Understanding of concept of protecting personal information

Assignment Help Basic Computer Science
Reference no: EM13849940

Research Paper Using Word 2010

This assignment has two goals:  1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly use the tools and techniques within Word to format a research paper including using Word 2010/2013's citation tools.  These skills will be valuable throughout students' academic career.  The paper will require a title page, NO abstract, three to four full pages of content with incorporation of a minimum of 3 external resources from credible sources, and a Works Cited/Reference page.  Three pages of content means 3 full pages, to the bottom of the third page with text on page 4.  Two pages plus several lines on the third page will not suffice.  Note that submitting a paper that is less than three pages may affect your grade on several rubric items, including page length and several content items. Given a short, underdeveloped paper's impact on several items in the rubric, a student submitting a paper less than three full pages is unlikely to score higher than a 'C' on this assignment.

A list of topics from which students can choose is provided below.  Wikipedia and similar websites are NOT creditable sources.  Blogs and discussion groups are not creditable sources.  The course textbook cannot be used as a source for the research paper.  No more than 10% of the paper may be in the form of a direct citation from an external source.

Topics for Research Paper

  1. Personally Identifiable Information (PII)
  2. Social Engineering
  3. Employee Monitoring
  4. Information Privacy
  5. Electronic Medical Records
  6. Biometrics (in terms of ethical and privacy issues)
  7. Identity Theft
  8. Use of Cookies
  9. Privacy Laws related to Information Technology use
  10. Intellectual Property Rights; Copyright

Writing Quality for the Research Paper

* All Grammar, Verb Tenses, Pronouns, Spelling, Punctuation, and Writing Competency should be without error.

*Remember: spell-check, then proofread. Better yet, have a friend or colleague read it before submitting it. Read it out loud to yourself.

* Remember: there is not their, your is not you're, itsis not it's, too is not to or two, site is not cite, and who should be used after an individual, not that. For example, "the person WHO made the speech" not "the person THAT made the speech."

*  In a professional paper one does not use contractions (doesn't, don't, etc.) and one does not use the personal you or your. Use the impersonal as in the previous sentence. It is more business-like than saying, "Also in a professional paper you don't use contractions."

This is not a speech, it is a research paper.  First and second person should NOT be used

Reference no: EM13849940

Questions Cloud

How much is in the IRA when Bob retires : Bob makes his first $400 deposit into an IRA earning 8.1% compounded annually on his 24th birthday and his last $400 deposit on his 43rd birthday (20 equal deposits in all). With no additional deposits, the money in the IRA continues to earn 8.1% int..
How much should a customer pay for this annuity : American General offers a 15-year annuity with a guaranteed rate of 9.58% compounded annually. How much should you pay for one of these annuities if you want to receive payments of $2400 annually over the 15 year period? How much should a customer pa..
How each organization promotion fosters social change : Brief description of how each organization's promotion fosters social change. Then, evaluate how each organization's marketing promotion benefits the community and how it benefits the organization
Portfolio manager for mutual fund : You are the portfolio manager for a mutual fund. Your fund has an expected return of 15% with a standard deviation of 24% and the T-bill rate is 3%.
Understanding of concept of protecting personal information : This assignment has two goals:  1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly..
Analyze ebay product or service layout of the company : You will analyze eBay's product or service layout of the company. You will also analyze how the company does capacity planning and forecasting
What services do the hotel provide : What services do the hotel provide? The focus here should be on Service Strategy, culture, and customer relationship management (CRM).
Linear functions have constant rate of change : Linear functions have constant rate of change and exponential functions have constant relative rate of change?
Find the equation that describes her budget line : Consider a consumer who can purchase only two goods, x and y. If this consumer can, given her income, just afford two bundles (x, y) = (12, 6) and (x, y) = (9, 8). If Py =3, find the equation that describes her budget line, Please explain

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the return value of the following code

What is the return value of the following code?

  How do you create a 4d array of doubles in c++

How do you create a 4D array of doubles in C++

  Propose a solution to the conflicts

Consider at least two (2) software products that you use or have used in the past. Provide at least two (2) examples in which ease of learning conflicted with ease of use. Propose a solution to the conflicts that you have indicated. Justify your resp..

  Create a uml for a class called triangle

Create a UML for a class called triangle.

  Identify and describe specific capabilities of computing

Identify and describe 5 specific capabilities of computing (e.g., speed, permanence/storage) made possible or enhanced by computing technology.

  Design a hashed file of words

Design a hashed file of words that could be used as a spell checker. What would you use as a hash function? Would your choice of a hash function depend on the language from which the words are chosen? Why should such a file not be stored as a sequent..

  Explaining origins or genesis of wireless networking

Explain origins/genesis of wireless networking.

  Security protocol-complexity of differential cryptanalysis

In a security protocol, which of the following tends to make the best nonce?

  What problems are encountered when using the internet

Write a 500-word paper that explains what problems are encountered when using the Internet to carry VOIP traffic and what can be done to overcome these problems

  Create the data model segment for business rules

The FlyRight Aircraft Maintenance (FRAM) division of FlyRight Company (FRC) does all maintenance for FRC's aircraft. Create the data model segment which reflects the following business rules.

  Show truth table

Show truth table for xz=(x+y)(x+y)(x+z) the y in the middle part should have a line over it and the x in the last part should to.

  Compute minimum-maximum possible values for distance

During run, compute the minimum and maximum possible values for the following distance measures (from the center of the track): Manhattan, Euclidean and Chebyshev distance.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd