Scenario: Identify a business that is of interest to you. It can be real or fi

 
Scenario: Identify a business that is of interest to you. It can be real or fictitious, but it should be a realistic business. Think of one specific risk that your chosen business could face, and consider how and where you will get data that can be analyzed to address that risk. 
Complete the following steps: 
1. Create a Word document to contain all components of your Unit 6 Assignment. Add a title page and table of contents. 
2. Write an introduction to your chosen topic. Describe the business that you have chosen, identify the risk you selected, and briefly describe how you expect analytics to help you address that risk. Label this section Introduction. 
3. Perform a SWOT analysis for your business. Ensure that you have at least one element with a description in each of the four quadrants of a SWOT table. Label this section SWOT Analysis. 
4. Identify which quadrant of a risk matrix your selected risk would fall into (High Probability/High Impact; High Probability/Low Impact; Low Probability/High Impact; or Low Probability/Low Impact. Provide a rationale explaining why you have classified your chosen risk in the way you did. Label this section Risk Classification. 
5. Obtain or create a data set that you can use to address your risk. You can use built in data sets in R, data sets from the Internet, or data sets from a company with appropriate permission. It is acceptable to create your own data set if you wish. Keep in mind that you will need to use one of the risk analytics techniques you have learned in this class, so the data you use and the outcome your produce must be aligned with a valid technique “Expected Payoff” Please see attached template. Make a screen capture of a representative sample of your data. Place it in your document and label this section Data. 
 6. Create a model for your data that will allow you to address your selected risk. This will be in Excel for the Expected Payoff as your technique.   In your Word document, provide evidence by way of labeled screen captures and written descriptions of your model building. Label this section Modeling. 
7.  For Expected Payoff, document your findings for your audience. In your Word document, provide evidence by way of labeled screen captures and written descriptions of your model application/outcomes. Label this section Outcomes.  
8. Write a conclusion that summarizes what you did to assess and analyze risk using data. Discuss legal and/or ethical considerations that your chosen business must consider and address in using your risk analytics approach. Label this section Conclusion. 
9. Include a References page that cites all sources used to complete your Unit 6 Assignment. The list of references must include no fewer than five authoritative and relevant sources beyond the class textbook and sources of data. Ensure that all of your cited sources are referred to parenthetically throughout the body of your paper where relevant, and then in APA format on the References page. 

  There are many examples of the use of risk analytics in the world today. Your

 
There are many examples of the use of risk analytics in the world today. Your task for this week’s discussion board is to identify a real, recent example of risk analytics, thoroughly examine it, and then analyze it for the class. Your example and response must comply with the following requirements:
Your chosen topic must involve an organization using risk analytics within the past 12 months.
You must summarize how and why the organization used risk analytics, citing the source of your information.
You must identify and describe for the class how the organization’s use of risk analytics impacted them. Identify outcomes, positive or negative, that were realized by the organization through their analytics activities.
You must examine ethical components of their use of risk analytics. Be thorough in your examination. For example, it is ethical for a credit card company to control who can hold their cards, and how much those card holders can charge; but it is also ethical for that credit card company to grow its revenues and profits. If your chosen topic were a credit card company using risk analytics to get more of their cards into the hands of more and more consumers, what would the ethical considerations and ramifications be for that card company?
Your original post must be no less than 300 words.

Your analysis should take on a 3-paragraph format; define, explain in detail, th

Your analysis should take on a 3-paragraph format; define, explain in detail, then present an actual example via research. Your paper must provide in-depth analysis of all the topics presented:
> Find at least 3 related articles on stream analytics. Read and summarize your findings.
> Location-tracking–based clustering provides the potential for personalized services but challenges for privacy. Argue for and against such applications.
> Identify ethical issues related to managerial decision making. Search the Internet and read articles from the Internet. Prepare a report on your findings.
> Search and find examples of how analytics systems can facilitate activities such as empowerment, mass customization, and teamwork.
Need 10-12 pages in APA format with peer-reviewed citations. Must include introduction and conclusion.

Outline the security breach at Target. Describe how Target became aware of the s

Outline the security breach at Target.
Describe how Target became aware of the security breach.
Examine the security breach’s impact on Target’s customers.
Recommend security controls that could have been implemented to prevent the data breach from occurring.
Research how the data breach at Target affected Target’s and other companies’ security practices

  Rewrite the Programming Example in chapter 4 ( Cable Company Billing ). Expect

 
Rewrite the Programming Example in chapter 4 ( Cable Company Billing ).
Expected Program and Design:
1. Write a pseudo code before starting your program ( you may not use SWITCH, replace it with IF structures )
1.1 Draw a flowchart for your program based on your pseudo code
2. Identify your constants
3. Your input will come from a text file of at least 15 customers
3.1 Input file format – customerType accountNumber premiumChannels
       ( i.e residential example: R12345 5 , business example B12345 16 8 )
                     residential customers
 RaccountNumber numOfPremChannels
                     business customers
 BaccountNumber numOfBasicServConn numOfPremChannels
4. Precision should be two decimal places
5. Calculate the running average for residential and business customer spending
6. Print all customer’s bill to a single file and the end of the file you should have the average summary for each customer type.
6.1 Pay attention to details when you formatting your output
Note: Use all chapter concepts and make your final as a true representation of what we have learned this semester.
7. Implement your program using arrays, covered in chapter 8, and user defined simple data types to hold customer data.
Turn in
program design ( pseudo code and/or flow chart )
input file
output file
.cpp file of your program ( make sure you include your header and comment your code )

  Conduct research about how the insurance industry uses analytics to manage r

 
Conduct research about how the insurance industry uses analytics to manage risk as they insure their customers. Write a brief summary of your research (1–2 paragraphs) discussing how the insurance industry uses analytics. Be sure to include discussion of both legal and ethical ramifications for the industry in their use of analytics. Cite your sources both in the text and in a references page. 

As a cybersecurity professional, you will be responsible for complying with the

As a cybersecurity professional, you will be responsible for complying with the regulatory requirements of each jurisdiction that your organization has ties with. Legal standards often vary widely, posing challenges for organizations that operate in multiple jurisdictions. In this discussion, you will examine an example of local regulations in one state in the United States.
The Breach Notification Law Interactive Map from the law firm BakerHostetler provides the regulatory compliance and due-care requirements for each state in terms of data protection and regulatory response, including the definition of personal information, requirements for risk-of-harm analysis, and requirements to notify the state government in case of a breach. This discussion should help you recognize some of the similarities and differences between security requirements in different jurisdictions.
To complete this discussion:
Select a state to review. Ideally, you will select a state that has not yet been discussed in any earlier posts to the discussion.
Summarize the standards in the various categories that apply to your selected state.

Welcome to ISE 640! Please introduce yourself to the class. Provide your backgro

Welcome to ISE 640! Please introduce yourself to the class. Provide your background and discuss your future career goals and plans, including experience in investigations and digital forensics, and what you are looking forward to gaining from taking this course. Next, address the following questions, which are supported by the resources in this module:
What is the difference between incident data and evidence?
How does knowing that difference speak to the approach you take to gather and analyze data and evidence?

Review the following video “Tips for job seekers: How to negotiate your salary p

Review the following video “Tips for job seekers: How to negotiate your salary pt. 1” and “Tips for job seekers: Advice on personal branding pt. 2”, and answer the critical thinking question that follows:

Summarize the key points from the video in terms of what you have learned regarding what skills and knowledge you would focus on when building your personal branding information for a potential job interview. Why focus on those skills? In your summary, reflect on, and explain, how you will apply what you have learned in a career context. 
Your summary should be a minimum of one page of content in length. Properly cite any references utilized in APA format.

Week 4 Assignment Part 1: Create a document that contains answers to the followi

Week 4 Assignment Part 1:
Create a document that contains answers to the following questions:
1. My long-term career goal (3-5 years) is to be a (an):
a. Find this job on a company website or job board and include a link to it or copy and paste the job description.
b. To obtain this position, I foresee myself having to:
c. The date I have set to obtain this career goal is:
Week 4 Assignment Part 2:
2. My ultimate career goal is to be a (an):
a. Find this job on a company website or job board and include a link to it or copy and paste the job description.
b. In this position, I will perform the following tasks:
c. The date I have set to obtain this career tool is:
Your submission should be a minimum of two pages of content in length. Please type all work, save it as a doc or pdf and upload here. All work must be submitted in APA format.
Assignments with a similarity report greater than 10% will not be graded.