4 Responses 06/24

Work #1:

Actual work where 2 students given their post on this:

You have been assigned to investigate whether or not an employee at a local hospital has been accessing patient records and selling information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.

Work #2:

Actual work where 2 students given their post on this:

After reviewing this week’s resources, define and discuss the product life cycle and apply this to your redefined or new product or service.  Estimate how much time your product will stay in each phase of the lifecycle and define why you are making this assessment?

Draw a representative graph of your product/service lifecycle.

Note:  Because of the importance of the visual of the graph, no credit will be given to the discussion board assignment if this is missing.

Please find the attachments.

 

Shravya Work:

When a cybercrime crime happens, it is very important for a true cyber professional to undergo through the process of identifying, preserving, analyzing, and presenting digital evidence. This process is called “Digital Forensics”. We come across in our daily lives, people commit the information theft while departing the organizations. It could be stealing the customers information and selling to the competitors from which they can make money, copying the source code in case of IT fields. There are a number of ways to catch the employees who are associated with these kinds of crimes.

In a field like Health, medical, hospitals, the Patient Information is more important like PHR (Personal Health Records). He could sell this information to competitors, online Information brokers, Pharmacies etc…  If the departing employee steals the information digitally, it must be stored somewhere electronically. It could be thumb drives (USB), hard drives, email attachments, usage of cloud space. If the user deletes any information from the hard drive, it could be found in the Recycle bin folder. Computer Forensics must list out this under the checklist.

When suspicions of patient information theft arise, it is crucial to engage a Digital Forensics expert to conduct a theft of IP analysis in order to preserve electronic data and uncover important evidence. With the help of specialized software, the Digital forensics expert can reveal digital footprints such as Files recently opened, Internet Activity, Recently Printed documents. While confirming that a USB device was connected to a computer is significant, it is even more important to know what files were accessed and potentially transferred to the device. The Microsoft Windows operating system creates various artifacts when a user opens a file or folder. It is possible to install the apps on mobiles to go through the office emails and forwarding them to personal emails.

 

References

 

Atlantic Data Forensics, 2019. “How Computer Forensics Can be Used to Investigate Employee Data Theft” Retrieved from ” https://www.atlanticdf.com/blog/2019/01/17/how-digital-forensics-can-be-used-to-investigate-employee-data-theft/ ”

 

Tetra Defense. “FORENSIC CASE FILES: EXONERATING AN EMPLOYEE OF DATA THEFT” Retrieved from “ https://www.tetradefense.com/incident-response-services/forensic-case-files-data-theft/ 

 

Timothy Opsitnick, Joseph Anguilano and Trevor Tucker 2017. “Using Computer Forensics to Investigate Employee Data Theft” Retrieved from “ https://www.tcdi.com/computer-forensics-whitepaper-trevor-tucker-joe-anguilano-tim-opsitnick/ 

 

Rajesh Work:

 

One of the vices of a health provider is to break patient confidentiality. This is where patient’s data should never be disclosed without their consent. This will be any data concerning the patient’s medical history or background. In this case, a hospital worker is under suspicion that he has misused his authority and shared data that concerns patients to outside sources (Ghosh, 2019). To find the truth about the accusations, an investigation has to be done.

The first area to be investigated will be the accused cellphone or computer. From this cellphone or computer, you can find out if any data was shared and to whom it was shared. This will be through accessing who the worker has been communicating with and if any files about the patient’s information have been shared (Ghosh, 2019).  Listening to the worker’s phone calls, checking his emails and text messages should reveal something about the breach.

In the case that the data was not electronically shared, the worker might have set up a way to meet with the second party through a phone call, text message, or social media platforms (Leung, 2019).  This will only prove that the worker has been in contact with the accused recipient of the data, evidence that will support that the accused shared patient’s information must be provided. As the hospital keeps the patient’s information electronically, another source of evidence will be from the records.

The hospital has set up user authentication to protect data from unauthorized persons. Besides, any data that has been shared gets recorded as shared. To prove that this worker accessed the patient’s data and copied it to share with the pharmacy should be provided with hat evidence (Leung, 2019). If his authentication credentials were used to gain access to this system when data was copied or shared into any device will make him guilty.

References

Ghosh, M., Sanadhya, S. K., Singh, M., White, D. R., & Chang, D. (2019). Fbhash: a new similarity hashing scheme for digital forensics.

Leung, W. S., & Blauw, F. F. (2020). An augmented reality approach to delivering a connected digital forensics training experience. In Information Science and Applications (pp. 353-361). Springer, Singapore.

 

 

 

Mukhesh Work:

Companies make money by selling either products or services or both in some cases. Each product or service has various steps from the time of initial idea to the time of public offering, and these steps come under the product life cycle. Every product is different and varies in the time under each phase. The product life cycle usually comes down to 4 phases: development and introduction, growth, maturity, and decline. When a product enters the market, often unbeknownst to the consumer, it has a life cycle that carries it from being new and valuable to eventually being retired out of circulation in the market. This process continually takes products from their beginning introduction stages through their decline and eventual retirement (Sraders, 2019). Nio’s Battery As A Service (BaaS) is in the early stages of its offering. From 2014 when NIO was started, BaaS was always in the plan for the future of the company to separate itself from the competition. Nio is not the first company to try this service. Tesla tested battery replacement in 2013 but was unsuccessful. At the same time, NIO got its timing correct by launching the service after having a considerable number of cars on the road and gaining people’s trust by producing a reliable electric vehicle. As of August 20, NIO has already obtained more than 1,200 patents related to battery swapping, built 143 Power Swap stations nationwide, and completed over 800,000 swaps for users (Nio, 2021).

The below graph shows the estimated product lifecycle of the BaaS.

Y-axis shows the battery swap number in millions.

X-axis shows the phases of the lifecycle with estimated years of each phase.

These estimates are very conservative, based on the EV future and NIO sales estimates. New energy vehicles, including electric cars, will account for 70% of China’s new car sales by 2030, BYD founder Wang Chuanfu said at a conference over the weekend (Cheng, 2021).

 

 

References:

Cheng, E. (2021, June 15). China’s electric car leaders predict new energy vehicles will dominate the local market by 2030. CNBC. https://www.cnbc.com/2021/06/15/chinas-top-ev-car-makers-predict-new-energy-vehicles-will-dominate.html.

Nio. (2021, June 21). NIO Launches Battery as a Service. NIO. https://www.nio.com/news/nio-launches-battery-service.

Sraders, A. (2019, March 4). What Is the Product Life Cycle? Stages and Examples. TheStreet. https://www.thestreet.com/markets/commodities/product-life-cycle-14882534.

 

 

 

 

 

 

 

 

Gowtham Work:

The Product Life Cycle (PLC) is a management tool that allows you to analyze how a product behaves from the time it is developed to the time it is removed from the market, taking into account factors such as its launch, growth, and sales maturity. In some ways, it’s similar to a product journey, or, to use a more well-known example from the marketing world, the customer journey. For product and marketing teams, as well as the rest of the organization, it is critical to have a solid understanding of the product life cycle (Peter & Donnelly, 2019). Team members can use the stages to determine the level of investment that a product should receive, which products in a company’s portfolio should receive the most attention and investment, and which products have the greatest potential for growth in terms of revenue and profit. Product development, sales, marketing, and other teams throughout the organization are all impacted by life cycle management in some way (De Jesus & Fajardo, 2021).

The product life cycle framework assists teams in making difficult decisions about existing products while also fostering the development of new ideas. Microsoft kicks off the support lifecycle as soon as the product is released. The Lifecycle Start Date is a celebration, often for the press. Enterprises today begin scrutinizing the new release, attempting to determine if it is suitable for the organization (Peter & Donnelly, 2019). Most companies wait for Service Pack 1 or 2 before attempting a jump. Mainstream Support begins once the ticker-tape parade has ended and the product has left the lot, and the first diaper is changed. During Mainstream Support, customers can expect full support, including paid support (per incident, per hour), security updates, and non-security hotfixes (Dieterle & Viere, 2021).

Appears to be the end of life for a Microsoft product. The period. On this day, Microsoft will begin saying its goodbyes—or, at least, it hopes it can. However, Microsoft knows its customers. Microsoft understands that many companies use Microsoft products long past the end-of-life date, and this may take some time to do. To ensure customers have support for expired products, Microsoft extends support. During this time, support is decreased However, there are a limited number of support options available. Microsoft announces a hard deadline for ending support for a product. This is the final and terminal date for the product, where customers are expected to be migrated to a newer product (He & Yu, 2021).

I am making this assessment to understand the life cycle phases of the Microsoft products as they are being widely used by people in their daily lives. The customers are dependent on the services of the company and ensures that their productivity is maintained by using its tools and techniques. Microsoft saves a lot of time of the customers by offering various solutions that can be easily applied to daily lives. This assessment reflects that Microsoft have been maintaining its products in the market at the maturing phase and there are products that reach the declination phase but an option is always ready with the company to meet the customer requirements.

References

De Jesus, F. S., & Fajardo, L. M. L. (2021). The Product Life Cycle of Milk Tea: An Assessment. Interdisciplinary Journal of Applied and Basic Subjects1(2), 76-87.

Dieterle, M., & Viere, T. (2021). Bridging product life cycle gaps in LCA & LCC towards a circular economy. Procedia CIRP98, 354-357.

He, B., & Yu, Q. (2021). Product sustainable design for carbon footprint during product life cycle. Journal of Engineering Design, 1-18.

Peter, J. P., & Donnelly, Jr., J. H. (2019). A preface to marketing management (15th ed.). Columbus, OH: Irwin/McGraw-Hill.

 

 

 

 

 

 

 

 

NIO BaaS

Series 1

Introduction 2014-2020 Growth 2020-2035 Maturity 2035-2045 Decline 2040- 0 0.8 5 7 5 Column1

Introduction 2014-2020 Growth 2020-2035 Maturity 2035-2045 Decline 2040-

Year

 

 

Battery Swaps in Millions

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)