discussion-4

 how virtualization may create it’s own security vulnerabilities . 

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

3-1 Project One

Directions

You decide to research several organizations and focus on one to start. Select one organization from the Business Organizations document in the Supporting Materials section below. You will compare and contrast Currier Grocery (the organization you currently work for) and the one organization you select. To guide your research and personal job notes, address the following in the template provided:

  • An organization’s form is the overarching characteristics that define the type of organization, including how and why the organization formed; the organization’s location(s), size, and type of ownership; whether the organization is nonprofit or for-profit; the goods and services the organization offers; how long the organization has been in business; and the organization’s mission, vision, and core values. Compare and contrast the characteristics of each organization’s form. Specifically, be sure to identify the characteristics of each organization’s form and take note of the similarities and differences between each.
  • Organizations are typically organized or structured into groups of functional areas. These functional areas develop groups of staff, or departments, to ensure the smooth flow of information and operations within the organization structure. Describe the role of key functional areas within each organization. Consider the following:
    • What key functional areas exist within each organization?
    • What role does each function play within the organization?
    • How might a data professional support the organization’s functions?
  • Discuss the relationship between each organization’s form and its functions within the organization. Specifically, address the following:
    • How might the purpose of each functional area vary based on the form of the organization?
    • What functional areas might a data analyst work closely or consult with?

 Review the business organizations in Supporting Materials and select one. You will compare and contrast your current employer, Currier Grocery, to the organization you selected. Prepare and organize your notes into 2 to 3 pages. All references must be cited in APA format. 

Data Science Case Analysis

Final Case Analysis:

There are several CSV files attached , start with the word document to understand the nature of the data and broad expectations for the final case analysis. You are expected to explore and perform exploratory data analysis and the final analysis.

Data Details: You are given six years of lending data (2012 – 2017) in csv format. The data files are relatively larger than what you have used during this course so far. The size of each file is different and depends upon the number of loans the company issued in a year. It can be noted that the file size are relatively larger 2015 onward, which is when the company went public and started lending more loans. Each file has 31 columns (variables) and the description of each column is provided in the DataDictionary.xls file. 

In addition to that, you are also given the states characteristics in a file called states.csv. This file contains demographic information like population size, median income, unemployment rate etc. 

Lastly, you are given a regions file called states_regions.csv that contains larger regions and divisions that each state falls in. For example, New Hampshire is in the Northeast region and New England division. 

There are three sections to this case: Merging and cleaning (15 points), Data Analysis (60 points), Visualization (25 points) totaling 100 points. 

Merging and Cleaning 

Stack all six Lending Club files together on top of each other. Now join the states.csv file with the stacked file using state name as the primary key. Finally, merge the state_regions file with the combined file so that you have one large file containing lending club and states geographic and demographic information. 

Analysis 

Use the above file to analyze and answer the following questions:

1) Find the distribution of number of loans by state, regions and divisions. Describe in your own words the geographic differences in the number of loans. Also, analyze your results by comparing number of loans per capita. Did you notice any missing states in the Lending Club data? If yes, then find out why. 

2) Compare the average amount of loans granted by all states and divisions. Which states and divisions have the highest and lowest average loan amounts?

3) Compare the average interest rate charged and average loan amount by the loan Grade. Do you notice any patterns? 

4) Run a frequency distribution of number of loans, average loan amount and average interest rate for each state by year (2012 through 2017). Describe the changing patterns in those numbers. 

5) Is there a relationship with the population size of a state and the average loan amount given? Is there a relationship between Grade of loans and median income level in a state?

6) This is an open-ended question where you are asked to share an interesting fact that you found through data analysis. 1) 

Visualization

1) Create a plot of interest rates and Grade or a loan and describe the pattern. 

2) Create a map of US states and color code the map with the average amount of loans given. 

3) Show visually the relationship between the annual income of the recipient and the loan amount obtained from Lending Club

4) Create a plot that shows the relationship between the length of employment and amount of loan obtained. 

5) Create a “regional” map and show an interesting relationship of your liking. 

security and data loss prevention

  1. Discuss the challenges of private security in terms of licensing, regulating, hiring, and training. 
  2. Identify and discuss the four basic steps in a risk management program.  What is risk analysis or risk assessment? Provide examples in your discussion. 
  3. Name and explain three issues that corporations may be held civilly liable for regarding security matters. 
  4. Identify and discuss some of the changes in security brought about as a result of the 9/11 terrorist attacks against the United States. 
  5. Describe how cruise ships have responded to security-related issues since 9/11. 
  • Turn in the Paper to SMARTHINKING.com before submitting your final paper.
  • Turn in a final paper and the paper with the SMARTHINKING.com tutor comments.
  • Complete the project in APA format
  • Paper should include at least 3 references
  • Paper should be a minimum of 4 pages in length

CASE STUDY (CASE TO ANALYZE) (PLAGARISM)

  

Professor: Joseph O. Esin, FSMA, FWCCRD.

What is a Case Study?

· The purpose of a case study is to walk the reader through a situation where a problem is presented, background information provided and a description of the solution given, along with how it was derived.

· A case study can be written to encourage the reader to come up with his or her own solution or to review the solution that was already implemented.

· The goal of the writer is to give the reader experiences similar to those the writer had as he or she researched the situation presented.

· How to Write a Case Study

· Several steps must be taken before actually writing anything:

· Describe Situation/Problem: Choose the situation on which to write

· Background: Gather as much information as possible about the situation

· Background: Analyze all of the elements surrounding the situation

· Describe the Solution: Determine the final solution implemented

· Analyze the Results of the Solution: Gather information about why the solution worked or did not work

· For maximum points, a thorough case analysis thus has several phases; define the problem; list assumptions made; explore alternative solutions including consideration of costs and benefits; develop three alternative action plans; choose one of the plans to implement that can best resolve the issue most appropriately; and design accountability structures and processes to assess the outcomes and ensure the resolution is effective and sustained. 

           Source: http://education.cu-portland.edu/blog/curriculum-instruction/how-to-write-a-case-study-the-basics/

Citation Style

APA style with a cover page is required see https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html

File Formats (Creativity Counts)

A standard research paper format may be used for this; however, for max points, use the latest technological presentation tools or video to present your ideas (PowerPoint, Prezi, iMovie, Adobe Portfolio, Google Drive – Presentation, YouTube, etc.). You are not limited to this list of tools; however, study your desired tool carefully. Make sure that the resulting file is both creative and designed for presentation to a professional audience.

Filename Format:

Case_Study1_YourFirstName_YourLastName (pptx/docx/…extensions vary by chosen tool) see File Formats section below.

Submission

Upload the resulting file via the Browse My Computer button for this Assignment.

Case to Analyze

Week 4: Lab. Assignment.

Dwayne and Debbie Tamai Family of Emeryville, Ontario.

Mr. Dwayne Tamai and Mrs. Debbie Tamai case of electronic harassment involved 15-year-old son, Billy, who took control of all of the electronic devices in the family’s home, including the phone, and manipulated them to the distress of other family members for his own amusement. The incidents began in December 1996, when friends of the family complained that phone calls to the Tamai home were repeatedly being waylaid, cut off missed messages, strange clicking and appears like a minor with a disembodied voice, unnervingly distorted by computer, who interrupted calls to make himself known.

After burping repeatedly, the caller frightened Mr. and Mrs. Tamai, and stated that I know who you are, and I stole your voice mail. Mocking, sometimes menacing, the high-tech stalker became a constant presence, eavesdropping on family conversations, switching TV channels, and shutting off the electricity.

The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect. Mr. Dwayne and Mrs. Debbie Tamai asserted that their son, Billy, had admitted engaging in the mysterious calls. The interruptions included burps, blathering and claims having control over the inner workings of the Tamai’s custom-built home, and the power to turn individual appliances on and off via remote control.

It started off as a witticism with friends and got out of control to an extent that he didn’t know how to end the entire operation, become afraid to come forward and tell the parents for the fear of us disowning him.

On Saturday, Mr., and Mrs. Tamai get organized and planned to take their son to the police department to defend him against persistent rumors on him. Instead, Mr., and Mrs. Tamai’s son confessed and labelled an intruder code-named, Sommy. Mr., and Mrs. Tamai eliminated all external sources and had confidence in interior sources. After 2-days, a team of investigators, intelligence and security experts loaded with high-tech equipment failed to locate Sommy. The next day, the team brought in two television networks to assist in the process.

In conclusion, the son, Billy not (Sommy) contacted the victims; (his biological parents), launched verbal threats in combination with the electronic harassment, in an effort to demonstrate his power and authority over them. The best option was, Mr., and Mrs. Tamai victims were not physically harmed, but terrified and greatly inconvenienced by the fact that the unknown force appeared to have control over a great many aspects of their lives, and the unknown force turned out to be their biological son, Billy.

Scenario: 1
Criminal motive is connected to emotional, psychological, and material need are often impel by means of behavior and independent of technology operation. These criminal tendencies are believed to champion the restoration of the criminal’s self-confidence, and self-worth which lead criminals to the path of temporary gratification, inadequacy, and incompetence.

Question 1

1:1 Provide a comprehensive narrative of Billy’s competency and creating emotional distress on his parents.

1:2 Identify the role of Sommy in this operation

Scenario 2

The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect.

2:1 What level of criminal behavior was exhibited by Billy in this operation?

2:2 The entire operation is classified as a serious domestic problem, why didn’t the police officer file charges against the suspect?

Scenario 3

3:1 Modern approach use computer and internet technologies identify offender modus operandi, criminal intent, and motive. 

3:2 Describe the impact of computer and internet technologies of Billy MO and criminal motive in this situation.

Casey, Eoghan (2011). Digital Evidence and Computer Crime. Elsevier

         Science. Kindle Edition; San Diego: CA

Academic Integrity/Plagiarism

At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:

· Cheating – using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities.

· Lying – falsifying, fabricating, or forging information in either written, spoken, or video presentations.

· Plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation

Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.

Task

1. Use Case Study format to analyze the case. Read carefully, the For maximum points section. Look at cases from the text of this class for inspiration.

2. Be sure to address all of the case study elements described herein.

3. Be sure to state your full name, Teacher Name, Course, and semester on the cover/intro pages/slides.

4. Show your creativity. How would you solve this particular case?

Project

 

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. 

This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives. In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction – What is an ERM?
  • Why Should an Organization Implement an ERM Application?
  • What are some Key Challenges and Solutions to Implementing an ERM?
  • What is Important for an Effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework/application.
  • Conclusion – Final thoughts/future research/recommendation

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least FIVE scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Impact of Emerging Technology

 

Technology is constantly evolving. Even if the slide deck had been made the day this assignment was due, something new would have come out in the meanwhile. Make a prediction about how a specific “new” technology will impact your work, personal life, or the future of the aerospace industry as a whole.

  • Identify a new technology you think will have a significant impact and describe it in general terms, citing at least one credible specific source.
  • Predict a significant impact this technology will have on your work, your personal life, or on the future of the aerospace industry as a whole.
  • Identify a potential obstacle in the adoption of this technology within the next five years (cite at least one credible specific source).

This assignment uses TurnItIn to check for originality (to ensure it is not plagiarized). As this is partially an assessment of your ability to apply MS Word skills, the document must be submitted in .docx format.

DQ

https://cointelegraph.com/bitcoin-for-beginners/what-is-bitcoin-wallets

After watching the video & reading the article provided in the content area.

  • Go ahead and set up a Bitcoin wallet. 
  • Describe and explain the process, you can also talk about any difficulties you have encountered.