assignment 0908

 

Review the video below and write a two page review plus cover page and reference page (APA Format).  In your written review give a summary of the video, and then do an analysis on at least one of the scenarios  in regards to how it would have affected your organization.

https://www.youtube.com/watch?v=Kik9xgZcf9I 

The 15 worst data security breaches of the 21st century

Coso Framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

1 Discussion Case Study Paper and PPT

1) Discussion 8.1

What is your favorite inferential statistic concept? 

Discussion writing requirements

  • 150 words (Excluding the references)
  • List References and Citations   

2) Case Study Paper 8.1 – Full 6 Pages In length excluding References.

what is big data analytics?

– discuss the benefits and features

– discuss the challenges and risks

Use the following Case and additional references to write the paper:

Case – 

Big Data and cloud computing: innovation opportunities and challenges

https://www.tandfonline.com/doi/full/10.1080/17538947.2016.1239771

https://doi.org/10.1080/17538947.2016.1239771

Additional References –

a) Big DataRedux: New Issues and ChallengesMoving Forward 

https://scholarspace.manoa.hawaii.edu/bitstream/10125/59546/0106.pdf

b) Information Granularity, Big Data, and Computational Intelligence, W. Pedrycz and S.-M. Chen (eds.), Vol. 8, 2015Chapter 13:The Role of Cloud Computing Architecture in Big DataAuthors:Mehdi BahramiandMukesh SinghalCloud Lab, University of California, Merced

https://cloudlab.ucmerced.edu/sites/cloudlab.ucmerced.edu/files/documents/mehdi_bahrami_et_al._the_role_of_cloud_computing_architectures_in_big_data.pdf

c) Building Big Data and Analytics Solutions in the Cloud

http://www.redbooks.ibm.com/redpapers/pdfs/redp5085.pdf 

Case study paper 8.1 writing requirements

  • Use the above Case and additional references to write the paper
  • 6-7 pages in length  (excluding cover page, abstract, and reference list)
  • Follow full APA format
  • List References and Citations

3) Case Study PPT
Create a PowerPoint presentation for above Case Study Paper 8.1.

Writing Requirements

  • The PowerPoint should be a minimum of 12 slides 
  • Include notes, citations and references
  • APA format

For The Case study I will submit what ever you have done and then Once I get the feedback you have to correct it accordingly…

End product

  • Distinguish between due care and due diligence.
  • Based on your experience, provide examples of due care and due diligence.

DISCUSSIONS- Business Intelligence

  

1. Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.

2. Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

NOTES: 1000 WORDS, ZERO Plagiarism & REFERENCE

Team managment dis 5

 

Discussion Conflict with Teams and Individual Creativity

Part One: Conflict

List and briefly define the three types of team conflict discussed in the textbook. Chapter 8 in my text. 

Describe a conflict from your work team (What type was it?  What was it about?  How was it resolved?) 

Part Two: Creativity

List and define the three creativity measurements from the textbook. 

How can team conflict lead to team creativity?  

Need 350 word content along with references.

Computer crime affects

 

Overview:

In Chapter 2 we talked about how computer crime affects forensics and you learned about the following categories:

  1. Identify theft
  2. Hacking systems for data
  3. Cyberstalking / harassment
  4. Internet fraud
  5. Non-access computer crimes
  6. Cyberterrorism

Instructions

For this week’s assignment, please do some external research and identify at least three actual events for each category. Detail what happened and be sure to cite your sources. The intent here is to help you understand how the world is truly internetworked and why digital forensics is an important role in our environment.

part 4: Administration and Validation

 

Assignment Content

  1. Based on your previous work in the previous week, create a 700-word entry in your Database Management Plan. You will use information from this entry in your presentation due in Week 6. Ensure you:
    • List the benefits of data administration compared to database administration.
    • Propose an effective data governance program.
    • Define the standards and approaches for the validation of database and application code.These include coding standards, expectations for what has been checked at each stage of testing (unit test, system test, user test), expectations for code review or inspection, etc.
    • Submit your assignment.

Discussion week 3 infotech global

 

Question: Today’s Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally.  What are some advantages and disadvantages of this approach?  Is there another approach that might work better?

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • please cite properly in APA
  • Make an argument concerning the topic.
  • Your initial post must be at least 250 words 

No Plagirsam