Web Link

Word Assignment

 

  • Update your MS Word Assignment #3 by incorporating  the feedback you received on that Assignment 3 (the initial draft) to arrive at your final draft: your MS Word Assignment 4.
    Ensure to format your paper according to the APA formatting style.  It should include:

    • Title page
    • Table of Contents
    • Abstract
    • Body of paper with sources credited parenthetically
    • References page (having at least 6 sources in APA style)
    • Submit this final draft document (one Word file) by clicking on the MS Word Assignment 4 link.
  • Web LinkHow to create a table of contents in Word
    How to create a table of contents in WordFollow the steps on this Web page on how to develop a table of contents.
  • ItemExample APA FormatAttached Files:

Case Study

 

Using the case study below, you will analyze an existing business problem, create a secure network topology, and write a security plan. Your written paper should be completed in word and consist of a Cover page, four to five-page written pages and a bibliography for cited references.

Case Study:

You are a consultant working with a dental office that has just merged with another dental practice. The original office housed three dentists, two dental assistants, and one receptionist in one location. With the merger, there are now five offices in different parts of the city, 15 dentists, 12 dental assistants, and five receptionists. Four of the dentists work in the offices but also are mobile in that they provide dental checkups to elderly patients in their homes or at the senior citizen centers, and to school children in the three inner-city elementary schools. The mobile dentists need to be able to send and receive patient records while they are out of the office. All the dentists and dental assistants must have real-time access to all patient records and daily schedules. The lead dentist has reminded you that they are required to meet HIPAA requirements for protecting patient information. You, as a telecommunications specialist, have been asked to design the telecommunications network to support this new multi-location practice. Others on the team will develop the applications and databases. Your task is to identify the requirements and design a network solution that will meet those requirements.

  1. Analyze the given case and provide a clear set of solutions for the network solution.
  2. Identify the information that is to be protected and the related security requirements.
  3. Identify the network components, security hardware, devices and equipment that would be involved in meeting the needs of the stationary offices and the mobile dentists.

Unit 2 Assignment 2 -Deliverable 1: Analyze the Business Problem

  1. Analyze the given case and provide a clear set of solutions for the network solution.
  2. Identify the information that is to be protected and the related security requirements.
  3. Identify the network components, security hardware, devices and equipment that would be involved in meeting the needs of the stationary offices and the mobile dentists.

Scoring Guide

Pick one of the following for your Big Data Research paper?

 Articles to read:

 

Marcu, D., & Danubianu, M. (2019). Learning Analytics or Educational Data Mining? This is the Question. BRAIN: Broad Research in Artificial Intelligence & Neuroscience, 10, 1–14. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=139367236&site=eds-live

Hariri,  R.H., Fredericks, E.M. & Bowers, K.M. (2019). Uncertainty in big  data analytics: survey, opportunities, and challenges. Journal of Big Data, 6: 44. https://doi.org/10.1186/s40537-019-0206-3

Question:

While  this weeks topic highlighted the uncertainty of Big Data, the author  identified the following as areas for future research.  Pick one of the  following for your Research paper:

  • Additional  study must be performed on the interactions between each big data  characteristic, as they do not exist separately but naturally interact  in the real world.
  • The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
  • New  techniques and algorithms must be developed in ML and NLP to handle the  real-time needs for decisions made based on enormous amounts of data.
  • More  work is necessary on how to efficiently model uncertainty in ML and  NLP, as well as how to represent uncertainty resulting from big data  analytics.
  • Since  the CI algorithms are able to find an approximate solution within a  reasonable time, they have been used to tackle ML problems and  uncertainty challenges in data analytics and process in recent years.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. The UC Library is a  great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Week research paper 10 – Enterprise Risk Management

Your task this week is to write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Application and Identity Design Considerations

 1 page

  • This week we covered the Application and Identity Design Considerations.  Identify and define at least two types of Application Design Considerations and explain in detail how they are carried out.  Identify and define Device and User Identity concepts.  Identify the associated benefits and weaknesses with the application of each approach.  Feel free to research the internet and other resources to support your comments and cite references in APA format.

OE W 5 A

  

· Chapter 7 – Review the section on dealing with multiple locations and outsourcing. Review figure 7.2 and note how virtual team communications further reiterates the importance of this model. 

· Chapter 8 – Review the Siemens AG case study. Note the importance of understanding the interrelationships amongst all the senior leaders at every location. Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate CIO should engage with each of the regional leaders. Why is this important? 

(Information Technology and Organizational Learning)

The above submission should be two -pages in length (one page for each question) and adhere to APA formatting standards.

**Remember the APA cover page and the references (if required) do not count towards the page length**

Textbook Title –  

Title: Information Technology and Organizational Learning

ISBN: 9781351387583

Authors: Arthur M. Langer

Publisher: CRC Press

Publication Date: 2017-10-17

Edition: 3rd ED.

Assignment

Complete the Developing Intimacy with your Data Exercise located at the following link:

Working With Data (Click chapter 4 and then exercises)

Submit a brief paper discussing:

  • Why you selected your data set?
  • What are the physical properties of the data set?
  • What could you do/would you need to do to clean or modify the existing data to create new values to work with? 
  • What other data could you imagine would be valuable to consolidate the existing data?

Include a screenshot showing your using R, SQL, or Python to perform a manipulation of your data.

Exercises

DEVELOPING INTIMACY WITH YOUR DATA

This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest, then follow the simple instructions to download it. With acquisition completed, work through the remaining key steps of examining, transforming and exploring your data to develop a robust familiarisation with its potential offering:

Examination: Thoroughly examine the physical properties (type, size, condition) of your dataset, noting down useful observations or descriptions where relevant.

Transformation: What could you do/would you need to do to clean or modify the existing data to create new values to work with? What other data could you imagine would be valuable to consolidate the existing data?

Exploration: Using a tool of your choice (such as Excel, Tableau, R) to visually explore the dataset in order to deepen your appreciation of the physical properties and their discoverable qualities (insights) to help you cement your understanding of their respective value. If you don’t have scope or time to use a tool, use your imagination to consider what angles of analysis you might explore if you had the opportunity? What piques your interest about this subject?

(You can, of course, repeat this exercise on any subject and any dataset of your choice, not just those on Kaggle.)

Operative Paradigm

  1. Develop a personal “operative paradigm” based on a review of the paradigmatic assumptions and concepts involved in each of the three basic methodological approaches in organization and management research. First, a brief review of the three basic methodological approaches in organization and management research is conducted. Second, the preferred personal “operative paradigm” is covered based on the following components: assumptions, concepts, propositions, hypotheses, variables, and operational definitions.
  2. The body of your paper should be 8 pages long, written in good APA, and with at least 10 references.