How you would handle the situations with integrity

Assignment Help Management Information Sys
Reference no: EM131132331

What Happens in IT

Directions: You are an IT professional at work (wherever you currently work or where you would like to work after graduation). In this capacity you routinely work with these issues. One of the characteristics of an ethical person is integrity. Research cybercrime, workplace privacy, and free speech on social media, and create a presentation that addresses how you would (will) handle these situations with integrity; meaning how should you act that demonstrates respect for your employer (chain of command, liability, IP, profit/loss), co-workers, and if applicable, outside contacts.

The presentation must have at least 12 slides (not including the reference list slides). You are required to use at least three credible sources for this project and have a reference list slide. Submit a transcript for the project as well as the PowerPoint Presentation.

Use the following as a guide in preparing your presentation:

• Cybercrime:

o Inside threats

- Disgruntled employees
- End user errors
- Social engineering

o Outside threats
o E-Discovery

• Privacy in the workplace,

o Monitoring
o Web content filtering
o Personal device usage

• Free speech on social media sites. When does it affect the business?

o Corporate information
o Hate speech
o Illegal behavior.

Reference no: EM131132331

Questions Cloud

Outbreak of a major war : Discuss how the international system at the turn of the 20th century was poised for the outbreak of a major war. What if naything could be done to prevent the conflict?
Discuss bismarkian system that ensured peace in europe : Discuss Bismarkian system that ensured peace in Europe after unification of Germany. What were its basic principles and flaws? Was it the right decision to dismiss the system after Bismark's retirement?
What was the cause fo the 1848 revolution in france : What was the cause and outcome fo the 1848 Revolution in France? How and why was it defeated? Describe Louis Napoleon Bonaparte as a politician. How do you explain the concept of Bonapartism in politics?
What is the amount of goodwill resulting from the business : On April 1, 20X1, it was determined that the inventory of Simon had a fair value of $190,000, and the property and equipment (net) had a fair value of $560,000. What is the amount of goodwill resulting from the business combination?
How you would handle the situations with integrity : Research cybercrime, workplace privacy, and free speech on social media, and create a presentation that addresses how you would (will) handle these situations with integrity.
Discuss the tenets of the treaty of versaille : Discuss the tenets of the Treaty of Versaille and how they failed to bring lasting peace to Europe and the world? Why did German people reject the Peace Treaty and proceed with building popular resistance that led to the rise of Nazis?
Practice of indulgences by the roman catholic church : What was the theological belief that helped develop Martin Luther's main objection to the practice of indulgences by the Roman Catholic Church?
How to obtain the confidence interval : Suppose you obtain α^ and Var^(α^). Describe how to obtain the confidence interval at the 90% confidence level for α
What was the immediate action taken by charles : What was the immediate action taken by Charles I of England that provoked the English Parliament into passing the Petition of Right in 1628?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Electronic health records

You are a primary care physican in alarge group practice that uses and an electronic health records.(EHR).At the beginning of each visit you view a dashboard to preventive care measures-likeflu vaccine,colon cancer screening, cholesterol tests,-th..

  Best ways to protect against failure

Just looking for a paragraph or two for each question to get a discussion going: 1) What do you think are the best ways to protect against failure when building systems?

  Identify multiple business pressures on xerox

Describe some of the company's response strategies. Identify the role of IT as a contributor to the business technology pressures (for example, obsolescence).

  Create a class for shutterbug camera store

Create a class for Shutterbug's Camera Store, which is having a digital camera sale. The class is named DigitalCamera. and it contains data fields for a brand, the number of megapixels in the resolution and price. Include a constructor that takes ..

  Intelligent information technology it defensecurrent

intelligent information technology it defensecurrent techniques to provide digital security are executed with a

  Analyze different approache to creation of literature review

Apply the critical concepts and principles of applied business research. Define key research terms in complete sentences of no more than 25 words.

  Use of analytics and cloud technology within this company

Support the need for the use of analytics and cloud technology within this company. Create a workflow diagram to illustrate how analytics and cloud technology could align with the company's business processes

  Write about categories of sercives that require cryptography

Create a fake business that does e-business and write about its main offerings and services. Write about the categories of information/ or sercives that will require cryptography applications.

  Test case creation

Using the following pseudocode, provide 3 unique test cases that would help validate your algorithm. Be sure to place the test cases in table showing the input values, and expected output for each test case. You must validate your code using ideate.c..

  Explain how this impacted other levels of the organization

Explain how this impacted other levels of the organization and Identify the level of the organization where the misuse primarily occurred

  Step-wise answer to business analysisyou are a supervisor

step-wise answer to business analysisyou are a supervisor of accounts payable. the it folks have been working withone

  Develop a secure application development procedure

In 2-3 pages, develop a Secure Application Development Procedure which addresses each of the OWASP Top Ten Vulnerabilities. Make sure to address the following:Software Development Processes Secure Coding Techniques

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd