Discussion 3- Access control

Cost benefit analysis hypothetical situation.  Select an access control based on a hypothetical situation and justify the cost based on the risk .  Some example situations could be implementing multi-factor authentication for an email system or a badge reader for a data center (feel free to get creative).  APA formatting is expected for any references.  Initial posts due by Thursday end of day and two peer responses due by the end of the unit.  

ME-12

 

1) Describe the purpose of the balance sheet and how this information is useful to the stakeholders of the corporation.  

2) Please describe the information presented on the statement of cash flows.  Why is this information important for the stakeholders of a corporation?  

WK-2

  

Assignment 1

Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.

Refer to Chapter 3 in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

Requirement: 

****Separate document for each assignment.****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add references separately for each assignment question.

Double Spaced and APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Assignment 2:

What are the privacy issues with data mining? Do you think they are substantiated?

Refer to Chapter 4  in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Requirement: 

****Separate document for each assignment.****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add references separately for each assignment question.

Double Spaced and APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Project Assignment

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • What are the principles and limitations to an individual’s right to privacy?
  • What are the trade offs between security and privacy?
  • What is the issue of freedom of speech versus the protection of children online?

Due: Assignment is due on the day stated in  the Course Schedule

  • Provide three articles to substantiate the above three questions.
  • Use APA format to provide a citation for each of the articles you read.
  • Suggestion: Use a search engine (Google) and keywords.

Discussion Board Forum 3

 

Topic: Evolution of Attack Tools

Despite the fact that system and network administrators are becoming more diligent about protecting their systems from attack, attack methods have become more and more sophisticated and so more effective. How have these attack tools evolved?

Your thread is due by 11:59 p.m. (ET) on Thursday, and your replies are due by 11:59 p.m. (ET) on Sunday.

Research Paper: Server Virtualization and Cloud Computing

Research Paper: Server Virtualization and Cloud Computing

This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

its531_wk2analysis

4. In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. (Note: This is a class project.)

5. Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

15. Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recogni-tion product.