Examine the proposed business ethical problem

Assignment Help Management Information Sys
Reference no: EM131246964

Case Study 1: The Brazilian Federal Data Processing Service

Read the case study titled, "Brazil to fortify government email system following NSA snooping revelations," located here and at https://www.networkworld.com/news/2013/101413-brazil-to-fortify-government-email-274802.html.

Use the Internet to research the architectures that other government organizations and intelligence agencies use for email privacy, if any.

Write a three to four (3-4) page paper in which you:

Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil's problem is an ethical one that should be corrected. Provide a rationale for your response.

Assess the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture. Conclude whether or not Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Provide a rationale for your response.

Evaluate the quality of the Brazilian Federal Data Processing Service's proposed architecture plan geared toward solving the security problem. Suggest two (2) other possible architecture solutions that the Brazilian Federal Data Processing Service should consider. Justify your response.

Determine whether or not one (1) of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach similar to the one that the Brazilian Federal Data Processing Service had experienced. If this government organization or intelligence agency has taken precautions to avoid a similar security breach, provide one (1) example of such a precaution. If this government organization or intelligence agency has not taken precautions to avoid a similar security breach, recommend one (1) action that it can take in order to avoid a similar security breach.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Analyze the types of organizational and computer architectures for integrating systems.

Develop an enterprise architecture plan to address and solve a proposed business ethical problem.

Use technology and information resources to research issues in enterprise architecture.

Write clearly and concisely about Advanced Computer Architecture topics using proper writing mechanics and technical style conventions.

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssignTM services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Reference no: EM131246964

Questions Cloud

Information security within organizations : Information security within organizations has evolved and has become much more complex. In a written paper, answer the following questions:
Purchase homogeneous product from one of two firms : A risk-neutral consumer is deciding whether to purchase a homogeneous product from one of two firms. One firm produces an unreliable product and the other a reliable product. At the time of the sale, the consumer is unable to distinguish between the ..
Emulate controller to remotely control the helicopter flying : COMP9032 Project Description: In this project, you will be working individually to develop a system, using the AVR Development board, to emulate a controller to remotely control the helicopter flying in a big building hall. The floor area of the h..
What kind of promise should the president make : Given your answer to part (b), what is the outcome of the game? (What is the superintendent's offer and what is the president's response?) Comment on how the union's final salary depends on y.
Examine the proposed business ethical problem : Evaluate the quality of the Brazilian Federal Data Processing Service's proposed architecture plan geared toward solving the security problem. Suggest two (2) other possible architecture solutions that the Brazilian Federal Data Processing Service..
The circular flow model with government : The Circular Flow Model with Government is another important model for students to understand. a. Please explain what the model shows us. List and explain the assumptions of the model. i. There are 3 assumptions of the Circular Flow Model with Govern..
Stability region of the trapezoidal method : Find the coef?cient vectors alpha and beta for the trapezoidal method. Find also the stability region of the trapezoidal method.
How capacitor work as a radio tuner : How capacitor work as a radio tuner? - and if possible , could you please show me an examples in figures?
Draw the extensive form of this perfect-information game : If he accepts, then the players obtain the specified shares of the surplus. If player 3 rejects, then the players each get 0. Draw the extensive form of this perfect-information game and determine the subgame perfect equilibria

Reviews

Write a Review

Management Information Sys Questions & Answers

  How might mrp be applied to hospital surgery university

how might mrp be applied to hospital surgery university classes restaurants hotelhow might materials requirement

  Prepare a detailed budget to implement your proposed design

Prepare a report and state the additional amount of money that is needed for the changes you have made to meet the additional requirements. Refer to the given price list in the Appendix.

  The impact of information for an organizationan

the impact of information for an organizationan organization relies on the accessibility of resources for production

  Macro-processes of global supply chainplease give an

macro-processes of global supply chainplease give an example of an assessment of the macro-processes that make up an

  Utilization of information technology in churches in the

utilization of information technology in churches in the u.s1. i need help with 2 pages overview of how churches in the

  How well staff is able to handle the option

Case Study: Selection of an Information Technology Platform. Read a case study from the 7th edition of Managing Information Technology. How well staff is able to handle the option. Key applications and their ability to work with type of system

  Explain information security governance and management tasks

Define the information security governance and management tasks that senior management needs to address. Describe the outcomes and the items that will be delivered to the organization through the information security program.

  Who has been granted an interview regarding an it position

ITECH7402 Professional IT Culture. What advice is available for a new graduate to produce an effective application regarding an IT position to be filled? What advice is available for a new graduate who has been granted an interview regarding an IT po..

  Brief background of the chosen game

Requirements- Overall scope of the project. Brief background of the chosen game. Schedule of activities represented using a Task Analysis, Schedule, or Gantt Chart, stating each member's role

  Types of forecasting

We have spent quite a bit of time studying the types of forecasting including producing some useful computer based models. For this individual project, find a "peer reviewed" article that involves the use of one or more forecasting techniques

  Describe the concept of due care and due diligence

Discuss the importance of the security professional to be knowledgeable with State and Federal Regulations, Directives, and Acts. Describe the concept of due care and due diligence.

  Experience of using information technology

Show your experience of using information technology Max 500 words - Using information and communications technology

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd