CASE STUDY (CASE TO ANALYZE) (PLAGARISM)

  

Professor: Joseph O. Esin, FSMA, FWCCRD.

What is a Case Study?

· The purpose of a case study is to walk the reader through a situation where a problem is presented, background information provided and a description of the solution given, along with how it was derived.

· A case study can be written to encourage the reader to come up with his or her own solution or to review the solution that was already implemented.

· The goal of the writer is to give the reader experiences similar to those the writer had as he or she researched the situation presented.

· How to Write a Case Study

· Several steps must be taken before actually writing anything:

· Describe Situation/Problem: Choose the situation on which to write

· Background: Gather as much information as possible about the situation

· Background: Analyze all of the elements surrounding the situation

· Describe the Solution: Determine the final solution implemented

· Analyze the Results of the Solution: Gather information about why the solution worked or did not work

· For maximum points, a thorough case analysis thus has several phases; define the problem; list assumptions made; explore alternative solutions including consideration of costs and benefits; develop three alternative action plans; choose one of the plans to implement that can best resolve the issue most appropriately; and design accountability structures and processes to assess the outcomes and ensure the resolution is effective and sustained. 

           Source: http://education.cu-portland.edu/blog/curriculum-instruction/how-to-write-a-case-study-the-basics/

Citation Style

APA style with a cover page is required see https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html

File Formats (Creativity Counts)

A standard research paper format may be used for this; however, for max points, use the latest technological presentation tools or video to present your ideas (PowerPoint, Prezi, iMovie, Adobe Portfolio, Google Drive – Presentation, YouTube, etc.). You are not limited to this list of tools; however, study your desired tool carefully. Make sure that the resulting file is both creative and designed for presentation to a professional audience.

Filename Format:

Case_Study1_YourFirstName_YourLastName (pptx/docx/…extensions vary by chosen tool) see File Formats section below.

Submission

Upload the resulting file via the Browse My Computer button for this Assignment.

Case to Analyze

Week 4: Lab. Assignment.

Dwayne and Debbie Tamai Family of Emeryville, Ontario.

Mr. Dwayne Tamai and Mrs. Debbie Tamai case of electronic harassment involved 15-year-old son, Billy, who took control of all of the electronic devices in the family’s home, including the phone, and manipulated them to the distress of other family members for his own amusement. The incidents began in December 1996, when friends of the family complained that phone calls to the Tamai home were repeatedly being waylaid, cut off missed messages, strange clicking and appears like a minor with a disembodied voice, unnervingly distorted by computer, who interrupted calls to make himself known.

After burping repeatedly, the caller frightened Mr. and Mrs. Tamai, and stated that I know who you are, and I stole your voice mail. Mocking, sometimes menacing, the high-tech stalker became a constant presence, eavesdropping on family conversations, switching TV channels, and shutting off the electricity.

The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect. Mr. Dwayne and Mrs. Debbie Tamai asserted that their son, Billy, had admitted engaging in the mysterious calls. The interruptions included burps, blathering and claims having control over the inner workings of the Tamai’s custom-built home, and the power to turn individual appliances on and off via remote control.

It started off as a witticism with friends and got out of control to an extent that he didn’t know how to end the entire operation, become afraid to come forward and tell the parents for the fear of us disowning him.

On Saturday, Mr., and Mrs. Tamai get organized and planned to take their son to the police department to defend him against persistent rumors on him. Instead, Mr., and Mrs. Tamai’s son confessed and labelled an intruder code-named, Sommy. Mr., and Mrs. Tamai eliminated all external sources and had confidence in interior sources. After 2-days, a team of investigators, intelligence and security experts loaded with high-tech equipment failed to locate Sommy. The next day, the team brought in two television networks to assist in the process.

In conclusion, the son, Billy not (Sommy) contacted the victims; (his biological parents), launched verbal threats in combination with the electronic harassment, in an effort to demonstrate his power and authority over them. The best option was, Mr., and Mrs. Tamai victims were not physically harmed, but terrified and greatly inconvenienced by the fact that the unknown force appeared to have control over a great many aspects of their lives, and the unknown force turned out to be their biological son, Billy.

Scenario: 1
Criminal motive is connected to emotional, psychological, and material need are often impel by means of behavior and independent of technology operation. These criminal tendencies are believed to champion the restoration of the criminal’s self-confidence, and self-worth which lead criminals to the path of temporary gratification, inadequacy, and incompetence.

Question 1

1:1 Provide a comprehensive narrative of Billy’s competency and creating emotional distress on his parents.

1:2 Identify the role of Sommy in this operation

Scenario 2

The police department confirmed that the sabotage was an inside activity but refrain from releasing the name the culprit. The police further stated that nothing would be gained by filing charges against the suspect.

