Reference no: EM131041135
ASSIGNMENT TOPICS FOR HONG KONG
1. Information privacy. What is it? What is the development of privacy legislations in Australia (or Hong Kong)? How successful are those legislations in protecting individuals' privacy? Use specific examples to explain.
2. Business continuity plan. Develop a business continuity plan for Curtin University in case of a terrorist attack. You can focus on a specific aspect of the plan but you need to give specific recommendations relevant to Curtin.
3. Social Engineering. What is it? How common is it? How can individuals protect themselves from social engineering? Give some examples by way of demonstration.
4. Insurance fraud. The collapse of HIH was the biggest insurance fraud case in Australia. Explain how the fraud was committed and eventually revealed. What could have been done to prevent such fraud from happening?
5. Threats and controls in the revenue cycle. Imagine you are the CEO of a company that sells stationery to businesses. You are thinking of setting up a website to sell products on the Internet. Compare the potential threats to the revenue cycle before and after the use of a website. Would the control measures be different after the use of a website?
1 student: 5 minutes
What is expected?
A speech in your own words in 5 minutues for one topic with some pictures supporting the topic
- You need to address your topic
- If your topic is too big then you may do one aspect of the topic
- You are expected to demonstrate communication skills
- include text such as titles
- should include
- An introduction
- A discussion
- A conclusion or summation
- List of references (as well as a hardcopy handed in)
Introduction
a. Introduce each group member (Please ignore it)
b. State your topic
c. Outline the structure of your talk & who will do what
2. Discussion
a. Address your topic
b. Be selective - you can chose part of the topic to address
c. The right amount of detail is what will fit in the time you have
d. Look at the marking guide - addressing your topic is only part of the marks
3. Conclusion
a. Sum up the key points of your talk
b. Say "goodbye"
4. References
a. Using material without acknowledgment (referencing) is plagiarism (cheating), using other people's material and referencing (saying where you got it) is good research! You must also hand in a hard copy of your list of references (1 list per group).
Presentation
- Logical structure of presentation (Introduction, discussion,
conclusion)
- Smooth transition between speakers/ segments
Content
- Identified key issues of topic
- Discussed key issues
- Clear & supported conclusion/ summation
- Logical structure of discussion
Video techniques
- Use of text
- Use of editing techniques
- Inclusion of supporting material (e.g. diagrams, tables, role plays,
documents)
- Sound used to good effect
Research
- Topic was well researched
- Complete list of references
Creativity (Bonus marks - Note: total marks cannot exceed 100)
- The video is creative and has ‘wow' moments
Timing (Penalty)
- All students speak/present for the same length of time in the video
- Length of video - time limit (exceeded or not)
Please pass the plagiarism check and send the complete assignment. Speech includes questions and answers to attract audience. This is Accounting System, university assignment.
No Of Pages/Words : words for speech in 5 mins
Write equations for simple chemical tests
: Write equations for simple chemical tests that would distinguish between (a) Benzylamine and... Benzene x 1346 Aniline x 237
|
Disappear in computer based purchasing systems
: Why do the inventory control and general ledger departments seem to disappear in computer based purchasing systems? Describe whether these functions are no longer important enough to have their own departments
|
Determine whether each of the statements is true or false
: When a molecule has two, degenerate, "infrared active", vibrational modes, the two vibrational modes will show absorptions at different frequencies in the infrared spectrum.
|
Privacy rights of the teachers violated
: When a teacher discovered the cameras, he sued. In 600 words, were the privacy rights of the teachers violated? (Helisek v. Dearborn Public Schools, 2008 U.S. Dist. LEXIS 25514 [E.D. Mich.])
|
What is the development of privacy legislations in australia
: What is the development of privacy legislations in Australia (or Hong Kong)? How successful are those legislations in protecting individuals' privacy? Use specific examples to explain.
|
Entire production at the prevailing market price
: Hogan Farms produced 1,600,000 pounds of cotton during the 2015 season. Hogan sells all of its cotton to Ott Co., which has agreed to purchase Hogan's entire production at the prevailing market price. Recent legislation assures that the market pri..
|
Effective control systems
: Successful control systems are effective in ensuring good performance within the organization. They have a lot of control within the organization and have a lot of emphasis on approach within the organization and a number of choices that the organ..
|
Three statements of key knowledge
: Please share with the rest of the class at least three statements of key knowledge gained in this course and provide a concrete example of how you think the knowledge will assist you in your work career.
|
Compute budgeted indirect-cost rates
: Give two reasons why most organisations use an annual period rather than a weekly or monthly period to compute budgeted indirect-cost rates?
|