Methodology plan

 The goal here is to outline how you would conduct your research to answer the research question.  

 

Directions: 

  1. Review your notes from class on the different methodologies and instruments used to measure. Also, review the examples via the links here Approaches Expectations, Meets Expectations, Exceeds Expectations.

     

  2. Develop a 3-4 page methodology section that includes the following:
     

    1. Introduction 
       
    2. Research Paradigm (qualitative or quantitative) 
       
    3. Research- or project- Design 
       
    4. Sampling Procedures and or/
       
    5. Data Collection Sources (reference Informed Consent and IRB approval placed in Appendices) 
       
    6. Statistical Tests Summary (quantitative) OR Data Organization Plan for Qualitative
       

End search 1

Research project manager’s positions and please post the following. Please do not copy and paste from web sites.

  1. Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area. 
  2. In your opinion was any of the information that you uncovered in your search interesting or surprising?

Bad implementation of Database

Describe, in 350 words, an example of a very poorly implemented database that you’ve used or know that illustrates the potential for really messing things up. Explain an analysis of what might have caused the problems and potential solutions for them.

5s week 10 assignment PL

Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, eliminates their jobs in a process called ‘ Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contractor under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship between BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Include references, do not copy paste. Use your own words.

Data Science

How do you reconcile the “learning and experimentation” model of development-test-measure with developing relevant for on-time digital personalization?

Research paper

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion

Engaging recent (Past 5 years) scholarly research, outline and discuss the top 5 factors driving Information Security Governance today.

short answer

 

  • Differentiate between the Browser Object Model and the Document Object Model (DOM). Recommend three DOM methods that you believe are essential to an effective and efficient website.
  • Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.