Discussion 2

For your initial post, consider the following scenario.

After internal security issues nearly ruined the business, an organization is looking to hire a new chief information officer (CIO) to institute a new governance design. In addition, the new CIO will need to decide whether to use an acceleration or containment strategy to address user computing.

For this interactive assignment, you will take on the role of a perspective candidate for the CIO position and propose to the executives of the organization a governance design that you would implement. In a separate document, create a diagram that depicts your governance design and attach it to the initial post. Within the initial post, explain the role of information systems governance in business and why the CIO role has become so important. Explain the strategy you would use as the CIO to support user computing (i.e., acceleration or containment) and provide a rationale for why you selected one over the other. In addition, explain the governance design you created and would implement as the CIO of the organization. Provide at least three implementation examples to support your design selection and user computing rationale

Your initial post should be a minimum of 300 words.

How Blockchain Technology Can Benefit Marketing: Six Pending Areas Research Areas

 

Read the attached PDF article entitled, “How Blockchain Technology Can Benefit Marketing: Six Pending Areas Research Areas”.

The six pending research areas mentioned in the article are:

1) Fosters disintermediation

2) Aids in combatting click fraud,

3) Reinforces trust and transparency,

4) Enables enhanced privacy protection,

4) empowers security, and

6) Enables creative loyalty programs.

After reading the article in full, select on of the mentioned six areas of research and write an article reflection minimum 8-9 maximum page paper identifying the following;

1) Describe and provide the overall research area mentioned in the article in a synopsis

2) What did the article state in how Blockchain can benefit that marketing area overall?

3) What further research did the article recommend?

4) What do you think can be the approach to further research the topic? What approach would you recommend to take and what type of research method would make sense?

5) What is an example of a company that you believe would benefit from this type of research and why?

6) Outside of Blockchain, what other piece of marketing technology can help this area?

7) What do you recommend is the best way to approach for a company to implement this area of research into their company?

Paper must be 12Pt. Font, Times New Roman, Double Spaced, with title page and reference page. Minimum of 3 references, to include the article required. The title page and references page do NOT count towards the minimum.

Week 8 Assignment

 

Complete the following assignment in one MS word document:

Chapter 14–discussion question #1, #3, #4 & exercise 2

APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

  

Discussion Question:

1. Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view. 

3. What are some of the major privacy concerns in employing intelligent systems on mobile data?

4. Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.

Excercise:

2. Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork.

digital forensics

The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

Explain, define, or analyze the topic in detail

Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)

Computer science

1.Define Entity, Entity type, and Entity set.
2.Define a Weak Entity set.
3.Explain the terms ‘Attribute’ and ‘Relations’
4.What are VDL and SDL?
5.Define Cursor and its types.

HW

 

Week 3 Discussion

Contains unread posts Available on Wednesday, November 4, 2020 12:00 AM EST Locked after Tuesday, November 10, 2020 11:59 PM EST.WEEK 3 DISCUSSION
UMGC > CMST 100B > WORD PROCESSING

WEEK 3 DISCUSSION
WELCOME to the discussion for WEEK 3. Please respond in complete sentences for each question, unless directed to do otherwise, demonstrating in your reply that you have read the material in order to receive full credit. Please note that participating in this discussion counts toward your class participation grade.

DISCUSSION
This week, we will discuss Week 3’s reading assignments. Our discussion will focus on how we manage tables, lists, and references in MS Word.  When you need to present facts and figures in a document, using columns or tables is often more efficient than describing the data in a paragraph, particularly when the data consists of numeric values. Microsoft Word has a simple built-in reference function at the References tab. Here you can manually enter references and refer to them in the text and create a bibliography.

Assignment 1: Network Infrastructure Design Diagram

 

Background: Kamehameha Institute is an organization that provides educational offerings to non-traditional students. The organization has tailored its unique educational offerings into the groups shown in Table 1 below:

Table 1. Kamehameha Educational Offerings.

GroupOfferingKamehameha BrandedFocused on the general public/provides services directly to its studentsCo-BrandedProvides the same services as Kamehameha Branded but resold by a third party and labeled as “…. Kamehameha Strong”White Label BrandedWhile the service offering is the same, these services are labeled solely with the third parties’ information

The State of Hawai’i regulates the educational sector, driving the need to ensure Kamehameha follows the State’s strict security and regulatory requirements. Kamehameha’s leadership is also very concerned with the threat posed by the online theft of their unique intellectual property. Additionally, the number of Hawai’ian entities breached by threat actors is on the rise. Thus, security, privacy, and compliance are all important considerations for the Kamehameha network architecture.

Your boss, the Kamehameha Institute’s Chief Operating Officer (COO) has tasked you to design a network infrastructure for three facilities located in the Hawaiian Islands of Honolulu, Hilo, and Lihue. The COO stipulated that you must separate the three group offerings in Table 1 and provide for strengthened defenses to protect Kamehameha’s cultural heritage. After meeting with the COO, the two of you drafted the following set of requirements for your network design:

· Each of the facilities has three floors:

· The first and second floor of each building requires 150 network connections each

· The third floor of each building houses a data center and requires 75 network connections

· The Honolulu location requires additional network connections for failover purposes

· The Hilo location will be the primary data center and house redundant database servers

· The Lihue location will serve as a failover data center and house the primary web servers (including the primary application and primary database servers)

· A constant connection between the three locations, carrying at least 75 Mbps of data

· All servers at all locations must have redundancy

· Protection from intrusions is required and should be documented

· A plan to verify security and failover measures is required

· Submission: Using the free tool, daw.io available at https://draw.io (no sign-in or registration required), create a network diagram (drawing) specific to the organization that encompasses the three facilities and also depicts ant necessary interconnections. Figure 1 shows the draw.io ‘new network diagram’ dialog window:

Figure 1. Draw.io New File Dialog Showing the Network Diagramming Templates

Your diagram should include enough detail to show the topology interconnections. The viewer should be able to understand the Kamehameha Institute’s network environment and be able to implement the architecture you develop. Ensure that you properly cite any external sources.

One of the keys to producing a viable network diagram is labeling the objects consistently and descriptively. Think about what you would want to know about a network device if you logged into it with little prior information. Consider location, floor number, or other pertinent information. At a minimum, include the following elements:

· IMPORTANT: Your network diagram must include an identifying label (e.g., callout box) that includes your class and section, assignment title, your name, and the date. Edit the items in italicsYour assignment will not be accepted if this element is missing:

Table 2. Example Network Diagram Callout Box.

CMIT 350 6980 Project #1 Network Diagram Student Name: Name Date: 6/22/2010

· Any necessary hardware

· Site-to-Site (WAN) connections (e.g., leased line connectivity, satellite, etc.)

· Annotate the following values for each of the Sites:

· Network ID

· Useable Range

· Subnet Mask

· CIDR Value

· Broadcast Address

· All devices require hostnames complying with the following naming conventions:

· Routers: Rx; where x is the site number incremented by a value of 1 for each router

· Switches: Sx; where x is the site number incremented by a value of 1 for each switch

· Servers: SRVx where x is the server number incremented by a value of 1 for each server

· For each site router, implement a private ip addressing scheme using a range suitable for corporate infrastructure and include the following:

· management vlan

· production vlan

High availability

When finished, export the diagram as a PDF document (Note: You will need to use this diagram again in Project 3, so ensure you save the xml source file!) and submit it to the Assignment folder. Figure 2 demonstrates how to export your draw.io diagram as a PDF document:

Figure 2. Draw.io ‘Export’ as Function to PDF

How Will My Work Be Evaluated?

1.1.3: Present ideas in a clear, logical order appropriate to the task.

2.2.2: Evaluate sources of information on a topic for relevance and credibility.

10.1.1: Identify the problem to be solved.

10.1.2: Gather project requirements to meet stakeholder needs.

10.1.3: Define the specifications of the required technologies.

13.1.1: Create documentation appropriate to the stakeholder.

13.2.1: Evaluate vendor recommendations in the context of organization requirements.

ARTIFICAIL INTELLIGENCE

You will argue that health care’s increasing reliance on artificial intelligence will have a negative effect on health and society.

Present your assigned case against artificial intelligence in a PowerPoint presentation with speaker notes

At minimum, address each of the following elements.

· Explain how artificial intelligence is used in health care.

· Analyze how artificial intelligence and related technologies are effecting change in health care.

· Compare and contrast clinical decision support systems in terms of implementation of artificial intelligence.

· Examine the legal and ethical considerations of the use of artificial intelligence in health care.

· Summarize the key points supporting your point of view within your slides, adding additional detail within your speaker notes.

Security Architecture & design

Length:  Minimum of 600 words

Due date: Saturday November 14, 2020

Simple, 

No plagarism

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

In today’s fast-paced, often “agile” software development, how can the secure design be implemented?