CIS 500 Complete Class Assignments, Case Studies and Term Paper - A Graded Work
Follow the link below to purchase all the assignments, case studies and term papers.
http://researcherclub.com/product.php?id_product=205
Presiding Officer Training module 2024 lok sabha elections
Cis 500
1. CIS 500 Complete Class Assignments, Case Studies and Term Paper - A Graded Work
Follow the link below to purchase all the assignments, case studies and term papers.
http://researcherclub.com/product.php?id_product=205
You can send us an email at: researcherclub@live.com in case you also need custom papers
for this course or any other Strayer University course
CIS 500
Information Systems for Decision Making
Strayer University
Predictive Policing
4G Wireless Network
Mobile Computing and Social Networking
Data Mining
The Big Data Challenges
Cloud Computing
Mobile Computing and Social Networks
CIS 500
Information Systems for Decision Making
Strayer University
Assignment 1 Predictive Policing
2. In 1994, the New York City Police Department adopted a law enforcement crime
fighting strategy known as COMPSTAT (COMPuterSTATistics). COMPSTAT uses Geographic
Information Systems (GIS) to map the locations of where crimes occur, identify “hotspots”, and
map problem areas. COMPSTAT has amassed a wealth of historical crime data. Mathematicians
have designed and developed algorithms that run against the historical data to predict future
crimes for police departments. This is known as predictive policing. Predictive policing has led
to a drop in burglaries, automobile thefts, and other crimes in some cities.
Write a four to five (45) page paper in which you
1. Compare and contrast the application of information technology (IT) to optimize police
departments‟ performance to reduce crime versus random patrols of the streets.
2. Describe how COMPSTAT, as an information system (IS), implements the four (4) basic IS
functions
1. Input
2. Processing
3. Output
4. Feedback
5. Determine how information systems have allowed police departments that implement tools
such as COMPSTAT to respond to crime faster.
6. Apply the strengths, weaknesses, opportunities, and threats analysis (SWOT analysis) on
behalf of police departments that intend to implement predictive policing.
7. Use at least three (3) quality resources in this assignment. Note Wikipedia and
similar Websites do not qualify as quality resources. You may use the resources above or
others of your choosing.
Assignment 2 4G Wireless Networks
The 3rd Generation Partnership Project (3GPP) developed the 3GPP LongTerm Evolution
(LTE) standard for wireless communications technology. It is regarded as an evolution of
the Global System for Mobile Communication (GSM), the Universal Mobile
Telecommunications Systems (UMTS), and other standards. It is also known as the 4G LTE. The
competition among the carriers to support 4G LTE networks has been very fierce as evidenced
by TV commercials targeting smartphone users. Many smartphones run on 3G networks.
Write a four to five (45) page paper in which you
1. Compare and contrast 3G wireless networks to 4G networks in terms of
1. Services and applications
2. Network architecture
3. Data throughput
4. User perceptions
5. Distinguish between the 4G LTE, 4G WiMax, and 4G WiBro networks based on
1. Upload and download speeds
2. User perceptions
3. Backward compatibility
3. 4. Service availability
6. Identify why the competition between the 4G LTE carriers has been so fierce and describe the
benefits of this competition to the subscribers.
7. In January 2012, Verizon stated that 4G LTE is available in 190 cities covering 200 million
American subscribers. According to AT&T‟s Website, they had plans for covering 20 million
Americans in 15 markets by end of 2011. Conclude why Verizon is able to cover more
markets than AT&T.
8. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar
Websites do not qualify as quality resources. You may use the resources above or others of
your choosing.
Assignment 3 Mobile Computing and Social Networking
Mobile computing has dramatically changed how information is accessed and shared. Wireless
networking has been an enabler of mobile computing. One profession that mobile computing has
had a big impact on is health care management. Patients are now able to monitor their vital signs
such as blood pressure, glucose levels, etc. without having to periodically visit a doctor‟s office
or hospital. There are devices such as the Withings Blood Pressure Monitor that works with
an iPhone, iPod Touch, or iPad to record, track, and graph a patient‟s blood pressure. There are
other devices that can measure blood glucose levels, oxygen levels, heart rate, etc. and use an
iPhone to send the results to a clinical server. Doctors and caregivers are then able to access the
data on the clinical server.
According to the American College of Gastroenterology, social networking sites like Facebook,
Twitter, and YouTube are used as powerful platforms to deliver and receive health care
information. Patients and caregivers are increasingly going online to connect and share
experiences with others with similar medical issues or concerns Patients are able to take
advantage of social networks to do more than just share pictures and tweets.
Write a four to five (45) page paper in which you
1. Compare and contrast monitoring of patient vital signs using mobile computing technology to
inpatient visits to the doctor‟s office or hospital.
2. Analyze the advantages and disadvantages of using mobile computing technology to monitor
patients.
3. Assess the security concerns with regard to the transmission of personal medical information
over wireless networks.
4. Assess the use of social networking for group support for patients with similar medical
concerns.
5. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites
do not qualify as quality resources.
Assignment 4 Data Mining
4. The development of complex algorithms that can mine mounds of data that have been collected
from people and digital devices have led to the adoption of data mining by most businesses as a
means of understanding their customers better than before. Data mining takes place in retailing
and sales, banking, education, manufacturing and production, health care, insurance,
broadcasting, marketing, customer services, and a number of other areas. The analytical
information gathered by datamining applications has given some businesses a competitive
advantage, an ability to make informed decisions, and better ways to predict the behavior of
customers.
Write a four to five (45) page paper in which you
1. Determine the benefits of data mining to the businesses when employing
1. Predictive analytics to understand the behavior of customers
2. Associations discovery in products sold to customers
3. Web mining to discover business intelligence from Web customers
4. Clustering to find related customer information
2. Assess the reliability of the data mining algorithms. Decide if they can be trusted and predict
the errors they are likely to produce.
3. Analyze privacy concerns raised by the collection of personal data for mining purposes.
4. Choose and describe three (3) concerns raised by consumers.
5. Decide if each of these concerns is valid and explain your decision for each.
6. Describe how each concern is being allayed.
7. Provide at least three (3) examples where businesses have used predictive analysis to gain a
competitive advantage and evaluate the effectiveness of each business‟s strategy.
8. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites
do not qualify as quality resources.
Case Study 1 The Big Data Challenges
Big Data is a term used to describe the voluminous amount of structured and semistructured data
generated by companies. The term is used when referring to petabytes (PB), exabytes (EB), and
zettabytes (ZB) of data. Companies face challenges when it comes to capturing, storing,
searching, and analyzingBig Data. The Volvo Car Corporation faced this problem because of the
massive amount of data it was streaming from its vehicles.
Download and study the Volvo Car Corporation case study titled, “Converting data into business
value at Volvo”, located
athttp//www.icio.com/__data/assets/pdf_file/0004/8833/icio_Case_Study_Volvo.pdf.
Write a two to four (24) page paper in which you
1. Judge how Volvo Car Corporation integrated the cloud infrastructure into its networks.
2. Explain how Volvo Car Corporation transforms data into knowledge.
3. Identify the realtime information systems implemented and evaluate the impact of these
implementations.
5. 4. Argue how the Big Data strategy gives Volvo Car Corporation a competitive advantage.
5. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements
Be typed, double spaced, using Times New Roman font (size 12), with oneinch margins on all
sides; citations and references must follow APA or schoolspecific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the student‟s name, the professor‟s
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.
Case Study 2 Cloud Computing
Cloud computing is defined by Cearly and Phifer in their case study titled “Case Studies in
Cloud Computing” as “a style of computing in which scalable and elastic ITrelated capabilities
are provided „as a service‟ to customers using Internet technologies”. Cloud computing services
had been provided by major vendors such as Google, Amazon, Microsoft, IBM, HewlettPackard,
and others for business computing until recently when Apple Corporation announced iCloud for
consumers. Therefore, cloud computing is now available for businesses as well as consumers.
Read the case study titled, “Ericsson”, located
athttp//aws.amazon.com/solutions/casestudies/ericsson/, about Ericsson cloud computing.
Write a two to four (2-4) page paper in which you
1. Assess how Ericsson benefitted from Amazon Web Services (AWS) in terms of cost reduction,
automated software updates, remote access, and ondemand availability.
2. Evaluate the scalability, dependability, manageability, and adaptability of Amazon Elastic
Compute Cloud (Amazon EC2), Amazon Simple Storage Services (Amazon S3), and
RightScale.
3. Examine the security concerns for cloudbased services and make suggestions to cope with
these concerns.
4. Assess possible scalability, reliability, and cost issues associated with cloud computing, and
make suggestions to overcome each of these issues.
5. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements
Be typed, double spaced, using Times New Roman font (size 12), with oneinch margins on all
sides; citations and references must follow APA or schoolspecific format. Check with your
professor for any additional instructions.
6. Include a cover page containing the title of the assignment, the student‟s name, the professor‟s
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.
Term Paper Mobile Computing and Social Networks
There are thousands of iPhone Apps, iPad Apps, and Android Apps that have been developed to
perform a myriad of tasks and processes. Initially, most of these applications were games
intended to be played on mobile devices. The popularity of these applications led businesses to
ponder whether some of their business process applications that run on desktop platforms and the
Web could be redesigned to run on mobile devices. The answer was a resounding yes!
For example, Nationwide developed the Nationwide® Mobile, a free iPhone App that allows its
insurance policyholders to file a claim on the spot when an accident occurs. The application can
snap pictures of the accident and attach them to the claim data and upload the claim information
to a server. This reduces the length of time to process a claim filed this way. Nationwide
competitors have followed suit and developed iPhone, iPad, and Android applications of their
own. Policyholders can receive messages via Facebook or Twitter.
Other business processes that have been reengineered as a result of mobile computing include
Quick Response (QR) codes which have replaced onedimensional bar codes. They are read using
mobile devices, accepting credit card payments from an iPhone, iPad or Android device,
depositing checks using an iPhone without visiting a bank, and many more.
Write a ten to fifteen (1015) page term paper in which you
1. Assess the effectiveness and efficiency mobilebased applications provide to capture
geolocation data and customer data, and quickly upload to a processing server without users
having to use a desktop system.
2. Evaluate benefits realized by consumers because of the ability to gain access to their own data
via mobile applications.
3. Examine the challenges of developing applications that run on mobile devices because of the
small screen size.
4. Describe the methods that can be used to decide which platform to support, i.e., iPhone, iPad,
Windows Phone, or Android.
5. Mobile applications require high availability because end users need to have continuous access
to IT and IS systems. Discuss ways of providing high availability.
6. Mobile devices are subjected to hacking at a higher rate than nonmobile devices. Discuss
methods of making mobile devices more secure.
7. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites
do not qualify as quality resources.