Mining

 

Using search engines, find two different recent  articles involving data mining. Describe the role of “data mining” in  the story using your own words.

Here is an example of an article:

12:00 AM, January 07, 2018 / LAST MODIFIED: 12:00 AM, January 07, 2018 New police unit to check cyber crime
Social media users to face stringent watch; police can detect users quickly 

Be sure to cite your sources.  Initial posts should contain at least one APA reference and associated in-text citation.

DS-3

In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc.

Use at least three sources.  Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.

Data collection technique

Background: As noted by Kirk (2016), working with data is one of the four stages of the visualization workflow.  According to Kirk (2016), “A dataset is a collection of data values upon which a visualization is based.” In this course, we will be using datasets that have already been collected for us. Data can be collected by various collection techniques.

Reference: Kirk, Andy. Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.

Assignment: Summarize 3 data collection techniques (Interviews, Surveys, Observations, Focus Groups, etc.). Compare and contrast the 3 data collection techniques you selected. Lastly, what collection techniques do you prefer and why?

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

 

System  architecture is the descriptive representation of the system’s  component functions and the communication flows between those  components.  

My definition immediately raises some important questions. 

• What are “components”? 

• Which functions are relevant? 

• What is a communication flow?   

research writing

 1) Write and submit a paper on the topic “Cryptography and the Internet of Things” 2) The submission should be written in IEEE Proceedings Manuscripts style: two columns, single-spaced. You may find a template file at URL: http://www.ieee.org/web/publications/authors/transjnl/index.htm1. It should not be more than 2 pages long (including references and figures) and should contain an Abstract, Introduction, Main Body and Conclusion section at the minimum. 3) Anyone who reads the paper should be able to find answers to the following questions. a. What is the Internet of Things (IoT) and how does it change the dynamics of security in cyberspace? b. What are the classes of devices that run on the IoT and what are their security needs? c. What are lightweight cryptographic algorithms and why are they needed in the IoT space? d. What are the classes and approaches for creating lightweight cryptographic algorithms? e. How to evaluate lightweight cryptographic algorithm? Provide a brief evaluation of at least 3 lightweight cryptographic algorithms. 4) Your paper should also have a. At least 4 references b. At least 2 of the following, a graph, a table or a figure. If you choose to include a graph or a figure you must create them yourself. Do not copy images directly from another source 5) Copying the sentences directly from your references or other sources into your paper is plagiarism. Ensure that you write your paper using your own words. 6) Your submission will be judged based on the following criteria: Format/Organization Content Clarity Technical Depth Originality 

Security Design principles

After  reading chapter 1, compare and contrast two fundamental security design  principles. Analyze how these principles and how they impact an  organizations security posture.You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.

Page 34-37 serves as good introduction to the topic

ERM Week 2

Q1.  275 words

Enterprise Risk Management Integrating with Strategy and Performance Executive Summary. (2017, June). Retrieved from https://www.coso.org/Documents/2017-COSO-ERM-Integrating-with-Strategy-and-Performance-Executive-Summary.pdf

Do, H., Railwaywalla, M., & Thayer, J. (2016). Integration of ERM with Strategy (p. 35). Retrieved from Poole College of Management, NCSU website: https://erm.ncsu.edu/az/erm/i/chan/library/Integration_of_ERM_and_Strategy_Case_Study.pdf

  • Which case study in the paper among above two was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Q2. research paper – SEPARATE Document – 5 full pages

  Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. Your paper should meet these requirements: 

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.