Write a short paragraph outlining which of the platforms you have chosen to use for the final e-portfolio.

This assignment is an extension of the introduction to e-porfolios . The proposal will be the first part of your project to compile and prepare an e-portfolio which records your academic and professional achievements and which you can use as you begin your job search upon graduation.

For this proposal assignment, you will also learn, practice and apply the following:

  • Analytical thinking and reading
  • Your research and writing skills
  • Write clear descriptions and explanations
  • Thinking about how to design and present your material so that it is clear and easy for readers to understand
  • Self-assessing your writing and using your assessment to guide improvements in your

Purpose

The purpose of the proposal is to familiarize yourself with E-portfolios and to research and plan for the final E-portfolio assignment which is due at the end of term.

Tasks

  1. Research and propose your platform choice.

Step 1: Research and evaluate the available platforms which are most often used to house an e-portfolio. Provide a References list with the sources you have used to review the possible platforms. Your list should have a minimum of 3 citations in APA format.

Step 2: Present your research findings in a comparative table. Present a comparison between at least TWO different platforms, highlighting the strengths and gaps.

Step 3: Write a short paragraph outlining which of the platforms you have chosen to use for the final e-portfolio. Be sure to explain why you have chosen this platform.

  1. Gathering requirements.

Step 1: Review and evaluate other e-portfolios using this link: https://www.jelizabethclark.com/eportfolio-examples

Step 2: Choose TWO e-portfolios that you consider to be strong examples that you would like to use as models for your final project.

Step 3: Provide the links to these two choices and write a 150-250 word evaluation, highlighting why you consider these two examples to be strong.

  1. Conclusions: Your written plan and rationale.

Step 1: Write a 1-2 page proposal and rationale (300-400 words) to explain how you will apply what you have learned about e-portfolios in class as well as in your research conducted in Parts 1 and 2 of this assignment. Your plan and rationale should address how you envision the final e-portfolio project and should demonstrate how you are incorporating the research that you have done in Parts 1 and 2 here. Be sure to provide a cogent, focused and concise response to this part of the assignment.

Be sure to answer the following questions:

  • How will your decisions to apply these concepts make your final e-portfolio more compelling?
  • What artifacts will you be including in your final e-portfolio and why?
  • What are you proposing to exclude from your final e-portfolio and why?
  • How will you ensure that your final e-portfolio appeals to your audience?
  • What can you start doing now to make the final e-portfolio assignment easier?
  • Is there any training that you need to do to use the platform that you have chosen?

 

 

Describe a current IT-related ethical issue:

Paper A: Application of a decision making framework to an IT-related ethical issue.

This assignment is an opportunity to explore and apply a decision making framework to an IT-related ethical issue. A framework provides a methodical and systematic approach for decision makingModule 2 – Methods of Ethical Analysis (see LEO Content – Readings for week 2) describes three structured frameworks that may be used for ethical analysis, namely Reynolds Seven-Step Approach, Kidder’s Nine Steps, and Spinello’s Seven-Step ProcessThere are several ways described in Module 2 to systematically approach an ethical dilemma, and while each of the frameworks described has its merits, each will result in an ethical decision if straightforwardly, objectively,  and honestly applied.

In addition, consider the ethical theories described in Module 1 – Introduction to Theoretical Ethical Frameworks (see LEO Content – Readings for week 1) which help decision makers find the right balance concerning the acceptability of and justification for their actions. A separate write-up of the ethical theory that supports your decision is part of the following requirements.

