Design use case and activity diagrams and explain in detail in your report. Design one detailed class diagram and explain in detail in your report. Finalise and evaluate your advance prototype by following testing methods such as UX and UI surveys, pilot with a group of users and the run a survey etc.

Developing a More Accessible Website

 

1.Develop UML diagrams (use case, activity, and class diagrams

2.Finalise the app/website advanced prototype

3.Evaluate the advance prototype

4. Develop a presentation to present your final proposal (an accumulation of CW2 and CW3   material)

Requirements

 

  1. Design use case and activity diagrams and explain in detail in your report.
  2. Design one detailed class diagram and explain in detail in your report.
  3. Finalise and evaluate your advance prototype by following testing methods such as UX and UI surveys, pilot with a group of users and the run a survey etc.)
  4. Collect all information and designs from CW2 and CW3 and collate them together in one report.
  5. The report should have the following structure:
    1. Cover page (project idea name and name)
    2. Introduction
    3. Research based analysis to support your project idea
    4. Agile software development cycle (i.e., SCRUM).
    5. Design:
      1. Chosen program to develop your app or website and colour scheme
      2. Sitemap of mobile application or website
  • Sketches and Wireframes
  1. Mock-up designs (UX design and UX flows (functionality)
  2. UML diagrams (entity-relationship, use case, activity, class diagrams)
  3. Relational database diagrams
  1. Implementation (presentation / screenshots and explanation of clickable prototype)
  2. Evaluation process
  3. Development reflection (overall discussion, improvements, what went well and what went wrong)
  4. Project Management (did it work? What did you learn about the process? Discuss positive and negative experiences)
  5. Conclusion
  6. References

 

Write a fully developed paragraph for issue one. Explain at least two clear arguable sides to the issue. Explain how the issue relates to my field or degree. Explain at least two clear arguable sides to the issue.

Artificial Intelligence in modern society

My career goal is: mechanical and aerospace engineering or pilot
Identify two issues that are related to my degrees-computer science.
A. Write a fully developed paragraph for issue one(5-8 sentences each).
I. Explain at least two clear arguable sides to the issue.
II. Explain how the issue relates to my field or degree.
B. Write a fully developed paragraph for issue two(5-8 sentences each).
I. Explain at least two clear arguable sides to the issue.
II. Explain how the issue relates to my field or degree.

2. After exploring the argument related to the issues, take a moment to consider the bigger picture. Then, briefly reflect( in 1 to 2 paragraphs) on the importance of persuasion for the problem. Identify the potential audience and why your topic would be relevant to the issues.

What Concepts and Algorithms does it use? Give an introduction into Cypher and explain the most important cypher commands with examples. Compare qeury times against sql.

Neo4j

The paper needs to give an general introduction into neo4j https://neo4j.com/. When should someone consider using it. What Concepts and Algorithms does it use? Give an introduction into Cypher and explain the most important cypher commands with examples. Compare qeury times against sql.

Identify three advantages of using Python or R for data science and briefly explain your reasoning. Why is Python or R useful for Data Science? What are some of your favorite functions or libraries in Python or R?

R vs Python for Data Science

Prompt: Identify three advantages of using Python or R for data science and briefly explain your reasoning. Also include answers to the following questions:
Why is Python or R useful for Data Science?
What are some of your favorite functions or libraries in Python or R?
Compare Python and R and other data science languages you might already be familiar with, if any?

Once you have designed a thorough and detailed risk assessment for the company, create a network configuration on how to potentially mitigate the risks that you have identified.

Risk Assessment Analyst

You have been working in the field of network security, and are now a Risk Assessment Analyst. Your daily duties often are diving into networks, and performing on risk assessments to prevent application security defects and vulnerabilities from occurring.

One day, you received a work order showing an Insurance office network needing a risk assessment, since one was done over 10 years ago.

The insurance office network contains the following:

PCI/PCII
5 servers
4 2016 servers
1 2013 server
50 endpoints
45 Windows 10
5 Windows 7
2 branches
5 printers
50 VoIP
35 Employees

Once you have designed a thorough and detailed risk assessment for the company, the Senior Risk Analyst asked you to create a network configuration on how to potentially mitigate the risks that you have identified (in the risk assessment).

Analyze the risk factors to determine which ones are related to e-Commerce / Internet operations or are otherwise affected by the use of information in digital form and Information Technology systems and infrastructures.

Risk Management Strategy for an e-Commerce Company

Description
E-Commerce companies have become increasingly important in this era of global pandemics and resulting restrictions on businesses and individuals. Consumers are ordering products online in larger numbers than ever before due to business closures or restricted operating hours. Companies positioned in the e-Commerce industry are experiencing growth beyond previous predictions. But, at the same time, some E-commerce companies are seeing their business decline drastically due to travel restrictions and the reluctance of businesses and individuals to travel for any but the most critical of reasons. Added into the risk picture are risks from the actions of cybercriminals, hackers, and nation-state actors are taking advantage of these unsettled times resulting in increased risks for companies whose business models depend upon the Internet for financial transactions, orders, and communications both internal and external.

For this project, you will begin by researching a publicly traded company that engages in e-Commerce. Please make sure that you are using CURRENT information (2019 or later). You will then review the company’s risk statements as published each year in the company’s Annual Report to Investors (also published in the company’s annual filing of SEC Form 10-K). After analyzing the company’s e-Commerce operations and its risk statements about those activities, you will construct and document your own cybersecurity risk analysis which focuses upon the company’s e-Commerce activities (including all supporting business processes).

A list of approved companies appears at the end of this file (see Table 1). If you wish to use a company not on the approved list you must first obtain the approval of your instructor.

Note: before beginning this assignment, you should review NIST SP 800-30 R1: Guide for Conducting Risk Assessments. Pay special attention to Appendix D: “Threat Sources: Taxonomy of Threats Sources Capable of Initiating Threat Events” and Appendix H: “Impact: Effects of Threat Events on Organizations, Individuals, and the Nation.”

Research Your Chosen Company
⦁ Review the company’s website to learn about the products and services which it sells via e-Commerce.
⦁ Retrieve and review the Hoovers profile for the company. These profiles are written by professional analysts; pay close attention to the types of questions the analysts ask and answer in the company profile. Use this URL to access the database http://ezproxy.umgc.edu/login?url=https://www.mergentonline.com/Hoovers
⦁ Use the search bar at the top of the “Search & Build a List” tab to find your chosen company.

⦁ The company profile web pages in the Hoovers database are interactive and have expanding menus / options (see figure below). You may find it helpful to use the “OneStop Report” button to generate a PDF version of the information. Select “Core” under categories (Available Fields: Company Summary, Contacts, Corporate Family, Corporate Overview, SWOT, and News). Click on the field names in the middle column to select them for your report.

⦁ After you have looked at the company website and the Hoovers report, Identify 3 or more additional sources of information about the company and how it operates in cyberspace. These can be news articles, data breach reports, etc. Focus on finding information that addresses how the company is responding in the current economic environment (2019 or later).

⦁ Using the information obtained from your sources, identify the types of information and business operations which drive this company’s need for cybersecurity products and services. (What needs to be protected?)
Analyze the Company’s Risk Statements

⦁ Using the links from Table 1 (at the end of this file), download a copy of your selected company’s most recent Annual Report to Investors from its Form 10-K filing with the United States Securities and Exchange Commission. (Note: the company is the author of its Form 10-K. Do not list the SEC as the author.)

⦁ Read and analyze the Risk Factors section in the company’s report to investors (Item 1.A). This section is a professionally written risk analysis that has been written for a specific audience. Pay close attention to what the company includes as risk factors and how the writers chose to present this information.

⦁ Analyze the risk factors to determine which ones are related to e-Commerce / Internet operations or are otherwise affected by the use of information in digital form and Information Technology systems and infrastructures. Make a list that shows what information, digital assets, and/or business operations (processes) need to be protected from cyberattacks and/or cybercrime (including insiders and external threats) and the type of risk or threat that could affect those assets and processes.

What information and/or business operations need to be protected? What are the likely sources of threats or attacks for each type of information or business operation? What technologies, products, or services did you identify and discuss in your risk management strategy / acquisition forecast?

Project #4: Acquisition Risk Analysis

Overview
For this project, you will investigate and then summarize key aspects of risk and risk management for acquisitions or procurements of cybersecurity products and services. The specific questions that your acquisition risk analysis will address are:
What types of risks or vulnerabilities could be transferred from a supplier and/or imposed upon a purchaser of cybersecurity related products and/or services?
Are suppliers liable for harm or loss incurred by purchasers of cybersecurity products and services? (That is, does the risk transfer from seller to buyer?)
How can governance frameworks be used by both suppliers and purchasers of cybersecurity related products and services to mitigate risks?

For this assignment, your “purchaser” will be the same company that you researched in Project #2. You should reuse relevant information from your risk assessment and risk profile (especially your recommended security controls).

Begin by reviewing your selected company’s needs or requirements for cybersecurity (this information should have been collected your earlier projects in this course). What information and/or business operations need to be protected? What are the likely sources of threats or attacks for each type of information or business operation? What technologies, products, or services did you identify and discuss in your risk management strategy / acquisition forecast?

Next, you will research how operational risk during the manufacturing, development, or service delivery processes can affect the security posture (integrity) of products and services listed in your acquisition forecast. You will then explore the problem of product liability and/or risk transference from supplier to purchaser as products or services are delivered, installed, and used. You will also need to examine the role that IT governance frameworks and standards can play in helping purchasers develop and implement risk mitigation strategies to compensate for potential risk transfer by suppliers.

Once you have completed your research and analysis, you will summarize your findings in an acquisition risk analysis for cybersecurity products and services. This analysis should be suitable for use by the company’s senior managers in developing a company-wide risk management strategy for acquisition and procurement activities which could impact the company’s cybersecurity posture.

Provide a link to, and a short description of a tool, technique, or plug-in with a brief synopsis that details an interesting aspect or capability of Java.

Java

All matters regarding Java. Asking for and providing assistance are solid ways to build your coding skills. Provide a link to, and a short description of a tool, technique, or plug-in with a brief synopsis that details an interesting aspect or capability of Java.

Explain how the Internet of things has helped to understand guest behavior in the Quarantined hotels during the COVID-19 era & lessons learn. 

Internet of things

Explain how the Internet of things has helped to understand guest behavior in the Quarantined hotels during the COVID-19 era & lessons learn.

Propose a dynamic web application case study that requires the design and development of an online reservation system. Include justification of your case study and the need for a dynamic web application.

Assignment Task


The reservation (or holding) of products online is becoming more and more popular online and represents a new element in a dynamic web application. The process of reserving an online item may differ between different industries, but the overall process tends to be similar. For the purpose of this assignment, we will ask you to keep it simple. The user selects a product or service online, one of several time slots to collect on that specific day and fills their details. On submission, the allocated product or service is removed from the set of options. This scenario is a simplified example that could apply in a variety of options, not least for antique shops, electrical goods shop, vintage clothing shops, collectable toy shops, …etc.

Stage 1: Propose a dynamic web application case study that requires the design and development of an online reservation system. Include justification of your case study and the need for a dynamic web application. (Maximum word count:500)


Stage 2: Plan and design between five to eight web pages for a given website that includes reservation component. Provide recommendations with regards to a markup language, database, scripting (both client side and server side), multimedia components, and layout design. (Maximum word count: 1000) L.O.1. And L.O.2.


Stage 3: Recommend improvements that would enhance the browser compatibility of the website as well as web accessibility to meet the diverse audience. (Maximum word count: 1000) L.O.2.


Stage 4: Implement between five to eight web pages for a given case study using dynamic web development language (ASP, PHP, or JSP). Provide screenshots of the document and code in the appendix Provide a table that shows the testing logs of each page. (Maximum word count: 1500) L.O.3 and L.O.4.


Stage 5: Evaluate the implementation and how you would rate your own application against current accessibility guidelines. Provide logs and testing records to justify any claims. (Maximum word count: 1000) L.O.5.


Guide to Harvard Referencing

http://moodle.bl.rdi.co.uk/guides/HarvardRef/AU_Harvard_Quick_Ref_Guide.pdf


Guide to Harvard Citation

http://moodle.bl.rdi.co.uk/guides/HarvardRef/AU_Guide_to_Harvard_Citation.pdf