CIS 500 Assignment 1
Predictive Policing

Assignment 1
Predictive Policing
In 1994, the New York
City Police Department adopted a law enforcement crime fighting strategy known
as COMPSTAT (COMPuter STATistics). COMPSTAT uses Geographic Information Systems
(GIS) to map the locations of where crimes occur, identify “hotspots”, and map
problem areas. COMPSTAT has amassed a wealth of historical crime data. Mathematicians
have designed and developed algorithms that run against the historical data to
predict future crimes for police departments. This is known as predictive
policing. Predictive policing has led to a drop in burglaries, automobile
thefts, and other crimes in some cities.
Write a four to five (45) page paper in which you
1. Compare and contrast the application of information
technology (IT) to optimize police departments’ performance to reduce crime
versus random patrols of the streets.
2. Write a page paper – Describe how COMPSTAT, as an information system (IS),
implements the four (4) basic IS functions
1. Input
2. Processing
3. Output
4. Feedback
5. Determine how information systems have allowed police
departments that implement tools such as COMPSTAT to respond to crime faster.
6. Apply the strengths, weaknesses, opportunities, and
threats analysis (SWOT analysis) on behalf of police departments that intend to
implement predictive policing.
7. Use at least three (3) quality resources in this
assignment. Note Wikipedia and similar Websites do not qualify as quality
resources. You may use the resources above or others of your choosing.
Your assignment must follow these formatting requirements
· Be typed, doublespaced, using Times New Roman font (size
12), with oneinch margins on all sides; citations and references must follow
APA or schoolspecific format. Check with your professor for any additional
instructions.
· Include a cover page containing the title of the
assignment, the student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in the required
assignment page length.

The specific course learning outcomes associated with this
assignment are
· Explain how the components of an information technology
system interrelate in an organizational context.
o Use technology and information resources to research
issues in information systems and technology.
o Write clearly and concisely about topics related to
information systems for decision making using proper writing mechanics and
technical style conventions.

Grading for this assignment will be based on answer quality,
logic / organization of the paper, and language and writing skills, using the
following rubric.
CIS 500 Assignment 2 4G Wireless Networks
Assignment 2 4G Wireless Networks
The 3rd Generation
Partnership Project (3GPP) developed the 3GPP LongTerm Evolution (LTE)standard
for wireless communications technology. It is regarded as an evolution of the
Global System for Mobile Communication (GSM), the Universal Mobile
Telecommunications Systems (UMTS), and other standards. It is also known as the
4G LTE. The competition among the carriers to support 4G LTE networks has been
very fierce as evidenced by TV commercials targeting smartphone users. Many
smartphones run on 3G networks.

Write a four to five (45) page paper in which you
1. Compare and contrast 3G wireless networks to 4G networks
in terms of
1. Services and applications
2. Network architecture
3. Data throughput
4. User perceptions
5. Distinguish between the 4G LTE, 4G WiMax, and 4G WiBro
networks based on
1. Upload and download speeds
2. User perceptions
3. Backward compatibility
4. Service availability
6. Identify why the competition between the 4G LTE carriers has
been so fierce and describe the benefits of this competition to the
subscribers.
7. In January 2014: 2024 – Essay Writing Service. Custom Essay Services Cheap, Verizon stated that 4G LTE is available
in 190 cities covering 200 million American subscribers. According to
AT&T’s Website, they had plans for covering 20 million Americans in 15
markets by end of 2011. Conclude why Verizon is able to cover more markets than
AT&T.
8. Use at least three (3) quality resources in this
assignment. Note Wikipedia and similar Websites do not qualify as quality
resources. You may use the resources above or others of your choosing.

Your assignment must follow these formatting requirements
· Be typed, double spaced, using Times New Roman font (size
12), with oneinch margins on all sides; citations and references must follow APA
or schoolspecific format. Check with your professor for any additional
instructions.
· Include a cover page containing the title of the
assignment, the student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in the required
assignment page length.

Assignment 3 Mobile
Computing and Social Networking
Mobile computing has dramatically changed how information is
accessed and shared. Wireless networking has been an enabler of mobile
computing. One profession that mobile computing has had a big impact on is
health care management. Patients are now able to monitor their vital signs such
as blood pressure, glucose levels, etc. without having to periodically visit a
doctor’s office or hospital. There are devices such as the Withings Blood
Pressure Monitor that works with an iPhone, iPod Touch, or iPad to record,
track, and graph a patient’s blood pressure. There are other devices that can
measure blood glucose levels, oxygen levels, heart rate, etc. and use an iPhone
to send the results to a clinical server. Doctors and caregivers are then able
to access the data on the clinical server.

According to the American College of Gastroenterology,
social networking sites like Facebook, Twitter, and YouTube are used as
powerful platforms to deliver and receive health care information. Patients and
caregivers are increasingly going online to connect and share experiences with
others with similar medical issues or concerns Patients are able to take
advantage of social networks to do more than just share pictures and tweets.

Write a four to five (45) page paper in which you
1. Compare and contrast monitoring of patient vital signs
using mobile computing technology to inpatient visits to the doctor’s office or
hospital.
2. Analyze the advantages and disadvantages of using mobile
computing technology to monitor patients.
3. Assess the security concerns with regard to the
transmission of personal medical information over wireless networks.
4. Assess the use of social networking for group support for
patients with similar medical concerns.
5. Use at least three (3) quality resources in this
assignment. Note Wikipedia and similar Websites do not qualify as quality
resources.
CIS 500 Assignment 4
Data Mining

Assignment 4 Data
Mining
The development of complex algorithms that can mine mounds
of data that have been collected from people and digital devices have led to
the adoption of data mining by most businesses as a means of understanding
their customers better than before. Data mining takes place in retailing and
sales, banking, education, manufacturing and production, health care,
insurance, broadcasting, marketing, customer services, and a number of other
areas. The analytical information gathered by datamining applications has given
some businesses a competitive advantage, an ability to make informed decisions,
and better ways to predict the behavior of customers.

Write a four to five (45) page paper in which you
1. Determine the benefits of data mining to the businesses
when employing
1. Predictive analytics to understand the behavior of customers
2. Associations discovery in products sold to customers
3. Web mining to discover business intelligence from Web
customers
4. Clustering to find related customer information
2. Assess the reliability of the data mining algorithms.
Decide if they can be trusted and predict the errors they are likely to
produce.
3. Analyze privacy concerns raised by the collection of
personal data for mining purposes.
1. Choose and describe three (3) concerns raised by
consumers.
2. Decide if each of these concerns is valid and explain
your decision for each.
3. Write a page paper – Describe how each concern is being allayed.
CIS 500 Case Study 1
The Big Data Challenges

Case Study 1 The Big Data Challenges
Big Data is a term used to describe the voluminous amount of
structured and semistructured data generated by companies. The term is used
when referring to petabytes (PB), exabytes (EB), and zettabytes (ZB) of data.
Companies face challenges when it comes to capturing, storing, searching, and
analyzing Big Data. The Volvo Car Corporation faced this problem because of the
massive amount of data it was streaming from its vehicles.

Download and study the Volvo Car Corporation case study
titled, “Converting data into business value at Volvo”, located
athttp//www.icio.com/__data/assets/pdf_file/0004/8833/icio_Case_Study_Volvo.pdf.

Write a two to four (24) page paper in which you
1. Judge how Volvo Car Corporation integrated the cloud
infrastructure into its networks.
2. Explain how Volvo Car Corporation transforms data into
knowledge.
3. Identify the realtime information systems implemented and
evaluate the impact of these implementations.
4. Argue how the Big Data strategy gives Volvo Car
Corporation a competitive advantage.
1. Use at least three (3) quality resources in this
assignment. Note Wikipedia and similar Websites do not qualify as quality
resources.

CIS 500 Case Study 2
Cloud Computing
Cloud computing is defined by Cearly and Phifer in their
case study titled “Case Studies in Cloud Computing” as “a style of computing in
which scalable and elastic ITrelated capabilities are provided ‘as a service’
to customers using Internet technologies”. Cloud computing services had been
provided by major vendors such as Google, Amazon, Microsoft, IBM,
HewlettPackard, and others for business computing until recently when Apple
Corporation announced iCloud for consumers. Therefore, cloud computing is now
available for businesses as well as consumers.

Read the case study titled, “Ericsson”, located
athttp//aws.amazon.com/solutions/casestudies/ericsson/, about Ericsson cloud
computing.

Write a two to four (24) page paper in which you
1. Assess how Ericsson benefitted from Amazon Web Services
(AWS) in terms of cost reduction, automated software updates, remote access,
and ondemand availability.
2. Write a word essay – Evaluate the scalability, dependability, manageability,
and adaptability of Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple
Storage Services (Amazon S3), and RightScale.
3. Examine the security concerns for cloudbased services and
make suggestions to cope with these concerns.
4. Assess possible scalability, reliability, and cost issues
associated with cloud computing, and make suggestions to overcome each of these
issues.
1. Use at least three (3) quality resources in this
assignment. Note Wikipedia and similar Websites do not qualify as quality
resources.

Your assignment must follow these formatting requirements
· Be typed, double spaced, using Times New Roman font (size
12), with one inch margins on all sides; citations and references must follow
APA or school specific format. Check with your professor for any additional
instructions.
· Include a cover page containing the title of the
assignment, the student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in the required
assignment page length.

The specific course learning outcomes associated with this
assignment are
· Compare and contrast the strategic and operational use of
data management systems.
· Outline the strategic implications of information
assurance and security in an information technology environment.
· Use technology and information resources to research
issues in information systems and technology.
CIS 500 Term Paper
Mobile Computing and Social Networks

Term Paper Mobile Computing and Social Networks
There are thousands of iPhone Apps, iPad Apps, and Android
Apps that have been developed to perform a myriad of tasks and processes.
Initially, most of these applications were games intended to be played on
mobile devices. The popularity of these applications led businesses to ponder
whether some of their business process applications that run on desktop
platforms and the Web could be redesigned to run on mobile devices. The answer
was a resounding yes!

For example, Nationwide developed the Nationwide® Mobile, a
free iPhone App that allows its insurance policyholders to file a claim on the
spot when an accident occurs. The application can snap pictures of the accident
and attach them to the claim data and upload the claim information to a server.
This reduces the length of time to process a claim filed this way. Nationwide
competitors have followed suit and developed iPhone, iPad, and Android
applications of their own. Policyholders can receive messages via Facebook or
Twitter.
Other business processes that have been reengineered as a
result of mobile computing include Quick Response (QR) codes which have
replaced onedimensional bar codes. They are read using mobile devices,
accepting credit card payments from an iPhone, iPad or Android device,
depositing checks using an iPhone without visiting a bank, and many more.

Write a ten to fifteen (1015) page term paper in which you
1. Assess the effectiveness and efficiency mobilebased
applications provide to capture geolocation data and customer data, and quickly
upload to a processing server without users having to use a desktop system.
2. Write a word essay – Evaluate benefits realized by consumers because of the
ability to gain access to their own data via mobile applications.
3. Examine the challenges of developing applications that
run on mobile devices because of the small screen size.
4. Write a page paper – Describe the methods that can be used to decide which
platform to support, i.e., iPhone, iPad, Windows Phone, or Android.
5. Mobile applications require high availability because end
users need to have continuous access to IT and IS systems. Discuss ways of
providing high availability.
6. Mobile devices are subjected to hacking at a higher rate
than nonmobile devices. Discuss methods of making mobile devices more secure.
7. Use at least three (3) quality resources in this
assignment. Note Wikipedia and similar Websites do not qualify as quality
resources.

Your assignment must follow these formatting requirements
· Be typed, double spaced, using Times New Roman font (size
12), with oneinch margins on all sides; citations and references must follow
APA or schoolspecific format. Check with your professor for any additional
instructions.
· Include a cover page containing the title of the
assignment, the student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in the required
assignment page length.

Published by
Ace Tutors
View all posts