What is Identity and What is Personal identifying information(PII): Some definitions of identity and explore the different types of PII.

1- Introduction
2- Identity and Identity Theft
a. What is Identity and What is Personal identifying information(PII): Some definitions of identity and explore the different types of PII.
b. What is Identity theft: Some definitions of identity theft, Types of identity theft (e.g. Financial identity theft, Criminal identity theft, etc. ), and different methods or techniques of identity theft ( Physical theft techniques, Technology-based ID theft techniques).
3- Social Networks: Explore the most three popular social networks (Facebook, Twitter, Instagram) and write at least one or two paragraphs about each of them. the paragraphs should include but not limited to (The history of each platform, number of users, what kind of information users can share in each platform)
4- Identity Theft on Social Networks
Linking the previous two sections together and explore and investigate the current state of identity theft on social media.
5- Summary
6- References

NOTE:
1- The number of references is not limited, however, all references should be as academic and recent as possible.

Describe and give an example of five different techniques that one could use to overcome cognitive dissonance.

The essay must be about the following topic: Explain cognitive dissonance. Describe and give an example of five different techniques that one could use to overcome cognitive dissonance.

Justify why these BI solutions could provide insights and why those attributes are laid out in the fashion you proposed (feel free to include all other relevant justifications).

Individual Assignment: Business Intelligence Solution Development and Report

WORD LIMIT: 3999 words

 

Learning Outcome Details Unit Learning Outcome (ULO)

Graduate Learning Outcome (GLO)
ULO1: Explain and apply the business intelligence (BI) lifecycle concept, multidimensionality concept and database concept

ULO2: Appraise and apply data warehousing architecture, technologies and development methodologies and database for business intelligence.

GLO1: Discipline-specific knowledge and capabilities – students are required to demonstrate an understanding of the business intelligence context and explain the BI and database technologies and associated implementation issues.

GLO3: Digital Literacy – students are required to apply BI and database technologies to find, use and disseminate actionable information.

 

Description / Requirement

In this practical assignment, students will apply their business intelligence knowledge and practical skills to development business intelligence solution.

This practical assignment setting will be on tourism. As an analyst, your main task is to apply MS Power BI tool and develop business intelligence solution (i.e., tourism dashboards). You may use either real-world or artificial dataset.

Some useful links:

  1. https://data.gov.au/data/group/tourism
  2. https://www.e-unwto.org/toc/unwtotfb/current
  3. https://data.world/datasets/tourism
  4. https://knoema.com/atlas/Australia/topics/Tourism/datasets
  5. https://ourworldindata.org/tourism
  6. https://datacatalog.worldbank.org/

Tasks:

  1. Develop the relevant BI dashboards using MS Power BI tool. Please present the BI dashboard first, then followed by the explanation of each individual chart of the dashboard. At least 3 different dashboards are expected.
  2. Justify why these BI solutions could provide insights and why those attributes are laid out in the fashion you proposed (feel free to include all other relevant justifications).

Note: To ensure that you discuss task (2) properly, you must include visual samples of the reports you produce (i.e. the screenshots of the BI charts/dashboards must be presented and explained in the written report; use ‘Snipping tool’), and also include any assumptions that you may have made.

  1. The BI report should include: 1) objectives and advantages of your BI solution, 2) BI dashboards screenshots and commentary, 3) overall findings and recommendations based on your analysis, etc. Feel free to make reasonable assumptions or refine the data as needed. You may create your own artificial datasets. Real-world dataset is not compulsory. Note: Do refer to assignment marking rubric & report outline example.

NOTE:

  • You MUST produce the actual visuals in MS Power BI tool.
  • If you think the best presentation above is to use, say, only a pie chart, then discuss using a pie chart and indicate what the pie chart would show, why you picked the pie chart, and so on.
  • At least 3 dashboards are expected, e.g., you may create one dashboard for tourists, one for government/tourism department, and one for tourism industries (eg. hotel, airline, airport, travel agency, tour operator, etc).

Report guidelines

  1. The body of the report should contain ‘Table of Content’, logically organised sections, and ‘List of references’.
  2. You may include figures, diagrams, tables and charts, etc.
  3. For this practical assignment, the length of the assignment excludes Table of content and reference list.
  4. Reports should be written in Microsoft Word and submitted as a Word file only (PDF file will not be marked).
  5. Format: Times New Roman, font size 12 & single line spacing.

 

Explain why both public and private keys are needed in an asymmetric key pair.

Instructions

Based on the steps taken in the lab, explain why both public and private keys are needed in an asymmetric key pair. (Please submit the answer on the assessment template part 1.3 response; a short paragraph is sufficient)

Part 2 – Security Planning: Encryption Usage and Remote Access
Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, or details that you might add that add depth, texture, or provide a foundation for your policies. Your goal is to create effective policies that represent modern systems assurance security practices and planning.

Encryption Usage in a regulated health care environment (please submit on the assessment template part 2: security planning item 2.1).

Remote Access (please submit on the assessment template part 2: security planning item 2.2).

Consider the following scoring guide criteria as you complete your assessment:

Provide required screenshots that document lab completion.
Write an encryption usage policy that is appropriate for the Course Security scenario.
Write a remote access policy that is appropriate for the Course Security scenario.
Explain why both public and private keys are needed in an asymmetric key pair.

Write a network device security policy that is appropriate for the Course Security scenario.

Instructions
Part 1 – (labs are already completed; please see the screenshots on the assessment template)

Based on the actions taken in the lab, explain in detail the information that was gained in using Zenmap for reconnaissance efforts (please submit anser on assessment template part 1.3 response).

Part 2 – Security Planning: Network Device Security and Intrusion Detection Presentation
Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, or details that you might add that add depth, texture, or provide a foundation for your policies. Your goal is to create effective policies that represent modern systems assurance security practices and planning.

Network Device Security (Please submit police on the assessment template part 2: security planning Item 2.1)

Intrusion Detection (Please submit policie on the assessment template part 2: security planning Item 2.2).

Consider the following scoring guide criteria as you complete your assessment:

Provide required screenshots that document lab completion.
Write a network device security policy that is appropriate for the Course Security scenario.
Write an intrusion detection process that is appropriate for the Course Security scenario.
Explain the information that is gained in using Zenmap for reconnaissance efforts.

Should we expect government at any level to be responsible for disaster recovery at either the personal or business level?

 

– MUST USE SCHOLARLY ARTICLES, CANT USE THE INTERNET WEB ARTICLES. –

While society expects a business to be prepared for disasters and to recover using its own resources, we do not seem to expect individuals to be prepared to survive a disaster. Should we expect government at any level to be responsible for disaster recovery at either the personal or business level? Why or why not? Who should/would be responsible in a cloud-based disaster? What sacrifices would a business have to make if the disaster recovery process were turned over to a government agency? What are the sacrifices if handed over to cloud provider?

What do you think the signers of the Declaration of Independence and the U.S. Constitution thought about the separation of church and state or about the separation of God from government?

Read the U.S. Constitution, the Declaration of Independence, and Thomas Jefferson’s Letter to the Danbury Baptists in 1802. Once you have read these founding documents and Jefferson’s letter, you will write a 2–3-page paper (double-spaced, 1-inch margins) adhering to APA Guidelines, comparing each of them. When comparing the U.S. Constitution and Declaration of Independence, pay particular attention to the themes apparent in both documents and comment on which document came first and why that is important.

You must also answer the question, “What do you think the signers of the Declaration of Independence and the U.S. Constitution thought about the separation of church and state or about the separation of God from government?” (Note: these are not the same thing.)

Does the pursuit of global norms in foreign policy make the EU a powerful actor on the international stage?

The focus is on Europe in global politics. What is expected of the course is:
– To show a critical understanding of the theories and perspectives used in the study of the external role of the European Union in global politics.
– Have a good grasp on key debates surrounding the EU.
– Ability to analyse and apply international relations theory.
– Explaining the impact of the EU as a political actor in global politics.

Explore the relationship between personality traits and happiness

The research report you submit will be based on an “in-class” research study that explores the relationship between “personality traits” and “happiness”.

Previous research has suggested that measures of happiness are correlated with some personality traits (Chamorro-Premuzic, Bennett, E. & Furnham, 2007). However, it may be that some personality traits are related to happiness more than others. For this assignment, you have the opportunity to explore these relationships further. Specifically, you will need to select two of the “big-five” personality domains and provide a correlational hypothesis at the end of your Introduction section that describes how the two personalities you choose might relate to “happiness”. Your hypothesis will need to be based on evidence from recent research (publications within the past 10 years). You may include the Chamorro-Premuzic reference as evidence to support your hypothesis but you should aim to provide an additional 4 (or more) recent research references in the Introduction section to provide a strong rational for your hypothesis.

The participants for your study will be your fellow classmates on the module and data for your report will be collected using Quatrics. The measure of personality traits will be made using the Ten-Item Personality Inventory (TIPI) and the measure of happiness will be made using the Oxford Happiness Questionnaire (OHQ) as outlined in the following references:

Gosling, S. D., Rentfrow, P. J., & Swann, W. B. (2003). A very brief measure of the Big-Five personality domains. Journal of Research in Personality, 37(6), 504–528. https://doi.org/10.1016/S0092-6566(03)00046-1

Hills, P., & Argyle, M. (2002). The Oxford Happiness Questionnaire: A compact scale for the measurement of psychological well-being. Personality and Individual Differences, 33(7), 1073–1082. https://doi.org/10.1016/S0191-8869(01)00213-6

After reporting all the information needed in the Methods section, you will need to provide information in the Results section. For this you will need to report any steps you took from getting the raw data collected to the data ready for analysis (i.e., scoring, dealing with missing data, etc.), your descriptive statistics and checks for parametric assumptions. To visualise the relationship between your variables, you will need to provide two separate “scatter plot” figures representing the two personality traits and the measure of happiness along with appropriate figure captions.

In the Discussion section provide a brief description of your findings. Because this assignment does not ask you to do an actual statistical analysis (we have not taught you to do that yet), you do not need to note if your hypothesis was supported or not. However, you will need to discuss how your findings may or may not be consistent with previous research results and if there were any methodological issues that may limit the interpretation of your findings. You may re-use references included in the Introduction section, but you can also include additional research references to strengthen the points you make. Importantly you will need to provide a clear conclusion based on what you have reported and any questions or applications to be explored next.

(Remove this text…The title of the study goes here)

Introduction

(As a guide this section might be around 350+ words)

Methods

(As a guide this section might be between 300+ words)

Participants: Add text here…

Design: Add text here…

Materials: Add text here…

Procedure:  Add text here…

Results

(As a guide this section might be around 250+ words)

Discussion

(As a guide this section might be between 350+ words)

References

(formatted and presented in the APA style)