Research on personally identifiable information

Assignment Help Computer Network Security
Reference no: EM13724667

This assignment has two goals:

1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and

2) learn to correctly use the tools and techniques within Word to format a research paper including using Word 2010/2013's citation tools. These skills will be valuable throughout students' academic career. The paper will require a title page, NO abstract, three to four full pages of content with incorporation of a minimum of 3 external resources from credible sources, and a Works Cited/Reference page. Three pages of content means 3 full pages, to the bottom of the third page with text on page 4. Two pages plus several lines on the third page will not suffice. Note that submitting a paper that is less than three pages may affect your grade on several rubric items, including page length and several content items. Given a short, underdeveloped paper's impact on several items in the rubric, a student submitting a paper less than three full pages is unlikely to score higher than a ‘C' on this assignment.

A list of topics from which students can choose is provided below. Wikipedia and similar websites are NOT creditable sources. Blogs and discussion groups are not creditable sources. The course textbook cannot be used as a source for the research paper. No more than 10% of the paper may be in the form of a direct citation from an external source.

Topics for Research Paper

  1. Personally Identifiable Information (PII)
  2. Social Engineering
  3. Employee Monitoring
  4. Information Privacy
  5. Electronic Medical Records
  6. Biometrics (in terms of ethical and privacy issues)
  7. Identity Theft
  8. Use of Cookies
  9. Privacy Laws related to Information Technology use
  10. Intellectual Property Rights; Copyright

Writing Quality for the Research Paper

* All Grammar, Verb Tenses, Pronouns, Spelling, Punctuation, and Writing Competency should be without error.

*Remember: spell-check, then proofread. Better yet, have a friend or colleague read it before submitting it. Read it out loud to yourself.

* Remember: there is not their, your is not you're, its is not it's, too is not to or two, site is not cite, and who should be used after an individual, not that. For example, "the person WHO made the speech" not "the person THAT made the speech."

* In a professional paper one does not use contractions (doesn't, don't, etc.) and one does not use the personal you or your. Use the impersonal as in the previous sentence. It is more business-like than saying, "Also in a professional paper you don't use contractions."

This is not a speech, it is a research paper. First and second person should NOT be used.

Reference no: EM13724667

Questions Cloud

Farkas rights concerning his employment termination : The enforceability of the promise of the $50 bonus and Farkas rights concerning his employment termination.
Determines how the various parts of the distributed system : Compare and contrast at least 3 potential architectures for your system, and then select the one that applies the best to your project. Describe the architecture that is appropriate for your distributed system based on the results of your analysis.
Resource based theory : In the readings for this week we learned that a strategic resource is an asset that is valuable, rare, difficult to imitate, and nonsubstituble. Southwest Airlines was illustrated as a company that demonstrates these characteristics.
Company may provide to the separated employee : 1.Propose three (3) ways that a manager can cope with any negative emotions that may accompany an employee layoff.  2.Describe a step-by-step process of conducting the dismissal meeting.  3.Determine the compensation that the fictitious company may p..
Research on personally identifiable information : Learn to correctly use the tools and techniques within Word to format a research paper including using Word 2010/2013's citation tools. These skills will be valuable throughout students' academic career. The paper will require a title page, NO a..
Develope a strategic plan : Develope a Strategic plan, Make sure you use adequate, credible and reliable APA source citations to support your work.
What issues or questions are at stake in stork article : What issues or questions are at stake in Stork's article? Why are people concerned about Van Eyck's methods? Do their questions and investigations help us understand the Renaissance period better and if so in what ways?
Alignment of business strategy and hrm strategy : A common theme observed in modern organizations today is the poor alignment of business strategy and HRM strategy. Find an article(s) through ProQuest which discusses the benefits of aligning HRM activities with key business initiatives and discus..
Medical supply company uses a cash receipts journal : Medical Supply company uses a cash receipts journal,a cash payments journal, a sales journal,a purchases journal, and a general journal. Which journal should be used to record each of the following transactions?  payment of property taxes  purchas..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Do viruses infect hardware and executable files

Since physical security is often managed under separate responsibility from information security, risk analysis for information security does not need to address physical security.

  Eu data privacy regulations for protection of employee data

How does EU directive on protection of personal data impose requirements on organizations in non-EU countries? How does Kraft comply with EU data privacy regulations governing protection of employee data?

  Cost-of-use issues are of client-dominant local area network

What technology and cost-of-use issues are associated with a client-dominant local area network? Think about what happens as the network grows in size.

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  It infrastructure management assessment item 2enterprise

assessment item 2 ltbrgtenterprise architect3939s bog amp swot analysis ii ltbrgtvalue 35 ltbrgtdue date 04-oct-2014

  Identify a recently announced security vulnerability

Identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies.

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Calculate an rsa signature on a long message

Would it be reasonable to compute an RSA signature on a long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  Show strategies to prevent such cyber warfare attack

Need a 1000 word paper on the various recent/news on the United States (particular the group known as Anonymous and Lulzsec). Also need the various strategies to prevent such cyber warfare attacks and prevention techniques.

  Using the prime p 2621and encryption key e 7 encrypt the

1 using the prime p 2621and encryption key e 7 encrypt the message sweet dreams using modular exponentiation.2 what

  Write a short report documenting the installation

Write a short report documenting the installation even if you don't get the application running

  Traffic padding what is traffic padding and what is its

what is traffic padding and what is its purpose? plz give this que of answer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd