Reference no: EM131129758
Writing Assignment
When firms like Home Depot and Target become prime targets by hackers, the attack themselves become front-page news. Firms like these have invested a ton of financial and non-financial resources to prevent such an attack, but the attack is successful. Financial and personal data have been compromised, and now everyone wants answers. Your challenge is to argue the position of whether or not companies should be held liable for losses sustained in a successful attack made on their AIS applications (sales, billing, cash collections, credit, etc.) by hackers.
In support of your argument, locate at least three cases (one which can the Home Deport or Target case) where a firm's AIS (or business system) was breeched by hackers. While supporting your stance, be sure you address the following questions
- Part I: Why should the firm be held liable (or not held liable) for losses sustained by customers, employees, and suppliers per an attack by hackers?
- Part II: What are the main facts from each case supports your stance?
- Part III: How the firm's response to the attack does support your stance?
- Part IV: What additional measures, if any, could have been taken by the firm, banks, and credit card companies to limit losses?
Your response should not generally exceed eight pages (doubled-spaced) or four pages singlespaced. Your page count does not include such items as cover page, reference page, and appendix, if provided. You will need to include at least two references and at least two in-text citations to support your paper. These references must be related directly to the topics covered in the paper. Other formatting specifics regarding this paper include:
- Headings: You will need to use headings (short, brief, and centered) to separate each area of your paper. Your headings should have an appropriate title such as Main Facts of the Case instead of Part I.
- Margins & Font Sizes: Use standard margins (minimum .5"; maximum 1.5") and standard font size (minimum 10 point; maximum 12 point) in your paper.
- Writing Style: APA is the preferred writing style, but you can choose any appropriate writing style (e.g. MLA), except that all references are to be formatted via APA. Please consult the UMUC Effective Writing Center (https://www.umuc.edu/writingcenter/index.cfm) for assistance regarding choice of styles and formatting of references via APA.
Discourse analysis about to work
: Here is a link of "How to Do a Discourse Analysis" by Florian Schneider.http://www.politicseastasia.com/studying/how-to-do-a-discourse-analysis/ Note that this introduction to "discourse analysis" comes from political science.
|
What are the main facts about the case
: What are the main facts about the case? Apply the fraud opportunity triangle to the case and illustrate how the case complies (or does not complies) with the triangle.
|
Describe the entire event and for what purpose
: What is the significance of V instructing Creedy to mark his front door with an "X?" How is this foreshadowing Creedy's end and Martial Law and the conspiracy theories associated with Martial Law within the past 15years
|
Write essay about variations in volume rate and pitch
: Write essay about Variations in volume, rate and pitch help develop meaning and therefore increase the effectiveness of your communication to your audience.
|
What are the main facts from each case supports your stance
: What are the main facts from each case supports your stance? How the firm's response to the attack does support your stance?
|
Research topics with explanation
: This paper has been divided into 5 parts. The first part is neeed by July 14th, the second part needed by July 21st, the third part is needed by July 31st, the fourth part is needed by August 7, and the 5th and final part is needed by August 14. ..
|
Write about challenge of federal and state interventions
: Write a paper that analyzes challenges brought about by federal and state interventions and how the educational system might address these challenges
|
Illustrate the system from an automated function viewpoint
: Using the methodology developed in this course, document and illustrate the system from an automated function viewpoint.
|
Spend some time finding out how journalists
: We have talked about what makes news "news" and what makes a journalist a "journalist." We also have learned that facts need to be verified with several sources. What we haven't discussed is how technology is being used in reporting the "news."
|