For this paper, the following five elements must be addressed:

  • Describe a current IT-related ethical issueSince this is a paper exercise, not a real-time situation, you may want to construct a brief scenariowhere this issue comes into play, and thus causes an ethical dilemma.  The dilemma may affect you, your family, your job, or your company; or it may be a matter of public policy or law that affects the general populace. See the list below for a list of suggested issues, which may be a source of ethical dilemmas.
  • Define a concise problem statementthat is extracted from the above description or scenario. It is best if you define a specific problem caused by the dilemma, that needs a specific ethical decision to be made, that will solve the dilemma.   Be aware that if it is a matter of public policy or law, that it may require a regulatory body or congressional approval to take action to implement a solution.
  • Analyze your problemusing one of the structured decision-making frameworks chosen from Module 2. Make sure that you identify the decision-making framework utilized. In addition, the steps in the decision-making framework selected must be used as major headings in the Analysis section. 
  • Consider and state the impact of the decision that you madeon an individual, an organization, stakeholders, customers suppliers, and the environment, as applicable!
  • State and discuss the applicable ethical theoryfrom Module 1 that supports your decision.

Concerning your paper:

  • Prepare a 3-page, double-spaced paper and submit it to the LEO Assignments Module as an attached Microsoft Word file.
  • Use headings for each topic criteria
  • Provide appropriate American Psychological Association (APA) source citations for all sources you use.  In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.
  • Include a Cover Page with your Name, the /Name of the Class, and the Title of the Paper.

For example, Kidder’s approach has nine steps, which are:

  • Recognize that there is a moral issue.
  • Determine the actor (whose moral issue is it?).
  • Gather the relevant facts.
  • Test for right-versus-wrong issues.
  • Test for right-versus-right paradigms (what sort of dilemma is this?).
  • Apply the resolution principles (ends-based, rule-based, or care-based).
  • Investigate the “trilemma” options (look for common ground or compromise).
  • Make the decision.
  • Revisit and reflect on the decision. (Kidder, 1995, p. 183-187)

Reminder: Each of the steps for whatever framework that you select must be a major heading in the Analysis section of your paper.

Here are some suggested issues for you to consider, the additional text is designed to help you flesh out the issue:

  1. Privacy on the Web:What is happening now in terms of privacy on the Web? Think about recent abuses and improvements. Describe and evaluate Web site policies, technical and privacy policy protections, and current proposals for government regulations.
  2. Personal Data Privacy Regulations in Other Countries:Report on personal data privacy regulations, Web site privacy policies, and governmental/law enforcement about access to personal data in one or more countries; e.g., the European Union.  This is especially relevant as our global economic community expands and we are more dependent on non-US clients for e-business over the Internet.
  3. Computer-Based Crimes: Discuss the most prevalent types of computer crimes, such as Phishing. Analyze why and how these can occur. Describe protective measures that might assist in preventing or mitigating these types of crimes.
  4. Government Surveillance of the Internet: The 9/11 attacks on the US in 2001 brought many new laws and permits more government surveillance of the Internet. Is this a good idea?
  5. The Digital Divide:Does it exist; what does it look like; and, what are the ethical considerations and impact?
  6. Privacy in the Workplace –Monitoring Employee Web and E-Mail Use: What are current opinions concerning the monitoring of employee computer use. What policies are employers using? Should this practice of monitoring, be authorized or not?
  7. Medical Privacy: Who owns your medical history? What is the state of current legislation to protect your health information? Is it sufficient?  There are new incentives with federal stimulus financing for health care organizations to develop and implement digital health records.
  8. Software Piracy: How many of you have ever made an unauthorized copy of software, downloaded software or music (free or for a fee), or used copyrighted information without giving proper credit or asking permission? Was this illegal or just wrong? How is this being addressed?
  9. 9.Consumer Profiling: With every purchase you make, every Web site you visit, your preferences are being profiled. What is your opinion regarding the legal authority of these organizations to collect and aggregate this data?
  10. Biometrics & Ethics:Your fingerprint, retinal-vessel image, and DNA map can exist entirely as a digital image in a computer, on a network, or in the infosphere.  What new and old ethical problems must we address?
  11. Social Networking:  What are some of the ethical issues surrounding using new social networks?  How are these now considered for business use?  What are business social communities?  Are new/different protections and security needed for these networks?
  12. Gambling in Cyberspace:Is it legal? Are there national regulations and/or licensing? What are the oversight and enforcement requirements? Are there international implications? What are the social and public health issues?
  13. Pornography in Cyberspace:For example, the U.S. Supreme Court ruling protecting as free speech computer-generated child pornography
  14. Medicine and Psychiatry in Cyberspace:Some considerations include: privacy issues; security; third-party record-keeping; electronic medical records; access to information, even by the patient (patient rights); access to information by outsiders without patient knowledge; authority to transfer and/or share information. Are there any policies proposed by professional organizations?
  15. Counterterrorism and Information Systems:Your protection versus your rights
  16. Open-source Software versus Closed-source Software:Ethical ramifications and impact on intellectual property law
  17. Creative Commons Licenses:How do they work and what are the legal and ethical impacts and concerns?
  18. Universal ID card:What is the general position of the U.S. government about issuing each individual a unique ID card? Which individual U.S. government agencies have already provided a unique ID card? What steps have been taken to include individual ID information electronically in passports? How is privacy and security provided?
  19. Video Games: Does playing video games distract from everyday responsibilities? Do video games correlate with real world violence? Why do game creators continually increase the violence of video games? What is video game addiction?
  20. Cyberbullying: What is cyberbullying and what can be done to stop it?
  21. Net Neutrality:What is the current position of the federal government and is it fair to all?

 

What tools would you select in the marketplace to implement if given the chance?

If you were to find that your organization has not done their homework and is open to password cracking attacks, how would you go about expressing your concern to your boss and getting the message to upper management for buy in to change the culture (note: not everyone likes long, complex passwords, multi-factor authentication, and other security tools that may impede their ability to work efficiently, especially if their production equates to their profits)…you may need to scare them a little to get their attention with some real-world scenarios vs. what if type theory.
What tools would you select in the marketplace to implement if given the chance?
Of the countermeasures that you’ve learned about, which would you implement for the biggest bang for the buck ($$$)?- remember these don’t have to cost lots of money, but if creating organizational change and impacting the end users’ workday, think about the cost, effort, and impact to implement such measures in your discussion.

Provide a write up describing the benefits of vulnerabilities scanners.

Provide a write up describing the benefits of vulnerabilities scanners. How will
organizations benefit from using these tools? How will hackers benefit from using
these tools? Explore the features of OpenVAS, Nessus, and other products.
2. Your write up should begin at the top of a new blank page, be 1-2 pages in length
(double spaced), and include a minimum of 3 references that utilize in-text citations.

Discuss available hardware and software required to develop the desired system, specifications, functionality, versions, compatibility, and others).

However with the struggle now a day every family member is far away from the other and they are 24/7 on the phone, we are trying to create an app that its similar to whatsapp that prevent all the needs of the family and keep them no matter they are busy with their phone they will keep notified about everything in this app , so any new activity will happen soon or later all the family member will be notified for instance if their is a gathering or something depends on the activity. so the new thing in our app that this app is divided not based on a simple group whatsapp and chat about everything there NO!! OUR app is divided based on so many factor depends on the interests so basically there is square of fitness other square family gathering and other square children speech etc, and also each family member will have a unique color of his profile and his status. this app could prevent the problem of not communicating with family and keep them in touch regardless of the time that they are spending on the phone.

you can add info based on your imaginary that will help:))
!!ON MY PAPER I NEED YOU TO WRITE THOSE DETAILS:!!

(a) Technical Feasibility (discuss available hardware and software required to develop the desired system, specifications, functionality, versions, compatibility, and others).

(b) Financial Feasibility (also called budgeting). You need here to develop the Cost Benefit Analysis. On an Excel sheet or another software, determine the costs (one time and running costs), and benefits (tangible and intangible), and then do the comparison. the excel sheet should present the Net Present Value, Break Even Point, and the Return on Investment).

(c) Time Feasibility (also called Scheduling). Here you need to use MS Project to develop Gantt Chart and PERT Diagram, and illustrate the task activities, duration, predecessors, milestones, task details and resources). By showing PERT diagram, the slack time, slack path, and critical nodes should be identified.please note that Im a student and if they were plragusim they will kick me from university
thank you so much ! :)

Identify how an adversary could use emanations to steal data from an organization and then explain how this is a cyber security-related problem.

  1. This week I’d like you to explore how emanations from computers or mobile devices can pose a threat to an organization. As part of your posting, I’d like you to do the following:

1) Identify how an adversary could use emanations to steal data from an organization and then explain how this is a cyber security-related problem.

2) Define any constraining factors associated with this approach.

3) Identify different safeguards that can be put into place to prevent such threats.

4) Find and summarize one news article or piece of academic research on how emanations have been used/exploited to compromise the security of an organization.

Note: Emanation security/threat is not the same as wireless security/threat.

  1. For this week’s discussion, I’d like you to yet again do some research and report back your findings. In this particular case, I want you to identify and define what a PE environment means, how Live CDs/USBs work, and summarize how you, as a cyber security professional could use this to support defensive efforts (detective or corrective). Further, I’d like you to identify a PE building suite that works for the most recent version of Windows and what the add-on/software installation process looks like, i.e. what tools you would put on such an environment and for what purpose (actual names of tools/plugings/add-ons, not just descriptions of such). There are far less PE building kits for Mac, but if you so desire, feel free to report on this instead of Windows PE builders. As a starting point, look at the documentation on BartPE, one of the oldest PE tools available.

 

Describe the challenges that these features introduce to the above-mentioned NLP tools.

Topic 2:

A review of the challenges that the Arabic Language poses to the text preprocessing NLP tools Description

This topic aims to present how the peculiarities of the Arabic script and other linguistic and sociolinguistic aspects of the Arabic language can influence the accuracy of the text preprocessing NLP tools (Tokenizers, Part of Speech Taggers, Parsers). You can describe the challenges presenting the tools mentioned above and how Arabic can make difficult their analysis referring to the various linguistic levels (Spelling, Script, Phonology, Morphology, Syntax, Semantics, Sociolinguistics). The size of the report will be a minimum of 4 pages + an unlimited number of pages for tables, illustrations, references, and examples. You will also prepare a short PowerPoint presentation that will summarize your paper.

In the written report, you will briefly: (v) Introduce and summarize the basic linguistic features of Arabic. (vi) Describe the challenges that these features introduce to the above-mentioned NLP tools. (vii) Illustrate your findings by a couple of examples and snapshots and cite your references in the APA style. 3 Submission Guidelines Your report should be typed, double-spaced on standard-sized A4 paper with 2.54 cm margins on all sides.

You should use a clear font that is highly readable. APA recommends using 12 pt. Times New Roman font. Include a page header at the top of every page. To create a page header, insert page numbers flush right. Then type “TITLE OF YOUR PAPER” in the header flush left using all capital letters. The page header is a shortened version of your paper’s title. Your report should include four major sections: Title Page, Abstract, Main Body, and References.

What controls/techniques would you put in place to ensure you knew who was pulling what from the system?

Your organization, in this case, a multi-hospital health system, has just purchased and is in the process of implementing a drug dispensing system to be used by pharmacists and nurses to obtain and administer drugs to patients. There is a wide range of drugs that are needed for patient care all the way up to heavy narcotics.

How would you recommend setting up authentication standards for this type of system?
What controls/techniques would you put in place to ensure you knew who was pulling what from the system?
Would you go as far as to use a form of dual-factor authentication knowing operationally the clinical staff are typically in a hurry and don’t have time to deal with all this “authentication” business…after all, they’re in the business of providing patient care, not managing access- what roadblocks do you foresee and what operational/political balancing act will you have to perform for buy-in to such a program where it relates to authentication?