SlideShare a Scribd company logo
1 of 6
CIS 500 Complete Class Assignments, Case Studies and Term Paper - A Graded Work
Follow the link below to purchase all the assignments, case studies and term papers.
http://researcherclub.com/product.php?id_product=205
You can send us an email at: researcherclub@live.com in case you also need custom papers
for this course or any other Strayer University course
CIS 500
Information Systems for Decision Making
Strayer University
Predictive Policing
4G Wireless Network
Mobile Computing and Social Networking
Data Mining
The Big Data Challenges
Cloud Computing
Mobile Computing and Social Networks
CIS 500
Information Systems for Decision Making
Strayer University
Assignment 1 Predictive Policing
In 1994, the New York City Police Department adopted a law enforcement crime
fighting strategy known as COMPSTAT (COMPuterSTATistics). COMPSTAT uses Geographic
Information Systems (GIS) to map the locations of where crimes occur, identify “hotspots”, and
map problem areas. COMPSTAT has amassed a wealth of historical crime data. Mathematicians
have designed and developed algorithms that run against the historical data to predict future
crimes for police departments. This is known as predictive policing. Predictive policing has led
to a drop in burglaries, automobile thefts, and other crimes in some cities.
Write a four to five (45) page paper in which you
1. Compare and contrast the application of information technology (IT) to optimize police
departments‟ performance to reduce crime versus random patrols of the streets.
2. Describe how COMPSTAT, as an information system (IS), implements the four (4) basic IS
functions
1. Input
2. Processing
3. Output
4. Feedback
5. Determine how information systems have allowed police departments that implement tools
such as COMPSTAT to respond to crime faster.
6. Apply the strengths, weaknesses, opportunities, and threats analysis (SWOT analysis) on
behalf of police departments that intend to implement predictive policing.
7. Use at least three (3) quality resources in this assignment. Note Wikipedia and
similar Websites do not qualify as quality resources. You may use the resources above or
others of your choosing.
Assignment 2 4G Wireless Networks
The 3rd Generation Partnership Project (3GPP) developed the 3GPP LongTerm Evolution
(LTE) standard for wireless communications technology. It is regarded as an evolution of
the Global System for Mobile Communication (GSM), the Universal Mobile
Telecommunications Systems (UMTS), and other standards. It is also known as the 4G LTE. The
competition among the carriers to support 4G LTE networks has been very fierce as evidenced
by TV commercials targeting smartphone users. Many smartphones run on 3G networks.
Write a four to five (45) page paper in which you
1. Compare and contrast 3G wireless networks to 4G networks in terms of
1. Services and applications
2. Network architecture
3. Data throughput
4. User perceptions
5. Distinguish between the 4G LTE, 4G WiMax, and 4G WiBro networks based on
1. Upload and download speeds
2. User perceptions
3. Backward compatibility
4. Service availability
6. Identify why the competition between the 4G LTE carriers has been so fierce and describe the
benefits of this competition to the subscribers.
7. In January 2012, Verizon stated that 4G LTE is available in 190 cities covering 200 million
American subscribers. According to AT&T‟s Website, they had plans for covering 20 million
Americans in 15 markets by end of 2011. Conclude why Verizon is able to cover more
markets than AT&T.
8. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar
Websites do not qualify as quality resources. You may use the resources above or others of
your choosing.
Assignment 3 Mobile Computing and Social Networking
Mobile computing has dramatically changed how information is accessed and shared. Wireless
networking has been an enabler of mobile computing. One profession that mobile computing has
had a big impact on is health care management. Patients are now able to monitor their vital signs
such as blood pressure, glucose levels, etc. without having to periodically visit a doctor‟s office
or hospital. There are devices such as the Withings Blood Pressure Monitor that works with
an iPhone, iPod Touch, or iPad to record, track, and graph a patient‟s blood pressure. There are
other devices that can measure blood glucose levels, oxygen levels, heart rate, etc. and use an
iPhone to send the results to a clinical server. Doctors and caregivers are then able to access the
data on the clinical server.
According to the American College of Gastroenterology, social networking sites like Facebook,
Twitter, and YouTube are used as powerful platforms to deliver and receive health care
information. Patients and caregivers are increasingly going online to connect and share
experiences with others with similar medical issues or concerns Patients are able to take
advantage of social networks to do more than just share pictures and tweets.
Write a four to five (45) page paper in which you
1. Compare and contrast monitoring of patient vital signs using mobile computing technology to
inpatient visits to the doctor‟s office or hospital.
2. Analyze the advantages and disadvantages of using mobile computing technology to monitor
patients.
3. Assess the security concerns with regard to the transmission of personal medical information
over wireless networks.
4. Assess the use of social networking for group support for patients with similar medical
concerns.
5. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites
do not qualify as quality resources.
Assignment 4 Data Mining
The development of complex algorithms that can mine mounds of data that have been collected
from people and digital devices have led to the adoption of data mining by most businesses as a
means of understanding their customers better than before. Data mining takes place in retailing
and sales, banking, education, manufacturing and production, health care, insurance,
broadcasting, marketing, customer services, and a number of other areas. The analytical
information gathered by datamining applications has given some businesses a competitive
advantage, an ability to make informed decisions, and better ways to predict the behavior of
customers.
Write a four to five (45) page paper in which you
1. Determine the benefits of data mining to the businesses when employing
1. Predictive analytics to understand the behavior of customers
2. Associations discovery in products sold to customers
3. Web mining to discover business intelligence from Web customers
4. Clustering to find related customer information
2. Assess the reliability of the data mining algorithms. Decide if they can be trusted and predict
the errors they are likely to produce.
3. Analyze privacy concerns raised by the collection of personal data for mining purposes.
4. Choose and describe three (3) concerns raised by consumers.
5. Decide if each of these concerns is valid and explain your decision for each.
6. Describe how each concern is being allayed.
7. Provide at least three (3) examples where businesses have used predictive analysis to gain a
competitive advantage and evaluate the effectiveness of each business‟s strategy.
8. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites
do not qualify as quality resources.
Case Study 1 The Big Data Challenges
Big Data is a term used to describe the voluminous amount of structured and semistructured data
generated by companies. The term is used when referring to petabytes (PB), exabytes (EB), and
zettabytes (ZB) of data. Companies face challenges when it comes to capturing, storing,
searching, and analyzingBig Data. The Volvo Car Corporation faced this problem because of the
massive amount of data it was streaming from its vehicles.
Download and study the Volvo Car Corporation case study titled, “Converting data into business
value at Volvo”, located
athttp//www.icio.com/__data/assets/pdf_file/0004/8833/icio_Case_Study_Volvo.pdf.
Write a two to four (24) page paper in which you
1. Judge how Volvo Car Corporation integrated the cloud infrastructure into its networks.
2. Explain how Volvo Car Corporation transforms data into knowledge.
3. Identify the realtime information systems implemented and evaluate the impact of these
implementations.
4. Argue how the Big Data strategy gives Volvo Car Corporation a competitive advantage.
5. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements
 Be typed, double spaced, using Times New Roman font (size 12), with oneinch margins on all
sides; citations and references must follow APA or schoolspecific format. Check with your
professor for any additional instructions.
 Include a cover page containing the title of the assignment, the student‟s name, the professor‟s
