A Research Paper For A Master’s Class in APA format on the topic of the Protection of Surveillance Recordings with Blockchain Technology.
Category: Internet technology (IT)
-
“Social Media Dashboard: Maximizing Your Online Presence and Impact”
Use Tableau Software to finish this assignment.
In your assignment, you will build your own dashboard.
Your job begins by finding a sample data file. There are many out on the web but I suspect most of you have access to data from your jobs, homes, church, etc. that you can use for this project. I want this to be as meaningful as possible so I am hoping you are able to find a file that you can visualize in Tableau that will turn out to be something that is very useful to you personally.
Regardless of the file you choose, I want you to use best practices to build a dashboard that conveys useful information from your analysis. You have had a chance to practice building dashboards so this is a continuation of that process. Your job is to use your data file in Tableau to build a dashboard that can be presented to persuade an audience to take action.
To do this:
1. Become familiar with your data. What is in it? What story is it telling? What can you see?
2. Build at least four visuals that can be part of a dashboard.
3. Build a dashboard that shows your visualizations in a logical form that helps tell your story.
4. Write an accompanying paper that tells your story. This could be the script of your presentation. Describe each of your visuals and how they come together to become a dashboard that tells the story.
You will be graded on the quality of your presentation. Did you follow the best practices in presentation design? Do your visuals render correctly? Do they support the story you are trying to tell?
Export your dashboard as a PDF and submit it, along with your paper / presentation script, as you final project for the course.
Submit a total of 2 files ( a PDF and paper)
Use the attached files as reference.
.
.
.
.
.
I chose a social media dashboard. Please read the description below.
I am planning on making a social
media dashboard. It consolidates performance metrics from various social
networks like Facebook, Twitter, and YouTube. It provides insights into
engagement, follower count, and audience demographics, enabling data-driven
marketing decisions. The purpose of it is to display all your key metrics in a
single view. Use your social media metrics to shape your marketing
strategy, engage with your audience, increase your conversion rates, and
generate revenue. Social media dashboards allow you to gain insight with a
single glance and share your performance with your team so you can stay on top
of your social media strategies. The main audience of the social media
dashboard will be the followers, business owners, social media managers, etc. I
think the main challenge will be identifying the top social media marketing
metrics to track. The story that I intend to tell on my dashboard is to show a
good dashboard that gives the audience helpful data and features to manage
content, watch online chats, and look at competitors. By adding these features,
the audience will make smarter choices and boost their social media performance
plan. -
“Upgrading to Windows 10: Ensuring Security and Data Recovery for Tetra Shillings Accounting” Title: Addressing Limitations and Preparing Solutions for Stakeholder Requirements in Technology Configuration and Confidentiality Controls
The presentation must meet the following requirements:
11 to 15 slides of easy-to-understand content (text and visuals).
Remember, your audience is the IT team within an accounting firm.
voice annotation for every slide (excluding the reference slide)
at least two references
Content should include work that needs to go into making the upgrade
successful, how to improve security using two or three of the Windows 10
built-in features, and how-to backup and restore Windows 10 data using
some of the tools available in Windows 10.
The presentation should address your recommendations for the following |
items:
Version Summary
Recommended version of Windows 10 (e.g., Windows 10 Pro,
Enterprise, Pro Workstation) and specific reasons for your choice (e.g., security features, technical and business requirements).
Installation Methods
Explain Windows 10 deployment methods. Which method or methods you think will be appropriate for the upgrade? Consider the hardware specifications outlined in the project scenario.
Security Features
Windows Security, BitLocker, Defender, Local Security Policy
Backup and Recovery Overview
Discuss the importance of backing up and recovery of Windows 10.
This can include explaining what types of files and data that can backed up and restored. This should address:
the problems encountered when Tetra Shillings Accounting fell
victim to a ransomware attack that resulted in the loss of critical data.
the concerns that Tetra Shillings Accounting has concerning
recovering data that is lost due to deletion, corruption, or media
failure.
the ability to restore system files and settings without affecting
the user’s personal files and data.
the concerns that the client has about recovering systems that
are negatively impacted by an operating system update.
Backup and Recovery Tools
You will need to explain how to use Windows 10 backup and recovery tools to meet these objectives. Provide a brief overview of each tool
and how it can be used to address the company’s concerns.
Use screenshots to demo how to configure backups that address the firm’s need to recover from a ransomware attack and restore the system to a state before a Windows update, driver, or application was installed. ****I, Robin Dubrier, will input these myself*****
Backup to Recover from Ransomware Attack
Describe how to back up and restore individual files using the utilities available in Windows 10. This should provide the client the ability to restore files lost due to ransomware attacks or other potential risks.
Backup and Recover a Restore Point
Research how to protect backup data that is stored on the network.
Based on your research, you need to present a strategy to protect
backup data that is compromised during a ransomware attack. This will most likely require a strategy to store, copy, or move backups to
an offsite location. In this slide, you will need to explain the risks of
only having only having a single copy of a backup stored on the
network. Think about if the client suffers another ransomware attack and the corrupted data cannot be restored because the backups
were also compromised during the attack.
PLEASE NOTE THE BELOW GRADING:
How Will My Work Be Evaluated?
In this assignment you are being called upon to present a high-level |technical presentation to your client’s IT Team.
But the challenge you face is in expressing a technical solution
without getting bogged down in too much detail. You simply want to
introduce or refresh the audience on the key points of Windows 10
benefits, including security and backup methods.
Find a way to relay your solution (and challenges) in language that
your audience will find easily relatable.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.1.2: Support the main idea and purpose of a communication.
1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
2.3.5: Articulate the implications, consequences, and potential limitations of proposed conclusions and solutions.
10.1.1: Identify the problem to be solved.
11.1.1: Explain appropriate preparation procedures.
1.2.1: Configure technology according to stakeholder specifications and requirements.
12.6.1: Identify the controls needed for confidentiality. -
The Evolution and Impact of C++: From its Origins to Modern Applications
Select one of the programming languages from the list below. Research the origins of the language. How has it changed over the years? What historical computer scientists have been involved in its evolution. What are important features that promoted its use? What types of applications has it been used for? Would you use it today? If so, for what types of software applications? If not, why not?
Ada
BASIC
C
C++
C#
COBOL
Fortran
Java
JavaScript
Lisp
Objective C
Pascal
PHP
Python
Smalltalk
Submit a 5-8 page paper of 12 point sans-serif font in single space with 1 inch margins. No title page or table of content. Use APA format for in-text-citations and reference list. For APA style guide, please visit:
https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html
This is not a copy and paste paper. Any work that is not in your own words must be properly cited. You may not have more that 15% content that is not in your own words. Your submission will be screened by TurnItIn which detects and reports content sources.
Plagiarism will result in a grade of 0 for this paper. -
“Closing the Gap Between IT and Business: Strategies for Effective Communication and Alignment” Abstract: This research paper explores the issue of the gap between IT and business and its impact on organizational success. The paper aims to identify strategies for closing this gap and improving
The term paper is to be 10 pages plus cover page. Any topic within IT Management is accept-able.. A minimum of ten citations including the text is required. The APA citation guidelines must be followed. Please see below for additional Topics tp choose from.
Closing the Gap Between IT and “the Business”
Setting the Scope for Enterprise Architecture Maturity
Methods that link IT Governance to Business Goals
Determining IT Core Competency
Strategic Planning in Information Technology
Determining the most important IT Processes
Strategic Alignment of an IT Organization
Change Management
Problem Management
The ITIL Framework
An Approach for Developing and Using IT Metrics
Assessing the Value of IT
Effective Approaches for procuring IT Funding on projects
Paper Characteristics
Use Arial font, size 12, 1-inch margins and double-spacing for writing format
The cover page is to include your name, class information, date, and instructor name in that order.
A one paragraph page summary of the research paper is required to follow the cover page (aka Abstract). A Draft ABSTRACT specifying the topic to be researched with an added statement for what you intend to convey.
Include a second paragraph in the final abstarct section explaining how the research was conducted (what specific tools, databases, etc. were used, how useful were these tools, keywords used, etc.) -
“Building and Reflecting on a Digital Collection: A Student’s Experience” Designing and Preserving a Digital Collection: Reflection and Future Plans
INSTRUCTIONS: DIGITAL COLLECTION PROJECT (worth 50 points)
Now that your digital collection proposal has been approved it is time to build and populate the digital collection. There are two parts to this assignment. Be sure to complete ALL requirements of BOTH parts as described below. PART ONE is developed on a server of your choosing (OU Create?) and a short description of your digital collection and the URL to access it will be submitted via a class discussion board. PART TWO is an essay submitted to Canvas.
PART ONE: DEVELOP AND POPULATE DIGITAL COLLECTION
*Class before you can set up your Omeka app you must register and get a domain through OU IT. Once you fill in the request form you should be in within one business day. Next, follow the instructions below for installing the application.
Using the Digital Library Management Software (DLMS) you chose in your proposal, you will set up your digital library on a public or private webserver. *If you have never created a digital collection before please choose Omeka for your platform. This can be found at https://create.ou.edu/dashboard/ – scroll down to Applications.
You should be able to set up a private domain through: create.ou.edu/dashboard with your OU 4×4. From there, the system will ask you what .oucreate.comLinks to an external site. domain you would like to use. After a terms of service page, the system will then direct you on to the Create dashboard. There, you can install Omeka and modify the domain as you see fit.
Please visit the Showcase site for examples:https://omeka.org/classic/showcase/Links to an external site.
If you are having a lot of difficulties please let me know and I will help you.
You may choose another platform that you are familiar with (and or pre-approved by me).
Follow the instructions for the DLMS you chose to set up, configure, develop the interface, and then create the records in your digital collection. Your collection will include completed records for the objects in your digital collection.
Undergraduates will include 25 completed records and Graduate students will include 40 – 50 completed records. Each record will include:
A digital image (or file) of the digital object you are describing OR a complete digital record for an analog item you are describing [ The purpose of this is to become familiar with creating digital files and formats ]
Metadata describing the object using the metadata scheme you chose. You must have a minimum of 10 completed descriptive fields in each record. If using Dublin Core I expect you will be able to complete most if not all fields in each record.
A permission and use statement (may be called Rights Statement in the metadata scheme).
Post a short description of your digital collection AND the URL to the Class Discussion Board, Digital Collection Project so classmates can view and discuss.
PART TWO: REFLECTION ABOUT YOUR DIGITAL COLLECTION
As the second part of the assignment you will reflect on your experience designing, implementing, and populating the digital collection. Answer ALL of the following questions completely in two to three paragraphs each (longer if necessary).
How useful do you think the digital collection is to your targeted user group(s)? Explain why or why not. Include elements related to interface design, functions provided by the DLMS or that you added, and any other criteria you would use to access usefulness.
What issues, if any, did you run into related to provenance and intellectual property? What copyright issues if any had to be resolved in building this collection?
What technical issues did you have to resolve when installing, implementing, configuring, and populating the digital collection?
How well does the metadata schema you chose work to describe the objects in your collection? Does it support user information behavior? Does it support successful retrieval? What would you change if redesigning the metadata scheme and why?
What was the benefit of using a special subject vocabulary for purposes of description and retrieval? Did you encounter any issues in doing so? If you did not use a controlled vocabulary to describe your collection did not doing so affect retrieval in your digital collection? If so, how? If not, why not?
If you were to design and implement a digital collection in the future is there anything you would do differently? Be specific and incorporate what you learned in this course into this answer. Saying you would choose a different collection is NOT an acceptable answer to this question.
