Analyze personal privacy issues relate to cybersecurity

Assignment Help Management Information Sys
Reference no: EM131454588

Assignment: New Privacy Issues Related to Cyberspace

Objective: Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios.

Competencies: Critical thinking, communication skills

Select three organizations within the same industry for analysis --

1. Students should pick one industry from the displayed list below, and within that single industry, name 3 organizations for analysis.

2. Describe the mission of each (from their website), and examine and compare details of each stated privacy policy, then

3. For each organization, recommend policy changes that will enable each organization to (a) use sensitive customer information to increase business advantage and profitability, and (b) also protect customer personal information to avoid possible privacy or liability issues.

You may need to use trade journals and newspaper stories in your reference list. However, try to avoid opinion pieces (like blogs) that may not be factual. You may state your own opinions, but these must be strengthened by scholarly references.

Length 5-7 pages, due at the end of Week 10.

Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

Papers must include: cover page, table of contents, introduction, section headings and subheadings, conclusions, APA compliant in-text citations and list of references, and page numbers. The page count begins with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the document), then the outline should be used to create the Table of Contents and the document sub-headings. The Introduction should briefly preview each sub-heading in the document.

Industry

Organizations

Social Media

LinkedIn, Google+, Facebook, Twitter

Mobile Phone

Verizon Wireless, Cricket, AT&T Wireless, Metro PCS

Antivirus Software

AntiVirus Grisoft, Norton, McAfee, Microsoft, Kaspersky, Avast

eCommerce

eBay, Amazon, Craigslist, TigerDirect

Telecommunications

AT&T, Verizon, Sprint

Big Box

Walmart, Target, Costco, Sears

Streaming Media

Netflix, Blockbuster, Walmart (VUDU), Xbox

Search Engines

Google, Yahoo, Bing

Insurance Companies

Farmers Insurance Group, Monumental Life Insurance, Metropolitan Life Insurance

 Fast Food

McDonald's, Wendy's, Burger King

Online Higher Education

Drexel University Online, University of Maryland University College, Penn State World Campus, Coursera

 Media

The Washington Post, The New York Times, CBS News, ESPN.com

 Banks

Bank of America, JP Morgan Chase, Citigroup, Wells Fargo, SunTrust, a credit union

 Job Search Sites

USAjobs.gov, Monster.com, Indeed.com, Careerbuilder.com, Simplyhired.com

Grocery Stores

Safeway, Giant, Whole Foods, Kroger

 

 

Reference no: EM131454588

Questions Cloud

Necessary to discount goods that are inelastic : Why is it not necessary to discount goods that are inelastic?
Whats been done to authenticate users and to insure privacy : What are the issues for e-Government websites such as "Where's My Refund?" What's been done to authenticate users, and to insure privacy?
Find and explain the use of five different fallacies : Consider how you encounter fallacies on a regular basis. As you are listening to others speak, for instance, pay attention to see if any of the fallacies are be
Write a persuasive essay that urges readers : Write a persuasive essay that urges readers to accept your viewpoint on an issue and to take action on that issue - A thesis statement that clearly states your
Analyze personal privacy issues relate to cybersecurity : Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios. Compare details of each stated privacy policy.
What is the highest price per share : The Dow Jones Industrial Average (DMA) underwent one of its infrequent reshufflings of companies when General Motors and Citigroup.
Consider the advantages and disadvantages of erp : Based on what you've studied, do you think that installing an ERP system would be worth it, even at a cost of, say $100 million (for a fairly large firm)?
Research tradittonal healers services - germany : HSHA 4What is the traditional healer service you have chosen to describe and wh practiced-Are individuals formally trained and/or licensed/certified to practice
What might be some pitfalls to applying this concept : Since risk cannot be reduced to zero, the ALARP concept is often applied. What might be some pitfalls to applying this concept

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are some likely future uses and enhancements

What are some likely future uses and enhancements

  Describe home based cake decoration business.

Expenditure and Production Cycles - It explains Home Based Cake Decoration business. The sources used are also included in the solution.

  Business requirements drove the system''s initial development

Discuss how the business requirements drove the system's initial development.

  Methods of information systems conversion

Implementation Methods of Information Systems Conversion - Describe the four implementation methods (parallel, plunge, pilot, & phased) of information system conversions.

  What are the competitive advantages built

What are the competitive advantages built into the you? Imagine you are producing/developing yourself as product, link it to you core competencies:

  Have organizations prepared for the baby boomer exodusshow

have organizations prepared for the baby boomer exodus?show knowledge and information that might be lost to

  Minis sales department use crm technologyhow can minis

minis sales department use crm technologyhow can minis sales department use crm technology to improve the

  Identify the motivation for potential attacks

Research and classify common weaknesses and attacks associated with e-commerce and social networking applications. Identify the motivation for potential attacks. Identify the roles such as system administrator, developer, security engineer, and qual..

  Step-by-step answer to information systemsfinancial

step-by-step answer to information systemsfinancial information systems can serve many functions in a business.how

  Swot analysis of a large technology company

Look at your organization (or one similar to it) and perform a SWOT analysis. For any reason you cannot use your organization, do a SWOT analysis of a large technology company such as Google, Microsoft, Oracle, Cisco and Apple. C

  Define self-concept self-image and self-esteem

Define self-concept, self-image, and self-esteem. Write at least two sentences on each term. Provide an example of how your self-concept, self-image, or self-esteem has affected your interpersonal communication.

  How different would the situations be without databases

Suggest areas that currently do not use databases but can benefit from their use. What forms the basis of this suggestion? How do you think the implementation of databases will affect the current scenario in these areas?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd