What are privacy laws related to information technology use

Assignment Help Management Information Sys
Reference no: EM131561837

Research Paper Using Word

This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly incorporate citations and references in APA format. Students may use the tools and techniques within Word to format the research paper, including use of the References and citation tools. These skills will be valuable throughout a student's academic career. The paper will require a title page, NO abstract, three to four full pages of content with incorporation of a minimum of 3 external resources from credible sources and a Works Cited/References page. Wikipedia and similar general information sites, blogs or discussion groups are not considered creditable sources for a research project. No more than 10% of the paper may be in the form of a direct citation from an external source.

A list of topics from which students can choose is provided below.

Topics for Research Paper

1. Social Engineering - what it is, how it is used, and potential positive and negative impacts on individuals and on society
2. Employee Monitoring - why and how it is used, the legal issues surrounding its use, and impacts on employer and employee
3. Biometrics - various implementations and the ethical and privacy issues related to the use of biometrics
4. Use of Cookies - what they are, how they are used, and potential positive and negative impacts
5. What are the privacy laws related to Information Technology use and how do they impact you personally?
6. Intellectual Property Rights; issues related to copyright, fair use, copyright infringement, and the potential personal and financial impacts
7. The Edward Snowden case - the dilemma between the "Official Secrets Act" versus a perceived duty to share versus the damage it may do to national security.
8. The Apple vs. FBI controversy over unlocking the iPhone

If there is another topic that addresses ethical issues as related to information technology that is of special interest to you but one that is not in the list above, request permission from your instructor before selecting this alternate topic.

Writing Quality for the Research Paper

* All Grammar, Verb Tenses, Pronouns, Spelling, Punctuation, and Writing Competency should be without error.

* Be particularly careful about mis-matching a noun and pronoun. For example, if you say "A person does this..." then do not use "their" or "they" when referring to that person. "Person" is singular; "their" or "they" is plural.

* Remember: there is not their, your is not you're, its is not it's, too is not to or two,site is not cite, and who should be used after an individual, not that. For example, "the person WHO made the speech" not "the person THAT made the speech."

* In a professional paper one does not use contractions (doesn't, don't, etc.) and one does not use the personal I, you or your. Use the impersonal as in the previous sentence. It is more business-like to say "In a professional paper one should not use contractions," rather than saying, "In a professional paper you don't use contractions."

*Remember: spell-check, then proofread. Better yet, have a friend or colleague read it before submitting it. Read it out loud to yourself. Read it as if you are submitting it to your boss.

Reference no: EM131561837

Questions Cloud

Should the death penalty continue to be used : Given what you've learned in this chapter, should the death penalty continue to be used as a means on punishment?
Describe shortly the disorder and list the main symptoms : Describe shortly the disorder and list the main symptoms. What is thought to be the possible cause of the disorder
What fraction of the large conduit is occupied : The cross section of a large circular conduit has seven smaller equal circular conduits within it. The conduits are tangent to each other as shown in Fig.
What your thoughts regarding the process of enculturation : What are your thoughts regarding the process of enculturation for US children today compared to the enculturation process of children some 40 years ago
What are privacy laws related to information technology use : What are the privacy laws related to Information Technology use and how do they impact you personally? The Apple vs. FBI controversy over unlocking the iPhone.
Review concepts related to threads : To review concepts related to threads. Modify this code so that the method instead waits until it has been notified that a new task has been created.
What is the relationship between thinking and language : What is the relationship between thinking and language? What is the value of thinking in images
Find the area of the window : Find the area of the window outlined by semicircular regions as shown in Fig.
Explain what is the core of ethics according to j rachels : According to the following moral issues- Explain what is the core of ethics according to J. Rachels

Reviews

Write a Review

Management Information Sys Questions & Answers

  What is privacy in an information security context

What is another name for the Kennedy-Kassebaum Act (1996), and why is it impor- tant to organizations that are not in the health care industry? ?If you work for a financial service organization such as a bank or credit union, which 1999 law affect..

  Discuss issues and concerns about use of portable devices

Security and Mobile Devices: Discuss issues and concerns about the use of portable devices such as tablets, smart phones and laptops

  How the it security landscape has evolved over the last year

You have been a system administrator for 15 years, and you have seen your role evolve and change. This evolution of information technology (IT) has resulted in IT security being a top priority in Enterprise support. When you first started in this ..

  Explain how do you adapt a corporate-wide system

Explain How do you adapt a corporate-wide system, such as ERP, for your department leaders

  Research a news article dealing with white collar crime

Research a news article dealing with White Collar Crime

  Explain which functions have a negative stereotype

Are there IT functions that should never be outsourced? Explain which functions those are and why you think outsourcing is not an option why does outsourcing have a negative stereotype

  Determine the legal compliance issues within organization

Analyze the ethical issues and determine the legal compliance issues within organization as well as the social and cultural impacts of these compliance issues.

  Provide brief introduction that describes case study report

CIS5308 - IT Service Management - S1 2016 Report Assignment. Explain why is it important for NNIT to have effective processes in place to manage IT services

  Criteria for an agile company

How does the Wikimedia Foundation meet the criteria for an "agile" company and how does the Wikimedia Foundation meet the criteria for a "virtual" company?

  Which statements is true about electronic commerce

Which of the following statements is true about electronic commerce? Companies following a __________ business strategy choose to operate solely in the traditional physical markets, approaching business activities in a traditional manner.

  What can business unit managers do about performance

1.how might cultural political or geo-economics challenges affect a global companys use of the internet? give several

  Using a smart card and entering a pin

User authentication is controlled by Windows 2008 Active Directory and users must authenticate by using a smart card and entering a PIN. Discretionary access control methods are in use.List and assess three security threats faced by the information t..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd