Writing Question

Module 2 D1: Use of Social Media to Enhance SecurityFor this post, I would like you to provide an example of an instance where social media was used to enhance security –fields such as public health/disease response, disaster response, environmental issues. As an example this document has examples of where social media tags were used to predict floods and track flu and zika outbreaks (DOCUMENT: The Potential of Social Media Intelligence to Improve People’s Lives
Download The Potential of Social Media Intelligence to Improve People’s Lives
). Be sure to reference credible sources of information (media or scholarly journal articles) to support your case that illustrates a positive impact on security by social media.
Please post at least 300 words in response to these questions and include reference to at least one source, using APA, beyond the materials cited in the course.
Module 2 D2: Social Media and Data Science, Artificial Intelligence, and Machine LearningIn the lecture for this week, we began a discussion of key terms related to the data science, artificial intelligence, and machine learning fields, as well as introducing a connection to their application to social media. For this post, please dig a little further into research related to one of these domains (data science, big data, artificial intelligence, machine learning, or deep learning). Find a scholarly journal article on research being done in these fields with a connection to social media.
What did the researchers study?
What were their findings?
Please post at least 300 words in response to these questions and include reference to at least one source, using APA, beyond the materials cited in the course.
Module 3 D1: Sentiment VisualizerTake some time to use the Tweet Sentiment Visualization Tool located at https://www.csc2.ncsu.edu/faculty/healey/tweet_viz/tweet_app/
(Links to an external site.)
Using the tool, select a search term (or terms) of interest and present the results from either the “Sentiment”, “Topics”, Heatmap”, “Tag Cloud”, and/or “Timeline” tabs of the tool. While it will likely help you with the assignment this week to capture something related to a global security issue, you can use any topics such as athletes, celebrities, pop culture, or topics of interest –provided they are suitable for class presentation and discussion.
Please post at least 200 words presenting what you looked at with the sentiment visualizer and your reaction to what was exposed by the tool. Include reference to at least one source, using APA, beyond the materials cited in the course. Please also include an image of your results being discussed! You can capture an image of the results using the Snipping Tool on PCs (go your apps) or Shift Command 5 on a Mac.
Module 3 D2: Facebook Information OperationsFacebook maintains a page dedicated to its efforts to remove influencee operations from its platform. You can read more about their analysis here: https://about.fb.com/wp-content/uploads/2021/05/IO-Threat-Report-May-20-2021.pdf
(Links to an external site.)
For this post, examine one coordinated inauthentic behavior campaign that was removed by Facebook. You can find monthly reports detailing behavior here: https://about.fb.com/news/tag/coordinated-inauthentic-behavior/
(Links to an external site.)
In your post of at least 200 words you should detail, as relevant to your selected topic:
What nations were involved?
What is the historical origin of the tensions between the nations?
What was the campaign attempting to influence (protests, elections,etc.)?
How did the campaign attempt to influence people? Was biases were did the campaign play into?
How many people were potentially influenced?
Provide examples of the messaging.
Please post at least 200 words in response to the prompts, as relevant. Include reference to at least one source, using APA, beyond the materials cited in the course. Please also include an image of the messaging being discussed! You can capture an image of the results using the Snipping Tool on PCs (go your apps) or Shift Command 5 on a Mac
Module 4 D1: Government Control of Social Media and the InternetIn the previous weeks assignments, we have heard about government efforts to control social media. In this week’s module, you read and heard about social media as part of uprisings and revolutionary activity within nations. Some research into government activity indicates increasing instances where governments have taken to control or ban access to social media platforms and/or the Internet overall. Sometimes these outages are limited to specific applications or regions –others are entire bans of access. Take some time to research government activity taken against social media and the Internet, with a focus on bans or outages.
Select an incident that has been covered in the news media.
Describe what happened.
Identify the various groups and government officials involved.
Analyze the key issues or factors leading to the activity.
Please post at least 200 words in response to the prompts, as relevant. Include reference to at least one source, using APA, beyond the materials cited in the course.
Module 5 D1: Cyber Criminal Use of Social MediaBesides information operations, cyber threat actors take advantage of social media in a number of different ways. This can include:
Threat activity targeting social media users
Threat activity facilitated by social media platforms
Threat activity advertised on social media platforms.
Describe an example or case of cyber threat activity that involved a social media platform. Please post at least 200 words in response to the prompt, as relevant. Include reference to at least one source, using APA, beyond the materials cited in the course.

Place this order or similar order and get an amazing discount. USE Discount code “GWEXDDSRGCF10” for 10% discount

This question has been answered by our writers. you can buy the answer below or order your 0% plagiarized answer


Order your 0% plagiarized answer