Description
Imagine you are the IT manager for a large organization. Several of the organization’s managers have asked you what the policies are when it comes to employees using their personal devices at work.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Thank you for the opportunity to help you with your question!
Computer science is considered by some to have a much closer
relationship with mathematics than many scientific disciplines, with
some observers saying that computing is a mathematical science
Completion Status:
100%
Review
Review
Anonymous
Great content here. Definitely a returning customer.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
TWU Big Data Global Computing and Computing Technologies
The rising importance of big-data computing stems from advances in many different technologies. Some of these include: Sen ...
TWU Big Data Global Computing and Computing Technologies
The rising importance of big-data computing stems from advances in many different technologies. Some of these include: Sensors, Computer network, Data storage, Cluster computer systems, Cloud computing facilities and Data analysis algorithmsHow does these technologies play a role in global computing and big data?2 pages, No plagiarism, APA7 format, 2 references minimum
Discuss Statistical Significance as it pertains to web analytics
This lesson will require your reading of this chapter located in the book by Avinash Kaushik, the myths of web analytics w ...
Discuss Statistical Significance as it pertains to web analytics
This lesson will require your reading of this chapter located in the book by Avinash Kaushik, the myths of web analytics will be discussed. Locate book “Web Analytics an Hour a Day” by Avinash Kaushik in the APUS Library, Chapter 13 pages 329-347 and Chapter 14 pages 351-396 will be most helpful.Create an original post addressing the topic(s) below: Define and discuss Statistical Significance as it pertains to web analytics, formulate your own opinions of what this means. In addition, discuss Segmentation and the different ways of using its power.LECTURE explains the importance of Segmentation and best practices to follow: https://1147982.kaf.kaltura.com/browseandembed/index/media-redirect/entryid/1_wy45de5c/showDescription/false/showTitle/false/showTags/false/showDuration/false/showOwner/false/showUploadDate/false/playerSize/# https://edge.apus.edu/access/content/group/science...https://edge.apus.edu/access/content/group/science...
Data Analysis
1. Data Analysis (Cluster Analysis) Attached Files: Cluster_Data_wk4.xlsx (9.002 KB) Included with this assignment i ...
Data Analysis
1. Data Analysis (Cluster Analysis) Attached Files: Cluster_Data_wk4.xlsx (9.002 KB) Included with this assignment is an Excel spreadsheet that contains data with two dimension values. The purpose of this assignment is to demonstrate steps performed in a K-Means Cluster analysis. Review the "k-MEANS CLUSTERING ALGORITHM" section in Chapter 4 of the Sharda et. al. textbook for additional background. Use Excel to perform the following data analysis. Plot the data on a scatter plot.Determine the ideal number of clusters.Choose random center points (centroids) for each cluster. (Note: Each student will select a different random set of centroids.)Using a standard distance formula measure the distance from each data point to each center point.Assign each data point to an initial cluster region based on closeness.For each cluster calculate new center points.Repeat steps 4 through 6. You will use Excel to help with calculations, but only standard functions should be used (i.e. don't use a plug-in to perform the analysis for you.) You need to show your work doing this analysis the long way. If you were to repeat steps 4 through 6, what will likely happen with the cluster centroids? Here is a link to an example spreadsheet using a smaller data set. It contains two tabs. The first tab is the raw data. The second tab contains the analysis that was performed. Make sure that you use a different starting center points from the example. Example Excel Analysis 2. Data Analysis (Apriori Analysis) Attached Files: Aprior_Data_week4.xlsx (13.198 KB) Included with this assignment is an Excel spreadsheet containing customer receipts. The purpose of this assignment is to demonstrate steps performed in an Apriori analysis (i.e. Market Basket analysis). Review the "APRIORI ALGORITHM" section of Chapter 4 of the Sharda et. al. textbook for additional background. Use Excel to perform this analysis. List the SKU which was purchased the most.List the two SKUs that were purchased most frequently together.List the three SKUs that were purchased most frequently together.List the four SKUs that were purchased most frequently together. Make note of any pattern that you noticed while performing the analysis. As a retail business owner, how would you use the results from this analysis? *Need the answers in two different excel sheets. *Use The Attached files to answer the questions
Jawaharlal Nehru Technological Healthcare Government Website Questions
Course: Web ApplicationsResearch the Dark Web. Write a brief paper on the following topics: What is the Dark Web? How is i ...
Jawaharlal Nehru Technological Healthcare Government Website Questions
Course: Web ApplicationsResearch the Dark Web. Write a brief paper on the following topics: What is the Dark Web? How is it accessed? How is it used by criminals? How can it be used in a positive way? How can be used by law enforcement and the intelligence services. How can be used by private individuals.Write between 300 and 350 words. Use your own words.---------------------------------------------------------------------------Course: Ethical HackingAnswer each these questions in a paragraph with at least five sentences:Include the question and number your responses accordingly. Provide a citation for each answer.1. Give an example from the book where insufficient testing was a factor in a program error or system failure.2. What was one cause in the delay in the completing of the Denver Airport.3. Why didn't the healthcare.gov website work at first?4. What is one characteristic of high reliability organizations?5. Describe the potential risks of alert fatigue in EHR systems.6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.7. What does design for failure mean?
Southern New Hampshire University HIPAA and FERPA Discussion
Corporations have to be in compliance with the laws, regulations, and standards that govern their business. For example, e ...
Southern New Hampshire University HIPAA and FERPA Discussion
Corporations have to be in compliance with the laws, regulations, and standards that govern their business. For example, educational institutions have to be in compliance with FERPA; health organizations have to be in compliance with HIPAA; and professionals that develop information security programs have to consider a range of information security laws (Sarbanes-Oxley Act, Gramm-Leach-Bliley Act).
Research the laws, standards, policies, and regulations that you might need to be in compliance if you were developing your project for a real-world scenario.
In your initial post, explain these and provide links to websites that provide information on them. Also describe any security requirements that are relevant and should be addressed in the project design.
Then, review the laws, standards, policies, regulations, and security concerns shared by your classmates. Were there any that you felt that they left out? Were there any that they shared that you should consider for your own project?
Peer Review #1
Vishnu Persaud posted
Hi Class
The Air Quality Monitoring project will need to ensure that users' personal data is protected and kept private. The web interface component is also accessible for even people with disabilities. There 2 regulatory measures come to mind that is aligned with this project. Here are the following:
The Privacy of Act of 1974 requires that the system prohibits disclosure of an individual's records without their consent (Department of Justice, 1974)
The web interface will also adhere to the Americans with Disability Act (ADA) which will impact the development of the application abstraction for the end-users (United States Department of Justice Civil Rights Division, 2010)
In addition, to the regulations, there 2 top security measures which will be implemented to ensure that users' data is secure and protect. The first being 2-factor authentication for accessing the web interface, and the second requirement will be periodic penetration testing to identify any vulnerabilities with the existing security measures.
References
Department of Justice. (1974). Privacy Act of 1974. Retrieved from The United States Department of Justice: https://www.justice.gov/opcl/privacy-act-1974#
United States Department of Justice Civil Rights Division. (2010). ADA Standards for Accessible Design. Retrieved from https://www.ada.gov/2010ADAstandards_index.htm
Peer Review #2
LaShaye Sykes posted
Hello Future Graduates,
Since my project has to do with the medical and the patient population (COVID stats tracking), if I were developing it for the real world I would need to be in compliance with
HIPPA
"The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge" (Health insurance portability and Accountability act of 1996 (HIPAA) 2018).
Hippa Privacy rule
"The Privacy Rule standards address the use and disclosure of individuals’ health information (known as “protected health information”) by entities subject to the Privacy Rule. These individuals and organizations are called “covered entities.” The Privacy Rule also contains standards for individuals’ rights to understand and control how their health information is used" (Health insurance portability and Accountability act of 1996 (HIPAA) 2018).
I would need to ensure the app has encryption, the user entity type is covered, and that the app is limited with what it can provide for PHI. Although the app would not share identifying patient information, it will be synced with the CDC and other governmental entities and we do not want that information hacked.
