What is data integrity and why is it important? Describes data integrity vividly and its vitality in the database systems as well as our lives. Describes the various types of data integrity in detail and their constraints and rules.

DATA INTEGRITY

Data integrity is a crucial area of database security and is the overall maintenance and assurance of data consistency, accuracy and completeness. It is also referred to as the safety and security of data according to compliance regulations (Talend, 2021). According to Brook (2020), data integrity is the accuracy and validity of data over its lifecycle. Data integrity ensures that data remains in its constant unaltered nature when copied or transferred. However, data integrity differs from data security in that data security is the protection of data from attackers and violations (Brook, 2020).

The organization Talend in ‘What is data integrity and why is it important?’ describes data integrity vividly and its vitality in the database systems as well as our lives. Furthermore, the source describes the various types of data integrity in detail and their constraints and rules. Talend clarifies on what data integrity is not and differentiates data integrity and data security as the two concepts are often confused as one. Data integrity compliance with protection regulations as well as data integrity risks are also discussed and how to get started with data integrity. Talend gives all the necessary details regarding data integrity on all fronts and chapters.

Chris Brook on ‘What is Data Integrity? Definitions, Best Practices & More’ follows a more similar approach to data integrity as Talend. Brook makes a brief description of data integrity, how it is violated and the importance od data integrity. He further adds data integrity as a state and as a process and distinguishes the two features. Brook defines a case for data integrity and highlights in details the application of data integrity to databases by defining the various types of data integrity. Finally, the article distinguishes data integrity from data security by highlighting the similarities and differences of the two. Chris Brook gives insight in example form on data integrity.

The paper seeks to discuss data integrity as an area of database security in full detail. While data integrity constitutes the validity and consistency of data, data security refers to the protection of data hence can be described as a means to maintain data integrity. The importance of data integrity is very crucial and is limitless but the paper helps outline the major importance of maintaining data integrity and also how data integrity is compromised in various situations such as in organizations and local databases such as human error, viruses and cyber threats, transfer errors.

There are four types of data integrity namely entity integrity which utilizes the use of primary keys to avoid data replication. Referential integrity entails rules on the use of foreign keys in data manipulation. Domain integrity that ensures accuracy of every data contained in a domain and user-defined integrity which contains rules created by users to fit their needs (Talend, 2021). These types of domain are further discussed highlighting their features, examples and use.

Data integrity is differentiated to what it isn’t such as data security. Data security is the protection of data against corruption while data integrity focuses on keeping data accurate and consistent. Data security can be considered a measure employed to maintain data integrity (Brook, 2020). The differences and similarities of the two concepts are clearly highlighted in the paper to create a clear understanding of what data integrity is and isn’t. The risks associated with data integrity such as human and transfer error, cyber threats and compromised hardware are also laid out as well as the means to minimize and/or eliminate the data integrity risks.

What is the topic about? Who cares about the topic? Why is it important? What makes it interesting? What details have people put forth?

Personhood

Background:
Our main learning objective is ‘analysis’. But what’s the point of analyzing if we can’t apply. Our task is to synthesize, structure, and apply concepts from our course.
The purpose of this assignment is twofold: 1) To organize applied information in a precise form; 2) To make something that narrates your complex idea.

Your task:
Your assignment is to choose one of the following topics or any other topic that we discuss in Phil 1:

1) Mechanisms of ignorance
2) Socrates, Plato, and the Allegory of the Cave
3) Truth and Gettier
4) Personhood
5) Representation: Art or Science
6) Feminism
7) Egoism

The Project, Part 1 has two components:

1. The Writing Component:

• 50% of the total assignment.
• 1000-word essay, double-spaced.
• Must work individually on this
• Word document and double-spaced

How to Structure Your Writing Component:

A. Present Proper Background on Your Topic:
The necessary components are: A) that you introduce the importance and B) relevant background knowledge on the topic. It is also that you C) engage your audience with your episode.

A bit more detail on (A)-(C): What is the topic about? Who cares about the topic? Why is it important? What makes it interesting? What details have people put forth? (You can pick and choose those details.) You have to be as efficient as possible in the exposition. In the introduction you should have a way to make the audience interested in the topic. This is why it is very important that you choose something that you are fascinated by. If you do, you will be very involved in the discussion, and it will be easy for you to draw the viewer’s attention to the episode.

Note that your topic will be BOTH the concept and the application of the concept to the context. So, think about how to precisely state this.

