4 page work mar 22
week-12/Objectives_beeline.html
Bright
Dark
Blues
Grays
Night
By the end of this week, students should be able to:
Describe life cycle methods within Blockchain
Explain how to Blockchain is used in network security
Identify several Blockchain applications
Powered by Beeline Reader
week-12/Reading Assignment_beeline.html
Bright
Dark
Blues
Grays
Night
Alkadi, O., Moustafa, N., & Turnbull, B. (2020). A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions. IEEE Access, Access, IEEE, 8, 104893–104917. https://doi.org/10.1109/ACCESS.2020.2999715
Duran, R. G., Yarleque-Ruesta, D., Belles-Munoz, M., Jimenez-Viguer, A., & Munoz-Tapia, J. L. (2020). An Architecture for Easy Onboarding and Key Life-Cycle Management in Blockchain Applications. IEEE Access, Access, IEEE, 8, 115005–115016. https://doi.org/10.1109/ACCESS.2020.3003995
N. Mohamed and J. Al-Jaroodi, “Applying Blockchain in Industry 4.0 Applications,” 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2019, pp. 0852-0858. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8666558&isnumber=8666184
Powered by Beeline Reader
week-12/Reminder_ Plagiarism_beeline.html
Bright
Dark
Blues
Grays
Night
Students – Plagiarism will continuously be checked even after the term is over. Should plagiarism be confirmed, one of the consequences will apply. This could potentially change your final grade. Yes – your grade can be changed after the term is over!
As a reminder, before completing the final research paper, please review UC’s academic honesty policy again:
Academic Integrity/ Plagiarism (This information is included in all syllabi at University of the Cumberlands)
At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:
Cheating – using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities.
Lying – falsifying, fabricating, or forging information in either written, spoken, or video presentations.
Plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation.
Plagiarism includes copying and pasting material from the Internet into assignments without properly citing the source of the material. Plagiarism can happen by mistake – so you need to be careful!
Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The potential penalty for academic dishonesty includes a failing grade on a particular assignment, a failing grade for the entire course, or charges against the student with the appropriate disciplinary body.
Plagiarism Offense // Consequence:
First Offense // 0 on the assignment
Second Offense // Removal from course = F for course grade
Third Offense // Dismissal from University
Remember – Self-plagiarism is still plagiarism and not allowed – you cannot use previous class work from this or any previous courses whether or not it was originally submitted to University of the Cumberlands. SafeAssign is an international global database.
Powered by Beeline Reader
week-12/research-paper.txt
We have viewed how Blockchain has made a significant impact on businesses and industries. Select one industry and highlight the advancements Blockchain has had on that single industry.
Your paper should meet the following requirements:
Be approximately four pages in length, not including the required cover page and reference page.
Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The University Library is a great place to find resources.
Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
– 4 page work
-APA 7 format mandatory
-scholarly articles citation only
week-12/Week 12 Overview – Application of Blockchain in Industry and Businesses_beeline.html
Bright
Dark
Blues
Grays
Night
Image Source
With blockchain, organizations can turn their business into decentralization platform which can alter how their business works. It changes the individual elements, the flow of transactions, profits, and also ensures growth.
Now the question to ask here is, how exactly can one use the blockchain in their business?
You can store data inside the blockchain which can’t be tampered with.
Many companies have leveraged the blockchain’s transparency to boost the functionality of their supply chains.
Many have integrated the blockchain with artificial intelligence to create their own decentralized AI model.
The blockchain and the decentralized ecosystem, in general, can be incredibly intimidating for a newcomer. The Blockchain-as-a-Service (BaaS) model provides a service where a business’ clients can outsource all the scary backend stuff while focusing only on the frontend. BaaS vendors provide services like user authentication, database management, remote updating, and push notifications (for mobile apps), cloud storage, and hosting.
Google Firebase and Microsoft Azure are examples of BaaS providers.
Please review these additional articles for more information on business use of blockchain technology:
https://www.businessinsider.com/blockchain-technology-applications-use-cases
https://www.forbes.com/sites/forbesagencycouncil/2020/02/04/blockchain-for-business-in-2020-where-do-we-stand/#2ce8de986533
https://businessblockchainhq.com/finance-blockchain-news/success-stories-in-2019-for-blockchain-in-financial-sector/
Powered by Beeline Reader