Category: Information technology (IT)

  • Research Paper

    Please read all of the instructions and review the linked documents at the end of the assignment. You will need to use the paper template for your paper. Assignment purpose: As technical professionals, we are often called to research and report on topics associated with our projects. We must always be ready to analyze and evaluate a given problem, gain an understanding of the impact locally, nationally and internationally as well as analyze the potential ethical implications of our decisions. As part of this assignment, you will be able to practice your analysis skills as well as apply the knowledge we have gained throughout the semester. In professional writing, we do not use personal pronouns like I when presenting a conclusion based on our research. The thesis is the reasoned conclusion based on the research. The conclusions you reach should be supported by citations from your research and should be based on what you found. In this type of writing, we never want to say things such as I believe. We want to make statements that synthesize our research and present well reasoned conclusions supported by our research sources. For this assignment you will create a 5 to 8 page research paper to explore a technology topic in depth. The topic must involve an ethical issue that is directly caused by or significantly exacerbated by technology. The discussion assignments throughout the semester have prepared you for this assignment. You can use the research and lessons learned during these assignments as a starting place for the paper. The audience for the paper is someone who holds at least a bachelors degree and has a strong background in information technology. The assignment is designed to ensure that you have practice in creating research papers in preparation for post baccalaureate work. The genre for this assignment is an analytical research paper. In this approach, the author is not taking a stand or expressing an opinion about the topic. Neither is it a book report, essay or summary of the resources used in researching the paper. This paper should be used to explore the use of a technology and evaluate the ethical and global implications. Part of a good evaluation is to present both sides of an issue. As you discuss the technology and evaluate the ethical and global implications, but sure to examine the issue(s) from both sides of the arguments. For example, we might want to strive to understand the positive as well as the negative impacts of a technology. Your goal is to inform the reader about the topic, give him/her an in-depth understanding, and then present your conclusions. The paper should have minimal “what is” or “how to”, because this paper’s audience is technology savvy and knowledgeable of ethical theory, and the paper’s goal is to do an ethical and global analysis of your issue. You can read more about the tone and approach as well as find an example of a thesis statement at the Purdue OWL site. Use a topic from the list of possible topics linked below at the end of this page. If you wish to propose a new topic, please email me within Canvas mail. New topics MUST be approved by the instructor. If you previously took this course, you must select a new topic. Submitting work that was previously submitted in a prior version of this course or for another course may result in an academic charge for self-plagiarism under the FIU student code of conduct Use the principles and analysis methods you have learned to explore the topic in-depth, showing clearly the global ethical issue(s) involved, any fallacies practiced to justify actions, what aspects of any recognized code of standards are violated or which could be applied. Include an ethical analysis using an ethical theory found in the Topic 3 material. Be sure to explain how technology has played a key role in causing or exacerbating the global ethical dilemma. You must discuss the issues for at least two geographical areas. Support your statements and analysis using in-text citations. A reference page is not sufficient. All works cited on the reference page must be cited using in-text citations within the paper. Goals for the paper: Identify the global issue or concern from the list provided or propose a new topic for your professors approval and succinctly summarize the global impact in your own words. Analyze the global ethical issue(s) involved in your own words using the ethical theories discussed over the course of the semester. See Topic 3 for the ethical frameworks. The paper should discuss at least two different countries (or regions) by name and give specific, concrete examples of the technology or technologies involved as well as the ethical concerned raise by the use of these technologies. The ethical analysis may be a separate section, or it may be woven into the analysis as the various aspects of the issue are presented. Discuss any fallacies used to justify actions, what aspects of any recognized code of standards are violated or which could be applied. Provide sufficient context and use common language to communicate your ideas to a reader who has a strong background in technology with at least a bachelors level of education. Give examples that make abstract concepts concrete. Organize content in a way that effectively reaches, engages, and communicates to the reader. The paper is formatted in traditional IEEE format. The template provided within Canvas should be used for the structure and format of the paper. It also provides additional suggestions and assistance with the structure and tone of the paper. Learning Outcomes: This assignment will fulfill one or more of the following learning outcomes: Describe the legal, ethical, and social impacts of technology as related to individual privacy, security, and anonymity in societies across the globe and in the global Internet society. (Global Awareness) Describe the legal, ethical, and social impacts of technology as related to intellectual property rights, and how the global reach of the Internet affects these issues. (Global Perspective) Identify a computing professionals roles and responsibilities as related to intellectual property, privacy, anonymity, legal, social, and ethical issues. (Global Engagement) Evaluation criteria: REMINDER: Everything you need to know about the structure and format of the paper is in the template document. Use a copy of that file as your starting document and your formatting will already be set for you. Key Content: Ethical analysis included, using theory or codes of conduct Global issue and analysis included Counterarguments presented and ethically analyzed Structure: You should have an introduction that indicates the structure The paper should be structured in appropriate sections and subsections You should have a conclusion that summarizes You have started new paragraphs where appropriate (not one big giant section with only 1 paragraph) You gave a number to your last section (not N) Formatting: Follow the templates formatting EXACTLY for all parts of the paper Pagination (abstract, start of body, refs page should all start on a new page) Check that page header has correct page numbering No excess space between paragraphs or sections Grammar/Spelling: Run a grammar check in Word and correct issues: run-on sentences, incorrect verb tenses, incorrect noun-verb agreement Run a spell check in Word Avoid useless, fluff, space-filling leading phrases (e.g., to begin with, in other words, furthermore, in addition, etc.). If you can remove that phrase and the meaning of the sentence does not change, it is useless and should be removed. Inline citations: All works in the reference page should have at least one inline citation within the paper. Using citations is important to identify where that information originated. Remember, citations both identify the source of where the ideas or thoughts originated as well as provide support for our assertions. In addition, it provides the reader with sources to explore if they wish to further explore the concept. You followed the IEEE format (not APA, Chicago, etc.) References: You followed the IEEE format (not APA, Chicago, etc.) and refs are complete (not just URLs) Refs are listed in the order encountered in the paper Refs must include the URL you used to access the articles and they must be properly formatted. Things that should NOT be in your paper: Use of 1st (I, me, my, mine, we, us our, ours) or 2nd person (you, yours) Use of contractions (e.g., doesnt should be does not) Use of questions (this is not a conversation it is a research paper) Personal opinions (no I think/I feel) statements must be supported by your citations Possible topics: Possible Topics for Papers [PDF] Guidelines: CGS 3095 Paper & Presentation Guidelines (Word) Template: Research Paper Format template_rev2.docx (updated)

    Attached Files (PDF/DOCX): CGS3095Paper26PresentationGuidelines.docx, ResearchPaperFormattemplate_rev2.docx, PossibleTopicsforPapers-ADA-1.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Homework W8

    Please no plagiarism and I have attached a picture of instructions Sir this assignment and Activity W8 assignment are connected so please do them accordingly
  • Activity W8

    Please no plagiarism and I have provided the picture of instructions
  • Business Security

    Write a two-page, single-spaced summary of what you learned from the reading assignments attached. For full credit include appendix items such as figures, tables, diagrams, etc., after your two full pages of text.

    Use one inch margins and 12 point Times New Roman font in your document.

    please include infomation from this source as well:

    HIDS vs NIDS: Unravelling the Differences in Intrusion Detection Systems

    Attached Files (PDF/DOCX): Placing IDS.pdf, Intro to Snort.pdf, Intro to IDS.pdf, Intrustion Detection.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Module 4 SLP

    See attached for instructions. Thank you!

  • Internet of Things and Privacy

    Review the “Internet of Things: Convenience vs. Privacy and Secrecy” resource. Then create an initial post in which you consider the following questions: As internet of things (IoT) devices become more widely adopted, to what extent are you willing to sacrifice your privacy for convenience? Given your stance on privacy, what effect does the pervasiveness of IoT have on your choices as a consumer? In your response posts, imagine that you are developing a new IoT device for a company. What aspects of privacy would influence your design based on the points your peers made in their initial posts?

    Post 1:When thinking about the Internet of Things (IoT), I see it as a tradeoff between convenience and control over personal information. IoT devices make everyday life easier by connecting devices, collecting data, and automating tasks. Smart home systems, wearable fitness trackers, and connected vehicles can improve efficiency and provide useful insights about behavior and health. However, the same data that allows these devices to function also creates privacy concerns. IoT devices constantly collect and transmit information, which means personal data such as location, habits, and even conversations could potentially be accessed by organizations or malicious actors if security controls are weak.

    Personally, I am willing to sacrifice a small amount of privacy for convenience, but only when the benefits clearly outweigh the risks and when the organization collecting the data is transparent about how it will be used. For example, I might use a smartwatch that tracks health metrics or a smart thermostat that improves energy efficiency. However, I would avoid devices that collect excessive personal information without clear security protections. The rapid growth of IoT technology has made me more cautious as a consumer. Before purchasing connected devices, I try to consider what type of data they collect, whether the device allows privacy settings to be adjusted, and whether the company has a strong reputation for protecting user data.

    If I were designing a new IoT device for a company, privacy would need to be a central part of the design rather than something added later. One important approach would be following the concept of privacy by design, which means limiting the amount of personal data collected and ensuring that strong security controls protect that information. Features such as encryption, secure authentication, and clear user consent options would be essential. Transparency would also be important so users understand what data is being collected and why. Designing devices in this way would help build consumer trust while still allowing organizations to benefit from the convenience and innovation that IoT technologies provide.

    Post 2:Hello class,

    There are a ton of IoT devices that are becoming widely used and adopted, making privacy more important than ever to protect consumers from othersand sometimes from themselves. Privacy is also harder to maintain because technology is being put everywhere, even in TVs and refrigerators. Ive even seen smart technology in Roombas.

    I believe how much Im willing to sacrifice my privacy for convenience depends on my need for that convenience. For example, if I need access to a network to contact my loved ones from far away, I dont think I would care if my phone call was monitored by whoever owns that network. But I would definitely mind if a cybercriminal was listening in to exploit the information being shared.

    I also think society has become so used to the conveniences of IoT devices that we rarely consider privacy while using them. When we talk, text, or send emails to work or loved ones, we dont usually think about whether someone is monitoring our messages. Most people assume their messages arent important enough for anyone to want to watch. This mindset is what leaves many people vulnerable to threats like spyware or impersonation, where someone pretends to be your work, company, or loved ones through texts or emails.

    The pervasiveness of IoT definitely affects my choices as a consumer, but I try to be educated and aware so Im not caught off guard by what Im buying. I feel its partially up to us as consumers to understand the pros and cons of IoT devices, but companies should also take responsibility and implement better protections for their users.

    Overall, because IoT devices are everywhere, its up to me to understand what Im buying and how each device can either protect or compromise my privacy and security.

    Attached Files (PDF/DOCX): Internet of Things_ Convenience vs privacy and secrecy.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Hands on assignment 1

    This is not an essay is like a project the instructions are explained on me attached document

    Attached Files (PDF/DOCX): ITEC625-Hands-On-1-Details_Ver3.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Code Challenge 5

    i attachedn the instructions

    Attached Files (PDF/DOCX): User-Story-Template.pdf, Usertesting.pdf, Code 5_ UX Design and Paper Prototyping.docx, Code 5_ Challenge.docx, Prototype-worksheet.pdf, Persona-Template.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Hurricane Preparedness

    Disasters, most often, are unpredictable and vary in regard to type and magnitude. Many companies have some form of a disaster recovery strategy, thereby allowing the organization to return to normal after a disaster has occurred. To minimize disaster losses, it is very important to have a good disaster recovery plan for every business subsystem and operation.

    Write a report on hurricane preparedness, as practiced in the offshore oil drilling industry, to understand the benefits of preparedness from an engineering perspective.

  • NORMALIZATION

    Long before the database tables are created and data are moved or inserted into them, the database designer creates the logical and physical models of the database. In this application, you will examine the process of relational database design and modeling and explore using normalization techniques to identify new tables, update business rules for a database, and create an updated entity relationship diagram.

    To prepare:

    • Review this weeks readings and media in the Learning Resources.
    • Access and review the documents in the Learning Resources.

    To complete the Week 3 Assignment:

    • Normalize the tables in the Sales Data document.

    Submit a document of 24 pages in Microsoft Word and APA format in which you do the following tasks:

    • Identify the new tables.
    • Update the business rules for the database.
    • Provide an updated ERD. (Note: The ERD may be hand drawn or updated using MS Visio, any drawing package, or Gliffy (https://www.gliffy.com).

    Refer to the Week 3 Assignment Rubric for specific grading elements and criteria. Your Instructor will use this grading rubric to assess your work.

    Your document should be 24 pages (not including the list of resources cited), but it is the quality of the work that is important, not the number of pages. Cite and reference all sources using APA format and style guidelines.