Category Archives: Computer Science

Information System management

Scenario A
You are the business owner of a local small engine repair shop, and you have been thinking about implementing a knowledge management system for your customer service technicians. You are thinking about this because there are times when some of your technicians know how to fix certain engine problems and others do not. Providing a central knowledge repository could help share troubleshooting and repair knowledge among your technicians.
Scenario B
You are the business owner of a local cleaning service, and you have been thinking about implementing a knowledge management system for your cleaning technicians, especially for those who troubleshoot and solve cleaning problems, such as removing certain carpet and water stains, addressing mold, and selecting the proper tools and products to use for other types of cleaning issues. You are thinking about this because there are times when some of your cleaning technicians know how to properly clean carpets and others do not. Providing a central knowledge repository could help share cleaning knowledge among your cleaning technicians.
After you chose your scenario (A or B), compose a paper that addresses the elements listed below.
Explain the role of knowledge management systems.
Explain what is meant by expert systems.
Explain what is meant by content management systems.
Discuss how the business in the selected scenario could benefit from an expert system and a content management system, and provide two examples for each type of system.
Discuss how the business in the selected scenario could benefit from business intelligence, and provide two examples of these benefits.
Discuss how the business in the selected scenario can use social media to not only obtain information and knowledge but to share it as well, and provide two examples of how the business might use social media information systems.
Your paper must be at least two pages in length (not counting the title and reference pages), and you must also use at least two scholarly sources, one of which must come from the CSU Online Library. Any information from a source must be cited and referenced in APA format, and your paper must be formatted in accordance to APA guidelines.

I have attached an Academic article from the CSU Library and the reference is below. References
Hu, Y., Xu, A., Hong, Y., Gal, D., Sinha, V., & Akkiraju, R. (2019). Generating Business Intelligence Through Social Media Analytics: Measuring Brand Personality with Consumer-, Employee-, and Firm-Generated Content. Journal of Management Information Systems, 36(3), 893930. https://doi-org.libraryresources.columbiasouthern.edu/10.1080/07421222.2019.1628908

Strategies

Must post first.
Begin by reading the Week 8 readings. You will need to cite information from these readings in your discussion paper.
The senior leadership of your financial services organization is preparing for a quarterly stockholder / investor meeting. During these meetings, several time slots are devoted to current events / issues which the company finds itself needing to address. For next meeting, you have been asked to give a presentation on Cyber terrorism as a strategic threat to the organization.
To prepare for your presentation, you should research existing threat intelligence (using public sources only). What types of cyber terrorism must your financial services firm be aware of and how should it respond to these environmental / existential threats?
Compose your analysis and strategy recommendations as a 5 to 7 paragraph background paper. Post your paper as a reply to this topic. Remember to cite your sources and include a reference list at the end of your posting.
You must start a thread before you can read and reply to other threads
Add introduction, headers and summary

Leadership

Leadership Update: Cyber Crime

Must post first.
The senior leadership of your organization is preparing for its annual three day meeting. During these meetings, one day is devoted to current events / issues which the company finds itself needing to address. For this year’s meeting, you have been asked to give a presentation on Cybercrime as a strategic threat to the organization.
To prepare for your presentation, you should find a recent news report or law enforcement press release about a specific instance of a cybercrime which impacted the financial services industry (or customers). Analyze the report / press release and then write a background paper containing your analysis and findings.
In your background paper, include a summary of the report or press release that addresses the crime, the perpetrator, motive (if known), methods, the victim(s), the object of the crime (systems, data, networks, etc.), and the outcome of the investigation / prosecution.  (Who did what to whom? What happened?)
Should the company take actions or develop strategies to protect itself from similar crimes? What are your recommendations in this regard?

have Introduction and transition header plus summary.

computer science for network

I need personal statement to get master degree in (computer science for network ) at (institute Polytechnique de Paris-IP Paris, https://www.ip-paris.fr/en/home-en/about-us/who-we-are/) where as I’ve been living in Paris scine sep. 2018 and my bachelor degree was in computer science ( all the detail of my studying, career, and skills are attached in my CV), I’ve chosen this institute because they have an educational programs in various fields in English.

