Research paper 6

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

Article readings: Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43. http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=93598603&site=eds-live

For your week 6 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

NO plagiarism at any cost. 

Due on Sunday (10/04/2020)

Java

1. Describe the key architecture points in a high capacity enterprise solution processing over 100/000 TPS?

2. What are the key breakage points in the architecture? How would you improve upon them?

3. Describe a defect that you encountered in your code that impacted production. Why was it not caught pre-deployment? How did you handle the remediation of this fault?

Project portfolio

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Cloud Discussion 15

 Review in 500 words or more the video above called Cloud Security Myths. 

 Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes. 

paper-1

 

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.

task is to write a 7-10 page paper discussing the following concepts:

  • Introduction
  • Why should an organization Implement an ERM application?
  • What are some key challenges and solutions to Implementing an ERM?
  • What is Important for an effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
  • Conclusion, final thoughts for future research
  • Recommendation

Your paper should meet the following requirements:

  • 9 pages
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.  

750 words: Select an organization that has a Global platform and describe the following.

Portfolio Project: Select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence.  

Perform the following activities:

1. Name the organization and briefly describe what good or service they sell and where they operate.

2. Note how they are a differentiator in the market.

3. Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).

4. Explain what actions the company took to achieve operational excellence.

Preview the document

read the attachment and answer the question.

Read the attached Ethics-V.pdfPreview the document which continues the discussion on the professional codes of software engineering ethics.

Then proceed to answer the questions inside the reading:

  • Questions 8.1 and 8.2
  • Case Study: Questions C1-C4

Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides.

Save your file as Ethics_5_FL where FL is your first and last name initial and Submit.

Week 7 Assignment

 

Complete the following assignment in one MS word document:

Chapter 12 –discussion question #1-3 & exercise 1 & 12 & 16

Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Chapter 12:

Discussion question 1-3:

1. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.

2. Discuss the financial benefits of chatbots.

3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.

Exercise 1,12,16:

1. Compare the chatbots of Facebook and WeChat. Which has more functionalities?

12. Research the role of chatbots in helping patients with dementia.

16. Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.

Chapter 13:

Discussion question 1-4:

1. Compare the IoT with regular Internet.

2. Discuss the potential impact of autonomous vehicles on our lives.

3. Why must a truly smart home have a bot?

4. Why is the IoT considered a disruptive technology?

Exercise 3, 4, 6:

3. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary.

4. It is said that the IoT will enable new customer service and B2B interactions. Explain how.

6. Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities.