Ethical Obligations in Information Security Proposal

Students will develop privacy policy and protocols for a highly regulated organization in the United States that will have a mix of remote, work from home, and multiple business offices. The privacy policy will need to address all work locations in support of the privacy of confidential information. Consider elements such as shared workspaces in the home and workplace, printing, telephone conversations, use or personal devices (computers and phones), access to the internet, etc.

Case scenario

 

Case scenario. An HU Investment Firm employee who had signed a non-disclosure agreement at the time of hire was identified as posting corporate protected information on the internet which has led to a loss of corporate income and trust of the companies that the corporation represents and does business with. The corporation has taken the incident to a Law firm in an attempt to lead to prosecution against the employee who has since been fired.

Write a Summary Report to the Prosecutor based on the case scenario and your work in previous units.

1. Applicable laws and policies that relate to cyber defense

2. Describe the major components of each pertaining to the storage and transmission of data.

3. Describe the responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues.

4. Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.

5. Support your report with documents that you have created previously, such as the Risk Assessment Report and the Mitigation Plan. 

Remember to use a professional writing style and support your statements with logical evidence. 

Final Research Project

  

Data Analysis and Data Mining

As more and more people are becoming connected over the internet and are also becoming more and more dependent to technology, the level of data that happens to be developed over time has been on a gradual rise since the internet and tech boom in 2002*. This sudden increase in data has resulted in various forms of data being developed. One of these forms is known as data analysis where as the other happens to be data mining. These two concepts can closely be assumed to relate, however, this is never the case since these two concepts happen to be rather different in a large number of ways.

For instance, data analysis happens to deal with the extraction, cleaning, transformation, remodeling, visual representation and grouping of data into information that can be consumed and used in making decision or coming up with a particular conclusion. Thus, this does point out that data analysis is mainly used for the main purpose of making sense of complex data that is yet to be processed into understandable information (Zaki & Meira, 2014). Data analysis also happens to be used in testing hypothesis, this results in placing data analysis in being used in statistics, mathematics as well as computer science based structures as a means of deriving a set of findings or conclusions from collected data. 

On the other hand, data mining does happen to follows some principles of data analysis and can be grouped under data mining, however, data mining happens to be the extensive exploration and evaluation of large amounts of data with the purpose of retrieving or identifying a hidden pattern in a large data set. Data mining is also used in developing machine learning and AI system models that happen to be used in conducting effective data analysis. data mining is also known as information discovery since it ends up looking at various sets of data and attaining a fixed finding from the data set presented (Zaki & Meira, 2014). Data mining is also used in a large structure of data that contains immense complexities since it does not require visualization as a result of its initial purpose of making data usable, that is, turning raw data into valuable information.

References

Zaki, M. J., & Meira, W. (2014). Data mining and analysis: fundamental concepts and 

algorithms. Cambridge University Press.

Emerging concepts that are using Big Data and Blockchain Technology

The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 6-8 pages long, including both a title page and a reference page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Impact of IT week 2

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources.

Respond to three of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

Discussion_Grading_Rubric_Final (2).docx

Grading_Late_Discussion-1 (3).docx

Topics:

  • What is freedom of surveillance? How does it apply to you at your place of employment? Are there exceptions?
  • What is an inadvertent leak of information? How has it affected the adoption of technology?
  • How do businesses benefit from search engines?
  • Should we allow facial recognition at sporting events? What about shopping malls?
  • How much should a user post on social media? Why?

Practical connection paper

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. 

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

NOTE: I am working as a Software Developer in and Insurance company. Please relate the skills and theories that have applied of this course in the current work. 

Decision Support system

 

1. Find examples of  an applications for each of the following: decision support systems (DSS), business intelligence (BI), and analytics. Summarize the applications in 300 words. Include a list of resources you used. (10 points) 

2. Identify the future of analytics in healthcare? What will it be used for and what are some expected outcomes. (300 words)

3. What role does and should IBM Watson play in healthcare? Are there significant findings that Watson assisted in obtaining?  (300 words)

 

How will artificial intelligence (AI) improve your business? What advise would you give managers and executives about using AI?  (300 words)

2. What are the major drivers of AI? Are there any impediments your organization needs to be aware of? Are there any reasons organizations should avoid using AI? (300 words)

3. Identify a voice recognition software and explain some of the applications. What type of processing is used for voice recognition? What are some of the issues still with voice recognition? (800 words).

The above assignments should be submitted in one-word document. Include an APA cover page and a reference page.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

Discussion

 

In 250 words or more, please answer the following. Include references and citations when/if applicable 

  1. What enterprise resource planning (ERP) systems are in use by your company? 
  2. What modules are in use in each ERP?
  3. How did the company justify more than one ERP, if applicable?