week 10 writing assignment

Writing Assignment (due in Week 10)

The purpose of this project is to analyze healthcare data based on the information that you learned in class. This project will be different for each student since students have the ability to select their own data from the Center for Disease Control’s website. (There is no charge for information from this website.)

Log onto the Center for Disease Control’s website at http://www.cdc.gov/nchs/ (Links to an external site.).  This will take you directly to the National Center for Health Statistics. 

Note: You may find it helpful to get familiar with the website before doing major research. Feel free to click on all the different sources of information on the site…i.e., “Feature Topics”, “New Releases”, “Survey and Data Collections”, etc. Once you identify a topic, feel free to utilize the search engine on the site for additional information about your topic. 

Find a topic that you would like to do some more research in. For example, “Injuries.” You will find that there is an abundance of information for you to complete your report on in most categories. However, you may choose to do your report on Injuries in Alaska, and you will run into problems since there isn’t a lot of data. Make certain that you select a topic and parameters that lend themselves to complete analysis.

Note: There are tutorials available for you to view on the website if you need help with your data.

Your topic needs to include at least 5 variables. Example: Unintentional injuries in Females over the age of 65 in the state of Nevada. (Variable List: 1) Injuries, 2) Unintentional, 3) Females, 4) over 65, and 5) Nevada.)

Now, do an analysis of this information using the information that you learned in class and your book. Make certain to include charts, graphs, and narrative. If you find that you need more information to complete your analysis, broaden your topic. Prepare your analysis as if it is going to be published in a journal making sure to site all of our sources properly. Writing Assignment should be 6-8 pages in content, not to include title and reference pages.

 

Grading Rubric:

 

Topic Selection

25

Appropriate Charts

25

Appropriate Graphs

25

Narrative

60

Citations

30

Grammar/Spelling

35

 

200 Total Points

 

Helpful InformationDescription: Preview the documentDescription: View in a new window from the Virtual Librarian  (click on the link)

If you have questions or problems don’t hesitate to contact your instructor through the course e-mail or the Virtual Library.   

Additional Resources

APA

APA Tutorial – Click on the following link to view the Tutorial, or copy and paste it into your browser:http://flash1r.apa.org/apastyle/basics/index.htm (Links to an external site.)

Citing Sources in APA Format (Links to an external site.) 

APA Getting Started Template:  APA Template Starting Point

Plagiarism

What is plagiarism?  Click on the following link to view the Tutorial, or copy and paste it into your browser:http://tutorials.sjlibrary.org/tutorial/plagiarism/selector.htm (Links to an external site.)

General Questions and Answers about Plagiarism: Plagiarism FAQs

Smarthinking 

Click on the following link to view the Tutorial, or copy and paste it into your browser: http://www.screencast.com/users/tracybarkley/folders/Jing/media/96602aff-4b24-42cd-abe7-ab4e549433e5 (Links to an external site.) 

 

Information Security Governance

Information Security Governance
 
Information security management and governance are not simply implemented tasks within organizations. An information security governance program is a program that must be thoroughly planned, include senior-level management involvement and guidance, be implemented throughout the organization, and be updated and maintained. The International Organization for Standards (ISO) and the International Electrotechnical Commission (IEC) has created information security governance standards. Review the information security governance information provided by ISACA, located at http://www.isaca.org/Knowledge-Center/Research/Documents/InfoSecGuidanceDirectorsExecMgt.pdf.
 
Write a 3-5 page paper in which you:
  1. Define the information security governance and management tasks that senior management needs to address.
  2. Describe the outcomes and the items that will be delivered to the organization through the information security program.
  3. Develop a list of at least five (5) best practices for implementing and managing an information security governance program within an organization.
  4. Develop a checklist of items that needs to be addressed by senior management, including priorities and needed resources.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 
Your assignment must follow these formatting requirements:
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length. 
The specific course learning outcomes associated with this assignment are:
  • Examine the principles requiring governance of information within organizations.
  • Use technology and information resources to research legal issues in information security.
  • Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

1500+ words, no plagiarism APA

  1. Write a research paper in APA format on a subject of your choosing that is related to Business Intelligence.  Integrate what you have learned from the course resources (.e.g. Textbook Readings, Discussion Board Posts, Chapter Presentations) into your document.

    As you consider the topic for your research paper, try and narrow the subject down to a manageable issue.  Search for academic journal articles (i.e. peer reviewed) and other sources related to your selected subject.  Because this is a research paper, you must be sure to use proper APA format citations.  

    Your paper must include an introduction stating what you paper is about and a logical conclusion.

    This paper must contain a minimum of 1500 words of content and use at least 5 peer reviewed sources.  Peer reviewed sources include:  Academic Journal Articles, Textbooks, and Government Documents.  At least one of the textbooks for this course must be used as a source for this paper.

    Example Topics:

    • Use of Artificial Intelligence in Decision Support Systems.
    • Business Uses of Natural Language Processing.
    • Use of Game Theory in Business Intelligence Systems.
    • Use of Decision Trees in Automated Systems.
    • The Social Networks for Collaborative Decision Making.

    The rubric for this assignment can be viewed when clicking on the assignment link.

    Purdue Owl APA Format

  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
  3. WU RELEASE STATEMENT: The material submitted for this assignment may be screened by the student and/or the instructor for similarity of content by Blackboard’s SafeAssign feature. The purpose of this feature is to help educate the student about the proper citation of borrowed content and to protect the student against plagiarism. The submitted material will be checked against academic databases, internet documents, and student papers from both Wilmington University and other institutions. The final draft of submitted material will become part of the Wilmington University database. The student may also voluntarily submit the material to the SafeAssign Global Reference Database, which helps to protect the originality of the student’s work across institutions. For more information about plagiarism and citation conventions, please reference https://wilmu.edu/studentlife/acadintegrity.aspx.

need original follower up response 200 words

A family is very hard to explain, as there are many different variations of family. One thing is for certain though according to Helman, a family is a group of individuals that interact with each other very closely (Helman 2007). As people grow up they develop many psychological factors that will be a result of the family they were raised with. These psychological defects are known as family psychopathology, and usually occur because one experiences dysfunctional family structure, dysfunctional family functioning, faulty family, relationship and communication patterns with the family (Kumar and Tiwari, 2010). A family that experiences mental disorders of any type is because of the setup of a family. Helman explains that families can consist of a single parent, traditional husband and wife, a husband with many wives, a wife with many husbands, lesbian parents, gay parents, mixed marriage (marriage of people of different cultures, races, or religions), or blended families. As I was reading the study from Kumar and Tiwari, I made some connections that result in a cause and effect logic. According to Kumar and Tiwari, the areas that are focused on for crucial development of a family is parent to child relationship (2010). Parent children relationships can be a major cause to having psychological problems. Because children and parents could have rejection relationship this when the child experiences neglect, denial of love and affection, and parents show a lack of interest in the young one resulting in low self-esteem, insecurity, excessive fear. Overprotection and restrictiveness are two more major types of parent children patterns, this is when the mother is too over bearing with their child. These mothers tend to smoother their children (Kumar and Tiwari, 2010). These two gentlemen list a number of other psychopathology effects that are developed at childhood for families, they include but are not limited to over permissiveness and over indulgence, unrealistic demands, faulty discipline, and undesirable parental models (Kumar and Tiwari, 2010). After developing these effects at the beginning of a family it is hard to come back from it without the help of therapists due to being emotionally distressed. The families then become maladaptive family structures, which are detrimental to the developments of children. The family structures types are inadequate family, disturbed family or home, the antisocial family, the disrupted family, the discordant family. Without a family development that show love and affection to children these children generally grow to have some type of mental disorder so my question is how do new parents that have never had a good developed family life start a new family that will help their new family develop in ways that a healthy mentally for them and their kids? I also would like to know what triggers the parents’ mind to neglect or not love and appreciate their kid after having it?

 

Helman, C. (2007). Culture, health, and illness. London: Hodder Arnold.

Kumar, P. & Tiwari, S.C. (2010). Family and Psychopathology: An Overview Series-1: Children and Adults, Delhi Psychiartry Journal, Vol. 11(No.2), 140-149.

COPA CIPA

 COPA and CIPA
Due Week 4 and worth 70 points 
 

The Children’s Online Privacy Protection Act (COPPA) and the Children’s Internet Protection Act (CIPA) are both intended to provide protections for children accessing the Internet. However, they both have had some opposition.  
 
Write a three to five (3-5) page paper in which you:
  1. Describe the main compliancy requirements and the protected information for both COPPA and CIPA.
  2. Analyze how COPPA and CIPA are similar and how they are different, and explain why there is a need for two (2) different acts.
  3. Describe what you believe are the most challenging elements of both COPPA and CIPA to implement in order to be compliant.
  4. Speculate on why COPPA and CIPA define protection for different ages; COPPA defines a child as being under the age of 13 and CIPA defines a minor as being under the age of 17.
  5. Identify the main opposition to COPPA and CIPA based on research and speculate on whether they will be changed in the future based on the opposition. 
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 
Your assignment must follow these formatting requirements:
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length. 
The specific course learning outcomes associated with this assignment are:
  • Explain the concept of privacy and its legal protections. 
  • Describe legal compliance laws addressing public and private institutions. 
  • Use technology and information resources to research legal issues in information security.
  • Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.
Click here to view the grading rubric for this assignment.

