Why would an English media source care about a US-based report?  Answer avobe q

Why would an English media source care about a US-based report? 

Answer avobe question based on bellow post

The VOIP security podcast is titled “Internet phone calls and terrorism, Georgia Tech report on Emerging Cyber Security Threats, phone jamming, 802.1X-REV, 802.1AE, VoIP security news and more.” According to a report by the Times of London, internet phone calls are crippling the fight against terrorism. Internet-based phone calls are difficult to track because internet call companies do not keep consumer data unlike mobile phone companies.  The podcast talks about other articles which keep expressing their concerns over internet calls and VOIP security. The question however is, where is the line between people’s privacy or use of digital tools and government’s legitimate right to have access to the same information for purposes of law enforcement.

While implementing such legislation maybe possible in the United Kingdom, it becomes challenging to use wiretapped evidence in the United States, and getting such power would become extremely challenging. More importantly, who would be important for aggregating the wiretapped evidence? With the modern global IP world, wiretapping remains a thorny challenge. The debate therefore revolves around how much of freedom is given to law enforcement and how much of the same freedom is left for individual rights.

Another challenge is the voice calls over the internet are likely to be attached by malware and botnets going forward. As the number of cell phones being used and people download different software from unknown vendors, the security of VOIP is in jeopardy. Phone jamming is another issue discussed in the podcast with the 2002 election incidences of the same. The most interesting feature of phone jamming is that it is likely to be automated to be used in political campaigns. Lastly, the podcast talks about 802.1X-REV and 802.1AE for securing the Ethernet layers and authentication key management.

Personal thoughts on the podcast

There are important lessons or themes that can be drawn from the podcast. Firstly, internet calls have obviously tilted the scale to benefit criminals because collecting such evidence-or data has become a massive challenge.  The government should be granted access to different sources of information and data that would go a long way in preventing crime or related activities. The question however is, where should the line be drawn? Should the government be given access to any type of information they want to deter crime? Invading privacy should not be granted to the government.

However, I believe there should be a framework on which the government can be allowed to collect some evidence over internet and phone activities that would be important in deterring crime or even stopping intentions inclined towards this direction. As mentioned in the podcast, it is true that law enforcement agencies face massive challenges in collecting phone data because the internet service providers do not store and provide the data on their users. Unlike telecom providers, online services can be challenging to collect information and data that could be used to deter crime or even terrorism and that is why I strongly support the sentiments in the podcast. I believe that the introduction of 802.1X-REV and 802.1AE will be important for improving the economy.

Government’s wiretapping activities

Wiretapping is one of the surveillance methods used by the government to intercept and gather information about phone calls and other activities over the internet. From a personal perspective, wiretapping can be good if used in the correct manner. There have been instances where wiretapped conversations or calls have been used to track criminals and stop terrorist attacks that have become common across the globe (McNeal, Schmeida & Holmes, 2016). Wiretapping has also had massive success in the war against drugs by stopping drug dealers and cutting links between the drug lords before their deals go through.

In 2012 and 2013 for instance, about 50 terrorist attacks were stopped and aborted because of government surveillance programs including wiretapping. It is important to also understand that situations which require wiretapping and other similar surveillance programs are highly dangerous for law enforcement officials to go sometimes (McNeal, Schmeida & Holmes, 2016). Additionally, because of the nature of the American judicial system, getting warrants in some instances take ages and therefore criminals may get away with heinous crimes like murder or even felony. Wiretapping is also essential in promoting sanity in the political class because politicians who lie to the public can easily be exposed.

Thirdly, wiretapping is a tool for making evidence water-tight and ensuring that criminals do not run away from justice (McNeal, Schmeida & Holmes, 2016). There can be instances where the only evidence which can tie a suspect to the crime scene or a criminal activity is the wiretapped evidence. However, it is important that wiretapped conversations and data collected from these activities is safety stored for the safety of the citizenry. Any leaks to such information or evidence may jeopardize personal and professional lives of people because criminal can use it for selfish gains.

For instance, a conversation between a bank executive and an investor being in the hands of criminals can lead to bank robberies or other economic crimes. The government must also ensure that private information is kept confidential and not used for malicious purposes. Wiretapping for evidence gathering should only be used in cases where other means of collecting evidence are not possible (McNeal, Schmeida & Holmes, 2016). In so doing, the government will not have illegal wiretaps being set in place without proper warrants or reason for having them in place.

Should government require data collection and retention?

Collection and retention of data is another topic that requires adequate ventilation. Typically, mandatory retention of data involves legislations that force Internet Service Providers and telecom companies to continuously collect and store communication records which document the online activities of online users (Mundie, 2014). In such like cases, the government will demand access to data or records the internet and phone providers keep about online activities and calls. Such data has been called metadata. Mass government data collection and retention applies to people’s phone and Wi-Fi networks, land-line and cable telecommunications.

The question is, should the government collect and retain such data? My personal opinion on this is that no, the government should not collect and retain data. There are five reasons to oppose such a position (Mundie, 2014). Firstly, collecting and retaining data compromises the idea of online anonymity which is often used by journalists, investigators and whistle-blowers to reveal crime or ills that are taking place in the society (Schneier, 2015). Secondly, such collection and retention of data invades personal privacy, is costly and impeded on the right to expression and privacy.

With the knowledge that government will collect and retain metadata on different activities, people’s freedom of speech is highly curtailed and people are unable to make bold statements on issues that affect their daily lives (Schneier, 2015). Thirdly, because there are privacy risks involved in such collection and retention, the data and databases are made vulnerable to accidental disclosure or even thefts. In some cases, like political witch-hunt, sensitive and private information can be deliberately spilled to the general public to soil a candidate’s name.

In politics, metadata can either be a blessing or a curse. And in most cases, it often proves to be a curse more than being a blessing. Four, such data makes the internet and phone providers absorb the exorbitant costs storing and maintain the data, in most cases, these costs are passed to the consumers (Schneier, 2015). Lastly, as mentioned before collected and retained data has a huge potential to be abused either by custodians for their personal gain or by criminals.

 

References

McNeal, R. S., Schmeida, M., & Holmes, J. (2016). The E-Government Surveillance in the United States: Public Opinion on Government Wiretapping Powers. In Ethical Issues and Citizen Rights in the Era of Digital Government Surveillance (pp. 208-230). IGI Global.

Mundie, C. (2014). Privacy Pragmatism; Focus on Data Use, Not Data Collection. Foreign Aff., 93, 28.

Schneier, B. (2015). Data and Goliath: The hidden battles to collect your data and control your world. WW Norton & Company.

Submit an executive summary on the specific industry and business problem that y

Submit an executive summary on the specific industry and business problem that you are going to do your research paper on.  The summary should contain enough of a detailed description of the business problem that someone unfamiliar with the specific industry will be able to understand how a technology like RFID could enhance or streamline the approach to solving the problem.

here are the some example summarys

http://www.yourbusinesspal.com/executive_summary_sample.html
https://www.thebalancesmb.com/business-plan-executive-summary-example-2948007
www.business-plans-guide.com/executive-summary-example.html

  Week 10 Discussion Forum: Strategic Tech and Enterprise Systems Technology an

 

Week 10 Discussion Forum: Strategic Tech and Enterprise Systems
Technology and Enterprise Resource Planning

As an IT manager, discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity. What are the advantages of using ERP? In your discussion, please be sure to provide substantive explanation of what ERP is and give example(s) of ERP. Use APA throughout.

Write 300 words to discuss the above topic.

   To demonstrate an increased knowledge in the areas of managing change, you mu

  
To demonstrate an increased knowledge in the areas of managing change, you must complete the following two sections of the examination. For the first section, select two of the following questions for your response. Write enough so anyone reading your response knows what thoughts you are trying to convey. The total exam should not exceed four pages double spaced.

1. You have been assigned the task of developing a strategic plan for your organization. As an initial step, you have decided to develop an organizational profile. What is an organizational profile? What should the process be to develop the profile? What information will you include, and where will you get your information? How will you utilize the information?  

2. As the leader who has responsibility for moving the organization ahead, you have been assigned the task of developing the vision for the future. How would you do this? Who would be included in the process? What criteria will you use to select members for the committee? What type of training would you need to ensure the team is the most effective possible? 

