Why do Information Systems and/or Information Technologies often fail to be implemented in healthcare? Discuss this critically using examples.

Apply the sociotechnical debate (technological determinism versus social determinist) to the emergence of crowd working platforms.

Why do Information Systems and/or Information Technologies often fail to be implemented in healthcare? Discuss this critically using examples.

Drawing upon two examples demonstrate the political nature of the Internet.

Can knowledge workers be substituted by technology? Discuss this using examples.

Photo- editing software such as Photoshop has become so sophisticated, it can alter images convincingly such as by placing people in locations they never been or making a model look like she has flawless skin Do you think the practice of Photo-shopping is ethical In what situations would you strongly discourage it.

Digital Media (Pt.2)

Photo- editing software such as Photoshop has become so sophisticated, it can alter images convincingly such as by placing people in locations they never been or making a model look like she has flawless skin Do you think the practice of Photo-shopping is ethical In what situations would you strongly discourage it. (In a minimum of 250 words or more)

What is the business problem, with an emphasis on what decisions were made?Are there any ethical considerations, positive or negative, from using this machine learning approach (e.g. a machine learning approach that offsets human biases in the decision-making process)?

Machine Learning Business Case

Identify decisions that can be informed by machine learning (10 points)

Evaluate using evidence of the appropriateness, trade-offs, success and impact of each machine learning technique to improve decision-making (10 points)

analyse the ethical concerns and considerations and the impact on the decisions that are being made (5 points)

communicate in a clear, logical and consistent style suitable for a business audience (5 points).Should you hire more staff in the next 12 months, and how many more?

Which of your staff are the highest performers?

Which of your customers should you sell a bundled product to?

Which machine is most likely to require maintenance to avoid breaking down within the next week?

Where should you go to eliminate an imported species using aerial data?

What’s the best route for our trucks in logistics companies to take when delivering goods?

Which patients are most likely to be re-admitted to hospital within three days of being released, considering that there are many written notes from clinicians to understand?

What is the business problem, with an emphasis on what decisions were made?

Who was impacted by the decisions, and what was the impact?

How was a machine learning technique used to inform decisions?

Are there any ethical considerations, positive or negative, from using this machine learning approach (e.g. a machine learning approach that offsets human biases in the decision-making process)?

What made machine learning appropriate for the business question?

How was success measured?

What were the limitations or deficiencies of the machine learning approach?

Where there any trade-offs considered when building the solution, or in choosing between different machine learning approaches?

How could the solution be improved?

How can the decisions be defended? That is, what statistical evidence do you have from the algorithm to prove its accuracy if the decision is challenged by decision-makers or key stakeholders (e.g. past performance of the algorithm in a similar concept)?

What privileges would you give each type of worker, and why? Discuss this issue and compile the list as a group.

Hypothetical/fictitious organization

you are the IT manager for a hypothetical/fictitious organization. Briefly describe your hypothetical organization: type, number of employees, types of clients, and main industries served.

it is important to :

List as many different kinds of users you can think of who would need access to the organization’s servers to perform their jobs. What privileges would you give each type of worker, and why? Discuss this issue and compile the list as a group.

In preparing your response, include at least three source from professional or academic literature—such as articles from peer-reviewed journals and relevant textbooks. For this course, Wikipedia is not considered an academic or professional reference. Also, proofread and spell check your responses. All sources should be formatted using APA guidelines.

What is the number of total vaccinations and daily vaccinations per country?”.Find the median of total vaccinations, boosters per hundred, daily vaccination raw, fully vaccinated people, and daily vaccination per million

Data Science Project: Covid-19 Vaccinations (Globally and in Australia) Dataset Analysis with Python and Microsoft Power BI

What is the number of total vaccinations and daily vaccinations per country?”.Find the median of total vaccinations, boosters per hundred, daily vaccination raw, fully vaccinated people, and daily vaccination per million

Provide commentary on the implications of your findings. In what ways might these subgroups contribute to overall network outcomes in the context of your network? In the event that no subgroups emerge – why do you think this might be significant?

Math/Physic/Economic/Statistic Problems

Write a blog post of 750 words about your dataset. The following three parts will be assessed and must be addressed. You should support your responses with reference to existing literature where appropriate.

Identify any significant subgroups within your network using as many measures as are appropriate for your data (e.g. clustering coefficient, and assessment of cliques, and the Girvan-Newman algorithm). Bear in mind that all of these measures might not be appropriate for your network, or yield fruitful results. It is up to you to decide what measures to use with your data – and whether any emergent subgroups actually make sense.

Provide commentary on the implications of your findings. In what ways might these subgroups contribute to overall network outcomes in the context of your network? In the event that no subgroups emerge – why do you think this might be significant?

Generate a network map of your network using NetDraw that clearly identifies any important subgroups you find. You can do this by adjusting or creating node attributes (i.e. an attribute dataset) and thus changing node colours, shapes, or sizes where appropriate. You should refer to these nodes in the body of your blog post text, and upload the jpeg file as an attachment to your blog post.

You are to review this project, reviewing it for functionality and suitability for networking related tasks. Describe how code is used to execute certain tasks tasks.

program review

Review a python project

The project to review: -> https://github.com/NitinR99/3670FinalProject

The pieces of code for the project -> https://github.com/NitinR99/3670FinalProject/tree/main/src/components/individual%20codes

This is a 1000 word report.

You are to review this project, reviewing it for functionality and suitability for networking related tasks. Describe how code is used to execute certain tasks tasks.

What can be improved about it.

 

Discuss the nature of the problem situation as you see it, distinguishing between hard and soft system elements.Provide a rich picture of the situation the MBA Director faces in creating an alumni system that meets stakeholder needs.

Information system in organisation

Discuss the nature of the problem situation as you see it, distinguishing between hard and soft system elements

Provide a rich picture of the situation the MBA Director faces in creating an alumni system that meets stakeholder needs

Set out, as you see it, the system needs, the roles of those using it and the benefits that will accrue from having a well-designed IT-based system

Produce activity models relevant to using the new system, each supported by a CATWOE analysis. These models should include tasks related to inputting data to the system, and updating and using that data, but not in creating the IT system itself

Create an Entity Relationship Diagram for the data to be held by the system, Identify the key entities, the relationships between them and the cardinality involved. ensure this is in third normal form and has a full list of relevant data attributes

Identify your threat actors and characterize their motivations or desired outcomes. Use research from the Project Three resource guide orDescribe at least one tactic or method that is important in responding to and countering this threat actor. Use research from the Project Three

CYB-200-02: Develop reliable, ethical methods to detect, characterize, and counter cyber threat actors

In your technical brief, you must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical

element is aligned.

I. Introduction

A. Identify your threat actors and characterize their motivations or desired outcomes. Use research from the Project Three resource guide or

decision aid to support your response. For example, is the threat actor gathering information for financial gain? [CYB-200-02]

II. Analysis

A. Describe best practices or methods for detecting the threat actors from the scenario. Use research from the Project Three resource guide or

decision aid to support your response. [CYB-200-02]

B. Describe ethical and legal factors that should be considered and their significance in terms of the company for which you are employed in the

scenario. Use research from the Project Three resource guide or decision aid to support your response. [CYB-200-02]

C. Describe at least one tactic or method that is important in responding to and countering this threat actor. Use research from the Project Three

resource guide or decision aid to support your response. [CYB-200-02]

D. Describe at least one tactic or method that would be employed to reduce the likelihood of the same situation happening again. Use research

from the Project Three resource guide or decision aid to support your response. [CYB-200-02]

III. Conclusion

A. Explain the potential ramifications of the tactics or methods you have suggested. Use research from the resource guide or decision aid to

support your response. [CYB-200-02]

Develop a dashboard to display data collected from a web page. Some of these data can be (i) the weather information of Darwin, (ii) the exchange rate between two the AU$ and any other currency or any fluctuating data with time available from the internet.

Node Red on the Pi

This assignment is composed of three tasks. These tasks require that you search online for tools that allow you to complete them using Node-Red on the Pi.

1. Task 1: Use Node-Red to develop a dashboard to display the time. The submission should include.

a) A picture of the node-red dashboard side by side with a clock both showing similar times.

b) A picture of the workspace showing the flow used.

c) The content of the flow when exported from Node-Red.
(Marks 30/100)

2. Task 2: Develop a dashboard to show the graph of a sine function.

a) A picture of the workspace showing the flow used.

b) The content of the flow when exported from Node-Red.
(Marks 20/100)

3. Task 3: Develop a dashboard to display data collected from a web page. Some of these data can be (i) the weather information of Darwin, (ii) the exchange rate between two the AU$ and any other currency or any fluctuating data with time available from the internet.

It is expected that the answer includes

a) A picture of the workspace showing the flow used.

b) The content of the flow when exported from Node-Red

c) A comparison between the data from a webpage and the data collected by the Pi (Marks 50/100)