Assessment OverviewFor this module, summative assessment will be via this single in-course assignment; to support evidencing achievement of the learning outcomes for the module, a written critical analysis report forms the basis of the module assessment. The assignment ‘Information Assurance and Risk Management White Paper’ is worth 100% of the total mark. It is an individual assessment and should therefore be all your own work. S...
Overview of Supply Chain Management (SCM) Choose a business process that can supported by an Enterprise Resource Planning (ERP) system. Â Give a brief description of the business process. Being a system analyst, how could you improve the business process through the implementation of an ERP? Write a short proposal that contains the description and design of the elements below. Â List and describe the most important ones...
How will your work be assessed?On successful completion of this module students will be able to 1. Build a mobile application for business purposes using the android platform. 2. Apply understanding of mobile user experience UX and implementation of accessibility features. 3. Identify properties and capabilities of modern mobile devices and the specific issues relating to software development for them. 4. Demonstrate cross platform choices...
Main Objective of the AssessmentImportant Notice: You should note that this assignment is learning-outcome based. This means that in order to pass this assignment you should demonstrate the accomplishment of all 3 learning outcomes for this module in the essay. The reflective essay aims to test the accomplishment of the learning outcomes at an individual level. 1. Describe and discuss the state-of-the-art in digital business improvement an...
ScenarioYou need to do a layer-wise component and security analysis of a selected IoT application and make a report of process. CyberHealth Ltd. is a Teesside based cybersecurity solution provider, where you are working as a cybersecurity expert. Your company provides Networking & Cybersecurity solutions for the business environment. They currently offer managed, professional, and hardware & software services. Recently, few co...
Literature ReviewThe coursework for the Ethics and Governance module is an individual analysis and critical reflection on the use of AI algorithms in hiring decisions made by organisations. AI applications are the subject of considerable debate, in which one group says that ‘AI will help to create a more ethical world by bringing objectivity and fairness, and the other accuses AI of committing ethical violations such as racism, sexism, a...
Questions1. Explain the concepts and procedures involved in applying encryption and hashing algorithms by addressing the following: Â Â Explain why hash values are an important part of performing a forensic investigation. Explain why (or why not) hash values typically change if data is modified. Identify a method of securing message integrity during e-mail communications without encrypting the e-mail. Â 2....
Introduction of the research specialismAs part of this assignment you are required to produce an overview of two MSc research specialisms ( AI / Networking / Cyber Security / Software Engineering / Data Science) which are NOT the specialism you discussed in Assignment 1. Your report must be in two parts: The first research specialism you are discussing for this assignment. This must be approximately 1400 words (+ / - 10%), and wil...
Analysis of the Use CasesThe Chief Privacy Officer has also expressed an objection about this project. The CPO is concerned about the privacy implications of tracking both movement of individuals and the tracking of their purchasing behaviors.The IT Governance Board agreed that the concerns expressed by two of its members (the CFO and CPO) have merit. The board has requested an unbiased analysis of the proposed use cases and the security and p...
Weekly MS Project Exercises1. Task: You will individually undertake the weekly MS Project Exercises provided by the lecturer. Answer the questions asked for that exercise on the VLE (Moodle) and submit the file created. Maximum marks are given for work submitted with the correct answers within the timescale specified on VLE (Moodle). The MS Project Exercises are posted weekly on Moodle in the form of a Question and Notes documen...
Learning Outcomes AssessedThe following learning outcomes will be assessed: 1.Demonstrate an appreciation of the role of computing and technology in todayâs society 2.Discuss how social, ethical and legal issues are relevant to the subject of computer science   Important Information You are required to submit your work within the bounds of the University Infringement of Assessment Regulations (see Pr...
Task This assignment gives you an opportunity to practice the use of pivot tables for analyzing data and making decisions. These tables are particularly important for managers because they provide easily accessible business intelligence tools, right at the manager’s desk. If you need help with pivot tables, refer to “(Knowledge Extension) KE4-9: What are Pivot Tables and How Do I Use Them” in the textbook. Microsoft Office also...
Unlike reports that are written for information-sharing purposes, analytical reports typically include an analysis of alternatives and recommendations.Keep in mind that while reports share many features with other documents (such as memos and letters), they are usually meant to flow upward—from employees to management. By learning to write effective analytical reports, you can enhance your image with superiors and help your organization ...
Learning OutcomesThis Assignment assesses the following module Learning Outcomes (from Definitive Module Document): Knowledge and understanding: Have a conceptual understanding of how established techniques of research are used to create and extend existing knowledge in computer science. Be able to identify a research problem from synthesizing problem definitions from relevant literature. Demonstrate originality in proposing alternative so...
Brief Description of Chosen Research SpecialismLO1 Have a conceptual understanding of how established techniques of research are used to create and extend existing knowledge in computer science. LO2 Be able to identify a research problem from synthesizing problem definitions from relevant literature. LO3 Demonstrate originality in proposing alternative solutions within a chosen area. Skills and attributes LO4 Critically evaluate research l...