Visualization and Analyzing

 

Instructor”s question and case for class discussion:

“Why do we need to understand data visualisations? There is more and more data around us, and data are increasingly used in decision-making, journalism, and to make sense of the world. One of the main ways that people get access to data is through visualisations, but lots of people feel like they don’t have the skills and knowledge to make sense of visualisations. This can mean that some people feel left out of conversations about data.”http://seeingdata.org/developing-visualisation-literacy/

Choose three of your favorite visualizations. Post a 3 – 5 sentence summary (for each) of why you chose the visualizations. What catches your attention? Are these visuals effective in presenting the provided data? If possible, explain what you would do to improve the visualization(s).

Also Reply to your classmates:

When replying to a classmate, offer your opinion on what he/she posted and the visualizations they chose. Using at least 3 – 5 sentences, explain if you agree or disagree with his/her evaluation of the visualizations.

project management and computer forensic

Project risks can/cannot be eliminated if the project is carefully planned. Explain.

What are the major differences between managing negative risks versus positive risks (opportunities)?

Why is slack important to the project manager? What is the difference between free slack and total slack?

Review the document on Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations at https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ssmanual2009.pdf. Prepare a one-paragraph summary of three challenges you may encounter when executing a search and seizure of digital evidence.

What is a first responders’ toolkit? Describe the procedures for creating a first responder toolkit.

Identify best practices in digital forensic investigations: Perform a web search for best practices in digital forensic investigations. Prepare a list of the top 5 best practices, based on your research. Include links to any resources that you use.

What is an investigative report? Why are the reports important? Who is responsible for the report?

The Role of Privacy in the Workplace

 

The Role of Privacy in the Workplace

Conduct research via the internet and provide a brief yet detailed paper on Privacy in the Workplace. You may select a position as to whether you believe there should be Privacy in the Workplace, or that employees do not have the right to privacy at work. Things to take into consideration are outlined below:

 ·  What are the laws and regulations that impact privacy in the workplace?

 ·  Why would an employer want to monitor the activities of its employees?

 ·  What benefits / drawbacks are associated with monitoring employees?

 ·  What could an organization use to ensure that all employees are well aware of their rights and responsibilities with regard to privacy?

 ·  What type of monitoring systems are used in the workplace today?

For this assignment, submit a 5-6-page paper answering these questions as succinctly and completely as possible. 

Paper should conform to APA style. 

The page total does NOT include the title page or the reference page(s). 

Do not include an abstract of table of contents.

You should have a minimum of 4 references, none of which can be Wikipedia or Techopedia.

Your paper should be more of a narrative, and not just a series of bullet lists

200-250 words

 

As noted by Kirk (2016), angle, framing, and focus are useful perspectives that help to shape your editorial thinking. Select 1 of these perspectives and mention why you selected it.

Please make sure you have an initial post (about 200 words) and a comment/post to one of your friends’ posts. 

WK1 Discussion

Refer to the company you researched in the “Wk 1 Discussion – Security Policies” and review the data classification schemes in use within that company’s industry.

In 175 words or more discuss the following:

How difficult was the classification scheme to locate? Why might that be?

What are the classification levels in place? How do they vary depending on the different industries?

Are the types of data classified the same in each industry? Should they be the same in each type of organization?

700words: Leadership

1. Discuss what performance management is and how it influences effective teams.

2. Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…).  Please note at least five organizational activities and be specific when responding.

3. Note at least two organizational capabilities and compare and contrast each.

7 questions

  

1) Read this Time article and view the video(https://time.com/5168202/russia-troll-internet-research-agency/) explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  

Use at least three sources. Use the Research Databases available from the Danforth Library(https://libguides.nec.edu/az.php), not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

2) Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

3) The purpose of this assignment is to pick a topic for your research project. The topic should be of graduate level not a survey. Investigate an important question. 

Your Research Project will be a presentation on some aspect of the surveillance state.  Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth LIbrary research databases 

Use at least five sources.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Short excerpt on the Surveillance State :

https://learn-us-east-1-prod-fleet01-xythos.s3.amazonaws.com/5b75a0e7334a9/1237028?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Zuboff.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20201104T030000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAZH6WM4PL5SJBSTP6%2F20201104%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=0db0e33d87614262defdca855ff1b3498572ba11c6697ca535dd48f0500209d3

4) Discuss in 500 words your opinion on what lessons should be learned from the 737 Max 8 crashes. 

Use at least three sources. Use the Research Databases available from the Danforth Library(https://libguides.nec.edu/az.php), not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

5) Your Research Project on the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the Danforth Library Research Databases.( https://www.nec.edu/students-faculty-staff/library-danforth/research-help/databases-help/)

6) Do a bit of research on penetration testing techniques. Investigate and document the following

· Five network penetration testing techniques

· Advantages and disadvantages of each

· One notable social engineering test

· Possible negative implications of penetration tesing

Please write between 300 words

7) Prepare a final project on a web application security topic. The primary deliverables for the project will be a paper and and also a presentation “Topic : White Hat Hacking”, Include a short paragraph describing your project and how you intend to research it. 

· Week 11. Submit final project.

· Week 12. Submit a brief abstract describing your final project.

Week 13. Submit final project materials.

o 500-700 word, double spaced, written in APA format, showing sources and a bibliography

IA Week 15

Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems  in 750 words.  Recommend 4-5 pages, including a cover page and reference page, at least three references and in APA format.