Executive Program Practical Connection Assignment

It is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own careers.

Assignment:

Provide a reflection of at least 500 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of this course   Cryptography have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories, and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Machine learning

 Exp#1: Develop a system based on two-class Support Vector Machine (SVM) that can predict if the subject will purchase iPhone. Dataset: 

https://github.com/omairaasim/machine_learning/blob/master/project_11_k_nearest_neighbor/ip hone_purchase_records.csv

Training/ Test Split: 75-25 

Exp#2: Develop a voting classifier based on Decision Tree, Logistic Regression and SVM. 

Chat application demo (using Angular and spring)

I want to demo real time chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse

1. user can signup and login and chat with each other (one to one chat for example facebook)

2. web page design is not needed.

3. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.

4. all configuration for spring should be in xml based whatever required.

5. it should be work in windows 10.

Tableau project

The purpose of this project is to give you experience working in Tableau to build interactive dashboards. The data provided comes from LendingClub.com. Each row represents a $25 investment (called a “note”) in a loan. You have a lot of information about each note and the borrower – a majority of which you will not need. A data dictionary is provided, though it appears to not cover everything in the data. If you are unsure about something, make an assumption and proceed. You can go any way you want with this data to show anything you think is worth looking at. I encourage you to be creative. You will be graded on the overall quality of your resulting dashboard and work completed. Submissions SUBMIT A .TWBX FILE, NOT A .TWB FILE! You can do this via File – Save As – and selecting Tableau Packaged Workbook (TWBX) as the file type. 

Research Paper: ERM Strategy & Discussion

1. **Research Paper**

Discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.

 paper should meet these requirements: 

Be approximately to six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

2. **Discussion**

Do you think that ERM is necessary in the contemporary organization and why?

Exercise and Practical connection

Discussion:

This week we focus on globalization concepts.  Please explain the concept of globalization and the role information technology has in the global market.

Short answer questions:

  1. What does the term globalization mean?
  2. How does Friedman define the three eras of globalization?
  3. Which technologies have had the biggest effect on globalization?
  4. What are some of the advantages brought about by globalization?
  5. What are the challenges of globalization?
  6. What perspective does Ghemawat provide regarding globalization in his book World 3.0?
  7. What does the term digital divide mean?
  8. What are Jakob Nielsen’s three stages of the digital divide?
  9. What was one of the key points of The Rise of the Network Society?
  10. Which country has the highest average Internet speed? How does your country compare
  11. What does the term information systems ethics mean?
  12. What is a code of ethics? What is one advantage and one disadvantage of a code of ethics?
  13. What does the term intellectual property mean? Give an example.
  14. What protections are provided by a copyright? How do you obtain one?
  15. What is fair use?
  16. What protections are provided by a patent? How do you obtain one?
  17. What does a trademark protect? How do you obtain one?
  18. What does the term personally identifiable information mean?
  19. What protections are provided by HIPAA, COPPA, and FERPA?
  20. How would you explain the concept of NORA?
  21. What is GDPR and what was the motivation behind this regulation?

    Execercise:

    1. Compare the concept of Friedman’s “Globalization 3.0″ with Nielsen empowerment stage of the digital divide

    2.  Provide one example of how information technology has created an ethical dilemma that would not have existed before the advent of I.T.

  • Chapter 9 – Review the section on Establishing a Security Culture.  Review the methods to reduce the chances of a cyber threat noted in the textbook.  Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization.
  • Chapter 10 – Review the section on the IT leader in the digital transformation era.  Note how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate.  What are some methods or resources leaders can utilize to enhance their change attitude?

    Practical connection test (3pages for sure) 

This week select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence.  In this paper, perform the following activities:

  • Name the organization and briefly describe what good or service they sell and where they operate.
  • Note how they are a differentiator in the market.
  • Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).
  • Explain what actions the company took to achieve operational excellence.

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work.

Access Control – Laws

 Select two Laws and Regulation and compare and contrast them, along with the ramification to business.  

500 words. APA reference needed.

5s week 11 assignment BS

In 300 words

Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration testing.

Include References, do not copy paste strictly.