Description of this paper

strayer CIS500 full course (all assignments +term paper+ 2 cases)

Description

solution


Question

Question;CIS 500 Assignment 1;Predictive Policing;Assignment 1;Predictive Policing;In 1994, the New York;City Police Department adopted a law enforcement crime fighting strategy known;as COMPSTAT (COMPuter STATistics). COMPSTAT uses Geographic Information Systems;(GIS) to map the locations of where crimes occur, identify ?hotspots?, and map;problem areas. COMPSTAT has amassed a wealth of historical crime data. Mathematicians;have designed and developed algorithms that run against the historical data to;predict future crimes for police departments. This is known as predictive;policing. Predictive policing has led to a drop in burglaries, automobile;thefts, and other crimes in some cities.;Write a four to five (45) page paper in which you;1. Compare and contrast the application of information;technology (IT) to optimize police departments? performance to reduce crime;versus random patrols of the streets.;2. Describe how COMPSTAT, as an information system (IS);implements the four (4) basic IS functions;1. Input;2. Processing;3. Output;4. Feedback;5. Determine how information systems have allowed police;departments that implement tools such as COMPSTAT to respond to crime faster.;6. Apply the strengths, weaknesses, opportunities, and;threats analysis (SWOT analysis) on behalf of police departments that intend to;implement predictive policing.;7. Use at least three (3) quality resources in this;assignment. Note Wikipedia and similar Websites do not qualify as quality;resources. You may use the resources above or others of your choosing.;Your assignment must follow these formatting requirements;? Be typed, doublespaced, using Times New Roman font (size;12), with oneinch margins on all sides, citations and references must follow;APA or schoolspecific format. Check with your professor for any additional;instructions.;? Include a cover page containing the title of the;assignment, the student?s name, the professor?s name, the course title, and the;date. The cover page and the reference page are not included in the required;assignment page length.;The specific course learning outcomes associated with this;assignment are;? Explain how the components of an information technology;system interrelate in an organizational context.;o Use technology and information resources to research;issues in information systems and technology.;o Write clearly and concisely about topics related to;information systems for decision making using proper writing mechanics and;technical style conventions.;Grading for this assignment will be based on answer quality;logic / organization of the paper, and language and writing skills, using the;following rubric.;CIS 500 Assignment 2 4G Wireless Networks;Assignment 2 4G Wireless Networks;The 3rd Generation;Partnership Project (3GPP) developed the 3GPP LongTerm Evolution (LTE)standard;for wireless communications technology. It is regarded as an evolution of the;Global System for Mobile Communication (GSM), the Universal Mobile;Telecommunications Systems (UMTS), and other standards. It is also known as the;4G LTE. The competition among the carriers to support 4G LTE networks has been;very fierce as evidenced by TV commercials targeting smartphone users. Many;smartphones run on 3G networks.;Write a four to five (45) page paper in which you;1. Compare and contrast 3G wireless networks to 4G networks;in terms of;1. Services and applications;2. Network architecture;3. Data throughput;4. User perceptions;5. Distinguish between the 4G LTE, 4G WiMax, and 4G WiBro;networks based on;1. Upload and download speeds;2. User perceptions;3. Backward compatibility;4. Service availability;6. Identify why the competition between the 4G LTE carriers has;been so fierce and describe the benefits of this competition to the;subscribers.;7. In January 2012, Verizon stated that 4G LTE is available;in 190 cities covering 200 million American subscribers. According to;AT&T?s Website, they had plans for covering 20 million Americans in 15;markets by end of 2011. Conclude why Verizon is able to cover more markets than;AT&T.;8. Use at least three (3) quality resources in this;assignment. Note Wikipedia and similar Websites do not qualify as quality;resources. You may use the resources above or others of your choosing.;Your assignment must follow these formatting requirements;? Be typed, double spaced, using Times New Roman font (size;12), with oneinch margins on all sides, citations and references must follow APA;or schoolspecific format. Check with your professor for any additional;instructions.;? Include a cover page containing the title of the;assignment, the student?s name, the professor?s name, the course title, and the;date. The cover page and the reference page are not included in the required;assignment page length.;Assignment 3 Mobile;Computing and Social Networking;Mobile computing has dramatically changed how information