Identify three human and technological protective measures

Assignment Help Computer Network Security
Reference no: EM131173012

Assignment: Ethical Issues in Information Systems

Choose one ethics issue found within Chapter 4 of the textbook.

You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one ethics issue of interest to you.

Write a two to three page research paper in which you:

1. Summarize the issue that you have chosen.

2. Express your own opinion of, or position on, the issue that you have chosen.

3. Identify two to three human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.

4. Identify at least three problems related to management information systems that may arise from the issue that you have chosen. Next, propose at least one solution to address each problem in question. Provide a rationale to support your response.

5. Use at least three quality references. Note: Wikipedia and other Websites do not quality as academic resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Describe how and why information systems are used today.

• Evaluate the ethical concerns that information systems raise in society, and the impact of information systems on crime, terrorism, or war.

• Explain how to secure information systems resources that focus on both human and technological safeguards.

• Identify how to mitigate risks as well as plan for and recover from disasters.

• Use technology and information resources to research issues in information systems.

• Write clearly and concisely about management information systems using proper writing mechanics.

Reference no: EM131173012

What is the main difference between a virus and a trojan

What is the main difference between a virus and a Trojan? A virus or malware can impact which of the three tenets of information systems security (confidentiality, integrity

Prepare a diagram using rationale

Analyse the article/case study from the perspective of at least two different classical ethical theories and present well reasoned arguments for your assessments and recomme

Why is network security critical to financial institutions

Why is network security critical to financial institutions? The Blog topic is based on ‘Banks Banking on Network Security' (Closing Case Study Two, Section 11/Plug in B5 - In

Targeted marketing and mass marketing

Distinguish between targeted marketing and mass marketing and explain what led to the rise of each. Describe the different market-segmenting strategies companies pursue and

New product development and product enhancement teams

As the new technical communications manager for International Gadgets (IG), you have developed a good idea of the various internal and external audiences for communications

Design a remote access control policy for richman

Design a remote access control policy for Richman using the appropriate access controls for systems, applications, and data access. Include the design and justification for

Explain problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. Solve problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its dep

Describe various functions within information systems area

Describe the various functions and activities within the information systems area, including the role of IT management and the CIO, structuring of IS management within an or


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd