DUE DATE: Sunday, 29 March 11:59 pm (digital copy to Canvas)
Essay # 1 Prompt
For this first essay, you will be thinking critically about two of the stories from Drown. If it helps, you can think of this assignment as a compare and contrast paper. Take two of the stories that are interesting to you and explain why they are interesting. Consider using this template for a thesis idea:
(statement) because (analysis)
to help shape your paper. Also, be cognizant of the themes from the stories. It is highly recommended that you address similarities and differences in the themes of the two stories you write about. Themes may include, but are not limited to: diaspora, sexuality, "othering," silencing, persona, addiction, abuse, and so on.
You must choose one story from Group A to write about and one story from Group B to write about:
Group A: "Negocios" / "Drown"
Group B: "Fiesta, 1980" / "Aguantando" / "Edison, New Jersey" / "Aurora"
Your paper must exhibit critical analysis that shies away from depending on summary. Use evidence from the stories to substantiate your argument, but do not focus on summarizing the plot of the stories.
Essay requirements:
· 1500-word minimum (indicate your word count at the end of the paper)
· MLA formatting:12 pt font = TIMES NEW ROMAN
double spaced 1" margins
no space between paragraphs
· Your title should be centered. Do not skip a line between title and text.
· in-text citations
· Works Cited page
DUE DATE: Sunday, 29 March 11:59 pm (digital copy to Canvas)
RUBRIC:
· "A": The essay has little to no grammatical mistakes and follows the conventions of standard academic English. The essay displays a high degree of critical thinking and planning.
· "B": The essay has a minimal number of grammatical mistakes and follows the conventions of standard academic English. The essay displays an above average degree of critical thinking and planning.
· "C": The essay has a tolerable number of grammatical mistakes and loosely follows the conventions of standard academic English. The essay displays an average degree of critical thinking and planning.
· "D": The essay has an unacceptable number of grammatical mistakes and barely follows the conventions of standard academic English. The essay displays a below average degree of critical thinking and planning.
· "F": The essay fails to attempt to fulfill the prompt in any way.
DUE DATE: Sunday, 29 March 11:59 pm (digital copy to Canvas)
Unit IV Power point assignment
Instructions
For this assignment, you will discuss what you have learned in Unit III and Unit IV by creating a 12-slide PowerPoint presentation that addresses the case studies below.
Based on your reading of the case study “Is Business Ready for Wearable Computers?” on page 181 of the textbook, address the prompts below.
· Discuss at least three examples of wearable technology.
· Discuss how wearable technology could change the way the company you work for or a company you are familiar with conducts business, ...
Crowdsourced topic rankings at Snowforce 2017 in Salt Lake City drove this one-hour "Top 10" -- from evolving role of CIO, up through AI-leveraged connection, into a culture of innovation. (Peter Coffee, VP for Strategic Research at Salesforce)
Week 6 Learning Resources This page contains the Learning Re.docxcockekeshia
Week 6 Learning Resources
This page contains the Learning Resources for this week. Be sure to scroll down the page to see all of this week's assigned Learning Resources.
Required Resources
Readings
· Haag, S., & Cummings, M. (2013). Management information systems for the information age (9th ed.). New York, NY: McGraw-Hill Irwin.
Chapter 9, “Emerging Trends and Technologies: Business, People, and Technology Tomorrow” (pp. 256–285)
Enter your MyWalden user name: ([email protected]) and password (3#icldyoB1) at the prompt.
· Document:Final Paper Template (PDF)
· Document:Week 6 Discussion Template (Word document)
Management Information Systems for The Information Age
Haag, S., & Cummings, M. (2013). Management iriformation systems for the information age.
New York: McGraw-Hill.
MANAGEMENT INFORMATION
SYSTEMS FOR THE INFORMATION AGE
> > Ninth Edition ~tephen HAAG l_Maeve C_,_UMMINGSJ
CHAPTER NINE OUTLINE
1. Describe the emerging trends and technologies that will have an impact on the changing
Internet.
2. Define the various types of technologies that are emerging as we move toward physiological
interaction with technology.
3. Describe the emerging trends of Near Field Communication, Bluetooth, WiFi, smartphones, and
RFID, as they relate to the wireless environment.
4. Define and describe emerging technologies that, while purely technology, can -and will impact
the future.
263
269
273
275
Industry Perspective
Driving Girl Scout Cookie Sales with • Searching job databases
Smartphones
• Interviewing and negotiating tips
Industry Perspective • Financial aid resources
The Glasses-Free 3D Smartphone • Searching for MBA programs
Global Perspective • Free ~nd rentable storage space
Edible RFID Tags in Your Food • Global statistics and resources
Industry Perspective
E-Movies with You in Them
XLM/I Building an E-Portfolio
Extended Learning Module I provides you with hands-on instructions for the most appropriate
way to build an e-portfolio, an electronic resume that you publish on the Web in the hope of
attracting potential employers. Important issues also cover aspects of building a strong objective
statement and using strong action verbs to describe yourself and your accomplishments.
XLM/K Careers in Business
Extended Learning Module K provides an overview of job titles and descriptions in the
fields of accounting, finance, hospitality and tourism management, information technology,
management, marketing, productions and operations management, and real estate and
construction management including what IT skills you should acquire to be successful in each
field.
Emerging Trends and Technologies
Business, People, and Technology Tomorrow
OUTRAGEOUS INDUSTRY
TRANSFORMATION: THERE IS NO
LONGER ONE IN EVERY TOWN
It's one of the oldest institutions in this country.
Established in 1775, Ben Franklin became its first
leader. What organization are we talking about?
Of course, .
Understanding the New World of Cognitive ComputingDATAVERSITY
Cognitive Computing is a rapidly developing technology that has reached practical application and implementation. So what is it? Do you need it? How can it benefit your business?
In this webinar a panel of experts in Cognitive Computing will discuss the technology, the current practical applications, and where this technology is going. The discussion will start with a review of a recent survey produced by DATAVERSITY on how Cognitive Computing is currently understood by your peers. The panel will also review many components of the technology including:
Cognitive Analytics
Machine Learning
Deep Learning
Reasoning
And next generation artificial intelligence (AI)
And get involved in the discussion with your own questions to present to the panel.
Course SyllabusCourse DescriptionProvides a comprehensCruzIbarra161
Course Syllabus
Course Description
Provides a comprehensive overview of the management of information systems and the combination of hardware, software,
and people vital to the successful business operation. The strategic role of information systems is examined, as well as the
characteristics of computer systems, software applications, programming languages, and relational databases.
uCertify
This course will utilize a tool called uCertify, which will provide you with readings and other activities needed to complete the
course. Please refer to the uCertify link in the Course Content menu in Blackboard to access this information.
Kroenke, D. M., & Boyle, R. J. (2020). Using MIS (12th ed.). Pearson.
Course Textbook(s)
No physical textbook is required; resources are integrated within the course.
Course Learning Outcomes
Upon completion of this course, students should be able to:
1. Analyze the key differences between data, information, information technology (IT), and information systems (IS).
2. Explain the similarities and differences of personal knowledge management tools.
3. Examine the importance of mobile systems with regard to securing information and knowledge.
4. Explain how information systems can be used to gain and sustain competitive advantage.
5. Evaluate the approaches to developing organizational knowledge management strategies.
6. Assess the key issues involved in managing the components of IT infrastructure.
7. Summarize the requirements for successful collaboration in information systems management.
8. Evaluate major types of hardware and software used by organizations.
Prerequisite(s)
No prerequisite courses are required for enrollment in this course.
Credits
ITC 3303, Information Systems
Management
ITC 3303, Information Systems Management 1
Upon completion of this course, the students will earn 3.00 hours of college credit.
CSU Online Library
The CSU Online Library is available to support your courses and programs. You may be prompted to login with your CSU
Account. The online library includes databases, journals, e-books, and research guides. These resources are always
accessible and can be reached through the library webpage. The CSU Online Library can be accessed from the "My
Library" button on the course menu in Blackboard.
The CSU Online Library offers several reference services. E-mail ([email protected]) and telephone
(1.877.268.8046) assistance is available Monday-Thursday from 8 am to 5 pm and Friday from 8 am to 3 pm. The library's
chat reference service, Ask a Librarian, is available 24/7; look for the chat box on the online library page.
Librarians can help you develop your research plan or assist you in finding relevant, appropriate, and timely information.
Reference requests can include customized keyword search strategies, database help, and other services.
LibGuides
Think of a LibGuide (a Library Guide) as a mini-website to help you with your assignments. It has relevant information su ...
Crowdsourced topic rankings at Snowforce 2017 in Salt Lake City drove this one-hour "Top 10" -- from evolving role of CIO, up through AI-leveraged connection, into a culture of innovation. (Peter Coffee, VP for Strategic Research at Salesforce)
Week 6 Learning Resources This page contains the Learning Re.docxcockekeshia
Week 6 Learning Resources
This page contains the Learning Resources for this week. Be sure to scroll down the page to see all of this week's assigned Learning Resources.
Required Resources
Readings
· Haag, S., & Cummings, M. (2013). Management information systems for the information age (9th ed.). New York, NY: McGraw-Hill Irwin.
Chapter 9, “Emerging Trends and Technologies: Business, People, and Technology Tomorrow” (pp. 256–285)
Enter your MyWalden user name: ([email protected]) and password (3#icldyoB1) at the prompt.
· Document:Final Paper Template (PDF)
· Document:Week 6 Discussion Template (Word document)
Management Information Systems for The Information Age
Haag, S., & Cummings, M. (2013). Management iriformation systems for the information age.
New York: McGraw-Hill.
MANAGEMENT INFORMATION
SYSTEMS FOR THE INFORMATION AGE
> > Ninth Edition ~tephen HAAG l_Maeve C_,_UMMINGSJ
CHAPTER NINE OUTLINE
1. Describe the emerging trends and technologies that will have an impact on the changing
Internet.
2. Define the various types of technologies that are emerging as we move toward physiological
interaction with technology.
3. Describe the emerging trends of Near Field Communication, Bluetooth, WiFi, smartphones, and
RFID, as they relate to the wireless environment.
4. Define and describe emerging technologies that, while purely technology, can -and will impact
the future.
263
269
273
275
Industry Perspective
Driving Girl Scout Cookie Sales with • Searching job databases
Smartphones
• Interviewing and negotiating tips
Industry Perspective • Financial aid resources
The Glasses-Free 3D Smartphone • Searching for MBA programs
Global Perspective • Free ~nd rentable storage space
Edible RFID Tags in Your Food • Global statistics and resources
Industry Perspective
E-Movies with You in Them
XLM/I Building an E-Portfolio
Extended Learning Module I provides you with hands-on instructions for the most appropriate
way to build an e-portfolio, an electronic resume that you publish on the Web in the hope of
attracting potential employers. Important issues also cover aspects of building a strong objective
statement and using strong action verbs to describe yourself and your accomplishments.
XLM/K Careers in Business
Extended Learning Module K provides an overview of job titles and descriptions in the
fields of accounting, finance, hospitality and tourism management, information technology,
management, marketing, productions and operations management, and real estate and
construction management including what IT skills you should acquire to be successful in each
field.
Emerging Trends and Technologies
Business, People, and Technology Tomorrow
OUTRAGEOUS INDUSTRY
TRANSFORMATION: THERE IS NO
LONGER ONE IN EVERY TOWN
It's one of the oldest institutions in this country.
Established in 1775, Ben Franklin became its first
leader. What organization are we talking about?
Of course, .
Understanding the New World of Cognitive ComputingDATAVERSITY
Cognitive Computing is a rapidly developing technology that has reached practical application and implementation. So what is it? Do you need it? How can it benefit your business?
In this webinar a panel of experts in Cognitive Computing will discuss the technology, the current practical applications, and where this technology is going. The discussion will start with a review of a recent survey produced by DATAVERSITY on how Cognitive Computing is currently understood by your peers. The panel will also review many components of the technology including:
Cognitive Analytics
Machine Learning
Deep Learning
Reasoning
And next generation artificial intelligence (AI)
And get involved in the discussion with your own questions to present to the panel.
Course SyllabusCourse DescriptionProvides a comprehensCruzIbarra161
Course Syllabus
Course Description
Provides a comprehensive overview of the management of information systems and the combination of hardware, software,
and people vital to the successful business operation. The strategic role of information systems is examined, as well as the
characteristics of computer systems, software applications, programming languages, and relational databases.
uCertify
This course will utilize a tool called uCertify, which will provide you with readings and other activities needed to complete the
course. Please refer to the uCertify link in the Course Content menu in Blackboard to access this information.
Kroenke, D. M., & Boyle, R. J. (2020). Using MIS (12th ed.). Pearson.
Course Textbook(s)
No physical textbook is required; resources are integrated within the course.
Course Learning Outcomes
Upon completion of this course, students should be able to:
1. Analyze the key differences between data, information, information technology (IT), and information systems (IS).
2. Explain the similarities and differences of personal knowledge management tools.
3. Examine the importance of mobile systems with regard to securing information and knowledge.
4. Explain how information systems can be used to gain and sustain competitive advantage.
5. Evaluate the approaches to developing organizational knowledge management strategies.
6. Assess the key issues involved in managing the components of IT infrastructure.
7. Summarize the requirements for successful collaboration in information systems management.
8. Evaluate major types of hardware and software used by organizations.
Prerequisite(s)
No prerequisite courses are required for enrollment in this course.
Credits
ITC 3303, Information Systems
Management
ITC 3303, Information Systems Management 1
Upon completion of this course, the students will earn 3.00 hours of college credit.
CSU Online Library
The CSU Online Library is available to support your courses and programs. You may be prompted to login with your CSU
Account. The online library includes databases, journals, e-books, and research guides. These resources are always
accessible and can be reached through the library webpage. The CSU Online Library can be accessed from the "My
Library" button on the course menu in Blackboard.
The CSU Online Library offers several reference services. E-mail ([email protected]) and telephone
(1.877.268.8046) assistance is available Monday-Thursday from 8 am to 5 pm and Friday from 8 am to 3 pm. The library's
chat reference service, Ask a Librarian, is available 24/7; look for the chat box on the online library page.
Librarians can help you develop your research plan or assist you in finding relevant, appropriate, and timely information.
Reference requests can include customized keyword search strategies, database help, and other services.
LibGuides
Think of a LibGuide (a Library Guide) as a mini-website to help you with your assignments. It has relevant information su ...
Mergeflow Teams: Enabling collaborative discovery for you and your team.Mergeflow
Mergeflow Teams collects and aligns information from across venture investments, markets, R&D, and news.
By automating data collection and data alignment across your team, it helps you spend your time on high-value activities, such as deciding what your company should do next.
Globally leading technology organizations across various industries employ Mergeflow Teams to use information, rather than managing it.
How are machine learning and artificial intelligence revolutionizing insurance?
This presentation explains it briefly, including current trends and effects on the business.
Topic Computing: A New Experience Paradigm for the Age of Information OverloadDavid Lavenda
Information overload is real and it’s getting worse. Work environments are particularly prone to overload, given the never-ending stream of emails, chat messages and application notifications workers receive on a daily basis. Interestingly, though, research shows that information overload at work is more often due to poor information quality rather than sheer quantity. (Information quality is considered poor when it’s disconnected and/or incoherent, making it difficult to decipher and process).
Top Strategic Technology Trends for 2022.docxAdvance Tech
Strategic technology trends can be difficult to predict, but many technology observers think that the 2024 Olympics and the autonomous cars of the 2020s are inevitable.
Regardless, strategic technology trends can inspire companies and entrepreneurs looking to maximize their exposure and reach, increase their revenue, and drive new products and services.
Several technologies will be an important part of the 2022 strategy of any large firm, including software, cloud computing, and mobile technology.
A discussion that the following is the main focus on the impact of these technologies on the business functions of large firms and their future strategies. We finally brought together the sectors that will largely influence the future world economy in this post.
Strategic technology is the combination of strategic thinking, best practices, and financial effectiveness.
https://advancetech.info/gartners-top-10-strategic-technology-trends-for-2022/
Data Science - An emerging Stream of Science with its Spreading Reach & ImpactDr. Sunil Kr. Pandey
This is my presentation on the Topic "Data Science - An emerging Stream of Science with its Spreading Reach & Impact". I have compiled and collected different statistics and data from different sources. This may be useful for students and those who might be interested in this field of Study.
. According to your textbook, Contrary to a popular misconception.docxmadlynplamondon
.
According to your textbook, “Contrary to a popular misconception in the West, homosexuality is not universally stigmatized. Based on the Standard Cross-Cultural Sample of 186 societies, Crapo (1995) found that only 31% of people stigmatized homosexual behavior, while the remainder either considered homosexual experimentation to be a normal developmental phase of preadult life (38%), accepted committed adult same-sex relationships as an alternative form of marriage (18%), or even required same-sex relationships among all males during a period that preceded their being permitted to marry heterosexually (12%)” (Crapo, 2013, p.161).
In America, the historical stigmatization of homosexuality is a product of (Points : 1)
enculturation.
cultural relativism.
minimalism.
universal moral values.
Question 2.
2.
Which of the following is an example of an
etic
statement about Americans? (Points : 1)
July 4th is a federal holiday, and I enjoy having the day off from work. I usually spend time with my family and hang out at the pool.
The Fourth of July is the day we adopted the Declaration of Independence, declaring our independence from the British in 1776. This had a huge impact on the entire course of history, leading to the Revolutionary War and the creation of the best country in the world, the United States of America.
The fireworks displays are my favorite part of the Fourth of July. I also march in the local parade.
Americans celebrate the 4th of July as the day they declared independence from colonial powers in 1776. Food is often cooked outside on grills, even though most houses have electric ovens inside. It is very hot outside in the middle of summer, and although many people have electronic cooling devices called air conditioners within their homes, much of the day is spent outside. At night, explosives are set off in community gatherings to celebrate this holiday. Remarkably, very few people are hurt during these displays.
Question 3.
3.
Which of the following is an example of an
etic
description of teen pregnancy in America? (Points : 1)
One of my friends in high school got pregnant in her sophomore year. She and the father decided to keep the baby, got married and just celebrated their 10thanniversary. They both finished college and have good jobs now. It just goes to show that people can overcome teen pregnancy and become successful parents.
Although popular opinion sometimes indicates otherwise, according to a statistical analysis from the US Department of Health and Services (2014), teen pregnancy rates have been steadily declining for the past twenty years. In America, most teenagers are not yet fully independent from their parents, as teenagers in other cultures sometimes are, so they are not ready to become parents. Since this issue has a huge impact on young women and men affected by it, this may account for the disparity between popular opinion and.
-How did artwork produced in America from 1945 to 1960 compare to ar.docxmadlynplamondon
-How did artwork produced in America from 1945 to 1960 compare to art made in Europe? Did the artwork change as the 20th century progressed? Include at least two (2) examples of artists and artworks to support your comparison. You do not need to include the image, but include artist name, title, media and date.
- Write 150 words, also cite the sources you use.
.
-Just thoughts and opinion on the reading-Consent and compen.docxmadlynplamondon
-Just thoughts and opinion on the reading
-Consent and compensation are two things that the Johns Hopkins doctors did not provide Henrietta Lacks. How are these ideas at odds?
-African Americans today face disparities in the health care system even today. How can Henrietta's story motivate change in our current system?
.
. The Questioned Documents Unit (QDU) provides forensic support .docxmadlynplamondon
. The Questioned Documents Unit (QDU) provides forensic support to federal, state and local law enforcement agencies by conducting examinations on evidence collected during their investigation as well as expert testimony concerning information contained in the reports. The Cryptanalysis and Racketeering Records Unit (CRRU) supports law enforcement by assisting in the analysis of cryptic communications such as codes found in letters, notes and diaries (FBI.gov).