Part 2 – Provide 10 concepts, issues, philosophies, or practices in the areas of strategic planning and management that you can utilize in your workplace. Name the aspect, describe it, and explain the implication for your workplace. This does not have to be in essay form but can be in bullet form. 

      This assignment consists of two (2) sections: a business requirements  doc

      This assignment consists of two (2) sections: a business requirements  document and a project plan. You must submit both sections as separate  files for the completion of this assignment. Label each file name  according to the section of the assignment it is written for.  Additionally, you may create and / or assume all necessary assumptions  needed for the completion of this assignment.    Procuring  quality business requirements is an important step toward the design of  quality information systems. Completion of a quality requirements  document allows user needs and expectations to be captured, so that  infrastructure and information systems can be designed properly. Your  company, which is a data-collection and analysis company that has been  operating less than two (2) years, is seeking to create a repository for  collected data beyond standard relational databases. Your ten (10)  terabyte data warehouse is expected to grow by 20% each year. You are  mindful of data warehousing best practices which will aid you immensely  in your requirements gathering effort. Using the requirements document  provided in the course shell, you are to speculate on the needs of the  company. You must consider current and future requirements; however,  assumptions should be realistic and carefully considered.       Section 1: Business Requirements Document  

Write  a four to six (4-6) page original business requirements document for  the project plan using the template provided. Note: The template is  provided under the Additional Resources in the Student Center tab of the  online course shell. 

Describe the project including the following:  

Describe and define the scope of the project.
Speculate as to how to control the scope.
Identify possible risks, constraints, and assumptions.
Describe  the relationship and integration between systems and infrastructure.  Note: Database and Data Warehousing, Analytics, Interfaces and Cloud  Technology, and Infrastructure and Security should be considered.
Speculate upon potential outsourcing or offshoring needs.
Identify and justify the necessary resources including staffing that are necessary.
Define relevant terms that will be used throughout project.

Use  at least two (2) quality resources in this assignment. Note: Wikipedia  and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:  

Be  typed, double spaced, using Times New Roman font (size 12), with  one-inch margins on all sides; citations and references must follow APA  or school-specific format. Check with your professor for any additional  instructions.
Include a cover page containing the title of the  assignment, the student’s name, the professor’s name, the course title,  and the date. The cover page and the reference page are not included in  the required assignment page length.

Section 2: Revised Project Plan    Use Microsoft Project to:  

Update  the project plan from Project Deliverable 1: Project Plan Inception,  with three to five (3-5) new project tasks each consisting of five to  ten (5-10) sub-tasks.

The specific course learning outcomes associated with this assignment are:  

Evaluate  an organization through the lens of non-IT senior management in  deciding how information systems enable core and supportive business  processes as well as those that interface with suppliers and customers.

Use technology and information resources to research issues in information systems.

Write  clearly and concisely about strategic issues and practices in the  information systems domain using proper writing mechanics and technical  style conventions.

Examine data to analyze independent and dependent variables, determine how they are measured, and decipher whether a social change question can be answered and the implications for such change.

  
DUE 9/3/      8  P.M EST
BE ON TIME!!!
Know SPSS

SPSS is a statistical software program that allows you to enter these variables into a spreadsheet format and record the measurements from a sample. Additionally, SPSS allows you to perform statistical analysis. Before launching into your analyses, though, it is important to understand how the variables are measured. That understanding will help you interpret the SPSS output.
You considered topics with social change implications. For this Assignment, you will examine data to analyze independent and dependent variables, determine how they are measured, and decipher whether a social change question can be answered and the implications for such change.

Using the SPSS software, open  the High School Longitudinal Study dataset (ATTACHED)
For this Assignment:
Write a 1-page summary and include the following: USE SUBHEADING WHEN ANSWERING THE QUESTIONS IN PAPER

1)A      description of what the each of the variables measure.
2)A      description of the unit of analysis.
3)A      description and explanation of the levels of measurement for each variable      (i.e., nominal, ordinal, interval, ratio).
4)Explain      how you might conceive these variables to be used to answer a social      change question. What might be the implications for social change?

Support your summary using appropriate scholarly citations and references. Use proper APA format. 

Overview of the organization that will be delivered to senior management, defining the business goals and objectives and the size, layout, and structure of the organization.

 
Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center. 
Instructors, training on how to grade is within the Instructor Center.

Term Paper: Disaster Recovery Plan
Due Week 10 and worth 200 points

This assignment consists of two (2) parts: a written paper and a PowerPoint presentation. You must submit both parts as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

In recent years, organizations have witnessed the impact of having effective and non-effective business continuity plans and disaster recovery plans.  In today’s environment, with significant potential natural disasters, terrorist threats, and other man-made threats, it is critical that organizations develop effective business continuity plans and disaster recovery plans. Select an organization that you are familiar with, such as where you currently or previously have worked, contact a local organization, or search on the Internet for the needed detail of an organization you are interested in. Prepare a disaster recovery plan policy for that organization.

Part 1: Written Paper1.
1. Write a six to eight (6-8) page paper in which you:
a. Provide an overview of the organization that will be delivered to senior management, defining the business goals and objectives and the size, layout, and structure of the organization.
b. Include a diagram of the organization’s network architecture and the proposed network architecture of an alternate computing facility in the event of a disaster (or the actual network architecture of the alternate computing facility if one already exists) through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
c. Develop the DRP Policy, including:
i. Disaster declaration
ii. Assessment of security
iii. Potential disaster scenarios and methods of dealing with the disaster
iv. Disaster recovery procedures
d. Develop an Incident Response Team (IRT) charter, which includes the following sections:
i. Executive summary
ii. Mission statement
iii. Incident declaration
iv. Organizational structure
v. Roles and responsibilities
vi. Information flow and methods of communication
vii. Methods and services provided by the IRT
viii. Authority and reporting procedures
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

Part 2: PowerPoint PresentationUse Microsoft PowerPoint to:2. Create a twelve to fourteen (12-14) slide presentation that will be presented to the agency’s management, in which you:
a. Summarize the elements of the DRP Policy and IRT Charter, covering the main elements from Steps 3 and 4 above. b. Include an introduction and conclusion slide.
The specific course learning outcomes associated with this assignment are:

Describe the different ISS policies associated with risk management.
Compare and contrast the different ISS policies associated with incident response teams (IRT).
Use technology and information resources to research issues in security strategy and policy formation.
Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions.

Click here to view the grading rubric for this assignment.

Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure the site is always available.

 
Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Term Paper: Website Migration Project
Due Week 10 and worth 200 points Tony’s Chips has recently been sold to a new independent company. The new company has hired you to manage a project that will move the old Website from an externally hosted solution to an internal one. The company’s leadership is very concerned about redundancy for their site, insisting that a back-up site be available as a failover in case the main site goes down. In addition, they want the site redesigned to allow customers to order products online.

As part of your job, you must complete a 10-to-15 page paper that follows this project through the system development life cycle (SDLC). This assignment will require you to do the following:

Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure the site is always available.

The Web architecture should describe and justify operating system choices (i.e., Linux, Apache, MYSQL, PHP, Windows, IIS, SQL, etc.).

Evaluate alternatives to the company self-hosting the site.
Build a Gantt chart using Microsoft Project or equivalent software, showing all tasks associated with implementing the Website.
The chart should include a minimum of five (5) tasks, each with three (3) sub-tasks.
Explain and justify the system architecture you have selected.
Illustrate the system architecture using Visio or equivalent software.
Create a use case that documents the event of a customer ordering a bag of chips from the new Website.
The use case should include a graphical representation using Visio or equivalent software and a text description of the events.
Discuss the support operations that the internally hosted Website will require after implementation.
Explain how you will evaluate the performance of the new site and the success of your project.

The specific Course Learning Outcomes associated with this assignment are:

Design high-level logical system characteristics (user interface design, design of data, and information requirements).
Use contemporary CASE tools in process and data modeling.
Use technology and information resources to research issues in systems analysis and development.
Write clearly and concisely about Systems Analysis and Development topics using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric. Click here to view the grading rubric..