Homework

This week’s reading centered around how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations. For this week’s research assignment, you are to search the Internet for other uses of Big Data in RADICAL platforms. Please pick an organization or two and discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities. Be sure to use the UC Library for scholarly research. Google Scholar is the 2nd best option to use for research.
Your paper should meet the following requirements:
• Be approximately 3-5 pages in length, not including the required cover page and reference page.
• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations.  The UC Library is a great place to find resources.
• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Project-new

  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses: 

· Financial (Bank, brokerage, Insurer, etc.) 

· Hospital/Medical Services 

· Pharmaceutical/Chemical 

· Social Media Company 

· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.) 

· Manufacturer (Automobile, Computer, Consumer Electronics, etc.) 

Respond to the following:

· Identify the business type you have selected for your paper.

· Provide a brief overview of the business

· Provide the goals and approach to the project

· Architectural diagrams and annotations 

Submission

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. 

Check your work and correct any spelling or grammatical errors. 

Include at least two APA most recent references.

Cyber security Research paper

  

The Research Report, select one of the following research areas:

i) Cyber Security and INTRANET Cloud Computing 

ii) Cyber Security and EXTRANET Cloud Computing 

iii) Cyber Security and Machine Learning

iv) Cyber Security and Artificial Intelligence

v) Cyber Security and Internet of Things (IoT)

vi) Cyber Security and Robotics

vii) Cyber Security and Medical Technology

Discussion question CIS

Want to know what movies are showing? Need to find a new place to eat? Kids need help with a school project? Have to fix that leaky faucet yourself? With the internet, the answer is just one click away…ok, maybe two or three clicks (or swipes), but it’s there. The internet has made it far easier to solve problems of all types, big and small.

What types of problems has the internet helped YOU solve? Choose one of the topics below. Then, identify a problem you faced and explain how you were able to solve it using resources available on the internet.

  1. Personal Development and Improvement
  2. Do-It-Yourself
  3. Entertainment or Travel
  4. Workplace or Job Hunting

20210112

  

Data Base Security:

1) Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

2) Write an essay of at least 500 words discussing discussing IAM in a federated cloud application. 

3) Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use. 

4) Write an essay of at least 500 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies? 

5) Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

6) Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

7) Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

8)   Learning About Cookies as Spyware. Research what kind of information cookies store. You might find the following  websites helpful:

www.allaboutcookies.org/

www.howstuffworks.com/cookie1.htm

Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.

Discussion

List and briefly describe the process you would take to conduct test the security of a firewall?

** Do NOT write an introduction, rather just answer the question noted above **

Note: The essay should be one-page at most (double-spaced) and should include an APA cover page and at least two references (academic or professional literature) in APA v7 format as well as the in-text citation.

8 pages article about artificial intelligence and business

The theme is Artificial Intelligence (AI) and Business. For this assignment, you must think about the future of business, considering current trends toward automation of business processes. You must research current trends and summarize your research as a report. Also the structure of this assignment has been attached.

Complete the following assignment in the Information Technology and Organizational Learning textbook:

  • Chapter 6 – Review the section on knowledge creation, culture, and strategy.  Explain how balance scorecards impact knowledge creation, culture, and strategy.  Why are these important concepts to understand within an organization?

Complete the assignment using narrative paragraphs and explain your thoughts and findings in detail. Adhere to APA format requirements and do not use lists or bullets. Use Times New Roman 12 font, double-spaced. Include a coversheet with your name, class ID and the title of the assignment. Your submission needs to be at least one page in length. The coversheet, figures, tables, and reference list doesn’t count toward the page count. Post the assignment as one MS Word document by the due date in the syllabus. Do not submit any other format such as PDF. Please provide and cite two references IAW APA.

Research Paper

Step 3: complete a report based on your understanding of the Quality Data Model (QDM).

Download and read a document on Quality Data Model (QDM). Focus your reading on sections 1.1-1.5, and 2.1 – 2.8.

Tasks: Write a report that contains your answer to the following questions:

1. Why a quality data model is needed? Explain QDM’s importance in healthcare information system using examples you have seen or discussed in this Module’s required readings. (10 points)

2. Figure 1 in section 2.5 shows an example QDM element structure on the left. The diagram to the right is an example of QDM element called “Laboratory Test”. Suppose you are member of an interprofessional team working a quality health database project for a hospital. Explain how you would design a database table to store data containing in the ODM element “Laboratory Test”. For example, what is the name of this table? What are the columns to include in this table? (10 points)

3. Suppose the same database contains other tables describing ODM elements such as Doctor, Patient, Medication, Pharmacy, Pharmaceutical Company, etc. Describe ONE scenario where you can use this database to address questions related to QDM element “Laboratory Test”.  (40 points)