Week 5 Assignment – Chapter 10 In-Depth Activity Complete the In-Depth Activit

 
Week 5 Assignment – Chapter 10 In-Depth Activity
Complete the In-Depth Activity at the end of Chapter 10 (page 384 in the VitalSource book). For your submission: 
Create a Word document.
Copy each of the five questions from the end of the activity into  your document and write your response to each question below it.
Show in your responses that you understand the subject matter.
Note: Chapter 10, In-Depth Activity, page 384 has a typo. The link http://labinthewild.com does not work. It should say www.labinthewild.org.  In addition, if when accessing www. labinthewild.org you receive a  warning message about the security of the website, it is safe for you to  proceed to the website. You will not be asked for any personal or  financial information. 
  
In-Depth Activity
Go to labinthewild.com, and select the test “What is your privacy profile?” This test has been designed to tell you what you think about data privacy and how different you are compared to what others think about this topic. It should take about 10–15 minutes to complete. At the end of the test, it will provide you with your results and classify you in terms of whether you are not concerned, somewhat concerned, or very concerned.
1.Do you consider this to be an accurate reflection of how you view privacy?
2.Did you think the video shown was effective at raising potential problems of what data is collected  in a smart building? If not, what other scenario could be used in a video to ask people to consider privacy concerns?
3.What impact do you think the context chosen for the scenario might have on your reactions? For example, if the scenario involved a doctor’s surgery, might you have reacted differently and if so, why?
4.What do you think of labinthewild.com as a platform for conducting large-scale online experiments from volunteers?
5. Did you find any other information on the website interesting?

  Respond to the following: Of the four principles of data ethics listed in Bo

 
Respond to the following:
Of the four principles of data ethics listed in Box 10.4 in Chapter  10 (fairness, accountability, transparency, and explainability), which  three of them seem most fundamental to achieving ethical data use for  individuals?
What’s the difference between lawfully obtaining personal data and having accountability for obtaining it?
Provide specific examples of behaviors that you could follow that  apply each of the four principles as they relate to data that you would  need to collect for the development of the project scenario app.
Be sure to respond to at least one of your classmates’ posts.
  
 Hari Rao Kurupathi             
 
Hello everyone,
Of  the four principles of data ethics listed in Box 10.4 in Chapter 10  (fairness, accountability, transparency, and explainability), three seem  most fundamental to achieving ethical data use for individuals.
Data  ethics help ensure that the data is used appropriately and responsibly  by the organizations collecting it. While all four principles of data  ethics are essential, the three that resonate with me the most are
Transparency –  Organizations need to be transparent about why they are using the data  and make it easily accessible and understandable to everyone on demand 
Fairness  – The purpose of collecting the data must not have any discriminatory  intent on specific individuals or groups. It must be collected in a way  that stays consistent with the public interest and adheres to democratic  values. 
Accountability –  The people who provide the data to the various organizations must have  the ability to maintain oversight and control over the decisions made by  the companies. Accountability helps with delivering governance to the  data being collected. (1) 
What’s the difference between lawfully obtaining personal data and having accountability for obtaining it?
Lawfully obtaining personal data:  When organizations try to process personal data, they need to do it  lawfully. For example – the user has provided consent to process the  data, all the legal obligations have been met, the vital interests of a  person are protected, etc. Users also need to know how their data is  handled and for what purpose. The data collected should not be  mishandled or misused. The organization needs to be open, honest, and  clear about who they are, how they plan to use the personal information,  and why they collect the data. 
Accountability for obtaining the data:  Organizations must have records and compliance to prove they are  keeping the data safe and secure. Documentation can help create an audit  trail and provide proof when authorities request it. Furthermore,  organizations also need to maintain the integrity and privacy of the  data collected and protect it from internal and external threats. The  data must also be protected from accidental loss or damage. (2) 
Please  provide specific examples of behaviors that you could follow that apply  each of the four principles as they relate to data that you would need  to collect for the development of the project scenario app
Transparency  – Let’s take the example of the DHS project. While collecting data from  the end users, the border patrol, immigration officers, and other law  enforcement, we need to ensure they understand our cookie policy to  provide a personalized experience. The end users must also review the  cookie policies at any time and accept or decline them. 
Fairness  – An organization must avoid unnecessary biases that negatively impact  business decisions. Organizations must be transparent, inclusive, and  open while gathering user data. 
Accountability:  Organizations need to hold themselves accountable while collecting data  from users. They need to not only clarify how the data will be used in  their analysis but also be responsible for compensating their users if  there are data breaches and sensitive data is exposed to malicious users 
Explainability –  Organizations need to be able to explain their decision-making process  to their users in an easily understandable way. For example, smartphone  manufacturers can notify customers how their usage data can help with  adding new features to the phone 
Sources:
Government digital services – Data ethics framework – Retrieved from – https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/923108/Data_Ethics_Framework_2020.pdf 
Onetrust.com – Understanding the seven principles of GDPR – May 17, 2021 – Retrieved from – https://www.onetrust.com/blog/gdpr-principles/

  Write a 4 page paper (deliverable length does not include the title and refere

 
Write a 4 page paper (deliverable length does not include the title and reference pages)
In IEEE 802.11, open system authentication simply consists of two communications. An authentication is requested by the client, which contains the station ID (typically the MAC address). This is followed by an authentication response from the AP/router containing a success or failure message. An example of when a failure may occur is if the client’s MAC address is explicitly excluded in the AP/router configuration.
What are the benefits of this authentication scheme?
What are the security vulnerabilities of this authentication scheme?
Make a 3 page power point presentation from the paper.

You are a senior systems development analyst working for a major technology serv

You are a senior systems development analyst working for a major technology service provider. Your chief information officer (CIO) has asked you to conduct an analysis and prepare a presentation on the differences in systems development life cycle methodologies. She has also asked you to recommend the model you feel is most suited to your organization.
Develop a 6–7 slide presentation, providing the advantages and disadvantages of each of the following models: 
Waterfall model.
V-shaped model.
Iterative model.
Spiral model.
Big Bang model.
Agile model.
At the end of the presentation, provide your recommended life cycle model, including the benefits and reasons why your organization should follow your recommendation. Then, submit your presentation in the courseroom for this assignment.
Note: See the assignment scoring guide to review the specific scoring criteria for this assignment.
Additional Requirements
Written communication: Ensure written communication is free from errors that detract from the overall message.
Length: 6–7 slides.
Format: Apply the formatting appropriate for a visual presentation.
Font type and size: Apply the font and font size appropriate for a visual presentation.
References: Cite at least three sources.

Systems development life cycles and methodologies guide the development of softw

Systems development life cycles and methodologies guide the development of software, services, and other products and may serve other purposes within an organization. For example, the Mesquida and Mas (2015, February) article describes how software life cycle processes were used as a framework to help support the integration of information security best practices into software development and use.
Consider your studies, reflect on your experience with the development processes in organizations, and provide your own analysis to respond to the following questions in your initial post:
What systems development processes have you been a part of in your work history? Briefly describe the type of methodology used by an organization with which you are familiar. Also, describe any roles you have had during a systems life cycle process.
What are your observations about how these processes worked? What did the methodology help the developers and organization achieve? Was the organization using the methodology to support activities other than systems development?
How important do you think it is for an organization to use a formal methodology in its systems development efforts?
What are the benefits of following a systems development methodology, and what are the downsides?
Response Guidelines
Return to the discussion at the end of the week to read and review the posts of your peers. Does anyone else’s experience resonate with your own? Post a comment and add questions to further explore the experiences of your classmates. Also, in your response posts, comment on whether the methodologies described by a peer could be used to support or inform activities other than systems development.

  Information technologists, particularly network administrations, routinely doc

 
Information technologists, particularly network administrations, routinely document networks by creating diagrams. A good network diagram may represent the primary features and design of a particular network’s logical and physical configuration.
In this assignment, you create three diagrams that depict various parts of a coffee retailer’s cloud-managed network. Your diagrams should depict how the coffee shop retailer might effectively configure its LANs, WLAN, and WAN.
Preparation
Read the Coffee Retailer Description document located in the resources.
Directions
Complete the following two parts of the assignment:
Part 1 – Network Diagrams
Draw diagrams that reasonably depict a network infrastructure that will enable Coffee Retailer to achieve the company’s strategic goal of offering customers public wireless Internet access. Make sure to list any assumptions regarding the company or your design that you need to make in order to design and draw a realistic diagram.
Make sure to do the following:
Create a logical wide area network (WAN) diagram showing major enterprise locations including the corporate headquarters, one typical retail location, and a cloud service provider.
Create a physical WAN diagram that places core and distribution-layer routers and switches in locations that optimize network performance. Justify your choices.
Create a physical local area network (LAN) and wireless LAN (WLAN) diagram for a typical retail location.
Evaluate how well one of your diagrams depicts a working cloud-based solution for Coffee Retailer. What are the most important criteria?
Submission Requirements
Submit a single Word document with both parts of this assignment.
Font: Times New Roman, 12 point.
Format: Double spaced lines. Use current APA style and format.
ResourcesAPA style and format.

One of our learning challenges this week is to grow in our ability to produce ne

One of our learning challenges this week is to grow in our ability to produce network diagrams with professional quality production values. Please carefully review the Network Diagram Examples [PDF] document that contains six examples of flawed network diagrams which represent a range of aesthetic and technical approaches to creating network diagrams.
Discuss your ideas about at least three of the example diagrams, and explain your rationale for features that you do and do not like.
Finally, include a reflection on your own diagramming skills or experience, and express your intentions for how you will seek to improve your skills during your Unit 4 learning experience.

 Your task this week is to write a research paper that contains the following: 

 Your task this week is to write a research paper that contains the following: 
What is identification as a service (IDaaS)? 
What are some of the challenges related to identity management? 
What are some of the IDaaS solutions offered by various companies? 
 
Paper should be written in APA 7th edition and should be approximately five pages in length, not including the title page and reference page. 

  For this week’s discussion, please think about your professional role and orga

 
For this week’s discussion, please think about your professional role and organization.
What trends in your profession are you most excited about?
What are some future challenges in healthcare human resources management that you see for your profession? Your organization?
Based on what you have learned in this course, how would you address these challenges?
In developing your initial response, be sure to draw from, explore, and cite credible reference materials.

  You are required to complete this assessment after Assessment 1 is successfull

 
You are required to complete this assessment after Assessment 1 is successfully completed.
Care coordination is the process of providing a smooth and seamless transition of care as part of the health continuum. Nurses must be aware of community resources, ethical considerations, policy issues, cultural norms, safety, and the physiological needs of patients. Nurses play a key role in providing the necessary knowledge and communication to ensure seamless transitions of care. They draw upon evidence-based practices to promote health and disease prevention to create a safe environment conducive to improving and maintaining the health of individuals, families, or aggregates within a community. When provided with a plan and the resources to achieve and maintain optimal health, patients benefit from a safe environment conducive to healing and a better quality of life.
This assessment provides an opportunity to research the literature and apply evidence to support what communication, teaching, and learning best practices are needed for a hypothetical patient with a selected health care problem.
You are encouraged to complete the Vila Health: Cultural Competence activity prior to completing this assessment. Completing course activities before submitting your first attempt has been shown to make the difference between basic and proficient assessment.