Strayer library to research articles on ethical issues

Assignment Help Basic Computer Science
Reference no: EM13766209

You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you.

Write a two to three (2-3) page research paper in which you:

1. Summarize the issue that you have chosen.
2. Express your own opinion of, or position on, the issue that you have chosen.
3. Identify two to three (2-3) human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.
4. Identify at least three (3) problems related to management information systems that may arise from the issue that you have chosen. Next, propose at least one (1) solution to address each problem in question. Provide a rationale to support your response.
5. Use at least three (3) quality references. Note: Wikipedia and other Websites do not quality as academic resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
• Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Describe how and why information systems are used today.
• Evaluate the ethical concerns that information systems raise in society, and the impact of information systems on crime, terrorism, or war.
• Explain how to secure information systems resources that focus on both human and technological safeguards.
• Identify how to mitigate risks as well as plan for and recover from disasters.
• Use technology and information resources to research issues in information systems.
• Write clearly and concisely about management information systems using proper writing mechanics.

Reference no: EM13766209

Questions Cloud

Reinforce argument that the financial markets are efficient : Which of the following tend to reinforce the argument that the financial markets are efficient?
Statements is correct concerning market efficiency : Which one of the following statements is correct concerning market efficiency?
Given the vast resources available to mutual fund managers : Given the vast resources available to mutual fund managers, these managers on average have generally:
What are the power bases both coaches rely upon : What are the power bases both coaches rely upon? Whose actions are more aligned with a managerial role and whose actions are more aligned with a leadership role?
Strayer library to research articles on ethical issues : You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you.
Where information about nuts and seeds is being presented : how and where information about nuts and seeds is being presented to consumers. For this Assignment identify, describe, and evaluate four avenues through which information is presented to consumers.
Explain how you would rebut these arguments : In many organizations, being "people-centered" is considered soft, irrelevant, and unrelated to profitability. Using support from historical perspectives of organizational behavior, explain how you would rebut these arguments.
Programing of tree java : The listing of Tree.java is supplied below as a starting point for this lab. A picture of Tree.java output is also shown. Either cut/paste the code or type it in. Run the program to verify that it works. Study the listing until you understand comp..
Describe two color paintings by different artists : Describe two color paintings by different artists (selected from the list or sources in the Explore section below) that you believe represent the following quote by Kandinsky on the subject of color in art.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the output of the following loop

What is the output of the following loop

  Create a base class

Create 2-3 instances of each of your classes, and call each of your methods.

  Advantage to process the data

You can write your program to next the loops in either direction, that is, process row by row or column by column. Explain which way you would choose to process the data. What is the advantage?

  Estimate the mean and variance of the number of times

Estimate the mean and variance of the number of times you have to roll 2 dice until the total exceeds 100.

  Explain ethics of developing of system

To help counter terrorism, many countries are planning and development of computer systems that track large number of citizens and their actions. Clearly this has privacy, implications. Discuss the ethics of developing this type of system.

  Determine how to manipulate worksheets

Which of the following is a suggested decision to make when you plan a workbook? Determine how to manipulate the worksheets.

  Computer program that inputs a degree

Write a computer program that inputs a degree of difficulty and seven judges' scores, and outputs the overall score for that dive. The program should ensure that all inputs are within the allowable data ranges

  Write a one-page paper describing these new activities

Propose three to five additional activities you think should be added to a Gantt chart to help you estimate resources and durations. Write a one-page paper describing these new activities.

  Write disadvantage of the condensed design circuit

what's the advantages and disadvantage of the condensed design circuit (2-bit multiiplier) ?? which one is better a condensed one or just the normal one ?? please good explanation

  What is the total seek distance

(1)Suppose a linked disk allocation method is used. What is the total seek distance

  The task is to animate a cat chasing a mouse

The task is to animate a cat chasing a mouse as it tries to get close enough to catch it (within 1 foot). Of course, as the cat continues to chase the mouse, the mouse is also running away and moves to random positions, trying to lose the cat. You wa..

  A symmetric encryption scheme

Consider the El Gamal encryption scheme, a symmetric encryption scheme

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd