Week4-researchpaper-infotech in a global economy

Course: InfoTech in a Global Economy

LATE SUBMISSION WILL NOT BE ACCEPTED BY PROF.

Due Date – 1 day

Research Paper:

Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use the University library (please use the attached pdf of peer, also attached the image of it to google for reference) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Reading Assignments

Textbook, Chapter 11: Mastering Blockchain  

Kshetri, N. (2017). Will blockchain emerge as a tool to break the poverty chain in the Global South? Third World Quarterly, 38(8), 1710–1732. https://doi.org/10.1080/01436597.2017.1298438

Varghese, J. J., Sharma, D., & Singh, N. K. (2019). Analysing the Impact of Blockchain Technology in India’s Digital Economy. Global Journal of Enterprise Information System, 10(3), 94–99. https://doi.org/10.18311/gjeis/2019

Prof. Guidelines 

  • Be approximately four to five pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Required Books & Resources 

Title: Entrepreneurship in the Global Economy ISBN: 9781139536660Authors: Henry Kressel, Thomas V. LentoPublisher: Cambridge University PressPublication Date: 2012-07-19

Title: Federal Cybersecurity ISBN: 9781634853965Authors: Cory MedinaPublication Date: 2016-01-01 

Title: Mastering BlockchainISBN: 9781787125445Authors: Imran BashirPublication Date: 2017-04-28 

Title: Global TechnologyISBN: 9780309185059Authors: Steve Olson, National Academy of EngineeringPublisher: National Academies PressPublication Date: 2011-02-08

“APA7 Format” 

“NO PLAGIARISM” 

Plagiarism includes copying and pasting material   from the internet into assignments without properly citing the source   of the material.

 

threads counting the nuber of characters 1

The goal of this project is to count how many times eachalphabet character appears in the text file. The text file will be converted tolowercase during the reading process. The program will create 26 threads. Thecontents of text file read is shared between the 26 threads. The first thread willcount the number of a’s, the second thread will count the number of b’s, and so on.All the threads also share a Results object. Each thread will contribute its own resultto the shared Results objects.
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!Use Discount Code “Newclient” for a 15% Discount!NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Hhs 320 cultural awareness in the human services

Paper

The assignment for this course is a Research Paper. The purpose of  the Research Paper is for you to culminate the learning achieved in the  course. 

Focus of the Paper
For your Paper, select one aspect of cultural diversity from the following list that you would like to study:
* (For improved memory and increased awareness, remember the mnemonic, GARREACS.)

  • Gender
  • Age
  • Race
  • Religion
  • Ethnicity
  • Ability
  • Class
  • Sexual Orientation

Once you have chosen one aspect of cultural diversity to study in depth, prepare a Research Paper with the following components:

  • Summarize the pertinent historical, political, social, economic and cultural factors related to your chosen aspect of diversity.
  • Consider and summarize any relevant developmental theory models related to your chosen aspect of diversity.
  • In regard to your chosen aspect of diversity, identify and evaluate  the relevant laws or programs that have either helped or restricted  access to care and support.
  • Evaluate how your chosen aspect of diversity, in combination with  two other aspects of diversity, can lead to increased needs or issues.  For example, if someone is female, African American, and lesbian, will  there be additional challenges? Select any combination of 3 aspects of  diversity to discuss.
  • Describe at least two resources currently available in your area for  someone needing special services related to your chosen aspect of  diversity.
  • Explain how your personal characteristics will either complement or  conflict with this diversity issue. Consider your own biases and  prejudices or those of your family of origin.
  • Discuss relevant concerns, cautions or insights necessary for you to be a culturally competent human service professional.

Writing the Paper
The Paper:

  • Must be eight- to ten double-spaced pages in length, and formatted  according to APA style as outlined in the Ashford Writing Center.
  • Must include a title page with the following:
  • Title of paper
  • Student’s name
  • Course name and number
  • Instructor’s name
  • Date submitted
  • Must begin with an introductory paragraph that has a succinct thesis statement.
  • Must address the topic of the paper with critical thought.
  • Must end with a conclusion that reaffirms your thesis.
  • Must use at least seven scholarly sources.
  • Must document all sources in APA style, as outlined in the Ashford Writing Center.
  • Must include a separate reference page, formatted according to APA style as outlined in the Ashford Writing Center.

 Carefully review the Grading Rubric  (Links to an external site.)Links to an external site.for the criteria that will be used to evaluate your assignment.

secure videoconferencing communications project

Videoconferencing and collaboration systems vary in cost, configuration, functionality, use, and collaboration capability. These systems are trusted to facilitate sensitive and proprietary discussions through their use of encrypted communication channels. Yet these systems have vulnerabilities and are prone to threats and attacks ranging from phishing, credential compromise, and even malware insertion. Therefore, analysis of possible threats, attacks, and vulnerabilities inherent in these systems is critical in developing defense and protection strategies for voice and video data at all endpoints and during transit.

In this project, you will create a proposal for a secure videoconferencing system, which will include an executive summary, briefing/slide presentation, and lab report. The details can be found in the final step of the project.

Step 1: Develop Functional Requirements for Videoconferencing

The first step in your proposal for a secure videoconferencing system is to develop a set of functional requirements for videoconferencing that you believe the media company will need based on its geographic dispersion and business needs.

In developing those requirements, research three videoconferencing solutions such as Skype, GotoMeeting, Polycom, and Cisco Webex and explain their capabilities, advantages, and disadvantages. Identify costs as well as implementation and support requirements.

The functional requirements and the three possible solutions will be a section of your Proposal for Secure Videoconferencing. In the next step, you will review the challenges of implementing those solutions.

Step 2: Discuss Implementation Challenges

In the previous step, you outlined the requirements for secure videoconferencing for the company and outlined three potential solutions. Part of your final proposal should also include the advantages and disadvantages of the implementation options for the three systems you selected. This section of the proposal also must include the changes the media company will need to make to implement the systems.

Additionally, explain how system administration or privileged identity management will operate with these systems. You will also need to examine how data exfiltration will occur with each of the new systems.

The changes to the systems and challenges for the implementation of these potential solutions will be an important section of your Proposal for Secure Videoconferencing. In the next step, you will take a closer look at the track records of each of the potential videoconferencing vendors.

Step 3: Identify Vendor Risks

You’ve finished outlining the pros and cons of three videoconferencing systems. Now, it’s time to take a close look at how they serve their clients. This will take some research. Look at the systems’ known vulnerabilities and exploits. Examine and explain the past history of each vendor with normal notification timelines, release of patches, or work-arounds (solutions within the system without using a patch). Your goal is to know the timeliness of response with each company in helping customers stay secure.

This step will be a section of your Proposal for Secure Videoconferencing.

Step 4: Develop Best Practices for Secure Videoconferencing

The last few steps have been devoted to analyzing potential videoconferencing solutions. But obtaining a trusted vendor is just part of the security efforts. Another important step is to ensure that users and system administrators conduct the company’s videoconferencing in a secure manner. In this step, outline security best practices for videoconferencing that you would like users and systems administrators to follow. Discuss how these best practices will improve security and minimize risks of data exfiltration as well as snooping.

This “best practices” section will be part of the overall Proposal for Secure Videoconferencing.

In the next step, you will develop system integrity checks within a virtual lab environment.

Step 5: Develop System Integrity Checks

As part of the overall proposal, the CISO has asked you to develop system integrity checks for files shared between users of the videoconferencing systems. These checks will ensure file protection and prevent exfiltration of sensitive files.

Step 6: Submit Your Proposal for Secure Videoconferencing and All Related Materials

It’s time to prepare your materials on secure videoconferencing for management. Your task is to recommend a system that best meets the business functionality and security requirements of the company. As part of that recommendation, you will also prepare a set of high-level executive briefing slides to give the CEO and CIO an overview of your study.

The assignments for this project are as follows:

  1. Executive briefing: This is a three- to five-slide visual presentation for business executives and board members.
  2. Executive summary: This is a one-page summary at the beginning of your Proposal for Secure Videoconferencing.
  3. Proposal for Secure Videoconferencing: Your report should be a minimum six-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations.

Submit all four components to the assignment folder.

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post secure videoconferencing communications project appeared first on Custom Nursing Help.