Visual Analytics

Visual Analytics

Visual Analytics

Do you have any personal/professional experience with visual analytics? Do you think visual analytics can help with different KPI measurement/management – why?

I have personal experience with visual analytics, like dashboards that display graphical and pictorial patterns from data. Visual analytics, which entails synthesizing information from a large pool of data and displaying it in a manner that anyone can understand the patterns, can be beneficial to KPI management as it is bound to enhance the whole process of resource allocation and management by leveraging various data analytics tools.

Finance is a vital aspect of an organization’s health; visual analytics can integrate financial information through financial dashboards. Data analytics tools analyze data from different parts of a financial system to produce results based on data generated over some time to give an accurate financial position of an organization; financial KPIs may generate information like costs of goods/services, gross profit margin, and the working capital.

According to Kinsey (2018), customers are an integral part of organizational continuity, and it’s essential to attract and retain them. Customer service dashboards can be used to gauge customer satisfaction as well as maintain excellent interaction with customers to create proper service delivery. Customer services KPI dashboards may contain information such as warranty claims and percentage levels of complaints.

Human resource dashboards can be utilized by an organization to track employee welfare since an organization always aims at retaining its workforce. Through visual analytics, production levels of employees and employee job satisfaction metrics can be uncovered. These quantities can be used to make data-driven decisions about an employee’s welfare.

Manufacturing is often a complex process that requires constant optimization of different elements of the whole process. Real-time analysis of manufacturing stages is vital in ensuring that quality products are produced efficiently and economically. Visual analytics in a manufacturing dashboard can have production rate KPI and operator productivity KPI.

Growing levels of big data enable data-intensive businesses like e-commerce to analyze customer data using dashboards. From this, they can access KPIs like the Average amount of money spent on a basket of goods.

Data analytics is central to the growth of any business due to the large volumes of data continually produced; therefore, it is intelligent for an organization to track performance using visual analytics, for instance, dashboards.

References

Kinsey, S. (2018). 8 Inspirational KPI Dashboards for performance tracking. Retrieved 6 May 2021, from https://www.simplekpi.com/Blog/8-Inspirational-KPI-Dashboards-for-performance-tracking

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Visual Analytics And KPI Management

Do you have any personal/professional experience with visual analytics? Do you think visual analytics can help with different KPI measurement/management – why?

Visual Analytics

Visual Analytics

Textbook:

  • Information Technology Project Management by Kathy Schwalbe

Order Solution Now

Security Concerns

Security Concerns

Security Concerns

What are the different categories of cyber criminals and the motives they have to attack networks?

The two major classifications of cybercriminals include insider attackers and outside attacks. Examples of inside attackers include disgruntled employees and other employees who unintentionally commit cyberattacks. The classification of outside cybercriminals includes amateurs, hackers, and organized cybercriminals (Han & Dongre, 2014). Disgruntled employees can commit cybercrimes to gain revenge on the organization, while amateur cybercriminals, also known as script kiddies, can commit cyberattacks to display their skills. Hackers are motivated by various aspects, such as stealing confidential information in the system or even causing harm to the system (Han & Dongre, 2014). Organized attackers include a collection of cybercriminals such as hacktivists that compromise the security of a system to make a statement or even state-sponsored cybercriminals that aim at identifying security issues in government systems or even compromise the security of other government systems.

Which do you think are relevant for the bookstore? Explain how the targeted organization and its particular industry influence the likelihood of an attack.

The blackhat hackers are the most relevant cybercriminals that could have attacked the bookstore. Two main advantages hackers can gain from attacking a bookstore include stealing information for their financial gain and stealing confidential information to gain a business advantage (MacKinnon et al., 2013). Various confidential information can be found at the bookstore. An example is the credit card information of individuals as well as the personal information of the bookstore’s clients. Hackers can compromise the security of the bookstore’s system and gain unauthorized access to credit card information or personal information in the system.

Use a recent successful attack in the news to justify your response. What measures can be taken to prevent a similar attack on your customer?

An example of this is the cyberattack in 2019 that targeted online campus bookstores using a malicious script to obtain credit card information as well as the personal information of users in the United States and Canada (Bonderud, 2019). Recommended security measures to prevent such attacks include conducting a vulnerability assessment to identify any vulnerabilities in the system, patching the identified vulnerabilities, as well as educating the system users on how to avoid becoming victims of cybercrimes.

References

Bonderud, D. (2019, May 6). Targeted Magecart Attack Hits More Than 200 Online Bookstores. Retrieved October 06, 2020, from https://securityintelligence.com/news/targeted-magecart-attack-hits-more-than-200-online-bookstores/

Han, C., & Dongre, R. (2014). Q&A. What Motivates Cyber-Attackers? Technology Innovation Management Review, 4(10).

MacKinnon, L., Bacon, L., Gan, D., Loukas, G., Chadwick, D., & Frangiskatos, D. (2013). Cyber security countermeasures to combat cyber terrorism. In Strategic intelligence management (pp. 234-257). Butterworth-Heinemann.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Security Concerns

The CISO is chatting with your group about the huge influx of attacks the firewall logs picked up this week. One of the interns asks why anyone would want to attack a bookstore. Discuss why you think this is occurring based on your knowledge of network threats.

Security Concerns

Security Concerns

  • What are the different categories of cyber criminals and the motives they have to attack networks?
  • Which do you think are relevant for the bookstore? Explain how the targeted organization and its particular industry influence the likelihood of an attack.
  • Use a recent successful attack in the news to justify your response. What measures can be taken to prevent a similar attack on your customer?

Make sure to support your thoughts with resources, citing them in APA style.

Order Solution Now

PEW Typology

PEW Typology

PEW Typology

You have already taken the quiz as part of the lesson this week; now, tell the class about your results and what they mean. What is your ideological placement? Then, analyze why you believe the results or do not believe the results. Do these results reflect your voting record? Use evidence (cite sources) to support your response from assigned readings or online lessons, and at least one outside scholarly source.

I am not at all surprised by the results I got from the PEW political typology quiz; I am a solid liberal. Although I have been a liberal most of my adult life, I think I became more aware of my stand from the events that unrolled last year- the Black Lives Matter movement and the chaotic presidential campaigns. The country has never in recent times been as polarized as it was, and I must admit, the more the other side pulled, the clearer it became to me that our country needs radical change.

In the quiz, I stated that the country’s economic system unfairly favors the rich; they ought to be taxed higher than they currently are rather than getting perks that trickle down as cost to the citizens and unfathomable profits for individuals at the top of the food chain. I also believe that the government regulation of business is necessary to protect the public interest. Further, I believe that poor people have hard lives because government benefits don’t go far enough to help them live decently. If the government had bigger tax brackets for the rich cooperatives and these were used equitably to meet the needs of the poor, then the government would indeed be doing a better job than it is given credit for (Whitman, 2020).

Another area I am passionate about is the systemic racial discrimination in our country. I believe that the Black Lives Matter matches were a strong wake-up call for the government and perpetrators of racism to realize that gone are the days when brutality against people of color would make it to the news and be forgotten a few days later. Today, racism is treated with the concern that it should, globally and not just in the US. Today, a colored person knows that any discrimination against self would be taken seriously and dealt with accordingly (Tesler, 2020; Daley, 2021). So yes, I agree with the results of the quiz that I am a solid liberal.

References

Daley, J. (2021, March 1). Killings by Police Declined after Black Lives Matter Protests. https://www.scientificamerican.com/article/killings-by-police-declined-after-black-lives-matter-protests1/. Accessed on 21st April, 2021.

Tesler, (2020, June 9th). The Floyd protests have changed public opinion about race and policing. Here’s the data. https://www.washingtonpost.com/politics/2020/06/09/floyd-protests-have-changed-public-opinion-about-race-policing-heres-data/. Accessed on 21st April, 2021.

Whitman Cobb, W. N. (2020). Political Science Today (1st ed.). Washington, DC: Sage, CQ Press

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Week 8 Discussion PEW Typology Quiz

Required Resources

Read/review the following resources for this activity:

PEW Typology

PEW Typology

Initial Post Instructions

You have already taken the quiz as part of the lesson this week; now, tell the class about your results and what they mean. What is your ideological placement? Then, analyze why you believe the results or do not believe the results. Do these results reflect your voting record? Use evidence (cite sources) to support your response from assigned readings or online lessons, and at least one outside scholarly source.

Follow-Up Post Instructions

Respond to at least one peer. Further the dialogue by providing more information and clarification. Minimum of 1 scholarly source, which can include your textbook or assigned readings or may be from your additional scholarly research.

Writing Requirements

  • Minimum of 2 posts (1 initial & 1 follow-up)
  • Minimum of 2 sources cited (assigned readings/online lessons and an outside scholarly source)
  • APA format for in-text citations and list of references

Grading

This activity will be graded using the Discussion Grading Rubric. Please review the following link:

Course Outcomes (CO): 1, 4

Due Date for Initial Post: By 11:59 p.m. MT Recommended by Wednesday
Due Date for Follow-Up Posts: By 11:59 p.m. MT on Saturday

Posts must be on two separate days.

Search entries or author Filter replies by unreadUnread     Collapse replies Expand replies

Order Solution Now

Multimedia Fallacies

Multimedia Fallacies

Multimedia Fallacies

A fallacy is a deceptive argument or false reasoning. Subsequently, there are various types of fallacies: logical fallacies, informal fallacies, and formal fallacies. A formal fallacy is detected by analyzing the logical form of an argument or reasoning, while an informal fallacy is false reasoning that normal logic cannot detect. A logical fallacy is also defined as an error in reasoning that occurs frequently. Fallacies are grouped into various categories, such as deductive or inductive standards. Therefore, various fallacies are based on these categories: Ad Hominem, Red Herring Fallacy, Appeal to Pity, Affirming the Consequent, and Accent (Staff, 2021).

For this discussion, I chose a scene from Family Guy from this link that depicts fallacies, specifically, the Red Herring Fallacy. The Red Herring Fallacy is created when distractions establish an error from an ongoing argument with statements that appear relevant but aren’t. This type of fallacy distracts individuals from the discussed topic (“Fallacies | Internet Encyclopedia of Philosophy,” 2021).

The fallacy is created during a mayoral election debate in the selected piece. Luis Griffin and Mayor West are the two people running for the seat; how they answer citizens’ questions illustrates the Red Herring Fallacy. At the beginning of the clip, a citizen asks Mayor West about the possibility of increasing garbage collection; the Mayor answers the question without answering the question asked, which other citizens find satisfying. The Mayor rambles on about the importance of questions, distracting the audience from the said question. The running mate, Luis Griffin, picks up on this tactic and employs it when asked about the potential to decrease crime in their city, whereby she talks about 9/11 and Jesus Christ. The result is chanting citizens who are impressed by their answers.

This example is an excellent example of the Red Herring Fallacy whereby the running mates give answers related to the questions asked, but they do not answer the question itself, distracting the citizens, and their answers please the citizens. To conclude, fallacies are present in many situations but can be overlooked.

References

Fallacies | Internet Encyclopedia of Philosophy. Iep.utm.edu. (2021). Retrieved 14 April 2021, from https://iep.utm.edu/fallacy/.

Staff, T. (2021). 15 Logical Fallacies You Should Know Before Getting Into a Debate. TheBestSchools.org. Retrieved 14 April 2021, from https://thebestschools.org/magazine/15-logical-fallacies-know/.

Family Guy. Youtube.com. (2020). Retrieved 14 April 2021, from https://www.youtube.com/watch?v=f_ttbfTGs48.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Unit 8 Discussion Assignment

Multimedia Fallacies

Step 1. Review a few web resources on fallacies.

Multimedia Fallacies

Multimedia Fallacies

There are many websites that provide information on both formal and informal fallacies. For example: Logically Fallacious; the Internet Encyclopedia of Philosophy (entry on “Fallacies”); the Nizkor Project; and the Fallacy Files. Your discussion assignment is to take a look at each of these sites and, if you’re interested, find the fallacies that correspond to those that we’ve studied so far.

Step 2. Find an online example of a fallacy contained in a cartoon or video.

After you feel comfortable recognizing fallacies of failed or flawed induction, conduct a search online and find one video or cartoon example for one of these fallacies. Your multi- media example must take the form of a video/image/cartoon (check out YouTube, for instance, or search for the fallacies in cartoon banks). The Cartoon Network, Family Guy, South Park or even just plain old cartoon websites are good places to look.

Step 3.

Once you’ve located the example, reconstruct the fallacy from the video or cartoon. You can refer back to the Logically Fallacious site, which we used in Unit 7 discussion to find additional examples and logical forms for your fallacies. Embed the multi-media example on the Discussion Forum (or you can paste in the link), and include your reconstruction and analysis. Be sure to address the following:

  • Clearly state the fallacy your example
  • Share your reconstructed fallacy and make sure to present the full argument (that the video, image or cartoon suggests) by identifying its implicit premise(s) and
  • Explain why you think this is a good example of the

 

Step 4.

Read and respond to other students’ posts with substantial comments that answer these questions:

  • Do you think their reconstruction of the fallacy is well done? If not, how would you reconstruct it?
  • Do you think their multi-media represents the fallacy they claimed? If not, what fallacy do you think it represents?
  • What variations on their fallacy have you encountered, if any? Or have you seen their multi-media example somewhere before and were you aware that it represented a fallacy?
  • Do you have any questions for them regarding the content of their multi-media or about the process of identifying the fallacy?

Order Solution Now

Leaders Creating Trust

Leaders Creating Trust

Leaders Creating Trust

Leaders require trust from the team members to carry out their roles efficiently. This process should begin through positive relationships within the team. Such relationships can be nurtured by assisting employees by enabling cooperation, conflict resolution, providing honest feedback, and paying attention to their concerns. These behaviors show the human side of leaders and enable employees to relate with them reasonably without extreme fear and expectations. Also, leaders should provide expertise and sound judgment. It is easy for employees to trust a leader who has the knowledge and skills concerning their discipline. They are aware that they can rely on the leader for advice and decisions regarding the same (Zenger & Folkman, 2019). Finally, leaders should keep their word. Such consistency makes leaders reliable and trustworthy.

As a leader, one can delegate roles to subordinate staff. This allows leaders to extend trust to employees to gain the same. Extending calculated trust requires accountability and clear expectations on the other party’s end. According to Stephen Covey, only 28 percent of employees can confirm that their CEOs provide reliable information (Covey, 2019). This reflects CEOs’ lack of expertise, experience, and knowledge about a certain discipline. Thus, they should work on personal improvement in the discipline to ensure employees can look to them for advice and sound decisions.

References

Covey, S. M. (2019). How the Best Leaders Build Trust.

Zenger, J., & Folkman, J. (2019, June). How Leaders Build Trust. Harvard Business Review.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Management

Leaders Creating Trust

This week our focus is on leader-follower relationships. For this week’s discussion, consider the practices, policies, and norms that you would expect to find in an organization that prides itself on building a culture of respect and trust.

Leaders Creating Trust

Leaders Creating Trust

Reflect on the following statement, “The most important question we ask of potential leaders is, ‘Can we trust you not to abuse the privilege of authority?’ (Hogan & Kaiser, 2005).” Leaders who engender trust provide a strong ethical foundation from which followers will emulate. Prepare a minimum 200-word response that illustrates how to engender trust and build a culture of respect in a diverse organization. What are the most effective ways to use power but still engender trust? What advice would you give to a company CEO about building a culture of respect and trust? Although not required, consider including a picture or other interesting media building a culture of respect and trust.

After you have made your initial post by Wednesday, 11:59PM EST, you will make 2 substantive replies by Saturday, 11:59PM EST.

Hogan & Kasier, (2005) What We Know About Leadership, Review of General Psychology, 9(2). Special issue: Positive Psychology, 169-180.

Order Solution Now

Hiring Process

Hiring Process

Hiring Process

Compare at least three possible components of background checks.

Criminal History Records

The process of hiring new employees requires frugality when conducting background checks. Employers can have candidates self-report. Alternatively, employers can use external sources to obtain a candidate’s criminal history. Employers’ main problem is the lack of extensive information even after paying significant subscriptions to relevant websites. This aspect, which employers believe is important for screening candidates, meets intense admonition from various quarters. By 2016, at least 21 states instituted ‘ban-the-box’ policies. These policies were intended to stop employers from conducting criminal checks until they present conditional employment offers (Aamodt, 2016). Therefore, the lack of access to credible and complete information makes this source controversial. The limitation of opportunities for candidates with criminal records also renders it contentious.

Credit History

A good number of employees conduct credit checks to determine the candidates’ credit reports. Most employers desire to employ financially responsible candidates who may not be incentivized to participate in unethical practices. For instance, hiring a Chief Financial officer who is bankrupt or violates tax laws may be a bad decision for a company. However, the law requires employers to inform candidates of the reasons for denial of employment if it is connected to their credit history (Brody, 2010). Such information enables employers to make the best decisions regarding their workforce.

Reference Checks

Candidates always provide references who can confirm the curriculum vitae or resume information. Despite the voluntary nature of references, one would expect them to provide significant information regarding candidates. Unfortunately, this is not the case due to fear of lawsuits for providing such information. Most references only provide dates of employment and titles of candidates. To counter this, employers offer confidentiality to references, which should encourage them to speak about the candidate. Se former employers remain adamant about providing such information (Brody, 2010).

Recommend elements that should be included in the hiring process.

The hiring process is critical to every organization because it consumes time and financial resources. Therefore, each organization should ensure that they hire the right candidates for the job. This reduces the chances of high turnover. For these reasons, the organization needs to conduct the hiring process within legal restraints. The employers should post the vacancies on their respective platforms. The shortlisting and interviewing processes should follow this. The process of conducting reference checks should be carried out reasonably and legally to avoid lawsuits. Once the right candidate has been chosen, the company should create an employment contract that details requirements, remuneration, and other policies.

Summarize legal concerns that should be considered for each element.

The job post should not infer discrimination against certain groups. For instance, it should not specify the candidates’ race, physical ability, or nationality. Gender can be specified if the company is seeking to balance the gender ratio. In addition, it should list the roles and requirements to cushion the company against future lawsuits (Whitford, Hanna, & Gerber, n.d). The process of obtaining information about candidates should be done legally and transparently. For instance, the process of obtaining information regarding past employment should not jeopardize the reference. At the same time, negligence while hiring is legally frowned upon. If an employer hires an abusive or violent individual who then causes harm to other employees, they are held liable, especially if such information is available. During employment, the employer is expected to maintain their contractual obligations towards employees. Failure to do so in various ways, such as sudden termination or retaliation towards whistleblowers, easily attracts lawsuits. Therefore, all organizations should always observe the potential legal loopholes that may lead to lawsuits.

References

Aamodt, M. G. (2016). Conducting Background Checks for Employee Selection. Retrieved from https://www.shrm.org/hr-today/trends-and-forecasting/special-reports-and-expert-views/documents/shrm-siop%20background%20checks.pdf

Brody, R. G. (2010). Beyond the basic background check: hiring the “right” employees. Management Research Review, 33(3), 210-223.

Whitford, F., Hanna, M., & Gerber, C. (n.d). The Hiring Process. Retrieved from https://www.extension.purdue.edu/extmedia/PPP/PPP-69.pdf

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


The Hiring Process

in a 525- to 700-word paper in which you complete the following:

Hiring Process

Hiring Process

  • Compare at least three possible components of background checks.
  • Recommend elements that should be included in the hiring process.
  • Summarize legal concerns that should be considered for each element.

Order Solution Now