article

 

Read the attached PDF article entitled, “How Blockchain Technology Can Benefit Marketing: Six Pending Areas Research Areas”.

The six pending research areas mentioned in the article are:

1) Fosters disintermediation

2) Aids in combatting click fraud,

3) Reinforces trust and transparency,

4) Enables enhanced privacy protection,

4) empowers security, and

6) Enables creative loyalty programs.

After reading the article in full, select on of the mentioned six areas of research and write an article reflection minimum 8-9 maximum page paper identifying the following;

1) Describe and provide the overall research area mentioned in the article in a synopsis

2) What did the article state in how Blockchain can benefit that marketing area overall?

3) What further research did the article recommend?

4) What do you think can be the approach to further research the topic? What approach would you recommend to take and what type of research method would make sense?

5) What is an example of a company that you believe would benefit from this type of research and why?

6) Outside of Blockchain, what other piece of marketing technology can help this area?

7) What do you recommend is the best way to approach for a company to implement this area of research into their company?

Paper must be 12Pt. Font, Times New Roman, Double Spaced, with title page and reference page. Minimum of 3 references, to include the article required. The title page and references page do NOT count towards the minimum.

cc-13 project

Question:   “What is a      hypervisor? Differentiate between type I and type II. What are the      security vulnerabilities of each? 

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 850 words.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use the Research Databases available from the Danforth Library not Google.

Prof writing & proposal Devel(DSRT) 2.2Question

 

Just like you did in assignment 2.1, you will create a 1-2 page single-spaced Analysis of Research abstract published scholarly articles related to your mock dissertation topic/research question.  However, this time you need to review a different methodology than you previously did (i.e. if you reviewed a quantitative article in 2.1, you will do a qualitative one in 2.2 and vice versa). 

Brevity and being concise are important as this analysis is intended to be a brief summation of the research.

Each abstract must therefore consist of the following in this order:

1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name and qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data (surveys, tests,interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

Additional information on writing scholarly abstracts can be found via this link

See completed example

Network Security Technologies and hardening

 

  • This week we discussed Network Security Technologies and hardening of Devices. What are some of the Security Basics when it comes to workstations and ways to secure Server environments? Identify a minimum of two additional Network Devices and ways to secure the devices? Please provide input based on this week’s reading and homework assignments, personal experience, and internet research with a cited reference in APA format.

Computer Crime

1. What advantages are offered by commercial forensic packages? Are there any disadvantages to using them? If so, what are they?

2. Define the following terms and describe how they relate to information security: integrity, authenticity, confidentiality, and availability.

Information Governance assignment

practical Connection Assignment

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how Information Governance course research has connected and put into practice within their own career. 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of Information Governance course have been applied or could be applied, in a practical manner to the your work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Cryptography (Please See Attached Rubric)

 

Review the following questions from Network security: Private communication in a public world and provide your responses in a Word document. In answering each prompt, be sure to defend your answers and explain how you have arrived at your solution.

  1. Random J. Protocol-Designer has been told to design a scheme to prevent messages from being modified by an intruder. Random J. decides to append to each message a hash of that message. Why does this not solve the problem?

Hint: We know of a protocol that uses this technique in an attempt to gain security.

  1. Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key, K, then Bob could impersonate Carol to Alice (actually any of the three could impersonate the other to the third). Suppose instead that each had their own secret key; so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his or her identity, responds to a challenge with a function of his or her secret key. Is this more secure than having them all use the same secret key?

Hint: What does Alice need to know in order to verify Carol’s answer to Alice’s challenge?

  1. Assume a cryptographic algorithm in which the performance for the good guys (the ones that know the key) grows linearly with the length of the key and for which the only way to break it is a brute-force attack of trying all possible keys. Then, suppose the performance for the good guys is adequate (e.g., it can encrypt and decrypt as fast as the bits can be transmitted over the wire) at a certain size key. Finally, suppose advances in computer technology make computers twice as fast. Given that both parties— the good guys and the bad guys— get faster computers, does this advancement in computer speeds work to the advantage of the good guys? The bad guys? Or does it not make any difference?

Kaufman, C., Perlman, R., & Speciner, M. (2011). Network security: Private communication in a public world. Upper Saddle River, NJ: Prentice Hall PTR. (note: this textbook is a reference for the assignment and not a required resource for learners)

In each of your responses to the above scenarios, please ensure that you provide a brief explanation of why you chose to take your mentioned actions.

Essential Concepts Project

 

The purpose of this hands-on project is to give students an opportunity to create a hierarchical folder structure (CLO 1, MLO 1.1) and explain key terms and concepts related to information systems (CLO 7, MLO 1.3). To do this, use the weekly readings, along with the video tutorial, to complete the Essential Concepts Project.

Part 1. Read the following modules in the Technology for Success textbook:

  • Module 3: Computer Hardware (pages CC 3-1 to CC 3-28)
  • Module 4: Operating Systems and File Management (pages CC 4-1 to CC 4-21)
  • Module 5: Software and Apps (pages CC 5-1 to CC 5-33)

Next, create a new Microsoft Word document (.docx). In 2-3 pages, answer the following questions:

  1. What does it mean to live in a “modern information society?”
  2. What types of input and output devices would be ideal for a college student completing his or her coursework?
  3. What characteristics are common among operating systems? List types of operating systems, and examples of each. How does the device affect the functionality of an operating system?
  4. Leah Jacobs is starting her own dance studio and wants to create digital media and use productivity software to support her business. She is hiring a graphic artist to create a logo for her business. She wants to use the logo across all visual communications at the company, from business cards to database forms, to websites and social media. What programs and apps should she consider using to run her business?

Part 2. Create a class folder so that you can save files in the proper folders. As an organization scheme, do the following:

  1. Create the folders you need onto the location of your choice. This may be your Documents folder, a flash drive, or the desktop if you are working on a CBU machine. Begin by creating a folder called LastnameFirstname. Inside of the LastnameFirstname folder, create a folder called CIS 265. Inside the CIS 265 folder, create the following folders: Office and Operating System, Word, PowerPoint, Excel, Access, and Outlook, Integrated Capstone Project.

  2. Expand the hierarchical tree so that all the folders are visible (via Windows Explorer).

  3. Press the Prnt Scrn button on your keyboard. This will take a snapshot of the screen and put it in the computer’s clipboard (temporary memory).

  4. Open the document you’ve already created for this Essential Concepts assignment. Press the Paste button or press Ctrl and V. This should paste a picture of the screen onto the last page of the document.
  5. The finished product should consist of a copy of the screenshot showing that you have created the folders.


(IMPORTANT: You should use these folders to save all your work throughout this course.)

Part 3. Attach and submit your completed project (which should be a single Word document with word processing and/or screen shots (in Full Screen Reading view) of all assignment components, labeled and in order) by the assigned due date.

Essential Concepts Project Scoring

Assignment ComponentsPossible
Points

Part 1  

  • Questions 1-4 answered correctly

15 x 4 = 60

Part 2  

  • Includes a LastnameFirstname folder
  • Includes the CIS265 sub-folder
  • Includes all seven (7) application sub-folders
  • Displays all folders in the correct hierarchy

 Below is an outline of what each page of your Essential Concepts Project should look like:

Page 1Essential Concepts ProjectFirst and Last NameCourse TitleCalifornia Baptist University_____________________________________________________

Pages 2-4I n 2-3 pages, answer the questions above._____________________________________________________________

Pages 5-6
Insert or paste screen shots of your class hierarchical folder and organizational scheme.