Categories
Technology

Dissertation Chapter 2: literature Review Supporting Evidence Literature review

Dissertation Chapter 2: literature Review
Supporting Evidence
Literature review addresses previous relevant projects and articulates theoretical (practice) orientation.
– Primary Orientation
Provide an introduction to the review of scholarly literature, an argument for conducting the review, and a primary theoretical (and practice) orientation.
– Efforts to Address the Problem
Provide a synthesized review of the scholarly literature to expose, explain, and analyze previous scholarly efforts to address the problem.
– Synthesis of the Evidence
Provide a logically organized and synthesized review and analysis of the literature in close alignment with the topic, problem, and gap.
I am looking for good up-to-date resources (2020 and beyond).
Background info:
Existing research on ICT is primarily descriiptive, survey based, and focused on who is using ICT and how people and organizations are using the tools. Although many organizations have shown interest in using ICT, they often demonstrate uncertainty about the most effective use of ICT tools to serve organizational needs. Distinctly missing from the literature is a framework that can help practitioners in organizations, specifically nursing homes, to understand ICT as a potentially creative and productive tool to guide the organization through its implementation in order to improve performance. The purpose of this generic qualitative inquiry is to explore what factors contribute to the successes and challenges of recent digital gaming implementations in nursing home facilities. The phenomenon being studied is digital gaming implementation successes and challenges. The theoretical framework is the Human Performance Technology (HPT) model. The target population is nursing home facility personnel who have recently participated in the implementation of Information and communications Technology (ICT) in the form of digital gaming. The researcher will use the human performance technology (HPT) model (D. M. Van Tiem, J. L. Moseley, & J. C. Dessinger, Fundamentals of Performance Improvement, 2012) as a framework to appraise those within the nursing environment who are familiar with the use of Digital Gaming in nursing home facilities. The data analysis will determine the extent to which practitioners in nursing homes used key elements of the HPT model (e.g., analysis, design, development, implementation, maintenance, evaluation, and change management) when the organization attempted to adopt Digital Gaming. The researcher may determine that some organizations begin using Digital Gaming tools without thinking through what the impact would be on the organization, workers, and patients. The results of this study could demonstrate that nursing homes were using some components of the HPT model but would likely improve performance outcomes, reliability, and success by more intentionally using the research-based HPT model as a framework for planning and implementation. See less

Categories
Technology

overview with the current development of machine learning and artificial intell

overview
with the current development of machine learning and artificial intelligence, artificial intelligence can explore forms and find meaning from bigdata sets without the interference of humans, machine learning turned the design problems into logical problems to be computed, there for, machine learning and artificial intelligence can be used to recognize the car model by giving it big data sets.
Theory
Using a simple deep learning network to classify images of cars, which is based on principal component analysis, that will be followed with a simple binary hashing to index, that is called principal component analysis network, this model had set new records to classification task, which will help to classification of car model.
Concepts / terms
Classification: is a process related to categorization, the process in which ideas and objects are recognized, differentiated and understood. Classification is the grouping of related facts into classes
Big data: refers to data sets that are too large or complex to be dealt with by traditional data-processing application software. Data with many fields offer greater statistical power, while data with higher complexity may lead to a higher false discovery rate. Big data analysis challenges include capturing data, data storage, data analysis, search, sharing, transfer, visualization, querying, updating, information privacy, and data source.
Machine learning: is a field of inquiry dedicated to understanding and building methods that ‘learn’, that is, methods that leverage data to improve performance on some set of tasks. It is seen as a part of artificial intelligence. Machine learning algorithms build a model based on sample data, known as training data, in order to make predictions or decisions without being explicitly programmed to do so
Artificial intelligence: is intelligence shown by machines, which is the opposite of the natural intelligence shown by animals and humans. Artificial intelligence has been defined as the field of study of intelligent, which refers to any system that perceives its setting and takes actions that exploit its chance of attaining its goals.
principal component analysis: a very known technique used for analysing big data sets which have a large number of dimensions or features, growing the interpretability of data while conserving the maximum amount of information, and allowing the visualization of multidimensional data.
Focus
The focus of the research will be modelling and understanding the principal component analysis, within the classification of car images to predict its model, the success of the research will reduce the reliance on human resources to identify the car model, which can be used in many instances such as identifying cars with fake number plate using number plate recognition and the issuing authority database of registered cars.

Categories
Technology

overview with the current development of machine learning and artificial intell

overview
with the current development of machine learning and artificial intelligence, artificial intelligence can explore forms and find meaning from bigdata sets without the interference of humans, machine learning turned the design problems into logical problems to be computed, there for, machine learning and artificial intelligence can be used to recognize the car model by giving it big data sets.
Theory
Using a simple deep learning network to classify images of cars, which is based on principal component analysis, that will be followed with a simple binary hashing to index, that is called principal component analysis network, this model had set new records to classification task, which will help to classification of car model.
Concepts / terms
Classification: is a process related to categorization, the process in which ideas and objects are recognized, differentiated and understood. Classification is the grouping of related facts into classes
Big data: refers to data sets that are too large or complex to be dealt with by traditional data-processing application software. Data with many fields offer greater statistical power, while data with higher complexity may lead to a higher false discovery rate. Big data analysis challenges include capturing data, data storage, data analysis, search, sharing, transfer, visualization, querying, updating, information privacy, and data source.
Machine learning: is a field of inquiry dedicated to understanding and building methods that ‘learn’, that is, methods that leverage data to improve performance on some set of tasks. It is seen as a part of artificial intelligence. Machine learning algorithms build a model based on sample data, known as training data, in order to make predictions or decisions without being explicitly programmed to do so
Artificial intelligence: is intelligence shown by machines, which is the opposite of the natural intelligence shown by animals and humans. Artificial intelligence has been defined as the field of study of intelligent, which refers to any system that perceives its setting and takes actions that exploit its chance of attaining its goals.
principal component analysis: a very known technique used for analysing big data sets which have a large number of dimensions or features, growing the interpretability of data while conserving the maximum amount of information, and allowing the visualization of multidimensional data.
Focus
The focus of the research will be modelling and understanding the principal component analysis, within the classification of car images to predict its model, the success of the research will reduce the reliance on human resources to identify the car model, which can be used in many instances such as identifying cars with fake number plate using number plate recognition and the issuing authority database of registered cars.

Categories
Technology

Dissertation Chapter 2: literature Review Supporting Evidence Literature review

Dissertation Chapter 2: literature Review
Supporting Evidence
Literature review addresses previous relevant projects and articulates theoretical (practice) orientation.
– Primary Orientation
Provide an introduction to the review of scholarly literature, an argument for conducting the review, and a primary theoretical (and practice) orientation.
– Efforts to Address the Problem
Provide a synthesized review of the scholarly literature to expose, explain, and analyze previous scholarly efforts to address the problem.
– Synthesis of the Evidence
Provide a logically organized and synthesized review and analysis of the literature in close alignment with the topic, problem, and gap.
I am looking for good up-to-date resources (2020 and beyond).
Background info:
Existing research on ICT is primarily descriiptive, survey based, and focused on who is using ICT and how people and organizations are using the tools. Although many organizations have shown interest in using ICT, they often demonstrate uncertainty about the most effective use of ICT tools to serve organizational needs. Distinctly missing from the literature is a framework that can help practitioners in organizations, specifically nursing homes, to understand ICT as a potentially creative and productive tool to guide the organization through its implementation in order to improve performance. The purpose of this generic qualitative inquiry is to explore what factors contribute to the successes and challenges of recent digital gaming implementations in nursing home facilities. The phenomenon being studied is digital gaming implementation successes and challenges. The theoretical framework is the Human Performance Technology (HPT) model. The target population is nursing home facility personnel who have recently participated in the implementation of Information and communications Technology (ICT) in the form of digital gaming. The researcher will use the human performance technology (HPT) model (D. M. Van Tiem, J. L. Moseley, & J. C. Dessinger, Fundamentals of Performance Improvement, 2012) as a framework to appraise those within the nursing environment who are familiar with the use of Digital Gaming in nursing home facilities. The data analysis will determine the extent to which practitioners in nursing homes used key elements of the HPT model (e.g., analysis, design, development, implementation, maintenance, evaluation, and change management) when the organization attempted to adopt Digital Gaming. The researcher may determine that some organizations begin using Digital Gaming tools without thinking through what the impact would be on the organization, workers, and patients. The results of this study could demonstrate that nursing homes were using some components of the HPT model but would likely improve performance outcomes, reliability, and success by more intentionally using the research-based HPT model as a framework for planning and implementation. See less

Categories
Technology

Step 1- Review the Title. Come up with a new title (similar to the one in italiz

Step 1- Review the Title. Come up with a new title (similar to the one in italized and bold)
Step 2 – Review the Data Collection Techniques on page 17-19 Make 2 new entries and proof page 17-19

Categories
Technology

Step 1- Review the Title. Come up with a new title (similar to the one in italiz

Step 1- Review the Title. Come up with a new title (similar to the one in italized and bold)
Step 2 – Review the Data Collection Techniques on page 17-19 Make 2 new entries and proof page 17-19

Categories
Technology

For this task, you will use the attached “Healthy Body Wellness Center Case Stud

For this task, you will use the attached “Healthy Body Wellness Center Case Study,” “Healthy Body Wellness Center Security Assessment Report,” and the “Business Requirements Document Template” to analyze, assess, and prioritize existing threats to the current architecture and design technical specifications to address identified threats.

Categories
Technology

For this task, you will use the attached “Healthy Body Wellness Center Case Stud

For this task, you will use the attached “Healthy Body Wellness Center Case Study,” “Healthy Body Wellness Center Security Assessment Report,” and the “Business Requirements Document Template” to analyze, assess, and prioritize existing threats to the current architecture and design technical specifications to address identified threats.

Categories
Technology

You are the Chief Information Security Officer in your organization. Several mem

You are the Chief Information Security Officer in your organization. Several members of the technology committee of the board of directors were recently informed of the cyberattacks at the University of Calgary (ransomware) and Capital One (breach). Before the next board of directors meeting, they would like a short discussion on lessons from both incidents that can be used to improve the cybersecurity defenses at your chosen organization. Study the information from the sources linked below and others that you may find on both incidents and prepare a concise document answering their questions. Include a perspective on the impact of the incidents on the wider cybersecurity field.
Cohen, Naor, and Catherine Heggerud. “Cyber Attack at the University of Calgary.” Ivey Publishing, 2021.
McLean, Rob. “A Hacker Gained Access to 100 million Capital One Credit Card Applications and Accounts.” CNN Business, July 30, 2019.
– https://edition.cnn.com/2019/07/29/business/capital-one-data-breach/index.html
“Capital One Announces Data Security Incident.” Capital One, July 29, 2019.
– https://www.capitalone.com/about/newsroom/capital-one-announces-data-security-incident/
Submission instructions: Your document should be a minimum of 500 words. Save your document as a Word document or a PDF and share it as an attachment in this discussion forum. Read your peers’ contributions and reply to at least one with thoughtful comments to deepen the discussion.

Categories
Technology

You are the Chief Information Security Officer in your organization. Several mem

You are the Chief Information Security Officer in your organization. Several members of the technology committee of the board of directors were recently informed of the cyberattacks at the University of Calgary (ransomware) and Capital One (breach). Before the next board of directors meeting, they would like a short discussion on lessons from both incidents that can be used to improve the cybersecurity defenses at your chosen organization. Study the information from the sources linked below and others that you may find on both incidents and prepare a concise document answering their questions. Include a perspective on the impact of the incidents on the wider cybersecurity field.
Cohen, Naor, and Catherine Heggerud. “Cyber Attack at the University of Calgary.” Ivey Publishing, 2021.
McLean, Rob. “A Hacker Gained Access to 100 million Capital One Credit Card Applications and Accounts.” CNN Business, July 30, 2019.
– https://edition.cnn.com/2019/07/29/business/capital-one-data-breach/index.html
“Capital One Announces Data Security Incident.” Capital One, July 29, 2019.
– https://www.capitalone.com/about/newsroom/capital-one-announces-data-security-incident/
Submission instructions: Your document should be a minimum of 500 words. Save your document as a Word document or a PDF and share it as an attachment in this discussion forum. Read your peers’ contributions and reply to at least one with thoughtful comments to deepen the discussion.