What social engineering is and how it is used

Assignment Help Computer Engineering
Reference no: EM131482896

Research Paper Using Word

This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly incorporate citations and references in APA format. Students may use the tools and techniques within Word to format the research paper, including use of the References and citation tools.These skills will be valuable throughout a student's academic career. The paper will require a title page, NO abstract, three to four full pages of content with incorporation of a minimum of 3 external resources from credible sourcesand a Works Cited/References page. Wikipedia and similar general information sites, blogsor discussion groups are not considered creditable sources for a research project. No more than 10% of the paper may be in the form of a direct citation from an external source.

A list of topics from which students can choose is provided below.

Topics for Research Paper

1. Social Engineering - what it is, how it is used, and potential positive and negative impacts on individuals and on society

2. Employee Monitoring - why and how it is used, the legal issues surrounding its use, and impacts on employer and employee

3. Biometrics - various implementations and the ethical and privacy issues related to the use of biometrics

4. Use of Cookies - what they are, how they are used, and potential positive and negative impacts

5. What are the privacy laws related to Information Technology use and how do they impact you personally?

6. Intellectual Property Rights; issues related to copyright, fair use, copyright infringement, and the potential personal and financial impacts

7. The Edward Snowden case - the dilemma between the "Official Secrets Act" versus a perceived duty to share versus the damage it may do to national security.

8. The Apple vs. FBI controversy over unlocking the iPhone

If there is another topic that addresses ethical issues as related to information technology that is of special interest to you but one that is not in the list above, request permission from your instructor before selecting this alternate topic.

Writing Quality for the Research Paper

* All Grammar, Verb Tenses, Pronouns, Spelling, Punctuation, and Writing Competency should be without error.

* Be particularly careful about mis-matching a noun and pronoun. For example, if you say "A person does this..." then do not use "their" or "they" when referring to that person. "Person" is singular; "their" or "they" is plural.

* Remember: there is not their, your is not you're, itsis not it's, too is not to or two, site is not cite, and who should be used after an individual, not that. For example, "the person WHO made the speech" not "the person THAT made the speech."

* In a professional paper one does not use contractions (doesn't, don't, etc.) and one does not use the personal I,you or your. Use the impersonal as in the previous sentence. It is more business-like to say "In a professional paper one should not use contractions," rather than saying, "In a professional paper you don't use contractions."

*Remember: spell-check, then proofread. Better yet, have a friend or colleague read it before submitting it. Read it out loud to yourself. Read it as if you are submitting it to your boss.

You can find instructions on how to use the References tool in Word on a PC or on a Mac in the separate file attached here.

Complete rubrics for this paper are found in the table on the next page.

Reference no: EM131482896

Questions Cloud

What will happen to the price of premium coffee : Assume initially that the demand and supply for premium coffees (one-pound bags) are in equilibrium. Now assume Starbucks introduces the world to premium.
What are the drawbacks of a page fault : How does virtual memory extend the memory available to applications? What are the drawbacks of a page fault when a virtual memory page is not resident?
Vba coding assignment : Write a Monte Carlo estimator for the WACC rate. You will use a Sub() instead of a Function() for this step.
What is the likely impact of these two events on food prices : In late 2006 and early 2007, orange crops in Florida were smaller than expected, and the crop in California was put in a deep freeze by an Arctic cold front.
What social engineering is and how it is used : Research Paper- What Social Engineering is, how it is used, and potential positive and negative impacts on individuals and on society?
Introduce the conceptual frameworks of the ethical construct : Analyze the moral, ethical, and legal implications utilized in this situation. Describe your role as a moral agent or advocate for this specific issue.
Do you consider microsoft to be an entrepreneurial company : Business corporations are a basic form of entrepreneurship. When you think of a corporation, do you think of a big bureaucratic organization or a nimble.
Determine two specific ethical issues : Analyze the concepts of professional and applied ethics and determine whether GE Healthcare breeched these concepts in the developmen
Explain the concepts of object orientation methodology : Investigate the effectiveness of business information systems of the given case study. Explain the concepts of object orientation methodology

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd