Article

Topic: VEEM and Blockchain Technologies Transforming Global Marketing.

 Write 4-5 page paper & accompanied 8-12 slide power point.

  • Paper: Must be APA format, 12 pt font, Times New Roman, with title page and references page. Minimum 2-3 references. Title page and References page do NOT count towards minimum.
  • Power Point: Is a summary presentation overview of paper, with additional charts/graphs to help demonstrate your insights on the topic.  Any template is fine to use.

 

Answer the following questions in your paper and power point.

1) Define how VEEM and Blockchain is expanding the global marketing efforts of companies

2) In your company of choice, who are they, are how do you think they use Blockchain and VEEM technologies to operate their digital marketing efforts?

3) How does this company use those technologies to expand globally their marketing efforts?

4) What challenges do companies in general face when it comes to implementing these technologies for their marketing efforts?

5) What forward thinking 1-2 key strategies do you think this company and their industry can implement to be competitive in the global marketing landscape?

You can use magazines, company websites, journals, news articles, interviews etc, to research and uncover your information.  There is no exact right or wrong answer to the questions on the strategies and challenges you think face that company and their industry, as long as your supportive research supports your thoughts. Looking for more what you think based on the research conducted. 

Policy and legal Project1

Abstract for the project

Your Research Project on the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.

Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software. 

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the Danforth Library Research Databases.

Submit all documents at on time. Do not zip or otherwise compress them. Do not use .rar. Use .doc and .ppt extensions

Data Quality and Security

Data Quality and Security

The reading in the text provides two key reasons for poor data quality, “the rush to install new systems and the failure to take an integrated view of the organization’s data” (p. 109). Data security breaches seem to occur every other day, and as discussed in the Week Three lecture, there are serious implications for organizations that do not take the necessary measures to ensure data security. Include the following elements in your paper supporting your statements using the required sources for this assignment.

Analyze the role of data in information systems for business and describe the risks that can arise from poor data quality.

Explain the challenges that can result from poor data quality. Provide an example of the results of poor data quality from your own personal or professional experience.

Explain at least two methods of how organizations can ensure good data including the structure and applications necessary.

Analyze the risks of poor data security.

Research an article in the popular media that covers a recent data breach. Explain the impact of the data security breach on the organization and its leaders using evidence from your article.

Explain the role of data governance in keeping data secure.

The Data Quality and Security Paper

Must be two to three double-spaced pages (600-900 words) in length (not including title and references pages) and formatted according to APA style 

Must include a separate title page with the following:

Title of paper

Student’s name

Course name and number

Instructor’s name

Date submitted

Must use at least two credible sources in addition to the course text.

Database SQL essay

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection?  Include an interesting meaningful title.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations)
With atleast 3 references 

Discussion 13

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 14  (Jamsa, 2013).Chapter 14 topics:

  • Define and describe the mobile web.
  • Describe the different generations of cell phones.
  • Describe how smartphones differ from ordinary cell phones.
  • Select a mobile or traditional website that interests you. Describe the site in terms of the ecosystem that makes up the site’s user experience.
  • Describe how web pages differ from apps and how apps differ from widgets.
  • Discuss why developers say that HTML5 will drive mobile solutions.
  • Describe some development best practices for designing solutions for the mobile cloud.

Chapter 15 topics:

  • Define corporate governance.
  • Discuss the events that led up to the need for increased corporate governance.
  • Define business strategy. List five possible business strategies.
  • Discuss the purpose of the Capability Maturity Model.
  • Define auditing.
  • Define internal control and provide an example of control.
  • Discuss the role Sarbanes/Oxley has played with respect to corporate governance.
  • Define IT governance.
  • List factors one should consider with respect to governing the cloud.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  

Assignment

 

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 1 and 2.  This section of the paper should be a minimum of two pages. 

Paper Section 2:  Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 1 and 2 to descriptively address and answer the problems below.  Important Note:  Dot not type the actual written problems within the paper itself.

  1. Search the Internet for material regarding the work of managers and the role analytics play. What kind of references to consulting firms, academic departments and programs do you find? What major areas are represented? Select five sites that cover one area and report your findings.
  2. Most companies and organizations have downloadable demos or trial versions of their software products on the Web so that you can copy and try them out on your own computer. Others have online demos. Find one that provides decision support, try it out, and write a short report about it. Include details about the intended purpose of the software, how it works, and how it supports decision making.
  3. Comment on Simon’s (1977) philosophy that managerial decision making is synonymous with the whole process of management. Does this make sense? Explain. Use a real-world example in your explanation.

Important Note:  There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.

Paper Section 3:  Conclusions

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward.  This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.

Paper Section 4:  APA Reference Page

The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.

Text book:  

Sharda, R., Delen, D., & Turban, E. (2015) Business intelligence and analytics: Systems for decision support (10th ed.). Boston: Pearson.

Digital: ISBN-13: 978-0-13-340193-6

Print: ISBN-13: 978-0-13-305090-5

Note: I have attached PPTs in attachment

Ethical Hacking

1.) Given the rich and diverse skills and mindset of an ethical hacker (technical, administrative, and physical measures), which characteristics do you believe to be the most important in this role? Please explain your choice. 

2.) Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.

Your assignment should be 3-4 paragraphs in length.