Steganography

I have added a basic outline that is for ideas only.  If it is highlighted you DO NOT need to write/research on it, I will.  If you have experience in this area and want to write on it that is fine as well. I need help with the majority of the paper and I will just add to the paper later.  Topic 8 and 9 are extremely important.
Must use at least 7 sources including peer reviewed articles.

IT Systems recommendation

For the Final Project, you are asked to write an eight-to ten-page research report (typed, double-spaced) in which you describe a company of your choice, the nature of its business, a specific product or service, and how that product or service is produced and distributed by the company and then recommend the information technology system you think should be in place and why. Address the following questions in narrative form (according to APA style). Be sure to provide examples and supporting rationale throughout the paper.

Company Background and Information Systems

What is the name, nature of business, and specific products or services of your chosen organization?
How are the products or services produced and distributed by the company?
Why are information systems essential in managing the organizations business?
Describe the existing information systems supporting the major business functions of the organization (e.g., sales and marketing, manufacturing and production, accounting, human resources, etc.)
Information Technology Recommendation

What is your recommendation for the information technology systems you think should be in place and why? Your recommendation should include the following:
Information needs:
What types of decisions do users need to make by accessing the information systems?
What are the different levels of information groups?
Need for system automation
Benefits of the proposed system (savings, quality improvements, faster processing, etc.)
Types of database data elements (data, images, photographs, sound, video, etc.)
Networking and interactive processing
Centralization versus decentralization
End-user computing needs
Your recommendation to develop or acquire the system software
Potential Security Threats

Describe the various threats and security threats to the proposed information system. What security controls are required to address the threats?
Social, Political, and Diversity Impacts

Summarize the social and political issues raised by the proposed information system.
Discuss the impact of diversity to the development and management of the proposed information system.
Conclusion

References

The Final Project IT System Recommendation

Must be eight to ten double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).
Must include a separate title page with the following:
Title of paper
Students name
Course name and number
Instructors name
Date submitted
Must use at least three scholarly sources in addition to the course text.
The Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.
Must document all sources in APA style as outlined in the Ashford Writing Center.
Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.

HIPPA Basic Training for Privacy and Security

The human resources department is updating its HIPAA Basic Training for Privacy and Security course.
HIPAA Basic Training for Privacy and Security Course Topics
What is HIPAA?    HIPAA Privacy Rule    HIPAA Security Rule
Why HIPAA is Important    Safeguarding of PII and PHI and ePHI     Disclosures of PII and PHI and ePHI
HIPAA, PII, PHI, and ePHI Definitions    BA Agreements    Potential Violations
Patients Rights    Breach Notifications    Reporting Procedures
Vendors and Contractors     Policy Enforcement    Sanctions for Privacy and 
Information Security Violations
As a security analyst for the hospital, you have been tasked with covering the topics in the training related to the HIPAA security rule and the information that hospital staff need to know regarding personally identifiable information (PII), personal health information (PHI), and electronic personal health information (ePHI) to comply with federal regulations. 

The deliverable for this assignment is a narrated PowerPoint presentation that provides definitions of HIPAA, PII, PHI, and ePHI, and describes the security measures required for compliance.

Your narrated presentation should contain one to two slides for each of the following topics:

HIPAA Security Rule
HIPAA, PII, PHI, and ePHI Definitions
Safeguarding of PII, PHI, and ePHI
Disclosures of PII, PHI, and ePHI

nstructions
The human resource department is updating its HIPAA Basic Training for Privacy and Security course. As a security analyst for the hospital, you have been tasked with covering the topics in the training related to the HIPAA security rule and the information that hospital staff need to know regarding personally identifiable information (PII), personal health information (PHI), and electronic personal health information (ePHI) to comply with federal regulations.

This week, you will submit your presentation. The presentation should include voice overlays as narrative for each slide. Include one to two slides explaining the following:

HIPAA Security Rule
HIPAA, PII, PHI, and ePHI Definitions
Safeguarding of PII, PHI, and ePHI
Disclosures of PII, PHI, and ePHI
You may want to refer to the HIPAA Learning Resources from last week.

How Will My Work Be Evaluated?

In this training guide, you will demonstrate how to integrate your IT skills in an organizational setting. Youll be combining your technical skills with effective communication techniques to provide learning resources for the client/customer.

You will not be evaluated on the voice recording quality.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.
2.3.3: Explain inferences and deductions that follow logically from the evidence provided.
12.1.3: Communicate policies, processes, and/or procedures to stakeholders.
12.3.1: Select controls.
12.3.2: Describe the implementation of controls.
12.3.3: Explain how to assess controls.
12.9.1: Describe organizational compliance with government legislation that impacts technology.
12.9.2: Explain organizational compliance with industry regulations.

Response to classmate’s post

This is a two part assignment:
My post (which has already been COMPLETED and is attached below) is highlighting key points from the reading material, the PDF’s which are attached below.

My classmates post is attached as docx. We need to respond to it after reading the following PDF’s attached (Management of Information Security, Chapters 1 & 2) and my post.

What the instructor/teacher is looking for in the response to classmates post:
Did the student respond thoughtfully and respectfully?
Did the response incorporate and address other concepts?
How thorough were the student responses to other posts?

Introduction to Computers

Of the five primary components of an information system (hardware, software, data, people, process), which do you think is the most important to the success of a business organization?

Part A – Define each primary component of the information system.

Part B – Include your perspective on why your selection is most important.

Part C – Provide an example from your personal experience to support your answer.

Length/Formatting Instructions
Length    4 pages, double spaced, 1″ margins
Font    12 point, Calibri Font
Program/File Type    Submit in Word
Referencing system    APA referencing system is necessary in assignments, especially material copied from the Internet.

IT and Censorship

Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Note: When using sources to support ideas and elements in an assessment, the submission MUST include APA formatted in-text citations with a corresponding reference list for any direct quotes or paraphrasing. It is not necessary to list sources that were consulted if they have not been quoted or paraphrased in the text of the assessment.

A.  Compose an appropriate, arguable thesis statement that previews two to four main points and that you plan to use in your research paper.

B.  Create an annotated bibliography of eight to ten appropriate, credible sources that you plan to use in your research paper.

Note: You may use the attached Annotated Bibliography Template to complete your annotated bibliography, but use of the attached template is not required.

1.  Provide a full, APA-formatted reference citation for the 810 sources.

2.  Provide an annotation (suggested length of 150 words) for each of the 810 sources by doing the following:

a.  Summarize the information presented in the source.

b.  Analyze the credibility of the author of the source or of the publication (e.g. journal, publisher, or website), if no author is present.

c.  Analyze the relevance of the source to your chosen research topic.

3.  Write each  annotation in your own words, without the excessive use of direct quotation or extensive paraphrasing, for the 810 sources from part B.

C.  Demonstrate professional communication in the content and presentation of your submission.

These are 7 of my 8 sources, you can find an 8th random article concerning IT and censorship.

Barrinha, A., & Renard, T. (2017). Cyber-diplomacy: The making of an international society in the digital age. Global Affairs, 3(4-5), 353-364. DOI: 10.1080/23340460.2017.1414924.

Ensafi, R., Winter, P., Mueen, A., & Crandall, J. (2015). Analyzing the Great Firewall of China over space and time. Proceedings on Privacy Enhancing Technologies, 2015(1), 61-76. DOI: 10.1515/popets-2015-0005.

Fourie, I., Bitso, C., & J.D. Bothma, T. (2014). Methods and resources to monitor internet censorship. Library Hi Tech, 32(4), 723-739. DOI: 10.1108/lht-11-2013-0156.

Liang, B., & Lu, H. (2010). Internet development, censorship, and cyber-crimes in China. Journal of Contemporary Criminal Justice, 26(1), 103-120. DOI: 10.1177/1043986209350437.

Maitland, C., Thomas, H., & Tchouakeu, L. (2012). Internet censorship circumvention technology use in human rights organizations: An exploratory analysis. Journal of Information Technology, 27(4), 285-300. DOI: 10.1057/jit.2012.20.

Terman, R. Internet censorship (Part 2): The technology of information control. Townsend Center for the Humanities. Retrieved from https://townsendcenter.berkeley.edu/blog/internet-censorship-part-2-technology-information-control.

Ververis, V., Marguel, S., & Fabian, B. (2019). Cross country comparison of Internet censorship: A literature review. Policy & Internet. DOI: 10.1002/poi3.228.