The US mobile privacy framework is built around best practices. "US regulators have made it clear that app developers are primarily responsible for providing protections and transparency regarding the use of data" (Mobile privacy in the US 2020).
Reference
Centers for Disease Control and Prevention. (2018, September 14). Health insurance portability and Accountability act of 1996 (HIPAA). Centers for Disease Control and Prevention. https://www.cdc.gov/phlp/publications/topic/hipaa.html.
Golden Data. (2020, September 8). Mobile privacy in the US. Medium. https://medium.com/golden-data/mobile-privacy-in-the-us-c4a619e07e2b.
KfUPM Mod 2 Ethical Issues in Business Critical Thinking Questions Discussion
Identify an organization who have had ethical issues that affected their operations and stakeholders. Briefly describe bo ...
KfUPM Mod 2 Ethical Issues in Business Critical Thinking Questions Discussion
Identify an organization who have had ethical issues that affected their operations and stakeholders. Briefly describe both organizations and then answer these questions for each: What were the ethical issues? Who was responsible for the issues? How were the issues addressed? What stakeholders were impacted? What was the impact on the organization and its stakeholders? How did the organization address the issues? Your well-written report should be 4-5 pages in length, not
including the title or reference pages. Use Saudi Electronic University
academic writing standards and APA style guidelines, citing at least two
references in support of your work, in addition to your text and
assigned readings.
Similar Content
King Saud University Preventing Identity Theft Essay
Explain how you would design policies and procedures that lower the risk of user identify theft to an acceptable level. E...
University of The Cumberlands Information Technology in Global Economy Paper
InfoTech in a Global Economy Assignment: Provide a reflection of at least 750 words (or 2.5 pages double spaced) of how ...
New England College Symmetric and Asymmetric Encryption Milestone
Milestone writing assignment, you will analyze asymmetric and symmetric encryption. Evaluate the differences between...
Walden University Risk Management Plan in Healthcare Industry Paper
A risk management plan describes the probability of damage or other negative consequences caused by external forces and th...
Disaster Recovery (DR) Lessons Learned: September 11th
Read the article titled “9/11: Top lessons learned for disaster recovery,” from Computerworld.com, located at http:/...
Law vs Ethics assignment
Law vs Ethics
Assignment Requirements
Review professional articles from the Bellevue University Library. S...
National Infrastructure Protection Plan Communication Plan 2 3
The Department of Homeland Security which is abbreviated as DHS works in close collaboration with other institutions which...
Screenshots
...
Loaders And Linkers
Compilation of a program involves the generation of an object file which is combined with others along with library files ...
Related Tags
Book Guides
Hiroshima
by John Hersey
Ezperanza Rising
by Pam Muñoz Ryan
The Hobbit
by J. R. R. Tolkien
The Handmaids Tale
by Margaret Atwood
A Farewell To Arms
by Ernest Hemingway
No Exit
by Taylor Adams
The Life-Changing Magic of Tidying Up
by Marie Kondo
The Turn of the Screw
by Henry James
Things That Matter
by Charles Krauthammer
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
TWU Big Data Global Computing and Computing Technologies
The rising importance of big-data computing stems from advances in many different technologies. Some of these include: Sen ...
TWU Big Data Global Computing and Computing Technologies
The rising importance of big-data computing stems from advances in many different technologies. Some of these include: Sensors, Computer network, Data storage, Cluster computer systems, Cloud computing facilities and Data analysis algorithmsHow does these technologies play a role in global computing and big data?2 pages, No plagiarism, APA7 format, 2 references minimum
Discuss Statistical Significance as it pertains to web analytics
This lesson will require your reading of this chapter located in the book by Avinash Kaushik, the myths of web analytics w ...
