Information Services Academic Skills Know How Harvard Referencing Quick Guide Wh

Hi, I need a research proposal paper with 1500 words as following: (the paper needs to be written in Haward style – therefore you find a reference guide attached)

A structured research proposal for the overall topic:

“Freeletics – How a sports  and lifestyle company captured the sports sector”

The report should be evidenced based and draw on data from recognized studies relating to the sport sector in generell, specialized to Freeletics and its main competitors

Suggested Report Format:

Introduction: (min. 150 words) 

Setting the context and outlining the structure and approach adopted in the report. Report of main findings from investigation: to include data and secondary literature as appropriate 

Literature review: (around 800 words)

Research question: ( around 100 words) min 3 questions

Research Design: (around 300 words)

Data Collection and Analysis:  (around 200 words) Survey, unstructured interviews and so on 

I attached three samples how it can look like. Please be guided by these papers.

Conclusion and recommendations

List of References: formatted in accordance with guidelines on Harvard style.

The Deadline to hand me in the paper should be 09.01.2016.

Thank you in advance and looking forward to hear from you.

  • Attachment 1
  • Attachment 2
  • Attachment 3
  • Attachment 4

Freeletics: A Research proposal “Freeletics: How the lifestyle and sports company captured the sports sector?” By A.Student1/4/2016 0 Freeletics: A Research proposal Introduction…

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Information Security R1 For Each Of The Six Types Of Attacks Give An Example Of

information security 

R1. For each of the six types of attacks, give an example of how the attack occurs on a network.

R3. Explain the differences between analog signals and digital signals, between parallel and serial links, and between synchronous and asynchronous communications.

R4. Explain the difference between baud and bandwidth.

R7. Describe the fields in an Ethernet packet.

R8. Explain how collisions are handled on a wireless LAN. Compare it to how collisions are handled on a wired Ethernet LAN.

R10. List the seven layers in the OSI protocol model in order from lowest to highest.

R11. Give examples of client/ server and peer-to-peer network applications.

R12. Describe a typical approach to resource sharing on a network. What is the delegation problem?

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Information Security In Healthcaredetermine Why Information Security Is So Impor

Information Security in Healthcare

Determine why information security is so important in healthcare by analyzing at least two different types of safeguards for data and elaborate on what standards are looked at for each. Also, identify the types of facilities these safeguards can be used in and what are the expectations.  There may be several different standards for each safeguard but you are required to mention at least two.Discussion responses should be on topic, original, and contribute to the quality of the discussion by making frequent informed references to lesson material. Discussion responses should be around 200 words.

Give your personal opinion to Gabriela Berrios and  Dina Alani  . Opinions should be around 100 words with a total of two pages.

Gabriela Berrios 

Two Safeguards for Data

By having a solid security foundation for security management processes, assignment of responsibility, enforcement of workforce security, information access, training, as well as plans and protocol in the event where a breach occurs, the covered entity can be prepared, with a safeguard that will protect them in reducing the impact or preventing breaches altogether.

  1. Physical Safeguard:

Physical Safeguards are the implementation standards to physical access to information systems, equipment and facilities which can be in reference to access to such systems in and out of the actual building. (Chung, 2014).

This safeguard has physical measures, policies, and procedures to protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion. (Chung, 2014).

It covers facility access to information systems and equipment, workstation use and security, and management of certain media devices that may contain ePHI. (Chung, 2014). It is in place to work with the administrative and technical safeguards so that the covered entity can place specific procedures in place to protect electronic information systems, buildings facilities, and equipment. (Chung, 2014).

  1. Administrative Safeguard:

The administrative safeguards cover over half of the HIPAA Security requirements and are focused on execution of security practices for protecting ePHI. (Chung, 2014).

This safeguard has administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s workforce in relation to the protection of that information. (Chung, 2014).

This implements policies that aim to prevent, detect, contain, as well as correct security violations and is the groundwork of the HIPAA Security Rule. (Chung, 2014).

Gabi

Reference:

Chung, D. (2014, August 11). The Three Safeguards of the HIPAA Security Rule Summarized. Retrieved from https://www.secudrives.com/2014/08/11/the-three-safeguards-of-the-hipaa-security-rule-summarized/

 Dina Alani 

Information security is essential in health care settings as first of all information leakage of a patient is a legal offense, and secondly, by the leaked information criminals can make use of it by engaging in medical fraud and for other financial gains. When the security of information is maintained the healthcare industry saves money because the cost of a lawsuit from leaked documents, for example, could spell the end for a healthcare entity and securing the information thus saves a considerable amount of money. The safeguards to protect such information are-

1. Administrative safeguards-

It is related to lawmaking body and most importantly protecting these laws and compelling everyone to follow it. It determines the documentation process, roles and responsibilities, training requirements, data maintenance policies and more.

2.Technical and physical safeguards-

Using technology to safeguard the information regarding health care settings comes under technical safeguard that includes cybersecurity where every document is strictly password protected. Apart from preserving this way security systems are available 24 x 7 like video surveillance, door and window locks, and locations of servers and computers.

https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/adminsafeguards.pdf?language=es

https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/physsafeguards.pdf

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Information Security Chapter 1 Introduction And Security Trends 1 Which Internet

Information Security

Chapter 1 Introduction and Security Trends

1. Which Internet worm, released in 1988, is considered to be one of the first real Internet crime cases?

A. The Code Red Worm

B. The Morris Worm

C. The Slammer Worm

D. The Jester Worm

2. What target did the teenage hacker who went by the name “Jester” attack in March 1997?

A. He hacked Sony, stealing over 70 million user accounts.

B. He broke into the U.S. electric power grid, mapped it out, and planted destructive programs that could be activated at a later date.

C. . He attacked Estonia with a massive denial-ofservice (DoS) cyberattack.

D. He cut off telephone services to the FAA control tower as well as the emergency services at the Worcester Airport and the community of Rutland, Massachusetts.

3. What name was given to an intellectual property attack executed against oil, gas, and petrochemical companies in the United States?

A. Operation Night Dragon

B. Shamoon

C. Jester

D. Stuxnet

4. The term “script kiddies” refers to

A. A hacker of low-end technical ability

B. A children’s television show

C. A type of video game

D. An Internet site for peer-to-peer music sharing

5. Who is considered to be the ultimate insider, with his name being synonymous with the insider threat issue?

A. Robert Morris

B. Edward Snowden

C. Kevin Mitnick

D. Vladimir Levin

6. Into which threat category does information warfare fall?

A. Structured

B. Highly Structured

C. Critical

D. Open-Source

7. Which statement applies to viruses?

A. They typically are highly visible once released.

B. They are the best tool to use in highly structured attacks.

C. They are the best tool to use in attacks where secrecy is vital.

D. They are targeted at a specific organization.

8. In 2014, on how many different threat actors, including criminals, hactivists, state-sponsored groups, and nation states, did CrowdStrike report?

A. 19

B. 29

C. 39

D. 49

9. Which Internet criminal is famous for conducting his attacks using a number of different “tools” and techniques, including social engineering, sniffers, and cloned cellular telephones?

A. Robert Morris

B. Kevin Mitnick

C. Vladimir Levin

D. David Smith

10. What was the primary lesson learned from the Slammer worm?

A. It made security personnel aware of attacks that had been going on for years without being noticed.

B. It drove home the point that the Internet could be adversely impacted in a matter of minutes.

C. It brought the attention of state-sponsored malware to light.

D. It made security personnel aware of data breaches that had been dominating the security landscape.

11. How did the Code Red worm spread?

A. It exploited a buffer-overflow vulnerability in computers running Microsoft SQL Server or SQL Server Desktop Engine.

B. It collected key-strokes, screenshots, and network traffic from open ports.

C. It made use of a buffer-overflow condition in Microsoft’s IIS web servers that had been known for a month.

D. It entered through the victim’s Outlook address book software and then replicated itself by sending infected emails to the first 50 contacts.

12. Which Internet worm created infected systems that were part of what is known as a bot network (or botnet) and could be used to cause a DoS attack on a target or to forward spam e-mail to millions of users?

A. Slammer

B. Code Red

C. “ILOVEYOU”

D. Conficker

13. In April 2009, Homeland Security Secretary Janet Napolitano told reporters

A. Organized crime made attempts to break into the US electric power grid

B. Hacktivists made attempts to break into the US electric power grid

C. Terrorists made attempts to break into the US electric power grid

D. China and Russia made attempts to break into the US electric power grid

14. What name was given to the advanced persistent threat (APT) style spy network responsible for bugging the Dalai Lama’s office?

A. Melissa

B. GhostNet

C. Conficker

D. Code Red

15. Which term refers to an attack conducted against a site with software that is vulnerable to a specific exploit?

A. Time bombs

B. Advanced persistent threats

C. Specific target attack

D. Target of opportunity

16. Today, the data stored and processed by computers is almost always more valuable than the hardware.(T/F)

17. Criminal activity on the Internet, at its most basic, is quite different from criminal activity in the physical world.(T/F)

18. In the early days of computers, security was considered to be a binary condition in which your system was either secure or not secure.(T/F)

19. Because of malware’s nefarious purpose, there is no criminal distinction between the writers of malware and those who release malware.(T/F)

20. Most current ransomware attacks use a hybrid encrypting scheme, locking the files on a victim’s computer until a ransom is paid.(T/F)

21. Melissa is the best known of the early macro-type viruses that attach themselves to documents for programs that have limited macro programming capability.(T/F)

22. In many early cases of computer crime, the perpetrator of the crime intended to cause damage to the computer.(T/F)

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Initial Post Instructionsthink About Conversations Around Politics When You Were

Initial Post InstructionsThink about conversations around politics when you were in primary school (around age 10). What were some of the ways you learned about the political establishment through family members and friends? How were you politically socialized as a child? Use evidence (cite sources) to support your response from assigned readings or online lessons, and at least one outside scholarly source.

Follow-Up Post InstructionsRespond to at least two peers or one peer and the instructor. Further the dialogue by providing more information and clarification. Minimum of 1 scholarly source, which can include your textbook or assigned readings or may be from your additional scholarly research.

Writing Requirements

  • Minimum of 3 posts (1 initial & 2 follow-up)
  • APA format for in-text citations and list of references
 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Infrared Radiation Does Ultraviolet Radiation Have Longer Or Shorter Wavelengths

Compared to infrared radiation, does ultraviolet radiation have longer or shorter wavelengths? Does ultraviolet radiation have higher or lower energy per photon?

d. Ultraviolet radiation has longer wavelengths and higher energy than infrared radiation.

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Initial Post Instructions Medical Professionals Can Find Relationships Between V

Initial Post Instructions

Medical professionals can find relationships between variables. The more you drink alcohol, the less functionality of your liver. The less carbohydrates a person intakes, the lower their Body Mass Index.

Data can be collected and organized as an ordered pair (x, y). The data can be analyzed to determine the type and strength of a correlation and to calculate a regression line in order to make a prediction.

Use the internet to find a data set of ordered pairs. Key terms to search: Free Public Data Sets and Medical Data Sets.

Create a Post:

Introduce your Data Set and Cite the Source.

  1. Which would be the independent variable, and which would be the dependent variable?
  2. Without drawing a scatter plot, would you expect a positive, negative or no correlation? Explain.
  3. Would you categorize your data to have a strong or weak correlation? Why?
  4. What would the r2 value tell you about the data that you selected?
  5. What is the equation of the regression line?
  6. Use the regression line to make a prediction about the data you collected.
 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Infra Red Gas Analyser Is An Instrument Used To Measure

infra red gas analyser is an instrument used to measure?

Infrared gas analyzer is an instrument that is used to measure small amounts of gas byapplying the principle of absorption of an emitted Infrared light source through a given sample ofair. The…

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Initial Post Instructions For The Initial Post Introduce Yourself To The Class U

Initial Post Instructions

For the initial post, introduce yourself to the class, using an ethical dilemma you experienced. Your ethical dilemma should be detailed with description and dialogue to explain the specific ethical problem you faced.

Create a VoiceThread or narrated PowerPoint slide show that orally presents your ethical memoir. You will use your work to draft a formal, revised and extended version in the assignment for this week. Please can somebody explain it in detail for me. thanks

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW

Infosys Case Analysis 1 Title Of Case Complete Individual Assignments Of Case An

Infosys CASE ANALYSIS:

1.   Title of Case : Complete individual assignments of case analysis for the case of Infosys.

2.     Executive Summary (5-6 sentences summary of your report)

3.     Introduction  (Describe the company)

4.     Background (Give the historical event review.  Only use relevant events. Explain why these are relevant to the case analysis.)

5.     Problem Definition

As you will see in the case, Infosys faces many external threats.  At the end of case, Adrian Patel is faced with a number of key issues impacted by those external threats.

Please address each of the following in your case analysis in detail:

  1. How do the proposed tax code changes in both India and the U.S. potentially impact the U.S. Division?

  2. How does U.S. H-1B visa reform potentially impact her U.S. Division?  Is Infosys more vulnerable in this respect in relation to competitors in the industry?

  3. Should the U.S. Division consider relocation?  If so, why?  If not, why? Please provide supporting data.

Be precise; support your reasoning for each question.

These key issues should be your problems/issues to be addressed (Section 5).  They should provide the context for the use of any analytical tool in Section 6.  They should be the focus of your recommendations late in your case analysis submission.  These are the purpose of your case analysis.

6. External Analysis

Cover the following in detail:

      1. PESTEL (cover all 6 factors) Please be detailed on the points relevant to the key issues to be addressed.

      2. Utilize the relevant data from the series of charts provided at the end of the case.

7.     Action Taken by Firm

8.     Results of Overall Analysis and Interpretation of Results

9.     Your Recommendations     (Justify your reasoning.)

    1. How much will your recommendations impact the firm?

    2. Are they feasible?

    3. Which recommendations did firm follow?

10.  Conclusion

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
ORDER NOW