Identify two human and technological protective measures

Assignment Help Management Information Sys
Reference no: EM131272963

Assignment: Ethical Issues in Information Systems

Choose one ethics issue.

You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you.

Write a two to three page research paper in which you:

1. Summarize the issue that you have chosen.

2. Express your own opinion of, or position on, the issue that you have chosen.

3. Identify two to three human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.

4. Identify at least three problems related to management information systems that may arise from the issue that you have chosen. Next, propose at least one solution to address each problem in question. Provide a rationale to support your response.

5. Use at least three quality references. Note: Wikipedia and other Websites do not quality as academic resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Describe how and why information systems are used today.

• Evaluate the ethical concerns that information systems raise in society, and the impact of information systems on crime, terrorism, or war.

• Explain how to secure information systems resources that focus on both human and technological safeguards.

• Identify how to mitigate risks as well as plan for and recover from disasters.

• Use technology and information resources to research issues in information systems.

• Write clearly and concisely about management information systems using proper writing mechanics.

Reference no: EM131272963

Questions Cloud

Describe the data breach incident of the data breach : Describe the data breach incident and the primary causes of the data breach. Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed.
Describe one evidence claim for and claim against : Describe one (1) evidence claim for and one(1) evidence claim against your chosen topic. The topic is "What are the unconstructive and constructive impacts of technology on the teenagers"?
Explain the power of social influence based on the findings : Explain the power of social influence based on the findings of Milgram's experiment. Provide one (1) example of a situation you have been in where you felt you had to conform to someone or something. Indicate whether you felt you had to conform be..
Implement the encryption algorithm : Implement the encryption algorithm and - Express the matrix multiplication as a linear combination of vectors and Define three tables and store them in advance
Identify two human and technological protective measures : Identify two to three human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.
Is there a maturational or developmental aspect to it : Is there a historical or cultural context to this? (I.e. Freud was his mothers favorite, as well as living and writing during repressed Victorian tines and WWI and WWII; Behavioral and CBT approaches evolved during a time that people wanted to mak..
What types of goals are suitable for diversity training : What types of goals are suitable for diversity training and How might a complete performance management system differ from our annual performance appraisals.
Critical importance of an executive : The market trend towards escalating executive compensation reflects the critical importance of an executive to an organization's long-term viability.
Identify any gaps in assessment the framework : Describe the evidence you find to identify that organization's leadership style (servant and authentic) by using specific references from the research literature to support your description.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Dominos sizzles with pizza tracker case study1 what is

dominos sizzles with pizza tracker case study1. what is dominos business model? how successful has it been?2. what

  Risk management strategy and plan document shell

Risk Management Strategy and Plan Document Shell

  Describe threats that specifically target confidentiality

Describe threats that specifically target confidentiality on a data system. Do not limit yourself to the textbook for answers, and use external resources to support your conclusion.7. What are the components of two-factor authentication ? Provide exa..

  What kinds of difficulties or opportunities might arise

As IT increasingly penetrates into our daily lives, do you think the younger generation might do work differently than earlier generations? If so, what kinds of difficulties or opportunities might arise from this difference

  Supply-and-demand analysisa state has a retail sales tax of

supply-and-demand analysisa state has a retail sales tax of 10 percent but it exempts food prescription drugs and all

  Why should a business use microsoft xp pro

Why should a business use Microsoft XP pro - Advantages and disadvatages compared to the others.

  Describing issues might face when maintaining security

Assignment: Write a 3-to 4-page paper describing the some of the issues you might face when maintaining security in a company that has offices in multiple countries

  Show the information flows and product flows

A company has two product lines, A and B. If the company is moving from two independent systems for the two lines to an integrated system, what are the requisite changes in required data, information flows, and product flows?

  Examples of the growing use of blogs for politics

Examples of the growing use of BLOGS for politics - Address the features, functions of a key statistics for BLOGGING.

  What are the qualities of an enterprise cloud

The paper must be written in APA format and include at least one direct quote with proper citation and reference. What are the qualities of an enterprise cloud

  The attribute certificates is multivalued

In the entity Employee with attributes such as SSN, F-Name, L-name, DOB, Email, Cell, Certificates, ect., the attribute Certificates is multivalued. How to convert this entity into table(s). Show your table(s).

  Solution to supply chain management questionneed help

solution to supply chain management questionneed help writing a paper involving the requirments technology benefits

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd