How improve global cooperation to respond to cybersecurity

Assignment Help Management Information Sys
Reference no: EM131231099

Case Study : How can we improve global cooperation to respond to cybersecurity challenges in cyberspace?

Case Scenario:

For this case study, you are asked to (a)read the International Chamber of Commerce's Cybersecurity Guide for Business and (b) watch three scenario segments from the"Scenario Based Planning" session at the 2015 Global Conference on Cyber Space. After you have done so, develop your answer to the question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

Your audience for this case study is a panel session at a conference attended primarily by industry representatives from U.S. companies.

Your task is to prepare a two to three page white paper which summarizes your response to the question. [This paper would be provided to session attendees in advance of the panel discussion.]

Research:

1. Watch the Scenario Based Planning video from the 2015 Global Conference on Cyber Space https://www.youtube.com/watch?v=8kyj2HBqDyM

a. Start of Session is at 5:05:00 on Live Stream Channel #1 (or click on "Scenario Based Planning" menu item in lower left hand corner of video at startup).

b. The three "scenario videos" (approx. 6mins each) occur at the following times in the livestream channel recording:

i. 5:11:00 - 5:17:30
ii. 5:35:30 - 5:41:30
iii. 6:05:30 - 6:12:10

c. End of Session is at 6:28:00

2. Review the recommendations from the International Chamber of Commerce Cybersecurity Guide for Businesshttps://www.iccwbo.org/Data/Documents/Digital-Economy/Cyber-Security-Guide-for-Business/ICC-Cyber-security-guide-for-business/.

3. Find three or more additional sources to support your answer to the case question.

Write:

Using standard terminology (see case study #1), write a two to three page response to the panel question. At a minimum, your summary must include the following:

1. An introduction which addresses the reasons why cooperation on a global basis is required to address cybersecurity challenges. This introduction should focus on political, economic, and social factors.

2. A separate section in which you discuss the business need for cooperation on a global basis. This discussion should include examples of global, multinational business which operate in cyberspace and the cybersecurity challenges each business faces. Use the "global" companies from the Industry Profile Project as your examples. These companies include: Amazon, Apple, eBay, Facebook, Google, Microsoft, Oracle Corp., Priceline, Salesforce, Twitter, and Yahoo.

3. A separate section in which you identify and discuss three or more specific cooperative efforts (e.g. alliances, associations, public/private partnerships) which currently exist. These may be industry specific, national, or international efforts.

4. A closing section ("Recommendations") in which you identify, discuss, and recommend three or more specific actions which global businesses as a whole can take to improve cooperation within and across industries for the purposes of addressing the cybersecurity challenges which you previously identified. This section should provide an overall answer to the general question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

Submit For Grading & Discussion

Submit your case study in MS Word format (.docx or .doc file) using the Case Study #4Assignment in your assignment folder. (Attach the file.)

Formatting Instructions

1. Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources> APA Resources.

Additional Information

1. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 15% of the assignment grade.

2. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university's Academic Integrity policy.

Reference no: EM131231099

Questions Cloud

What is a risk assessment : What is the relationship between technology and competitive advantage in today's economy? Why is it so important to consider IT risk management, disaster recovery, and contingency planning?
Estimate with the claim that the capital could be repaid : For a price of $165/ton of ammonia, estimate the time required to regain the capital investment in the OTEC production plant and compare your estimate with the claim that the capital could be repaid in 2.5 years.
Record the acquisition of jack company by calway : Jack Company is a corporation that was organized on July 1, 2015. Record the acquisition of Jack Company by Calway on July 1, 2020. Use value analysis to support the acquisition entries.
Estimate the time required to regain the capital investment : For a price of $165/ton of ammonia, estimate the time required to regain the capital investment in the OTEC production plant and compare your estimate with the claim that the capital could be repaid in 2.5 years.
How improve global cooperation to respond to cybersecurity : For this case study, you are asked to (a)read the International Chamber of Commerce's Cybersecurity Guide for Business and (b) watch three scenario segments from the"Scenario Based Planning" session at the 2015 Global Conference on Cyber Space. Af..
Describe your perception of each couple : Describe your perception of each couple.- Why did the couple get together? Will they last? Are any conclusion, observations that you make inspired by race?
How bioethanol can also be produced from sugarcane : Bioethanol can also be produced from sugarcane in climates such as in Brazil. For sugarcane, the production is 80 ton/ha.
What are some of the pitfalls in cost estimating : What are some of the pitfalls in cost estimating? What steps can a project manager take to address potential cost overruns? What steps can a project manager take to make controlling costs easier? Can these steps also be leveraged to control other are..
Conglomerates refers to firms using diversification strategy : The tem "conglomerates" refers to firms using the _____diversification strategy. AT&T's business campaign not only helped to change public perception of the ocmpany, it also signaled to employees that AT&T was determined to be a leader in telecommuni..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Develop the load profile for the stereo speaker subassembly

Calculate the processing load and available capacity, and develop the load profile for the stereo speaker subassembly. Two employees work the assembly process for 40 hours each.

  How a company can achieve lower production costsdescribe

how a company can achieve lower production costsdescribe how a company can achieve lower production costs and increase

  Discuss the issue of privacy in activity trackers

Provide a one-page summary identifying major issues and discuss five moral dimensions of the information age as they pertain to Internet tools and technologies such as the iPad (refer to Chapter 4).

  How analytics and cloud technology could align

Create a workflow diagram to illustrate how analytics and cloud technology could align with the company's business processes. Note: The graphically depicted solution is not included in the required page length but must be included in the design do..

  What strategies or tools could be used to minimize

What strategies or tools could be used to minimize these types of threats upon implementing a system in this situation

  Define the main modules of the system

Define the main modules of the system (User accounts /profiling system, Ordering system, product information system, contact system, consumer support system) Define the "common" and "different" features of the systems

  Tools and technologies for developing rule-based dss

Analyze and describe the tools and technologies for developing rule-based DSS. Introduction: Using DSS involves interactive analytical modeling processing and information systems can support a variety of management decision-making levels and decis..

  Relationship between information and knowledge technologies

Check the relationship between information and knowledge technologies in relation to innovative activity

  What an erp system is and its business value

Provide a one-page summary identifying major issues and describe what an ERP system is and its business value specifically for this company.

  Develop the system according to design specification

Plan and Design a Small System Project, You will use the information learned throughout the course to identify and document a full information system for a small company. Develop the system according to your design specification

  How technology impacts the four basic functions of

how technology impacts the four basic functions of management ford mortor companyford motor companyidentify areas in

  Create a test plan that conforms to the owasp standards

In your Lab Report file, create a test plan that conforms to the OWASP standards and includes the following elements. You will be responsible for determining what to document in this report based on what you learned in your research

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd