Week 10 Assignment – Stakeholder Presentation

Week 10 Assignment – Stakeholder Presentation

Overview

You’ve completed the pilot for the  Section 508-validated application for U.S. Department of Homeland  Security field officers. It’s now time to present your post-pilot report  to stakeholders in order to secure funding. This is your sales pitch to  convince the stakeholders to fund the project for the next five years.  

Instructions

Create a 10-slide PowerPoint  presentation that addresses the following. Each slide should have no  more than 6 bullets; all other context and explanations should be  provided either in the speaker’s notes or in a recording of the  presentation. 

  • Summarize your user applicability and needs proposal. Your summary  should clearly demonstrate that your data-collection plan was directed  toward the appropriate users and was designed to address user needs and  minimize user frustration.
  • Summarize your software development plan to show how you’ve  followed the proper stages for software development, considered all  necessary resources, and allowed for appropriate durations of time.
  • Provide a brief overview of your prototype to clearly demonstrates  you’ve addressed functionality and user needs. Include these features:       
    • Interfaces.
    • Methods for input/output.
    • Supported devices.
    • Processing of user mistakes and errors by the application.
    • Tools to determine programming bugs.
    • Automated tools to validate accessibility.
    • Implementation of application security.
    • User display drawing.
    • System process flow drawing.
  • Describe how your testing plan validates function, usability, accessibility, and security.
  • Recommend that stakeholders fund the project for the next five  years by validating that the specifications for the app were met and  reiterating the benefits of the app.
  • Include no more than 6 bullet points per slide. You may either  write detailed speaker’s notes of what you would say if you were  delivering the presentation live, or you may record the presentation. If  you record the presentation, to ensure professional quality make sure  to rehearse with your slides before you record and adjust your  microphone, so your voice is clear. Also, be sure the link you provide  to your recording is easy for your instructor to access.
  • Write in a manner that is professional and free of grammar, punctuation, and spelling errors.

This course requires the use of Strayer  Writing Standards. For assistance and information, please refer to the  Strayer Writing Standards link in the left-hand menu of your course. The specific course learning outcomes associated with this assignment are: 

  • Determine methods of collecting and analyzing data in interaction design activities.
  • Determine processes of interaction design in the development of an application.
  • Justify design decisions for an application that support  accessibility, usability, and functionality and reduce user frustration.
  • Design testing that evaluates the accessibility, usability, and functionality of an application.

The amount of Data breaches has been on the raise

You must write a report that can be up to 1000 words.

Question:

The amount of Data breaches has been on the raise for the past few years. You task is to identify one biggest/critical data breach (related to any application security) that happened in the last 2 years and prepare a report what was the main theory behind those data breach. Also, suggest better and ethical way of dealing with those breaches. I am interested to know the technical details and in-depth of the data breach. (Try to search and come out with uncommon or innovative examples).

 

 

Reference required.

Chapter 3 – Victims and Victimization Class Discussion/Activity

Chapter 3: Victims and Victimization Class Discussion/Activity

Discuss the question whether victims of assault should receive financial compensation for their pains suffered, including medical bills, psychological counseling, reimbursement for wages, etc. What other costs would you expect if you were assaulted and unable to work for several months? Who should pay for it?

SWK5006 Unit 8 Discussion (dq1+dq2)

Unit8 SWK5006  

SEE THE POLICY CHANGE CYCLE BELOW:

UNIT8 DISC1 (1PAGE)

Contrary Effects Versus Disentitlements

How do contrary effects differ from disentitlements? Use an example of each to illustrate how the two concepts differ. Examine at least two significant differences in your response. Also, explain how these policies disempower or privilege clients. Use this unit’s readings to inform your discussion.

UNIT8DISC2 (1 PAGE)

Coentitlements Versus Duplication

Analyze the differences and similarities inherent in coentitlements and duplication by illustrating a specific hypothetical example of each. Then, choose two examples of policy interactions, one consequence for each for coentitlement and duplication. Explain your answer. Use this unit’s readings and multimedia to inform your discussion.

SWK5006 Unit 6 Discussion (dq1+dq2)

Unit6 SWK5006 

UNIT6DISC1(1 PAGE)

Centralized Versus Decentralized Service Delivery

How does a centralized service delivery model differ from a decentralized service delivery model? Examine three differences in your response, using specific examples. Identify how these differences would affect agency clients. In other words, how do these models each empower or disempower clients? Use this unit’s readings to inform your discussion.

UNIT6DISC2 (1 PAGE)

Integration and Specification

How do the concepts of integration and specification contrast and interact? Provide and explore at least two specific examples. Your analysis should point out how an agency could best try to utilize both concepts.