Discussion

https://www.wired.com/story/cambridge-analytica-facebook-privacy-awakening/

Read the article in above link,  discuss whether you think the premise of the  article is correct and that people are more aware of privacy concerns.   

Use at least three sources from https://libguides.nec.edu/az.php .   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace. 

1 Case Study

Case Study 3.1

Read “Can We Trust Big Data?” (see attached file)
Answer the questions

Please use this strategy when you analyze a case:

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)

Writing Requirements

  • 3–5 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Discussion 3.1

If the following data were stored as rasters, which ones would be discrete and which would be continuous: rainfall, soil type, voting districts, temperature, slope, and vegetation type?

Discussion 3.2

List the main advantages of using topology-based data sets in GIS.

Discussion 15

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 19-20  (Jamsa, 2013).

Chapter 19 topics:

  • Define scalability.
  • List five to ten potential relationships that align with the Pareto principle, such as how 80 percent of sales come from 20 percent of customers.
  • Compare and contrast vertical and horizontal scaling.
  • Explain the importance of the database read/write ratio.
  • Assume a site guarantees 99.99 percent uptime. How many minutes per year can the site be down?

Chapter 20 topics:

  • List and describe five ways you think the cloud will change the future of TV.
  • List and describe five potential uses for intelligent fabric.
  • List and describe five ways the cloud will influence the mobile application market, or vice versa.
  • Discuss the importance of HTML 5.
  • Discuss how the cloud will impact future operating systems.
  • List and describe three potential location-aware applications.
  • List and describe five ways intelligent devices may work together.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Dissertation

 Use the Chapter 3 document provided and develop an outline for your Chapter 3. Write the 1st paragraph for this document where you state your objectives and the research questions that will be addressed with the Research Design in Chapter 3 

Discussion Post-good regulatory compliance

 

Describe in 500 words what a dba must be aware of to maintain good regulatory compliance when moving to the cloud.

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

APA references with citiaitons

Phases of an attack (cyber security)

 

If you will remember from Week 8 you have a new CEO. They are non-technical and came to your organization from a completely different market segment. This week you’ve been charged with helping them understand computer attacks. Your text lists four general phases of attacks. Explain these four phases to the CEO, including items in each phase the attacker would consider when performing that phase. Where appropriate include how social engineering can be used. Last, list what security controls can reduce the likelihood of success of each phase of the attack.

4 Phases of an attack :

Reconnaisance and Probing

Gaining Access

Maintaining Access 

Covering Your Tracks.

cloud computing

DDL  11/12

the first is 1-2 pages with pics

the second is 4-6 pages with pics

references more than 15

 Content: Proposed a [new] idea about cloud computing field, and designed experiments for verification