Residency Project

  

•Find a company that has suffered a security breach in 2019. Provide background information on the company such as the type of business, their services, public or private, locations, etc. The reader should have a good understanding of the company after reading the bio. Next, provide information on the security breach; the Who, What, When, Where, Why, and How. 

•Create an Incident Response Plan (IRP) for the company. You can use the breach as a foundation if desired. The IRP should be a professionally looking document that is included as an attachment.

•Create a Disaster Recovery Plan (DRP) for the company. Again, you can use the previous breach as a foundation if desired. The DRP should be a professionally looking document that is included as an attachment.

Assignment

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the colour choices:

  1. Start by identifying all the applications of colour deployed, listing them under the headers of 1) data legibility, 2) editorial salience, and 3) functional harmony.
  2. How suitable are the choices and deployment of these colours? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential applications of colour, what would you do differently or additionally?

Assignment Link: http://book.visualisingdata.com/chapter/chapter-9

Assignment Requirements: At least 500 words in length

References: At least two peer-reviewed, scholarly journal references.

IT345 9

 

To conclude this course, we cover professional ethics as it relates to technology. Additionally, we specifically address ethics as it relates to computer professional. This is due to the amount of private, sensitive, and proprietary information they have access to.

Pick a scenario below and post your reply by  at midnight. Your response should be at least 300 words and appropriately cites your resources.

 

  • Scenario 1
    • Your company is developing a free email service that will include targeted advertising based on the content of the email messages (similar to Google’s Gmail). You are part of the team designing the system. What are your ethical responsibilities?

JA6

corporate social responsibility (CSR)

300 words with APA format with references of last 5 years 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

 

System  architecture is the descriptive representation of the system’s  component functions and the communication flows between those  components.  

My definition immediately raises some important questions. 

• What are “components”? 

• Which functions are relevant? 

• What is a communication flow?   

Cellular network

  Base on the reading assignment, your experience, and personal research, please  answer the following questions: 

  • Thoroughly explain the Base Station Controller (BSC) as it relates to a cellular network?
  • What is a Mobile Equipment Identifier (MEID) and what is it used for?
  • As an examiner, why is it important for you to understand how a call is routed through the cellular network?
  • What is the significance of Code Division Multiple Access (CDMA)?
  • List and explain three components of a SIM file system

Post your main response to the question (400 words minimum). 

Owning a dominion name

  

Instructions

In order to complete assignment #5, you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #5). Use examples from the readings, lecture notes, and outside research to support your answers. The assignment must be a minimum of a 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 8

Review Question #4 on page 261 and then answer the following question:

The new age of technology presents many opportunities for litigation. The Internet is no exception. When operating Internet websites, an important part of it is owning the domain name (www.example.com). Anyone in the world can own any domain name that is available and the facts of this case arise from this concept.

The plaintiff, in this case, Weather Underground Corporation (Weather Underground), a Michigan corporation, is a commercial weather service. It owns and operates several domain names so that people can access their company through their websites. Defendants, in this case, Navigation Catalyst Systems, Incorporated (“NCS”), a Delaware corporation, owns many domain names that are similar to the plaintiff’s company name (some would result from people misspelling the correct domain name for Weather Underground). NCS profits from consumers going to one of these websites and clicking on links that are on them.

Plaintiff filed suit against NCS and several of its companies in the District Court for the Eastern District of Michigan. As defendants were not incorporated in Michigan, the issue of personal jurisdiction arise. The courts of appeals have held that in order to establish specific personal jurisdiction (showing that this company has established contacts with the forum state), one must show three things: (1) the defendant purposefully availed himself of the privilege of acting in the forum state, (2) the cause of action arises from the defendant’s activities there, and (3) the defendant’s acts were so substantial as to make the exercise of personal jurisdiction there reasonable.

The district court is considering whether the exercise of personal jurisdiction is proper. What should it decide and why?

Weather Underground Inc. v. Navigation Catalyst Sys. Inc., No. 09–10756, 2009 WL 3818191 (E.D. Mich. Nov. 13, 2009).

The district court is considering whether the exercise of personal jurisdiction is proper. What should it decide and why?

Chapter 9

Apple, Inc., and Major League Baseball (MLB) signed an agreement for the broadcast of games. MLB will offer two live games per day, subject to blackout restrictions. Then MLB plans to roll out an entire offering of out-of-market games currently offered only through its premium live streaming video service. Identify some other, extra features users want. Identify restrictions that MLB will want to see in the agreement.

5s week 2 assignment PL

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry? 

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam? 

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned? 

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean? 

Organization leadership Research paper

  • Read 

https://www.researchgate.net/profile/Yuanchang_Liu/publication/227487108_ALIGNMENT_OF_BUSINESS_AND_ISIT_STRATEGY_AT_TELENOR_SWEDEN/links/555cba6008ae8c0cab2a6599/ALIGNMENT-OF-BUSINESS-AND-IS-IT-STRATEGY-AT-TELENOR-SWEDEN.pdf

  • Select a company of your choice and perform a case study similar to the Telenor case study described in the above article.
    • You may not have direct access to the company you select, which means you may not be able to conduct interviews, and you may not have access to all the information you would like access to.
  • Your case study must follow APA guidelines 
  • Your case study paper must be organized with the following level two headings. Use level one and level three headings as needed). 
    • Company Background
    • Company Business Strategy
    • Company IS/IT Strategy
    • IS Strategy Triangle (Read Shanardi https://sis.binus.ac.id/2018/02/13/is-strategy-triangle/ and find other resources )
    • Strategic Alignment Model (Read https://pdfs.semanticscholar.org/e840/2b65103442e2517982e5e3eb330f72886731.pdf and find other resources )
    • Strategic Alignment Maturity Model (Read CIO wiki https://cio-wiki.org/wiki/Strategic_Alignment_Maturity_Model and find other resources)
    • Strategic Grid (Read McFarlan, McKenney, and Pyburn https://hbr.org/1983/01/the-information-archipelago-plotting-a-course and find other resources )
    • Limitations (Cover the limitations of your study and paper)
    • Conclusions
  • Your paper must include at least five scholarly sources beyond the resources provided 

Provide a summary of the research methods in each dissertation.

 

1. Provide a summary of the research methods in each dissertation.

Quantitative Methodology:
Dominguez, A. (2013). Evaluating the acceptance of cloud-based productivity computer solutions in small and medium enterprises (Order No. 3557596). Available from Dissertations & Theses @ Capella University; ProQuest Central; ProQuest Dissertations & Theses A&I; ProQuest Dissertations & Theses Global. (1346194891).

Qualitative Methodology:
Burkhead, R. L. (2014). A phenomenological study of information security incidents experienced by information security professionals providing corporate information security incident management (Order No. 3682325). Available from Dissertations & Theses @ Capella University; ProQuest Central; ProQuest Dissertations & Theses A&I; ProQuest Dissertations & Theses Global. (1657429053).

Mixed Methods:
Srinivas, S. K. (2018). Security analytics tools and implementation success factors: Instrument development using delphi approach and exploratory factor analysis (Order No. 10807845). Available from Dissertations & Theses @ Capella University; ProQuest Dissertations & Theses A&I; ProQuest Dissertations & Theses Global. (2050214687).

2.  

  

Describe your concentration in the Ph.D. program. Then identify the top journals in your concentration. Here is a list of journals that are considered top journals.

Journal Databases on the UC Library Proquest, ACM, and IEEE:

Journal of the ACM

Communications of the ACM IEEE Transactions on Pattern Analysis

IEEE Transactions on Neural Networks

IEEE Transactions on Fuzzy Systems

Journal of Cryptology

Software and Systems Modeling

Journal of Machine Learning Research

IEEE Transaction on Software Engineering

Journal of Systems and Software

MIS Quarterly

Information Systems Research

Management Science

Journal of Management Info. Systems

Decision Sciences

Communications of the ACM

Decision Support Systems

European Journal of Info. Systems

ACM Transactions

Journal of AIS

Information Systems

ACM Computing Surveys

Journal of Information Systems

Journal of Strategic Info. Systems

Information and Management

Communications of the AIS

Journal of Database Management

Journal of Information Management

DATA BASE

Journal of Computer Info. Systems

Info. Resources Management Journal

Journal of Management Systems

Journal of the ACM

Omega

Journal of Info. Systems Management

Journal of Information Science

Human-Computer Interaction

Operations Research

Interfaces (INFORMS)

Int’l Journal of Human-Computer Studies

Journal of Information Systems Educ.

Knowledge Based Systems

Journal of Operations Research

Journal of Data Base Administration

Journal of Systems and Software

Expert Systems with Applications

Organizational Behavior and Human Decision

Journal of Systems Management

INFORM

Expert Systems Review

Journal of End-User Computing

Behavior and Information Technology

Communication Research

Simulation

AI Expert

Journal of Software Maintenance

Computers and Automation

Computers in Human Behavior

Look at these journals and identify two journals that have articles in your area of interest. Discuss why you selected each journal.

3.  Select two articles related to your area of interest(AI in IoT) from your top journals. Provide an annotated bibliography for each article and discuss how these articles identify a gap in the literature that you wish to address in your dissertation.