What are privacy laws related to information technology use

Assignment Help Management Information Sys
Reference no: EM131561837

Research Paper Using Word

This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly incorporate citations and references in APA format. Students may use the tools and techniques within Word to format the research paper, including use of the References and citation tools. These skills will be valuable throughout a student's academic career. The paper will require a title page, NO abstract, three to four full pages of content with incorporation of a minimum of 3 external resources from credible sources and a Works Cited/References page. Wikipedia and similar general information sites, blogs or discussion groups are not considered creditable sources for a research project. No more than 10% of the paper may be in the form of a direct citation from an external source.

A list of topics from which students can choose is provided below.

Topics for Research Paper

1. Social Engineering - what it is, how it is used, and potential positive and negative impacts on individuals and on society
2. Employee Monitoring - why and how it is used, the legal issues surrounding its use, and impacts on employer and employee
3. Biometrics - various implementations and the ethical and privacy issues related to the use of biometrics
4. Use of Cookies - what they are, how they are used, and potential positive and negative impacts
5. What are the privacy laws related to Information Technology use and how do they impact you personally?
6. Intellectual Property Rights; issues related to copyright, fair use, copyright infringement, and the potential personal and financial impacts
7. The Edward Snowden case - the dilemma between the "Official Secrets Act" versus a perceived duty to share versus the damage it may do to national security.
8. The Apple vs. FBI controversy over unlocking the iPhone

If there is another topic that addresses ethical issues as related to information technology that is of special interest to you but one that is not in the list above, request permission from your instructor before selecting this alternate topic.

Writing Quality for the Research Paper

* All Grammar, Verb Tenses, Pronouns, Spelling, Punctuation, and Writing Competency should be without error.

* Be particularly careful about mis-matching a noun and pronoun. For example, if you say "A person does this..." then do not use "their" or "they" when referring to that person. "Person" is singular; "their" or "they" is plural.

* Remember: there is not their, your is not you're, its is not it's, too is not to or two,site is not cite, and who should be used after an individual, not that. For example, "the person WHO made the speech" not "the person THAT made the speech."

* In a professional paper one does not use contractions (doesn't, don't, etc.) and one does not use the personal I, you or your. Use the impersonal as in the previous sentence. It is more business-like to say "In a professional paper one should not use contractions," rather than saying, "In a professional paper you don't use contractions."

*Remember: spell-check, then proofread. Better yet, have a friend or colleague read it before submitting it. Read it out loud to yourself. Read it as if you are submitting it to your boss.

Reference no: EM131561837

Questions Cloud

Should the death penalty continue to be used : Given what you've learned in this chapter, should the death penalty continue to be used as a means on punishment?
Describe shortly the disorder and list the main symptoms : Describe shortly the disorder and list the main symptoms. What is thought to be the possible cause of the disorder
What fraction of the large conduit is occupied : The cross section of a large circular conduit has seven smaller equal circular conduits within it. The conduits are tangent to each other as shown in Fig.
What your thoughts regarding the process of enculturation : What are your thoughts regarding the process of enculturation for US children today compared to the enculturation process of children some 40 years ago
What are privacy laws related to information technology use : What are the privacy laws related to Information Technology use and how do they impact you personally? The Apple vs. FBI controversy over unlocking the iPhone.
Review concepts related to threads : To review concepts related to threads. Modify this code so that the method instead waits until it has been notified that a new task has been created.
What is the relationship between thinking and language : What is the relationship between thinking and language? What is the value of thinking in images
Find the area of the window : Find the area of the window outlined by semicircular regions as shown in Fig.
Explain what is the core of ethics according to j rachels : According to the following moral issues- Explain what is the core of ethics according to J. Rachels

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd