InfoTech in a Global Economy 3.1

 Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing.  

 

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

 

  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Threat Assessment

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words.

Use your own words.

Discussion (300 words)

DESCRIBE IN LAYMAN’S TERMS, WHAT DIFFERENTIATES POSITION Software Developer Engineer in Test(SDET) FROM OTHER RELATED POSITIONS THAT DO NOT REQUIRE A BACHELOR’S DEGREE

Also few words on training (INSERT DESCRIPTION OF TRAINING) that requires for role like Java, SQL, Cloud knowledge.

QUALITATIVE Journal Submit Article Reviews Here

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References   

Discussion Question

Take a position on the ethical concerns raised by employees who are upset about organizations monitoring their e-mail or Internet access for security purposes.

  • Assess whether you believe it is fair for an employee to undergo this type of surveillance.
  • Suggest an alternative approach for an organization to control security without monitoring employee actions.

Essay on Indigenous Literature

you can find the documents below please write an essay on the poem I am home again and also on the uses of indigenous literature please follow every instruction.

 Word Count: 500 words Style and Format: The paper should be formatted according to MLA style guide (https://owl.purdue.edu/owl/research_and_citation/mla_style/mla_formatting_and_style_guide/m la_sample_paper.html ). Please type it in Times New Roman 12 font. Description Focusing on the poem “I am Home Again”, write an essay that highlights how Indigenous poetry play an important role in the construction of an aesthetic identity and culture for the Indigenous communities of Canada in the 21st century. Refer to the essay “The Uses of Indigenous Literature” to illustrate/ elaborate on the social function of Indigenous literature. Add a Works Cited page at the end of your essay and include both the poem and the essay in this list. Writing Hint In the introduction clearly identity the topos (of the poem). You should also have a clear thesis statement in the introduction that addresses the following question: Home does the poem “I’m Home Again” create an aesthetic identity for the Indigenous communities of Canada? This would be the working thesis which should be revised once the first draft has been prepared. The body paragraphs should highlight the specific devices (imagery/refrain/personification/symbolism/metaphor/analogy) addressed in the thesis. Ensure that your topic sentences are clear and specific and each paragraph is developed around the specific topic sentence. Dedicate one body paragraph to discuss how the poem can be read in light of the points discussed in the essay “The Uses of Indigenous Literature”. Your body paragraphs should use quotations from the poem. Try not to use quotations in the introduction or the conclusion. 

Paper

Discussion Question #1: Discuss the difficulties in measuring the intelligence of machines.

Exercise #4: In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI? View the video and summarize the advice given to the major issue discussed.

Exercise #5: Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at https://www.youtube.com/watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

Exercise #15: Explore the AI-related products and services of Nuance Inc. (nuance.com) Explore the Dragon voice recognition product. Write a report. (limit to one page of analysis for exercise 15).

Creating a Resource List

 

Complete a three to four-page report with APA cited references to support your work. Please submit your work using this table as an example. You may add or remove additional columns as needed. 

Create a resource list to use to learn about the most current security attacks. You may use resources you have learned about in this course and in your text  (pg 121) as a start to your list of online sites, but don’t forget to include people, user groups, networking resources too. Suggest ways to share information within your own IT department so that the helpdesk and other IT professionals become aware of issues and concerns quickly too.