What is your plan for preserving this digital collection? You may have no plans to do so but using what you learned in the module on Digital Preservation and Ch. 9 of the textbook explain your hypothetical plans for preserving the digital collection.
UPDATE Formatting
It is not necessary include a separate title page, but I do not print these papers, so please feel free to be creative with formatting and color – as long as it is professional and clean.
Please always include your name, and/or the names of all project partners (all of you will turn in a copy to me), the title of the project, class title, class code number and semester. It is not necessary to include my name anywhere on your proposal (or any assignments for this class).
Sometimes I scroll up and down while grading to compare parts of your paper – because I like to organize similar things by nature. It is easier for me to find my spot if you include page numbers. Please include page numbers on your assignment submission.
Number your responses and order them. Use 12-point type for the body of your paper, double spaced, following APA Guidelines. Always use in-text citations and include a reference list. This is part of a professional project.
Before turning in your final submission have someone proofread your writing. This is a best practice.
UPDATE Submission instructions
Submit electronically via the class website’s assignment page. Do this in one of the accepted formats.
To assist the instructor in managing submissions, name the file using the class file naming convention of: your last name, assignment name, and submission date, with no spaces, like this: DoeProposalMay52021.doc (doc indicates that it is a Word file, and is not part of the file name you type).
UPDATE Grading:
This assignment is worth 50 points and combined with the completed Digital Collection Proposal is worth 30 percent of the course grade.
Grading is based on the following criteria:
Ability to clearly demonstrate a foundational understanding of the concepts learned this semester. You will do this by integrating specific applications of these principles and examples into your final project and reflection.
Accurate completion of all requirements of the assignment by the due dates assigned.
Proper in-text citations with a reference page. -
“Leadership and Technology: An Interview with an Information Leader” Leadership and Management Insights from an Interview with a Successful Leader/Manager
Information and/or Technology Leader Interview
This is an individual project.
You will be responsible for seeking out a leader to interview from your network of contacts.
Criteria for selecting the leader: The leader’s job title does not matter, but they should be responsible for managing information and technology solutions in their organization. Managing information and technology can involve designing, developing, purchasing, implementing, or maintaining information and technology solutions. Select a leader who would be willing to answer ALL the questions below.
Sample information or technology solutions include but are not limited to desktops, laptops, mobile devices, websites, databases, mobile apps, networks, audio/video equipment, social media platforms, data/business analytics software, and cloud-based solutions.
You can select any organization of your choice, including but not limited to libraries, non-profits, schools, academic units in universities, research centers, government agencies, law firms, shopping malls, hospitals, small businesses, radio stations, and marketing agencies.
No two classmates should knowingly select the same leader.
You can interview the leader/manager in person, online, or over the phone.
Submit your text response on Canvas under this discussion board, equivalent to a double-spaced, 10-page typed paper with Font Type: Times New Roman, Font Size 12, summarizing your discussion with your leader. The max page limit is ten, and min page limit is seven pages.
Do not write the report in a question-and-answer format, and do not write direct quotes from the leader.
Follow the following format for your discussion: “When asked about the daily activities, the leader explained that supervising ………..” The paper should focus on your understanding of the leader’s responses.
You must ask the following questions and include the responses in your report. Ask follow-up questions if the leader provides brief answers. You are expected to seek detailed answers to the following questions. Number each response:
Background: Name of the leader (Use your judgment), the title of the leader (Use your judgment), name of the information organization, years in a current leadership position, and number of direct reports (i.e., the number of people working under the leader’s supervision) (5 points)
What are the daily activities you would define as leadership/managerial activities? (5 points)
What are the biggest challenges you face in being a leader/manager? (5 points)
What are the biggest rewards for you in being a leader/manager? (5 points)
What are the greatest influencers of leadership/managerial success in your organization? (5 points)
How important, if at all, is it for managers to be sensitive to employees’ work-life issues/needs? (5 points)
How do you handle stress in the workplace? What are the familiar sources of stress in the workplace for the employees and a leader/manager? (5 points)
How would you describe your leadership/managerial style, for example, employee-oriented, task-oriented, or a balance of both? (5 points)
What is the role of information in managing or leading any team or organization? (5 points)
What is the role of technology in managing or leading any team or organization? (5 points)
What is the role of organizational policies and external factors in managing or leading any team or organization? (5 points)
Do you think people can learn to be leaders? Are some people “born” leaders? Why/Why not? (5 points)
Do you enjoy being a leader/manager? What advice/tips would you give individuals interested in becoming a leader/manager? (5 points)
What advice/tips/guidance would you offer to individuals interested in becoming a leader or a manager? (5 points)
You are free to ask additional or follow-up questions and report the answers of the leader/manager at this point.