2:1 What level of criminal behavior was exhibited by Billy in this operation?

2:2 The entire operation is classified as a serious domestic problem, why didn’t the police officer file charges against the suspect?

Scenario 3

3:1 Modern approach use computer and internet technologies identify offender modus operandi, criminal intent, and motive. 

3:2 Describe the impact of computer and internet technologies of Billy MO and criminal motive in this situation.

Casey, Eoghan (2011). Digital Evidence and Computer Crime. Elsevier

         Science. Kindle Edition; San Diego: CA

Academic Integrity/Plagiarism

At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:

· Cheating – using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities.

· Lying – falsifying, fabricating, or forging information in either written, spoken, or video presentations.

· Plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation

Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.

Task

1. Use Case Study format to analyze the case. Read carefully, the For maximum points section. Look at cases from the text of this class for inspiration.

2. Be sure to address all of the case study elements described herein.

3. Be sure to state your full name, Teacher Name, Course, and semester on the cover/intro pages/slides.

4. Show your creativity. How would you solve this particular case?

Prolog Assignment

In the two-people game of ten questions, one person is answerer and the other person is questioner. They decide one topic to confine the scope, say Olympics games. The answerer decides an Olympic game in his/her mind and does not reveal the game to the questioner. Questioner is supposed to ask a maximum of ten questions to guess the answer.

Design a Prolog script that plays the role of an answerer. For example, queries can be related to:

• Team size (2 for badminton doubles, 1 for swimming)

• Number of teams in a game (2 for badminton doubles, many for swimming)

• Arena type (court for badminton doubles, pool for swimming)

• Play device (shuttle cock or racket for badminton doubles, water for swimming, ball or

racket for tennis, javelin for javelin throw, etc.)

• Game mode (knock out, timed)

• Performance type (score, win)

There should be only one form of query, for example: has(ball), has(pool), has(team), has(teamsize,2), has (teams_per_game, 2), etc. And one form of decision: is(badminton).

Prolog script should be able to play the game 5 times, choosing a different game each time.

WK 5 Rough Draft

 

Include in the paper: A description of the scope and principal features of writing a technical paper, cite core theories and practices, and offer a similar explication (explanation) of a related field such as a business field that would benefit from technical writing.

1) 10 pages (double-spaced).

2) Choose any technical topic to write your report about.

3) Identify the purpose and audience of your report.

4) Use at least seven references outside of your textbook (you may use your textbook too, but are not required to).

5) In addition to the required number of pages for the assignment, you must also include a reference page (bibliography), written in APA style (see Appendix B), and a title page. Be sure to give all of your papers a descriptive title!

6) Use your approved topic.

7) Use your approved outline.

8) Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).

9) Arial 11 or 12-point font or Times New Roman styles.

10) Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations

11) Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly!

I attached an outline of what to write about.

math

an aqurium is 10m long, 5m wide and 6m deep 

what is the volume of the aquarium?

Computer Science Business Data and Communication Presentation

Explain and provide example when it is possible that will cover chapter 6 subjects:

•Network architecture components

•Traditional network design

•Building-block network design

–Needs analysis

–Technology design

–Cost assessment

Pick Two of Network Simulation Tools from the following, and Discuss, Present them on the class:

•[WANsim] WAN simulators and emulators http://www.wan-sim.net/

•[OPNET] OPNET Modeler, http://www.opnet.com/

•[NS2] NS2 official website, http://www.isi.edu/nsnam/ns/

•[NS2-wiki] NS2 resource webpage, http://nsnam.isi.edu/nsnam/index.php/Main_Page

•[NS3] NS3 official website, http://www.nsnam.org/documents.html

•[OMNeT] OMNeT++ official website, http://www.omnetpp.org/

•[REAL] REAL 5.0 simulator overview, http://www.cs.cornell.edu/skeshav/real/overview.html

•[SSFNet] Scalable Simulation Framework (SSF), SSFNet homepage, http://www.ssfnet.org/homePage.html

•[J-Sim] J-Sim homepage http://www.j-sim.org/

•[QualNet] QualNet official site, http://www.scalable-networks.com/products/•[YANS], Yet Another Network Simulator http://yans.inria.fr/code/yans/?summary

•[GTNetS] The Ge orgia Tech Network Simulator (GTNetS) http://www.ece.gatech.edu/research/labs/MANIACS/GTNetS/

2 and half page

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse
1. user can signup and login and chat with each other (one to one chat for example facebook)
2. web page design is not needed.
4. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.
3. it should be work in windows 10.

web master

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 300 words.