Discuss Statistical Significance as it pertains to web analytics
This lesson will require your reading of this chapter located in the book by Avinash Kaushik, the myths of web analytics will be discussed. Locate book “Web Analytics an Hour a Day” by Avinash Kaushik in the APUS Library, Chapter 13 pages 329-347 and Chapter 14 pages 351-396 will be most helpful.Create an original post addressing the topic(s) below: Define and discuss Statistical Significance as it pertains to web analytics, formulate your own opinions of what this means. In addition, discuss Segmentation and the different ways of using its power.LECTURE explains the importance of Segmentation and best practices to follow: https://1147982.kaf.kaltura.com/browseandembed/index/media-redirect/entryid/1_wy45de5c/showDescription/false/showTitle/false/showTags/false/showDuration/false/showOwner/false/showUploadDate/false/playerSize/# https://edge.apus.edu/access/content/group/science...https://edge.apus.edu/access/content/group/science...
Data Analysis
1. Data Analysis (Cluster Analysis) Attached Files: Cluster_Data_wk4.xlsx (9.002 KB) Included with this assignment i ...
Data Analysis
1. Data Analysis (Cluster Analysis) Attached Files: Cluster_Data_wk4.xlsx (9.002 KB) Included with this assignment is an Excel spreadsheet that contains data with two dimension values. The purpose of this assignment is to demonstrate steps performed in a K-Means Cluster analysis. Review the "k-MEANS CLUSTERING ALGORITHM" section in Chapter 4 of the Sharda et. al. textbook for additional background. Use Excel to perform the following data analysis. Plot the data on a scatter plot.Determine the ideal number of clusters.Choose random center points (centroids) for each cluster. (Note: Each student will select a different random set of centroids.)Using a standard distance formula measure the distance from each data point to each center point.Assign each data point to an initial cluster region based on closeness.For each cluster calculate new center points.Repeat steps 4 through 6. You will use Excel to help with calculations, but only standard functions should be used (i.e. don't use a plug-in to perform the analysis for you.) You need to show your work doing this analysis the long way. If you were to repeat steps 4 through 6, what will likely happen with the cluster centroids? Here is a link to an example spreadsheet using a smaller data set. It contains two tabs. The first tab is the raw data. The second tab contains the analysis that was performed. Make sure that you use a different starting center points from the example. Example Excel Analysis 2. Data Analysis (Apriori Analysis) Attached Files: Aprior_Data_week4.xlsx (13.198 KB) Included with this assignment is an Excel spreadsheet containing customer receipts. The purpose of this assignment is to demonstrate steps performed in an Apriori analysis (i.e. Market Basket analysis). Review the "APRIORI ALGORITHM" section of Chapter 4 of the Sharda et. al. textbook for additional background. Use Excel to perform this analysis. List the SKU which was purchased the most.List the two SKUs that were purchased most frequently together.List the three SKUs that were purchased most frequently together.List the four SKUs that were purchased most frequently together. Make note of any pattern that you noticed while performing the analysis. As a retail business owner, how would you use the results from this analysis? *Need the answers in two different excel sheets. *Use The Attached files to answer the questions
Jawaharlal Nehru Technological Healthcare Government Website Questions
Course: Web ApplicationsResearch the Dark Web. Write a brief paper on the following topics: What is the Dark Web? How is i ...
Jawaharlal Nehru Technological Healthcare Government Website Questions
Course: Web ApplicationsResearch the Dark Web. Write a brief paper on the following topics: What is the Dark Web? How is it accessed? How is it used by criminals? How can it be used in a positive way? How can be used by law enforcement and the intelligence services. How can be used by private individuals.Write between 300 and 350 words. Use your own words.---------------------------------------------------------------------------Course: Ethical HackingAnswer each these questions in a paragraph with at least five sentences:Include the question and number your responses accordingly. Provide a citation for each answer.1. Give an example from the book where insufficient testing was a factor in a program error or system failure.2. What was one cause in the delay in the completing of the Denver Airport.3. Why didn't the healthcare.gov website work at first?4. What is one characteristic of high reliability organizations?5. Describe the potential risks of alert fatigue in EHR systems.6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.7. What does design for failure mean?
Southern New Hampshire University HIPAA and FERPA Discussion
Corporations have to be in compliance with the laws, regulations, and standards that govern their business. For example, e ...
Southern New Hampshire University HIPAA and FERPA Discussion
Corporations have to be in compliance with the laws, regulations, and standards that govern their business. For example, educational institutions have to be in compliance with FERPA; health organizations have to be in compliance with HIPAA; and professionals that develop information security programs have to consider a range of information security laws (Sarbanes-Oxley Act, Gramm-Leach-Bliley Act).
Research the laws, standards, policies, and regulations that you might need to be in compliance if you were developing your project for a real-world scenario.
In your initial post, explain these and provide links to websites that provide information on them. Also describe any security requirements that are relevant and should be addressed in the project design.
Then, review the laws, standards, policies, regulations, and security concerns shared by your classmates. Were there any that you felt that they left out? Were there any that they shared that you should consider for your own project?
Peer Review #1
Vishnu Persaud posted
Hi Class
The Air Quality Monitoring project will need to ensure that users' personal data is protected and kept private. The web interface component is also accessible for even people with disabilities. There 2 regulatory measures come to mind that is aligned with this project. Here are the following:
The Privacy of Act of 1974 requires that the system prohibits disclosure of an individual's records without their consent (Department of Justice, 1974)
The web interface will also adhere to the Americans with Disability Act (ADA) which will impact the development of the application abstraction for the end-users (United States Department of Justice Civil Rights Division, 2010)
In addition, to the regulations, there 2 top security measures which will be implemented to ensure that users' data is secure and protect. The first being 2-factor authentication for accessing the web interface, and the second requirement will be periodic penetration testing to identify any vulnerabilities with the existing security measures.
References
Department of Justice. (1974). Privacy Act of 1974. Retrieved from The United States Department of Justice: https://www.justice.gov/opcl/privacy-act-1974#
United States Department of Justice Civil Rights Division. (2010). ADA Standards for Accessible Design. Retrieved from https://www.ada.gov/2010ADAstandards_index.htm
Peer Review #2
LaShaye Sykes posted
Hello Future Graduates,
Since my project has to do with the medical and the patient population (COVID stats tracking), if I were developing it for the real world I would need to be in compliance with
HIPPA
"The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge" (Health insurance portability and Accountability act of 1996 (HIPAA) 2018).
Hippa Privacy rule
"The Privacy Rule standards address the use and disclosure of individuals’ health information (known as “protected health information”) by entities subject to the Privacy Rule. These individuals and organizations are called “covered entities.” The Privacy Rule also contains standards for individuals’ rights to understand and control how their health information is used" (Health insurance portability and Accountability act of 1996 (HIPAA) 2018).
I would need to ensure the app has encryption, the user entity type is covered, and that the app is limited with what it can provide for PHI. Although the app would not share identifying patient information, it will be synced with the CDC and other governmental entities and we do not want that information hacked.
The US mobile privacy framework is built around best practices. "US regulators have made it clear that app developers are primarily responsible for providing protections and transparency regarding the use of data" (Mobile privacy in the US 2020).
Reference
Centers for Disease Control and Prevention. (2018, September 14). Health insurance portability and Accountability act of 1996 (HIPAA). Centers for Disease Control and Prevention. https://www.cdc.gov/phlp/publications/topic/hipaa.html.
Golden Data. (2020, September 8). Mobile privacy in the US. Medium. https://medium.com/golden-data/mobile-privacy-in-the-us-c4a619e07e2b.
KfUPM Mod 2 Ethical Issues in Business Critical Thinking Questions Discussion
Identify an organization who have had ethical issues that affected their operations and stakeholders. Briefly describe bo ...
KfUPM Mod 2 Ethical Issues in Business Critical Thinking Questions Discussion
Identify an organization who have had ethical issues that affected their operations and stakeholders. Briefly describe both organizations and then answer these questions for each: What were the ethical issues? Who was responsible for the issues? How were the issues addressed? What stakeholders were impacted? What was the impact on the organization and its stakeholders? How did the organization address the issues? Your well-written report should be 4-5 pages in length, not
including the title or reference pages. Use Saudi Electronic University
academic writing standards and APA style guidelines, citing at least two
references in support of your work, in addition to your text and
assigned readings.
Earn money selling
your Study Documents