Privacy issues that arise in the cyberspace field

Assignment Help Software Engineering
Reference no: EM132118985

RESEARCH PROJECT

In the course, we have covered various security and privacy issues that arise in the cyberspace field. We have learned to identify these risks and have discussed the current approaches and developments for mitigating them. In the course project, you are going to select a topic in the area and further investigate it. It is a research-oriented project. You will need to use your research skills to find relevant literature on the topic. You will use critical thinking skills to explore and analyze the details.

PART I - TOPIC SELECTION AND INTRODUCTION

You need to select a topic that is of interest to you and within the area of the course. You can either come up with a topic yourself or choose one provided in the following list. Next, you will find substantive resources on the selected topic, or at least five references from reputable sources such as research articles, whitepapers, well-known websites, etc.

An introduction to the topic with at least 700 words is expected for this part. Biblical worldview should be integrated in an appropriate manner and supported by Scripture. Be sure to include your complete reference information at the end.

Suggested Topics:

1. An overview of Google's cloud computing services and their security

2. An investigation on Facebook privacy issues

3. iOS and its security

4. A survey on government surveillance software

5. Tor security concerns and considerations

PART II -INVESTIGATION AND REVIEW

In part II, you will closely study the materials found on the topic and conduct research to fully understand the relevant details. Based on your research and investigation, you are going to describe your understandings in the review. For example, if you chose "An investigation on Facebook privacy issues" as your topic, you should describe its privacy policies in detail and present different ways to enforce privacy in Facebook. As a result, at least 800 words are expected for this part.Biblical worldview should be integrated in an appropriate manner and supported by Scripture. If you have used additional references in this part, be sure to include them at the end with the references from Part I.

PART III - DISCUSSION AND SUMMARY

Based on the details and your supported understandings in Part II, you are going to further discuss the topic in Part III. Still using "An investigation on Facebook privacy issues" as an example here, you need to evaluate Facebook's approach for privacy and examine the risks. You will answer questions such as "What are the privacy risks using Facebook?" and "What approaches are developed to address such risks?"Again, you will need to conduct research to find the answers to these questions. A thoughtful and coherent discussion is expected for this part,followed by a summary to wrap up your research work. This part should contain at least 1000 words.Biblical worldview should be integrated in an appropriate manner and supported by Scripture. If you have used additional references in this part, be sure to include them at the end with all previous references from Part I and Part II as well.

GENERAL GUIDELINES:

It is recommended to include prior part(s) of the course project when you make a submission, i.e., to include the first part of the project when you make the second submission and include the prior two parts when you make the final submission. The final submission with all 3 parts included should containat least 2,500 words.

In addition to course materials and the Bible, a minimum of 5 references is required for this project.

Your submissions should follow current APA formatting style and for guideline details, please refer to the current edition of the APA publication manual.

Verified Expert

Advanced technologies and features have helped to protect the system. iOS have secured the apps and the system even ensures the personal data with encryption process. There are comprehensive features and security concern that are reported. The report consists of the iOS securities with detailed information

Reference no: EM132118985

Questions Cloud

Design two primers that will amplify the largest : While primers are usually ~20 nucleotides long, please make yours 9 nucleotides long for simplicity.
Prepare a professional report on TOC : Prepare a Professional REPORT on TOC - MINIMUM 10 suitable high-quality peer-reviewed scholarly journal articles
Types of proteins that regulate sugar catabolism : List three different types of proteins that regulate sugar catabolism and explain how they work together to provide a coordinated
Describe two extensions to the original garch model : Describe two extensions to the original GARCH model. What additional characteristics of financial data might they be able to capture
Privacy issues that arise in the cyberspace field : An overview of Googles cloud computing services and their security - Privacy issues that arise in the cyberspace field - An investigation on Facebook privacy
Name the modifications that occur to dna and protein : (a) Name the modifications that occur to DNA and protein (b) State the primary protein target that is modified
Group of organisms uses sigma factors in gene regulation : (a) Which taxonomic group of organisms uses sigma factors in gene regulation? (b) Briefly describe the function that sigma factors serve in gene regulation
How is information integration at gene regulatory sequences : What is miRNA? How is it produced? How does it act, and what is the end result?
Describe how transcription factors have been implicated : Describe how transcription factors have been implicated in the observed changes in development.

Reviews

urv2118985

11/15/2018 3:33:32 AM

Please find these links for the assignment. Can you tell the tutor to do in 3 parts as listed in the assignment document? Please have each part with a specific reference? It looks good. From the paper, it was clearly visible that the expert had read the questions and answered them as a graduate paper. The required references were applied and cited in a proper manner. Overall I got the best in a very affordable price. I would like all the students around the globe to use ExpertsMind to share their assignments and get the quality work done.

len2118985

9/21/2018 5:38:06 AM

The Course Research Project consists of 3 parts: introduction, related work review, and discussions. You will write a research-oriented paper in current APA format that focuses on the selected topic. The final submission of the project must include at least 5 references in addition to the course’s reading materials and the Bible, and must contain at least 2,500 words. I have listed some document if you need for reference.

Write a Review

Software Engineering Questions & Answers

  Apa formatting techniques

What is the difference between forward and reverse engineering? How would you recommend this be used in our Project? Would CASE tools be helpful in forward/reverse engineering?

  The role of systems engineering

Achieve successful systems design, development, and implementation by effectively applying the role of systems engineering and integrating with project management.

  Develop a plan for fox lake project using the sdlc

Develop a plan for this project using the SDLC. Specify in detail the tasks that must be accomplished during the system definition phase.

  Weigh the pros and cons

Other professional groups (doctors, lawyers) have a complex and difficult process of certification. Consider whether software engineers should be certified in the same way. Weigh the pros and cons.

  Take normalized tables to create erd

Normalize data to 3rd normal form and consolidate forms and name remaining tables and Take normalized tables to create ERD

  Develop your analysis and design uml models for the project

In each week, you will be provided with the information you need to continue to develop your analysis and design UML models and documents for this project.

  Describe the current deficiencies andor need for the new

module practice select a system of your choice and describe the system life cycle. construct a detailed flow diagram

  Assignment on verification and validation

Planning and executing verification and validation (Focused Discussion) : Question: V and V processes are critical to any kind of IT project. Validation has links with international standards too. Please summarise any of your experience here.

  Eclipse czt latex a final pdf from the czt latex is needed

Eclipse czt latex a final pdf from the czt latex is needed -  codes to the specification to run on eclipse

  Why the testing of software products is of great importance

Compare and contrast at least three different software development methods. Explain why the testing of software products is of great importance.

  Element of array

Discuss how do you access the element of array a located at row two and column four?

  Develop a plan for system and system testing

Develop a plan for system testing. Include areas that you will test within both the application and a system as a whole and how errors will be tracked and reported.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd