NY State Health Data – Solving a healthcare challenge

  

Q3 

Review the data from the State of New York open-source data portal https://healthdata.ny.gov/

1. Select two data sets from the NY state open data portal that would help you address the problem area of high costs and waste in the US healthcare system. Describe how they could help you address the problem area of interest.

2. Review your data sources and identify:

a) What medical terminology systems are used in the data? ( SNOMED, CPT, etc)

b)  (i)  If you do not find any standardized codes, find at least two concepts in the data that could have been captured using standard codes.

b) (ii) If you do not find any standardized codes, choose two other data sets from the NY open-data portal that use the appropriate codes. Provide a snapshot of the clippings of the data sets

c) In 3-4 sentences, explain how these standardized codes might help your analyses.

d) Describe how it might be challenging to integrate the data for analysts. 

e) Review the data sets you have chosen, and look at the data and the meta-data to think about what fields are available for linkages. Provide about 2-3 sentences to address each of the questions below

1. How you would work with an analytics team to link data from the various data sources?

2. Why?

3. What fields could be used to link the data sources?

4. What kind of linkage methods might you try?

5. Would these fields be sufficient to obtain high-quality matches? Why or why not? How would you know?

6. What privacy or legal concerns during the linkage effort?

7. Anything else about the data you notice?

IT470 week 1

After reading the assigned chapter please answer the following questions. Make sure you ask a question and answer another student question as well.

1) How is personal information safeguarded? Provides some standard procedures mainly used by businesses to safegaurd their data. 2) What are the vulnerabilities? Provides some examples. 3) What do we mean by secured system? Name some of the best practices for securing your personal computer.

Please, with 300 words plus, elaborate on each of these attacks and provide genuine examples and with supporting facts. 

To Ensure Getting a Full-Grade, check the Rubric as I will be using it to grade you!!!

Anything copied from the internet or copied from another student will result in ZERO grade for both students. I will be checking all work against plagiarism.

C# string class methods

 Provide a detailed explanation of two of the C# string class methods, operators, or properties and include at least one simple example of how the method or property might be used. You cannot use the length property or concatenation as your example. 

350 words

Summative Assessment:Cyberspace Presentation

You have joined a new company as Trainee Cybersecurity Analyst. After your first 2 weeks of intense training, you are expected to ensure the security of the internal systems and critical internal data protection. Your reporting manager has asked you to research a cyberspace model, compare it to the OSI model, and prepare a presentation.

Create a 6- to 8-slide presentation with speaker notes and visuals.

  • Research a cyberspace model to compare to the OSI model.
  • Define each layer and provide a brief description of each.
  • Compare your chosen model with the OSI model.
  • Discuss the similarities and differences, such as how the layers overlap, and so on

Format any references according to APA guidelines.

Hacking on Social Media Platforms

Assignment Content

  1. Please fill out this form (also available in this week’s folder) to compare and contrast your three research articles (do not include your news article). 
  2. Compare and contrast articles – Form to fill out

     2. Please write part 2 of your literature review. You will be essentially cutting and pasting your three objective summaries under Level II headings (see p 13 in your manuals)
    Put them in an order that makes sense given how you compared and contrasted them.
    Use your transition compare and contrast words (similiar to…etc) !!! (this is also available in this week’s folder)
    compare and contrast words

    Submit BOTH assignments here.

Literature second part 

  1. Put it all together in 1, 2, 3 order! Write your Literature review!

    Use the checklist to be sure you have everything by checking off each item and fixing your draft as you go.

    Submit the marked-up checklist and your literature review here, with a title and references page.

