Define Group Potency and importance.
Research Paper
After reading the required articles this week, please write a research paper that answers the following questions:
- What are mobile forensics and do you believe that they are different from computer forensics?
- What is the percentage of attacks on networks that come from mobile devices?
- What are challenges to mobile forensics?
- What are some mobile forensic tools?
- Should the analysis be different on iOS vs Android?
Your paper should meet the following requirements:
- Be approximately 4-6 pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Writing
Heinrich Koch is a second-year college student. Last semester his best friend had his laptop stolen. The laptop was an old computer that he planned to replace soon, but the greatest loss was his data: he had not performed a backup and all his data was lost. Heinrich himself does not perform data back-ups but knows that he needs to do that on a regular basis. He has decided to use an online backup service that will auto-matically back up his data whenever it changes. Evaluate and compare reviews of online backup services. Consider iDrive, Carbonite, Acronis True Image, BackBlaze, and others you might find in your research. Recommend a service that you consider the best solution for Heinrich. Discuss your reviews and mention speed, security, and features in your recommendation.
Requirements:
- APA format, 3-4 pages in length (excluding cover page, abstract, and reference list)
- Minimum of 2-3 peer reviewed resources
- The paper must be 3-4 pages long. double space, and must have an introduction with a clear thesis statement, a body discussing the three main points and a conclusion
- Conduct research to find relevant information using reliable sources to support your views; Use at least 2-3 peer review resources
- Use APA Style for in-text citations, and references
Data Science
Classification: Basic Concepts
Decision Tree Induction
Bayes Classification Methods
Rule-Based Classification
Assignment 4
1- Consider the data in the following table:
TID
Home Owner
Marital Status
Annual Income
Defaulted Borrower
1
Yes
Single
[120 – < 150K]No
2
No
Married
[90 – < 120K]No
3
No
Single
[60 – < 90K]No
4
Yes
Married
[120 – < 150K]No
5
No
Divorced
[90 – < 120K]Yes
6
No
Married
[60 – < 90K]No
7
Yes
Divorced
[120 – < 150K]No
8
No
Single
[90 – < 120K]Yes
9
No
Married
[60 – < 90K]No
10
No
Single
[90 – < 120K]Yes
Let Defaulted Borrower be the class label attribute.
a) Given a data tuple X = (Home Owner= No, Marital Status= Married, Income= $120K). What would a naive Bayesian classification of the Defaulted Borrower for the tuple be?
2- Consider the training example in the following table for a binary classification problem.
Customer ID
Gender
Car Type
Shirt Size
Class
1
M
Family
S
C0
2
M
Sports
M
C0
3
M
Sports
M
C0
4
M
Sports
L
C0
5
M
Sports
XL
C0
6
M
Sports
XL
C0
7
F
Sports
S
C0
8
F
Sports
S
C0
9
F
Sports
M
C0
10
F
Luxury
L
C0
11
M
Family
L
C1
12
M
Family
XL
C1
13
M
Family
M
C1
14
M
Luxury
XL
C1
15
F
Luxury
S
C1
16
F
Luxury
S
C1
17
F
Luxury
M
C1
18
F
Luxury
M
C1
19
F
Luxury
M
C1
20
F
Luxury
L
C1
a) Find the gain for Gender, Car Type, and Shirt Size.
b) Which attribute will be selected as the splitting attribute?
BSWP Week 4
Assignment on secure passwords.
Then pick and three passwords: one not secure, one acceptable, and one very secure. Then write a brief description of the passwords you have chosen, indicating why they are secure or not secure.
Post between 200 and 300 words.
Organ Leader & Decision Making (reflection)
This discussion topic is to be reflective of the course material. Therefore, use your own words to respond to the following questions:
1. What other topics would you have liked to have covered in this course?
2. What reading did you find most interesting and why?
3. How has this course changed your perspective or outlook moving forward?
4. Any other topic of interest that you would like to add.
Cloud Computing Research paper
For this project, select an organization that has leveraged Cloud Computing technologies to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.
- Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.
- Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
- Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
- Conclusion: Summarize the most important ideas from the paper and make recommendations or how they might have achieved even greater success.
- The paper must adhere to APA guidelines including Title and Reference pages.
- There should be at least three scholarly sources listed on the reference page.
- Each source should be cited in the body of the paper to give credit where due.
- Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.
- The body of the paper should be 3 – 5 pages in length.
- The Title and Reference pages do not count towards the page count requirement
Case Study – Filecoin
Please read the Filecoin case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.
Youtube link to get started: https://www.youtube.com/watch?v=EClPAFPeXIQ&feature=emb_logo
1. How did Filecoin conduct its ICO?
2. How is Filecoin’s ICO similar to and different from: a) an equity IPO? b) a crowdfunding initiative on, for example, Kickstarter, Indiegogo, GoFundMe?
3. What are the pros and cons of Filecoin conducting a fundraising through an ICO?
4. Why should investors be attracted to Filecoin?
5. Why should be wary of Filecoin?
6. Why are regulators encouraging or opposing ICOs?
7. What have some regulators done in response to ICOs?
Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page.
Pick one of the following for your Big Data Research paper?
Articles to read:
Marcu, D., & Danubianu, M. (2019). Learning Analytics or Educational Data Mining? This is the Question. BRAIN: Broad Research in Artificial Intelligence & Neuroscience, 10, 1–14. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=139367236&site=eds-live
Hariri, R.H., Fredericks, E.M. & Bowers, K.M. (2019). Uncertainty in big data analytics: survey, opportunities, and challenges. Journal of Big Data, 6: 44. https://doi.org/10.1186/s40537-019-0206-3
Question:
While this weeks topic highlighted the uncertainty of Big Data, the author identified the following as areas for future research. Pick one of the following for your Research paper:
- Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world.
- The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
- New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data.
- More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics.
- Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to tackle ML problems and uncertainty challenges in data analytics and process in recent years.
Your paper should meet these requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.