangle divided into three sections. 

object 

entity 

class 

attribute 

A third-level menu is also called a ____. 

batch 

main menu 

submenu 

console 

Which UML diagram shows the system from the perspective of users? 

use case 

statechart 

activity diagram 

collaboration diagram 

What UML diagram has the closest resemblance to a conventional flowchart? 

sequence 

class 

statechart 

activity 

In a database, files are called ____. 

characters 

rows 

columns 

 tables 

The ____ menu of a program contains the quit option. 

main 

submenu 

exit 

default 

In a(n) ____ sort all of the array elements are moved to make room for the newly sorted element. 

swap 

selection 

bubble 

insertion 

Module statements that are “invisible” to the rest of the program are said to be in a(n) ____. 

function 

black box 

orange triangle 

loop 

How many loops are there in a bubble sort? 

A(n) ____ is an example of a random-access storage device. 

linked list 

disk 

index 

physical memory 

Which of the following sorting methods is least efficient? 

insertion 

selection 

basic bubble sort 

optimized bubble sort 

Frequently, records are stored in order of their ____ field. 

primary 

unique 

key 

numeric 

The ____ clause of a database query allows you to retrieve rows that match specified criteria. 

SELECT 

WHERE 

FROM 

EQUAL 

Which of the following is a static UML diagram? 

class 

statechart 

activity 

collaboration 

To create a new object of a class, you must ____ it. 

 instantiate 

derive 

inherit 

enable 

How many passes through an optimized bubble sort would be required to sort values 10, 20, 30, 40, 50, 60? 

 5 

What type of variable is used to help move array elements in a selection sort? 

swap 

flag 

temporary 

array 

There are two types of relationships shown in class diagrams: ____. 

association and is-a 

generalization and includes 

association and aggregation 

aggregation and integration 

When a large amount of data needs to be sorted, it is more efficient to store the logical order and the physical address in a(n) ____ than to sort the data. 

index 

array 

memory address 

linked list 

The last task that any menu-driven program should perform is ____. 

accept another response 

displaying nothing 

reading the user response 

performing a module based on user selection 

******************************************

Like programming languages, ____ contain built-in functions. 

spreadsheets 

menus 

GUIs 

Web browsers 

Assume an array has the following values: 90, 85, 65, 95, 75. What are the values in the array after the bubble sort has finished? 

85, 65, 90, 75, 95 

85, 90, 65, 75, 95 

65, 85, 90, 75, 95 

65, 75, 85, 90, 95 

What is another name for command line? 

GUI 

command window 

command prompt 

command menu 

Where is the best place to put a menu bar? 

top of screen 

left side of screen 

right side of screen 

bottom of screen 

A rectangular area that displays text is a(n) ____. 

option button 

button 

label 

text field 

GUI components are often referred to as ____. 

widgets 

gadgets 

icons 

buttons 

____ values can be both letters and numbers. 

Numeric 

Boolean 

Character 

Black box 

A method ____ describes how to use the method. 

stamp 

black box 

 signature 

argument list 

After the final pass in a selection sort the values 95, 80, 75, 65, 90 will be ordered as ____. 

65, 80, 75, 95, 90 

65, 75, 80, 90, 95 

65, 75, 95, 80, 90 

65, 80, 75, 90, 95 

When matching records between files, they must be ____. 

sorted in the same order 

the same length 

backed-up 

printed 

When ____ coupling is used an entire record is passed from one module to another. 

 data 

data-structured 

control 

external 

A college maintains a master file of all students and a transaction file for each course registration is an example of a ____ relationship. 

master-transaction 

equal 

parent-child 

master-detail 

A class that inherits attributes and methods is a(n) ____ class. 

child 

parent 

object 

overlord 

The tables with the following definitions are related with a ____ relationship. tblCustomers(customerNumber, customerName) tblOrders(orderNumber, customerNumber, orderQuantity, orderItem, orderDate) 

one-to-one 

one-to-some 

one-to-many 

many-to-many 

What is the most common database query language? 

SQL 

MML 

C++ 

Java 

The variable’s ____ in no way affects how the method is called from another module. 

local name 

data type 

size 

definition 

What is the first step in writing an event driven program? 

Test the program. 

Define the connections between the screens the user will see. 

Understand the problem. 

Define the objects. 

