Data
4 Weeks / Intro to Programming Concept
Currently Unavailable to complete
Dates are:
01/05/2021-
01/30/2021
Organization leader and decision making – Discussion
Note : Please answer below 3 questions and APA 7 format
After completing the reading this week, we reflect on a few key concepts this week:
- Discuss what ethical leadership is and how it impacts the organizational culture.
- What are the various dimensions of ethical leadership?
- Note some failures in ethical leadership, please find an example, explain the failure and note possible solutions to fix the issue with leadership.
Please be sure to answer all the questions above in the initial post.Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Expand on the topic, by adding additional thoughtful information
- Answer a question posted by another student in detail
- Share an applicable personal experience
- Provide an outside source
- Make an argument
At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.
Required Reading
- Chapter 5 in the text
- LE BA PHONG, LEI HUI, & THAN THANH SON. (2018). How Leadership and Trust in Leaders Foster Employees’ Behavior toward Knowledge Sharing. Social Behavior & Personality: An International Journal, 46(5), 705–720. https://doi.org/10.2224/sbp.6711http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=pbh&AN=129468910&site=eds-live&custid=s8501869&groupid=main&profile=eds_new
- CHANHOO SONG, KWANGSEO RYAN PARK, & SEUNG-WAN KANG. (2015). Servant Leadership and Team Performance: The Mediating Role of Knowledge-Sharing Climate. Social Behavior & Personality: An International Journal, 43(10), 1749–1760. https://doi.org/10.2224/sbp.2015.43.10.1749http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=pbh&AN=111059573&site=eds-live&custid=s8501869&groupid=main&profile=eds_new
Optional Resources:Chapter 5 Journal articles
- Journal Article 5.1:Bormann, K.C. and Rowold, J. (2016) ‘Ethical leadership’s potential and boundaries in organizational change: a moderated mediation model of employee silence,’ German Journal of Human Resource Management, 30(3–4): 225–245.
- Journal Article 5.2:Haney, A.B., Pope, J. and Arden, Z. (2018) ‘Making it personal: developing sustainability leaders in business,’ Organization & Environment. DOI: 10.1177/1086026618806201
Dissertation
Below qustions need to be covered in the assigment:
1)What is the goal of your research? / What are your research goals?
2)Do you feel you will be able to gather the data for this research? If so, where? Though we are not to that point in your research it is important that you are considering this.
3)What question are you asking in your research?
4)What research question are you trying to answer with this research?
5)Your dissertation MUST relate to your work. Does this dissertation relate to your work? (FYI, currently I work for a Telecom project as a software engineer)
Statistical analysis using R
Final Exam DPEE
Note:
· For demonstrating conceptual understanding, you are required to work on the model that is easier to handle or compute, not necessarily the more suitable (or more complicated) model for the dataset. Follow the question description.
· You don’t need to check the assumption of a model unless the question asks for it. For example, if the question asks you to make prediction based on a model, you don’t need to check the assumption for the model before making prediction.
· For any of the testing (hypothesis test) problem, define Ho/Ha, compute the test statistic, report the exact p value, and state the conclusion. The default alpha value is 5%, unless specify.
· Elaborate your reasoning clearly and show relevant plots, R results, and tables to support your opinion in each step and conclusion.
· Submit the Rmd file and the corresponding pdf file knitted from it, along with your answer, this format is similar to your homework.
· The data is real, just like the project you are working on. Hence it is possible that even after the remedial method has been done, the model is still not perfect. When this happens, evaluation will be based on the level you execute the methods covered in Stat512 to improve the model. Don’t worry if your model is not perfect, try your best to demonstrate the skill set you learn in this class.
Study the data with a linear analysis and complete the problems. The data set, dataDPEE.csv has 3 continues predictors and two categorical predictors.
Problem 1. Consider only the first order model with X1, X2 and X3, perform the following hypothesis.
a. (10) whether X1 can be dropped from the full model.
> dpeemod <- lm(y ~ x1 + x2 + x3)
> plot(dpee)
> summary(dpeemod)
Call:
lm(formula = y ~ x1 + x2 + x3)
Residuals:
Min 1Q Median 3Q Max
-15.948 -11.640 -1.480 6.402 31.650
Coefficients:
Estimate Std. Error t value Pr(>|t|)
(Intercept) 90.79017 22.07408 4.113 0.00106 **
x1 -0.68731 0.47959 -1.433 0.17377
x2 -0.47047 0.24227 -1.942 0.07254 .
x3 -0.06845 0.46523 -0.147 0.88513
—
Signif. codes: 0 ‘***’ 0.001 ‘**’ 0.01 ‘*’ 0.05 ‘.’ 0.1 ‘ ’ 1
Residual standard error: 14.75 on 14 degrees of freedom
Multiple R-squared: 0.6257, Adjusted R-squared: 0.5455
F-statistic: 7.8 on 3 and 14 DF, p-value: 0.002652
Ho: X1 is significant and cannot be dropped from the model.