After an individual is arrested, I will obtain fingerprints and photographs of the subject and complete a number of forms that are used to start a criminal file on the subject. I will use the Buccal Collection DNA test kit provided by the FBI on my subject. Once completed properly and submitted to the FBI, the kit will be sent to the Federal DNA Database Unit (FDDU). The FDDU will take the DNA test kit and upload it into NDIS creating a DNA profile for my subject. The subject’s DNA profile will be searched against unknown forensic profiles from crime scenes across the country. If my subject’s DNA matches with another crime from another state he can be charged for that crimes as well. In my opinion this is the most important service the FBI has. This allows all agencies to communicate and share information based off of DNA evidence. The flaw is that they need the criminal to be apprehended and processed in order for the DNA to be in the system.
In Knoxville Tennessee, FBI Emergency Response agents train how to excavate a body at the Body Farm. The agents pair up in teams with forensic anthropologists to learn how to best identify and excavate human remains to preserve the clues and pieces of evidence that decaying bodies may leave behind. The weeklong training gives agents step by step instructions while surprising the agents with twists and surprises during their excavations. This was very interesting to me because it helps put things into perspective. Teaches them to put the victim first, which will motivate them to slow down, be methodical with their techniques and be very thorough because it only can be done once.
respond to this discussion question 150 words
.
. What is it about the fundamental nature and structure of the Olym.docxmadlynplamondon
. What is it about the fundamental nature and structure of the Olympics that helps explain why the conflict arose and escalated?
b. Was the form of aggression displayed by the attackers hostile aggression or instrumental aggression? Explain your reasoning. (Note: you
must
make a decision between these alternatives and defend your decision.)
.
-Learning objectives for presentation-Brief background o.docxmadlynplamondon
-Learning objectives for presentation
-Brief background on theorist
-Relevance of the theory in current healthcare
-Appropriateness of theory to role of nurse practitioner
-Key concepts of theory
the theory "Madeleine Leininger transcultural nursing theory"
please include references and cite within the answers
.
-You will need to play a phone game Angry Birds (any version) to mak.docxmadlynplamondon
-You will need to play a phone game Angry Birds (any version) to make observation.
-Make an observation on how you must launch the birds in order to knock over the items.
-Pay attention to how the path of the birds (the projectiles) changes as you change the launch angle and how far back you pull the birds at launch.
-You will also need to complete the calculations in assignment.
Assignment file below...
.
. EDU 571 Week 5 Discussion 1 -
"Data Collection" Please respond to the following:
· Using your planned evaluation project, assume that the client paying for the evaluation has requested that you primarily use audio/visual interview and observation techniques. The client envisions using clips in the evaluation report and in marketing campaigns. Discuss the appropriateness, advantages, and disadvantages of using digital capabilities to capture sound, video, and photographs of the interviewees, focus groups, and observations. Provide reasons for opposing or supporting the request (partially or completely).
Total Reviews(0)
·
EDU 571 Week 5 Discussion 2 -
"Benefits of Meta-Evaluation" Please respond to the following:
· Your client told you that a meta-evaluation should not be included in the plan or budget. Explain two (2) reasons for including a meta-evaluation in the evaluation plan. Recommend two (2) ways to reduce the costs.
Total Reviews(0)
EDU 571 Week 3 Target of Program Evaluation Plan, Part 1 -
Target of Program Evaluation Plan, Part 1
Assignment 1 is the first part of a five-part project to plan the various elements of a program evaluation for education. Select a program target from your school district, workplace, (e.g., business training program) or your university (where you are a student). For you to gain the most from the assignment, you should select a program that you are interested in, would like to see evaluated, and are able to obtain information about. (Possible programs include: student assessment, teacher assessment, pay for student achievement, new teacher or employee training, online classrooms, anti-bullying, gender equity for girls in math and science, school to work, retention of at-risk students, and schools of choice (charter schools), etc.). As you develop the entire plan, gather information, and receive feedback from your professor (or others), you should revise and refine each part of the project. Think of your professor as your project evaluator and supervisor who will help guide you so that you produce an outstanding, well-developed evaluation plan for the stakeholders.
Write a 1000 words paper in which you:
1. Describe three (3) elements of a worthy object for program evaluation - its type, the department administrating it, and target population.
2. Describe the program's history, primary purpose(s), and / or expected outcomes.
3. Explain three (3) reasons for selecting the program (e.g., program's value or lack of it, issues surrounding it, age, relevance, cost, impact on students, etc.).
4. Discuss three (3) advantages of evaluating the program at this time.
5. Discuss two (2) major constraints in conducting an evaluation on this program and a method of addressing them.
6. Use at least three (3) peer-reviewed academic resources in this assignment. Note: Wikipedia and many Websites do not qualify as academic resources. Peer-reviewed academic resources refer to articles and scholarly journals that are reviewe.
. What were the causes of World War II Explain how and why the Unit.docxmadlynplamondon
. What were the causes of World War II? Explain how and why the United States got involved in the war. Discuss the U.S. home front. How did women and minorities respond to the war? Explain the war in North Africa and Europe. Discuss the Allied invasion of Normandy on June 6, 1944. What was Adolf Hitler’s “final solution,” and what were the consequences of the Holocaust? How did the Allies end the war in Europe? Discuss the war in the Pacific. What proved to be an effective U.S. strategy in the Pacific? Analyze Harry Truman’s controversial decision to drop the atomic bombs on Japan. What were the consequences of World War II?
.
More Related Content
Similar to DUE DATE Sunday, 29 March 1159 pm (digital copy to Canvas)Essa.docx
Mergeflow Teams: Enabling collaborative discovery for you and your team.Mergeflow
Mergeflow Teams collects and aligns information from across venture investments, markets, R&D, and news.
By automating data collection and data alignment across your team, it helps you spend your time on high-value activities, such as deciding what your company should do next.
Globally leading technology organizations across various industries employ Mergeflow Teams to use information, rather than managing it.
How are machine learning and artificial intelligence revolutionizing insurance?
This presentation explains it briefly, including current trends and effects on the business.
Topic Computing: A New Experience Paradigm for the Age of Information OverloadDavid Lavenda
Information overload is real and it’s getting worse. Work environments are particularly prone to overload, given the never-ending stream of emails, chat messages and application notifications workers receive on a daily basis. Interestingly, though, research shows that information overload at work is more often due to poor information quality rather than sheer quantity. (Information quality is considered poor when it’s disconnected and/or incoherent, making it difficult to decipher and process).
Top Strategic Technology Trends for 2022.docxAdvance Tech
Strategic technology trends can be difficult to predict, but many technology observers think that the 2024 Olympics and the autonomous cars of the 2020s are inevitable.
Regardless, strategic technology trends can inspire companies and entrepreneurs looking to maximize their exposure and reach, increase their revenue, and drive new products and services.
Several technologies will be an important part of the 2022 strategy of any large firm, including software, cloud computing, and mobile technology.
A discussion that the following is the main focus on the impact of these technologies on the business functions of large firms and their future strategies. We finally brought together the sectors that will largely influence the future world economy in this post.
Strategic technology is the combination of strategic thinking, best practices, and financial effectiveness.
https://advancetech.info/gartners-top-10-strategic-technology-trends-for-2022/
Data Science - An emerging Stream of Science with its Spreading Reach & ImpactDr. Sunil Kr. Pandey
This is my presentation on the Topic "Data Science - An emerging Stream of Science with its Spreading Reach & Impact". I have compiled and collected different statistics and data from different sources. This may be useful for students and those who might be interested in this field of Study.
Similar to DUE DATE Sunday, 29 March 1159 pm (digital copy to Canvas)Essa.docx (13)
. According to your textbook, Contrary to a popular misconception.docxmadlynplamondon
.
According to your textbook, “Contrary to a popular misconception in the West, homosexuality is not universally stigmatized. Based on the Standard Cross-Cultural Sample of 186 societies, Crapo (1995) found that only 31% of people stigmatized homosexual behavior, while the remainder either considered homosexual experimentation to be a normal developmental phase of preadult life (38%), accepted committed adult same-sex relationships as an alternative form of marriage (18%), or even required same-sex relationships among all males during a period that preceded their being permitted to marry heterosexually (12%)” (Crapo, 2013, p.161).
In America, the historical stigmatization of homosexuality is a product of (Points : 1)
enculturation.
cultural relativism.
minimalism.
universal moral values.
Question 2.
2.
Which of the following is an example of an
etic
statement about Americans? (Points : 1)
July 4th is a federal holiday, and I enjoy having the day off from work. I usually spend time with my family and hang out at the pool.
The Fourth of July is the day we adopted the Declaration of Independence, declaring our independence from the British in 1776. This had a huge impact on the entire course of history, leading to the Revolutionary War and the creation of the best country in the world, the United States of America.
The fireworks displays are my favorite part of the Fourth of July. I also march in the local parade.
Americans celebrate the 4th of July as the day they declared independence from colonial powers in 1776. Food is often cooked outside on grills, even though most houses have electric ovens inside. It is very hot outside in the middle of summer, and although many people have electronic cooling devices called air conditioners within their homes, much of the day is spent outside. At night, explosives are set off in community gatherings to celebrate this holiday. Remarkably, very few people are hurt during these displays.
Question 3.
3.
Which of the following is an example of an
etic
description of teen pregnancy in America? (Points : 1)
One of my friends in high school got pregnant in her sophomore year. She and the father decided to keep the baby, got married and just celebrated their 10thanniversary. They both finished college and have good jobs now. It just goes to show that people can overcome teen pregnancy and become successful parents.
Although popular opinion sometimes indicates otherwise, according to a statistical analysis from the US Department of Health and Services (2014), teen pregnancy rates have been steadily declining for the past twenty years. In America, most teenagers are not yet fully independent from their parents, as teenagers in other cultures sometimes are, so they are not ready to become parents. Since this issue has a huge impact on young women and men affected by it, this may account for the disparity between popular opinion and.
-How did artwork produced in America from 1945 to 1960 compare to ar.docxmadlynplamondon
-How did artwork produced in America from 1945 to 1960 compare to art made in Europe? Did the artwork change as the 20th century progressed? Include at least two (2) examples of artists and artworks to support your comparison. You do not need to include the image, but include artist name, title, media and date.
- Write 150 words, also cite the sources you use.
.
-Just thoughts and opinion on the reading-Consent and compen.docxmadlynplamondon
-Just thoughts and opinion on the reading
-Consent and compensation are two things that the Johns Hopkins doctors did not provide Henrietta Lacks. How are these ideas at odds?
-African Americans today face disparities in the health care system even today. How can Henrietta's story motivate change in our current system?
.
. The Questioned Documents Unit (QDU) provides forensic support .docxmadlynplamondon
. The Questioned Documents Unit (QDU) provides forensic support to federal, state and local law enforcement agencies by conducting examinations on evidence collected during their investigation as well as expert testimony concerning information contained in the reports. The Cryptanalysis and Racketeering Records Unit (CRRU) supports law enforcement by assisting in the analysis of cryptic communications such as codes found in letters, notes and diaries (FBI.gov).
After an individual is arrested, I will obtain fingerprints and photographs of the subject and complete a number of forms that are used to start a criminal file on the subject. I will use the Buccal Collection DNA test kit provided by the FBI on my subject. Once completed properly and submitted to the FBI, the kit will be sent to the Federal DNA Database Unit (FDDU). The FDDU will take the DNA test kit and upload it into NDIS creating a DNA profile for my subject. The subject’s DNA profile will be searched against unknown forensic profiles from crime scenes across the country. If my subject’s DNA matches with another crime from another state he can be charged for that crimes as well. In my opinion this is the most important service the FBI has. This allows all agencies to communicate and share information based off of DNA evidence. The flaw is that they need the criminal to be apprehended and processed in order for the DNA to be in the system.
In Knoxville Tennessee, FBI Emergency Response agents train how to excavate a body at the Body Farm. The agents pair up in teams with forensic anthropologists to learn how to best identify and excavate human remains to preserve the clues and pieces of evidence that decaying bodies may leave behind. The weeklong training gives agents step by step instructions while surprising the agents with twists and surprises during their excavations. This was very interesting to me because it helps put things into perspective. Teaches them to put the victim first, which will motivate them to slow down, be methodical with their techniques and be very thorough because it only can be done once.
respond to this discussion question 150 words
.
. What is it about the fundamental nature and structure of the Olym.docxmadlynplamondon
. What is it about the fundamental nature and structure of the Olympics that helps explain why the conflict arose and escalated?
b. Was the form of aggression displayed by the attackers hostile aggression or instrumental aggression? Explain your reasoning. (Note: you
must
make a decision between these alternatives and defend your decision.)
.
-Learning objectives for presentation-Brief background o.docxmadlynplamondon
-Learning objectives for presentation
-Brief background on theorist
-Relevance of the theory in current healthcare
-Appropriateness of theory to role of nurse practitioner
-Key concepts of theory
the theory "Madeleine Leininger transcultural nursing theory"
please include references and cite within the answers
.
-You will need to play a phone game Angry Birds (any version) to mak.docxmadlynplamondon
-You will need to play a phone game Angry Birds (any version) to make observation.
-Make an observation on how you must launch the birds in order to knock over the items.
-Pay attention to how the path of the birds (the projectiles) changes as you change the launch angle and how far back you pull the birds at launch.
-You will also need to complete the calculations in assignment.
Assignment file below...
.
. EDU 571 Week 5 Discussion 1 -
"Data Collection" Please respond to the following:
· Using your planned evaluation project, assume that the client paying for the evaluation has requested that you primarily use audio/visual interview and observation techniques. The client envisions using clips in the evaluation report and in marketing campaigns. Discuss the appropriateness, advantages, and disadvantages of using digital capabilities to capture sound, video, and photographs of the interviewees, focus groups, and observations. Provide reasons for opposing or supporting the request (partially or completely).
Total Reviews(0)
·
EDU 571 Week 5 Discussion 2 -
"Benefits of Meta-Evaluation" Please respond to the following:
· Your client told you that a meta-evaluation should not be included in the plan or budget. Explain two (2) reasons for including a meta-evaluation in the evaluation plan. Recommend two (2) ways to reduce the costs.
Total Reviews(0)
EDU 571 Week 3 Target of Program Evaluation Plan, Part 1 -
Target of Program Evaluation Plan, Part 1
Assignment 1 is the first part of a five-part project to plan the various elements of a program evaluation for education. Select a program target from your school district, workplace, (e.g., business training program) or your university (where you are a student). For you to gain the most from the assignment, you should select a program that you are interested in, would like to see evaluated, and are able to obtain information about. (Possible programs include: student assessment, teacher assessment, pay for student achievement, new teacher or employee training, online classrooms, anti-bullying, gender equity for girls in math and science, school to work, retention of at-risk students, and schools of choice (charter schools), etc.). As you develop the entire plan, gather information, and receive feedback from your professor (or others), you should revise and refine each part of the project. Think of your professor as your project evaluator and supervisor who will help guide you so that you produce an outstanding, well-developed evaluation plan for the stakeholders.
Write a 1000 words paper in which you:
1. Describe three (3) elements of a worthy object for program evaluation - its type, the department administrating it, and target population.
2. Describe the program's history, primary purpose(s), and / or expected outcomes.
3. Explain three (3) reasons for selecting the program (e.g., program's value or lack of it, issues surrounding it, age, relevance, cost, impact on students, etc.).
4. Discuss three (3) advantages of evaluating the program at this time.
5. Discuss two (2) major constraints in conducting an evaluation on this program and a method of addressing them.
6. Use at least three (3) peer-reviewed academic resources in this assignment. Note: Wikipedia and many Websites do not qualify as academic resources. Peer-reviewed academic resources refer to articles and scholarly journals that are reviewe.
. What were the causes of World War II Explain how and why the Unit.docxmadlynplamondon
. What were the causes of World War II? Explain how and why the United States got involved in the war. Discuss the U.S. home front. How did women and minorities respond to the war? Explain the war in North Africa and Europe. Discuss the Allied invasion of Normandy on June 6, 1944. What was Adolf Hitler’s “final solution,” and what were the consequences of the Holocaust? How did the Allies end the war in Europe? Discuss the war in the Pacific. What proved to be an effective U.S. strategy in the Pacific? Analyze Harry Truman’s controversial decision to drop the atomic bombs on Japan. What were the consequences of World War II?
.
. Complete the prewriting for the progress reportPrewriting p.docxmadlynplamondon
. Complete the prewriting for the progress report:
Prewriting prepares you to write and helps you organize your ideas.
You may print the lesson and jot notes for yourself on the paper, or you may write notes on your own.
You do not have to submit prewriting for any points, but don't skip this important step!
2. Complete a draft of the progress report:
Remember to use the memo format style in typing this progress report.
This report should be two or more pages when you are completed.
The draft will be much shorter than your final report.
Follow a logical structure: introduction, what is finished, what is underway, what is left to do, and a conclusion.
Use specifics such as dates, proper names, numbers, costs, etc.
Include one or more visuals may such as pictures, graphs, charts, tables, etc.
.
-in Filomena by Roberta Fernandez the author refers to the Mexican r.docxmadlynplamondon
-in Filomena by Roberta Fernandez the author refers to the Mexican rituals for the day of the dead how is this celebration portrayed in the story?
-in "La doctora Barr" how does Mary Helen Ponce describe the traditional way Mexican-American women prepared for a childbirth in their community?
-how does Nilda feel about Sophies's presence in her home?
-how is bilingualism used in the story "Filomena"? Support your opinions with examples from the story
-describe the incident with the vanilla ice cream . Why was it so upsetting for Nilda?
.
-Write about a violent religious event in history.(Ex. Muslim ex.docxmadlynplamondon
-Write about a violent religious event in history.
(Ex. Muslim extremist acts in history, or the Christian crusades, etc.)
-Write about belief/reasoning/justification those certain people believe their actions have and affects of...
-(Identity)They're view of the world and themselves. Is it rationale or is it a problem. Why?
5-pages minimum
4-scholarly sources min. 2 of 4 book sources Need Dec. 2nd by 9pm.
.
-This project is an opportunity to demonstrate the ability to analyz.docxmadlynplamondon
-This project is an opportunity to demonstrate the ability to analyze and write about music with clarity and purpose. Assume the role of a reviewer/critic who is applying for a job writing a music column for a progressive weblog catering to readers who on average have at least a bachelor's degree and are concerned with issues of justice and equality
-The CD reviewed is one that will allow reflection about how music can provide people the opportunity to imagine the lives and experiences of others different from oneself. Questions to guide reflection while listening should include:
1. Who are the peoples performing the music or who is the music about?
2.What type of life is presented through the music's lyrics and musical sound?
3.What themes or issues are presented by the music?
4. How do the various musical selections relate to each other?
5.What can be learned about people by listening to this CD?
6.Why should other people listen to this music?
-A list of CDs is available for this assignment. CDs may be downloaded for a fee from a preferred site.
-The review will need to include:
1.CD title, artist, genre, release date, etc
2.Background information about the artist or artists for those who may not be familiar.
-The review should be between 800 and 1000 words.
-Conventions of good writing (e.g., correct grammar, spelling, appropriate use of quotations, unctuation) should be observed throughout this project. Moreover, it is important to consider the audience and write in a style that is appropriate. Quotations or information from a primary or secondary source should be cited correctly using APA, Turabian, or MLA.
.
-7 Three men are trapped in a cave with no hope of rescue and no foo.docxmadlynplamondon
-7 Three men are trapped in a cave with no hope of rescue and no food. They roll dice to determine who will be killed and eaten by the others so that some may survive. The two survivors are unexpectedly rescued 10 days later and tried for murder. Judge A finds them guilty, saying that the unjustifiable killing of another is against the homicide laws of State X. He bases his decision solely on statutory law and case precedents interpreting the law. To which school of legal thought does Judge A belong? Explain.
2-8 Basing his decision on the same set of facts as given in Problem 2-7, Judge B rules that the survivors are not guilty because they were cut off from all civilized life, and in such a situation, the laws of nature apply, not manmade laws. To which school of legal thought does Judge B belong? Explain.
2-9 Basing her decision on the same set of facts as given in Problem 2-7, Judge C rules that the two survivors are not guilty because, according to a scientific survey of the community by a professional polling organization, the public believes that the survivors’ actions were defensible. To which school of legal thought does Judge C belong? Explain.
2-10 Imagine you are a sitting federal judge, and this case comes before you. A woman (x) charges another woman (y) with rape. Both have been partners for a five-year period. Both presently live in different states within the United States. Who would you decide the case in favor of? Explain, using one of the schools of thought outlined in this chapter.
2-11 Madison and his adult son lived in a house owned by Madison. At the request of the son, Marshall painted the house. Madison did not authorize the work, but he knew that it was being done and raised no objection. However, Madison refused to pay Marshall, arguing that he had not contracted to have the house painted. Marshall asked his attorney if Madison was legally liable to pay him. The attorney told Marshall that, in their state, several appellate court opinions had established that when a homeowner allows work to be done on his home by a person who would ordinarily expect to be paid, a duty to pay exists. The attorney stated that, on the basis of these precedents, it was advisable for Marshall to bring a suit to collect the reasonable value of the work he had done. Explain what the attorney meant by precedent and why the fact that precedent existed was significant.
2-12 Smith was involved in litigation in California. She lost her case in the trial court. She appealed to the California appellate court, arguing that the trial court judge had incorrectly excluded certain evidence. To support her argument, she cited rulings by the Supreme Court of North Dakota and the Supreme Court of Ohio. Both the North Dakota and Ohio cases involved facts that were similar to those in Smith’s case. Does the California court have to follow the decisions from North Dakota and Ohio? Support your answer.
.
-1. Are the three main elements of compensation systems—internal.docxmadlynplamondon
-1.
Are the three main elements of compensation systems—internal consistency, market competitiveness, and recognizing employee contributions—equally important, or do you believe that they differ in importance? If different, which do you believe is most important? Least important? Give your rationale.
use 1 online reference and
Martocchio, J. (2017). Strategic Compensation: A human resource management approach (9th ed.). Upper Saddle River, NJ: Pearson.
.
- What are the key differences between national health service (.docxmadlynplamondon
- What are the key differences between national health service (NHS) and national health insurance (NHI) systems?
- How do NHI and NHS systems compare with the health care system in the United States?
- How do most countries with similar levels per capita income differ from and resemble the United States with respect to provider payments, coordination of care, workforce and information technology, and health system performance?
Cite at least 2 peer reviewed journal/article. Write in APA format
.
--Describe and analyze the ways in which Alfons Heck’s participation.docxmadlynplamondon
--Describe and analyze the ways in which Alfons Heck’s participation in the Hitler Youth and in the culture of Nazism served to craft his sense of purpose and identity. How are the acts of writing and reflection in his memoir also a means of crafting an identity for himself many decades later? A Child of Hitler: Germany in the Days when God Wore a Swastika Book by Alfons Heck All papers must be 2-4 pages in length, computer-printed, and double-spaced with one-inch margins. Use an appropriate citation style (either footnotes or internal citations).
.
------ Watch an online speechpresentation of 20 minutes or lo.docxmadlynplamondon
------
Watch an online speech/presentation of 20 minutes or longer.
( please cite the presentation you would use)
Write a speech analysis essay of
2-3 pages
I: List the speaker, date, location, & topic, and describe the audience. Describe each of these elements and analyze the effect that each of these elements had on the speaker and/or speech.
II: Describe and analyze the effectiveness of each part of the speaker's introduction (attention getter, revelation of topic, statement of credibility, statement of central idea, preview of main points).
III: Summarize each of the speaker's main points. What pattern of organization did the speaker utilize? Was this effective? Why or why not?
IV: Describe and analyze the effectiveness of the evidence/supporting material that the speaker used.
V: Describe and analyze the effectiveness of the speaker's language.
VI: Describe and analyze the effectiveness of the speaker's delivery.
VII: Describe and analyze the effectiveness of each part of the speaker's conclusion.
.
) Florida National UniversityNursing DepartmentBSN.docxmadlynplamondon
)
Florida National University
Nursing Department
BSN Program
NUR 4636-Community Health Nursing
Prof. Eddie Cruz, RN MSN
Please choose one infectious disease or communicable disease and present a 1,000 words essay including the follow;
Name of the disease including agents that cause Infectious/Communicable Disease, the mode of contamination or how it is spread.
The modes of prevention applying the three levels of prevention with at least one example of each one.
Prevalence and control of the condition according to the Center for Disease Control and Prevention (CDC) including morbidity and mortality.
Implications of the disease in the community and the role of the community health nurse in the control and prevention of the disease.
The essay must be presented in a Word Document, APA format, Arial 12 font attached to the forum in the tab of the Discussion Question title “Infections/Communicable disease essay” and in the assignment tab under the exercise title “SafeAssign infectious/communicable disease”. A minimum of 3 references no older than 5 years must be used. If you use any reference from any website make sure they are reliable sites such as CDC, NIH, Institute of Medicine, etc.
There is a rubric attached to the assignment for your guidance.
Below please see the definitions of infectious disease and communicable disease. They are similar but differ in some characteristics.
Infectious diseases
are disorders caused by organisms — such as bacteria, viruses, fungi or parasites. Many organisms live in and on our bodies. They're normally harmless or even helpful. But under certain conditions, some organisms may cause
disease
. Some
infectious diseases
can be passed from person to person.
Communicable
, or infectious
diseases
, are caused by microorganisms such as bacteria, viruses, parasites and fungi that can be spread, directly or indirectly, from one person to another. Some are transmitted through bites from insects while others are caused by ingesting contaminated food or water.
.
- Please answer question 2 at the end of the case.- cita.docxmadlynplamondon
- Please answer
question 2
at the end of the case.
- citations and references in
IEEE
style
( at least two)
- your answer should be in regards to the case
+
regarding the question itself.
Do it twice ( two different copies)
.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
DUE DATE Sunday, 29 March 1159 pm (digital copy to Canvas)Essa.docx
1. DUE DATE: Sunday, 29 March 11:59 pm (digital copy to
Canvas)
Essay # 1 Prompt
For this first essay, you will be thinking critically about two of
the stories from Drown. If it helps, you can think of this
assignment as a compare and contrast paper. Take two of the
stories that are interesting to you and explain why they are
interesting. Consider using this template for a thesis idea:
(statement) because (analysis)
to help shape your paper. Also, be cognizant of the themes from
the stories. It is highly recommended that you address
similarities and differences in the themes of the two stories you
write about. Themes may include, but are not limited to:
diaspora, sexuality, "othering," silencing, persona, addiction,
abuse, and so on.
You must choose one story from Group A to write about and
one story from Group B to write about:
Group A: "Negocios" / "Drown"
Group B: "Fiesta, 1980" / "Aguantando" / "Edison, New Jersey"
/ "Aurora"
Your paper must exhibit critical analysis that shies away from
depending on summary. Use evidence from the stories to
substantiate your argument, but do not focus on summarizing
the plot of the stories.
Essay requirements:
· 1500-word minimum (indicate your word count at the end of
2. the paper)
· MLA formatting:12 pt font = TIMES NEW ROMAN
double spaced 1" margins
no space between paragraphs
· Your title should be centered. Do not skip a line between title
and text.
· in-text citations
· Works Cited page
DUE DATE: Sunday, 29 March 11:59 pm (digital copy to
Canvas)
RUBRIC:
· "A": The essay has little to no grammatical mistakes and
follows the conventions of standard academic English. The
essay displays a high degree of critical thinking and planning.
· "B": The essay has a minimal number of grammatical mistakes
and follows the conventions of standard academic English. The
essay displays an above average degree of critical thinking and
planning.
· "C": The essay has a tolerable number of grammatical
mistakes and loosely follows the conventions of standard
academic English. The essay displays an average degree of
critical thinking and planning.
· "D": The essay has an unacceptable number of grammatical
mistakes and barely follows the conventions of standard
academic English. The essay displays a below average degree of
critical thinking and planning.
· "F": The essay fails to attempt to fulfill the prompt in any
way.
DUE DATE: Sunday, 29 March 11:59 pm (digital copy to
Canvas)
Unit IV Power point assignment
Instructions
For this assignment, you will discuss what you have learned in
Unit III and Unit IV by creating a 12-slide PowerPoint
3. presentation that addresses the case studies below.
Based on your reading of the case study “Is Business Ready for
Wearable Computers?” on page 181 of the textbook, address the
prompts below.
· Discuss at least three examples of wearable technology.
· Discuss how wearable technology could change the way the
company you work for or a company you are familiar with
conducts business, and provide an example.
· Discuss at least one advantage and one disadvantage to
wearable technology.
· Discuss how business intelligence (BI) systems are used for
reporting and data analytics.
Based on your reading of the case study “How Reliable Is Big
Data?” on page 246-248 of the textbook, address the prompts
below.
· Explain the term big data in your own words.
· Discuss how the music service Spotify used big data to better
serve its customers.
· Discuss how New York City used big data to reduce crime
rates.
· Discuss at least one ethical or security issue that big data can
pose to individuals.
Based on your reading of the case study “Google, Apple, and
Facebook Battle for Your Internet Experience” on page 290-292
of the textbook, address the prompts below.
· Explain what is meant by mobile technology.
· Discuss how telecommunications and mobile technology
networks are vital to companies and how they are fundamentally
changing organizational strategies.
· Discuss the mobile strategy used by Google, Apple, and
Facebook.
· Discuss at least two challenges posed by the Internet and
networking.
Based on your reading of the case study “How Secure Is the
Cloud?” on page 324 of the textbook, address the prompts
below.
4. · Discuss at least two security threats to cloud data.
· What should companies do to protect cloud data?
· Discuss why both the company and the cloud vendor are
responsible for security.
· Discuss at least one security control that companies can use to
increase security.
· Explain why data management has a tremendous impact on an
organization’s survival.
In formatting your PowerPoint presentation, do not use the
question-and-answer format; instead, use bullets, graphs, and/or
charts in your slides to identify important points, and then
discuss those points in the speaker notes of each slide.
Your PowerPoint presentation must be at at least 12 slides in
length (not counting the title and reference slides). You are
required to use a minimum of three peer-reviewed, academic
sources that are no more than 5 years old (one may be your
textbook). All sources used, including the textbook, must be
referenced; all paraphrased material must have accompanying
in-text citations. One source must be from the CSU Online
Library.
For tips on creating an organized and visually pleasing
presentation, view the PowerPoint Best Practices tutorial. You
can access the transcript for the tutorial by selecting the Notes
tab on the right side of the tutorial.
Is Business Ready for Wearable Computers?
Wearable computing is starting to take off. Smartwatches, smart
glasses, smart ID badges, and activity trackers promise to
change how we go about each day and the way we do our jobs.
According to Gartner Inc., sales of wearables will increase from
275 million units in 2016 to 477 million units by 2020.
Although smartwatches such as the Apple Watch and fitness
trackers have been successful consumer products, business uses
for wearables appear to be advancing more rapidly. A report
5. from research firm Tractica projects that worldwide sales for
enterprise wearables will increase exponentially to 66.4 million
units by 2021.
Doctors and nurses are using smart eyewear for hands-free
access to patients’ medical records. Oil rig workers sport smart
helmets to connect with land-based experts, who can view their
work remotely and communicate instructions. Warehouse
managers are able to capture real-time performance data using a
smartwatch to better manage distribution and fulfillment
operations. Wearable computing devices improve productivity
by delivering information to workers without requiring them to
interrupt their tasks, which in turn empowers employees to
make more-informed decisions more quickly.
Wearable devices are helping businesses learn more about
employees and the everyday workplace than ever before. New
insights and information can be uncovered as IoT sensor data is
correlated to actual human behavior. Information on task
duration and the proximity of one device or employee to
another, when combined with demographic data, can shed light
on previously unidentified workflow inefficiencies.
Technologically sophisticated firms will understand things they
never could before about workers and customers; what they do
every day, how healthy they are, where they go, and even how
well they feel. This obviously has implications for protecting
individual privacy, raising potential employee (and customer)
fears that businesses are collecting sensitive data about them.
Businesses will need to tread carefully.
Global logistics company DHL worked with Ricoh, the imaging
and electronics company, and Ubimax, a wearable computing
services and solutions company, to implement “vision picking”
in its warehouse operations. Location graphics are displayed on
smart glasses guiding staffers through the warehouse to both
speed the process of finding items and reduce errors. The
6. company says the technology delivered a 25 percent increase in
efficiency. Vision picking gives workers locational information
about the items they need to retrieve and allows them to
automatically scan retrieved items. Future enhancements will
enable the system to plot optimal routes through the warehouse,
provide pictures of items to be retrieved (a key aid in case an
item has been misplaced on the warehouse shelves), and instruct
workers on loading carts and pallets more efficiently.
Google has developed Glass Enterprise Edition smart glasses for
business use, with its development partners creating
applications for specific industries such as manufacturing and
healthcare. Glass Enterprise Edition is being touted as a tool for
easing workflows by removing distractions that prevent
employees from remaining engaged and focused on tasks. More
than 50 businesses including Dignity Health, The Boeing
Company, and Volkswagen have been using Glass to complete
their work more rapidly and efficiently.
Duke Energy has been piloting the use of smart glasses, and
sees multiple uses for them. According to Aleksandar
Vukojevic, technology development manager for Duke Energy’s
Emerging Technologies Office, smart glasses can enable
employees working in the field to access training or
instructional videos to help with equipment repairs or upgrades.
The glasses also allow remote management, enabling managers
to capture what a line or transformer worker sees, annotate
images and video with instructions, and send them back out to
workers in the field. Duke also tried out the smart glasses in its
warehouses for stock inventory. As a worker looks at an item
code, it’s automatically recorded against an existing database.
There are some challenges. Locking down data that’s accessed
with smart glasses is essential, as with any other mobile device
used in the enterprise. Today’s smart glasses haven’t been
designed with security in mind. The sensors in the smart glasses
7. are also not as accurate as other products. A field worker using
smart glasses to locate a breaker or other device might be off by
10 or 15 feet using Google’s GPS instead of a military-grade
solution more common to the energy industry, which can locate
equipment to within one centimeter. Additionally, smart glasses
don’t necessarily allow safety glasses to be worn over them.
Integrating data from smart glasses with Duke’s internal
databases could prove difficult.
Smart glasses are like smartphones. Without integration with
internal content and the right applications, they would not be so
useful. The value of wearable computing devices isn’t from
transferring the same information from a laptop or smartphone
to a smartwatch or eyeglass display. Rather, it’s about finding
ways to use wearables to augment and enhance business
processes. Successful adoption of wearable computing depends
not only on cost effectiveness but on the development of new
and better apps and integration with existing IT infrastructure
and the organization’s tools for managing and securing mobile
devices (see the chapter-ending case study).
Sources: George Thangadurai, “Wearables at Work: Why
Enterprise Usage Is Outshining Consumer Usage,” IoT Agenda,
March 8, 2018; Josh Garrett, “Wearables: The Next Wave of
Enterprise IoT?” IoT Agenda, February 1, 2018; and Lucas
Mearian, “Is Google Glass Really Ready for the Enterprise?”
Computerworld, August 1, 2017.
How Secure Is the Cloud?
Over the last several years, many companies have altered their
IT strategies to shift an increasing share of their applications
and data to public-cloud infrastructure and platforms. However,
using the public cloud disrupts traditional cybersecurity models
that many companies have built up over years. As a result, as
companies make use of the public cloud, they need to revise
8. their cybersecurity practices in order to consume public-cloud
services in a way that enables them both to protect critical data
and to fully exploit the speed and agility that these services
provide.
Managing security and privacy for cloud services is similar to
managing traditional IT infrastructures. However, the risks may
be different because some, but not all, responsibilities shift to
the cloud service provider. The category of cloud service (IaaS,
PaaS, or SaaS) affects exactly how these responsibilities are
shared. For IaaS, the provider typically supplies and is
responsible for securing basic IT resources such as machines,
storage systems, and networks. The cloud services customer is
typically responsible for its operating system, applications, and
corporate data placed into the cloud computing environment.
This means that most of the responsibility for securing the
applications and the corporate data falls on the customer.
Cloud service customers should carefully review their cloud
services agreement with their cloud provider to make sure their
applications and data hosted in cloud services are secured in
accordance with their security and compliance policies. But
that’s not all. Although many organizations know how to
manage security for their own data center—they’re unsure of
exactly what they need to do when they shift computing work to
the cloud. They need new tool sets and skill sets to manage
cloud security from their end to configure and launch cloud
instances, manage identity and access controls, update security
controls to match configuration changes, and protect workloads
and data. There’s a misconception among many IT departments
that whatever happens in the cloud is not their responsibility. It
is essential to update security requirements developed for
enterprise data centers to produce requirements suitable for the
use of cloud services. Organizations using cloud services often
need to apply additional controls at the user, application, and
data level.
9. Cloud service providers have made great strides in tightening
security for their areas of responsibility. Amazon’s security for
its cloud service leaves little to chance. The company keeps
careful constraints around its staff, watches what they do every
day, and instructs service teams to restrict access to data
through tooling and automation. Amazon also rotates security
credentials for authentication and verification of identity and
changes them frequently—sometimes in a matter of hours.
The biggest threats to cloud data for most companies involve
lack of software patching or misconfiguration. Many
organizations have been breached because they neglected to
apply software patches to newly identified security
vulnerabilities when they became available or waited too long
to do so. (See the discussion of patch management earlier in this
chapter.) Companies have also experienced security breaches
because they did not configure aspects of cloud security that
were their responsibility. Some users forget to set up AWS
bucket password protection. (A bucket is a logical unit of
storage in Amazon Web Services [AWS] Simple Storage
Solution
S3 storage service. Buckets are used to store objects, which
consist of data and metadata that describes the data.) Others
don’t understand basic security features in Amazon such as
resource-based access policies (access control lists) or bucket
permissions checks, unwittingly exposing data to the public
Internet.
10. Financial publisher Dow Jones & Co. confirmed reports in July
2017 that it may have publicly exposed personal and financial
information of 2.2 million customers, including subscribers to
The Wall Street Journal and Barron’s. The leak was traced back
to a configuration error in a repository in AWS S3 security.
Dow Jones had intended to provide semi-public access to select
customers over the Internet. However, it wound up granting
access to download the data via a URL to “authenticated users,”
which included anyone who registered (for free) for an AWS
account. Accenture, Verizon, Viacom, Tesla, and Uber
Technologies are other high-profile names in the steady stream
of companies that have exposed sensitive information via AWS
S3 security misconfigurations. Such misconfigurations were
often performed by employees who lacked security experience
when security configurations should have been handled by
skilled IT professionals. Stopping AWS bucket
misconfigurations may also require enacting policies that limit
the damage caused by careless or untrained employees.
Although customers have their choice of security configurations
for the cloud, Amazon has been taking its own steps to prevent
misconfigurations. In November 2017, the company updated its
AWS dashboard, encasing public in bright orange on the AWS
S3 console so that cloud customers could easily see the status of
access permissions to buckets and their objects. This helps
11. everyone see more easily when an Amazon S3 bucket is open to
the public. Amazon also added default encryption to all objects
when they are stored in an AWS bucket and access control lists
for cross-region replication. Another new tool called Zelkova
examines AWS S3 security policies to help users identify which
one is more permissive than the others. Amazon Macie is a
managed service that uses machine learning to detect personally
identifiable information and intellectual property, and has been
available for S3 since August 2017.
Sources: Kathleen Richards, “New Cloud Threats as Attackers
Embrace the Power of the Cloud,” SearchCloudSecurity.com,
April 3, 2018; “AWS S3 Security Falls Short at High-profile
Companies,” SearchCloudSecurity.com, April 2018; “Making a
Secure Transition to the Public Cloud,” McKinsey & Company,
January 2018; and “Security for Cloud Computing: Ten Steps to
Ensure Success,” Cloud Standards Customer Council, December
2017.
Google, Apple, and Facebook Battle for Your Internet
Experience
Three Internet titans—Google, Apple, and Facebook—are in an
epic struggle to dominate your Internet experience, and caught
in the crossfire are search, music, video, and other media along
12. with the devices you use for all of these things. Mobile devices
with advanced functionality and ubiquitous Internet access are
rapidly overtaking traditional desktop machines as the most
popular form of computing. Today, people spend more than half
their time online using mobile devices that take advantage of a
growing cloud of computing capacity. It’s no surprise, then, that
today’s tech titans are aggressively battling for control of this
brave new online world.
Apple, which started as a personal computer company, quickly
expanded into software and consumer electronics. Since
upending the music industry with its iPod MP3 player, and the
iTunes digital music service, Apple took mobile computing by
storm with the iPhone, iPod Touch, and iPad. Now Apple wants
to be the computing platform of choice for the Internet.
Apple’s competitive strength is based not on its hardware
platform alone but on its superior user interface and mobile
software applications, in which it is a leader. Apple’s App Store
offers more than 2 million apps for mobile and tablet devices.
Applications greatly enrich the experience of using a mobile
device, and whoever creates the most appealing set of devices
and applications will derive a significant competitive advantage
over rival companies. Apps are the new equivalent of the
traditional browser.
13. Apple thrives on its legacy of innovation. In 2011, it unveiled
Siri (Speech Interpretation and Recognition Interface), a
combination search/navigation tool and personal assistant. Siri
promises personalized recommendations that improve as it gains
user familiarity—all from a verbal command. Google countered
by quickly releasing its own AI tool, Google Now. Facebook
has developed an intelligent assistant called M.
Apple faces strong competition for its phones and tablets both
in the United States and in developing markets like China from
inexpensive Chinese smartphones and from Samsung Android
phones that have larger screens and lower prices. iPhone sales
have started to slow, but Apple is not counting on hardware
devices alone for future growth. Services have always played a
large part in the Apple ecosystem, and they have emerged as a
major revenue source. Apple has more than 1.3 billion active
devices in circulation, creating a huge installed base of users
willing to purchase services and a source of new revenue
streams. Apple’s services business, which includes Apple’s
music (both downloads and subscriptions), video sales and
rentals, books, apps (including in-app purchases, subscriptions
and advertising), iCloud storage, and payments, has been
growing at a double-digit rate.
14. As Apple rolls out more gadgets, such as the Watch and
HomePod, its services revenue will continue to expand and
diversify. According to CEO Tim Cook, Apple has become one
of the largest service businesses in the world. This service-
driven strategy is not without worry because both Google and
Facebook offer stiff competition in the services area.
Google continues to be the world’s leading search engine,
accounting for about 75 percent of web searches from laptop
and desktop devices and over 90 percent of the mobile search
market. (Google is also the default search engine for the
iPhone). About 84 percent of the revenue from Google’s parent
company Alphabet comes from ads, most of them on Google’s
search engine. Google dominates online advertising. However,
Google is slipping in its position as the gateway to the Internet.
New search startups focus on actions and apps instead of the
web. Facebook has become an important gateway to the web as
well. In 2005, Google had purchased the Android open source
mobile operating system to compete in mobile computing.
Google provides Android at no cost to smartphone
manufacturers, generating revenue indirectly through app
purchases and advertising. Many different manufacturers have
adopted Android as a standard. In contrast, Apple allows only
its own devices to use its proprietary operating system, and all
the apps it sells can run only on Apple products. Android is
15. deployed on over 80 percent of smartphones worldwide; is the
most common operating system for tablets; and runs on watches,
car dashboards, and TVs—more than 4,000 distinct devices.
Google wants to extend Android to as many devices as possible.
Google’s Android could gain even more market share in the
coming years, which could be problematic for Apple as it tries
to maintain customer loyalty and keep software developers
focused on the iOS platform. Whoever has the dominant
smartphone operating system will have control over the apps
where smartphone users spend most of their time and built-in
channels for serving ads to mobile devices. Although Google
search technology can’t easily navigate the mobile apps where
users are spending most of their time, Google is starting to
index the content inside mobile apps and provide links pointing
to that content featured in Google’s search results on
smartphones. Since more than half of global search queries
come from mobile devices, the company revised its search
algorithms to add “mobile friendliness” to the 200 or so factors
it uses to rank websites on its search engine. This favors sites
that look good on smartphone screens. The cost-per-click paid
for mobile ads has trailed desktop ads, but the gap between
computer and mobile ads fees is narrowing. Google instituted a
design change to present a cleaner mobile search page.
16. Seven Google products and services, including Search,
YouTube, and Maps, have more than a billion users each. The
Android operating system software has over 2 billion monthly
active users. Google’s ultimate goal is to knit its services and
devices together so that Google users will interact with the
company seamlessly all day long and everyone will want to use
Google. Much of Google’s efforts to make its search and related
services more powerful and user-friendly in the years ahead are
based on the company’s investments in artificial intelligence
and machine learning (see Chapter 11). These technologies
already have been implemented in applications such as voice
search, Google Translate, and spam filtering. The goal is to
evolve search into more of a smart assistance capability, where
computers can understand what people are saying and respond
conversationally with the right information at the right moment.
Allo is a smart messaging app for iOS and Android that can
learn your texting patterns over time to make conversations
more expressive and productive. It suggests automatic replies to
incoming messages, and you can get suggestions and even book
a restaurant reservation without leaving the chat. Google
Assistant is meant to provide a continuing, conversational
dialogue between users and the search engine.
Facebook is the world’s largest social networking service, with
over 2 billion monthly active users. People use Facebook to stay
17. connected with their friends and family and to express what
matters most to them. Facebook Platform enables developers to
build applications and websites that integrate with Facebook to
reach its global network of users and to build personalized and
social products. Facebook is so pervasive and appealing that it
has become users’ primary gateway to the Internet. For a lot of
people, Facebook is the Internet. Whatever they do on the
Internet is through Facebook.
Facebook has persistently worked on ways to convert its
popularity and trove of user data into advertising dollars, with
the expectation that these dollars will increasingly come from
mobile smartphones and tablets. As of early 2018, over 95
percent of active user accounts worldwide accessed the social
network via smartphone. Facebook ads allow companies to
target its users based on their real identities and expressed
interests rather than educated guesses derived from web-
browsing habits and other online behavior.
At the end of the first quarter of 2018, 98 percent of Facebook’s
global revenue came from advertising, and 89 percent of that ad
revenue was from mobile advertising. Many of those ads are
highly targeted by age, gender, and other demographics.
Facebook is now a serious competitor to Google in the mobile
ad market and is even trying to compete with emerging mobile
18. platforms. Together, Facebook and Google dominate the digital
ad industry and have been responsible for almost all of its
growth. Facebook has overhauled its home page to give
advertisers more opportunities and more information with which
to target markets. The company is expanding advertising in
products such as the Instagram feed, Stories, WhatsApp,
Facebook Watch, and Messenger, although the majority of ad
revenue still comes from its news feed. Facebook has its own
personalized search tool to challenge Google’s dominance of
search. Facebook CEO Mark Zuckerberg is convinced that
social networking is the ideal way to use the web and to
consume all of the other content people might desire, including
news and video. That makes it an ideal marketing platform for
companies. But he also knows that Facebook can’t achieve long-
term growth and prosperity based on social networking alone.
During the past few years Facebook has moved into virtual
reality, messaging, video, and more.
Facebook is challenging YouTube as the premier destination for
personal videos, developing its own TV programming, and
making its messages “smarter” by deploying chatbots. Chatbots
are stripped-down software agents that understand what you
type or say and respond by answering questions or executing
tasks, and they run in the background of Facebook’s Messenger
service (see Chapter 11). Within Facebook Messenger, you can
19. order a ride from Uber, get news updates, check your flight
status, or use augmented reality to imagine what a new Nike
sneaker looks like by superimposing a 3-D model of that
sneaker atop images or video. A new standalone app will allow
users to stream videos in their news feed through set-top boxes
such as Apple Inc.’s Apple TV and Amazon.com Inc.’s Fire TV,
as well as Samsung Internet-connected TVs.
Zuckerberg has said that he intends to help bring the next
billion people online by attracting users in developing countries
with affordable web connectivity. Facebook has launched
several services in emerging markets, such as the Free Basics
service designed to get people online so they can explore web
applications, including its social network. Facebook wants to
beam the Internet to underserved areas through the use of
drones and satellites along with other technologies. Zuckerberg
thinks that Facebook could eventually be an Internet service
provider to underserved areas.
Monetization of personal data drives both Facebook and
Google’s business models. However, this practice also threatens
individual privacy. The consumer surveillance underlying
Facebook and Google’s free services has come under siege from
users, regulators, and legislators on both sides of the Atlantic.
Calls for restricting Facebook and Google’s collection and use
20. of personal data have gathered steam, especially after recent
revelations about Russian agents trying to use Facebook to sway
American voters and Facebook’s uncontrolled sharing of user
data with third-party companies (see the Chapter 4 ending case
study). Both companies will have to come to terms with the
European Union’s new privacy law, called the General Data
Protection Regulation (GDPR), that requires companies to
obtain consent from users before processing their data, and
which may inspire more stringent privacy legislation in the
United States. Business models that depend less on ads and
more on subscriptions have been proposed, although any effort
to curb the use of consumer data would put the business model
of the ad-supported Internet—and possibly Facebook and
Google—at risk. Apple emphasizes its privacy protection
features and does not share customer data with others.
These tech giants are also being scrutinized for monopolistic
behavior. In the United States, Google drives 89 percent of
Internet search, 95 percent of young adults on the Internet use a
Facebook product, and Google and Apple provide 99 percent of
mobile phone operating systems. Critics have called for
breaking up these mega-companies or regulating them as
Standard Oil and AT&T once were. In July 2018 European
regulators fined Google $5 billion for forcing cellphone makers
that use the company’s Android operating system to install
21. Google search and browser apps. Have these companies become
so large that they are squeezing consumers and innovation?
How governments answer this question will also affect how
Apple, Google, and Facebook will fare and what kind of
Internet experience they will be able to provide.
Sources: Associated Press, “EU Fines Google a Record $5
Million over Mobile Practices,” July 18, 2018; Christopher
Mims, “How Apps, Music and More Can Buoy Apple Beyond
the iPhone,” Wall Street Journal, February 4, 2018; “Search
Engine Market Share,” www.netmarketshare.com, accessed
April 16, 2018; “Facebook’s Advertising Revenue Worldwide
from 2009 to 2017 (in Million U.S. Dollars),” statista.com,
accessed April 17, 2018; David Streitfeld, Natasha Singer, and
Steven Erlanger, “How Calls for Privacy May Upend Business
for Facebook and Google,” New York Times, March 24, 2018;
Natasha Singer, “Timeline: Facebook and Google Under
Regulators’ Glare,” New York Times, March 24, 2018; David
Streitfeld, “Google Wants to Be Everywhere with Everyone,”
New York Times, May 17, 2017; Tim Bajarin, “Learning This 1
Thing Helped Me Understand Apple’s Strategy,” Time, April 3,
2017; and Mathew Ingram, “How Google and Facebook Have
Taken Over the Digital Ad Industry,” Fortune, January 4, 2017.
How Reliable Is Big Data?
22. Today’s companies are dealing with an avalanche of data from
social media, search, and sensors, as well as from traditional
sources. According to one estimate, 2.5 quintillion bytes of data
per day are generated around the world. Making sense of “big
data” to improve decision making and business performance has
become one of the primary opportunities for organizations of all
shapes and sizes, but it also represents big challenges.
Businesses such as Amazon, YouTube, and Spotify have
flourished by analyzing the big data they collect about customer
interests and purchases to create millions of personalized
recommendations. A number of online services analyze big data
to help consumers, including services for finding the lowest
price on autos, computers, mobile phone plans, clothing, airfare,
hotel rooms, and many other types of goods and services. Big
data is also providing benefits in sports (see the chapter-
opening case), education, science, health care, and law
enforcement.
Analyzing billions of data points collected on patients,
healthcare providers, and the effectiveness of prescriptions and
treatments has helped the UK National Health Service (NHS)
save about 581 million pounds (U.S. $784 million). The data are
housed in an Oracle Exadata Database Machine, which can
23. quickly analyze very large volumes of data (review this
chapter’s discussion of analytic platforms). NHS has used its
findings from big data analysis to create dashboards identifying
patients taking 10 or more medications at once, and which
patients are taking too many antibiotics. Compiling very large
amounts of data about drugs and treatments given to cancer
patients and correlating that information with patient outcomes
has helped NHS identify more effective treatment protocols.
New York City analyzes all the crime-related data it collects to
lower the crime rate. Its CompStat crime-mapping program uses
a comprehensive citywide database of all reported crimes or
complaints, arrests, and summonses in each of the city’s 76
precincts to report weekly on crime complaint and arrest
activity at the precinct, patrol borough, and citywide levels.
CompStat data can be displayed on maps showing crime and
arrest locations, crime hot spots, and other relevant information
to help precinct commanders quickly identify patterns and
trends and deploy police personnel where they are most needed.
Big data on criminal activity also powers New York City’s
Crime Strategies Unit, which targets the worst offenders for
aggressive prosecution. Healthcare companies are currently
analyzing big data to determine the most effective and
economical treatments for chronic illnesses and common
diseases and provide personalized care recommendations to
24. patients.
There are limits to using big data. A number of companies have
rushed to start big data projects without first establishing a
business goal for this new information or key performance
metrics to measure success. Swimming in numbers doesn’t
necessarily mean that the right information is being collected or
that people will make smarter decisions. Experts in big data
analysis believe too many companies, seduced by the promise of
big data, jump into big data projects with nothing to show for
their efforts. They start amassing mountains of data with no
clear objective or understanding of exactly how analyzing big
data will achieve their goal or what questions they are trying to
answer. Organizations also won’t benefit from big data that has
not been properly cleansed, organized, and managed—think data
quality.
Just because something can be measured doesn’t mean it should
be measured. Suppose, for instance, that a large company wants
to measure its website traffic in relation to the number of
mentions on Twitter. It builds a digital dashboard to display the
results continuously. In the past, the company had generated
most of its sales leads and eventual sales from trade shows and
conferences. Switching to Twitter mentions as the key metric to
measure changes the sales department’s focus. The department
25. pours its energy and resources into monitoring website clicks
and social media traffic, which produce many unqualified leads
that never lead to sales.
Although big data is very good at detecting correlations,
especially subtle correlations that an analysis of smaller data
sets might miss, big data analysis doesn’t necessarily show
causation or which correlations are meaningful. For example,
examining big data might show that from 2006 to 2011 the
United States murder rate was highly correlated with the market
share of Internet Explorer, since both declined sharply. But that
doesn’t necessarily mean there is any meaningful connection
between the two phenomena. Data analysts need some business
knowledge of the problem they are trying to solve with big data.
Big data predictive models don’t necessarily give you a better
idea of what will happen in the future. Meridian Energy Ltd., an
electricity generator and distributor operating in New Zealand
and Australia, moved away from using an aging predictive
equipment maintenance system. The software was supposed to
predict the maintenance needs of all the large equipment the
company owns and operates, including generators, wind
turbines, transformers, circuit breakers, and industrial batteries.
However, the system used outdated modeling techniques and
could not actually predict equipment failures. It ran simulations
26. of different scenarios and predicted when assets would fail the
simulated tests. The recommendations of the software were
useless because they did not accurately predict which pieces of
equipment actually failed in the real world. Meridian eventually
replaced the old system with IBM’s Predictive Maintenance and
Quality software, which bases predictions on more real-time
data from equipment.
All data sets and data-driven forecasting models reflect the
biases of the people selecting the data and performing the
analysis. Several years ago, Google developed what it thought
was a leading-edge algorithm using data it collected from web
searches to determine exactly how many people had influenza
and how the disease was spreading. It tried to calculate the
number of people with flu in the United States by relating
people’s location to flu-related search queries on Google.
Google consistently overestimated flu rates, when compared to
conventional data collected afterward by the U.S. Centers for
Disease Control (CDC). Several scientists suggested that
Google was “tricked” by widespread media coverage of that
year’s severe flu season in the United States, which was further
amplified by social media coverage. The model developed for
forecasting flu trends was based on a flawed assumption—that
the incidence of flu-related searches on Googles was a precise
indicator of the number of people who actually came down with
27. the flu. Google’s algorithm only looked at numbers, not the
context of the search results.
In addition to election tampering by hostile nations, insufficient
attention to context and flawed assumptions may have played a
role in the failure of most political experts to predict Donald
Trump’s victory over Hillary Clinton in the 2016 presidential
election. Trump’s victory ran counter to almost every major
forecast, which had predicted Clinton’s chances of winning to
be between 70 to 99 percent.
Tons of data had been analyzed by political experts and the
candidates’ campaign teams. Clinton ran an overwhelmingly
data-driven campaign, and big data had played a large role in
Obama’s victories in 2008 and 2012. Clinton’s team added to
the database the Obama campaigns had built, which connected
personal data from traditional sources, such as reports from
pollsters and field workers, with other data from social media
posts and other online behavior as well as data used to predict
consumer behavior. The Clinton team assumed that the same
voters who supported Obama would turn out for their candidate,
and focused on identifying voters in areas with a likelihood of
high voter turnout. However, turnout for Clinton among the key
groups who had supported Obama—women, minorities, college
graduates, and blue-collar workers—fell short of expectations.
28. (Trump had turned to big data as well, but put more emphasis
on tailoring campaign messages to targeted voter groups.)
Political experts were misled into thinking Clinton’s victory
was assured because some predictive models lacked context in
explaining potentially wide margins of error. There were
shortcomings in polling, analysis, and interpretation, and
analysts did not spend enough time examining how the data
used in the predictive models were created. Many polls used in
election forecasts underestimated the strength of Trump’s
support. State polls were inaccurate, perhaps failing to capture
Republicans who initially refused to vote for Trump and then
changed their minds at the last moment. Polls from Wisconsin
shortly before the election had put Clinton well ahead of Trump.
Polls are important for election predictions, but they are only
one of many sources of data that should be consulted. Predictive
models were unable to fully determine who would actually turn
out to vote as opposed to how people thought they would vote.
Analysts overlooked signs that Trump was forging ahead in the
battleground states. Britain had a similar surprise when polls
mistakenly predicted the nation would vote in June 2016 to stay
in the European Union.
And let’s not forget that big data poses some challenges to
information security and privacy. As Chapter 4 pointed out,
29. companies are now aggressively collecting and mining massive
data sets on people’s shopping habits, incomes, hobbies,
residences, and (via mobile devices) movements from place to
place. They are using such big data to discover new facts about
people, to classify them based on subtle patterns, to flag them
as “risks” (for example, loan default risks or health risks), to
predict their behavior, and to manipulate them for maximum
profit.
When you combine someone’s personal information with pieces
of data from many different sources, you can infer new facts
about that person (such as the fact that they are showing early
signs of Parkinson’s disease, or are unconsciously drawn toward
products that are colored blue or green). If asked, most people
might not want to disclose such information, but they might not
even know such information about them exists. Privacy experts
worry that people will be tagged and suffer adverse
consequences without due process, the ability to fight back, or
even knowledge that they have been discriminated against.
Sources: Linda Currey Post, “Big Data Helps UK National
Health Service Lower Costs, Improve Treatments,” Forbes,
February 7, 2018; Michael Jude, “Data Preparation Is the Key to
Big Data Success,” InfoWorld, February 8, 2018; Rajkumar
Venkatesan and Christina Black, “Using Big Data: 3 Reasons It
30. Fails and 4 Ways to Make It Work,” University of Virginia
Darden School of Business Press Release, February 8, 3018; Ed
Burns, “When Predictive Models Are Less Than Presidential,”
Business Information, February 2017; Aaron Timms, “Is Donald
Trump’s Surprise Win a Failure of Big Data? Not Really,”
Fortune, November 14, 2016; Steve Lohr and Natasha Singer,
“The Data Said Clinton Would Win. Why You Shouldn’t Have
Believed It,” New York Times, November 10, 2016; Nicole
Laskowski and Niel Nikolaisen: “Seven Big Data Problems and
How to Avoid Them,” TechTarget Inc., 2016; Joseph
Stromberg, “Why Google Flu Trends Can’t Track the Flu
(Yet),” smithsonianmag.com, March 13, 2014; and Gary Marcus
and Ernest Davis, “Eight (No, Nine!) Problems With Big Data,”
New York Times, April 6, 2014.