Assignment

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

s5

Case study Discussion questions

   1. Which documents should Maria read before her class?  

2. Based on what you know about ISO 27000 program certification, what are the major  steps of the process Maria will have to oversee? 

Second under Ethical Decision Making, answer the following questions:

  • Should Linda’s history of past improprieties lead Maria to withdraw her support and replace her without giving detailed reasons to Iris?
  • Should Maria’s ethical responsibility to the company lead her to give a full report of her concerns to Iris?
  • Should Maria’s ethical responsibility to Linda lead her to keep these concerns to herself and allow the recommendation to stan

 

  • Assignment Format: APA format
  • Submission Format: MS Word
  • Length: Minimum 250 words per question 
  • Citations Required: 1 – 2 scholarly citations minimum 

Need 750+ Words With No Plagiarism And 2+ Scholarly References In APA Format

We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide outside schoarly sources (for example, an article from the UC Library https://www.ucumberlands.edu/library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

Discussion with 500 words

 

Read three articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.

Use at least three sources.   Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. 

Write in essay format not in bulleted, numbered or other list format

week 2 data science

 

Week Two Assignment: R studio

Chapter 5 from the Hands-on Programming with RSubmit a fully documented and executed R-Markdown (“knit” as pdf / word or html) file R program replicating the code from the following sections of chapter 5:5.1, 5.3, 5.4, 5.7, 5.8Replicate and run every line of code listed in the above sections in R studio on your own machine.Please note that all code assignments must be submitted as a screenshot with a slice of your desktop showing the timestamp.If the time and date are not visible, you will be graded 0.Put the screenshots in a word document, make sure to comment the code (explain what it does)  and interpret the graph if applicable(explain what its depicting)All assignments will go through SafeAssign. Your score should be less than 30 and you will only be allowed 2 attempts. Please email your instructor if you have any questions. 

IMPACT OF IT =9

 

To conclude this course, we cover professional ethics as it relates to technology. Additionally, we specifically address ethics as it relates to computer professional. This is due to the amount of private, sensitive, and proprietary information they have access to.

Pick a scenario below and post your reply by Wednesday at midnight. Your response should be at least 300 words and appropriately cites your resources.

Respond to two of your classmates by Sunday at midnight. Your responses should be at least 150 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

You will not be able to see your classmates’ posts until you make your first post.

  • Scenario 1
    • Your company is developing a free email service that will include targeted advertising based on the content of the email messages (similar to Google’s Gmail). You are part of the team designing the system. What are your ethical responsibilities?
  • Scenario 2
    • As part of your responsibilities, you oversee the installation of software packages for large orders. A recent order of laptops for a local school district requires webcam software to be loaded. You know that this software allows for remote activation of the webcam. What are your ethical responsibilities? What would you do?
  • Scenario 3
    • Three MIT students planned to present a paper at a security conference describing security vulnerabilities in Boston’s transit fare system. At the request of the transit authority, a judge ordered the students to cancel the presentation and not to distribute their research. The students are debating whether they should circulate their paper on the Web. Imagine that you are one of the students. What would you do?

Assignment: Development Plan for Three Skills

What to submit/deliverables: Word document that contains the Week 9 Assignment Template.

What is the value of doing this assignment? For the last nine weeks, you’ve been learning how the 10 Skills are an essential part of being successful in the future world of work. In Week 4 Assignment, you began to reflect on your skills and goals and how the 10 Skills have helped you reach accomplishments. Your understanding of the skills has been refined, and now it’s time to reflect on your strengths and areas for growth again in order to develop a plan moving forward.

For this assignment, you’ll identify three skills that you’d like to focus on and develop a plan for. This could be the three skills you wrote about for Week 2 Assignment or three new skills. As you think of which skills you’d like to improve upon, consider choosing skills at varying levels. You might, for example, choose a skill that you are already strong in, but would be excited to continue exploring and building upon, as well as a skill in which you might have more room for growth. At the end of the assignment, you’ll leave with the beginning of a tangible plan for personal and professional development that you can review with the Career Center team.

Your goal for this assignment is to: Practice your communication skill by using the Week 9 Assignment Template to outline a plan for developing skills to support a successful learning experience and career. To truly develop your communication skill it is important that you write using your own words and do not cut and paste from the Skills Definition table or any other source. (See the Skill Development Plan Sample .)

Steps to complete: In Week 9, complete and submit your Development Plan for Three Skills using the following steps:

STEP 1: Identify the targeted skill. Summarize your strengths and areas of improvement in this skill area. Then, identify your desired outcomes around this skill area and write a positive goal statement. Review the Skills Definition table if you need a quick reminder of the 10 skills. Complete the following sections of the template:

• Target Skill
• Strengths
• Areas of Improvement
• Desired Outcome
• Goal Statement

STEP 2: Specify the actions you can take to work towards your goals, with specific strategies and practices that you can apply. Identify any potential obstacles and challenges to achieving your goal. Complete the following sections of the template:

• Practices for Growth
• Action Steps
• Potential Obstacles and Challenges

STEP 3: Keeping your action plan in mind, identify trusted supporters and university resources that can help you in your skill development plan. Complete the following sections of the template:

• Key Supporters
• Supporting University Resources

STEP 4: Reflect on the connections between skill development and your overall personal, academic, and professional goals. Complete the following sections of the template:

Benefits From Change and Connections to Personal, Academic, and Career Goals.

STEP 5: Complete Steps 1–4 for the two other skills you have identified. When you are done you should have three plans filled out in the template for three different skills.

OE

 

2.  Search the Internet to find examples of how intelligent

1.  we focus on the various maturity stages and variables in the middle manager best practices arc.  Refer to chapter 12 from this week’s reading and not the various stages, what they are and why they are important. 

1 page

 2. Review the section on the definitions of maturity stages and dimension variables in the CEO Technology Best Practices Arc.  Define each of the maturity stages and performance dimensions.  What are the key concepts from each section?  

1 page

Research Standards

 Standards Organizations may be used for reference to complete this assignment. 

Instructions

Write a fully developed paper in which you: 

  1. Select one of the working groups in the IETF or IEEE and briefly summarize what this group is working on.
  2. Justify the need of the IEEE 802 standard used in networking.
  3. Evaluate the three standard organizations including IEEE, ISO, and  ANSI to determine the most important for communication technology.
  4. Take a position on the need for a federal regulating body of standards such as NIST. Include supporting evidence to justify your opinion.
  5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.