The Research Paper on
Social Media Analytics for Business in technology, education or hospitality
The Research Paper on
Social Media Analytics for Business in technology, education or hospitality
Part 1: Research BIA and BCP (0/1 completed)
Note: In this part of the lab, you will review internet resources on BIA and BCP in order to form a basis for their purpose and usage. Understanding the reason behind a business continuity management policy is key to understanding the component policies and procedures. Please take the time to review the research thoroughly and think through the concepts of the policy itself.
Part 2: Create a BCP Policy (0/9 completed)
Note: Conducting a BIA entails describing any mission-critical business functions and processes. The next step is to identify all threats and vulnerabilities. Once you have both of these deliverables, you can compare the findings with the organization’s existing policies. What stands out are the areas in your policies needing improvement.
BIAs are a reoccurring analysis, sometimes done once a year. BIAs are revisited because as a business and/or the market changes, the assets and processes deemed critical change. Moreover, recovery times might grow or tighten.
Business Function or ProcessBusiness Impact FactorIT Systems/Apps Infrastructure ImpactsRTO/RPOInternal and external voice communications with customers in real-time Internal and external e-mail communications with customers via store and forward messaging Domain Name System (DNS) server for internal and external Internet Protocol (IP) communications Internet connectivity for e-mail and store-and-forward customer service Self-service web site for customer access to information and personal account information e-Commerce site for online customer purchases or scheduling 24x7x365 Payroll and human resources for employees Real-time customer service via web site, e-mail, or telephone requires customer relationship management (CRM) Network management and technical support Marketing and events Sales orders or customer/student registration Remote branch office sales order entry to headquarters Voice and e-mail communications to remote branches Accounting and finance support: Accounts payable, Accounts receivable, etc.
Note: To best understand the difference between RTO and RPO, ask yourself these two questions:
CriticalRTO: 8 hoursRPO: 0 hoursMajorRTO: 24 hoursRPO: 8 hoursMinorRTO: 1 weekRPO: 3 daysNoneRTO: 1 monthRPO: 7 days
Note: An important difference between RTO and RPO is the purpose behind each one. The RTO determines the business continuity management plan and how much money the business needs to resume operations. The RPO only affects the backup operations.
Policy Statement
Insert policy verbiage here.
Purpose/Objectives
Define the policy’s purpose and objectives. They should mirror the purpose/objectives of a business impact analysis (BIA).
Scope
Define this policy’s scope and whom it covers.
How to Gain Approval for Your Plan
The first step toward implementing your business continuity plan (BCP) lies in gaining executive management’s wholehearted support. You can’t wait to win this approval until after you’ve drawn up and presented your plan to management. You must make clear to management from the beginning the costs associated with any lasting disruptions to business and the pressing need for every business to have a BCP to protect itself.
To win executive management’s endorsement of your BCP, research the costs associated with business disruptions, the costs of implementing a business continuity plan, and the steps for continuity and recovery that are specific to your organization, and then use this data to strengthen the arguments for implementing your plan. Also, ask management what it is looking for. Understand the executives’ short- and long-term concerns and what concrete benefits they are looking for from a BCP. Find out as well how much they are willing and able to invest in such a plan. Remind them that while a BCP requires ongoing upgrades, which will also come with a price tag, to go without such a plan and its upgrades could result in even longer and far costlier business disruptions.
To win executive management support takes proper planning. Too many well-intentioned managers and consultants devote all their time to their plan’s presentation and not enough time consulting with management. Use information from your conversations with management to plan your approach, presentation materials, and time. Remember, you’ll likely get just one try at this.
Standards
Does this policy point to any hardware, software, or configuration standards? In this case, you need to reference the recovery time objectives (RTOs) and recovery point objectives (RPOs) as standards and metrics. List them here and explain the relationship of this policy to these standards.
Procedures
Explain how you intend to implement this policy across the entire organization.
Guidelines
Explain any roadblocks or implementation issues that you must address in this section and how you will overcome them per defined policy guidelines.
Challenge Exercise (0/1 completed)Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.
The C-level executives of the Bankwise Credit Union are confused about the differences between a business continuity policy and business continuity plan and how they work together. It is your job as CISO to create a document to explain these topics.
Use the internet to find further information on the differences between policies and plans in information security in general. Use this information to create a high-level explanation for C-level executives. Provide examples of real business continuity policies and how they could be useful in your organization.
The key to this paper is to demonstrate your understanding of the topics, not to re-word the text or reference material. Paper must be 100% original and not plagiarized.
Please complete the scenario below following these guidelines for your deliverable.
Scenario:
A) Create an introductory section where you clearly DEFINE RISK.
B) Research and Pick ONE organization that can you conduct a risk assessment on.
C) Identify the potential risks found in the organization and for it’s ability to function in it’s chosen business vertical (i.e. government, financial, commercial, industrial, shipping& logistics, etc.)
GUIDELINES:
Paper must be a minimum of 2 pages double spaced
Make sure you are using at least two (2) academic APA references.
This submission should be created following APA 6th edition guidelines.
The paper is to follow the APA style guide, Sixth Edition
Implement a dictionary using a Bag—Project 4.7 in the text (modified)
Use the bag ADT provided to create an array-based implementation for bags. Then use your bag to implement the dictionary ADT provided you. This means you have to implement your dictionary using the bag functions.
Test your bag and dictionary implementations with the bagtestmain.cpp file I’ve provided for you. If you are not able to fully implement all the functions of the dictionary and/or bag, you may modify the tests in bagtestmain.cpp to only exercise those functions you were able to complete.
You will only get credit for those methods you test and display, so be sure you don’t leave any out.
Also, you cannot add any public functions to your bag and dictionary implementations beyond those specified in the ADTs, though you may add private functions if you want.
Put the following files into a zip file named student_name_Bag_Assignment and submit them to Blackboard:
– ABag.h // Your bag-array implementation which must inherit the Bag class
– BDictionary.h // Your Dictionary-bag implementation which must inherit the // Dictionary class
– bagtestmain.cpp // The test driver I have provided for you
– bagADT.h // The bag ADT I gave you – it should be unchanged
– dictionaryADT.h // The dictionaryADT I gave you – it should be unchanged
– kvpair.h // The kvpair class I gave you – it should be unchanged
– Screen Shots // Word document with screen shot(s) and integrity statements showing
// all of your program’s output.
Approach.doc // This is a Word document where you explain how you implemented
// your solution and how you tested each required function.
– Any other .cpp and/or .h files that comprise your project (I need all the .cpp and .h files used in your project).
– Your_dictionary.exe //Your executable file.***
Note: If your ABag does not inherit Bag and/or BDictionary does not inherit Dictionary, you will not receive any credit for your work. If you use the templates I’ve provided (ABag.h and BDictionary.h) the inheritance is already done for you.
*** If you completed your assignment using Visual Studios you must use Visual Studios 2017 and I would like you to submit your entire VS project directory.
Your test program must exercise every function of the dictionary. For any function whose functionality is not obvious you must explain in your Word document how your test output demonstrates that function. See me if you have questions.
See Blackboard for the assignment due date and the syllabus for the late policy.
Rubrics (for the 70% content portion):
– Program must run in order to get any points. By “run” I mean that you must at least get one or more of the bag methods working (and your program must demonstrate that functionality).
Start by working on your “Approach” first. Once you are satisfied with your approach, then start building your program incrementally. Start with the bag and increment one feature at a time (you’ll have to stub out the features the ADT requires that you are not ready to implement yet) starting with the constructors and then working your way down the feature list using common sense to figure out which features need to be implemented first. Try your bag out with the various parameter combinations I want you to test with (
Don’t wait until the last minute. You’ll find that many of your problems you will solve while you are away from your computer and have a chance to think about the error you are seeing. This takes time.
Note: KVpair, which uses the == operator for comparing the key values, will only accept objects that have also implemented the == operator. This class has been tested with the following types:
§ string
§ int
It specifically does not work with the Int type (at least not in the version of C++ I am working with).
A big part of this assignment is debugging your code, so do not expect your instructor to do this for you. Having completed the pre-requisite courses for this class, you should already have some experience finding coding errors and fixing them. This class will give you plenty of opportunities to further refine those skills and you can only do that by wrestling with the problem. Here are some debugging tips:
· Build a little, test a little. Don’t write all your code before you start debugging it. Break your work into logical chunks that can be compiled and debugged and build them one at a time. For this project, I would start by building the Bag class and implementing the addItem() function first. Once I get that function working properly, then I would move on to another Bag function. The idea is you build and test a function one function at a time. That way, if you run into an error, you know where to look.
· Learn to use the debugger if you haven’t already. The debugger allows you to step through your code one step and a time and see what happens in memory while you’re doing it. When students come to me with problems, I first try to isolate where the problem is logically based on what the program is doing and then I use the debugger to find the actual fault. Here is an excellent video tutorial on the Visual Studios debugger: How to DEBUG C++ in VISUAL STUDIO.
· Be willing to walk away from your computer and give your mind a rest. I find that the solution to a problem often comes to me while I am doing something else. I have never regretted stepping away from my computer to let the problem “percolate” in my mind, but I have often regretted not doing this. This is one of the reasons you should never wait till the last minute to start working on your program; by doing that you are not giving yourself the time to walk away.
Mobile devices are being used more daily to include smartphones and tablet computers that have both cellular and Wi-Fi (Wireless Fidelity) connectivity. The wealth of information stored on these devices leads the investigator to look at them for clues or leads that would aid in the investigation.
An investigator has found some graphics involved in a case. There is a strong suspicion that the picture location can help put the subject at different locations in question.
The investigator needs to know as much about the graphics as can be discovered about what equipment was used, locations where they were taken, and dates and times of them. Using the files found in the attached file, complete an analysis of the graphics, and write a formal report outlining the findings of the analysis.
All input should be provided on command line. If all 3 coefficients are not provided, the program should display an error message indicating proper input format and exit with no additional prompts.
You must use the following subprograms for this assignment:void solve_linear(int, int);
void solve_quad(int, int, int);
void solve_real(int, int, int);
void solve_complex(int, int, int);You will be required to use separate compilation with proper header files included (I will not accept excessive inclusions).
We will discuss separate compilation AFTER you have a working program in a single file. You are allowed ONE SUBMISSION ONLY:
read paper and provide feedback/review in the format attached. Attaching sample reference.
Write a program in c++ that can read answers from an input file and then take correct answers already given and compare the two set of answers. They have to be graded on a scale of 1 to 100. The program has to show when an answer is incorrect.
Cryptography is used to protect confidential data in many areas. Chose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext, chosen-ciphertext attack, timing attack, rubber hose attack, adaptive attack).
Write a 5 to 7 page paper (not including title and reference pages) in which you examine a code of ethics for a professional organization, business, or government agency, and write a critique of it. In your paper, determine the entity’s priorities and whose interests the code serves.