Research Paper ISOL

 Intellectual property vs. the Internet.

Intellectual property still exists in the age of the Internet and is still protected under the law. However, since it is possible to download or copy and paste almost anything off the Internet intellectual property has been abused more and more often. There have been numerous examples of literary prizes awarded and then rescinded over plagiarism and theft of intellectual property.  Currently China is open and above board about acquiring intellectual property. The government of China will not allow any company, particularly American companies, to conduct business in their country unless the company agrees to give up any intellectual property regarding the products they sell in China. Younger students today don’t think there is anything wrong with copying information off the Internet and presenting it as their own work. I have had discussions with students in which they proposed the idea that since they searched for the information on the Internet and then found it, they could copy it and present it as their own work. The concept of intellectual property seems to be falling by the wayside due to the Internet. Develop a hypothesis as to whether we should continue or even strengthen intellectual property laws, or should we simply abandon intellectual property laws and make anything that is posted on the Internet fair game.  

block chain analysis

 

Critical Analysis Paper

Follow the links below for the journals and complete the following questions for each link. Please use one document for both journals. 

Paper 1:

Link: https://www.sciencedirect.com/science/article/pii/S0736585318306324

Note:

Most critical analysis papers begin with a short summary of the work and then dive into the argument. Since most of these paper assignments are short, it is important to be concise in all parts of your analysis. Please respond to the questions below with at least one paragraph for each question. Please use your own words. 

  1. What is the overall aim of the research being presented?
  2. Are the aims of the research and the results of the data clearly and concisely stated in the abstract? Provide a summary of the abstract.
  3. Does the introduction provide sufficient background information to enable readers to better understand the problem being identified by the Authors? Provide one example.
  4. Have the Authors provided sufficient evidence for the claims they are making? Provide some examples.
  5. Provide at least 3 examples from the literature review section.
  6. What was the methodology used in this journal? Be specific.
  7. The conclusions should match the data being presented. Provide some examples presented in the paper that support the conclusion.
  8. Discuss the implications of this research.
  9. What was the main contribution of this research to the body of knowledge?
  10. What additions or research questions would you add to this journal?

Please copy each question below and provide your answers:

Paper 2:

Note:

Most critical analysis papers begin with a short summary of the work and then dive into the argument. Since most of these paper assignments are short, it is important to be concise in all parts of your analysis. Please respond to the questions below with at least one paragraph for each question. Please use your own words. 

  1. What is the overall aim of the research being presented?
  2. Are the aims of the research and the results of the data clearly and concisely stated in the abstract? Provide a summary of the abstract.
  3. Does the introduction provide sufficient background information to enable readers to better understand the problem being identified by the Authors? Provide one example.
  4. Have the Authors provided sufficient evidence for the claims they are making? Provide some examples.
  5. Provide at least 3 examples from the literature review section.
  6. What was the methodology used in this journal? Be specific.
  7. The conclusions should match the data being presented. Provide some examples presented in the paper that support the conclusion.
  8. Discuss the implications of this research.
  9. What was the main contribution of this research to the body of knowledge?
  10. What additions or research questions would you add to this journal?

Please copy each question below and provide your answers:

Week 12 assignment

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

10_Imoprtance of strategic IT planning

Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

Include at least 3 scholarly references in addition to the course textbook.  At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

  • Be approximately 2-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Assignment

1. There are n marble balls, one of which is made of a different material. You have access to a Comparator that can compare two inputs (of an arbitrary number of marble balls) and determine if the two inputs are the same or not. The problem is to find the single marble ball that is different from the others while minimizing the number of times you access the Comparator. Design an efficient algorithm based on prune-and-search to solve the problem. Derive the time complexity of your algorithm.

2. Exercise 14.3-6 (page 354). Use an example to demonstrate your augmented data structure and operations.

(14.3-6 Show how to maintain a dynamic set Q of numbers that supports the operation MIN-GAP, which gives the magnitude of the difference of the two closest numbers in Q. For example, if Q D f1; 5; 9; 15; 18; 22g, then MIN-GAP.Q/ returns 18 15 D 3, since 15 and 18 are the two closest numbers in Q. Make the operations INSERT, DELETE, SEARCH, and MIN-GAP as efficient as possible, and analyze their running times.). This is the exercise question 14.3-6 as mentioned above.

Business Intellegence

Discussion: What are the common business problems addressed by Big Data analytics?  In the era of Big Data, are we about to witness the end of data warehousing? Why? 

 Questions: 1. What is Big Data? Why is it important? Where does Big Data come from? 

2. What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be? 

3. What is Big Data analytics? How does it differ from regular analytics? 

4. What are the critical success factors for Big Data analytics? 

5. What are the big challenges that one should be mindful of when considering the implementation of Big Data analytics? 

Exercise:  At teradatauniversitynetwork.com, go to the Sports Analytics page. Find applications of Big Data in sports. Summarize your findings 

Order # 9200

Title:

Conflict

Paper type

Coursework

Deadline

12th Nov 2017 @ 19:36:25 PM … ( Elapsed! :: -1079 Days, -6 Hrs, -55 Min )

Paper format

APA

Course level

Undegraduate

Subject Area

Technology

# pages

1   ( or 300 words Minimum)

Spacing

Double Spacing

Cost

$ 4

# sources

4

Paper Details

Reference: Pluralsight video “Conflict Resolution in the Workplace” by Stephen Haunts

Research a current domestic or international conflict in the cyber domain.

As a way of checking for your understanding of the nature of conflict as described in the video, write a 1/2-page to 1-page methodology for resolving the conflict using Microsoft® Word that addresses the following:

*Identify the reason for the conflict and the opposing forces

*Accurately identify the key political figures that impact the outcome or resolution of the conflict

*If you were involved with the resolution of the conflict, what style of conflict resolution would you use–the competing shark, the collaborating owl, the avoiding turtle, the accommodating teddy bear, or the compromising fox–and why?

*Do you think in our current political environment we may take the easy way out and try to sweep the conflict under the rug?

*There is one simple widely used method to resolve common conflict that goes by the acronym DESC that stands for Describe, Express, Specify, Consequences. Do you think this method could be used to resolve the conflict you identified? Do you think methods for conflict resolution in the workplace are the same as geological conflicts? Why or why not?

Submit your assignment using the Assignment Files tab.

QUANTITATIVE Journal Article Review

 

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References  

Discussion

  

1. How does prescriptive analytics relate to descriptive and predictive analytics?

2. Explain the differences between static and dynamic models. How can one evolve into the other?

The above assignments should be submitted in one-word document. Include an APA cover page and a reference page.