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.
Case Study 2 Cloud Computing
Cloud computing is defined by Cearly and Phifer in their case study titled “Case Studies in
Cloud Computing” as “a style of computing in which scalable and elastic ITrelated capabilities
are provided „as a service‟ to customers using Internet technologies”. Cloud computing services
had been provided by major vendors such as Google, Amazon, Microsoft, IBM, HewlettPackard,
and others for business computing until recently when Apple Corporation announced iCloud for
consumers. Therefore, cloud computing is now available for businesses as well as consumers.
Read the case study titled, “Ericsson”, located
athttp//aws.amazon.com/solutions/casestudies/ericsson/, about Ericsson cloud computing.
Write a two to four (2-4) page paper in which you
1. Assess how Ericsson benefitted from Amazon Web Services (AWS) in terms of cost reduction,
automated software updates, remote access, and ondemand availability.
2. Evaluate the scalability, dependability, manageability, and adaptability of Amazon Elastic
Compute Cloud (Amazon EC2), Amazon Simple Storage Services (Amazon S3), and
RightScale.
3. Examine the security concerns for cloudbased services and make suggestions to cope with
these concerns.
4. Assess possible scalability, reliability, and cost issues associated with cloud computing, and
make suggestions to overcome each of these issues.
5. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites
do not qualify as quality resources.
Your assignment must follow these formatting requirements
 Be typed, double spaced, using Times New Roman font (size 12), with oneinch margins on all
sides; citations and references must follow APA or schoolspecific format. Check with your
professor for any additional instructions.
 Include a cover page containing the title of the assignment, the student‟s name, the professor‟s
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.
Term Paper Mobile Computing and Social Networks
There are thousands of iPhone Apps, iPad Apps, and Android Apps that have been developed to
perform a myriad of tasks and processes. Initially, most of these applications were games
intended to be played on mobile devices. The popularity of these applications led businesses to
ponder whether some of their business process applications that run on desktop platforms and the
Web could be redesigned to run on mobile devices. The answer was a resounding yes!
For example, Nationwide developed the Nationwide® Mobile, a free iPhone App that allows its
insurance policyholders to file a claim on the spot when an accident occurs. The application can
snap pictures of the accident and attach them to the claim data and upload the claim information
to a server. This reduces the length of time to process a claim filed this way. Nationwide
competitors have followed suit and developed iPhone, iPad, and Android applications of their
own. Policyholders can receive messages via Facebook or Twitter.
Other business processes that have been reengineered as a result of mobile computing include
Quick Response (QR) codes which have replaced onedimensional bar codes. They are read using
mobile devices, accepting credit card payments from an iPhone, iPad or Android device,
depositing checks using an iPhone without visiting a bank, and many more.
Write a ten to fifteen (1015) page term paper in which you
1. Assess the effectiveness and efficiency mobilebased applications provide to capture
geolocation data and customer data, and quickly upload to a processing server without users
having to use a desktop system.
2. Evaluate benefits realized by consumers because of the ability to gain access to their own data
via mobile applications.
3. Examine the challenges of developing applications that run on mobile devices because of the
small screen size.
4. Describe the methods that can be used to decide which platform to support, i.e., iPhone, iPad,
Windows Phone, or Android.
5. Mobile applications require high availability because end users need to have continuous access
to IT and IS systems. Discuss ways of providing high availability.
6. Mobile devices are subjected to hacking at a higher rate than nonmobile devices. Discuss
methods of making mobile devices more secure.
7. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites
do not qualify as quality resources.

More Related Content

What's hot

Big Data: Review, Classification and Analysis Survey
Big Data: Review, Classification and Analysis  SurveyBig Data: Review, Classification and Analysis  Survey
Big Data: Review, Classification and Analysis SurveyAM Publications,India
 
hariri2019.pdf
hariri2019.pdfhariri2019.pdf
hariri2019.pdfAkuhuruf
 
Towards enrichment of the open government data: a stakeholder-centered determ...
Towards enrichment of the open government data: a stakeholder-centered determ...Towards enrichment of the open government data: a stakeholder-centered determ...
Towards enrichment of the open government data: a stakeholder-centered determ...Anastasija Nikiforova
 
NIC Linked Data: the OHIO project
NIC Linked Data:   the OHIO projectNIC Linked Data:   the OHIO project
NIC Linked Data: the OHIO projectMichael Wilkinson
 
Hadoop and Big Data Readiness in Africa: A Case of Tanzania
Hadoop and Big Data Readiness in Africa: A Case of TanzaniaHadoop and Big Data Readiness in Africa: A Case of Tanzania
Hadoop and Big Data Readiness in Africa: A Case of Tanzaniaijsrd.com
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkparry prabhu
 
Using Ontology to Capture Supply Chain Code Halos
Using Ontology to Capture Supply Chain Code HalosUsing Ontology to Capture Supply Chain Code Halos
Using Ontology to Capture Supply Chain Code HalosCognizant
 
IRJET- Consumer Complaint Data Analysis
IRJET-  	  Consumer Complaint Data AnalysisIRJET-  	  Consumer Complaint Data Analysis
IRJET- Consumer Complaint Data AnalysisIRJET Journal
 
IRJET - Big Data Analysis its Challenges
IRJET - Big Data Analysis its ChallengesIRJET - Big Data Analysis its Challenges
IRJET - Big Data Analysis its ChallengesIRJET Journal
 
IoTSE-based Open Database Vulnerability inspection in three Baltic Countries:...
IoTSE-based Open Database Vulnerability inspection in three Baltic Countries:...IoTSE-based Open Database Vulnerability inspection in three Baltic Countries:...
IoTSE-based Open Database Vulnerability inspection in three Baltic Countries:...Anastasija Nikiforova
 
Intelligent Information Agent
Intelligent Information AgentIntelligent Information Agent
Intelligent Information AgentShuvra Ghosh
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A SurveyIRJET Journal
 
Invited talk "Open Data as a driver of Society 5.0: how you and your scientif...
Invited talk "Open Data as a driver of Society 5.0: how you and your scientif...Invited talk "Open Data as a driver of Society 5.0: how you and your scientif...
Invited talk "Open Data as a driver of Society 5.0: how you and your scientif...Anastasija Nikiforova
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Onyebuchi nosiri
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Onyebuchi nosiri
 
Acclerating biomedical discovery with an internet of FAIR data and services -...
Acclerating biomedical discovery with an internet of FAIR data and services -...Acclerating biomedical discovery with an internet of FAIR data and services -...
Acclerating biomedical discovery with an internet of FAIR data and services -...Michel Dumontier
 
Data.gov.uk and data.gov
Data.gov.uk and data.govData.gov.uk and data.gov
Data.gov.uk and data.govleetomkins89
 
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...IJECEIAES
 

What's hot (19)

Big Data: Review, Classification and Analysis Survey
Big Data: Review, Classification and Analysis  SurveyBig Data: Review, Classification and Analysis  Survey
Big Data: Review, Classification and Analysis Survey
 
hariri2019.pdf
hariri2019.pdfhariri2019.pdf
hariri2019.pdf
 
Towards enrichment of the open government data: a stakeholder-centered determ...
Towards enrichment of the open government data: a stakeholder-centered determ...Towards enrichment of the open government data: a stakeholder-centered determ...
Towards enrichment of the open government data: a stakeholder-centered determ...
 
NIC Linked Data: the OHIO project
NIC Linked Data:   the OHIO projectNIC Linked Data:   the OHIO project
NIC Linked Data: the OHIO project
 
Hadoop and Big Data Readiness in Africa: A Case of Tanzania
Hadoop and Big Data Readiness in Africa: A Case of TanzaniaHadoop and Big Data Readiness in Africa: A Case of Tanzania
Hadoop and Big Data Readiness in Africa: A Case of Tanzania
 
Are we FAIR yet?
Are we FAIR yet?Are we FAIR yet?
Are we FAIR yet?
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Using Ontology to Capture Supply Chain Code Halos
Using Ontology to Capture Supply Chain Code HalosUsing Ontology to Capture Supply Chain Code Halos
Using Ontology to Capture Supply Chain Code Halos
 
IRJET- Consumer Complaint Data Analysis
IRJET-  	  Consumer Complaint Data AnalysisIRJET-  	  Consumer Complaint Data Analysis
IRJET- Consumer Complaint Data Analysis
 
IRJET - Big Data Analysis its Challenges
IRJET - Big Data Analysis its ChallengesIRJET - Big Data Analysis its Challenges
IRJET - Big Data Analysis its Challenges
 
IoTSE-based Open Database Vulnerability inspection in three Baltic Countries:...
IoTSE-based Open Database Vulnerability inspection in three Baltic Countries:...IoTSE-based Open Database Vulnerability inspection in three Baltic Countries:...
IoTSE-based Open Database Vulnerability inspection in three Baltic Countries:...
 
Intelligent Information Agent
Intelligent Information AgentIntelligent Information Agent
Intelligent Information Agent
 
IRJET - Fake News Detection: A Survey
IRJET -  	  Fake News Detection: A SurveyIRJET -  	  Fake News Detection: A Survey
IRJET - Fake News Detection: A Survey
 
Invited talk "Open Data as a driver of Society 5.0: how you and your scientif...
Invited talk "Open Data as a driver of Society 5.0: how you and your scientif...Invited talk "Open Data as a driver of Society 5.0: how you and your scientif...
Invited talk "Open Data as a driver of Society 5.0: how you and your scientif...
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
 
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...
 
Acclerating biomedical discovery with an internet of FAIR data and services -...
Acclerating biomedical discovery with an internet of FAIR data and services -...Acclerating biomedical discovery with an internet of FAIR data and services -...
Acclerating biomedical discovery with an internet of FAIR data and services -...
 
Data.gov.uk and data.gov
Data.gov.uk and data.govData.gov.uk and data.gov
Data.gov.uk and data.gov
 
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
 

Similar to Cis 500

Cis 500 Believe Possibilities / snaptutorial.com
Cis 500 Believe Possibilities / snaptutorial.comCis 500 Believe Possibilities / snaptutorial.com
Cis 500 Believe Possibilities / snaptutorial.comStokesCope11
 
Cloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the HospitalsCloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the Hospitalsijtsrd
 
CS309A Final Paper_KM_DD
CS309A Final Paper_KM_DDCS309A Final Paper_KM_DD
CS309A Final Paper_KM_DDDavid Darrough
 
The internet of things
The internet of thingsThe internet of things
The internet of thingsAdrian Yap
 
Stayer cis 500 assignment 2 4 g wireless networks
Stayer cis 500 assignment 2 4 g wireless networksStayer cis 500 assignment 2 4 g wireless networks
Stayer cis 500 assignment 2 4 g wireless networksshyaminfo30
 
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...IRJET Journal
 
Mis case study , Chapter 5, Chapter 6
Mis case study , Chapter 5, Chapter 6Mis case study , Chapter 5, Chapter 6
Mis case study , Chapter 5, Chapter 6Rakib Hasan
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentIRJET Journal
 
Big data – A Review
Big data – A ReviewBig data – A Review
Big data – A ReviewIRJET Journal
 
Internet of things
Internet of thingsInternet of things
Internet of thingsmmaslo
 
Internet of things
Internet of thingsInternet of things
Internet of thingsAmol Pawar
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceElla Mae Ayen
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerceellamee27
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESijcsit
 
Big Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesBig Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesAIRCC Publishing Corporation
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
 
Survey on Cloud Based Services and its Security Analysis in the Healthcare Se...
Survey on Cloud Based Services and its Security Analysis in the Healthcare Se...Survey on Cloud Based Services and its Security Analysis in the Healthcare Se...
Survey on Cloud Based Services and its Security Analysis in the Healthcare Se...ijtsrd
 
Analytics solution
Analytics solutionAnalytics solution
Analytics solutioncamssguide
 
AUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUD
AUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUDAUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUD
AUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUDIndium Software
 

Similar to Cis 500 (20)

