5-1 Discussion: E-Commerce

 In this module, we have explored the surge of e-commerce and the escalation of online contracts. How has the evolution of the internet piloted the growth of e-contracts? With the implementation of legislation, the Electronic Signatures in Global and National Commerce Act (E-SIGN Act) and the Uniform Electronic Transactions Act (UETA), what is the impact and significance of digital signatures in cyberspace?

Finally, in responding to your peers’ posts, discuss the validity of e-contracts within an information technology business model. What are the boundaries of e-contracts? Offer suggestions on how your peers can protect contracts that fall outside the boundaries. 

Discussion 4

 

in  this module, we will discuss network forensics. We move away from  cellular/smartphone discovery and look at wired and wireless  investigation. We will use the European Union Agency for  Cybersecurity’s Introduction to Network Forensics guide. The document is available at:

https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/documents/introduction-to-network-forensics-handbook.pdf

For the discussion, answer the following questions:

1) What types of network investigations are typical of those that fall under the topic of network forsensics?

2) How is information acquired from the various types of networks?

3) Describe several tools for network forensics and how the tools function? 

Your  response to the DQ must be a minimum of 400 words. You must provide  references for your response (APA format). You will need to reply to two  (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.

blockchain

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

  • Be approximately 2-3 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

700 words: Leadership

  1. Discuss Howell and Mendez’s three perspectives on followership.  Note how these behaviors influence work productivity.
  2. What is the big five personality model?
  3. What is the Myers-Briggs test?  How is it similar to the Big five model?  How is it different than the Big five model?

Write an essay for 500 words on topic placed below ?

Investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.

Incident Response Cloud

 

Discuss in 500 words or more the best practices for incident response in the cloud.

Cite your sources and APA format. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Discussion help

After reading Chapter 8 discuss the importance of the personnel assigned to the Disaster Recovery Team and their role.  You can use outside research, or your personal work experiences as your basis for discusson.

Note – attached text book

Machine learning Project

Machine Learning Course Project 

 

 This course project is an opportunity for you to explore a machine learning problem of your choice. 

 There are many datasets out there. UC Irvine has a repository that could be useful for you project: 

  using this link (http://archive.ics.uci.edu/ml/index.php)

Project guideline

**Classifier Implementation 

Implement a classifier or classification algorithm. It can be any classification algorithms we learned or have not learned in the class. 

1. Project Proposal should be 1 page long and Include the following information: 

-Project title; 

-The name of classifier or classification algorithm that you will implement; 

-The programming language you will use; 

-The format of training data you will use, i.e., the source of data set, the attributes’ types, the range of attributes’ values, the size of training set, etc. 

2. Project Report should be maximally 8 pages long and be written by using this link( https://nips.cc/Conferences/2020/PaperInformation/StyleFiles) 

and Include the following information: 

-Abstract 

-The description of implementation process, such as flowchart, functions, pseudocode, or partial codes;

-The description about 1) using training set to build the classifier, and 2) applying the classifier on a small amount of test instances. That is to show how your classifier works, as well as the training errors and test errors. 

-Conclusion 

3. Presentation (10 ~ 20 pages)

-Explain the source code files; 

-Present how your classifier works; 

-Evaluate your classifier.