Assignment 3: IT Support for Virtual Teams

Due Week 6 and worth 100 points

Global organizations have branches that are located in multiple countries. Some of these organizations develop software and take advantage of the global talent pool of software developers while others have global technical support teams, customer service, and so on. Virtual teams are created when two or more people work together from different locations, organizations, times zone, and / or time shifts. Global organizations use virtual teams in order to provide global support, reduce travel costs, reduce training costs, and take advantage of local cultural knowledge that may impact the organization’s operations. 

Write a two to three (2-3) page paper in which you:

1.  Examine five (5) issues that the IT department is likely to face when it comes to supporting virtual teams.

2.  Create an architectural diagram that shows how the virtual teams would collaborate and access common repositories for documents, software, development, and testing facilities. Use Visio or an equivalent such as Dia. Note: The graphically depicted solution is not included in the required page length.

3.  Describe five (5) advantages and five (5) disadvantages of using virtual teams for the organizations described in the scenario.

4.  Describe challenges imposed by: 

          a. IT / IS national standards and propose how they could be handled or resolved.

b. protocols and propose how they could be handled or resolved.

c. procedures on virtual teams and propose how they could be handled or resolved.

5.  Compare and contrast virtual teams and traditional teams with respect to communications, technology use, and team diversity.

6.  Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Describe the process of administering enterprise systems, including the use of virtualization and monitoring, power and cooling issues.
  • Use technology and information resources to research issues in enterprise architecture.
  • Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Oracle Database

Using the Schema you developed in Homework 1 for your e-Commerce project, design and implement a Virtual Private Database that limits database access. Your design should be based on two of your columns and two of your tables. (Hint: where col1 = value1 AND col2 = value2). Which columns and tables you choose is up to you and will be based on your initial design. You may alter your tables if it makes sense to do so.

In most cases you will need to create a separate policy and function for each of the two tables you select. Use the tutorial as a reference and follow the steps for creating the policy function, creating the virtual private database policy and testing the policy.

Deliverables:

1. Create a word or PDF document that describes your process, steps and results. Be sure to describe your schema and why you selected the tables and columns you did for your Private database. Provide screen shots showing the successful running of all of your SQL statements and testing your implementation. Be sure your testing is comprehensive and clearly demonstrates how the virtual private database restricts access to specific records. The document should be neat, well-organized, well-written and contain minimal grammar and spelling errors.

2. A .sql script file containing all SQL statements you used for this effort. All SQL statements should be in one file with appropriate connect statements to differentiate users who run the script. The script file should contain comments describe each major set of SQL statements. The script should run perfectly without error when executed from the Oracle SQL*PLUS environment.

 

3. Create your own short and simple JDBC Java code example that inserts 2 records into an Oracle table of your creation.

From a design perspective, the Java functionality should be separated into methods and use prepared Statements for your SQL statements.

Post your fully functional code along with screen shots demonstrating the successful running of it.

Note this code should compile and run from the command prompt.

Briliant answers

 

Assignment 2: Database Systems and Database Models

 

Due Week 2 and worth 90 points

 

 

 

The Strayer Oracle Server may be used to test and compile the SQL Queries developed for this assignment. Your instructor will provide you with login credentials to a Strayer University maintained Oracle server.

 

 

 

Imagine that you have been hired as a consultant to assist in streamlining the data processing of an international based organization that sells high-end electronics. The organization has various departments such as payroll, human resources, finance, marketing, sales, and operations. The sales department is the only department where employees are paid a commission in addition to their yearly salary and benefits. All other departments compensate their employees with a yearly salary and benefits only. Commission is paid by multiplying the employee’s commission rate by the total amount of product units sold. You have access to the following data sets:

 

  • Employee (EmpNumber, EmpFirstName, EmpLastName, CommissionRate, YrlySalary, DepartmentID, JobID)
  • Invoice (InvNumber, InvDate, EmpNumber,  InvAmount)
  • InvoiceLine (InvLineNumber, InvNumber,  ProductNumber, Quantity)
  • Product (ProductNumber, ProductDescription, ProductCost)
  • Department (DepartmentID, DepartmentDescription)
  • Job (JobID, JobDescription)

 

 

 

Write a two to three (2-3) page paper in which you:

 

  1. Design a query that will allow the finance department to determine the commissions paid to specific employees of the sales department for the month of December. Note: You will need to generate the tables described above (Employee, Invoice, InvoiceLine, Product, Department, and Job) in order to compare and validate your code. Validated query code must be part of your paper.
  2. Compare the code of the query you designed in Question one (1) to one that would show how much total compensation is paid to each employee for the same month.
  3. Determine and explain the factors necessary to ensure referential integrity.
  4. Create an object-oriented model to show how the tables are interrelated through the use of graphical tools such as Microsoft Visio, or an open source alternative such as Dia. Make sure that you are able to show the relationship types such as 1:M, 1:1, or M:1. Additionally, remember to include the determined factors from the previous assignment requirement. Note: The graphically depicted solution is not included in the required page length.
  5. Identify which data components are the entities and attributes, and the relationship between each using an object representation diagram through the use of graphical tools such as Microsoft Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
  6. Describe how Big Data could be used to assist in the productivity and forecasting of the organization’s products and resources. 

 

 

 

Your assignment must follow these formatting requirements:

 

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

 

 

 

The specific course learning outcomes associated with this assignment are:

 

  • Describe the role of databases and database management systems in managing organizational data and information.
  • Design and implement a database solution to solve a proposed business problem.
  • Use technology and information resources to research issues in the strategic implications and management of database systems.
  • Write clearly and concisely about topics related to the strategic planning for database systems using proper writing mechanics and technical style conventions.

 

Case Study 2: Public Key Infrastructure

Case Study 2: Public Key Infrastructure

Due Week 6 and worth 60 points

Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a relatively small number of administrative personnel comprise the remainder of the organization. You have convinced business unit leaders that it would be in the best interest of the company to use a public key infrastructure (PKI) in order to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network (VPN) products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, the company would use digital certificates to sign software developed by the company in order to demonstrate software authenticity to the customer. 

Write a two to three (2-3) page paper in which you:

  1. Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.
  2. Propose one (1) way in which the PKI could assist in the process of signing the company’s software, and explain the main reason why a customer could then believe that software to be authentic. 
  3. Compare and contrast public and in-house CAs. Include the positive and negative characteristics of each type of certificate authority, and provide a sound recommendation of and a justification for which you would consider implementing within your organization. Explain your rationale.
  4. Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Explain how businesses apply cryptography in maintaining information security.
  • Use technology and information resources to research issues in information systems security.
  • Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions. 

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills. Click hereto access the rubric for this assignment.

Media Review (Shattered Glass (Journalism fraud) (Krupa Rachapalli))

Media Review

You will each be assigned a movie to watch; movies will be assigned two weeks after the first class. Discuss how the issue of white collar crime is presented in the film. Do not give a scene-by-scene description of what happened in the movie. Who starred or appeared in the film or who directed it (i.e.: the movie stars, the director, the producer – remember, this isn’t a film class). Your review should be a thoughtful discussion of how the film relates to white collar crime.

Your discussion should include:

Is the movie based on a true story?

What is the crime?

How does it take place?

Why does it take place?

Who are the characters involved (NOT the movie stars who play the characters – the characters

  themselves – who are they, what is his/her profession),            

How long does the crime occur before it is discovered?

How is it discovered and who/why/how is the crime discovered,

How did the discovery of the crime affect the offender’s reputation/status in the business?

   community or his/her family; did it have any affect?

How is the crime resolved, was there a trial; if so, what was the outcome,

Did the perpetrator receive a prison sentence?

If greed is involved in your film, what motived the greed? (a father’s approval, perhaps? Or maybe resentment of insults the character endured in the past?)  In other words, is the greed based on something more complex than greed for money and arrogance?

Was the entity (i.e.: the corporation or agency) a victim or perpetrator, or both?

What do you think? Is the propensity to engage in unlawful conduct systemic; that is, is it inherent in a competitive, free-enterprise economic system in a society oriented toward the individual or was criminal behavior caused solely by “bad apples,” rogue employees whose character flaws led them to cheat and steal?

Based on our class readings and discussions describe the extent to which the media’s portrayal of the crime was accurate. What does the research say about the particular crime that occurred?

Your paper must be no more than 5 pages in length. APA format required (DO NOT include an Abstract or Table of Contents for this short paper!). Due via Blackboard by Midnight, April 7. Make sure pages are numbered! Late submissions will be accepted at the instructor’s discretion and only for reduced points. (0 points is possible!)