In assessing the predictive power of categorical predictors of a binary outcome, should logistic regression be used?

Logistic Regression estimates the probability binary outcome as a function of independent variables.

An example is the probability that a borrower will default as a function of his credit score,

income, loan size and his current debts. In other words, Logistic Regression is a statistical method

for analyzing dataset in which there are one or more independent variables (predictor) that determine

the outcome of a dichotomous dependent variable such as YES or NO. Dichotomous is an outcome variable

with the possibility of only two alternative outcomes such as TRUE or FALSE.

Binary logistic regression model is used to estimate the probability of the binary response of dependent

variable based on one or more independent or predictor variables. Logistic regression uses categorical

predictor to predict the binary dependent outcome.

Question:

In assessing the predictive power of categorical predictors of a binary outcome,

should logistic regression be used?

Requirements:

Another way to frame the question is:

Can logistic regression be used to predict

categorical outcome?

If yes, then how can logistic regression be used to predict

categorical outcome?

If no, why?

Start by defining Logistic regression

Define binary logistic regression.

Describe the predictive power of  categorical variable on binary outcome.

Explain the usefulness of logistic regression in Big Data Analytics.

Provide examples.

Useful links:

https://www.youtube.com/watch?v=XnOAdxOWXWg

https://www.youtube.com/watch?v=gNhogKJ_q7U

https://www.medcalc.org/manual/logistic_regression.php

Use the technical guide template to create a 3- to 4-page Secure Staging Environment Design and Coding Technique Standards Technical Guide for the organization you chose.

Take on the role of Software Engineer for the organization you selected in Week 1.

Use the technical guide template to create a 3- to 4-page Secure Staging Environment Design and Coding Technique Standards Technical Guide for the organization you chose.

Research and include the following:

  • Design a secure staging environment for your organization
  • Diagram your staging environment
  • Include descriptions for each object in your environment
  • Create a secure coding technique/quality and testing standard for your organization covering the following secure coding techniques:
  • Proper error handling
  • Proper input validation
  • Normalization
  • Stored procedures
  • Code signing
  • Encryption
  • Obfuscation/camouflage
  • Code reuse/dead code
  • Server-side vs. client-side execution and validation
  • Memory management
  • Use of third-party libraries and ADKs
  • Data exposure
  • Code quality and testing
  • Automation
  • Static code analyzers
  • Dynamic analysis (e.g. fuzzing)
  • Stress testing
  • Sandboxing
  • Model verification

What is one skill or talent you would like to develop?

This is an individual assignment. Please post a brief introduction, including your name and background. Consider including a photo of yourself, but note this not a requirement. Use this forum to help you select group members to work with on the upcoming group assignments. Students find it easier to meet as groups when work schedules are similar, for example. As such, include your schedule and other factors that would be important to consider in selecting your group (e.g., work ethic, etc.). Then, to make things fun and get to know each other just a little more, answer the ice breaker questions.

You should include the following:

  • Name and background (photo of self welcome but not required)
  • Schedule considerations and any other factors you feel contribute to group efficiency and success
  • What is your current theme song? In other words, what is the underscore to your life right now? What song would play when you walk into the room?
  • What is one skill or talent you would like to develop?
  • What is your favorite year and why?
  • After introduced yourself do this one:

 

In order to post to this forum, you will need to first watch the video “Chasing Zero: Winning the War on Healthcare Harm.” This forum topic is directly related to the course objective “minimizes risk of harm to patients and providers through both system effectiveness and individual performance.”

Instructions:

This is an individual assignment. You are an RN proposing change at your work place to a committee interested in “chasing zero.” You have 2-3 minutes to catch their attention, show your passion, and demonstrate your commitment to such efforts. Post a video of yourself giving opening statements.

You should include the following:

  • What was your first thought after watching the video?
  • What are your ‘take aways’, or lasting impressions, after watching the video?
  • Personal stories help all that are involved in errors (e.g., staff, victims, families of victims, etc.) to process the event. They also serve as motivation to improve and commit to a better way of doing things. Do you or does anyone you know have a personal story involving preventable error? If not, reference an example outside of those described in the “Chasing Zero” video.
  • What influence does sharing of errors have on your nursing practice?

The video should be professional in nature; minimize or eliminate “filler” words (e.g., “uh,” “like,” “you know”), slang, and disorganized thoughts. Be sure you speak clearly and at an appropriate pace while working within the 2-3 minute timeframe.

) Identify a device (anything that has a CPU) that we use every day that is not protected and subject to being hacked?

Scenario:

You are the cybersecurity expert for a government organization. There is great concern that hackers from another country will infiltrate the government network by using a phishing attack to interfere with our election process. One member send you an email that looks suspicious, in oder to provide law enforcement with as much information as possible you decide to track the sender.

  1. You may use the attached email (.txt) the senders IP is highlighted or choose one from your own email
  2. Trace the IP to get a physical address (starting point)
  3. Share any other information you find that may be relevant to law enforcement

Short Guides – You may need Google “how to view the source code for your specific” device, browser etc… also works on email that are not saved on your device.

Discussion

 

1) Where do you see technology leading us in terms of the future?

2) Identify a device (anything that has a CPU) that we use every day that is not protected and subject to being hacked?