Task
You are required to prepare for this Assessment Item by:
1. READING the Subject outline,
2. COMPLETING Topic 2 Project Planning
3. BUILDING your PLAN up from the ProjectTitle and Abstract in Assessment Task 1
WHAT TO DO:
1. Follow the Study Schedule and work with the Topics in Interact as they provide a "scaffold" for your learning in this subject.
2. Develop a detailed Capstone Project Proposal and Plan using project management software (as listed in the Study Schedule) and the skills you have acquired from IT Project Management to develop a project plan with a Work Breakdown Structure (WBS), milestones and Gantt chart. These tools may help.
1. MicrosoftProject Pro (http://office.microsoft.com/en-au/project/);
2. Open source tools like GanttProject (http://www.ganttproject.biz/);
3. OpenProj(http://sourceforge.net/projects/openproj/)
4. OpenProject (https://www.openproject.org/about).
5. ProjectLibre (http://www.projectlibre.org/)
3. Begin using the 'project blog' as a tool beyond the weekly progress reportsfor your chosen emerging technology topic:
1. The blog helps you to "think by writing" and also store your notes, project files and links in a cloud-based service.
2. Consider sharing the site with your peers as a way to tell a story and harness each other’s knowledge.
4. The blog is ideally updated each week with 3 or 4 entries for documenting your project notes and as the foundation for editing and writing the Capstone Project Report. An ideal blog entry will have around 50-150 words (150-600 words a week).
Presentation
Project Plan Sample Format
(subject to change or modified to include systems development projects)
1. Title: Emerging Technology and Innovation Topic
1. Project Blog ( Web address provided)
2. Weekly Progress Reports Plan (In class, Discussion Board or Project Blog entries)
2. Rationale
1. Problem domain
2. Purpose and justification
3. Supervisor Approval
4. Research Questions
5. Conceptual or Theoretical Framework
6. Methodology
1. Analysis of sources of information (EndNote, APA Referencing Style)
2. Research method(s)
3. Data collection or systems design methods
4. Ethical Issues
5. Compliance Requirements (Workplace, Industry or Government regulations)
7. Project Plan
1. Deliverables (Annotated Bibliography, Journal Paper, Report, Seminar)
2. Work breakdown structure (WBS)
3. Risk Analysis
4. Duration
5. Gantt chart
8. References
9. Appendix (if required)
Final project
Formulating Strategic Management Decisions
This final project is based on the following Harvard Business case study:
Khachatryan, D. (2014). Amarcord Incorporated: Combating money laundering using data analytics. Harvard Business Case Study. Retrieved from https://hbsp.harvard.edu/tu/789925b5
Assume your client accepted your urgent business proposal to design a data-driven approach to effectively accomplish the goal of fraud detection in financial institutions. Data analytics for fraud detection in financial institutions is the strat.
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
Term Paper: Managing an IT Infrastructure Audit
Due Week 10 and worth 210 points
This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan.
You must submit all four (4) sections as separate files for the completion of this assignment.
Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.
Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits. At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.
In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:
They have a main office and 268 stores in the U.S.
They utilize a cloud computing environment for storage and applications.
Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
They have over 1000 desktops and approximately 500 organization-owned laptops in the main headquarters.
They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.
They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
They enable wireless access at the main office and the stores.
They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate Website.
Section 1: Internal IT Audit Policy
Write a three to four (3-4) page paper in which you:
1. Develop an Internal IT Audit Policy, which includes at a minimum:
a. Overview
b. Scope
c. Goals and objectives
d. Compliance with applicable laws and regulations
e. Management oversight and responsibility
f. Areas covered in the IT audits
g. Frequency of the audits
h. Use at least two (2) quality resources in this assignment.
Note
: Wikipedia and similar Websites do not qualify as quality resources.
Section 2: Management Plan
Write a four to six (4-6) page paper in which you:
2. Explain the management plan for conducting IT audits, including:
a. Risk management
b. System Software and Applications
c. Wireless Networking
...
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
erm Paper: Managing an IT Infrastructure Audit
Due Week 10 and worth 210 points
This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan.
You must submit all four (4) sections as separate files for the completion of this assignment.
Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.
Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits. At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.
In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:
They have a main office and 268 stores in the U.S.
They utilize a cloud computing environment for storage and applications.
Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
They have over 1000 desktops and approximately 500 organization-owned laptops in the main headquarters.
They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.
They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
They enable wireless access at the main office and the stores.
They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate Website.
Section 1: Internal IT Audit Policy
Write a three to four (3-4) page paper in which you:
1. Develop an Internal IT Audit Policy, which includes at a minimum:
a. Overview
b. Scope
c. Goals and objectives
d. Compliance with applicable laws and regulations
e. Management oversight and responsibility
f. Areas covered in the IT audits
g. Frequency of the audits
h. Use at least two (2) quality resources in this assignment.
Note
: Wikipedia and similar Websites do not qualify as quality resources.
Section 2: Management Plan
Write a four to six (4-6) page paper in which you:
2. Explain the management plan for conducting IT audits, including:
a. Risk management
b. System Software and Applications
c. Wireless Networking
d ...
Project Deliverable 2 Business Requirements1Project Deliverab.docxwkyra78
Project Deliverable 2: Business Requirements 1
Project Deliverable 2: Business Requirements 3
Project Deliverable 2: Business Requirements
Jessica Hill
Dr. Jan Felton
CIS 590: Directed Research Project
February 1, 2015
Table of Contents
1 Business Requirements……………………………………………………………….………3
1.1 Project Overview…………………………………………………………………….........3
1.2 Background including current process…………………………………………….3
1.3 Scope………………………………………………………………………………3
1.3.1 Scope of Project……………………………………………………….........4
1.3.2 Constraints and Assumptions……………………………………….............5
1.3.3. Risks…………………………………………………………………..........5
1.3.4. Scope Control ………………………………………………………………5
1.3.5. Relationship to Other Systems/Projects ……………………………………6
1.3.6. Definition of Terms (if applicable)………………………………………...6
1.1 Project Overview
This project is an information Technology project that was requested by WebFOCUS Company. The project is a development of a secure website that offers online advertisements, sharing, collection and storage of visual tools. The Website should be hosted in a cloud environment and should provide database functions for use in data warehousing
1.2 Background including current process
WebFOCUS was developed in order to generate profit through online advertisements as well as offshoring and outsourcing of business operations. Currently the business uses the relational database analysis. The company’s website in operated on both Windows and Mac OS X operating systems. In order to enhance virtualization, the company is seeking cloud computing services as well as data warehousing for data analysis purposes.
The project goals include;
a. Generation of profit through the charges on advertisement
b. Integration of database and operating systems in employee management.
c. Outsourcing work at a reduced cost (Olsen, 2006)
d. Developing a secure network infrastructure
e. The use of cloud computing to handle and share data
Tasks
a. Develop a website for advertisement
b. Install security measures
c. Integrate the website with cloud computing functionalities
d. Develop the outsourcing functionalities within the website
1.3 Scope
The scope of this project involves the determination and documentation of the project goals, deliverable, tasks, the cost and the deadlines.
1.3.1 Scope of the Project
Project Deliverables:
Scope Statement: This statement outlines the major activities to be carried out within the time allocated for the project. The scope statement’s goal is the financial analysis and financial documents regarding the operation of the project. The cost incurred and the revenue generated can be compared to observe the progress of the project.
Progress Reports: These include the process and the stages at which the project is undergoing. For the development of secure network infrastructure, the progress report deliverables would be network firewall types, authenticati ...
Cis 599 Enthusiastic Study / snaptutorial.comStephenson7
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 120 points
This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Business RequirementsReference number Document ControlTawnaDelatorrejs
Business Requirements
Reference number:
Document Control
Change Record
Date
Author
Version
Change Reference
Reviewers
Name
Position
Table of Contents
2Document Control
1
Business Requirements
4
1.1
Project Overview
4
1.2
Background including current process
4
1.3
Scope
4
1.3.1
Scope of Project
4
1.3.2
Constraints and Assumptions
5
1.3.3
Risks
5
1.3.4
Scope Control
5
1.3.5
Relationship to Other Systems/Projects
5
1.3.6
Definition of Terms (if applicable)
5
1 Business Requirements
1.1 Project Overview
Provide a short, yet complete, overview of the project.
1.2 Background including current process
Describe the background to the project, (same section may be reused in the Quality Plan) include:
This project is
The project goal is to
The IT role for this project is
1.3 Scope
1.3.1 Scope of Project
The scope of this project includes a number of areas. For each area, there should be a corresponding strategy for incorporating these areas into the overall project.
Applications
In order to meet the target production date, only these applications will be implemented:
Sites
These sites are considered part of the implementation:
Process Re-engineering
Re-engineering will
Customization
Customizations will be limited to
Interfaces
the interfaces included are:
Architecture
Application and Technical Architecture will
Conversion
Only the following data and volume will be considered for conversion:
Testing
Testing will include only
Funding
Project funding is limited to
Training
Training will be
Education
Education will include
1.3.2 Constraints and Assumptions
The following constraints have been identified:
The following assumptions have been made in defining the scope, objectives and approach:
1.3.3 Risks
The following risks have been identified as possibly affecting the project during its progression:
1.3.4 Scope Control
The control of changes to the scope identified in this document will be managed through the Change Control, with business owner representative approval for any changes that affect cost or timeline for the project.
1.3.5 Relationship to Other Systems/Projects
It is the responsibility of the business unit to inform IT of other business initiatives that may impact the project. The following are known business initiatives:
1.3.6 Definition of Terms (if applicable)
List any definitions that will be used throughout the duration of the project.
5
Project Deliverable 1: Project Plan Inception
Overview
This assignment consists of two sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and/or assume all necessary assumptions needed for the completion of this assignment.
You are currently the Chief Information Officer (CIO) for an innovative Internet-based compa ...
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 50 points
This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan.You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
Term Paper: Managing an IT Infrastructure Audit
Due Week 10 and worth 210 points
This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan.
You must submit all four (4) sections as separate files for the completion of this assignment.
Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.
Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits. At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.
In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:
They have a main office and 268 stores in the U.S.
They utilize a cloud computing environment for storage and applications.
Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
They have over 1000 desktops and approximately 500 organization-owned laptops in the main headquarters.
They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.
They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
They enable wireless access at the main office and the stores.
They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate Website.
Section 1: Internal IT Audit Policy
Write a three to four (3-4) page paper in which you:
1. Develop an Internal IT Audit Policy, which includes at a minimum:
a. Overview
b. Scope
c. Goals and objectives
d. Compliance with applicable laws and regulations
e. Management oversight and responsibility
f. Areas covered in the IT audits
g. Frequency of the audits
h. Use at least two (2) quality resources in this assignment.
Note
: Wikipedia and similar Websites do not qualify as quality resources.
Section 2: Management Plan
Write a four to six (4-6) page paper in which you:
2. Explain the management plan for conducting IT audits, including:
a. Risk management
b. System Software and Applications
c. Wireless Networking
...
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
erm Paper: Managing an IT Infrastructure Audit
Due Week 10 and worth 210 points
This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan.
You must submit all four (4) sections as separate files for the completion of this assignment.
Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.
Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits. At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits.
In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:
They have a main office and 268 stores in the U.S.
They utilize a cloud computing environment for storage and applications.
Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012.
They have over 1000 desktops and approximately 500 organization-owned laptops in the main headquarters.
They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building.
They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners.
They enable wireless access at the main office and the stores.
They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate Website.
Section 1: Internal IT Audit Policy
Write a three to four (3-4) page paper in which you:
1. Develop an Internal IT Audit Policy, which includes at a minimum:
a. Overview
b. Scope
c. Goals and objectives
d. Compliance with applicable laws and regulations
e. Management oversight and responsibility
f. Areas covered in the IT audits
g. Frequency of the audits
h. Use at least two (2) quality resources in this assignment.
Note
: Wikipedia and similar Websites do not qualify as quality resources.
Section 2: Management Plan
Write a four to six (4-6) page paper in which you:
2. Explain the management plan for conducting IT audits, including:
a. Risk management
b. System Software and Applications
c. Wireless Networking
d ...
Project Deliverable 2 Business Requirements1Project Deliverab.docxwkyra78
Project Deliverable 2: Business Requirements 1
Project Deliverable 2: Business Requirements 3
Project Deliverable 2: Business Requirements
Jessica Hill
Dr. Jan Felton
CIS 590: Directed Research Project
February 1, 2015
Table of Contents
1 Business Requirements……………………………………………………………….………3
1.1 Project Overview…………………………………………………………………….........3
1.2 Background including current process…………………………………………….3
1.3 Scope………………………………………………………………………………3
1.3.1 Scope of Project……………………………………………………….........4
1.3.2 Constraints and Assumptions……………………………………….............5
1.3.3. Risks…………………………………………………………………..........5
1.3.4. Scope Control ………………………………………………………………5
1.3.5. Relationship to Other Systems/Projects ……………………………………6
1.3.6. Definition of Terms (if applicable)………………………………………...6
1.1 Project Overview
This project is an information Technology project that was requested by WebFOCUS Company. The project is a development of a secure website that offers online advertisements, sharing, collection and storage of visual tools. The Website should be hosted in a cloud environment and should provide database functions for use in data warehousing
1.2 Background including current process
WebFOCUS was developed in order to generate profit through online advertisements as well as offshoring and outsourcing of business operations. Currently the business uses the relational database analysis. The company’s website in operated on both Windows and Mac OS X operating systems. In order to enhance virtualization, the company is seeking cloud computing services as well as data warehousing for data analysis purposes.
The project goals include;
a. Generation of profit through the charges on advertisement
b. Integration of database and operating systems in employee management.
c. Outsourcing work at a reduced cost (Olsen, 2006)
d. Developing a secure network infrastructure
e. The use of cloud computing to handle and share data
Tasks
a. Develop a website for advertisement
b. Install security measures
c. Integrate the website with cloud computing functionalities
d. Develop the outsourcing functionalities within the website
1.3 Scope
The scope of this project involves the determination and documentation of the project goals, deliverable, tasks, the cost and the deadlines.
1.3.1 Scope of the Project
Project Deliverables:
Scope Statement: This statement outlines the major activities to be carried out within the time allocated for the project. The scope statement’s goal is the financial analysis and financial documents regarding the operation of the project. The cost incurred and the revenue generated can be compared to observe the progress of the project.
Progress Reports: These include the process and the stages at which the project is undergoing. For the development of secure network infrastructure, the progress report deliverables would be network firewall types, authenticati ...
Cis 599 Enthusiastic Study / snaptutorial.comStephenson7
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 120 points
This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Business RequirementsReference number Document ControlTawnaDelatorrejs
Business Requirements
Reference number:
Document Control
Change Record
Date
Author
Version
Change Reference
Reviewers
Name
Position
Table of Contents
2Document Control
1
Business Requirements
4
1.1
Project Overview
4
1.2
Background including current process
4
1.3
Scope
4
1.3.1
Scope of Project
4
1.3.2
Constraints and Assumptions
5
1.3.3
Risks
5
1.3.4
Scope Control
5
1.3.5
Relationship to Other Systems/Projects
5
1.3.6
Definition of Terms (if applicable)
5
1 Business Requirements
1.1 Project Overview
Provide a short, yet complete, overview of the project.
1.2 Background including current process
Describe the background to the project, (same section may be reused in the Quality Plan) include:
This project is
The project goal is to
The IT role for this project is
1.3 Scope
1.3.1 Scope of Project
The scope of this project includes a number of areas. For each area, there should be a corresponding strategy for incorporating these areas into the overall project.
