Discuss how can improve business services

Assignment Help Management Information Sys
Reference no: EM131158238

Part A:

Answer the following questions:

Question 1: From an I.T. security perspective discuss the differences between threat, exposure and vulnerability. Give an example of each one (not just a definition).

Question 2: Define 'social computing' and discuss how it can improve business services.

Question 3: What is the role of a content management system? How can it help an organisation gain a competitive advantage?

Question 4: Discuss if it is ethical for an employer to monitor their staff's usage of the Internet at work? List two acceptable and two unacceptable activities you would include in an 'acceptable internet usage' policy?

Part B:
Use the Toulmin's Model of Argument to analyse the supplied Assignment Case Study (see the Assignment Case Study section below) and provide your opinion on the strength or weakness of the argument with relation to the Claim that we have provided.

You MUST answer the following 7 questions separately to complete the 'Your Opinion' section of Part B. make sure to number your answers:
To apply the model to test the validity/strength of a CLAIM the reader must examine each sentence in the article and categorise them as a Toulmin element or as an unnecessary extra

e.g. 'opinion', 'hearsay', 'definitions' etc. Once all sentences have been categorised then the elements should be examined in sequence.

1. What is the CLAIM?

2. Is there any EVIDENCE to support the CLAIM? If so how much and how does it affect the strength of the CLAIM.

3. Is there a WARRANT (Explicit or Implicit)? Explicit WARRANTS are often stronger because the author can direct the reader to accept the CLAIM. Implicit WARRANTS leave the reader's opinion open to interpretation and this may go against the author's intended purpose.

4. Is there BACKING? If so how much? If so how much and how does it affect the strength of the CLAIM.

5. Is there a REBUTTAL? The quantity and scope of the REBUTTAL may reduce the strength of the CLAIM and thus dissuade the reader's acceptance of the CLAIM.

6. Is there a QUALIFIER? If so, to what extent does it reduce the scope of the CLAIM because this will impact on the strength of the CLAIM?

7. Your Opinion - this is a personal perception based on your interpretation of the article. The presence, quality and quantity of the different Toulmin elements must be applied to make this critical assessment. You must discuss whether you agree or disagree with the claim based on the stronger argument.

Case Study: This case study must be used for Part B

Claim: Twitter puts users' privacy at risk

A piece of malicious code called Stormer has stolen 28,000 login credentials from Twitter.com, security experts have warned. Alarmist's investigators said, "It appears the attackers used Stormer and we suspect the people behind the attack are using the stolen information to login to victims' Twitter.com accounts and transmit malicious code to their associates, thereby increasing the malware's spread even further." When asked about the attack Twitter explained security experts had investigated the affected Tweeters, and said the majority of them were not active, but initiated remedial steps for all affected users to ensure the security of their accounts. Twitter public relations department was quick to note that they had not experienced a breach to this level before and would be sure to prevent it in the future.

Social networking Apps are a target of hackers because of the large amount of personal information presented on them. "It won't necessarily be obvious that you have been attacked. The malware is stealing passwords so it is not going to announce itself," said Jacob Singh, senior security consultant at Symantec. John Smith a frequent Tweeter said he felt violated but didn't know if he had been affected. Following the attack Kim K. reality show celebrity tweeted "#backoffstormer".

Alarmist CEO noted "It appears the more capable hackers are now experimenting with more sophisticated malware so as fast as the companies create a defence the attackers find a way to infiltrate it" Soon after the attack Twitter's security team released a public announcement warning Tweeters that they were just as responsible for their security and should follow simple security rules like not using passwords for multiple accounts. In 2015 a Symantec report estimated that various forms of Stormer accounted for 26.8% of all new malicious software infections.

Twitter recently updated their password creation capabilities to force users into creating stronger passwords. Twitter also stated so far, Stormer has not been spreading on Twitter itself, but they are working with their external partners to prevent further spread. Twitter CEO commented "Better educating our users will add to our defences but we can't control everything they do and they are a weak point."

Reference no: EM131158238

Questions Cloud

Describe an array and its various implementations : Respond to the following about arrays and their implementations: Describe an array and its various implementations. Provide the C# code that would illustrate how to create, reference, and address an element of an array.
Predict the pet-px margin in jan. 2020 : predict the PET-PX margin in Jan. 2020. Which forecast appears to be most reasonable?
Massively multiplayer online role-playing games : In a virtual world (VW) of massively multiplayer online role-playing games (MMORPGs), collaboration and communication are provided through the Internet between MMORPG-ready devices such as the Microsoft Xbox, and Sony PlayStation,
Create a report on diversity in the workforce : create a report on Diversity in the Workforce. The content of the final complete manual will be developed throughout the course and will need to cover diversity issues, specifically the following forms of discrimination.
Discuss how can improve business services : What is the role of a content management system and How can it help an organisation gain a competitive advantage? (250 words)
Estimate the number of ideal stages required : The feed contains 10 mol% acetone. Acetone of at least 95 mol% purity is wanted, and the aqueous effluent must not contain more than 1 mol% acetone. The feed will be a saturated liquid. Estimate the number of ideal stages required.
What is the mission of the organization or corporation : What is the mission of the organization or corporation? What does the mission mean to you? To obtain and maintain a solid reputation at JP Morgan Chase & Co. how should you proactively approach political, legal, and technological factors
Asset tracking and management software application : Background: You are part of a team that will be implementing an asset tracking and management software application. Choose an organization with which you are familiar for this assignment.
How might a swot analysis be used by an entrepreneur : How might a SWOT analysis be used by an entrepreneur either at the pre-start-up stage or within the actual start-up of the company? Apply this to a company (Apple, Inc.) that you would be interested in starting in the future

Reviews

Write a Review

Management Information Sys Questions & Answers

  Write a memo to the it manager

Based on this information, write a 4 page memo to the IT manager, Bob Jones, Describing the steps you would take after this discovery. The memo should also mention any information you find in the OSSTMM that relates to your discovery and offer Rec..

  What negative influences does porter see

The text describes Michael Porter's view of the Internet as somewhat negative. What negative influences does Porter see

  Payment methods offered by the companies

Create a table summarizing the different payment methods offered by the companies you visited

  Was there one particular topic relevant to your own career

Which course concepts do you feel are the most relevant to the industry today?  Was there one particular topic relevant to your own career

  How might a healthcare organization approach prioritizing

Chapter 5 discusses the various components of the EHR and some of the clinical decision support that the EHR can provide. Discuss with your peers the ways in which these components would be utilized differently in a hospital setting versus a phys..

  Select one such agency and describe their role

The Homeland Security Act of 2002 is divided into 17 titles while bringing together under one umbrella more than 22 federal agencies. Select one such agency and describe their role and responsibilities in HLS. Which agencies do you believe they wo..

  Describe a way to revamp or reinvent a business

Reinventing a Businss - Describe a way to revamp or reinvent a business using supply chain technologies.

  Explain the purpose of a university security policy

Explain the purpose of a university security policy and indicate the major reasons why they are necessary. Provide your opinion as to whether a university security policy is more or less important to have than a business security policy

  Prepare for the wage portion of the negotiation

What are the objectives the company should pursue for negotiation and What is the appropriate information that should be sought to prepare for the wage portion of the negotiation?

  Paper - incident response models

Select an academic paper from a respected journal or conference proceedings on the topic "Incident Response Models" Write a summary of the paper

  How is the information collected and managed

Rhode Island HEALTH web data query system: How is the information collected, managed, and retrieved

  Describing how technology is utilized in retail environment

Write a 350- to 750-word paper describing how technology is utilized in the retail environment. Consider how technology has impacted the retail business and its customers as a whole

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd