This is a subjective question, hence you have to write your answer in the Text-Field given below. n the current generation of digital revolution, securing information from unauthorized access is a daunting task. Proliferation of internet connectivity has opened doors for numerous security threats to information technology. Much vital personal information is contained on many social media platforms such as Twitter, YouTube, WhatsApp, or Facebook. You are part of a data science team in an organization and you are currently working on a project that has leveloped a model to identify anomalies in the system access patterns (intrusion). The model is ready and tested thoroughly using test data. You think you are ready for presenting it to business team. You need to help make sense of the data output by putting it in the right context. You are tasked with articulating the business problem and showcasing the results using compelling stories. Based on the discussions we had in the class, identify the role are wou playing here? Describe the role and explain the responsibilities and skills required for this role.

Fundamentals of Information Systems
9th Edition
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter10: Ethical, Legal, And Social Issues Of Information Systems
Section: Chapter Questions
Problem 2CE
icon
Related questions
Question
Question No: 03
This is a subjective question, hence you have to write your answer in the Text-Field given below.
In the current generation of digital revolution, securing information from unauthorized access is a daunting task. Proliferation of internet connectivity has
opened doors for numerous security threats to information technology. Much vital personal information is contained on many social media platforms such
as Twitter, YouTube, WhatsApp, or Facebook. You are part of a data science team in an organization and you are currently working on a project that has
developed a model to identify anomalies in the system access patterns (intrusion). The model is ready and tested thoroughly using test data. You think you
are ready for presenting it to business team. You need to help make sense of the data output by putting it in the right context. You are tasked with
articulating the business problem and showcasing the results using compelling stories. Based on the discussions we had in the class, identify the role are
you playing here? Describe the role and explain the responsibilities and skills required for this role.
Transcribed Image Text:Question No: 03 This is a subjective question, hence you have to write your answer in the Text-Field given below. In the current generation of digital revolution, securing information from unauthorized access is a daunting task. Proliferation of internet connectivity has opened doors for numerous security threats to information technology. Much vital personal information is contained on many social media platforms such as Twitter, YouTube, WhatsApp, or Facebook. You are part of a data science team in an organization and you are currently working on a project that has developed a model to identify anomalies in the system access patterns (intrusion). The model is ready and tested thoroughly using test data. You think you are ready for presenting it to business team. You need to help make sense of the data output by putting it in the right context. You are tasked with articulating the business problem and showcasing the results using compelling stories. Based on the discussions we had in the class, identify the role are you playing here? Describe the role and explain the responsibilities and skills required for this role.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Fundamentals of Managing data
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
MIS
MIS
Computer Science
ISBN:
9781337681919
Author:
BIDGOLI
Publisher:
Cengage
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781305971776
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781285196145
Author:
Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos Coronel
Publisher:
Cengage Learning
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781305627482
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning