Investigate the use of an algorithm to solve a specific business problem
Investigate the use of an algorithm to solve a specific business problem
Investigate the use of an algorithm to solve a specific business problem
1- Introduction
2- Identity and Identity Theft
a. What is Identity and What is Personal identifying information(PII): Some definitions of identity and explore the different types of PII.
b. What is Identity theft: Some definitions of identity theft, Types of identity theft (e.g. Financial identity theft, Criminal identity theft, etc. ), and different methods or techniques of identity theft ( Physical theft techniques, Technology-based ID theft techniques).
3- Social Networks: Explore the most three popular social networks (Facebook, Twitter, Instagram) and write at least one or two paragraphs about each of them. the paragraphs should include but not limited to (The history of each platform, number of users, what kind of information users can share in each platform)
4- Identity Theft on Social Networks
Linking the previous two sections together and explore and investigate the current state of identity theft on social media.
5- Summary
6- References
NOTE:
1- The number of references is not limited, however, all references should be as academic and recent as possible.
The essay must be about the following topic: Explain cognitive dissonance. Describe and give an example of five different techniques that one could use to overcome cognitive dissonance.
Individual Assignment: Business Intelligence Solution Development and Report
WORD LIMIT: 3999 words
Learning Outcome Details Unit Learning Outcome (ULO) |
Graduate Learning Outcome (GLO) |
ULO1: Explain and apply the business intelligence (BI) lifecycle concept, multidimensionality concept and database concept
ULO2: Appraise and apply data warehousing architecture, technologies and development methodologies and database for business intelligence. |
GLO1: Discipline-specific knowledge and capabilities – students are required to demonstrate an understanding of the business intelligence context and explain the BI and database technologies and associated implementation issues.
GLO3: Digital Literacy – students are required to apply BI and database technologies to find, use and disseminate actionable information. |
Description / Requirement
In this practical assignment, students will apply their business intelligence knowledge and practical skills to development business intelligence solution.
This practical assignment setting will be on tourism. As an analyst, your main task is to apply MS Power BI tool and develop business intelligence solution (i.e., tourism dashboards). You may use either real-world or artificial dataset.
Some useful links:
Tasks:
Note: To ensure that you discuss task (2) properly, you must include visual samples of the reports you produce (i.e. the screenshots of the BI charts/dashboards must be presented and explained in the written report; use ‘Snipping tool’), and also include any assumptions that you may have made.
NOTE:
Report guidelines
Instructions
Based on the steps taken in the lab, explain why both public and private keys are needed in an asymmetric key pair. (Please submit the answer on the assessment template part 1.3 response; a short paragraph is sufficient)
Part 2 – Security Planning: Encryption Usage and Remote Access
Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, or details that you might add that add depth, texture, or provide a foundation for your policies. Your goal is to create effective policies that represent modern systems assurance security practices and planning.
Encryption Usage in a regulated health care environment (please submit on the assessment template part 2: security planning item 2.1).
Remote Access (please submit on the assessment template part 2: security planning item 2.2).
Consider the following scoring guide criteria as you complete your assessment:
Provide required screenshots that document lab completion.
Write an encryption usage policy that is appropriate for the Course Security scenario.
Write a remote access policy that is appropriate for the Course Security scenario.
Explain why both public and private keys are needed in an asymmetric key pair.
Instructions
Part 1 – (labs are already completed; please see the screenshots on the assessment template)
Based on the actions taken in the lab, explain in detail the information that was gained in using Zenmap for reconnaissance efforts (please submit anser on assessment template part 1.3 response).
Part 2 – Security Planning: Network Device Security and Intrusion Detection Presentation
Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, or details that you might add that add depth, texture, or provide a foundation for your policies. Your goal is to create effective policies that represent modern systems assurance security practices and planning.
Network Device Security (Please submit police on the assessment template part 2: security planning Item 2.1)
Intrusion Detection (Please submit policie on the assessment template part 2: security planning Item 2.2).
Consider the following scoring guide criteria as you complete your assessment:
Provide required screenshots that document lab completion.
Write a network device security policy that is appropriate for the Course Security scenario.
Write an intrusion detection process that is appropriate for the Course Security scenario.
Explain the information that is gained in using Zenmap for reconnaissance efforts.
– MUST USE SCHOLARLY ARTICLES, CANT USE THE INTERNET WEB ARTICLES. –
While society expects a business to be prepared for disasters and to recover using its own resources, we do not seem to expect individuals to be prepared to survive a disaster. Should we expect government at any level to be responsible for disaster recovery at either the personal or business level? Why or why not? Who should/would be responsible in a cloud-based disaster? What sacrifices would a business have to make if the disaster recovery process were turned over to a government agency? What are the sacrifices if handed over to cloud provider?
Read the U.S. Constitution, the Declaration of Independence, and Thomas Jefferson’s Letter to the Danbury Baptists in 1802. Once you have read these founding documents and Jefferson’s letter, you will write a 2–3-page paper (double-spaced, 1-inch margins) adhering to APA Guidelines, comparing each of them. When comparing the U.S. Constitution and Declaration of Independence, pay particular attention to the themes apparent in both documents and comment on which document came first and why that is important.
You must also answer the question, “What do you think the signers of the Declaration of Independence and the U.S. Constitution thought about the separation of church and state or about the separation of God from government?” (Note: these are not the same thing.)
The focus is on Europe in global politics. What is expected of the course is:
– To show a critical understanding of the theories and perspectives used in the study of the external role of the European Union in global politics.
– Have a good grasp on key debates surrounding the EU.
– Ability to analyse and apply international relations theory.
– Explaining the impact of the EU as a political actor in global politics.
The research report you submit will be based on an “in-class” research study that explores the relationship between “personality traits” and “happiness”.
Previous research has suggested that measures of happiness are correlated with some personality traits (Chamorro-Premuzic, Bennett, E. & Furnham, 2007). However, it may be that some personality traits are related to happiness more than others. For this assignment, you have the opportunity to explore these relationships further. Specifically, you will need to select two of the “big-five” personality domains and provide a correlational hypothesis at the end of your Introduction section that describes how the two personalities you choose might relate to “happiness”. Your hypothesis will need to be based on evidence from recent research (publications within the past 10 years). You may include the Chamorro-Premuzic reference as evidence to support your hypothesis but you should aim to provide an additional 4 (or more) recent research references in the Introduction section to provide a strong rational for your hypothesis.
The participants for your study will be your fellow classmates on the module and data for your report will be collected using Quatrics. The measure of personality traits will be made using the Ten-Item Personality Inventory (TIPI) and the measure of happiness will be made using the Oxford Happiness Questionnaire (OHQ) as outlined in the following references:
Gosling, S. D., Rentfrow, P. J., & Swann, W. B. (2003). A very brief measure of the Big-Five personality domains. Journal of Research in Personality, 37(6), 504–528. https://doi.org/10.1016/S0092-6566(03)00046-1
Hills, P., & Argyle, M. (2002). The Oxford Happiness Questionnaire: A compact scale for the measurement of psychological well-being. Personality and Individual Differences, 33(7), 1073–1082. https://doi.org/10.1016/S0191-8869(01)00213-6
After reporting all the information needed in the Methods section, you will need to provide information in the Results section. For this you will need to report any steps you took from getting the raw data collected to the data ready for analysis (i.e., scoring, dealing with missing data, etc.), your descriptive statistics and checks for parametric assumptions. To visualise the relationship between your variables, you will need to provide two separate “scatter plot” figures representing the two personality traits and the measure of happiness along with appropriate figure captions.
In the Discussion section provide a brief description of your findings. Because this assignment does not ask you to do an actual statistical analysis (we have not taught you to do that yet), you do not need to note if your hypothesis was supported or not. However, you will need to discuss how your findings may or may not be consistent with previous research results and if there were any methodological issues that may limit the interpretation of your findings. You may re-use references included in the Introduction section, but you can also include additional research references to strengthen the points you make. Importantly you will need to provide a clear conclusion based on what you have reported and any questions or applications to be explored next.
(Remove this text…The title of the study goes here)
Introduction
(As a guide this section might be around 350+ words)
Methods
(As a guide this section might be between 300+ words)
Participants: Add text here…
Design: Add text here…
Materials: Add text here…
Procedure: Add text here…
Results
(As a guide this section might be around 250+ words)
Discussion
(As a guide this section might be between 350+ words)
References
(formatted and presented in the APA style)
Our team has experienced writers that follow all the codes used in professionalism when writing academic essays. We focus our services on satisfied clients. Through critical attention to detail, our writers abide by all the instructions given by clients. Additionally, the paper format is done according to the dictates of the client in respect to the set academic style. We are proud of completing outstanding top-quality papers.