Big Data Analytics Dissertation

 In 250-300 words outline your dissertation topic related to Big Data Analytics and goals for this semester as they relate to your dissertation course. If you do not have a dissertation topic please revert those you are considering. Also, include ways that you could improve your dissertation, as well as areas you may be struggling with 

Infotech in a global economy

Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence.  Why or why not?

Research Paper ISOL

 Intellectual property vs. the Internet.

Intellectual property still exists in the age of the Internet and is still protected under the law. However, since it is possible to download or copy and paste almost anything off the Internet intellectual property has been abused more and more often. There have been numerous examples of literary prizes awarded and then rescinded over plagiarism and theft of intellectual property.  Currently China is open and above board about acquiring intellectual property. The government of China will not allow any company, particularly American companies, to conduct business in their country unless the company agrees to give up any intellectual property regarding the products they sell in China. Younger students today don’t think there is anything wrong with copying information off the Internet and presenting it as their own work. I have had discussions with students in which they proposed the idea that since they searched for the information on the Internet and then found it, they could copy it and present it as their own work. The concept of intellectual property seems to be falling by the wayside due to the Internet. Develop a hypothesis as to whether we should continue or even strengthen intellectual property laws, or should we simply abandon intellectual property laws and make anything that is posted on the Internet fair game.  

block chain analysis

 

Critical Analysis Paper

Follow the links below for the journals and complete the following questions for each link. Please use one document for both journals. 

Paper 1:

Link: https://www.sciencedirect.com/science/article/pii/S0736585318306324

Note:

Most critical analysis papers begin with a short summary of the work and then dive into the argument. Since most of these paper assignments are short, it is important to be concise in all parts of your analysis. Please respond to the questions below with at least one paragraph for each question. Please use your own words. 

  1. What is the overall aim of the research being presented?
  2. Are the aims of the research and the results of the data clearly and concisely stated in the abstract? Provide a summary of the abstract.
  3. Does the introduction provide sufficient background information to enable readers to better understand the problem being identified by the Authors? Provide one example.
  4. Have the Authors provided sufficient evidence for the claims they are making? Provide some examples.
  5. Provide at least 3 examples from the literature review section.
  6. What was the methodology used in this journal? Be specific.
  7. The conclusions should match the data being presented. Provide some examples presented in the paper that support the conclusion.
  8. Discuss the implications of this research.
  9. What was the main contribution of this research to the body of knowledge?
  10. What additions or research questions would you add to this journal?

Please copy each question below and provide your answers:

Paper 2:

Note:

Most critical analysis papers begin with a short summary of the work and then dive into the argument. Since most of these paper assignments are short, it is important to be concise in all parts of your analysis. Please respond to the questions below with at least one paragraph for each question. Please use your own words. 

  1. What is the overall aim of the research being presented?
  2. Are the aims of the research and the results of the data clearly and concisely stated in the abstract? Provide a summary of the abstract.
  3. Does the introduction provide sufficient background information to enable readers to better understand the problem being identified by the Authors? Provide one example.
  4. Have the Authors provided sufficient evidence for the claims they are making? Provide some examples.
  5. Provide at least 3 examples from the literature review section.
  6. What was the methodology used in this journal? Be specific.
  7. The conclusions should match the data being presented. Provide some examples presented in the paper that support the conclusion.
  8. Discuss the implications of this research.
  9. What was the main contribution of this research to the body of knowledge?
  10. What additions or research questions would you add to this journal?

Please copy each question below and provide your answers:

Week 12 assignment

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

10_Imoprtance of strategic IT planning

Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

Include at least 3 scholarly references in addition to the course textbook.  At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

  • Be approximately 2-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Assignment

1. There are n marble balls, one of which is made of a different material. You have access to a Comparator that can compare two inputs (of an arbitrary number of marble balls) and determine if the two inputs are the same or not. The problem is to find the single marble ball that is different from the others while minimizing the number of times you access the Comparator. Design an efficient algorithm based on prune-and-search to solve the problem. Derive the time complexity of your algorithm.

2. Exercise 14.3-6 (page 354). Use an example to demonstrate your augmented data structure and operations.

(14.3-6 Show how to maintain a dynamic set Q of numbers that supports the operation MIN-GAP, which gives the magnitude of the difference of the two closest numbers in Q. For example, if Q D f1; 5; 9; 15; 18; 22g, then MIN-GAP.Q/ returns 18 15 D 3, since 15 and 18 are the two closest numbers in Q. Make the operations INSERT, DELETE, SEARCH, and MIN-GAP as efficient as possible, and analyze their running times.). This is the exercise question 14.3-6 as mentioned above.

Business Intellegence

Discussion: What are the common business problems addressed by Big Data analytics?  In the era of Big Data, are we about to witness the end of data warehousing? Why? 

 Questions: 1. What is Big Data? Why is it important? Where does Big Data come from? 

2. What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be? 

3. What is Big Data analytics? How does it differ from regular analytics? 

4. What are the critical success factors for Big Data analytics? 

5. What are the big challenges that one should be mindful of when considering the implementation of Big Data analytics? 

Exercise:  At teradatauniversitynetwork.com, go to the Sports Analytics page. Find applications of Big Data in sports. Summarize your findings