After you choose a primary key from among candidate keys, the remaining candidate keys become ____ keys. 

compound 

foreign 

alternate 

discarded 

A housekeeping routine exhibits ____ cohesion. 

functional 

temporal 

procedural 

logical 

When a database program includes counts or totals at the end of each sorted group, its creation is a(n) ____ report. 

query 

primary key 

grouped 

control break 

*********************************************************

Question 80 

____ are used to organize files. 

Characters 

Records 

Fields 

Databases

Question 81 

Which of the following is NOT another name for a module? 

subroutine 

function 

procedure 

loop

Question 82

A control break program that calculates totals for each category and a grand total has four modules: startUp, bookListLoop, categoryChange, closeDown. In which module would you expect to see the category total incremented? 

startUp 

bookListLoop 

categoryChange 

closeDown

Question 83

In a flowchart depicting a module, what shape does the return statement have?

circle

oval

rectangle

diamond

Question 85

In order to have the most efficient program, which question should be asked first when working with an AND decision? 

the one that is less likely to be true 

the one that is more likely to be true 

the one that involves fewer comparisons 

the one with the lower value

Question 86

Which of the following would NOT be a valid comparison to control a while loop? 

rep < 65

rep > 1

rep > true

rep * 3 > 100

Question 88

When creating a printed report, you need to clarify whether the user wants a specific number of ____ lines per page, including headings, or a specific number of ____ lines per page following the headings.

detail, total

total, detail

heading, total

heading, detail

Question 100

In which programming language could the starting subscript be 13?

Java 

VisualBasic  

COBOL

web, Technology

 Please provide an elaborate answer on each of the following questions

1. What are the advantages of using CSS? 

2. How to include CSS in the webpage? 

3. What are the different types of Selectors in CSS? 

4. Difference between reset vs normalize CSS. How do they differ? 

5. What are the validation controls explain the use of validation controls? 

6. What are types of validation controls? 

7. What are the important features of Web services? 

8. What is WSDL? 

Your work needs to be well written and have quality information. Your work must be clear and must be able to educate someone with no prior knowledge in the field of web technology. Assignment Evaluation Rules: 

 Overall presentation 10% 

 Structure 10% 

 Introduction 10% 

Main body 1o 

Critical analysis/evaluation 50% 

Recommendations 10% 

Conclusion 10% 

Project 4: System Development or Application Assurance Step 13: Write the Risk Analysis/Supply Chain Threats/Mitigation Report

 

Project 4: System Development or Application Assurance
Step 13: Write the Risk Analysis/Supply Chain Threats/Mitigation Report

Management is always interested in solutions, and Maria Sosa and the other executives at your company are no exception. In the case of cybersecurity, there are no absolute solutions to an ever-changing environment. However, there are steps to mitigation that might eliminate or minimize the results of certain vulnerabilities. This final step is to describe the mitigation strategies recommended as a result of all previous steps in the project.

The final report for the executive meeting should be five to seven pages, only one to two of which will have to be written in this step. The remainder is from all the previous steps in the project.

Use the Supply Chain Risk Mitigation Final Report Template to submit your specific testing and validation procedures.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

  • 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
  • 1.5: Use sentence structure appropriate to the task, message and audience.
  • 2.4: Consider and analyze information in context to the issue or problem.
  • 9.4: Software Security Assurance: Demonstrate secure principles, methods, and tools used in the software development life cycle.
  • 9.5: Software Security Assurance: Describe the cybersecurity implications related to procurement and supply chain risk management.

Submission for Project 4: Supply Chain Risk Mitigation Final Report

Discussion 6- Proj Risk

Assigned Readings:Chapter 13: Project Complexity and RiskChapter 14: Project RiskQuality Management Conference Paper :  https://www.pmi.org/learning/library/quality-management-software-development-programs-1059Quality Management Conference Paper: https://www.pmi.org/learning/library/initiating-planning-stages-project-quality-management-10Quality Management Conference Paper: https://www.pmi.org/learning/library/project-quality-assessment-potential-failure-8936Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. What is knowledge at risk?
  2. What are the key challenges of knowledge management?
  3. What are the advantages and disadvantages of knowledge management systems?
  4. What is the impact of knowledge management in the modern world?
  5. Explain the concept of standard deviation and provide a calculated example – what is the difference between 3 Sigma and Six Sigma?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Managing Project Risks; 464 Pages 

ISBN: 978-1-119-48975-7 

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards 

Publisher: Wiley-Blackwell 

Publication Date: 2019

DS WK4 paper

 

Week 4 Research Paper: Big Data and the Internet of Things

The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business values while it can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data. For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

Your paper should meet these requirements:

  • Be approximately FIVE full pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Readings:

 

Reading Assignments

Dai, H.-N., Wang, H., Xu, G., Wan, J., & Imran, M. (2019). Big Data Analytics for Manufacturing Internet of Things: Opportunities, Challenges and Enabling Technologies.
https://arxiv.org/abs/1909.00413? ​There is a link to the PDF of this article in the right column of this record under Download.

Martinez, R. M. (2017). The Internet of Things: Privacy Issues in a Connected World Remarks Given at Protecting Virtual You: Individual and Informational Privacy in the Age of Big Data. University of St. Thomas Journal of Law and Public Policy (Minnesota), 11(1), 63–71.