Understanding of concept of protecting personal information

Assignment Help Basic Computer Science
Reference no: EM13849940

Research Paper Using Word 2010

This assignment has two goals:  1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly use the tools and techniques within Word to format a research paper including using Word 2010/2013's citation tools.  These skills will be valuable throughout students' academic career.  The paper will require a title page, NO abstract, three to four full pages of content with incorporation of a minimum of 3 external resources from credible sources, and a Works Cited/Reference page.  Three pages of content means 3 full pages, to the bottom of the third page with text on page 4.  Two pages plus several lines on the third page will not suffice.  Note that submitting a paper that is less than three pages may affect your grade on several rubric items, including page length and several content items. Given a short, underdeveloped paper's impact on several items in the rubric, a student submitting a paper less than three full pages is unlikely to score higher than a 'C' on this assignment.

A list of topics from which students can choose is provided below.  Wikipedia and similar websites are NOT creditable sources.  Blogs and discussion groups are not creditable sources.  The course textbook cannot be used as a source for the research paper.  No more than 10% of the paper may be in the form of a direct citation from an external source.

Topics for Research Paper

  1. Personally Identifiable Information (PII)
  2. Social Engineering
  3. Employee Monitoring
  4. Information Privacy
  5. Electronic Medical Records
  6. Biometrics (in terms of ethical and privacy issues)
  7. Identity Theft
  8. Use of Cookies
  9. Privacy Laws related to Information Technology use
  10. Intellectual Property Rights; Copyright

Writing Quality for the Research Paper

* All Grammar, Verb Tenses, Pronouns, Spelling, Punctuation, and Writing Competency should be without error.

*Remember: spell-check, then proofread. Better yet, have a friend or colleague read it before submitting it. Read it out loud to yourself.

* Remember: there is not their, your is not you're, itsis not it's, too is not to or two, site is not cite, and who should be used after an individual, not that. For example, "the person WHO made the speech" not "the person THAT made the speech."

*  In a professional paper one does not use contractions (doesn't, don't, etc.) and one does not use the personal you or your. Use the impersonal as in the previous sentence. It is more business-like than saying, "Also in a professional paper you don't use contractions."

This is not a speech, it is a research paper.  First and second person should NOT be used

Reference no: EM13849940

Questions Cloud

How much is in the IRA when Bob retires : Bob makes his first $400 deposit into an IRA earning 8.1% compounded annually on his 24th birthday and his last $400 deposit on his 43rd birthday (20 equal deposits in all). With no additional deposits, the money in the IRA continues to earn 8.1% int..
How much should a customer pay for this annuity : American General offers a 15-year annuity with a guaranteed rate of 9.58% compounded annually. How much should you pay for one of these annuities if you want to receive payments of $2400 annually over the 15 year period? How much should a customer pa..
How each organization promotion fosters social change : Brief description of how each organization's promotion fosters social change. Then, evaluate how each organization's marketing promotion benefits the community and how it benefits the organization
Portfolio manager for mutual fund : You are the portfolio manager for a mutual fund. Your fund has an expected return of 15% with a standard deviation of 24% and the T-bill rate is 3%.
Understanding of concept of protecting personal information : This assignment has two goals:  1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly..
Analyze ebay product or service layout of the company : You will analyze eBay's product or service layout of the company. You will also analyze how the company does capacity planning and forecasting
What services do the hotel provide : What services do the hotel provide? The focus here should be on Service Strategy, culture, and customer relationship management (CRM).
Linear functions have constant rate of change : Linear functions have constant rate of change and exponential functions have constant relative rate of change?
Find the equation that describes her budget line : Consider a consumer who can purchase only two goods, x and y. If this consumer can, given her income, just afford two bundles (x, y) = (12, 6) and (x, y) = (9, 8). If Py =3, find the equation that describes her budget line, Please explain

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Develop an object-oriented design

Identify possible objects in ONE of the following systems and develop an object-oriented design for them. Using a UML class diagram and associated explanation to show your design. You may make many reasonable assumptions about the system when derivin..

  Affecting the field of healthcare technology

Affecting the field of healthcare technology.

  Draw an event-graph of a distributed system

Draw an event-graph of a distributed system of three concurrent processes which are communicating messages, and synchronized by their respective logical clocks

  The importance of it and how it has increased over the years

the importance of IT and how it has increased over the years as more technology enters daily use

  What properties can be added in referential integrity

What properties can be added in referential integrity

  Explaining models in system analysis and design

In System Analysis and Design: Models are widely used in wide variety of technical occupations beyond information technology.

  How the above code actually accomplishes recursion

How does the recursion end - as a concrete example, what happens for ten factorial as the nal returned value is being computed and why does the recursion stop?

  What arguments make for single language for all programming

What arguments can you make FOR the idea of a single language for all programming domains? "For" the idea, not the against!

  Which function is similar to the find and replace feature

Which function is similar to the Find and Replace feature. In Excel, the Compare and Merge command is located on which of the following tabs

  Design a nine-step counter to count

Design a nine-step counter to count in the following sequence using D flip-flops (TTL 7474): 0011, 0101, 1001, 1000, 1011, 1010, 0110, 0100, 0111, 0011, include in the design a means for resetting the counter to 0011.

  Write a module to determine mean of the grades

Write a module to print the student's id, name, and grade for student with highest grade and with lowest grade, respectively.

  Conduct observation used in business or organization

Conduct the observation to someone involved in procedure which is used in a business or organization. This person could be someone at university, in small business in your neighborhood.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd