Strayer library to research articles on ethical issues

Assignment Help Basic Computer Science
Reference no: EM13766209

You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you.

Write a two to three (2-3) page research paper in which you:

1. Summarize the issue that you have chosen.
2. Express your own opinion of, or position on, the issue that you have chosen.
3. Identify two to three (2-3) human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.
4. Identify at least three (3) problems related to management information systems that may arise from the issue that you have chosen. Next, propose at least one (1) solution to address each problem in question. Provide a rationale to support your response.
5. Use at least three (3) quality references. Note: Wikipedia and other Websites do not quality as academic resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
• Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Describe how and why information systems are used today.
• Evaluate the ethical concerns that information systems raise in society, and the impact of information systems on crime, terrorism, or war.
• Explain how to secure information systems resources that focus on both human and technological safeguards.
• Identify how to mitigate risks as well as plan for and recover from disasters.
• Use technology and information resources to research issues in information systems.
• Write clearly and concisely about management information systems using proper writing mechanics.

Reference no: EM13766209

Questions Cloud

Reinforce argument that the financial markets are efficient : Which of the following tend to reinforce the argument that the financial markets are efficient?
Statements is correct concerning market efficiency : Which one of the following statements is correct concerning market efficiency?
Given the vast resources available to mutual fund managers : Given the vast resources available to mutual fund managers, these managers on average have generally:
What are the power bases both coaches rely upon : What are the power bases both coaches rely upon? Whose actions are more aligned with a managerial role and whose actions are more aligned with a leadership role?
Strayer library to research articles on ethical issues : You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you.
Where information about nuts and seeds is being presented : how and where information about nuts and seeds is being presented to consumers. For this Assignment identify, describe, and evaluate four avenues through which information is presented to consumers.
Explain how you would rebut these arguments : In many organizations, being "people-centered" is considered soft, irrelevant, and unrelated to profitability. Using support from historical perspectives of organizational behavior, explain how you would rebut these arguments.
Programing of tree java : The listing of Tree.java is supplied below as a starting point for this lab. A picture of Tree.java output is also shown. Either cut/paste the code or type it in. Run the program to verify that it works. Study the listing until you understand comp..
Describe two color paintings by different artists : Describe two color paintings by different artists (selected from the list or sources in the Explore section below) that you believe represent the following quote by Kandinsky on the subject of color in art.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write lines of code as instructed in steps

Write lines of code as instructed in Steps

  Describes how you have used abstraction as a strategy

Give an example that describes how you have used abstraction as a strategy and how it was beneficial to you.

  Actions-hard disk crash and all data backed up are lost

You come to work on a Monday morning and find that the office computer is not working. The system manager informs everyone that the computer's hard disk crashed and that all datat that wer not backed up are lost. What do you do?

  Describe how to develop users for sales organization unit

Describe how you would develop users for sales organization unit and how you can set up work groups in this particular situation.

  Using strategies that guide readers

Using Strategies That Guide Readers Write a Comparison/Contrast Essay. Prompt: At the bottom of page 443, in the paragraph "Writing about Comparisons and Contrasts" read the writing prompt of thesecond bullet point: "In an email to a friend, you mig..

  Netstack college has received a grant to wire all

Netstack College has received a grant to wire all of its six buildings for 10/100 Ethernet. Four of the buildings contain classrooms and laboratories and will need to support 250 network connections each. One building is for administration and ..

  Jewelers company might derive from a new system

Suggest at least five (5) expected business benefits that Especially for You Jewelers company might derive from a new system. Provide a rationale for your suggestions.

  What are the shortcomings and limitations

Assume you have decided to implement DFS so remote sites can access files and folders. What are the requirements for DFS? What are benefits of using DFS? What are the shortcomings and limitations?

  Why is security of operation useful

1. Why is security of operation useful to overall information assurance

  Two problems in lisp

1. Define a function foo(A,L), where A is an integer and L is a list that will remove each A in L. This is a shallow function.

  Program specifications for a simple business problem

Given a set of program specifications for a simple business problem requiring iteration, code and test a program that meets the specifications and employs best programming practices.

  Discuss reasons and methods for accessing a remote computer

Discuss the reasons and methods for accessing a remote computer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd