Digital marketing

The research proposal is based on the transformation of customer data (big data) to help targeting, segmenting, and pricing in a way that would provide benefits for the customer (greater value). 
– use of Business intelligence. 
– use of Artificial intelligence.
– help creating better value for the customers.

I am not set on this proposal so you can amend a bit without going out of the scope of digital marketing and big data. 

Change Handling Styles

Conflict Handling Style
This assignment will help you understand conflict at the individual, team, and organizational levels.

Using the Internet, research, and identify additional information on handling conflict.
Based on your research and understanding, create a 3-page paper.

The document should:
Includes a description of change theories, conflict theories, and leader as a change agent.

Integrates how your ability to handle conflict can either enhance or hinder effective leadership in the health care environment.

Support your responses with examples!

Additional information:
Change Theories from this weeks reading:

*Environmental Change Theory: Change is dependent on variables such as circumstances, situations, and environment. Social systems evolve naturally over time but organizations are often unable to plan for change. But change happens as a result of environmental factors that keep undergoing change for survival.
*Teleological Change: Also known as planned change, scientific management, or rational models, it includes planning, assessment, incentive and rewards, stakeholder analysis and engagement, leadership, scanning, strategy, restructuring, and re-engineering. Organizations are purposeful and adaptive and their internal decisions motivate intentional change.
*Life Cycle: It focuses on the importance of human beings in the change process and emphasizes on systematic individual change. It also gives importance to the stages of organizational growth, maturity, and decline. Change is part of a stage and is progressive and rational. Change is a natural progression and does not occur because people want it or see it as necessary; it occurs due to individuals adapting to the organization’s life cycle.
Management is central to the change and assists individuals through training and motivational techniques.

Conflict theories from this weeks reading:
productivity.

Important conflict theories:
* Organizational conflict theory
* Social conflict theory
* Social cognitive theory
* Social exchange theory

References:
Using APA format and resources from the following (e.g.  http://www.healthIT.gov ,  http://cdc. gov ,  http://nlm.gov , https://florida.gov) Websites  or government websites to support your work. Use the additional information to help your research. This is a 3 page assignment.

Cyber Vulnerability in Power Systems Operation and Control

CSSS 5120 Week 5 Assignment #1: Power Grid Defense (1-page)

Reading
– Chapter 6 of Cyber War: The Next Threat to National Security and What to Do About It,  where we take a look at Clarkes perspective of an offensive cyber program in the United States.
– Part Four of Critical Infrastructure Protection, we evaluate power systems.

ASSIGNMENT

Clarke and other leaders in cybersecurity put the nations power systems at the top-tier of our defensive actions against cyber attack. Using our weekly discussions and both textbooks as sources, what do you think are the current issues facing our power grids to defend against attacks? And, how does the Smart Grid concept impact the cybersecurity discussion?

This is the correct answer, but it needs to be written in my own words:

“Clarke and other leaders in cybersecurity enable the protection of the nations power systems at the top-tier of our defensive actions against the cyber-attacks and the cyber threats. There are many issues which need to be addressed for the security of the power grids and smart grids. There are different reasons and issues which are being faced by the power grids such as:

– Errors and lack of security in the software implementations.
– Design flaws and architectural weaknesses in the systems.
– Weaknesses in the protocol design and implementation for communications.
– Weak implementation of the security policies in place.

The Smart Grid concept impact the cybersecurity in a way in which the smart grid is a digital technology. The smart grid allows for the two-way communication between the utilities and the customers and thus sensing along with transmitting the power is what makes the smart grid. Smart grids are thus vulnerability to cyber-attacks and cyber threats.”
———————————-
CSSS 5120 Week 5 Assignment #2: This Week in Cybersecurity (2-pages)

ASSIGNMENT

Find a Cybersecurity-related current event, activity, or development on https://www.c-span.org/ to write and share with your colleagues. In your discussion post, briefly summarize the event and reflect on its significance to support your topical input.

Questions to address in a two-pages paper might include:
How does the event relate to issues addressed in class?
How might similar situations be mitigated?
What is the broader impact of the event (e.g., nationally, globally, etc.)

Include a link to the story or a citation so that others may read the story.
———————————-
5140 Week 5 Assignment #1 – Information protection program (2-pages)

Reading:

Here is the answer but need to be written in my own words.

In order to achieve the strategic, tactical and operational goals, the following are key components to successfully implementing an Information Security Program:

1. Focus on the Information Security Program as a whole
2. Align your security program with your organizations mission and business objectives
3. Implement meaningful and enforceable Information Security policies and procedures
4. Develop a security risk management program
5. Apply defense-in-depth measures: Assess the security controls to identify and manage risk
6. Establish a culture of security: Develop a sound Security Awareness program
7. Measure your Information Security Program by developing meaningful metrics
8. Develop and implement an Incident Response Plan: Train your staff and test your plan periodically
9. Continuous monitor: Deploy tools and solutions to monitor your infrastructure
10. Review your plan at least annually: Anticipate, innovate, and adapt

Discuss the components of an information protection program.

Requirements:
APA Format
2 references
2 pages
———————————-
5140 Week 5 Assignment #2 – Sensitivity of data (2-pages)

Link:
https://www.spirion.com/blog/how-to-determine-the-sensitivity-of-information/

Discuss various levels of sensitivity of data and why they are important.

Requirements:
APA Format
2 references
2 pages

———————————-
CSSS 5140 Week 5 Assignment #3 – Video Synopsis (2-pages)

VIDEO
The 1s and 0s behind cyber warfare (Chris Domas)

Link:
https://www.ted.com/talks/chris_domas_the_1s_and_0s_behind_cyber_warfare

ASSIGNMENT
Instructions: After reviewing the video answer the following questions in two to four strong paragraphs using APA format:

1. What are the major points, strengths, and weaknesses?
2. How could the information be applied in Cyber Strategic Operations?

REQUIREMENTS:
– Provide two references.
– APA Format

Website Analysis

Part I (This part helps prepare you to gather information, kind of like a prewriting exercise. This part is not turned in.)

First, review in your mind the rhetorical principles of ethos, pathos, and logos.

Then, surf the Internet and choose one site you feel is effective and one that you feel is ineffective.  (I use quotation marks because there is no such thing as a completely effective or ineffective website; these are just general impressions.)  You may even choose from the list of websites you analyzed previously when exploring technical information online.

It might be easier if you chose sites that were similar in topic and scope.  Also, try to choose websites that are either home pages or that are at a similar link level.  That way, you wouldn’t be comparing completely dissimilar things.

Now, compare and contrast the two sites, making notes on your observations.  You might choose to focus on some of the following areas or just a couple of them:

Ways each site addresses the rhetorical concerns of ethos, pathos, and logos
Color and its relationship to the sites purposes
Ways text and graphics complement (or don’t complement) each other
Overall document design (Refer to the textbook for ideas.)
Kinds of words used
Available links
Tone of the text
Sentence length
Jargon

Part II (This is the formal write up of the assignment that you should submit to a peer and turn into the Assignments Folder, after you’ve received feedback and made revisions.)

Now that you’ve analyzed, it’s time to write it up formally.  Instead of writing in essay form, though, like you did for the technical document analysis assignment, I’d like for you to write using technical writing conventions.  There are some similarities to an essay, though. THIS IS NOT AN ESSAY

Your analysis should be relatively brief (about one page).
Single-space your document, double-spacing in between sections or paragraphs.
Include headings.
Include a brief introduction and conclusion.
Use bullet statements to compare and contrast the sites.
Attach the sites you have analyzed. Or include the URLs in your paper.
Be sure to compare and contrast!  Many times, writers do only one.  Use comparison/contrast words such as “like,” “different from,” “similar to,” “in contrast,” “as opposed to,” etc.
NOTE:  Since I’m your audience, you know that I would be very happy for you to discuss rhetorical concerns.  This means that you can discuss

Audience
Persuasive elements
Ways the website authors are trying to convey a persona (or ethos) through the sites
Ways the website authors are trying to appeal to the Internet audience (Here, you might have to think briefly about characteristics of web users.)
Ways logical design or reasoning might have been used in the sites
You might choose to use a rhetorical element as the context for discussing website characteristics, such as color, organization, or word choice.