Ash cis 500 preview full class
Ash cis 500 preview full classAsh cis 500 preview full class
Ash cis 500 preview full class
 
Cis 500 Believe Possibilities / snaptutorial.com
Cis 500 Believe Possibilities / snaptutorial.comCis 500 Believe Possibilities / snaptutorial.com
Cis 500 Believe Possibilities / snaptutorial.com
 
Cloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the HospitalsCloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the Hospitals
 
CS309A Final Paper_KM_DD
CS309A Final Paper_KM_DDCS309A Final Paper_KM_DD
CS309A Final Paper_KM_DD
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Stayer cis 500 assignment 2 4 g wireless networks
Stayer cis 500 assignment 2 4 g wireless networksStayer cis 500 assignment 2 4 g wireless networks
Stayer cis 500 assignment 2 4 g wireless networks
 
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...
 
Mis case study , Chapter 5, Chapter 6
Mis case study , Chapter 5, Chapter 6Mis case study , Chapter 5, Chapter 6
Mis case study , Chapter 5, Chapter 6
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 
Big data – A Review
Big data – A ReviewBig data – A Review
Big data – A Review
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic Commerce
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
 
Big Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesBig Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and Opportunities
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 
Survey on Cloud Based Services and its Security Analysis in the Healthcare Se...
Survey on Cloud Based Services and its Security Analysis in the Healthcare Se...Survey on Cloud Based Services and its Security Analysis in the Healthcare Se...
Survey on Cloud Based Services and its Security Analysis in the Healthcare Se...
 
Analytics solution
Analytics solutionAnalytics solution
Analytics solution
 
AUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUD
AUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUDAUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUD
AUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUD
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