Applications
In order to meet the target production date, only these applications will be implemented:
Sites
These sites are considered part of the implementation:
Process Re-engineering
Re-engineering will
Customization
Customizations will be limited to
Interfaces
the interfaces included are:
Architecture
Application and Technical Architecture will
Conversion
Only the following data and volume will be considered for conversion:
Testing
Testing will include only
Funding
Project funding is limited to
Training
Training will be
Education
Education will include
1.3.2 Constraints and Assumptions
The following constraints have been identified:
The following assumptions have been made in defining the scope, objectives and approach:
1.3.3 Risks
The following risks have been identified as possibly affecting the project during its progression:
1.3.4 Scope Control
The control of changes to the scope identified in this document will be managed through the Change Control, with business owner representative approval for any changes that affect cost or timeline for the project.
1.3.5 Relationship to Other Systems/Projects
It is the responsibility of the business unit to inform IT of other business initiatives that may impact the project. The following are known business initiatives:
1.3.6 Definition of Terms (if applicable)
List any definitions that will be used throughout the duration of the project.
5
Project Deliverable 1: Project Plan Inception
Overview
This assignment consists of two sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and/or assume all necessary assumptions needed for the completion of this assignment.
You are currently the Chief Information Officer (CIO) for an innovative Internet-based compa ...
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 50 points
This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan.You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 50 points
This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan.You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Capstone Project OverviewThe purpose of this capstone project is.docxhumphrieskalyn
Capstone Project Overview
The purpose of this capstone project is for students to assume a senior management approach and apply project management techniques to create an integrative information technology solution to address organizational issues in order to satisfy an executive team and venture capital group. Students will critically assess existing information systems infrastructures, emerging technologies, and how enabling technologies affect organizational strategy. Deliverables 1 through 6 focus on preparing students toward the final capstone project. Skills, experience, and knowledge gained through the completion of prerequisite courses will be used throughout each deliverable. The project contents to be addressed are as follows:
1. Project Deliverable 1: Project Plan Inception.In this deliverable, you will create a project introduction that includes background information of the company, the type of business that the company is involved in, speculation upon outsourcing and offshoring opportunities, identification of skilled information systems personnel need for project, specific types of data that the company collects, and a description of the integrative information systems that the company should have to support the business. You will also create a project plan to record tasks, subtasks, and resources, and identify the schedule of the project. Additionally, the plan will outline the planning, analysis, design, and implementation phases of your project.
Submission Requirements
0. Project Introduction (MS Word)
0. Project Plan (MS Project)
1. Project Deliverable 2: Business Requirements. In this deliverable, you will create an original business requirements document for the project plan using the template provided under Additional Resources in the Student Center tab of the online course shell. You will be asked to describe the detailed project including the scope, possible risks, constraints, and assumptions, integration with other systems and infrastructure, and relevant terms that will be used throughout project. You will also need to update the project plan.
Submission Requirements
0. Business Requirements Document (MS Word)
0. Revised Project Plan (MS Project)
1. Project Deliverable 3: Database and Data Warehousing Design.In this deliverable, you will create a database schema that supports the company’s business and processes, explain and support the database schema, create database tables, normalize the database tables, create an Entity-Relationship (E-R) Diagram and create a Data Flow Diagram (DFD). You will also be asked to create sample queries that will support the organizational reporting needs and screen layouts that illustrate the interface that organizational users will utilize. You will need to update the project plan.
Submission Requirements
0. Design Document (MS Word)
0. Revised Project Plan (MS Project)
1. Project Deliverable 4: Analytics, Interfaces, and Cloud Technology. In this deliverable, you will support t ...
Hospitals currently use a manual system for visiting Doctor Slip as a token. The current system
requires numerous paper forms, with data stores spread throughout the hospital management infrastructure.
Often information (on forms) is incomplete, or does not follow management standards. Forms are often lost
in transit between departments requiring a comprehensive auditing process to ensure that no vital
information is lost. Multiple copies of the same information exist in the hospital and may lead to
inconsistencies in data in various data stores.
A significant part of the operation of any hospital involves the acquisition, management and timely
retrieval of great volumes of information. This information typically involves; Doctor, Room, Department
and Patient personal Information. All of this information must be managed in an efficient and cost wise
fashion so that an institution's resources may be effectively utilized Hospital E-Token management will
automate the management of the hospital making it more efficient and error free for outdoor patient. It aims
at standardizing data, consolidating data ensuring data integrity and reducing inconsistencies.
[Insert project title, e.g. Cosmo Inc.”] Project Scope State.docxgerardkortney
[Insert project title, e.g. “Cosmo Inc.”]: Project Scope Statement[Insert learner name]Capella UniversityProject Scope Statement
Note: Any work not explicitly included in the Project Scope Statement is implicitly excluded from the project.
Project Name
Prepared By
Date
(MM/DD/YYYY)Version History (insert rows as needed):VersionDateComments
1.0
1. Executive Summary
Provide below a brief overview of this project (for example, project purpose and justification).
Note: In any instance where there is a discrepancy between the Project Charter and the Project Scope Statement, the latter is considered authoritative.2. Business Objectives2.1 Product Description (
Solution
)
2.2 Business Objectives
3. Project Description
For each area below, provide sufficient detail to define this project adequately.3.1 Project Scope
Includes (list deliverables):
Does not include:
3.2 Dependencies (External and Internal)
3.3 Assumptions
3.4 Constraints
4. Project MilestonesTarget Date
Project Start
Project Complete
5. Project Approach
Briefly describe how each of the following will be handled. Provide links to relevant documents as appropriate. 5.1 Change Management
5.2 Communication Management
5.3 Quality Management
5.4 Resource Management
5.5 Critical Success Factors
5.6 Risk Management
5.7 Project Organization
6. AuthorizationsThe Project Scope Statement is approved by the:
Project Sponsor
Project Manager
Project performance baseline changes will be approved by the:
Project Sponsor
Project Manager
Project deliverables will be approved and accepted by the:
Project Sponsor
Key Stakeholders
7. Project Scope Statement ApprovalProject Name
Project Manager
The purpose of this document is to provide a vehicle for documenting the initial planning efforts for the project. It is used to reach a satisfactory level of mutual agreement between the Project Manager and the Project Sponsors and Owners with respect to the objectives and scope of the project before significant resources are committed and expenses incurred.
I have reviewed the information contained in this Project Scope Statement and agree:NameRoleSignatureDate
The signatures above indicate an understanding of the purpose and content of this document by those signing it. By signing this document, they agree to this as the formal Project Scope Statement document.
References
2
PM5018 Business Case
PM5018 Business CaseCosmo, Inc.
Cosmo, Inc. is a leader in the development and distribution of wearable technology, including fitness coaching, nutritional coaching, and lifestyle advising products. The company holds a 33-percent market share in the wearable technology category. After doing marketing analysis, senior leadership realizes the onset of competition could negatively impact future earnings.
CEO and President Harold Living tells his leadership Cosmo, Inc. needs a new marketing strategy to not only increase market share but to maintain current le.
CIS 498 Effective Communication - snaptutorial.comdonaldzs1
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 50 points
This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan.
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 110 points
This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both
Cis 499 Enthusiastic Study / snaptutorial.comStephenson05
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 110 points
This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Enterprise Architecture - An Introduction Daljit Banger
The Slides are from my session at "An Evening of Enterprise Architecture Awareness" held at theUniversity of Sussex Hosted by the BCS Local Chapter and facilitated by the BCS EA Specialist Group.
Project NameYour Full NameCourse Number and Name (As i.docxwkyra78
Project Name
Your Full Name
Course Number and Name (As it appears on your Course Guide.)
Professor’s Name (As it appears on your Course Guide.)
University Name (As it appears on the Course Guide.)
Date (Month must be spelled out. Use the date that the paper is due.)
*
*
*
Project Description & ObjectivesDescribe the project in non-technical terms.Describe the project objectives and how the project has met each objective.Explanation #1Explanation #2Explanation #3State the project scope statement. Detail the requirements of the project.Adhere to quality management.
*
*
*
Work Breakdown Structure (WBS)Insert the WBS.Highlight brief task explanation on the slide but explain thoroughly on the speaker notes.
*
Project Schedule and MilestonesCreate timeline.List activity sequences and durations.Indicate the critical path.
*
Project Human Resource ManagementIdentify stakeholders.Indicate the project team matrix (weak, balanced, and strong).Explain how the project team was developed and managed.Identify procurement management, i.e., vendors, contractors, suppliers, etc.
*
Project CostEstablish the approved budget.Identify the cost for the resources.State the cost of the project. (Is it under or over budget?)Note the technology used with associated cost.BenefitsDrawbacks or barriers
*
Project CommunicationsEnsure that all project information is collected, documented, and archived.Distribute and share information with stakeholders, management, and project team members.Identify risks.Qualitative RisksQuantitative Risks
*
Competitive Analysis
*
*
*
Competitive Analysis, Cont.
*
*
*
Procedures
*
*
*
Assumptions, Constraints & DependenciesIdentify the assumptions used to determine the project scope.Evaluate project’s success from these assumptions.Evaluate project’s obstacles from these assumptions.Explain the scope, time, and cost constraints.List any dependencies. Explain.
*
Project Lessons LearnedRecommend methods to avoid similar obstacles in future projects.List of six (6) best practices arising from this project.#1#2#3#4#5#6
*
Next Steps
NOTE: Is there another phase for this project? What is the project closure?
*High-level GoalsRelationshipUltimate Goal
*
*
ReferencesYou must use references that coincide with the in-text citations in your presentation written in correct APA format. All references should come from Strayer University databases such as EbscoHost, eLibrary, ProQuest, etc. If your professor allows use of the internet avoid using .com sites, but you may use .org or .gov sites that are copyrighted.
*
ABC: INFORMATION TECHNOLOGY PROJECT CHARTER
Name:
Institutional Affiliation:
1.0. INTRODUCTIONPurpose of INFORMATION TECHNOLOGY Project Charterthe abc’s INFORMATIONA tECHNONOLOGY pROJECT PROPOSAL charter documents a research and formulation of a surveillance security system which is targeted to appraise in ...
Assignment 1 Dealing with Diversity in America from Reconstructi.docxdeanmtaylor1545
Assignment 1: Dealing with Diversity in America from Reconstruction through the 1920s
For History 105: Dr. Stansbury’s classes (6 pages here)
Due Week 3 and worth 120 points. The formal deadline is Monday at 9am Eastern time, Jan. 21. But, due to the King holiday, no late penalty will be imposed if submitted by the end of Jan. 22.
[NOTE ON ECREE: The university is adopting a tool, called ecree for doing writing assignments in many classes. We will be using the ecree program for doing our papers in this class. More instructions on this tool will be posted. You are welcome to type your paper in MS-Word as traditionally done—and then to upload that file to ecree to revise and finish it up. Or, as we suggest, you may type your paper directly into ecree. When using ecree, you should use CHROME as your browser. As posted: “Please note that ecree works best in Firefox and Chrome. Please do not use Internet Explorer or mobile devices when using ecree.”]
BACKGROUND FOR THE PAPER: After the Civil War, the United States had to recover from war, handle western expansion, and grapple with very new economic forms. However, its greatest issues would revolve around the legacies of slavery and increasing diversity in the decades after the Civil War. In the South, former slaves now had freedom and new opportunities but, despite the Reconstruction period, faced old prejudices and rapidly forming new barriers. Immigrants from Europe and Asia came in large numbers but then faced political and social restrictions. Women continued to seek rights. Yet, on the whole, America became increasingly diverse by the 1920s. Consider developments, policies, and laws in that period from 1865 to the 1920s. Examine the statement below and drawing from provided sources, present a paper with specific examples and arguments to demonstrate the validity of your position.
Topic and Thesis Statement—in which you can take a pro or con position:
· Political policies and movements in the period from 1865 to the 1920s generally promoted diversity and “the melting pot” despite the strong prejudices of a few. (or you can take the position that they did not). Use specific examples of policies or movements from different decades to support your position.
After giving general consideration to your readings so far and any general research, select one of the positions above as your position—your thesis. (Sometimes after doing more thorough research, you might choose the reverse position. This happens with critical thinking and inquiry. Your final paper might end up taking a different position than you originally envisioned.) Organize your paper as follows with the four parts below (see TIPS sheet and TEMPLATE also), handling these issues:
1. The position you choose —or something close to it—will be the thesis statement in your opening paragraph. [usually this is one paragraph with thesis statement being the last sentence of the paragraph.]
2. To support your position, use thre.
Assignment 1 Why are the originalraw data not readily us.docxdeanmtaylor1545
Assignment 1
:
Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.
Refer to Chapter 3 in the attached textbook:
Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E.
ISBN: 978-0-13-519201-6.
Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.
Requirement:
****Separate document for each assignment.****
Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.
Add references separately for each assignment question.
Double Spaced and APA 7th Edition Format
No plagiarized content please! Attach a plagiarized report.
Check for spelling and grammar mistakes!
$5 max. Please bid if you agree.
Assignment 2
:
What are the privacy issues with data mining? Do you think they are substantiated?
Refer to Chapter 4
in the attached textbook:
Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E.
ISBN: 978-0-13-519201-6.
Requirement:
****Separate document for each assignment.****
Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.
Add references separately for each assignment question.
Double Spaced and APA 7th Edition Format
No plagiarized content please! Attach a plagiarized report.
Check for spelling and grammar mistakes!
$5 max. Please bid if you agree.
.
Assignment 1 Refer to the attached document and complete the .docxdeanmtaylor1545
Assignment 1
:
Refer to the attached document and complete the following sections from the document (highlighted in yellow):
Policy 1.1
Policy Statement Section Overview
Policy 1.2
Policy Statements Contents
Requirement:
·
****Separate word document for each assignment****
· Minimum 300-350 words. Cover sheets, abstracts, graphs, and references do not count.
·
Add references separately for each assignment question.
·
Strictly follow APA style. Length – 2 to 3 paragraphs.
·
Sources: 2 References to Support your answer
· No plagiarized content please! Attach a plagiarized report.
· Check for spelling and grammar mistakes!
· $5 max. Please bid if you agree.
.
More Related Content
Similar to TaskYou are required to prepare for this Assessment Item by1..docx
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 50 points
This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan.You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Capstone Project OverviewThe purpose of this capstone project is.docxhumphrieskalyn
Capstone Project Overview
The purpose of this capstone project is for students to assume a senior management approach and apply project management techniques to create an integrative information technology solution to address organizational issues in order to satisfy an executive team and venture capital group. Students will critically assess existing information systems infrastructures, emerging technologies, and how enabling technologies affect organizational strategy. Deliverables 1 through 6 focus on preparing students toward the final capstone project. Skills, experience, and knowledge gained through the completion of prerequisite courses will be used throughout each deliverable. The project contents to be addressed are as follows:
1. Project Deliverable 1: Project Plan Inception.In this deliverable, you will create a project introduction that includes background information of the company, the type of business that the company is involved in, speculation upon outsourcing and offshoring opportunities, identification of skilled information systems personnel need for project, specific types of data that the company collects, and a description of the integrative information systems that the company should have to support the business. You will also create a project plan to record tasks, subtasks, and resources, and identify the schedule of the project. Additionally, the plan will outline the planning, analysis, design, and implementation phases of your project.
Submission Requirements
0. Project Introduction (MS Word)
0. Project Plan (MS Project)
1. Project Deliverable 2: Business Requirements. In this deliverable, you will create an original business requirements document for the project plan using the template provided under Additional Resources in the Student Center tab of the online course shell. You will be asked to describe the detailed project including the scope, possible risks, constraints, and assumptions, integration with other systems and infrastructure, and relevant terms that will be used throughout project. You will also need to update the project plan.
Submission Requirements
0. Business Requirements Document (MS Word)
0. Revised Project Plan (MS Project)
1. Project Deliverable 3: Database and Data Warehousing Design.In this deliverable, you will create a database schema that supports the company’s business and processes, explain and support the database schema, create database tables, normalize the database tables, create an Entity-Relationship (E-R) Diagram and create a Data Flow Diagram (DFD). You will also be asked to create sample queries that will support the organizational reporting needs and screen layouts that illustrate the interface that organizational users will utilize. You will need to update the project plan.
Submission Requirements
0. Design Document (MS Word)
0. Revised Project Plan (MS Project)
1. Project Deliverable 4: Analytics, Interfaces, and Cloud Technology. In this deliverable, you will support t ...
Hospitals currently use a manual system for visiting Doctor Slip as a token. The current system
requires numerous paper forms, with data stores spread throughout the hospital management infrastructure.
Often information (on forms) is incomplete, or does not follow management standards. Forms are often lost
in transit between departments requiring a comprehensive auditing process to ensure that no vital
information is lost. Multiple copies of the same information exist in the hospital and may lead to
inconsistencies in data in various data stores.
A significant part of the operation of any hospital involves the acquisition, management and timely
retrieval of great volumes of information. This information typically involves; Doctor, Room, Department
and Patient personal Information. All of this information must be managed in an efficient and cost wise
fashion so that an institution's resources may be effectively utilized Hospital E-Token management will
automate the management of the hospital making it more efficient and error free for outdoor patient. It aims
at standardizing data, consolidating data ensuring data integrity and reducing inconsistencies.
[Insert project title, e.g. Cosmo Inc.”] Project Scope State.docxgerardkortney
[Insert project title, e.g. “Cosmo Inc.”]: Project Scope Statement[Insert learner name]Capella UniversityProject Scope Statement
Note: Any work not explicitly included in the Project Scope Statement is implicitly excluded from the project.
Project Name
Prepared By
Date
(MM/DD/YYYY)Version History (insert rows as needed):VersionDateComments
1.0
1. Executive Summary
Provide below a brief overview of this project (for example, project purpose and justification).
Note: In any instance where there is a discrepancy between the Project Charter and the Project Scope Statement, the latter is considered authoritative.2. Business Objectives2.1 Product Description (
Solution
)
2.2 Business Objectives
3. Project Description
For each area below, provide sufficient detail to define this project adequately.3.1 Project Scope
Includes (list deliverables):
Does not include:
3.2 Dependencies (External and Internal)
3.3 Assumptions
3.4 Constraints
4. Project MilestonesTarget Date
Project Start
Project Complete
5. Project Approach
Briefly describe how each of the following will be handled. Provide links to relevant documents as appropriate. 5.1 Change Management
5.2 Communication Management
5.3 Quality Management
5.4 Resource Management
5.5 Critical Success Factors
5.6 Risk Management
5.7 Project Organization
6. AuthorizationsThe Project Scope Statement is approved by the:
Project Sponsor
Project Manager
Project performance baseline changes will be approved by the:
Project Sponsor
Project Manager
Project deliverables will be approved and accepted by the:
Project Sponsor
Key Stakeholders
7. Project Scope Statement ApprovalProject Name
Project Manager
The purpose of this document is to provide a vehicle for documenting the initial planning efforts for the project. It is used to reach a satisfactory level of mutual agreement between the Project Manager and the Project Sponsors and Owners with respect to the objectives and scope of the project before significant resources are committed and expenses incurred.
I have reviewed the information contained in this Project Scope Statement and agree:NameRoleSignatureDate
The signatures above indicate an understanding of the purpose and content of this document by those signing it. By signing this document, they agree to this as the formal Project Scope Statement document.
References
2
PM5018 Business Case
PM5018 Business CaseCosmo, Inc.
Cosmo, Inc. is a leader in the development and distribution of wearable technology, including fitness coaching, nutritional coaching, and lifestyle advising products. The company holds a 33-percent market share in the wearable technology category. After doing marketing analysis, senior leadership realizes the onset of competition could negatively impact future earnings.
CEO and President Harold Living tells his leadership Cosmo, Inc. needs a new marketing strategy to not only increase market share but to maintain current le.
CIS 498 Effective Communication - snaptutorial.comdonaldzs1
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 50 points
This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan.
For more classes visit
www.snaptutorial.com
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 110 points
This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both
Cis 499 Enthusiastic Study / snaptutorial.comStephenson05
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 110 points
This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Enterprise Architecture - An Introduction Daljit Banger
The Slides are from my session at "An Evening of Enterprise Architecture Awareness" held at theUniversity of Sussex Hosted by the BCS Local Chapter and facilitated by the BCS EA Specialist Group.
Project NameYour Full NameCourse Number and Name (As i.docxwkyra78
Project Name
Your Full Name
Course Number and Name (As it appears on your Course Guide.)
Professor’s Name (As it appears on your Course Guide.)
University Name (As it appears on the Course Guide.)
Date (Month must be spelled out. Use the date that the paper is due.)
*
*
*
Project Description & ObjectivesDescribe the project in non-technical terms.Describe the project objectives and how the project has met each objective.Explanation #1Explanation #2Explanation #3State the project scope statement. Detail the requirements of the project.Adhere to quality management.
*
*
*
Work Breakdown Structure (WBS)Insert the WBS.Highlight brief task explanation on the slide but explain thoroughly on the speaker notes.
*
Project Schedule and MilestonesCreate timeline.List activity sequences and durations.Indicate the critical path.
*
Project Human Resource ManagementIdentify stakeholders.Indicate the project team matrix (weak, balanced, and strong).Explain how the project team was developed and managed.Identify procurement management, i.e., vendors, contractors, suppliers, etc.
*
Project CostEstablish the approved budget.Identify the cost for the resources.State the cost of the project. (Is it under or over budget?)Note the technology used with associated cost.BenefitsDrawbacks or barriers
*
Project CommunicationsEnsure that all project information is collected, documented, and archived.Distribute and share information with stakeholders, management, and project team members.Identify risks.Qualitative RisksQuantitative Risks
*
Competitive Analysis
*
*
*
Competitive Analysis, Cont.
*
*
*
Procedures
*
*
*
Assumptions, Constraints & DependenciesIdentify the assumptions used to determine the project scope.Evaluate project’s success from these assumptions.Evaluate project’s obstacles from these assumptions.Explain the scope, time, and cost constraints.List any dependencies. Explain.
*
Project Lessons LearnedRecommend methods to avoid similar obstacles in future projects.List of six (6) best practices arising from this project.#1#2#3#4#5#6
*
Next Steps
NOTE: Is there another phase for this project? What is the project closure?
*High-level GoalsRelationshipUltimate Goal
*
*
ReferencesYou must use references that coincide with the in-text citations in your presentation written in correct APA format. All references should come from Strayer University databases such as EbscoHost, eLibrary, ProQuest, etc. If your professor allows use of the internet avoid using .com sites, but you may use .org or .gov sites that are copyrighted.
*
ABC: INFORMATION TECHNOLOGY PROJECT CHARTER
Name:
Institutional Affiliation:
1.0. INTRODUCTIONPurpose of INFORMATION TECHNOLOGY Project Charterthe abc’s INFORMATIONA tECHNONOLOGY pROJECT PROPOSAL charter documents a research and formulation of a surveillance security system which is targeted to appraise in ...
Similar to TaskYou are required to prepare for this Assessment Item by1..docx (19)
Assignment 1 Dealing with Diversity in America from Reconstructi.docxdeanmtaylor1545
Assignment 1: Dealing with Diversity in America from Reconstruction through the 1920s
For History 105: Dr. Stansbury’s classes (6 pages here)
Due Week 3 and worth 120 points. The formal deadline is Monday at 9am Eastern time, Jan. 21. But, due to the King holiday, no late penalty will be imposed if submitted by the end of Jan. 22.
[NOTE ON ECREE: The university is adopting a tool, called ecree for doing writing assignments in many classes. We will be using the ecree program for doing our papers in this class. More instructions on this tool will be posted. You are welcome to type your paper in MS-Word as traditionally done—and then to upload that file to ecree to revise and finish it up. Or, as we suggest, you may type your paper directly into ecree. When using ecree, you should use CHROME as your browser. As posted: “Please note that ecree works best in Firefox and Chrome. Please do not use Internet Explorer or mobile devices when using ecree.”]
BACKGROUND FOR THE PAPER: After the Civil War, the United States had to recover from war, handle western expansion, and grapple with very new economic forms. However, its greatest issues would revolve around the legacies of slavery and increasing diversity in the decades after the Civil War. In the South, former slaves now had freedom and new opportunities but, despite the Reconstruction period, faced old prejudices and rapidly forming new barriers. Immigrants from Europe and Asia came in large numbers but then faced political and social restrictions. Women continued to seek rights. Yet, on the whole, America became increasingly diverse by the 1920s. Consider developments, policies, and laws in that period from 1865 to the 1920s. Examine the statement below and drawing from provided sources, present a paper with specific examples and arguments to demonstrate the validity of your position.
Topic and Thesis Statement—in which you can take a pro or con position:
· Political policies and movements in the period from 1865 to the 1920s generally promoted diversity and “the melting pot” despite the strong prejudices of a few. (or you can take the position that they did not). Use specific examples of policies or movements from different decades to support your position.
After giving general consideration to your readings so far and any general research, select one of the positions above as your position—your thesis. (Sometimes after doing more thorough research, you might choose the reverse position. This happens with critical thinking and inquiry. Your final paper might end up taking a different position than you originally envisioned.) Organize your paper as follows with the four parts below (see TIPS sheet and TEMPLATE also), handling these issues:
1. The position you choose —or something close to it—will be the thesis statement in your opening paragraph. [usually this is one paragraph with thesis statement being the last sentence of the paragraph.]
2. To support your position, use thre.
Assignment 1 Why are the originalraw data not readily us.docxdeanmtaylor1545
Assignment 1
:
Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.
Refer to Chapter 3 in the attached textbook:
Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E.
ISBN: 978-0-13-519201-6.
Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.
Requirement:
****Separate document for each assignment.****
Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.
Add references separately for each assignment question.
Double Spaced and APA 7th Edition Format
No plagiarized content please! Attach a plagiarized report.
Check for spelling and grammar mistakes!
$5 max. Please bid if you agree.
Assignment 2
:
What are the privacy issues with data mining? Do you think they are substantiated?
Refer to Chapter 4
in the attached textbook:
Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E.
ISBN: 978-0-13-519201-6.
Requirement:
****Separate document for each assignment.****
Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.
Add references separately for each assignment question.
Double Spaced and APA 7th Edition Format
No plagiarized content please! Attach a plagiarized report.
Check for spelling and grammar mistakes!
$5 max. Please bid if you agree.
.
Assignment 1 Refer to the attached document and complete the .docxdeanmtaylor1545
Assignment 1
:
Refer to the attached document and complete the following sections from the document (highlighted in yellow):
Policy 1.1
Policy Statement Section Overview
Policy 1.2
Policy Statements Contents
Requirement:
·
****Separate word document for each assignment****
· Minimum 300-350 words. Cover sheets, abstracts, graphs, and references do not count.
·
Add references separately for each assignment question.
·
Strictly follow APA style. Length – 2 to 3 paragraphs.
·
Sources: 2 References to Support your answer
· No plagiarized content please! Attach a plagiarized report.
· Check for spelling and grammar mistakes!
· $5 max. Please bid if you agree.
.
Assignment 1
:
Remote Access Method Evaluation
Learning Objectives and Outcomes
Ø
Explore and assess different remote access solutions.
Assignment Requirements
Discuss which of the two remote access solutions
, virtual private networks (VPNs) or hypertext transport protocol secure (HTTPS),
you will rate as the best.
You need to make a choice between the two remote access solutions based on the following features:
Ø Identification, authentication, and authorization
Ø Cost, scalability, reliability, and interoperability
Requirement:
·
****Separate word document for each assignment****
· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.
·
Add reference separately for each assignment question.
·
Strictly follow APA style. Length – 2 to 3 paragraphs.
·
Sources: 2 References to Support your answer
· No plagiarized content please! Attach a plagiarized report.
· Check for spelling and grammar mistakes!
· $5 max. Please bid if you agree.
Assignment 2
:
Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases.
Requirement:
·
****Separate word document for each assignment****
· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.
·
Add reference separately for each assignment question.
·
Strictly follow APA style. Length – 2 to 3 paragraphs.
·
Sources: 2 References to Support your answer
· No plagiarized content please! Attach a plagiarized report.
· Check for spelling and grammar mistakes!
· $5 max. Please bid if you agree.
Assignment 3
:
Refer to the attached “Term Paper for ITS632(1)” for assignment.
Requirements
:
·
****Separate word document for each assignment****
· Minimum 6 pages. Cover sheet, abstract, graphs, and references do not count.
·
Add reference separately for each assignment question.
·
Strictly follow APA style.
·
Sources: 3-5 References
· No plagiarized content please! Attach a plagiarized report.
· Check for spelling and grammar mistakes!
· $30 max. Please bid if you agree.
.
Assignment 1 Inmates Rights and Special CircumstancesCriteria.docxdeanmtaylor1545
Assignment 1: Inmates Rights and Special Circumstances
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Analyze the legal mechanisms in which an inmate can challenge his or her confinement. Support or refute the cost of such challenges to the state and / or federal government. Provide a rationale for your response.
Weight: 30%
Did not submit or incompletely analyzed the legal mechanisms in which an inmate can challenge his or her confinement. Did not submit or incompletely supported or refuted the cost of such challenges to the state and / or federal government. Did not submit or incompletely provided a rationale for your response.
Insufficiently analyzed the legal mechanisms in which an inmate can challenge his or her confinement. Insufficiently supported or refuted the cost of such challenges to the state and / or federal government. Insufficiently provided a rationale for your response.
Partially analyzed the legal mechanisms in which an inmate can challenge his or her confinement. Partially supported or refuted the cost of such challenges to the state and / or federal government. Partially provided a rationale for your response.
Satisfactorily analyzed the legal mechanisms in which an inmate can challenge his or her confinement. Satisfactorily supported or refuted the cost of such challenges to the state and / or federal government. Satisfactorily provided a rationale for your response.
Thoroughly analyzed the legal mechanisms in which an inmate can challenge his or her confinement. Thoroughly supported or refuted the cost of such challenges to the state and / or federal government. Thoroughly provided a rationale for your response.
2. Examine the four (4) management issues that arise as a result of inmates with special needs. Prepare one (1) recommendation for each management issue that effectively neutralizes each concern. Provide a rationale for your response.
Weight: 30%
Did not submit or incompletely examined the four (4) management issues that arise as a result of inmates with special needs. Did not submit or incompletely prepared one (1) recommendation for each management issue that effectively neutralizes each concern. Did not submit or incompletely provided a rationale for your response.
Insufficiently examined the four (4) management issues that arise as a result of inmates with special needs. Insufficiently prepared one (1) recommendation for each management issue that effectively neutralizes each concern. Â Insufficiently provided a rationale for your response.
Partially examined the four (4) management issues that arise as a result of inmates with special needs. Partially prepared one (1) recommendation for each management issue that effectively neutralizes each concern. Partially provided a rationale for your response.
Satisfactorily examined the four (4) management issues that arise as a result of inmates with special needs. Satisfactorily prepare.
Assignment 1 Go back through the business press (Fortune, The Ec.docxdeanmtaylor1545
Assignment 1
Go back through the business press (Fortune, The Economist, BusinessWeek, and so forth and any other LIRN- based articles) and find at least three articles related to either downsizing, implementation of a new technology, or a merger or acquisition. In a minimum of four (4) pages in 7th edition APA formatted paper:
What were the key frontline experiences listed in relation to your chosen change?
How do they relate to those listed in Chapter 4?
Did you identify new ones confronting change managers?
How would you prioritize these experiences?
Do any stand out as “deal breakers”? Why?
What new insights into implementing this type of change emerge from this?
Assignment 2
PA2 requires you to identify a current change in an organization with which you are familiar and evaluate a current public issue about which “something must be done.” In relation to the change issue, think about what sense-making changes might need to be enacted and how you would go about doing this. Assess this in terms of the eight (8) elements of the sense-making framework suggested by Helms Mills and as set out in Table 9.7:
Identity construction
Social sense-making
Extracted cues
Ongoing sense-making
Retrospection
Plausibility
Enactment
Projection
Which ones did you believe you might have the most/least control over and why?
What implications does this have for adopting a sense-making approach to organizational change?
minimum of
four (4) pages document for each assignment
.
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docxdeanmtaylor1545
Assignment 1: Discussion—Environmental Factors
In this assignment, you will have a chance to discuss a topic that brings personality theory together with social psychology. Dealing with unhealthy groups like gangs or cults is an important issue in social psychology. However, you cannot fully address this issue if you do not first understand personality development and how one’s personality affects the choices that are made. Specifically, you will look at Skinner’s behavioral perspective on personality development and discuss how that theory can play a role in this issue of unhealthy groups.
Bob is an adolescent who grew up in a gang-infested part of a large city. His parents provided little supervision while he was growing up and left Bob mostly on his own. He developed friendships with several kids in his neighborhood who were involved in gangs, and eventually joined a gang himself. Now crime and gang activities are a way of life for Bob. These have become his way to identify with his peer group and to support himself.
It is relatively easy to see that Bob’s environment has played a large role in his current lifestyle. This coincides with Skinner’s concept of environment being the sole determinant of how personality develops. Skinner believed that if you change someone’s environment and the reinforcements in that environment, you can change their behavior.
Use the Internet, Argosy University library resources, and your textbook to research Skinner’s concept of the environment and answer the following questions:
If you were to create an environment for Bob to change his behavior from that of a gang member to a respectable and law-abiding citizen, what types of environmental changes and positive reinforcements would you suggest and why?
What are some interventions that are used in the field currently? Are there any evidence-based programs that use these environmental and reinforcement interventions?
Write your initial response in 2–3 paragraphs. Apply APA standards to citation of sources.
By
Saturday, March 1, 2014
, post your response to the appropriate
Discussion Area
. Through
Wednesday, March 5, 2014
, review and comment on at least two peers’ responses.
.
Assignment 1 1. Using a Microsoft Word document, please post one.docxdeanmtaylor1545
Assignment 1
1. Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a hyperlink to each statute.
2. In the same document, please post one federal and one state case using standard legal notation and a hyperlink to each case.
Assignment 2
A. Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential. Please give your thoughts on whether governments should regulate the content of content on these media. Minimum 250 words.
B. Respond to two classmates' postings. Minimum 100 words per posting.
.
Assignment 1 Dealing with Diversity in America from Reconstructi.docxdeanmtaylor1545
Assignment 1:
Dealing with Diversity in America from Reconstruction through the 1920s
Due Week 3 and worth 120 points
After the Civil War, the United States had to recover from war, handle western expansion, and grapple with very new economic forms. However, its greatest issues would revolve around the legacies of slavery and increasing diversity in the decades after the Civil War. In the South, former slaves now had freedom and new opportunities but, despite the Reconstruction period, faced old prejudices and rapidly forming new barriers. Immigrants from Europe and Asia came in large numbers but then faced political and social restrictions. Women continued to seek rights. Yet, on the whole, America became increasingly diverse by the 1920s. Consider developments, policies, and laws in that period from 1865 to the 1920s. Examine the statement below and drawing from provided sources, present a paper with specific examples and arguments to demonstrate the validity of your position.
Statement—in which you can take a pro or con position:
Political policies and movements in the period from 1865 to the 1920s generally promoted diversity and “the melting pot” despite the strong prejudices of a few. (or you can take the position that they did not). Use specific examples of policies or movements from different decades to support your position.
After giving general consideration to your readings so far and any general research, select one of the positions above as your position—your thesis. (Sometimes after doing more thorough research, you might choose the reverse position. This happens with critical thinking and inquiry. Your final paper might end up taking a different position than you originally envisioned.) Organize your paper as follows, handling these issues:
The position you choose —or something close to it—will be the thesis statement in your opening paragraph.
To support your position, use three (3) specific examples from different decades between 1865 and 1930. You may narrowly focus on race or gender or immigrant status, or you may use examples relevant to all categories.
Explain why the opposing view is weak in comparison to yours.
Consider your life today: In what way does the history you have shown shape or impact issues in your workplace or desired profession?
Length: The paper should be 500-to-750 words in length.
Research and References: You must use a
MINIMUM of three sources
; the Schultz textbook must be one of them. Your other two sources should be drawn from the list provided below. This is guided research, not open-ended Googling.
Source list for Assignment 1:
Some sources are “primary” sources from the time period being studied. Some sources below can be accessed via direct link or through the primary sources links on Blackboard. Each week has a different list of primary sources. For others, they are accessible through the permalink to the source in our online library: Sources below having
libdatab.
Assignment 1 Due Monday 92319 By using linear and nonlinear .docxdeanmtaylor1545
Assignment 1: Due Monday 9/23/19
By using linear and nonlinear methods of listening, the counselor can respond in meaningful ways which can create a healthy therapeutic alliance. During the assessment, the client will often provide a wealth of information. It is the job of the counselor to listen in order to identify needs, resources, strengths and abilities. The counselor may pick up on gaps in the client's story during the assessment. This is likely because the client will tell the conscious part of the story. However, we must also listen to what is NOT being said.
Counselors must consider the unconscious part of the story during the assessment. One way for the counselor to do this is by being mindful of Adverse Childhood Experiences (ACES). How might recognizing ACES:
1) inform the counselor during the assessment?
2) guide goal development for the treatment episode?
3) affect the clients readiness to change?
.
Assignment 1This assignment is due in Module 8. There are many v.docxdeanmtaylor1545
Assignment 1
This assignment is due in Module 8. There are many variations on WebQuests. Please make sure you follow these instructions and not those listed in the textbook. Although, reading the texts and learning another variation will only benefit you in the future. This assignment is worth 100 points.
1. Find a good website in which you can use for the exercise. If you want your students to learn more about zoo animals, then maybe you should locate your local zoo website and use it as a source. Make sure you choose a site that is age appropriate for your students. And please identify which grade and subject level you have chosen in the title.
2. After deciding on a website, create the student instructions for this exercise. Make sure to incorporate aesthetic value (picture). The instructions are very important because you do want your students to be excited about the activity.
3. You will ask the students 10 questions about the site and its information. Be sure the website is clear in its direction and easily navigated so the students can find the information. Create the questions and type them into a Word document with lines for students to use to fill in their answers.
4. After you finish your WebQuest, make sure you include a sheet with the answers to the questions.
5. Save the document as a .doc, .docx, or pdf and submit it via the assignment drop box by clicking on the title of the assignment.
Submission: To submit, choose the Assignment 4: WebQuest link above and use the file attachment feature to browse for and upload your completed document. Remember to choose Submit to complete the submission.
Grading: This assignment is worth 100 points toward your final grade and will be graded using the Webquest Rubric. Please use it as a guide toward successful completion of this assignment.
Assignment 2
This assignment is due in Module 9. The objective of this lesson is to utilize the Internet to help clarify/expand upon your teaching, while creating a field trip environment for your students.
There are times when you will not have the funding to take your class on an actual field trip. With the help of technology, you can now visit various sites without leaving the room. For assignment 4, you are going to plan a virtual field trip for your classroom. Think about the grade level, subject area, possible topics for the curriculum that you teach, and appropriate online communication. You must create an original, virtual field trip. You cannot use someone else's field trip. Remember, you can utilize various software (PowerPoint, Prezi, etc.) to create this field trip, but be careful, it is not a lesson with technology assisted software. The students have to feel like they are truly at the location of the field trip looking at the exhibit, animal, statue, and so forth. There should be no words on the slides because it is not a classroom lesson, it is a field trip.
You will be the tour guide, and everything you plan to say as the guide shoul.
Assignment 1TextbookInformation Systems for Business and Beyond.docxdeanmtaylor1545
Assignment 1
Textbook:Information Systems for Business and Beyond
Please answer the following
From Chapter 1 – Answer Study questions 1-5 and Exercise 3
From Chapter 2 – Answer Study questions 1-10 and Exercise 2 (should be a Power point presentation)
All the above questions should be submitted in one Word document, except for the PowerPoint presentation (Chapter 2 - Exercise 2).
Please understand that Plagiarism will not be tolerated and will result in a zero grade.
Submission Requirements
Font: Times New Roman, size 12, double-space
Citation Style: APA
References: Please use citations and references where appropriate
No Plagiarism
Chapter 1: What Is an
Information System?
Learning Objectives
Upon successful completion of this chapter, you will be
able to:
• define what an information system is by identifying
its major components;
• describe the basic history of information systems;
and
• describe the basic argument behind the article
“Does IT Matter?” by Nicholas Carr.
Introduction
Welcome to the world of information systems, a world that seems to
change almost daily. Over the past few decades information systems
have progressed to being virtually everywhere, even to the point
where you may not realize its existence in many of your daily
activities. Stop and consider how you interface with various
components in information systems every day through different
Chapter 1: What Is an Information
System? | 9
electronic devices. Smartphones, laptop, and personal computers
connect us constantly to a variety of systems including messaging,
banking, online retailing, and academic resources, just to name a
few examples. Information systems are at the center of virtually
every organization, providing users with almost unlimited
resources.
Have you ever considered why businesses invest in technology?
Some purchase computer hardware and software because everyone
else has computers. Some even invest in the same hardware and
software as their business friends even though different technology
might be more appropriate for them. Finally, some businesses do
sufficient research before deciding what best fits their needs. As
you read through this book be sure to evaluate the contents of each
chapter based on how you might someday apply what you have
learned to strengthen the position of the business you work for, or
maybe even your own business. Wise decisions can result in stability
and growth for your future enterprise.
Information systems surround you almost every day. Wi-fi
networks on your university campus, database search services in
the learning resource center, and printers in computer labs are
good examples. Every time you go shopping you are interacting
with an information system that manages inventory and sales. Even
driving to school or work results in an interaction with the
transportation information system, impacting traffic lights,
cameras, etc. V.
ASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docxdeanmtaylor1545
ASSIGNMENT 1
TASK FORCE COMMITTEE REPORT:
ISSUE AND SOLUTIONS
Due Week 4, worth 150 points
Leaders address issues and propose solutions. As a leader, you’ll need to stay
on top of events that may facilitate or hinder productivity. You must create and
implement solutions to address these issues.
This assignment exposes you to complex modern organizational challenges.
The solutions you devise should reflect your learning and research of organiza-
tional and individual influences in the workplace.
PREPARATION
1. Select an organization
Select an organization in which current events have adversely affected
productivity, requiring management to resolve an issue related to:
corporate culture, managing diversity, leading teamwork, and
developing motivational strategies. The organization should be one
with which you are familiar — where you work now or have worked
previously (business, nonprofit, government, or military). You may also
consider other organizations in the news, such as Macy’s for the retail
industry, United for the airline industry, Wells Fargo for the banking
industry, etc. The focus is on finding solutions, but you should be
somewhat familiar with the organization or industry.
2. Plan your research
Use research from the course textbook, company website, business
websites (CNBC, Bloomberg, etc.), resources from the Strayer Library,
or outside resources to develop solutions to the following questions as
they relate to corporate culture, managing diversity, leading teamwork,
and developing motivational strategies to achieve the organization's
goals and objectives. Your recommendations must be fully articulated
and supported with appropriate detail and sources. Note: Wikipedia
and web-based blogs do not qualify as credible resources.
INSTRUCTIONS
Imagine yourself as the task force committee leader at this organization. You
have been tasked with analyzing hindrances to organizational efficiency. You
must propose strategic solutions.
Create a full report in which you do the following:
1. Describe the Organization and the Issue to Resolve
Provide a brief description of the organization you selected. Present
the organizational issue that adversely affected productivity and that
you, the task force leader, will review and resolve.
2. Analyze Current Corporate Culture
How has the current corporate culture facilitated the development of
the current issue? Research the organization, dig into the culture, and
analyze how it contributed to this issue. Hint: Review the mission and
vision statements as well as the corporate website.
3. Identify Areas of Weakness
What are the organization’s areas of weakness? Using your research
on organizational behavior approaches to corporate culture, diversity,
teamwork, and motivational strategies, identify areas of weakness.
4. Propose
Solution
s
What organizational practices would you modify? What solutions
should your task force recommend to management? As the leader of
the task force, ide.
Assignment 1Select one of these three philosophers (Rousseau, Lo.docxdeanmtaylor1545
Assignment 1
Select one of these three philosophers (Rousseau, Locke, Hobbes) and write a 1 page paper in which you analyze the significant ways in which their ideas differ from those at work in modern democracies. What could we gain from following their ideas more closely, and what might be dangerous if we did so?
assignment 2
In the workplace, we may hear a statement, joke, or remark that is unkind or inappropriate. Often the speaker might appear to do so in a way that is not intended to offend, but comes from other experiences or lack of awareness as to how they may be received.
It is up to you as a manager to set the tone for how these comments are countered in order to create an inclusive environment.
Choose
one
of the statements below (clearly identify in your work which statement you chose).
"We don't serve
those
people here." (Reference to lesbian, gay, bisexual, and transgender clients)
"He should go back to his
own country."
(Reference to someone of a different race)
"She just slows us down." (Reference to a disabled worker)
"Why doesn't he retire already!" (Reference to an older employer)
In a 2 page paper, suggest some ways in which you would professionally respond if you heard the comment by your subordinate in the employee lounge. Include how you might approach the employee (immediately, privately etc.). Provide specific comments that you might use in your discussion and consider how the individual might defend their actions. What further conversation might this lead to?
Explain the ethical and legal (if any) implications if statements such as the one you chose would continue. What might be lost in your workplace if the statements are allowed?
Include at least one resource you could use to help your conversation. Identify whether there is a legal guideline to share with your employee.
assignment 3
attached is the case
Review the Sherwood Manufacturing case again, and in a 2 page paper include the following:
Provide two or more detailed alternatives (regarding Miranda not being considered for the promotion) for Bob and Kelly to consider. Compare and contrast the alternatives, identifying the expected outcome of each.
What are the legal guidelines and ethical implications to consider?
What form of discrimination (individual, structural, or institutional), if any, do you believe is taking place at Sherwood Manufacturing?
assignment 4
use the same attached paper for this one also
Review the Sherwood Manufacturing case again and consider what you have learned about organizational cultures respecting diversity. In a 2 page paper:
Describe the elements of an organizational culture and how it might impact an organization to be considered inclusive.
Next, describe what you believe Sherwood's organizational culture is currently.
Finally, consider what you believe would be an "ideal" inclusive organizational culture for Sherwood. Be specific and include as many aspects of the culture as possible.
Include what steps could be taken.
Assignment 1Scenario 1You are developing a Windows auditing pl.docxdeanmtaylor1545
Assignment 1
Scenario 1
You are developing a Windows auditing plan and need to determine which log files to capture and review. You are considering log files that record access to sensitive resources. You know that auditing too many events for too many objects can cause computers to run more slowly and consume more disk space to store the audit log file entries.
Answer the following question(s): (2 References)
If computer performance and disk space were not a concern, what is another reason for not tracking audit information for all events?
Scenario 2
Assume you are a security professional. You are determining which of the following backup strategies will provide the best protection against data loss, whether from disk failure or natural disaster:
· Daily full server backups with hourly incremental backups
· Redundant array of independent disks (RAID) with periodic full backups
· Replicated databases and folders on high-availability alternate servers
Answer the following question(s): (2 References)
Which backup strategy would you adopt? Why?
Assignment 1 Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation Style: APA
Length: At least 350 words for each question
References: At least 2 credible scholarly references for each question
No plagiarism
Assignment 2: Security Audit Procedure Guide
Scenario
Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities. You choose to use the Microsoft Security Compliance Toolkit to assess the basic security for all of your Windows computers and use OpenVAS to perform vulnerability scans.
Tasks
Develop a procedure guide to ensure that a computer adheres to a standard security baseline and has no known vulnerabilities.
For each application, fill in details for the following general steps:
1. Acquire and install the application.
2. Scan computers.
3. Review scan results.
4. Identify issues you need to address.
5. Document the steps to address each issue.
Assignment 2 Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation Style: APA
Length: At least 3 pages
References: At least 4 credible scholarly references
No plagiarism
Assignment 3: System Restoration Procedure Guide
Scenario
One of the security improvements at Always Fresh is setting up a system recovery procedure for each type of computer. These procedures will guide administrators in recovering a failed computer to a condition as near to the point of failure as possible. The goal is to minimize both downtime and data loss.
You have already implemented the following backup strategies for workstation computers:
· All desktop workstations were originally installed from a single image for Always Fresh standard workstations. The base image is updated with all patches and new software installed on live workstations.
· Desktop workstation computers execute a cloud backup eve.
Assignment 1Research by finding an article or case study discus.docxdeanmtaylor1545
A
ssignment 1:
Research by finding an article or case study discussing ONE of the following laws or legal issues as it relates to computer forensics:
1) Electronic Communications Privacy Act (ECPA)
2) Cable Communications Privacy Act (CCOA)
3) Privacy Protection Act (PPA)
4) USA Patriot Act of 2001
5) Search and seizure requirements of the Fourth Amendment
6) Legal right to search the computer media
7) Legal right to remove the computer media from the scene
8) Availability of privileged material on the computer media for examination
Using at least 500 words - summarize the the article you have chosen. You will be graded on Content/Subject Knowledge, Critical Thinking Skills, Organization of Ideas, and Writing Conventions.
.
Assignment 1Positioning Statement and MottoUse the pro.docxdeanmtaylor1545
Assignment 1
Positioning Statement and Motto
Use the provided information, as well as your own research, to assess one (1) of the stated brands (Alfa Romeo Hewlett Packard, Subway, or Sony) by completing the questions below. At the end of the worksheet, be sure to develop a new positioning statement and motto for the brand you selected. Submit the completed template in the Week 4 assignment submission link.
Name:
Professor’s Name:
Course Title:
Date:
Company/Brand Selected (Alfa Romeo Hewlett Packard, Subway, or Sony):
1. Target Customers/Users
Who are the target customers for the company/brand? Make sure you tell why you selected each item that you did. (NOTE: DO NOT say “ANY, ALL, EVERYONE” you cannot target everyone, you must be specific)
Age Bracket: [Insert response]
Gender: [Insert response]
Income Bracket: [Insert response]
Education Level: [Insert response]
Lifestyle: [Insert response]
Psychographics (Interest, Hobbies, Past-times): [Insert response]
Values (What the customer values overall in life): [Insert response]
Other items you would segment up on: [Insert response]
How does the company currently reach its customers/users? What methods and media does the company use to currently reach the customers/users? What methods and media should the company use to currently reach the customers/users?
[Insert response]
What would grab the customers/users’ attention? Why do you think this will capture their attention?
[Insert response]
What do these target customers’ value from the business and its products? Why do you think they value these items?
[Insert response]
2. Competitors
Who are the brand’s competitors? Provide at least 3 competitors and tell why you selected each competitor.
Competitor 1: [Insert response]
Competitor 2: [Insert response]
Competitor 3: [Insert response]
What product category does the brand fit into? Why have you placed this brand into the product category that you did?
[Insert response]
What frame of reference (frame of mind) will customers use in making a choice to use/purchase this brand/service? What other brands/companies might customers compare this brand to (other than the top three identified above)?
[Insert response]
3. USP (Unique Selling Proposition) Creation
What is the brand’s uniqueness? Why do you think this is a key uniqueness for this business?
[Insert response]
What is the competitive advantage of the brand? How is it different from other competing brands? Why do you consider this a competitive advantage?
[Insert response]
What attributes or benefits does the brand have that dominate competitors? Why do you think they dominate?
[Insert response]
How is this brand/company better than its competitors? What is the brand’s USP (Unique Selling Proposition? Why have you decided upon this USP?
Unique Selling Proposition: [Insert response]
Defense of USP: [Insert response]
4. Positioning Statement & Motto
Develop a new positioning statement and motto for the brand you selected. Below is an.
ASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docxdeanmtaylor1545
ASSIGNMENT 1:
Hearing Versus Listening
Describe how you learned how to listen! Please use between 300-500 words to make a complete description of this learned behavior. Did you learn to listen properly? Do you still listen the same way that you were taught as a child? Why or why not?
“Doctor Aunt”
by Eden, Janine and Jim.
CC-BY
.
A mother takes her four-year-old to the pediatrician reporting she’s worried about the girl’s hearing. The doctor runs through a battery of tests, checks in the girl’s ears to be sure everything looks good, and makes notes in the child’s folder. Then, she takes the mother by the arm. They move together to the far end of the room, behind the girl. The doctor whispers in a low voice to the concerned parent: “Everything looks fine. But, she’s been through a lot of tests today. You might want to take her for ice cream after this as a reward.” The daughter jerks her head around, a huge grin on her face, “Oh, please, Mommy! I love ice cream!” The doctor, speaking now at a regular volume, reports, “As I said, I don’t think there’s any problem with her hearing, but she may not always be choosing to listen.”
Hearing
is something most everyone does without even trying. It is a physiological response to sound waves moving through the air at up to 760 miles per hour. First, we receive the sound in our ears. The wave of sound causes our eardrums to vibrate, which engages our brain to begin processing. The sound is then transformed into nerve impulses so that we can perceive the sound in our brains. Our auditory cortex recognizes a sound has been heard and begins to process the sound by matching it to previously encountered sounds in a process known as
auditory association
.
[1]
Hearing has kept our species alive for centuries. When you are asleep but wake in a panic having heard a noise downstairs, an age-old self-preservation response is kicking in. You were asleep. You weren’t listening for the noise—unless perhaps you are a parent of a teenager out past curfew—but you hear it. Hearing is unintentional, whereas
listening
(by contrast) requires you to pay conscious attention. Our bodies hear, but we need to employ intentional effort to actually listen.
“Hearing Mechanics”
by Zina Deretsky. Public domain.
We regularly engage in several different types of listening. When we are tuning our attention to a song we like, or a poetry reading, or actors in a play, or sitcom antics on television, we are listening for pleasure, also known as
appreciative listening
. When we are listening to a friend or family member, building our relationship with another through offering support and showing empathy for her feelings in the situation she is discussing, we are engaged in
relational listening
. Therapists, counselors, and conflict mediators are trained in another level known as
empathetic or therapeutic listening
. When we are at a political event, attending a debate, or enduring a salesperson touting the benefits of vario.
assignment 1
Essay: Nuclear Proliferation
The proliferation of nuclear weapons is closely monitored by the international community. While the international community formally recognizes only five nuclear powers - the United States, Russia, China, France, and the United Kingdom - it is widely acknowledged that at least four others (India, Israel, North Korea, and Pakistan) currently possess nuclear weapons and one other (Iran) is attempting to develop nuclear weapons capabilities.
Describe the current international regime governing the development of nuclear weapons, including the major agreements and treaties controlling nuclear technology. Explain why the international community generally seeks to prevent the proliferation of nuclear weapons. (500-750 words)
assignment 2
World military spending is nearly $2 trillion every year. If you could redirect these funds, how would you use them? Would such uses be better or worse for the states involved? Do you think there is a realistic chance of redirecting military spending in the way you suggest? (150 words minimum)
assignment 3
Human Rights: A Hollow Promise to the World?
( one paragraph )
.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
TaskYou are required to prepare for this Assessment Item by1..docx
1. Task
You are required to prepare for this Assessment Item by:
1. READING the Subject outline,
2. COMPLETING Topic 2 Project Planning
3. BUILDING your PLAN up from the ProjectTitle and
Abstract in Assessment Task 1
WHAT TO DO:
1. Follow the Study Schedule and work with the Topics in
Interact as they provide a "scaffold" for your learning in this
subject.
2. Develop a detailed Capstone Project Proposal and Plan using
project management software (as listed in the Study Schedule)
and the skills you have acquired from IT Project Management to
develop a project plan with a Work Breakdown
Structure (WBS), milestones and Gantt chart. These tools may
help.
1. MicrosoftProject Pro (http://office.microsoft.com/en-
au/project/);
2. Open source tools like GanttProject
(http://www.ganttproject.biz/);
3. OpenProj(http://sourceforge.net/projects/openproj/)
4. OpenProject (https://www.openproject.org/about).
5. ProjectLibre (http://www.projectlibre.org/)
3. Begin using the 'project blog' as a tool beyond the weekly
progress reportsfor your chosen emerging technology topic:
1. The blog helps you to "think by writing" and also store your
notes, project files and links in a cloud-based service.
2. Consider sharing the site with your peers as a way to tell a
story and harness each other’s knowledge.
4. The blog is ideally updated each week with 3 or 4 entries for
documenting your project notes and as the foundation for
editing and writing the Capstone Project Report. An ideal blog
entry will have around 50-150 words (150-600 words a week).
2. Presentation
Project Plan Sample Format
(subject to change or modified to include systems development
projects)
1. Title: Emerging Technology and Innovation Topic
1. Project Blog ( Web address provided)
2. Weekly Progress Reports Plan (In class, Discussion Board or
Project Blog entries)
2. Rationale
1. Problem domain
2. Purpose and justification
3. Supervisor Approval
4. Research Questions
5. Conceptual or Theoretical Framework
6. Methodology
1. Analysis of sources of information (EndNote, APA
Referencing Style)
2. Research method(s)
3. Data collection or systems design methods
4. Ethical Issues
5. Compliance Requirements (Workplace, Industry or
Government regulations)
7. Project Plan
1. Deliverables (Annotated Bibliography, Journal Paper, Report,
Seminar)
2. Work breakdown structure (WBS)
3. Risk Analysis
4. Duration
5. Gantt chart
3. 8. References
9. Appendix (if required)
Final project
Formulating Strategic Management Decisions
This final project is based on the following Harvard Business
case study:
Khachatryan, D. (2014). Amarcord Incorporated: Combating
money laundering using data analytics. Harvard Business Case
Study. Retrieved from https://hbsp.harvard.edu/tu/789925b5
Assume your client accepted your urgent business proposal to
design a data-driven approach to effectively accomplish the
goal of fraud detection in financial institutions. Data analytics
for fraud detection in financial institutions is the strategic
management vision of Amarcord Inc.’s Chief Compliance
Officer. Your work in teams is based on the average or
aggregate monthly incoming wire transfer of $500,000 for a
swimwear chain, considered highly unusual by business analysts
for that business chain. In other words, it is impossible for a
business chain of that size to earn such high monthly revenue.
After reading and analyzing the case, each team is required as
part of the final project to address the following:
Identify and address the business problem and explain the need
for a data analytic solution.
Explain the data analytic approach to tackle the business
problem.
Explain the nature and structure of the received data (i.e., the
average monthly revenue of $500,000)
4. and how data inconsistencies can be resolved.
To what extent is competitive intelligence and ethical standards
relevant to your analysis and solution(s)?
How does cultural diversity impact the problem identification
and or analysis of this case?
Elaborate on all the undertaken modeling and forecasting
strategies.
Emphasize and summarize key findings as well as observations
and recommend further steps that your client should undertake
in the data analysis realm which could potentially lead to
another engagement with your team.
Include how the company could work with various stakeholders
currently and in the future; include desired outcomes.
Address how the organization’s culture influenced the situation
within the case and give recommendations for culture
improvements and your team’s ideas about changes that support
innovation and ethical conduct.
Deliver your project report to provide clear and thorough
answers that both technical and non-technical audiences will
understand.
Your team’s written paper should meet the following
requirements:
Be eight to ten pages in length, plus exhibits or illustrations
Be divided into the following sections:
Identification of business problem and evaluation of the need
for a data analytic solution.
Explanation of the data analytic approach to tackle the business
problem.
Explanation of the nature and structure of the received data
(i.e., the average monthly revenue of $500,000) and how data
inconsistencies can be resolved. Do you agree or disagree with
the business analysts that the aggregate monthly revenue of
swimwear is three times higher than the industry average?
Justify your position.
5. Evaluation of all the modeling and forecasting strategies
undertaken as brainstorming solutions and so forth.
Summary of key findings as well as observations and
recommended further steps that your client should undertake in
the data-analytic realm, which could potentially lead to another
engagement with your team.
Deliver your project report to provide clear and thorough
answers that both technical and non-technical audiences will
understand.
Support your project with 10 to 12 peer-reviewed articles. Be
formatted according to APA.
Include a title page, introduction, conclusion, and references
page.
A Secure IoT Service Architecture With an Efficient Balance
Dynamics Based on Cloud and Edge Computing
Abstract:
The Internet of Things (IoT)-Cloud combines the IoT and cloud
computing, which not only enhances the IoT's capability but
also expands the scope of its applications. However, it exhibits
significant security and efficiency problems that must be
solved. Internal attacks account for a large fraction of the
associated security problems, however, traditional security
strategies are not capable of addressing these attacks
effectively. Moreover, as repeated/similar service requirements
become greater in number, the efficiency of IoT-Cloud services
is seriously affected. In this paper, a novel architecture that
integrates a trust evaluation mechanism and service template
with a balance dynamics based on cloud and edge computing is
proposed to overcome these problems. In this architecture, the
edge network and the edge platform are designed in such a way
as to reduce resource consumption and ensure the extensibility
of trust evaluation mechanism, respectively. To improve the
6. efficiency of IoT-Cloud services, the service parameter template
is established in the cloud and the service parsing template is
established in the edge platform. Moreover, the edge network
can assist the edge platform in establishing service parsing
templates based on the trust evaluation mechanism and meet
special service requirements. The experimental results illustrate
that this edge-based architecture can improve both the security
and efficiency of IoT-Cloud systems.
Published in: IEEE Internet of Things Journal ( Volume:
6 , Issue: 3 , June 2019 )
Page(s): 4831 - 4843
Date of Publication: 13 September 2018
ISSN Information:
INSPEC Accession Number: 18757966
DOI: 10.1109/JIOT.2018.2870288
Publisher: IEEE
Funding Agency:
SECTION I.Introduction
The Internet of Things (IoT) is based on a very large number of
objects/things that connect to the Internet to help humans
perceive the world and improve their quality of life [1].
However, there are many IoT characteristics, such as limited
storage and processing capacity, that can reduce the service
performance of the IoT [2]. Cloud computing can address these
limitations associated with the IoT in terms of management,
storage, computation, and processing. Moreover, cloud
computing can create more services by integrating IoT
resources. Due to these advantages, the concept of IoT-Cloud
has been proposed. This concept combines the advantages of the
IoT and cloud computing technologies to provide more and
better services [3]. However, there are still some security and
efficiency problems with IoT-Cloud that must be solved.
The IoT is vulnerable to security threats, especially internal
attacks that frequently occur in the physical device layer and
7. the network communication layer [4]. Unlike internal attacks,
external attacks can be resisted by traditional security
mechanisms, such as encryption, authorization, and auditing [5].
However, traditional security mechanisms cannot resist internal
attacks effectively, especially in the resource-constrained
IoT [6]. In an internal attack, the attacker is in possession of
some IoT devices and then conducts further attacks using these
captured devices [7]. The trust evaluation mechanism, which is
designed to solve internal attack issues, is an effective
supplement to the traditional security mechanism [8]. However,
many trust evaluation mechanisms in the IoT consume a lot of
resources, which has a large impact on the IoT performance and
lifetime. With increasingly many types of internal attacks
appearing, it is unlikely that the size of the trust evaluation
mechanism will be reduced.
