Reference no: EM131272963
Assignment: Ethical Issues in Information Systems
Choose one ethics issue.
You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you.
Write a two to three page research paper in which you:
1. Summarize the issue that you have chosen.
2. Express your own opinion of, or position on, the issue that you have chosen.
3. Identify two to three human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.
4. Identify at least three problems related to management information systems that may arise from the issue that you have chosen. Next, propose at least one solution to address each problem in question. Provide a rationale to support your response.
5. Use at least three quality references. Note: Wikipedia and other Websites do not quality as academic resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Describe how and why information systems are used today.
• Evaluate the ethical concerns that information systems raise in society, and the impact of information systems on crime, terrorism, or war.
• Explain how to secure information systems resources that focus on both human and technological safeguards.
• Identify how to mitigate risks as well as plan for and recover from disasters.
• Use technology and information resources to research issues in information systems.
• Write clearly and concisely about management information systems using proper writing mechanics.
Describe the data breach incident of the data breach
: Describe the data breach incident and the primary causes of the data breach. Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed.
|
Describe one evidence claim for and claim against
: Describe one (1) evidence claim for and one(1) evidence claim against your chosen topic. The topic is "What are the unconstructive and constructive impacts of technology on the teenagers"?
|
Explain the power of social influence based on the findings
: Explain the power of social influence based on the findings of Milgram's experiment. Provide one (1) example of a situation you have been in where you felt you had to conform to someone or something. Indicate whether you felt you had to conform be..
|
Implement the encryption algorithm
: Implement the encryption algorithm and - Express the matrix multiplication as a linear combination of vectors and Define three tables and store them in advance
|
Identify two human and technological protective measures
: Identify two to three human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.
|
Is there a maturational or developmental aspect to it
: Is there a historical or cultural context to this? (I.e. Freud was his mothers favorite, as well as living and writing during repressed Victorian tines and WWI and WWII; Behavioral and CBT approaches evolved during a time that people wanted to mak..
|
What types of goals are suitable for diversity training
: What types of goals are suitable for diversity training and How might a complete performance management system differ from our annual performance appraisals.
|
Critical importance of an executive
: The market trend towards escalating executive compensation reflects the critical importance of an executive to an organization's long-term viability.
|
Identify any gaps in assessment the framework
: Describe the evidence you find to identify that organization's leadership style (servant and authentic) by using specific references from the research literature to support your description.
|