Cis 500

  • 1. CIS 500 Complete Class Assignments, Case Studies and Term Paper - A Graded Work Follow the link below to purchase all the assignments, case studies and term papers. http://researcherclub.com/product.php?id_product=205 You can send us an email at: researcherclub@live.com in case you also need custom papers for this course or any other Strayer University course CIS 500 Information Systems for Decision Making Strayer University Predictive Policing 4G Wireless Network Mobile Computing and Social Networking Data Mining The Big Data Challenges Cloud Computing Mobile Computing and Social Networks CIS 500 Information Systems for Decision Making Strayer University Assignment 1 Predictive Policing
  • 2. In 1994, the New York City Police Department adopted a law enforcement crime fighting strategy known as COMPSTAT (COMPuterSTATistics). COMPSTAT uses Geographic Information Systems (GIS) to map the locations of where crimes occur, identify “hotspots”, and map problem areas. COMPSTAT has amassed a wealth of historical crime data. Mathematicians have designed and developed algorithms that run against the historical data to predict future crimes for police departments. This is known as predictive policing. Predictive policing has led to a drop in burglaries, automobile thefts, and other crimes in some cities. Write a four to five (45) page paper in which you 1. Compare and contrast the application of information technology (IT) to optimize police departments‟ performance to reduce crime versus random patrols of the streets. 2. Describe how COMPSTAT, as an information system (IS), implements the four (4) basic IS functions 1. Input 2. Processing 3. Output 4. Feedback 5. Determine how information systems have allowed police departments that implement tools such as COMPSTAT to respond to crime faster. 6. Apply the strengths, weaknesses, opportunities, and threats analysis (SWOT analysis) on behalf of police departments that intend to implement predictive policing. 7. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites do not qualify as quality resources. You may use the resources above or others of your choosing. Assignment 2 4G Wireless Networks The 3rd Generation Partnership Project (3GPP) developed the 3GPP LongTerm Evolution (LTE) standard for wireless communications technology. It is regarded as an evolution of the Global System for Mobile Communication (GSM), the Universal Mobile Telecommunications Systems (UMTS), and other standards. It is also known as the 4G LTE. The competition among the carriers to support 4G LTE networks has been very fierce as evidenced by TV commercials targeting smartphone users. Many smartphones run on 3G networks. Write a four to five (45) page paper in which you 1. Compare and contrast 3G wireless networks to 4G networks in terms of 1. Services and applications 2. Network architecture 3. Data throughput 4. User perceptions 5. Distinguish between the 4G LTE, 4G WiMax, and 4G WiBro networks based on 1. Upload and download speeds 2. User perceptions 3. Backward compatibility
  • 3. 4. Service availability 6. Identify why the competition between the 4G LTE carriers has been so fierce and describe the benefits of this competition to the subscribers. 7. In January 2012, Verizon stated that 4G LTE is available in 190 cities covering 200 million American subscribers. According to AT&T‟s Website, they had plans for covering 20 million Americans in 15 markets by end of 2011. Conclude why Verizon is able to cover more markets than AT&T. 8. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites do not qualify as quality resources. You may use the resources above or others of your choosing. Assignment 3 Mobile Computing and Social Networking Mobile computing has dramatically changed how information is accessed and shared. Wireless networking has been an enabler of mobile computing. One profession that mobile computing has had a big impact on is health care management. Patients are now able to monitor their vital signs such as blood pressure, glucose levels, etc. without having to periodically visit a doctor‟s office or hospital. There are devices such as the Withings Blood Pressure Monitor that works with an iPhone, iPod Touch, or iPad to record, track, and graph a patient‟s blood pressure. There are other devices that can measure blood glucose levels, oxygen levels, heart rate, etc. and use an iPhone to send the results to a clinical server. Doctors and caregivers are then able to access the data on the clinical server. According to the American College of Gastroenterology, social networking sites like Facebook, Twitter, and YouTube are used as powerful platforms to deliver and receive health care information. Patients and caregivers are increasingly going online to connect and share experiences with others with similar medical issues or concerns Patients are able to take advantage of social networks to do more than just share pictures and tweets. Write a four to five (45) page paper in which you 1. Compare and contrast monitoring of patient vital signs using mobile computing technology to inpatient visits to the doctor‟s office or hospital. 2. Analyze the advantages and disadvantages of using mobile computing technology to monitor patients. 3. Assess the security concerns with regard to the transmission of personal medical information over wireless networks. 4. Assess the use of social networking for group support for patients with similar medical concerns. 5. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites do not qualify as quality resources. Assignment 4 Data Mining