Ha: X1 can be dropped from the model.
Using the model Y~X1 + X2 + X3,
b. (10) whether X1 can be dropped from the model containing only X1 and X2.
Problem 2 (10) Consider the first order model with X1, X2 and X3, simultaneously estimate parameters (beta1, beta2 and beta3) with a confidence level of 75%.
Problem 3 (20) Perform appropriate analysis to diagnose the potential issues with the first order full mode with X1 X2 and X3, improve the model as much as possible with the methods covered in Stat512. You should also consider the assumption checking for your revised model.
Problem 4
a. (10) Compute AIC, BIC, and PRESSP to compare the following two models.
· The model on the first order terms for X1 and X2 and the interaction term X1X2.
· The model on the first order terms for X1, X2 and X3
Do they all yield the same better model? If not, explain.
b. (10) Select the model that you think is better to predict the mean response value, then predict the mean response for the following case, at a confident level of 99%.
x1
x2
x3
45
36
45
Problem 5
X4 and X5 are two factors on Y.
a. (10) Is there any significant interaction effect between X4 and X5 on Y?
b. (10) With the ANOVA method, compute the 95% confidence interval for the following difference, respectively:
D1= The difference in the mean of Y when (X4=high, X5=less) and (X4=high, X5=more)
D2= The difference in the mean of Y when (X4=low, X5=less) and (X4=low, X5=more)
c. (10) With the ANOVA method, compute the 95% confidence interval for
D1-D2
Where D1 and D2 are described in b.
How is your result related to a?
ANALYTICS, DATA SCIENCE, & ARTIFICIAL INTELLIGENCE book
Week 1 Assignment
Complete the following assignment in one MS word document:
Chapter 1 –discussion question #1 & exercise 15 (limit to one page of analysis for question 15)
Chapter 2 – discussion question #1 & exercises 4, 5, and 15(limit to one page of analysis for question 15)
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
Data Mining
Topic: Security, Privacy and Ethics in Data Mining.
In this task, you are required to read the journal articles provided below and write a short discussion paper based on the topic of security, privacy and ethics in data mining. You must:
identify the major security, privacy and ethical implications in data mining;
evaluate how significant these implications are for the business sector; and
support your response with appropriate examples and references (at least 2 additional references should be sought in addition to the ones below).
The recommended word length for this task is 700 to 1000 words.
Journal articles:
Ryoo, J. ‘Big data security problems threaten consumers’ privacy’ (March 23, 2016) theconversation.comhttp://theconversation.com/big-data-security-problems-threaten-consumers-privacy-54798
Tasioulas, J. ‘Big Data, Human Rights and the Ethics of Scientific Research’ (December 1, 2016) abc.net.auhttp://www.abc.net.au/religion/articles/2016/11/30/4584324.htm
discussion
Task1 (Around 500-600 words)
From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?
Present your discussion post as if you were presenting to senior leaders of your company.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
https://ieeexplore.ieee.org/document/8760937?arnumber=8760937
Task2 (around 500-600 words)
The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
Ask an interesting, thoughtful question pertaining to the topic
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
Need two papers on uber organization and summarize data breach on uber
Need two papers on the uber organization and summarize data breach on uber
Resources :
https://us.norton.com/internetsecurity-emerging-threats-uber-breach-57-million.html
https://www.npr.org/2018/09/27/652119109/uber-pays-148-million-over-year-long-cover-up-of-data-breach
Exploring Multiple Levels of Dependencies
In this Task, we want to explore the dependencies of a project. The steps to follow are:
- Download the “OWASP Juice Shop” project source code and extract the zip file.
- Browse to http://npm.broofa.com.
- Find the “package.json” file in the Juice Shop source code and upload the file to the tool for analysis.
Observe the generated dependencies tree for this application. Note that there may be more than one path to a particular dependency; there are different levels of dependencies for a module to work. Use this dependencies tree as a sample and discuss how having multiple levels and paths of dependencies can affect the security of an application. Also, what do you think about remediation challenges in an application with a complex dependencies tree similar to this example?
write your analysis,/ Not more than One page/