is;accessed and shared. Wireless networking has been an enabler of mobile;computing. One profession that mobile computing has had a big impact on is;health care management. Patients are now able to monitor their vital signs such;as blood pressure, glucose levels, etc. without having to periodically visit a;doctor?s office or hospital. There are devices such as the Withings Blood;Pressure Monitor that works with an iPhone, iPod Touch, or iPad to record;track, and graph a patient?s blood pressure. There are other devices that can;measure blood glucose levels, oxygen levels, heart rate, etc. and use an iPhone;to send the results to a clinical server. Doctors and caregivers are then able;to access the data on the clinical server.;According to the American College of Gastroenterology;social networking sites like Facebook, Twitter, and YouTube are used as;powerful platforms to deliver and receive health care information. Patients and;caregivers are increasingly going online to connect and share experiences with;others with similar medical issues or concerns Patients are able to take;advantage of social networks to do more than just share pictures and tweets.;Write a four to five (45) page paper in which you;1. Compare and contrast monitoring of patient vital signs;using mobile computing technology to inpatient visits to the doctor?s office or;hospital.;2. Analyze the advantages and disadvantages of using mobile;computing technology to monitor patients.;3. Assess the security concerns with regard to the;transmission of personal medical information over wireless networks.;4. Assess the use of social networking for group support for;patients with similar medical concerns.;5. Use at least three (3) quality resources in this;assignment. Note Wikipedia and similar Websites do not qualify as quality;resources.;CIS 500 Assignment 4;Data Mining;Assignment 4 Data;Mining;The development of complex algorithms that can mine mounds;of data that have been collected from people and digital devices have led to;the adoption of data mining by most businesses as a means of understanding;their customers better than before. Data mining takes place in retailing and;sales, banking, education, manufacturing and production, health care;insurance, broadcasting, marketing, customer services, and a number of other;areas. The analytical information gathered by datamining applications has given;some businesses a competitive advantage, an ability to make informed decisions;and better ways to predict the behavior of customers.;Write a four to five (45) page paper in which you;1. Determine the benefits of data mining to the businesses;when employing;1. Predictive analytics to understand the behavior of customers;2. Associations discovery in products sold to customers;3. Web mining to discover business intelligence from Web;customers;4. Clustering to find related customer information;2. Assess the reliability of the data mining algorithms.;Decide if they can be trusted and predict the errors they are likely to;produce.;3. Analyze privacy concerns raised by the collection of;personal data for mining purposes.;1. Choose and describe three (3) concerns raised by;consumers.;2. Decide if each of these concerns is valid and explain;your decision for each.;3. Describe how each concern is being allayed.;CIS 500 Case Study 1;The Big Data Challenges;Case Study 1 The Big Data Challenges;Big Data is a term used to describe the voluminous amount of;structured and semistructured data generated by companies. The term is used;when referring to petabytes (PB), exabytes (EB), and zettabytes (ZB) of data.;Companies face challenges when it comes to capturing, storing, searching, and;analyzing Big Data. The Volvo Car Corporation faced this problem because of the;massive amount of data it was streaming from its vehicles.;Download and study the Volvo Car Corporation case study;titled, ?Converting data into business value at Volvo?, located;athttp//www.icio.com/__data/assets/pdf_file/0004/8833/icio_Case_Study_Volvo.pdf.;Write a two to four (24) page paper in which you;1. Judge how Volvo Car Corporation integrated the cloud;infrastructure into its networks.;2. Explain how Volvo Car Corporation transforms data into;knowledge.;3. Identify the realtime information systems implemented and;evaluate the impact of these implementations.;4. Argue how the Big Data strategy gives Volvo Car;Corporation a competitive advantage.;1. Use at least three (3) quality resources in this;assignment. Note Wikipedia and similar Websites do not qualify as quality;resources.;CIS 500 Case Study 2;Cloud Computing;Cloud computing is defined by Cearly and Phifer in their;case study titled ?Case Studies in Cloud Computing? as ?a style of computing in;which scalable and elastic ITrelated capabilities are provided ?as a service?;to customers using Internet technologies?. Cloud computing services had been;provided by major vendors such as Google, Amazon, Microsoft, IBM;HewlettPackard, and others for business computing until recently when Apple;Corporation announced iCloud for consumers. Therefore, cloud computing is now;available for businesses as well as consumers.;Read the case study titled, ?Ericsson?, located;athttp//aws.amazon.com/solutions/casestudies/ericsson/, about Ericsson cloud;computing.;Write a two to four (24) page paper in which you;1. Assess how Ericsson benefitted from Amazon Web Services;(AWS) in terms of cost reduction, automated software updates, remote access;and ondemand availability.;2. Evaluate the scalability, dependability, manageability;and adaptability of Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple;Storage Services (Amazon S3), and RightScale.;3. Examine the security concerns for cloudbased services and;make suggestions to cope with these concerns.;4. Assess possible scalability, reliability, and cost issues;associated with cloud computing, and make suggestions to overcome each of these;issues.;1. Use at least three (3) quality resources in this;assignment. Note Wikipedia and similar Websites do not qualify as quality;resources.;Your assignment must follow these formatting requirements;? Be typed, double spaced, using Times New Roman font (size;12), with one inch margins on all sides, citations and references must follow;APA or school specific format. Check with your professor for any additional;instructions.;? Include a cover page containing the title of the;assignment, the student?s name, the professor?s name, the course title, and the;date. The cover page and the reference page are not included in the required;assignment page length.;The specific course learning outcomes associated with this;assignment are;? Compare and contrast the strategic and operational use of;data management systems.;? Outline the strategic implications of information;assurance and security in an information technology environment.;? Use technology and information resources to research;issues in information systems and technology.;CIS 500 Term Paper;Mobile Computing and Social Networks;Term Paper Mobile Computing and Social Networks;There are thousands of iPhone Apps, iPad Apps, and Android;Apps that have been developed to perform a myriad of tasks and processes.;Initially, most of these applications were games intended to be played on;mobile devices. The popularity of these applications led businesses to ponder;whether some of their business process applications that run on desktop;platforms and the Web could be redesigned to run on mobile devices. The answer;was a resounding yes!;For example, Nationwide developed the Nationwide? Mobile, a;free iPhone App that allows its insurance policyholders to file a claim on the;spot when an accident occurs. The application can snap pictures of the accident;and attach them to the claim data and upload the claim information to a server.;This reduces the length of time to process a claim filed this way. Nationwide;competitors have followed suit and developed iPhone, iPad, and Android;applications of their own. Policyholders can receive messages via Facebook or;Twitter.;Other business processes that have been reengineered as a;result of mobile computing include Quick Response (QR) codes which have;replaced onedimensional bar codes. They are read using mobile devices;accepting credit card payments from an iPhone, iPad or Android device;depositing checks using an iPhone without visiting a bank, and many more.;Write a ten to fifteen (1015) page term paper in which you;1. Assess the effectiveness and efficiency mobilebased;applications provide to capture geolocation data and customer data, and quickly;upload to a processing server without users having to use a desktop system.;2. Evaluate benefits realized by consumers because of the;ability to gain access to their own data via mobile applications.;3. Examine the challenges of developing applications that;run on mobile devices because of the small screen size.;4. Describe the methods that can be used to decide which;platform to support, i.e., iPhone, iPad, Windows Phone, or Android.;5. Mobile applications require high availability because end;users need to have continuous access to IT and IS systems. Discuss ways of;providing high availability.;6. Mobile devices are subjected to hacking at a higher rate;than nonmobile devices. Discuss methods of making mobile devices more secure.;7. Use at least three (3) quality resources in this;assignment. Note Wikipedia and similar Websites do not qualify as quality;resources.;Your assignment must follow these formatting requirements;? Be typed, double spaced, using Times New Roman font (size;12), with oneinch margins on all sides, citations and references must follow;APA or schoolspecific format. Check with your professor for any additional;instructions.;? Include a cover page containing the title of the;assignment, the student?s name, the professor?s name, the course title, and the;date. The cover page and the reference page are not included in the required;assignment page length.

 

Paper#36872 | Written in 18-Jul-2015

Price : $147
SiteLock