Annotated Bibliography & Literature Review

This is the second milestone of the portfolio project. For milestone 2, you will develop an annotated bibliography with a minimum of 10 peer reviewed scholarly articles. Additionally, you will write the literature review for the final project. The entire milestone should be a minimum of 6 pages with 10 peer reviewed scholarly articles. For your reference, the portfolio project guidelines are attached here. Please see the UC library for help in formatting your bibliography. Here are some examples: 

Here are some resources to complete a literature review:

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

module 02

 

Module 02 Content

  1. For this part of your project, you will refer to the Risk Register submitted in Module 01 to provide a Summary Report to executive management using this Summary Report. For your summary report, you will include a Purpose, Executive Summary, Detailed Summary, Recommendations and Suggested Actions.

    Summary Report

    The Detailed Summary of your report should address the following objectives in depth:

    • Detail the list of operational risks for each business unit (Refer to the Organizational Chart provided and the Risk Register you filled out in Module 1).
    • Describe the operational risks.
    • Describe the possible outcomes.
    • In addition, be sure to address the following in the Recommendations:
    • Provide a recommendation for the creation of a risk assessment team (i.e. security analysts, CIO, HR, Finance etc.)
    • Your summary report should be in narrative form, using full sentences and proper grammar, spelling etc. and incorporate any feedback received from your previous submissions.

      Note: Make sure to refer to your Risk Management Plan and work on the relevant areas. This is a good week to address the Risk Identification section in your Risk Management Plan.

      Risk Monitoring Plan

      Submit your completed assignments by following the directions linked below. Please check the Course Calendar for specific due dates.

       

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 7 Python

 

You must add comments to your code
# Program name : Wk7_firstname_lastname.py
# Student Name : Ymmas Azaba
# Course : ENTD220
# Instructor : My instructor
# Date : Any Day

# Copy Wrong : This is my work

You are going to enhance the prior assignment by doing the following1) Create a class that contain all prior functions2) 

Test the application 

Sample output Use the same output from last assignment 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cloud computing literature review

 

  1. The coursework is ONLY for graduate students. 100 points, submit one report file with five reference files on Blackboard by December 2, the end of the day.
    Late submission is accepted, but with 10% points off if submitted within 24 hours after the due time; 20% points off if submitted 24-48 hours after the due time; no credit if submitted two or more days after the due time.

    • Submit 6 files, respectively: your report (a Word or pdf file) and 5 references (pdf files). Do NOT compress them to a single file.
    • Name your references as 1.pdf, 2.pdf, and so on. 
    • Read five recent papers/articles on cloud computing related topics, and at most ONE to be review/survey paper/article.
    • Format requirements are the same as for assignment report. 
    • Write a 10-page (double spaced) review paper integrating and expanding the selected research paper subjects with the course topics.
    • This will not be a paper report (to review the references), rather a thoughtful discussion of the research papers content pertaining to the material we have covered in the course. 
    • Papers and articles from IEEE Transactions on Computers, and the Communications of the ACM; or other journals or proceedings approved by the instructor. 
    • One example for review/survey article,
    1. M. Shahin, M. Ali Babar and L. Zhu, “Continuous Integration, Delivery and Deployment: A Systematic Review on Approaches, Tools, Challenges and Practices,” in IEEE Access, vol. 5, pp. 3909-3943, 2017.
    2. One example of non review/survey reference paper/article,
    3. D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman and D. Woods, “Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds,” in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 523-536, 1 July-Sept. 2017.
    4. Continuous Integration Delivery and Deployment.pdf
      Cloud-Trust.pdf
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cyberscecurity culture

 

examine rules governing the protection of human when participating in research, and to look at and explain the cybersecurity culture

  • Explain the cybersecurity culture
  • Describe and explain the IRB process
  • Identify technologies to log, monitor and audit networks and systems

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

FORENSICS INVESTIGATION

 

(1) examine how risk and investigative forensics investigations work, how to apply risk managements with the Internet of Things and how to value data and information assets. Additionally,  students will examine current research in forensic analysis, forensic strategy and forensics techniques examining Internet of things.

  1. Examine forensics analysis using Internet Technology
  2. Identify literature on forensics analysis
  3. Describe research in forensics analysis
  4. Examine risk management forensic strategy

(2)write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Tokenization

This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Marketing Strategies

  

What are some of the differences between demand influences and supply influences on our pricing decisions? 

Increased prices typically result in lower demand and vice versa.  However, this is not always the case.  Identify a product in which a price increase or decrease resulted in the opposite demand and explain the factors why.

After reviewing this week’s resources and your research, consider the challenges marketers face as they seek to balance supply and demand. 

In 350 words

Week Resources:

How to price your product: 5 common strategies. Link https://www.bdc.ca/en/articles-tools/marketing-sales-export/marketing/pricing-5-common-strategies 

How to choose a pricing strategy for your business https://quickbooks.intuit.com/r/pricing-strategy/6-different-pricing-strategies-which-is-right-for-your-business/ 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ISM – Analysis and Proposed Solution

This question describes a situation where software is required to support the operation of a new product developed by a start-up. The start-up is developing equipment that it will sell to households. This equipment will enable people who do repair or installation work in and around their homes, to be more effective. The start-up has just been granted a patent for their first product. This will be a replacement for both short and tall ladders. Their first product will be a drone, light enough to worn as a back-pack, with computer control for navigation and stability. This will be used as a ladder replacement, for access inside houses and buildings. 

The control software for the drone will need to:

maintain stability, 

support navigation 

and avoid collisions.

In Chapter 2 we learned about sourcing software. Propose sourcing for the software to control this drone. You can consider the sourcing alternatives as sourcing the entire control system or acquiring the three components: stability maintenance, navigation, collision avoidance separately and having these integrated, either in-house or by a supplier.

Note that this device will be controlled by the wearer, so there is need for automation to detect and avoid obstacles. 

Analysis:

What are the lowest cost and lowest risk alternatives that should be considered? You can consider sourcing by operating function (stability, navigation and collision avoidance) or for the total operating system. Discuss these alternatives.

Proposed Solution

Identify proposed software sourcing, either by operating function (stability, navigation and collision avoidance) or for the total operating range, with explanations. You should search the Web for COTS or Open Source opportunities for software acquisition and identify potential software that could be used.

Remember acquisition is lower cost than new development.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Refer to Cruisin’ Fusion

The Cruisin’ Fusion taco trucks are gaining popularity, fueling a demand for an order-ahead option on the website. After careful consideration, the team has decided to add shopping cart software to the Cruisin’ Fusion website to meet this demand. 

Research various shopping cart software to determine the best choice for website.

Write a 1- to 2-page blog post to launch this new feature and to reassure your customers that placing online orders is safe. Your blog post should do the following:

  • Introduce the order-ahead option.
  • Explain the differences between ethics, organizational policies, and laws.
  • Analyze how the new shopping cart software upholds ethical trends in consumer privacy.
  • Describe organizational policies that will be implemented to help protect consumer data.
  • Examine ethical considerations for maintaining confidentiality and consumer data.
  • Describe the various privacy laws and regulations upheld with the shopping cart software.

Please add any references used.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now