B. Your thesis:
The necessary components are: you have to have A) a clear thesis which tells the audience what you will argue; and B) an outline for how your discussion will flow. Make sure that you are giving a cohesive discussion, rather than just listing some viewpoints on the topic. Work a lot on the precision of your thesis, and the structure/steps that you will use to unfold your thesis. Your thesis will give a precise glimpse into how your argument works. That is, how does your particular concept apply to a given modern-day context? Then, your outline for your discussion will structure each of the components into the subsequent paragraphs/sections that you set out.

C. The specific components of your argument:
The necessary component is that you make explicit how each concept that we learned seamlessly integrates into your argument. This will require many paragraphs. I would recommend having paragraphs that focus on one small point and then illustrate that point.

D. Conclusions:
In a unique fashion, state what you have done and why it is important.

E. Make sure to always cite. MLA, APA, Chicago, are all acceptable for citations. Make a habit of citing your sources in written work. (You do not have to say a citation out loud in the video component.)

What exactly is psychological capital and what makes people engaged? What does engagement look like?

Effects of Psychological Capital

The relationship between student engagement and positive psychology. Research about psychological capital and student engagement in higher education.

What exactly is psychological capital and what makes people engaged? What does engagement look like?

Describe how and why the company can benefit from spending time planning at the beginning of the project, instead of just jumping in and developing the applications to meet the perceived needs.

The Database Models, Languages and Architecture

The current database that your company is using keeps track of all of the customers and suppliers as well as products offered for sale, but the current environment has all of this data spread out across multiple different databases and it is difficult to see a complete picture of the environment. You have been tasked to consolidate the environment into a single database environment with the end goal of adding a data warehouse for the company.

Your manager is excited with the project description, is anxious to have a new database built for the company, and more excited that at the end of the project he will also have a data warehouse to help make strategic decisions. To start, your manager would like to understand the benefits of following a formal design methodology, especially with respect to database design. Describe how and why the company can benefit from spending time planning at the beginning of the project, instead of just jumping in and developing the applications to meet the perceived needs. To ensure that you give the best response, you choose to describe the 3-level ANSI-SPARC architecture and want to make sure you discuss how the use of this will promote data independence to save time in the long run.

You also want to take this opportunity to answer any potential questions about personnel needs with this new database environment. Describe the roles of a data administrator (DA) and a database administrator (DBA); describe the job functions of each and how the tasks they each perform differ. Would you recommend that your company has one person to perform both tasks, or should it hire two people?

Discuss how the lyrics to ‘Strange Fruit’ conveys the depths of racism include sociological concepts as you examine the lyrics. Research why this song was banned from the radio. Identify and analyze which social movement theory: From our course textbook/course materials, that best explains the impact of the song, “Strange Fruit”, and include another song or songs that have motivated social movements or helped to create social change.

Strange Fruit

Watch the following video:

Prompt: Music has always played a big part in culture and social movements. Billie Holiday’s recording of “Strange Fruit,” a song about lynching, raised awareness about racism despite being banned from the radio after its 1939 release. The YouTube video below gives you some background about that song, please read this entire assignment prior to viewing it.

Prompt: Analyze the song, ‘Strange Fruit’ by Billie Holiday by establishing connections between the song’s lyrics and relevant sociological concepts, terms, or theories. Be sure to use at least one Sociological theory (structural functionalist, social conflict, or symbolic interactionist) in your analysis, along with one scholarly academic resources.

Discuss how the lyrics to ‘Strange Fruit’ conveys the depths of racism include sociological concepts as you examine the lyrics. Research why this song was banned from the radio (cite this source). Share your thoughts on the impact the song would have had if allowed on the radio during this time in society. (1 paragraph, 5-7 sentences in length)

Identify and analyze which social movement theory: (Conflict Theory or Symbolic Interactionism)- from our course textbook/course materials, that best explains the impact of the song, “Strange Fruit”, and include another song or songs that have motivated social movements or helped to create social change. Explain at least one of the songs you identified and the problem(s) that it addressed. Be creative, the song can be old or new, about problems such as wars, women rights, gun control, religious expression, race, social inequality, etc. (1 or paragraph, 5-7 sentences in length)

Include other forms of popular culture that have also spurred social movements- choose a current event, news event, podcast or video of your choice that has influenced a social movement today. Use a journal article that helps to explain how the current event, news event, podcast or video you chose, promotes social awareness and social change in society. (1 paragraph of 5-7 sentences)

Conclusion (1 paragraph, 5-7 sentences in length)- What are your thoughts about the issue/social movement you discussed.

Provide short 100 word summaries for each source. Explain a few key aspects of the text, then provide a short reflection about why the source will be useful to your project.

Relationships with Children in Early Education v3

1. You will be finding three(3) new sources (I have 6 Sources to date – SEE ATTACHED) that all relate to my project topic, and meet the criteria above.

You have the freedom to explore caregiver-child relationship, such as grandparents, family members, friends.

2. Place a title at the top of your paper that indicates the scope of your current interests. This title can be refined since Sources 1 and the Topic Proposal.

3. Provide bibliographic listings in APA style for all three sources.

4. Provide short 100 word summaries for each source (300 words total for all three sources). Start by explaining a few key aspects of the text (such as argument, methods, evidence, and conclusions), then provide a short reflection about why the source will be useful to your project. Note that you need to read each source carefully in order to make these research notes–both about content and about how the source helps your project! In each summary, cite using APA style in-text, to show that you engaged carefully with the source. Good citation etiquette requires you to use an in-text citation whenever you mention ideas that you got from a text. This includes direct quotes (reproducing the authors’ words) and paraphrasing (summarizing the text’s ideas in your own words). Students often forget to include citations when paraphrasing! You should also cite whenever mentioning the authors. Page numbers are necessary when the ideas or quote come from a specific page, but citing happens even when referring to the text overall or in general.

5. Include a Summary and Self-Reflection (See previous paper)

Think about the value chain and how the company uses its primary and support activities in order to manipulate the value stick. What are the company’s key resources, capabilities and competencies, and how can you best describe them?

Consultancy Project/Strategy Analysis

Assignment Guidance for Internal Analysis (single company within the pharmaceutical industry):

– Think about the value chain and how the company uses its primary and support activities in order to manipulate the value stick. What are the company’s key resources, capabilities and competencies, and how can you best describe them?

– Constructs like the productivity frontier, willingness to pay, the value stick and value chain, and the GE-McKinsey nine-box matrix

– Look at how we can assess competitive rivalry and strategy, based in part on its industry make-up, market definition and organisational characteristics, but also its strategic objectives; and generalisability of strategic frameworks. The ability to thoroughly assess a strategy is the cornerstone on which not only careers, but strategic change and digital transformation is built.

– Pricing strategy
– Marketing strategy
– Operations strategy
– Cybersecurity strategy

Explain your approach to enable Kubernetes and maintain server hardening. Compare your response to those of your peers and determine if the hardening approaches will be effective against cyber attacks.

Enable Kubernetes and Maintain Server Hardening

Your IT manager is determined to use Kubernetes within the Windows Server environment. If the manager tasks you to configure this structure,

• Explain your approach to enable Kubernetes and maintain server hardening.

• Compare your response to those of your peers and

• Determine if the hardening approaches will be effective against cyber attacks.

• Justify your ideas with specific examples.

 

Submit a technical report to describe the purpose and the detailed usage of the tool you have selected. Detailed steps to set up the environment should be organized in the appendix if you demonstrate the tool in a customized environment.

Password cracking using Linux Environment

Submission: Technical report

You need to submit a technical report (4 -6 pages, 12 point font, single-spaced, including graphs) to describe the purpose and the detailed usage of the tool you have selected. Detailed steps to set up the environment should be organized in the appendix if you demonstrate the tool in a customized environment.

 

Develop arguments for and against the auction of the medical records. Consider what could happen to the data upon its release, or any laws that may be broken. Consider the likely benefits to the public. Consider what mechanisms for data protection should be explored or stipulated by the NHS prior to the release of the records.

Net neutrality, crypto-currenencies, privacy and data protection

1. Net Neutrality
The original founders of the internet, and subsequently, the wide-wide-web, envisaged equality in terms of how and when network data should be routed around the networks.
Recently, the large media streaming services and some internet service providers have lobbied governments in the US and Europe (including the UK) to allow certain data to be routed with a higher priority than other traffic. The services would decide which traffic would be routed and when.
Arguments have raged for many years about this, with proponents of net neutrality wanting the internet to remain free of control of data, especially by big corporations and governments. On the other side, many companies want control to enhance network transmission speeds and to generate extra sources of income.
Service providers claim that they need to do this to ensure optimum network speeds in the face of ever-increasing video traffic and to ensure a high quality of service for their customers. The providers often say they would charge a premium to eliminate waits/buffering of video by placing a higher priority on such traffic across their networks. Consider revenue for internet service providers and quality of service for customers.
Supporters of Net Neutrality claim internet traffic should be free to move around, unhindered or interfered with. They also argue that the internet would become only usable to those able to afford the higher costs of guaranteeing their traffic would be transmitted. Here, consider the paying public and society in general

Develop arguments to determine whether the internet should be controlled on behalf of internet services providers (ISP) or not.

2. Crypto-Currencies
In recent years, there has been much excitement surrounding crypto-currencies. These are purely digital mechanisms to represent money. They have no paper-based or real-world version. Transactions are recorded digitally. Crypto-currencies transcend international boundaries and jurisdictions.
The concept behind crypto-currencies is that they provide an anonymous means to hold and transfer money. They are designed in such a way to hide details of ownership and retain the anonymity of those involved in any transactions. Because of these design features, many governments, tax departments and law-enforcement agencies have declared crypto-currencies dangerous – they claim that criminals can easily take advantage of their anonymous properties and others can use them to avoid paying tax.
Crypto-currencies usually work by recording transactions in what is known as a ‘block chain’. This is a very large distributed data store that is effectively a ‘ledger’ or ‘record’ of transactions. This ledger is held on the many computers (known as ‘nodes’) that participate in supporting a particular block-chain. Individual transactions are added to the block-chain and are communicated between the nodes. Fundamentally, the block-chain is a data set and associated mathematical equations comprising algorithms that are used to validate the integrity of the data. Computers that participate in supporting a particular block-chain assist in processing the algorithms that check the data. Undertaking such activities reward those involved by awarding them an amount of the crypto-currency that the block-chain supports. This is known as ‘mining’, but without it, the given crypto-currency will stall as the transactions will go unverified and therefore be un-trusted.

Develop arguments for and against crypto-currencies. The considerations here are establishing frictionless financial transactions, anonymity, and the ability to transcend international boundaries, along with the link between crypto-currencies and crime (due to the anonymity of transactions) and the ability to evade local tax legislation. You may also wish to consider any limitations to the underlying technology.

3. Privacy and Data Protection
In today’s technologically driven world, storage and transmission of personal data is the norm. It is not unusual for data about an individual to be stored in thirty or more different places by different companies or organisations. Online retailers, media-streaming companies, social media sites, banks, insurance companies, medical services, educational establishments, and local authorities, are amongst the many organisations that store data about individuals. With a plethora of data sources, as well as a variety of different security arrangements, it is not entirely unknown for some of that data to end up in the hands of those who should not see it.
Because of some early electronic data breaches, most governments have created laws that protect an individual’s rights in terms of data access and security. In the UK, the adoption of the EU’s 2018 General Data Protection Regulation (GDPR), which replaces the UK’s Data Protection Act, is an example of such laws. These specify the rights of individuals to see the data that is stored about them and place stipulations on those storing the data. Allowing data to be accessed flagrantly, not placing data in sufficiently secure storage mechanisms, or not allowing individuals to see what is held about them, all constitute breaches of this legislation.
Despite these laws, it is not uncommon for data breaches to occur. The often-feared occurrence of hacking, which involves an outside entity breaking into a system to gather information, does happen, but is not as common as most people think. Instead, the most common reason for data loss is incompetence whereby access credentials are left exposed, private data is transmitted/given away by accident, systems left open by mistake or actual coding errors. The next most common cause is insider knowledge and misuse (i.e., ‘inside jobs’). Actual physical theft of data storage devices or computers, such as stealing laptops from cars, is the next most common reason. Viruses or malware present much smaller causes of data breach.

That said, if an individual becomes a victim of a data breach, irrespective of method, the results can be serious. Financial loss, reputational loss and loss of private and personal information can all affect an individual, sometimes disastrously.

Hypothetical Scenario
The UK’s National Health Service has recently proposed to allow third parties to access to patient medical records. The third parties comprise pharmaceutical companies, private medical research companies and big-data analysis companies. The NHS will auction one million patient records at a time, and the records will go to the highest bidder. Monies received will go back to patient care. It is envisaged that each batch of patient records will occur every three months until all records have been released.

Develop arguments for and against the auction of the medical records. You may want to consider what could happen to the data upon its release, or any laws that may be broken. Consider the likely benefits to the public. Also consider what mechanisms for data protection should be explored or stipulated by the NHS prior to the release of the records.