Formulate an evaluation matrix for a hypothetical decision situation of your choice.
Formulate an evaluation matrix for a hypothetical decision situation of your choice.
Formulate an evaluation matrix for a hypothetical decision situation of your choice.
Discuss the need for IT solutions in business operations. Explain the role software and hardware components have in business organisations.
Analyse how the Internet affects the way businesses operate. Evaluate the importance of security and IT management in business.
You are a Junior Stock Analyst for F&H Investment Plc, with responsibility for tracking FTSE 100 stocks on the London Stock Exchange. One of your core duties is to determine the right price and return of stocks, which in turn, informs traders on buying or selling decisions of the stocks in their portfolio.
The asset returns/pricing model used is the capital asset pricing model (CAPM), which proposes the market (systematic) risk as the single determinant of stock value.
The CAPM is estimated using the following empirical model
R_(i,t)-r_(f )= α_i+ β_i (R_(m,t)- r_f) (1)
where, i= 1,…, N and t=1,…,T
R_it = return on asset i at time t (your selected stock, e.g., Barclays)
r_f = return on the risk-free asset at time t (UK govt three (3) months Treasury bill price)
R_(m,t)= return on the market portfolio at time t (FTSE 100 Index)
α_i and β_i are the coefficients to be estimated.
Your task for the month is to produce a report detailing the time series pattern, return analysis and forecast of a stock that is a constituent of the FTSE 100 index (refer to list of FTSE 100 firms). The main body of your report should be structured based on the following sections.
Time Series Analysis
Stock Returns Analysis
Forecasting
1, What are the perception of employees towards workplace ethics to organization performance
2, What relationship exist between workplace ethics and employees’ commitment to work
3, What are the factors that influences employees behavior and decisions at work place
How can a software program or technology helps to determine if kids are dyslexic?
Crypto currency also known as Bitcoin has gained immense popularity in recent times. They owe their success to the underline Blockchain technology, that allows users to exchange non-physical currency in a secure and reliable manner. Blockchain has thus become a key research domain and researchers are constantly evaluating its use in other application scenarios, such as the Internet of Things, Smart Grids, Healthcare networks and etc. Despite their success in crypto currency, Blockchain cannot be just replicated and mapped into other application domains, and thus requires key insight into its architecture to actually make it work. Due to this, people have looked into Proof of Work and replaced it with Proof of State, Proof of Benefit and other similar mathematical functions.
In this assignment, we expect you to pick one Blockchain application of your interest (*interest – IoT Security and Privacy), look for a research paper in that domain and then explain in detail:
1) How Blockchain is being used in (IoT Security and Privacy)
a. Add an architecture diagram
b. Explain different modules
c. Explain what kind of transaction validation process is being used (proof of work, proof of state or something else)
2) How is this deployment different from that of the crypto-currency.
3) What other solutions are out there for the same application domain.
*Paper will need an Executive Summary
*Area of interest – IoT Security and Privacy
The purpose of this research is to make a substantial contribution to re-modifying and justifying techniques utilized by Governments and IT-based organisations in preventing the occurrence of cybercrimes.
RESEARCH QUESTION
What framework can the banking heads and Government utilize in strategizing against the emergent cases of cybercrime in Nigeria?OBJECTIVES
The following are the research objectives to this research:
1. to identify current laws in practice by government to protect users end data and consent.
2. To provide a safer understanding to protocols/laws governing end-user’s personal data and consent as regards internet banking.
3. To discover common unethical practices made by banking professional and its impact (positively or negatively) on business processes and outcome.
4. Investigating interventions made by Authorities to prevent cybercrimes.
5. To identify contributing factors that are identified with Cyber offences.
6. To investigate if the banking sector’s security standards are in alignment with the latest advancements of ICT in the modern world.
7. To identify what ethical issues are at the root of cybersecurity’s practices in the banking sector.
8. Utilizing case studies with cybercrimes around the world to project a framework for banking professionals.
9. Most recent cybercrime in Nigeria?
DELIVERABLES
A supplementary framework to provide governments, IT organisations and cybersecurity analyst the strategies and resources needed to combat cybercrimes and also provide a more detailed ethical review of such approaches.
Consider the two vulnerabilities: Structured query language (SQL) injection and cross-site scripting. Complete the following:
Research these topics, and find 2 examples of breaches for each.
Provide a brief explanation in your own words for what these vulnerabilities entail.
Summarize the breaches in terms of the damage to the businesses and the specifics of the attacks.
What could have and should have been done to prevent the breaches?
What could have and should have been done to mitigate the resulting damage?
seems that online voting for Government elections would present a straightforward solution to the problems many countries face with low voter turnout, manual errors in the physical counting of votes and relying on the postal system for overseas nationals.
Since the turn of the century, many highly advanced, populated countries have embraced e-voting. Most European countries have since returned to paper ballot systems.
Remember the definition of e-voting is “the application of electronic technology to cast and count votes in an election”. Most countries utilise ‘on site’ voting with advanced identity verification processes. Remote e-voting is in a much earlier stage of development and testing. If you consider this in your report you need to be clear on the differences between the two voting systems.
You are required to carry out a small research project and produce a research report.
The purpose of your research project is to answer the following research question:
“Is ‘e-voting’ a viable and sustainable option to use for UK Government elections rather than the current paper-based system?”
Your report should consider whether e-voting would present a fair, secure, accessible and reliable system for the UK at the present time by weighing up the potential risks and benefits.
You will need to produce an assignment plan for the research project and report before you begin.
The report should be written using the recommended format and structure as outlined in the study materials for this unit.
Relevant theory must be referenced, and you must provide a references list and bibliography.
A copy of any surveys or questionnaires used and/or transcripts of interviews must be included to evidence that primary research has taken place. The outcomes from the primary research must be presented using graphs, charts and/or tables and these must be included in the report.
The report should be a maximum of 3,000 words in length.
This word limit is the absolute maximum you are permitted. If you are over the word limit for this assignment in any way you will receive your assignment back without further comment or feedback.
You must submit your assignment plan for marking along with the research report.
Prepare a 2-3 page paper following the guidelines in the course outline discussing the following topic and clearly articulate your points. This is an APA formatted paper of your content, excluding: title, abstract, reference, etc.
Topic: Discuss the technical challenges presented with the large hard drives or RAID volumes.
Our team has experienced writers that follow all the codes used in professionalism when writing academic essays. We focus our services on satisfied clients. Through critical attention to detail, our writers abide by all the instructions given by clients. Additionally, the paper format is done according to the dictates of the client in respect to the set academic style. We are proud of completing outstanding top-quality papers.