With the increase in the number of IoT-Cloud applications,
increasingly more repeated/similar requirements are sent to the
cloud. It is inefficient for an IoT-Cloud system to address these
requirements one by one and constantly improving hardware
performance is not a long-term solution. In addition, there are
delay issues in IoT-Cloud services since the cloud is far away
from users and the IoT [9]. As failed services also reduce
efficiency, it is necessary to solve some uncertainties in the
IoT, such as device faults, network congestion, and large
environment changes. In order to avoid these situations,
monitoring, and data analysis tasks can be performed, however,
it is not advised to perform these tasks in the cloud.
To solve the above problems, an edge-based IoT-Cloud
architecture with a trust evaluation mechanism and service
template was established. Edge computing is performed at the
Internet’s edge with a lot of computing and storage nodes, such
as gateways, routers, mobile fog nodes, and edge servers, which
are close to the underlying network [10]. Edge computing also
refers to cloudlets, micro datacenters, and fog nodes, which has
advantages in the quick response to cloud services [11], [12].
The edge computing layer in this architecture is divided into
8. two main parts: 1) the edge network and 2) the edge platform.
The edge network is established on underlying edge nodes
(move/static powerful nodes) and is parallel to the IoT. The
edge platform is composed of edge nodes (edge servers) that lie
between the IoT and cloud, and this platform is a central hub of
the IoT-Cloud service architecture [13].
The main contributions can be summarized as follows.
1. An edge network was adopted to move a large part of the
trust evaluation mechanism out of the IoT. In the IoT, devices
perform the direct trust calculation and send exceptions to the
edge network. The edge network collects trust information from
devices and analyzes this information for the entire trust state
of the IoT.
2. Service templates were established in the cloud and on the
edge platform. The service parameter template in the cloud
stores the matching information while the service parsing
template on the edge platform stores the matching information
and parsing strategies.
3. The trust evaluation mechanism was integrated into IoT-
Cloud services via edge computing. In the process of IoT
service strategy establishment, the trust evaluation mechanism
enables the edge platform to select trusted devices in order to
generate or transfer data. Moreover, the edge network can
monitor the IoT network load with balance dynamics and assist
the edge platform in timely adjusting strategies.
This paper is organized as follows. In Section II, related work is
introduced. The basic concept of a novel architecture is
presented in Section III. Section IV presents the detailed design
of the edge network, the edge platform and the functions in the
cloud. Experiment results and analyses are reported in Section
V. The final section concludes this paper.
SECTION II.Related Work
To address internal attack issues, many trust mechanisms have
been proposed. The trust mechanism plays an important role in
many aspects, such as reliable data fusion and mining, user
privacy protection, information security enhancement, and
9. service assurance [14], [15].
In some cases, the IoT has both physical and social attributes.
Based on this feature, Chen et al. [16] proposed a trust
mechanism that can select effective feedback through a
similarity filtering method based on friendship, social contact,
and community of interest relationships. Moreover, to minimize
the trust convergence time and resist recommendation trust
attacks, an adaptive filtering technique is designed to find the
best means of combining direct trust and recommendation trust.
To resist attacks aimed at the recommendation trust, such as
bad-mouthing, Alshehri et al. [17] proposed a scalable trust
management solution based on IoT clustering to address
practical and pressing issues. Of course, all storage and
computation tasks are performed by physical IoT devices, which
requires greater energy consumption. Considering trust
derivation, Duan et al. [18] proposed an energy-aware trust
derivation scheme that manages overheads through adopting a
game theoretic approach in the trust derivation process.
However, this scheme only provides partial security, and it is
difficult to accurately measure the level of security.
There are many trust-based intrusion detection systems (IDSs)
in wireless sensor networks (WSNs), which are used to defend
against internal attacks. However, the efficiency of IDS is
reduced on the IoT due to the very large amount of data that is
generated during a short period. Meng et al. [19] proposed a
Bayesian-based trust management method that incorporates
traffic sampling into IDS under a hierarchical structure. Liu et
al. [20] proposed a physical IDS-to-gateway and virtual IDS-to-
gateway detection model that detects attacks against both
physical sensors and virtual sensors (VSs). In IDSs, false alarm
messages cannot be avoided and the intrusion detection
threshold is difficult to set.
To solve data error issues in WSNs, Yang et al. [21] proposed a
data error detection approach via which the cloud can quickly
detect and locate errors in large sensor data sets. Data
collection and transmission is an important part to maintain the
10. QoS of IoT-Cloud. To ensure trustworthy data collection,
Wang et al. [12] adopted mobile sinks to collect sensor data and
used a CTDC system to evaluate the trustworthiness of both
sensors and mobile sinks. To improve the data transfer
environment, Zhu et al. [22]proposed a trust-assisted sensor-
cloud (TASC) system that selects trusted sensors in WSNs and
trusted data centers in the cloud to constitute the data transfer
route from sensor to user. However, there are still many
problems to be solved in the data trust level, such as time
delays, data level attacks, and data integrity.
In IoT-Cloud, a very large number of connected devices and
services emerge, causing network load issues in the centralized
cloud architecture. To optimize IoT-Cloud services, Barcelo et
al. [23] defined the service distribution problem (SDP) of IoT-
Cloud as IoT-CSDP and solve this problem through linear
programming. For IoT-Cloud services, one single service cannot
meet users’ uncertain requirements. Automatic service
compositing is designed and used to realize automatic matching
of services and requirements with the goal of fulfilling users’
requirements with the least number of IoT-Cloud services. In a
multiple Cloud-based IoT application context, Baker et
al. [24] proposed an optimization algorithm to realize energy-
aware service composition.
Service optimization problems (SOPs)—problems with service
selection and service resource scheduling—are caused by the
increasing number of services and increasing variety of
requirements. Based on service domain features, Xu et
al. [25] proposed a paradigm of service domain-oriented
optimization algorithms with artificial bee colony algorithms to
solve SOPs effectively. For services in IoT-Cloud systems,
there are two issues that deserve more attention to achieve the
goal of green and sustainable development; one is that many
users require the same data from the cloud and the other is that
multiple users request data from the cloud simultaneously. To
reduce the resource cost due to these two issues, Zhu et
al. [26] proposed an MMDD scheme. In the process of IoT-
11. Cloud systems providing service, many applications require data
from different regions, i.e., a single virtual machine (VM) in a
particular data center needs to integrate many VSs from
different data centers. To ensure high QoS and maintain user
satisfaction, Chatterjee et al. [27] designed an optimal decision
rule for selecting the appropriate data center, which stores a
single VM to serve users.
However, existing schemes have some shortcomings in terms of
security management and service provision, such as one-
sidedness, low expandability, high resource consumption, large
delay, and inefficiency. Moreover, few studies consider the
repeated/similar service issues encountered in many fields, such
as smart transportation, healthcare, and augmented
reality [28], [29]. Edge computing may present a more
advantageous platform for solving these issues via an integrated
approach; edge computing is an affordable and sustainable
computing paradigm to provide many services [30], [31]. For
the design, the edge network can reduce the unnecessary
communication in the trust evaluation mechanism, maintain the
IoT load balance, perform special IoT services, and ensure data
transfer reliability. Moreover, the edge network is more suitable
for mobile IoT. More fine-grained or integrated service
templates are saved in the edge platform, which is flexible and
scalable to an increasing number of IoT services. Moreover,
many trust evaluation mechanisms can be established in the
edge platform, such as the device fault detection, data error
detection, and internal attack detection at the data level because
edge computing has a lower latency and can identify problems
with a smaller computational cost.
SECTION III.Preliminary
A. Trust Evaluation Mechanism
The concept of trust is based on human social relationships.
There is no precise definition for such a thing in IoT-Cloud.
Zhu et al. [22] proposed a definition in the context of wireless
communications.
12. The trust of a node A in a node B is the subjective expectation
of node A receiving positive outcomes from interaction with
node B in a specific context.
B. Novel Service Architecture
The service architecture of the IoT-Cloud system is divided into
three layers: 1) the data collection layer; 2) the data processing
layer; and 3) the application service layer, as shown in Fig. 1.
In this novel service architecture, the edge network lies in the
data collection layer, the edge platform is located in the data
processing layer and the application service layer, and the cloud
is a part of the application service layer.
Fig. 1.
Typical example for IoT-Cloud service.
View All
The edge network has the following primary advantages.
1. Replacing the recommendation/indirect trust.
2. Balancing the IoT load dynamically and selecting trusted
devices to perform the service by establishing the entire trust
state of the IoT.
3. Executing special user requirements, such as delay, integrity,
and precision.
The edge platform consists of four primary functions.
1. Virtualizing physical devices into virtual devices.
2. Creating the parameter template Templateparameter and the
parsing template Templateparsing in the edge platform.
3. Balancing dynamically the cloud load by providing some
service on the edge platform.
4. Cooperating with the edge network to ensure IoT reliability
at the data level.
The cloud mainly performs the following functions.
1. Parsing user requirements and finding the
related Templateparameter in the cloud, before sending the
special digital information to the target edge platforms.
13. 2. Cooperating with the edge platform to create a
new Templateparsing when there is no
corresponding Templateparsing and storing this
new Templateparameter .
3. Preferentially processing services that have more stringent
demands.
4. Storing a lot of historical data to be used for deeper data
mining and analysis.
C. Three Basic Service Scenes
There are three basic service scenes in which the user
requirements are limited to one IoT, as shown in Fig. 2. Many
mixed-service scenes where the user requirements are based on
multiple IoTs can be expressed as combinations of basic scenes,
for example smart environment applications, such as smart
transportation, healthcare [32], and augmented reality. These
smart environment applications have many users and receive a
large number of repeated/similar requirements.
Fig. 2.
Three types of service scenes. (a) Service Scene 1. (b) Service
Scene 2. (c) Service Scene 3.
View All
In Scene 1, a user requires a service from IoT-1, as shown
in Fig. 2(a). The user enters their requirement in an
application/Web, and then the application/Web sends this
requirement to Edge-1. Edge-1 digitizes this requirement and
checks whether there is a corresponding Templateparameter . If
there is a Templateparameter , the user requirement is
completed by the corresponding Templateparsing in Edge-1. If
not, Edge-1 sends the digitized requirement to the cloud. The
cloud then cooperates with Edge-1 to establish a
new Templateparsing according the specifications of the IoT,
such as its functions, limitations, and precision. Finally, the
cloud sends Templateparameter to Edge-1.
14. In Scene 2, the required IoT-2 is closer to IoT-1. If Edge-1 has
a Templateparameter for the user’s requirement, the requirement
is completed by Edge-1. Edge-1 sends the special digital
information to Edge-2 and receives service results from Edge-2.
If Edge-1 has no Templateparameter , there are several further
steps to satisfy the user’s requirement, as shown in Fig. 2(b). In
step 1, the user sends the service requirement to Edge-1. In step
2, Edge-1 digitizes this requirement. In step 3, Edge-1 sends the
digitized requirement to the cloud because this requirement is
beyond the capability of Edge-1. In step 4, the cloud
seeks Templateparameter , sends the special digital information
to Edge-2, and informs Edge-2 to communicate with Edge-1. If
there is no Templateparameter , the cloud cooperates with Edge-
2 to establish a new Templateparsing . Finally, Edge-2
communicates with Edge-1 to send the service results to the
user. Edges periodically obtain the
latest Templateparameter from the cloud, or the updating is
triggered by the users’ service requirements.
In Scene 3, the situation is similar to Scene 2 except that Edge-
3 is far away from Edge-1. As there is no Templateparameter in
Edge-1, the requirement is completed by performing many
steps, as shown in Fig. 2(c). Starting with step 4, the following
steps have some differences from those described in Scene 2. In
step 4, the cloud seeks a Templateparameter and sends the
special digital information to Edge-3. If there is
no Templateparameter , the cloud cooperates with Edge-3 to
establish a new Templateparsing. In step 5, Edge-3
executes Templateparsing and returns the result to the cloud.
Finally, the cloud returns the service result to Edge-1.
SECTION IV.Design of the Proposed Novel Service
Architecture
A. Coverage of the Edge Network
The design of IoT in IoT-Cloud systems is usually hierarchical,
as shown in Fig. 3. Moreover, mobile IoTs are also based on
similar hierarchical architectures. It is ideal that the edge
15. network obtains high effective coverage through fewer edge
nodes in the IoT [33]. There are two means of managing edge
nodes: 1) the fixed mode and 2) the moving mode.
Fig. 3.
Typical example of IoT.
View All
For the fixed mode, edge nodes are placed in fixed positions of
isoheight. However, this mode requires a large number of edge
nodes to achieve high coverage.
For the moving mode, edge nodes have a fixed isoheight moving
range; this mode needs less edge nodes but has slightly weaker
real-time performance. Internal attacks do not occur all the
time, so the moving mode is a good choice in certain situations.
The key issue associated with this mode is determining how to
dispatch edge nodes to move and how to update the trust state
of the IoT in the edge network. As an example, there are three
isoheights and many edge nodes, such as isoheight−1:(D1,D2 ,
and D3 ), isoheight−2:(D4,D5,D6,D7,D8 , and D9 ),
and isoheight−3:(D10,D11,D12,D13,D14,D15,D16,D17,D18,D1
9,D20 , and D21 ). Every inner edge node communicates with
two outer edge nodes, such as D1with (D4 , D5 ), D2 with
(D6 , D7 ), and D4 with (D10 , D11 ). For information
interaction in the edge network, the outer edge nodes perform
interactions prior to the inner edge nodes. In these
circumstances, the inner edge nodes have more comprehensive
knowledge regarding the IoT. The information updating is
periodic or triggered by great changes, such as devices moving
across areas. The general process of information updating is
from the outside to the inside, and the inner node is used as the
information relay point between two further nodes. If there are
abnormal trust states for some devices, inner edge nodes
interact with corresponding outer edge nodes to verify and even
isolate malicious devices.
16. B. Physical Device Virtualization in the Edge Platform
The virtualization of physical devices is designed to solve the
problem that one physical device cannot be shared by multiple
applications. For virtualization, it is better to prepare a
corresponding virtual device in advance for every physical
device; these virtual devices are stored in the edge platform as
finer-grained resources. As an example of data sharing, when
service parsing templates need to call the physical device, the
edge platform allocates corresponding virtual device interfaces
to these service parsing templates, as shown in (1). The virtual
device sends data to service templates and changes the
parameter settings of physical devices according to relevant
requirements. The key to virtualization is standardization of the
data output format because the data format of physical devices
may be heterogeneous, as shown in (2). A virtual device
receives heterogeneous data and transforms it into a standard
data format. This data is then sent to service templates.
Standardization of the data output format is beneficial for
further data processing, such as aggregation, integration, and
extraction
Devicephysical⇒virtualization⎧ ⎩ ⎨ ⎪ ⎪ Formatdevice−1⋮ Format
device−n⇒access⇒transformationDevicevirtual⇒interface⎧ ⎩ ⎨
⎪ ⎪ Service1⋮ Servicen⎧ ⎩ ⎨ ⎪ ⎪ Device1virtual⋮ DevicenvirtualF
ormatstandard.(1)(2)
View Source
C. Trust Evaluation Mechanism
Table I shows the correspondence relationship between words
and abbreviations.
TABLE I List of Abbreviations
1) Trust Evaluation Mechanism in the IoT:
In the IoT, the main body of trust evaluation mechanism is the
direct trust Tdirect , which is calculated based on evidences
from direct communications among adjacent devices. These
evidences may include the device residual energy, the device
17. routing failure rate, the device communication success rate, the
device data correctness rate, the device signal strength, and the
device forwarding delay. These evidences can be further
organized into three categories: 1) the general trust evidence; 2)
the network state detection evidence; and 3) the confirmation
trust evidence. In every device, the general trust evidence is
stored in an array Arrayevidences , which is then used to
calculate Tdirect , as
Tdirect=f(xi)=∑i=1nWeighti×f(xi)⎧ ⎩ ⎨ ⎪ ⎪ ⎪ ⎪ EvnormalEvtotal
,w1×EvnormalEvtotal+w2×TEvold,0,if ∣ ∣ TEvold−EvnormalEv
total∣ ∣ <Td1if Td1<∣ ∣ TEvold−EvnormalEvtotal∣ ∣ <Td2else(
3)
View Sourcewhere, Weighti is the weight value of the i th piece
of evidence, which is set according to the importance of the i th
piece of evidence. f(xi) is the trust value of the i th piece of
evidence, whose value is between 0 and 1. n is the number of
needed pieces of evidence, which may vary in different IoT
environment. Evnormal is the normal behavior number of times
for the i th device, whereas Evtotal is the total monitoring
number of times for the ith device. Td1 and Td2 are two
thresholds for the difference value between the old trust value
and new trust state, and w1 and w2 are two weight values for
the old trust value and new trust state, whose values are set
according to the monitoring sensitivity. The smaller the values
of Td1 and Td2 are, the higher the sensitivity is. If the value
of w1 is larger, the value of f(xi) would converge quickly
to (Evnormal/Evtotal) in (3).
The network state detection evidence mainly focuses on how to
reduce device communication pressure and ensure network load
balancing dynamically, such as monitoring the routing failure
rate and the communication collision rate to dynamically adjust
the data transfer route of Templateparsing . When this type of
evidence reveals outliers, they are sent to the edge network as
exceptions.
The confirmation trust evidence refers to seriously abnormal
behaviors that directly trigger the trust state confirmation
18. procedure in the edge network, such as larger forwarding delays
and frequent communication requests. There are two types of
exceptions that trigger the trust state confirmation procedure:
one is that the difference value shown in (4) is greater
than Td3 (a threshold set by the manager) during the direct trust
calculation, while the other is that the confirmation trust
evidence triggers this procedure
Difference=∣ ∣ Tnewdirect−Tolddirect∣ ∣ .(4)
View Source2) Trust Evaluation Mechanism in the Edge
Network:
The edge network is parallel to the IoT and does not participate
in normal IoT data transfer. In the edge network, there is a table
in every edge node that stores some information about the
devices and trust states, which is used to ensure that the entire
IoT is credible, as shown in Table II. Time in Table II is the
time since the last trust update.
TABLE II Information About Devices and Trust States
There are a set of rules for the execution of the trust evaluation
mechanism in the edge network.
1. The edge network periodically updates and stores the trust
values of every device. The trust values of every device in the
edge network are affected by three aspects: the first aspect is
the trust values in the IoT (when the updating period arrives,
the edge network selects trust values from trusted devices and
calculates the mean trust value for every device); the second
aspect is the exceptions from the IoT (when the cumulative
amount of these exceptions reaches threshold , trust updating
and the trust confirmation procedure are triggered); and the
third aspect is the exceptions from the edge platform (when
such exceptions happen, the trust value of the corresponding
device is temporarily set to 0, and the trust confirmation
procedure is triggered).
2. In the trust confirmation procedure, the edge network
proactively detects the target device’s behavior and monitors
19. environment information to confirm whether the target device’s
data is unrealistic.
3. For trust values in the IoT, when the updating period arrives,
the edge node obtains trust tables from every device in its
managing scope. Every trust value in these trust tables is
compared with the corresponding final trust value, and trust
values beyond the tolerance range of the corresponding final
trust value are flagged as outliers. If there is a high fraction of
outliers in one trust table, the device is considered to be
malicious.
4. The physical device does not proactively obtain
recommendation trust from the edge network unless there is no
trusted device to transmit data or there is a new device in the
IoT. If the trust value in the physical device is not very
different from the final trust value in the edge network, the edge
network will not change the trust value in physical devices.
5. For isolating malicious devices, the edge node informs
normal devices to remove the route that has malicious devices.
The method of isolating malicious devices using the edge
network is efficient, accurate, and fast.3) Trust Evaluation
Mechanism in the Edge Platform:
The edge platform ensures data credibility at the data level. If
possible, it is more beneficial to collect every physical devices
historical trust values to be used in analyses, such as analyzing
the relationship between the device performance change curve
and the trust value curve, the effect of environment changes on
device trust value and the connection between the load and trust
state for every part of the IoT. Moreover, the edge platform has
the potential to expand further to address the increasing variety
of internal attack types.
Some hidden data attackers may behave normally but produce
incorrect data causing users to make wrong decisions. Detecting
this type of attack is difficult in the IoT because the
establishment of this detection mechanism in the IoT consumes
more resources, such as communication, computation, and
storage. However, the edge platform can use data correlations in
20. the IoT to address hidden data attacks.
1. Device data redundancy. For obtaining more precisely
integrated and stable data, many IoTs allocate more devices to
monitor the same parameter in a certain area. Thus, data from
different devices fluctuate within a fixed range. In the edge
platform, this data can be picked out and judgments can be
performed when the period of detection arrives, as
Tdevice={1,0,if Tdlower<Datadevice<Tdupperelse.(5)
View SourceThe upper limit, Tdupper , and the lower
limit, Tdlower , can be obtained from the underlying edge node
in this area. If data are out of range, the exception would trigger
the detection mechanism.
2. Device data gradualness. The monitored target has
directionality, which can be orderly sensed by devices in this
direction. The topology of the monitoring area is perceived by
underlying edge nodes and this topology is then sent to the edge
platform. According to the data gradualness and topology, the
edge platform can determine the ideal data model, obtain real
data from devices, and contrast this data with the ideal data
model. If there are many outliers, the corresponding physical
devices are considered malicious.
3. Some impossibilities. In monitoring areas, there are some
barriers that prevent devices from detecting the target although
they are close to the target. Thus, if a device breaks this
impossibility, it is considered malicious.
Of course, there may be many factors that cause the trust
evaluation mechanism to misjudge legitimate devices as
malicious devices, such as sudden changes in the environment,
temporary failure of devices, and attacks against the trust
evaluation mechanism. In most cases, these devices will need to
be analyzed based on their previous and future data to
determine whether they are malicious. If not, it is necessary to
perform trust recovery of these devices via the trust
confirmation procedure.
D. Service
21. Since the cloud connects different areas together, services in the
cloud can be divided into two categories: 1) local services and
2) remote services. In local services, users’ requirements can be
completed locally by the edge platform, whereas in remote
services, users’ requirements are completed by the cloud or both
the cloud and the edge platform. The selection of local or
remote services is determined by the resource
consumption Conresource and the total time
consumption Contotaltime , as shown in (6). There are several
judgment criteria and these are shown in Table III
Conresource=Contotaltime=Constorageresource∩Conprocessing
resource∩ConbandwidthresourceContransmissiontime+Contrans
fertime+Conprocessingtime.(6)
View Source
TABLE III Judgment Criteria
In the above, Constorageresource is the required storage
space. Conprocessingresource is the required hardware resource
that is used to process data. Conbandwidthresource is the
bandwidth required for the user service. The values of the above
three factors are 1 or 0. If the value of any factor is 0, the value
of Conresource is 0. Contransmissiontime is the time required
for data transmission, Contransfertime is the required transfer
time spent on routes among the user, cloud and IoT,
and Conprocessingtime is the time required for data processing.
To free the edge platform and cloud from addressing the same
or similar service requirements, it is better to create service
templates (Templateparameter and Templateparsing ) in the
cloud and the edge platform. Templateparameter is created in
the cloud and focuses on areas, service types, service
parameters, etc. Additionally, the edge platform
stores Templateparameter to complete local service
requirements. Another type of template in the edge platform
is Templateparsing , which corresponds
to Templateparameter . Templateparsing pays more attention to
22. the IoT, device, parameter setting, basic service parsing
template Templatebasicparsing ,
etc. Templateparameter consists of three parts: 1) the serial
number of Templateparameter (corresponding to the digitization
of the requirement); 2) the IDcloud (the special serial number
that corresponds to that IDedge in Templateparsing ); and 3) the
execution command (how the cloud sends IDcloud and where
the cloud sends IDcloud ). Templateparsing is composed of
three parts: 1) the IDedge ; 2) the number of strategies
(one Templateparsing may have several strategies); and 3) a
series of commands (the implementation of one strategy). The
service process is presented in Algorithm 1, and the result
processing is rendered in Algorithm 2.
Algorithm 1 Service Process
User’s Requirement
ArrayEdge−1result,Arraycloudresult , Resultintegration // Two
result sets that are in the cloud and Edge-1, respectively
Req→Edge−1 ; // User’s requirement is sent to Edge-1 in these
service scenes
Req→extraction Set(area,rangeparameter,typeparameter,⋯,types
ervice) ; // Edge-1 extracts important information from the
user’s requirement and puts it into Set
Set→digitizationArrayparameter+Resultintegration ; //Edge-1
digitizes Set into a series of numbers that correspond
to Templateparameter , and the integration manner of these
results is stored in Resultintegration
Arrayparameter→lengthLengtharray ;
for i from 1 to LengthArray do //Finding Templateparameter for
every Parameter
if Array[i]∈ Templateparameter and Conresource==1 in Edge-
1 then //Templateparameter is in Edge-1 and Edge-1 can
complete this part
Edge-1 sends IDcloud in Templateparameter to corresponding
Edges;
Edges find Templateparsing according to IDcloud and execute
23. it;
Edges return results to Edge-1, and Edge-1 stores these results
into ArrayEdge−1result ;
else
Send Array[i] to the cloud;
if Array[i]∈ Templateparameter in
cloud then // Templateparameter is in the cloud
if Cloud.Contotaltime>Edge1.Contotaltime and Conresource==1
of Edge-1 then //Edge-1 can independently accomplish this part
with less time
The cloud sends IDcloud in Templateparameter to
corresponding target Edges;
Edges find Templateparsing according to IDcloud and execute
it;
Edges return results to Edge-1, and Edge-1 stores these results
into ArrayEdge−1result ;
Edge-1 updates its Templateparameter from the cloud;
else
The cloud sends IDcloud in Templateparameter to
corresponding target Edges;
Edges find Templateparsing according to IDcloud and execute
it;
Edges return results to the cloud, and the cloud stores these
results into Arraycloudresult ;
end if
else //Creating new Templateparameter
The cloud checks specifications of Edges and generate a
new Templateparameter ;
The cloud sends parsing commands and Templateparameter to
target Edges and instructs Edges to construct a
new Templateparsing ;
Edges complete services through the edge network;
if Cloud.Contotaltime>Edge.Contotaltime and Conresource==1
of Edge-1 then
Edges return results to Edge-1, and Edge-1 stores these results
into ArrayEdge−1result ;
24. else
Edges return results to the cloud, and the cloud stores these
results into Arraycloudresult ;
end if
end if
end if
end for
Algorithm 2 Result Processing
ArrayEdge−1result,Arraycloudresult , Resultintegration
Service Result
if Edge-1 satisfies Resultintegration then //Edge-1 can perfect
final result processing
Calculating the transmission time of ArrayEdge−1result from
Edge-1 to the cloud, Edge1.Contransmissiontime ; //Method:
removing the common parts of two assumptions, and compare
their different parts
Calculating the transmission time of Arraycloudresult from the
cloud to Edge-1, Cloud.Contransmissiontime ;
Getting the transfer time consumption from Edge-1 to
cloud, Contransfertime ;
if Edge1.Contransmissiontime+Contransfertime<Cloud.Contrans
missiontime then //The expected time consumption in Edge-1 is
larger than in the cloud
Selecting the cloud as the platform for final result processing;
Returning the final result to Edge-1 and user;
else
Selecting Edge-1 as the platform for final result processing;
Returning the final result to user;
end if
else
Selecting the cloud as the platform for final result processing;
Returning the final result to Edge-1 and user;
end ifTheorem 1:
All time complexities in digitization,
Seeking Templateparameter and
25. Seeking Templateparsing are O(1) .Proof:
The digitization of requirement is correlated with the method of
establishing the table. As an example, assume that the number
of broad categories is M , and the number of subgroupings for
every broad category is a variable N . The maximum number of
lookups is (M+Nmax) , whose time complexity is O(1) . Of
course, there may be many levels, such as level(M,J,I) . In this
case, the total number of lookups is (M+J+I+Nmax), whose time
complexity is also O(1) .
The seeking of Templateparameter and Templateparsing can be
realized by converting from the number to the address of table,
whose time complexity is O(1) . To reduce the size of the data
table, tables are also built in a hierarchical manner, such
as level(A,B,C). In this case, the number of lookups
is (A+B+C) , whose time complexity is O(1) .
Next, the services of IoT-Cloud are introduced in detail from
three aspects as follows.1) Service in the Cloud and the Edge
Platform:
Requniversal⇒extraction⇒match⎧ ⎩ ⎨ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ areatypeser
vice⋮ typeparameter⇒digitizationParameterTemplateparameter⇒
distribution⎧ ⎩ ⎨ ⎪ ⎪ Edge−1⋮ Edge−n.(7)
View Source
User requirements can be divided into two categories: 1)
universal requirements Requniversal and 2) special
requirements Reqspecial . For Requniversal , there is a
corresponding Templateparameter in the cloud or the edge
platform. The execution process of Requniversal is shown
in (7). First, some important information is extracted
from Requniversal and placed into a
set Set(area , typeservice, typeparameter,…, rangeparameter ).
Second, Set is digitized as a Parameter (single service) or a set
of Parameter that are Set(parameter) (combined services).
Third, the cloud or the edge platform locates the
corresponding Templateparameter from its database.
Finally, IDcloud is sent to the corresponding edge platforms.
Every Templateparameter may have several IDcloud that
26. correspond to several edge platforms. This method not only
reduces the data transfer volume but also shortens the service
parsing time.
There are many notes.
1. The user requirements are from websites or Apps that have
fixed formats.
2. The cloud digitizes important information as a serial number
and seeks an appropriate Templateparameter using this serial
number. Of course, the digitization mostly occurs on the edge
platform.
3. For the distribution, it is better to select high-trust edges.
However, if there are many requirements that are in the waiting
queue, the cloud should select other trusted edges unless the
user has special demands.
4. If there are some new edges, the cloud should create or
update new Templateparameter according to the edges’
specifications.
For Reqspecial , there is no Templateparameter in the cloud or
the edge platform. After digitizing important information about
the users requirement as Parameter, the cloud finds appropriate
edges according to Parameter and the edges’ specifications. The
cloud then generates Templateparameter . Subsequently, parsing
commands and this new Templateparameter are sent to the
corresponding edges. Finally, the cloud guides the edge
platforms to establish Templateparsing . Meanwhile, the service
is finished by the edge network. If there are many edge
platforms that can meet the demands, the cloud will select
trusted edge platforms to complete this requirement. If edge
platforms can finish it, Templateparameter is stored in the cloud
and the edge platform, and Templateparsing is stored in the
edge platform.2) More Services in the Edge Platform:
In different Templateparsing , commands tend to contain a lot
of overlapping parts, so combinations of overlapping parts can
fulfill these commands. These overlapping parts are designed
as Templatebasicparsing ; these Templatebasicparsing constitute
more complex Templateparsing , as shown in (8). Moreover,
27. these Templatebasicparsing should be variable to address
changing service requirements
⎧ ⎩ ⎨ ⎪ ⎪ ⎪ ⎪ Templatebasic−1parsing⋮ Templatebasic−nparsing
→combinationTemplateparsing.(8)
View Source
There are several notes.
1. Since many applications can share data from one physical
device, the standard state setting of this physical device should
be based on the frequency of requirements.
2. For low-frequency requirements whose state setting norms
are lower than the standard state setting, the data volume can be
reduced to satisfy these requirements. In this manner, the
performance of the edge is guaranteed, and the service waiting
time is decreased.
3. For low-frequency requirements whose state setting norms
are high than the standard state settings, the edge network can
be utilized to perform these services.
These Templatebasicparsing and Templateparsing are stored in
the edge platform. When parsing commands from the cloud are
sent to the edge platform, the edge platform directly finishes
them using the edge network and creates Templateparsing .
When IDcloudis sent from the cloud to the edge platform, the
edge platform directly seeks the
corresponding Templateparsing to finish it.3) Service in the
Edge Network:
Edge computing takes on two important roles in IoT-Cloud
services. The first is that edge computing can maintain the
performance and QoS of the IoT. The second is that edge
computing can execute special tasks without increasing the
communication load of the IoT.
The edge network records the trust states of all devices in the
IoT and these records are used to create data transfer routes.
Moreover, in the process of creating or
updating Templateparsing , the edge network provides the trust
state of every device to the edge platform. The edge platform
creates one or more transfer routes for
28. every Templatebasicparsingor Templateparsing . When one
transfer route has some problems, Templateparsingadopts other
transfer routes to perform services. Through this method, the
credibility and real-time nature of data can be well guaranteed.
Since edge computing has advantages for performing IoT
functions, the edge network is employed to realize special
services, such as more-real-time services, higher priority
services, and more precise location services.
SECTION V.Evaluation
In this section, the performance of the trust evaluation
mechanism and the service time consumption are described and
discussed.
A. Parameter Settings
The simulation platform is MATLAB R2016b. The experimental
setting consists of four IoTs and one cloud, where every IoT has
an edge platform, and the cloud is located in the middle of the
four IoTs. Edge-2 and Edge-4 are closer to Edge-1, and Edge-3
is far from Edge-1. In every IoT, there are 56 devices. These
devices are randomly distributed in the IoT, and different types
of devices are placed in each IoT for some specific experiments.
Six underlying edge nodes are placed on two isoheights of every
IoT. We set the following: for general IoT services, the transfer
time from the user to the cloud is 26 ms. However, for novel
IoT-Cloud services based on edge (BOE) computing, the
transfer time from the user to the cloud is divided into two
parts: 1) the transfer time from the user to the edge (8 ms) and
2) the transfer time from the edge to the cloud (18 ms). The
transfer time between two adjacent edges is 12 ms. In the
experiment, there are four types of abnormal devices: 1)
temporary fault devices; 2) malicious behavior devices; 3)
general abnormal devices; and 4) malicious data devices. These
parameters are shown in Table IV.
TABLE IV Experimental Parameters
29. B. Service Time
In this part, the service time consists of three parts: 1) the data
transfer time; 2) the data transmission time; and 3) the data
processing time. For a clear comparison, the service time is
divided into three phases: 1) the service time from the user to
the target edge; 2) the service execution time in the IoT; and 3)
the service time from the target edge to the user.
Symbols and their corresponding names are listed in Table V,
and these symbols are used in the following formulas.
TABLE V Symbols and Their Corresponding Names
1) Service Time From the User to the Target Edge:
There are some differences between service processes of the
general IoT service and the novel IoT service BOE computing.
These differences in the service time are demonstrated by using
three basic experimental scenes and four mixed experimental
scenes, as shown in Fig. 4.
Fig. 4.
Service time from the user to the target edge. (a) Three basic
scenes. (b) Four mixed scenes.
View All
Fig. 4(a) shows that the service time of “service with parameter
template” is shorter than that of “general IoT-Cloud service” in
the basic scenes. The reason is that service with parameter
template avoids repeatedly executing the service parsing
procedure.
For general IoT-Cloud service, the service time is calculated
using (12). In the basic Scene 1, the service time of service with
parameter template is calculated using (9), which
removes Timecommand , T.TimeEdge−1cloud and T.TimecloudI
oT . In the basic Scene 2, the service time of service with
parameter template is calculated via (10), which does not
require relay via the cloud. In Scene 3, the service time of
30. service with parameter template is calculated via (11), which
has advantages in the process of parsing user
requirements. Timematch spends less time than Timecommand ,
and Timedigi in service with parameter template is similar
to Timeextraction of general IoT-Cloud service.
The total service time in mixed scenes is calculated through the
combination of three basic equations. Service with parameter
template has advantages in shortening total service time relative
to general IoT-Cloud service, as shown in Fig. 4(b)
TimeReqScene1=TimeReqScene2=TimeReqScene3=TimeReqge
neral=T.TimeuserEdge−1+Timedigi+TimematchT.TimeuserEdge
−1+Timedigi+Timematch+T.TimeEdge−1Edge−2T.TimeuserEdg
e−1+Timedigi+Timematch+T.TimeEdge−1cloud+T.TimecloudE
dge−3T.Timeusercloud+Timeextraction+Timecommand+T.Time
cloudIoT.(9)(10)(11)(12)
View Source2) Service Execution Time in the IoT:
The service execution time in the IoT mainly consists of two
parts: 1) the service time from edge to the target
device Timeedgetargetdevice and 2) the service time from the
target device to edge Timetargetdeviceedge , as shown in (13).
The service execution time based on the edge network is
minimal because it can more accurately locate the target device
and has shorter routes. The service execution time of “template
with trust evaluation mechanism” is shorter than that of
“template without trust evaluation mechanism” because the trust
evaluation mechanism is more likely to select high-trust devices
to transfer data and can balance the IoT load dynamically.
Moreover, the trust evaluation mechanism can
help Templateparsing create several better data transfer routes
to enhance the service stability. The fraction of low-
performance devices and the degree of network congestion have
certain influences on the service execution time, as shown
in Fig. 5. Since the edge network is located outside the IoT, the
fraction of low-performance devices and the degree of network
congestion have weaker influences on its service execution
time. Template with trust evaluation mechanism selects
31. appropriate data transfer routes in advance; thus, it can
effectively avoid low-performance devices, as shown in Fig.
5(a). As the fraction of low-performance devices exceeds 50%,
the time consumption obviously increases because template with
trust evaluation mechanism is more likely to select trusted
devices that are in the same level. When considering the
influence of network congestion on the service execution time,
the number of low-performance device is set to 5. The influence
of network congestion on template with trust evaluation
mechanism is slightly weaker than that on “template without
trust evaluation mechanism” originally, as shown in Fig. 5(b),
but the phenomenon begins to reverse after the fraction of busy
devices reaches 50%. The reason for this result is that template
with trust evaluation mechanism tends to select trusted devices
in the peer level to balance the network load
TimeExecutionIoT=Timeedgetargetdevice+Timetargetdeviceedg
e.(13)
View Source
Fig. 5.
Service execution time in IoT. (a) Influence from the number of
low-performance device. (b) Influence from the degree of
network congestion.
View All3) Service Time From the Target Edge to the User:
To calculate the service time from the target edge to the user,
the service data volume and location of the service data
processing center must be considered (edge or cloud). “1+x”
indicates that there is a very large amount of service data, and
“0+x ” indicates that there is a small amount of service data.
Additionally, “x+1 ” indicates that the service data processing
center lies at edge, whereas “x+0 ” indicates that the service
data processing center is situated in the cloud.
For 1+x , the service time consists of the data transmission
time, the data transfer time, and the data processing time, as
shown in (14). For 0+x , the service time is composed of the
32. data transfer and the data processing time, as shown in (15).
Because the data processing time is changeable, the data
transmission time and the data transfer time are the major
factors considered
Timeresult1+x=Timeresult0+x=Timetransmission+Timetransfer
+TimeprocessingTimetransfer+Timeprocessing.(14)(15)
View Source
0+1: If users’ requirements can be completed in edge, the total
service time of service with parameter template would be
shorter, as shown in Fig. 6. For the three basic scenes, service
with parameter template can obviously shorten the service time
in Scene 1 and Scene 2, as shown in Fig. 6(a), because service
with parameter template avoids relay via the cloud. The service
time of service with parameter template in Scene 3 is almost
equal to that of general IoT-Cloud service. For the four mixed
scenes, the total service time of service with parameter template
is shorter than that of general IoT-Cloud service because Scene
1 or Scene 2 is in the mixed scenes, as shown in Fig. 6(b).
Fig. 6.
Service time from the target edge to the user (0 + 1). (a) Basic
scene. (b) Mixed scenes.
View All
0+0: In this situation, the service time of service with parameter
template is almost the same as that of general IoT-Cloud
service. It should not be ignored that edge has certain
pretreatment capabilities and can independently perform part of
mixed services. Moreover, with improving edge performance,
this situation is becoming rarer.
1+1: When the volume of service data influences the total
service time, we perform several experiments to measure the
degree of this influence. This part is related to Algorithm 2. For
the basic Scenes 1 and 2, it is a better choice to select Edge-1 as
the data processing center, as shown in Fig. 7. If the cloud is
the data processing center, there would be additional costs in
33. the transfer time since the cloud is a relay point. For the basic
Scene 3, if the data volume difference between Edge-3 and
Edge-1 (Edge-3 has more data) has less time
consumption Timetransmission than T.TimeEdge−1cloud , it
would be a better choice that selecting Edge-1 as the data
processing center. This method derives from “Remove the
common parts of two assumptions, and compare their different
parts.” For mixed scenes, we select two mixed scenes in the
experiment, as shown in Fig. 7(c) and (d). The data volume of
the result in the cloud is set as Volumecloud (more data) and
the data volume of result in the edge as Volumeedge ;
otherwise, Edge-1 is the better selection. Only when the data
volume difference
between Volumecloud and Volumeedgeexceeds the threshold
value [the intersection points in Fig. 7(c) and (d)], the data
processing center is the cloud. The threshold value represents
that the time consumption of different parts whose two
assumptions are the same. Mixed Scene 2 + 3 has fewer
advantages than mixed Scene 1+3 in selecting edge as the data
processing center, since the threshold in mixed Scene 2+3 is
smaller than that in mixed Scene 1+3. Other mixed scenes
change the threshold value through adjusting the slope of
“Additional cost in the transmission time (Edge).” The higher
the transmission rate is, the more likely it is that edge is
selected.
Fig. 7.
Service time from the target edge to the user (1 + 1). (a) Basic
Scene 1. (b) Basic Scene 2. (c) Mixed Scene 1 + 3. (d) Mixed
Scene 2 + 3.
View All
1+0: When the service data processing center must be in the
cloud, the service times of both service with parameter template
and general IoT-Cloud services are almost equal. However, with
enhanced edge performance, edge can address more service
34. requirements in the future.
Note: For some mixed scenes in this novel architecture, their
basic scenes can quickly perform the next service when
completing part of the service.
C. Trust Evaluation Mechanism Performance
In the IoT, there are four types of abnormal devices: 1)
temporary fault devices; 2) malicious behavior devices; 3)
general abnormal devices; and 4) malicious data devices. The
change in the trust value of an abnormal device is measured
after it is detected, as shown in Fig. 8. There are three types of
trust evaluation mechanisms that are used for comparison: 1)
BOE; 2) based on cluster head (BOCH); and 3) general
combined trust (GCT, consisting of direct trust,
recommendation trust or indirect trust). The difference between
the BOE and BOCH trust mechanisms is that the latter belongs
to the IoT and may have multihop distances to the outermost
devices. In the trust evaluation mechanism, there should be
periodic trust updating to ensure the latest network trust state,
and this trust updating period was set to 50.
Fig. 8.
Trust value changes of abnormal devices. Trust value changes
of the (a) temporary fault device, (b) malicious behavior device,
(c) general abnormal device, and (d) malicious data device.
View All
In this experiment, the “mean trust value” is calculated based on
the trust values from all other devices that have interactions
with the abnormal device except for the abnormal discovery
device. The first discovery device performs a trust evaluation of
the abnormal device and generates the “trust value of the
device.” The trust updating in the edge network is triggered by
three types of events: 1) periodic trust updating; 2)
accumulation value exception; and 3) command from the edge
platform. In GCT and BOCH, the discovery device first requests
35. recommendation values from adjacent devices or cluster heads
when an abnormality is detected. The discovery device then
calculates the final trust value of the abnormal device using
rules, such as basing the calculation on weight.
The temporary fault device returns to normal after a short time
(ten time slots); the trust value change of this device is shown
in Fig. 8(a). “Trust value in the edge network” has no changes
due to fewer exceptions from the IoT. However, the “mean trust
value (BOE)” decreases because the discovery devices update
the trust value of the abnormal device through the direct trust.
In GCT, the discovery device finds and updates the trust value
of the abnormal device, but the mean trust value is greater
because other adjacent devices have not yet detected this
abnormal device. BOCH is similar to GCT except for featuring
a longer delay.
When the accumulation of exceptions exceeds a threshold, the
edge network updates and confirms the trust value of the
abnormal device, as shown in Fig. 8(b). For GCT and BOCH,
the trust value of the abnormal device is approximately 0.4 (no
trust); thus, discovery devices no longer communicate with this
abnormal device. When the trust updating period arrives, the
abnormal device is regarded as a malicious device, and its trust
value is set to 0 throughout the entire IoT.
For the general abnormal device, the execution process of BOE
is similar to that in the malicious behavior detection, as shown
in Fig. 8(c). The general abnormal device still has a higher trust
value, so it can be selected to transfer data. When the trust
updating period arrives, the final trust is calculated.
The malicious data device behaves normally but generates
incorrect data to cause the user to make incorrect decisions; the
trust value change of this device is shown in Fig. 8(d). This
abnormality is difficult to detect unless there are some data
analyses at a higher level. Because it is preferable to not
perform a large amount of data analyses in the IoT, GCT, and
BOCH have few advantages for the detection of malicious data
devices. The edge network is located out of the IoT and can thus
36. perform these analyses at a higher level without affecting IoT
performance.
The network resource consumption is an important factor in
estimating the performance of trust evaluation mechanism.
Because BOE is out of the IoT, it consumes less communication
resources than other schemes, as shown in Fig. 9. Moreover,
BOE can perform malicious device detection at the data level,
so the trust updating period can be extended to reduce the IoT
resource consumption. For BOCH, its communication resource
consumption is determined by the cluster depth and cluster
member number (a larger depth and more cluster members
require more communication resource consumption). For GCT,
its communication resource consumption is associated with
executing recommendations or indirect trust calculations, which
is influenced by the number of adjacent devices.
Fig. 9.
IoT communication resource consumption.
View All
SECTION VI.Conclusion
The IoT-Cloud system combines IoT and cloud computing and
has gradually become a research hotspot. However, there are
some security and efficiency problems that must be solved in
IoT-Cloud application services. Aiming at overcoming internal
attacks and repeated/similar service requirements, a novel IoT-
Cloud architecture is designed based on edge computing, in
which the trust evaluation mechanism ensures the IoT’s security
and assists the service template in solving service efficiency
problems. The edge computing layer is composed of two parts:
1) the edge network and 2) the edge platform. The edge network
builds on underlying edge nodes that spread over the IoT, which
are responsible for ensuring the IoT’s security and performing
special tasks. The edge platform consists of a set of powerful
edge nodes (edge servers), which perform well at parsing users’
requirements through service templates with a balance
37. dynamics. Extensive experimental results show that this novel
architecture can greatly improve IoT-Cloud systems service
efficiency and ensure data trustworthiness.
However, for the entire IoT-Cloud system, there is still much
work to be done. Future work will seek to perfect the
architecture and solve other issues through this architecture and
edge computing, such as the IoT service pricing, the service
scheduling, and the service access points setting.