The concept of protecting personal information

Assignment Help Basic Computer Science
Reference no: EM13910329

This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly use the tools and techniques within Word to format a research paper including using Word's citation tools. These skills will be valuable throughout students' academic career. The paper will require a title page, 2-3 pages of content with incorporation of a minimum of 3 external resources from credible sources, and a Works Cited/Reference page. A list of topics from which students can choose is provided below.

Topic for Research Paper

Identity Theft

RequirementPoints AllocatedComments

Paper should be double-spaced, 1" margins, 12 point Times Roman type0.5This is the font in normal paragraphs. Heading and title fonts may be a larger size.

Deliverable does not exceed 3 typed, double-spaced0.5Charts and other graphical information are not included in the page count. Title and reference pages are not included in page count.

Title Page which shows title and author's (student's) name.0.5Title must be appropriate for content

At least three (3) APA formatted in-text citations.

You are required to use the References feature in Word for your citations and Reference List. It is important to review the final format for APA-style correctness even if generated by Word.0.5These can be anywhere in the document, but the citations must be relevant to what is being referenced and use the APA format.

At least two (2) informational footnotes.

(Note: APA Style does not use footnotes for citations; however, does allow for the incorporation of informational footnotes)0.5These can be anywhere in the document, but the informational footnotes must be relevant to the associated text. The purpose of this requirement is to effectively incorporate the information and demonstrate that you can use the MS Word footnoting functionality.

Reference Page using APA format for references

You are required to use the References feature in Word for your citations and Reference List. It is important to review the final format for APA-style correctness even if generated by Word..5All works listed must be incorporated within the writing of your paper as specified in APA style

Describe the topic and ethical issue as it relates to the use of Information Technology 2

Discuss the trends, ways individuals and/or organizations are impacted by the issue or working to prevent the impact.2

Paper must be well-organized, clearly written in a style appropriate for college level work. 1

Paper should be grammatically correct and contain no spelling errors. 2Although you should use the SpellCheck and Grammar Check function in Word, this will not catch all errors - you are ultimately responsible for proofreading.

Reference no: EM13910329

Questions Cloud

Please provide me with the solution to the tim toyne solutio : Please provide me with the solution to the Tim Toyne solution
Distinguish between engineering : Question A:Distinguish between engineering and public approach to defining acceptable risk?
Discuss how the use of standards such as variable naming : Discuss how the use of standards such as variable naming, the use of class diagrams, and good programming practices all contribute to both rapid program development and increased ease of maintenance
What other measures do you feel should be taken : How effective do you feel these and other measures are in protecting children from sexual predators online? What other measures do you feel should be taken? Are current laws sufficient for protecting children, or are additional laws needed?
The concept of protecting personal information : This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly use..
Identify the different collision and broadcast domains : Write a 700-word paper and a 1-page network diagram based on your Week Two Learning Team Collaborative discussion.Identify the different collision and broadcast domains on your network diagram. In your diagram, draw a green circle around each collisi..
Are there third party beneficiaries involved in contract : Create a scenario in which this contract would be used. Name the parties involved and give background information as to why this particular contract is being used. Are there third party beneficiaries involved in this contract? Who are they, and wh..
Cash flows and ifrs rules : Prepare Cannon Company's statement of cash flows for the year ending December 31, 2015 using the indirect method.Explain how the indirect statement of cash flows that you prepared would differ under IFRS rules. Assume this is a non financial entity.
Discuss some ethical issues faced in engineering design : Discuss some ethical issues faced in engineering design

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find the solution for the given initail value problem

find the solution for the given initail value problem y'' + 2y'+5y=4e^-t cos2t, y(0)=1, y'(0)=0:

  Construct the work breakdown structure

Construct the Work Breakdown Structure, define all of the activities and sequence these, schedule the project and then resource and budget the project using Microsoft Office Project.

  Information assurance processes

For Milestone Three, you will prepare and submit a three-slide presentation explaining information assurance needs includingrisks associated with non-adherence to information assurance processes, and countermeasures to mitigate risks.

  8-bit registers are there in the intel 80x86 cpu design

In total, how many 8-bit registers are there in the Intel 80x86 CPU design presented in class? Name one of these 8-bit registers.

  Test pseudocode by creating test plans and desk checks

Write down pseudocode for main menu. Write pseudocode for options, only code to navigate menu is required. Sketch flowchart for a main menu.

  Verify local police department-s findings on current case

Your computer investigation firm has been hired to verify local police department's findings on current case. Tension over the case is running high in the city.

  Write a circletype class

diameter and circumference Set c1's radius to 4 Display c1's radius, area, diameter and circumference Execute c1 = c1 + c2 Display c1's radius, area, diameter and circumference Display c2's radius, area, diameter and circumference.

  Report on explaining how to recover corrupt file

When you try to open the file in an image viewer, a message is displayed indicating that the file is corrupt. Write a 2-3 page report explaining how to recover the file, orkty.zip, for further investigation.

  Create a florida state information system

Create and use a Microsoft Access Database from which the program will retrieve the city information. Include 1 table with 5 fields per row, and 10 rows of data (cities).

  Describe the necessity of secure architecture

Describe the necessity of secure architecture in information systems

  Write the recursive function c++

write main program that uses the sumbits function to compute the number of bits in the unsigned long integer, and illustrates the work of the show bits function.

  What is the final value of loopcount

What is the final value of loopCount after control exits the following loo? loopCount = 1; NL while ( loopCount

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd