Discussion

  The Power Grid and Big Data Contains unread posts  (Clipart from MS Office) The electric-utility business is going through a major business process reengineering (BPR), stemming from technology improvements, economic forces, and public awareness.  The electricity sector is transforming from large plants that produce hundreds or thousands of megawatts of power that are sent … Read more

Discussion

  Week 7 Discussion – Confidentiality, Integrity, and Availability (CIA): the foundations of information security (graphic source: http://epjst.epj.org/articles/epjst/abs/2012/14/epjst214008/epjst214008.html) Confidentiality, integrity, and availability, or the CIA triad of security, is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability.  So, a system should provide only what is truly … Read more

Discussion

 Instructions To complete this assignment, you will need the attached files and the the Small Merchant Guide to Safe Payments documentation (click link to download) from the Payment Card Industry Data Security Standards (PCI DSS) organization. Please read the instructions carefully and ask questions if anything is unclear.  You must use the attached template to complete … Read more

Discussion

  Your life is somewhere in a database Contains unread posts  (Clipart from MS Office) Many TV shows depict law enforcement personnel accessing readily accessible databases that contain all types of records about individuals –records about everything from address to telephone records to finances, insurance, and criminal history. The information you share with your bank, … Read more

Discussion

  (Keep in mind that the SDLC can be applied to almost any activity you encounter, either at work or outside of work.) One of the biggest problem areas in the SDLC appears during the requirements analysis stage and relates to communication problems between the software developer and the end-user. If misalignment of the end … Read more

Discussion

  The proliferation of the Internet of Things (interconnected devices, primarily using wifi as the means of communication) means that most individuals will be using a wifi network or be exposed to wifi networks on a daily basis. Reflect on the following: 1. What risks and safeguards are associated with wireless communication?  2. Are you … Read more

The Effects of Information Technology

  The Effects of Information Technology Contains unread posts Information Systems (IS) play a critical role in supporting, supplementing and automating many of our professional and personal lives, including business decision-making, shaping and transforming industries, and contributing to deep societal and economic change.  The impact of technology on economic growth and development, electronic globalization, and … Read more

Discussion

  The Power Grid and Big Data  (Clipart from MS Office) The electric-utility business is going through a major business process reengineering (BPR), stemming from technology improvements, economic forces, and public awareness.  The electricity sector is transforming from large plants that produce hundreds or thousands of megawatts of power that are sent to users through … Read more

Discussion

  Artificial Intelligence and Ethics (Clipart from MS Office) It seems that just as quickly as Artificial Intelligence systems show promise in transforming how we work, live, drive, and even get treated by law enforcement, scholars and others question the ethics that surround these autonomous decision-making systems.  The ethics of AI focuses on whether or … Read more

Discussion

  Many TV shows depict law enforcement personnel accessing readily accessible databases that contain all types of records about individuals –records about everything from address to telephone records to finances, insurance, and criminal history. The information you share with your bank, doctor, insurance agent, the TSA, ancestry kit companies, and on social media can make … Read more