  • 4. The development of complex algorithms that can mine mounds of data that have been collected from people and digital devices have led to the adoption of data mining by most businesses as a means of understanding their customers better than before. Data mining takes place in retailing and sales, banking, education, manufacturing and production, health care, insurance, broadcasting, marketing, customer services, and a number of other areas. The analytical information gathered by datamining applications has given some businesses a competitive advantage, an ability to make informed decisions, and better ways to predict the behavior of customers. Write a four to five (45) page paper in which you 1. Determine the benefits of data mining to the businesses when employing 1. Predictive analytics to understand the behavior of customers 2. Associations discovery in products sold to customers 3. Web mining to discover business intelligence from Web customers 4. Clustering to find related customer information 2. Assess the reliability of the data mining algorithms. Decide if they can be trusted and predict the errors they are likely to produce. 3. Analyze privacy concerns raised by the collection of personal data for mining purposes. 4. Choose and describe three (3) concerns raised by consumers. 5. Decide if each of these concerns is valid and explain your decision for each. 6. Describe how each concern is being allayed. 7. Provide at least three (3) examples where businesses have used predictive analysis to gain a competitive advantage and evaluate the effectiveness of each business‟s strategy. 8. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites do not qualify as quality resources. Case Study 1 The Big Data Challenges Big Data is a term used to describe the voluminous amount of structured and semistructured data generated by companies. The term is used when referring to petabytes (PB), exabytes (EB), and zettabytes (ZB) of data. Companies face challenges when it comes to capturing, storing, searching, and analyzingBig Data. The Volvo Car Corporation faced this problem because of the massive amount of data it was streaming from its vehicles. Download and study the Volvo Car Corporation case study titled, “Converting data into business value at Volvo”, located athttp//www.icio.com/__data/assets/pdf_file/0004/8833/icio_Case_Study_Volvo.pdf. Write a two to four (24) page paper in which you 1. Judge how Volvo Car Corporation integrated the cloud infrastructure into its networks. 2. Explain how Volvo Car Corporation transforms data into knowledge. 3. Identify the realtime information systems implemented and evaluate the impact of these implementations.
  • 5. 4. Argue how the Big Data strategy gives Volvo Car Corporation a competitive advantage. 5. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements  Be typed, double spaced, using Times New Roman font (size 12), with oneinch margins on all sides; citations and references must follow APA or schoolspecific format. Check with your professor for any additional instructions.  Include a cover page containing the title of the assignment, the student‟s name, the professor‟s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Case Study 2 Cloud Computing Cloud computing is defined by Cearly and Phifer in their case study titled “Case Studies in Cloud Computing” as “a style of computing in which scalable and elastic ITrelated capabilities are provided „as a service‟ to customers using Internet technologies”. Cloud computing services had been provided by major vendors such as Google, Amazon, Microsoft, IBM, HewlettPackard, and others for business computing until recently when Apple Corporation announced iCloud for consumers. Therefore, cloud computing is now available for businesses as well as consumers. Read the case study titled, “Ericsson”, located athttp//aws.amazon.com/solutions/casestudies/ericsson/, about Ericsson cloud computing. Write a two to four (2-4) page paper in which you 1. Assess how Ericsson benefitted from Amazon Web Services (AWS) in terms of cost reduction, automated software updates, remote access, and ondemand availability. 2. Evaluate the scalability, dependability, manageability, and adaptability of Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Services (Amazon S3), and RightScale. 3. Examine the security concerns for cloudbased services and make suggestions to cope with these concerns. 4. Assess possible scalability, reliability, and cost issues associated with cloud computing, and make suggestions to overcome each of these issues. 5. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements  Be typed, double spaced, using Times New Roman font (size 12), with oneinch margins on all sides; citations and references must follow APA or schoolspecific format. Check with your professor for any additional instructions.
  • 6.  Include a cover page containing the title of the assignment, the student‟s name, the professor‟s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Term Paper Mobile Computing and Social Networks There are thousands of iPhone Apps, iPad Apps, and Android Apps that have been developed to perform a myriad of tasks and processes. Initially, most of these applications were games intended to be played on mobile devices. The popularity of these applications led businesses to ponder whether some of their business process applications that run on desktop platforms and the Web could be redesigned to run on mobile devices. The answer was a resounding yes! For example, Nationwide developed the Nationwide® Mobile, a free iPhone App that allows its insurance policyholders to file a claim on the spot when an accident occurs. The application can snap pictures of the accident and attach them to the claim data and upload the claim information to a server. This reduces the length of time to process a claim filed this way. Nationwide competitors have followed suit and developed iPhone, iPad, and Android applications of their own. Policyholders can receive messages via Facebook or Twitter. Other business processes that have been reengineered as a result of mobile computing include Quick Response (QR) codes which have replaced onedimensional bar codes. They are read using mobile devices, accepting credit card payments from an iPhone, iPad or Android device, depositing checks using an iPhone without visiting a bank, and many more. Write a ten to fifteen (1015) page term paper in which you 1. Assess the effectiveness and efficiency mobilebased applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. 2. Evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. 3. Examine the challenges of developing applications that run on mobile devices because of the small screen size. 4. Describe the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android. 5. Mobile applications require high availability because end users need to have continuous access to IT and IS systems. Discuss ways of providing high availability. 6. Mobile devices are subjected to hacking at a higher rate than nonmobile devices. Discuss methods of making mobile devices more secure. 7. Use at least three (3) quality resources in this assignment. Note Wikipedia and similar Websites do not qualify as quality resources.