Instructions for the paper are in the attached document. Please write in Times New Roman, 12pt in microsoft word. I do not care which career paths are chosen so long as it meets the requirements.
The aim of thesis is to study the behavior of customers who buy diapers (baby diapers), baby food and baby wipes by observing the supermarket promotional plan as well as the promotional plan applied to the rest of the market. The purpose is to find out how customers react to the promotional plan of the supermarket and the rest of the market. The study aims to create a model that will help to understand customer behavior up to now and in the future. Based on the above study, an analysis method will be implemented in python with a case study for the retail trade that will offer predictive analyzes of consumer behavior through data mining.
Individual Project Guidelines
10-12 (2,500 – 3,000 word-counts) pages (excluding title, table of content, and references/citations), double space, citations, APA format
Upload in “word doc”, NOT pdf or any other format
Find some data breach/security incident that interests you. For example, if you like gaming, find data breach incidents in the gaming industry. If you’re interested in accounting, find data breach incidents in accounting, financial, and banking industries.
Do not limit to only US companies. You should expand the search.
*Note: Enron has nothing to do with data breach! If you turn in a paper that has nothing relates to cybersecurity, you will earn zero credit.
What should be in the project? The following is an example (Equifax), but do not limit yourself.
Part 1: Report of the incident (30% of the project/grading) (3 pages)
The company – description of the company
Instruments – what kind of attack, tactics, methods
The events – exactly what happened
Outcomes – aftermath
Part 2: shown what you have learned (45% of the project/grading) (4-5 pages)
Ethics analysis – here is your own input and analysis on what the company should have done ethically
Recommendations – here is your recommendations in 1) policy, 2) technological, and 3) organizational point of view
Conclusion – what have you learned from it
1300 words covering the topic of open-source programming, including key milestones, players, and issues. Also, an informed opinion about open source program movement.
5.3: Support policy decisions with the application of specific cybersecurity technologies and standards.
6.2: Create an information security program and strategy, and maintain alignment of the two.
6.3: Integrate the human aspect of cybersecurity into an organization’s cybersecurity policy.
9.3: Risk Assessment: Assess policies, processes, and technologies that are used to create a balanced approach to identifying and assessing risks and to manage mitigation strategies that achieve the security needed.
Thesis consists of two parts:
– Theoretical: based on literature I will provide excerpts from some journals and papers (approximately 55-60 sources
I will provide the sources by zotero list for example).
– Practical: Quantitative Methodology
Analysis of dataset of Facebook Community Standards Enforcement Reports in 2021,2022
(I will provide the reports) Compared to a collected dataset of 200 facebook controversial posts/comments
(I will provide the pages/profiles to crawl/collect the posts).
Suggested analysis method: (Cluster analysis – Regression analysis – Text analysis)
I have attached the structure of the project and the suggested list of references.
GOAL: The literature review is a complex genre, and the goal is to practice most of the
learning outcomes of the course. As you prepare for and write the literature review, you will:
• Synthesize scholarly, academic, professional, government, and non-expert, reputable
• Practice writing the academic genre of the literature review to organize and integrate
your own ideas with reputable sources, in order to suggest an intervention, a
solution, or an area that requires further research. You will be establishing an
exigence and writing with a specific purpose in mind.
• Write for a specific audience (stakeholder) that can make decisions about your
suggestion or recommendation. You will be making a new offering.
The literature review is an academic genre, used by academics and often by proposal writers
to collect and synthesize sources. The literature review serves different purposes; in this
case, the main goal of the literature review is to help you think about your topic in complex,
nuanced ways and to explore and incorporate scholarly conversations into the argument you
will be making for the final project, the advocacy letter.
The literature review is a transitional document you will use to investigate your topic as it is
discussed in academic and expert discourses and to formulate your own ideas and
arguments about the topic.
Although you will be using the literature review as a transitional genre, the literature review
is a complex genre that requires time, effort, and focus. The literature review will be
developed over eight weeks, and you must use every week to collect and annotate sources,
and to integrate those sources. We will work on those skills as you move towards the
deadline. The literature review is the core assignment of the course, because it is the most
complex to write.
You will have the opportunity to revise the literature review. To be eligible to revise the
literature review, you must: 1) have attended all individual/small group conferences; 2)
completed the discussion forums related to the literature review; 3) participated in the peer
The main concern for most students is the number of required sources. The research logs
are designed to help you collect enough sources to have a good sense of your topic and to
be able to narrow your research question. A good guideline is that you should have read and
evaluated at least four times the sources you will eventually use.
A literature review of this scope, generally becomes stronger with about 6-8 highly credible,
interconnected sources. That means, that at a minimum, you will have collected and
evaluated 24-32 sources. You will discard the sources you do not need, rather than hoping
you find enough sources.
You will use the number of sources you need to make a cohesive, coherent review of the
current literature in your topic of interest. For this literature review, the normal range in
sources is 6-20 sources, depending on the topic, arguments, need for supporting evidence,
need for background and context sources, need for caveat, qualifying, pushback sources.
The sources you choose should help you establish an exigence (a problem that needs to be
addressed by a specific audience) and to make a new offering (a recommendation,
suggestion, new approach, etc.). You must include scholarly, peer reviewed sources, since
those are the ones deemed most credible by the likely audiences of a literature review and
since they provide robust evidence for most research questions. We will work on narrowing
and refining your research question over the course of several weeks.
You will use APA style, unless you prefer to use the style most commonly used in your field of
study. You are responsible for properly citing sources using established guidelines.
The role of audience
As part of the literature review, you will write a reflection about the audience (stakeholder)
you are addressing in the literature review. The audience might be similar or different from
the audience for the advocacy letter. We will discuss the stakeholder(s) in more detail
throughout the semester.
The role of synthesis
The synthesis is the centerpiece of a literature review, and it can only happen successfully if
you read your sources carefully. Take notes as you read, being mindful of key terms, the
currency of the source, main claims, research methods used, and where you see possible
To write the synthesis, begin by grouping various sources according to how they are similar
and different. As you do so, be mindful of why these similarities and differences exist. Think
about how the evidence you found in your sources fits together like pieces of a puzzle that
yield a larger picture of the issue so that you can reach some tentative conclusions about
them and discuss those implications.
The role of the complex thesis
The purpose is generally the thesis for a literature review. The thesis for a literature review
operates differently from one used in an argument paper. Here is an example of a weak and
strong thesis for a literature review:
• WEAK: The current trend for treating depression combines medication and
cognitive behavioral therapy.
• STRONG: Though cognitive behavioral therapy is used in treating depression,
more research is needed about expanding patient access to these treatments in
The “weak” thesis will lead to a literature review that summarizes sources one by one; the
“strong” thesis will require a synthesis of research already done about treating depression
that shows where more might be done about improving patient access to such treatments.
Thus, the literature review is never an end in itself; it synthesizes important information that
not only answers your research question, but also takes a stand on what should happen
next to solve the problem you identified, address a gap in the existing research, or to
improve/change current practices in a field or profession.
Writing the literature review
The literature review will vary in length. I would expect carefully read sources to result in at
least three single-spaced pages of synthesis, including the introduction and the conclusion.
Some students write longer literature reviews. The length of the literature review depends
entirely on the types of sources and the resulting arguments that emerge from synthesizing
Literature reviews are organized around ideas, not the sources themselves. Those ideas
should derive from the focus, or purpose, you establish. To establish that focus, you must
read your sources thoroughly, take notes, and look for patterns that you see that address
your reason or purpose for writing the review.
GRADING CRITERIA: The literature review will be graded based on how well it establishes a
purpose and an exigence, and on how well it makes a new offering to a specific stakeholder.
The literature review must show synthesis of interconnected sources, multiple perspectives
and aspects of a narrowly defined issue, and adherence to a citation style. The literature
review must adhere to the genre conventions, including use of headers and subheaders,
concise language, multiple sources.
Provide information on machine learning that is currently being usdd in healthcare to treat patients/ assist heathcare workers in their job and also provide examples and information of new technology specifically artificial intelligence/machine learning that are being developed in the healthcare field and how it will help patients/ healthcare workers.
1. History of Payment Technologies
1.1 History of POS Technology
1.2 History of credit/debit cards and
1.3 History of EFTs (Electronic Transfer Funds)
2. How Payment Technologies work
2.1 Mobile Technologies (Apple Pay, GooglePay etc)
2.2 Magnetic Strip Technology
2.4 NFC technology mobile wallets
2.5 Mobile banking technology (zelle, check deposits)
3. Pros and Cons of New Payment Technology
3.1 Efficiency of new payment technologies
3.2 Convenience of evolving payment technology
3.3 Risks of using these technologies
3.4 Payment scams
3.4.1 Scamming Technology and methods
4. How to stay safe with the evolving ways of payment
4.1 New payment technologies
4.2 Ways to combat scamming
4.3 Keeping your payment information safe on the internet 4.4 Influence of covid on the use of digital payment technologies
Before you begin, read: https://us.norton.com/internetsecurity-privacy-what-is-a-vpn-tunnel.html OR search for “tunneling protocols used in vpn” and choose an appropriate resource from the Internet.
Background: The COVID-19 pandemic forced many organizations to rapidly transition existing employees to a “work from home” situation. The overall success of such arrangements has encouraged many companies to adopt Work From Home (previously known as “telework” or “telecommuting”) for all or part of the work week as a permanent strategy. In these situations, a secure means of accessing the organization’s internal networks and resources must be provided to the dispersed workforce. Virtual Private Networks are a frequently deployed technology solution capable of addressing and compensating for the myriad privacy and security concerns that arise in “Work from Home” or telecommuting situations.
VPN’s depend upon tunneling protocols as foundation technologies. For this briefing paper, identify and discuss the four main tunneling protocols that can be used to provide virtual private network access between remote users and a company’s internal (corporate) networks and resources. Provide examples of how each protocol can be used within a VPN solution.
Format: this week, your deliverable should be formatted as a 5 to 7 paragraph briefing paper. You should have an introduction, analysis sections, and an appropriate summary section. Include citations (in the text) and references (at the end) to support your work and allow your readers to fact check your analysis and conclusions.