  1. References
  2. Du, H.S., Chu, S.K.W., Chan, R.C.H. and He, W. (2016), “Collaborative writing with wikis: an empirical investigation”, Online Information Review, 40(3), 380- 399. https://doi.org/10.1108/OIR-06-2015-0173
  3. Ecklebe, S. and Löffler, N. (2021), “A question of quality: perceptions of internal communication during the Covid-19 pandemic in Germany”, Journal of Communication Management, 25(3), 214-232. https://doi.org/10.1108/JCOM-09-2020-0101
  4. Malik, A., Dhir, A., Kaur, P., &Johri, A. (2020). Correlates of social media fatigue and academicperformance decrement: a large cross-sectional study. Information Technology & People.https://doi.org/10.1108/JCOM-01-2019-0002

Cybersecurity

                                        

Case Study Part 2 – Final Submission

Paper Two(2) Final Submission
In the second paper you will apply the learning in this class to write recommendations for the organization and how your proposed solutions will reduce business risks and financial damage. However, this paper had been done by Kim Wood and the Order_154064_4279801.Edited(1). 

I want two PAGES TO BE ADDED TO THE RECOMMENDATIONS OF THIS PAPER FOR THE ORGANIZATION AND HOW YOUR PROPOSED SOLUTIONS WILL REDUCE BUSINESS RISKS AND FINANCIAL DAMAGE.

MEANWHILE THE EARLIER WORK IS EMBEDDED IN THE UPLOAD FILE.

NO PLAGIARISM.

Computer forensics

  

Option 1: Preparing for a Forensic Investigation

Scenario

You are an employee at D&B Investigations, a firm that contracts with individuals, companies, and government agencies to conduct computer forensics investigations. D&B employees are expected to observe the following tenets, which the company views as the foundation for its success:

· Give concerted attention to clients’ needs and concerns.

· Follow proper procedures and stay informed about legal issues.

· Maintain the necessary skill set to apply effective investigative techniques using the latest technologies.

Your manager has just scheduled a meeting with an important prospective client, and she has asked you to be part of the team that is preparing for the meeting. The prospective client is Brendan Oliver, a well-known celebrity. Last night, Mr. Oliver’s public relations team discovered that someone obtained three photos that were shot on his smartphone, and tried to sell the photos to the media. Due to the sensitive nature of the photos, Mr. Oliver and his team have not yet contacted law enforcement. They would like to know if D&B can provide any guidance or support related to the investigation—or, at the very least, if D&B can help them prevent similar incidents from occurring in the future. At this time, they do not know how the photos were acquired. The public relations team is wondering if a friend, family member, or employee could have gained direct access to Mr. Oliver’s phone and obtained the photos that way, although the phone is usually locked with a passcode when Mr. Oliver is not using it. In addition, Mr. Oliver e-mailed the photos to one other person several months ago; he has not spoken with that person in the last few weeks, but he does not believe that person would have shared the photos with anyone else.

Your manager plans to use this initial meeting with Mr. Oliver and his public relations team to establish rapport, learn more about the case, and demonstrate the firm’s expertise. The company sees this as an opportunity to build future business, regardless of whether they are retained to help with the investigation of this case.

Tasks

To help the team prepare for the meeting, your manager asks you (and your colleagues) to consider and record your responses the following questions:

· What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation?

· Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law enforcement need additional information in order to determine if they should proceed with an investigation? Why or why not?

· What would you share with the client about how investigators prepare for and conduct a computer forensics investigation? Identify three to five key points that are most relevant to this case.

· What sources of evidence would investigators likely examine in this case? Provide concrete examples and explain your rationale.

· What should the client, investigators, and others do—or not do—to ensure that evidence could be used in a court of law? Using layman’s terms, explain laws and legal concepts that should be taken into account during the collection, analysis, and presentation of evidence.

· What questions and concerns do you think the client will have?

· What questions should the team ask the client to learn more about the case and determine the next steps?

Must be 3 pages

12 page font

double space 

Use inheritance and polymorphism. Use exception handling. Use input validation. Pass the input and output files as commandline arguments.

 

Due on the final day by the end of the day. No late submission will be accepted even if it is due to technical problems. )

What to use in your completed code

Get input from file.
Ask user at least a single question and read at least one answer.
Use at least a single method from Math class.
Use at least one overloaded constructor.
Use at least one if-else-if, while, for, and enhanced for loops.
Use methods to pass and return identifiers and objects.
Pass arrays to/from methods.
Use at least a method to sort the array in the project.
Use inheritance and polymorphism.
Use exception handling.
Use input validation.
Pass the input and output files as commandline arguments.