To answer the following questions, reflect on the above responses and your overall interview experience.
15. Share your top 3 lessons from this leader/manager interview. (10 points)
16. How would you lead or manage any group/organization in the future? Provide specific examples. (10 points)
17. How did your understanding of leadership or management change after this interview? Provide examples. (10 points)
Instructions:
You should not get “Yes” or “No” as your answer to the questions you ask. Your job as the interviewer is to ask questions/probe to understand the responses better.
Your final grade will be a mix of content (e.g., asking questions and describing the responses), format, and grammar.
Please keep your interview notes carefully in case I ask you to submit them for reference. -
“Securing the Cloud: Exploring Trends and Solutions in Cloud Computing Security”
A research project will give the graduate student an opportunity to bring the information and concepts learned in the course to bear on a topic of concern. The research work should documented in the form of an analytic research paper, which includes a review of the recent literature of a topic approved by the professor. The research project should review the literature, distill the primary issues, discuss the various possible solutions to the issues raised, identify “trends,” and formulate a position. The final output is a paper, 10-12 pages double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography. The paper must use APA formatting and reference citations with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. My topic is Cloud computing security.
-
Title: “Comparative Analysis of Cloud Service Models and Their Security Services”
I will narrate.
In this project, the CEO of Best Clothes Online Inc. (BCO) has asked you to
develop a detailed comparative analysis of cloud service models and their
security services. A comparative analysis provides an item-by-item
comparison of two or more alternatives, processes, products, or systems.
In this scenario, you will compare the pros/cons of cloud service models in
terms of security responsibilities and level of control between cloud
consumers and Cloud Service Providers.
Questions from the CEO to answer:
What are the differences between IaaS, PaaS, SaaS in terms of shared
responsibility between cloud consumer and Cloud Service Provider?
What are the pros/cons of each model?
What security services are offered by each model?
How can each model be used to support Disaster Recovery?
How do the costs compare between models?
Which model is considered better for small, medium, and large
businesses?
You will present your findings to the owner of the company in a narrated
PowerPoint presentation with 15 to 28 slides. Use the Cloud Security
Presentation Template.
Presentation Guidelines
It is recommended to use the Cloud Security Presentation Template.
Your presentation should be comprised of the following:
One slide to introduce the presentation and describe what is a Shared Responsibility Model (SRM)
One to two slides on the SRM for IaaS
One to two slides on the Security Services of IaaS
One to two slides on how IaaS can be used to support Disaster Recovery
One to two slides on the pros/cons of IaaS
One to two slides on the SRM for PaaS
One to two slides on the Security Services of PaaS
One to two slides on how PaaS can be used to support Disaster Recovery
One to two slides on the pros/cons of PaaS
One to two slides on the SRM for SaaS
One to two slides on the Security Services of SaaS
One to two slides on how SaaS can be used to support Disaster Recovery
One to two slides on the pros/cons of SaaS
One slide on the conclusion.
One to two slides for references used for the presentation
All slides must be narrated by you, the student, covering 15–28 slides. -
Title: A Comprehensive SWOT Analysis of Word Link: Exploring the Strengths, Weaknesses, Opportunities, and Threats of the Popular Word Game
Please create a 11 page power point presentation base off of the SWOT analysis essay on word link provided.