The concept of protecting personal information

Assignment Help Basic Computer Science
Reference no: EM13910329

This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly use the tools and techniques within Word to format a research paper including using Word's citation tools. These skills will be valuable throughout students' academic career. The paper will require a title page, 2-3 pages of content with incorporation of a minimum of 3 external resources from credible sources, and a Works Cited/Reference page. A list of topics from which students can choose is provided below.

Topic for Research Paper

Identity Theft

RequirementPoints AllocatedComments

Paper should be double-spaced, 1" margins, 12 point Times Roman type0.5This is the font in normal paragraphs. Heading and title fonts may be a larger size.

Deliverable does not exceed 3 typed, double-spaced0.5Charts and other graphical information are not included in the page count. Title and reference pages are not included in page count.

Title Page which shows title and author's (student's) name.0.5Title must be appropriate for content

At least three (3) APA formatted in-text citations.

You are required to use the References feature in Word for your citations and Reference List. It is important to review the final format for APA-style correctness even if generated by Word.0.5These can be anywhere in the document, but the citations must be relevant to what is being referenced and use the APA format.

At least two (2) informational footnotes.

(Note: APA Style does not use footnotes for citations; however, does allow for the incorporation of informational footnotes)0.5These can be anywhere in the document, but the informational footnotes must be relevant to the associated text. The purpose of this requirement is to effectively incorporate the information and demonstrate that you can use the MS Word footnoting functionality.

Reference Page using APA format for references

You are required to use the References feature in Word for your citations and Reference List. It is important to review the final format for APA-style correctness even if generated by Word..5All works listed must be incorporated within the writing of your paper as specified in APA style

Describe the topic and ethical issue as it relates to the use of Information Technology 2

Discuss the trends, ways individuals and/or organizations are impacted by the issue or working to prevent the impact.2

Paper must be well-organized, clearly written in a style appropriate for college level work. 1

Paper should be grammatically correct and contain no spelling errors. 2Although you should use the SpellCheck and Grammar Check function in Word, this will not catch all errors - you are ultimately responsible for proofreading.

Reference no: EM13910329

Questions Cloud

Please provide me with the solution to the tim toyne solutio : Please provide me with the solution to the Tim Toyne solution
Distinguish between engineering : Question A:Distinguish between engineering and public approach to defining acceptable risk?
Discuss how the use of standards such as variable naming : Discuss how the use of standards such as variable naming, the use of class diagrams, and good programming practices all contribute to both rapid program development and increased ease of maintenance
What other measures do you feel should be taken : How effective do you feel these and other measures are in protecting children from sexual predators online? What other measures do you feel should be taken? Are current laws sufficient for protecting children, or are additional laws needed?
The concept of protecting personal information : This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly use..
Identify the different collision and broadcast domains : Write a 700-word paper and a 1-page network diagram based on your Week Two Learning Team Collaborative discussion.Identify the different collision and broadcast domains on your network diagram. In your diagram, draw a green circle around each collisi..
Are there third party beneficiaries involved in contract : Create a scenario in which this contract would be used. Name the parties involved and give background information as to why this particular contract is being used. Are there third party beneficiaries involved in this contract? Who are they, and wh..
Cash flows and ifrs rules : Prepare Cannon Company's statement of cash flows for the year ending December 31, 2015 using the indirect method.Explain how the indirect statement of cash flows that you prepared would differ under IFRS rules. Assume this is a non financial entity.
Discuss some ethical issues faced in engineering design : Discuss some ethical issues faced in engineering design

Reviews

Write a Review

Basic Computer Science Questions & Answers

  About specialized functions

Specialized Functions

  Difference between cyber crimes and cyber-related crimes.

Summarize the difference between cyber crimes and cyber-related crimes. On cyber crimes, define cyber trespass, cyber privacy and cyber vandalism. On cyber-related crimes explain the difference between cyber-assisted and cyber-enhanced crimes.

  Application that would have a very low cache

Can you think of an application that would have a very low cache and main memory hit rate and give an example of a very simple program whose data references demonstrate locality of reference?

  Create an annotated bibliography

For the course project, you will create an annotated bibliography of five sources that cites and describes four of the best Internet resources on a specified topic and one of the best library database resources.

  Show the ieee 754 bit pattern

Show the IEEE 754 bit pattern for the subsequent numbers (assume excess 127):

  Access and control of personal information

In debates regarding access and control of personal information, it is sometimes argued that an appropriate balance needs to be struck between individuals and organizations

  Briefly define each area of your web site plan

Using the scenario of the Adventure Travel Club found in the lecture, briefly define each area of your web site plan, Target Audience, Flowchart, and Storyboard.

  Use css comments to document the css program

Create a css file named style.css to format index.htm and provide a basic layout. Use css comments to document the css program.

  Tandem centre spool configuration is used in hydraulic

Name a few typical applications in which Tandem centre spool configuration is used in hydraulic system.

  Design an enhanced entity relationship

Develop, document and design an Enhanced Entity Relationship (EER) model for this situation.  You are working for country club with thousands of members. You have been tasked with designing a database to keep track of the members and their guests.

  What would be the limitations of this approach

What is the danger of not having a strategic intent? In your answer, assume you are a hospital in a city with a population of 30,000 people, located about 50 miles away from a large city.

  What are the estimated cell yield coefficients based

The composition of the off-gas on a volumetric basis is listed below. What are the estimated cell yield coefficients based on ammonia and oxygen for the consumption of glucose? 4.7 PROBLEMS 115 Substrate % nitrogen % carbon dioxide % oxygen glucos..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd