HUman Computer Interaction and Usability Discussion

 what does interaction design mean to you? 

After reading Chapters 1 and 2 of the Preece text, You are required to write a statement that is  LIMITED to 150 words . This is an opinion question; therefore, research is not required. Should you cite the work of others, please provide the source of your opinion in APA format.

Discussion

Sub: Operational Excellence 

Resistance to change is a normal everyday aspect in the workplace.  Note what happens to the organizational climate when this resistance occurs and any tactics to reduce negative connotations when dealing with change. 

APA 7 format 

Discussion Assignments

1.Write at least 500 words discussing how you would test your hypothesis for the likelihood of mask-wearing in the US in the next year. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.

2.Write at least 500 words discussing how to use text mining to analyze how politicians use language to influence voters. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.

research paper

Write a scholarly research report on a topic related to Cyber Security based on one of the

following topics:

Step 1: Select ONE Topic:

The Research Report, select one of the following research areas:

i) Biometrics

ii) Organizational Management during times of crisis.

iii) Failures of Knowledge Management Systems.

iv) Successes of Knowledge Management Systems.

v) Social networking in the 21th Century.

vi) Web sports

vii) Search Engine Optimization

viii) Robotics

with 10 pages without including reference page

Cybersecurity policy

How can the National Institute of Standards and Technology (NIST) help your company create a “best practices” cybersecurity policy? Your discussion should touch upon both the positive and the negative aspects of a well-structured policy. 

Discussion 300 words

 

Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Select one of these compromises and explain how it could be avoided.

Please answer the following

The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

2 pages and no plagiarism

Cloud computing

 Using a Word Document, write a Report of no more than 2 pages that summarizes the main concepts discussed in the paper.