What responsibilities do corporate entities have

Assignment Help Management Information Sys
Reference no: EM132098312

DISCUSSION POST.

Prepare a 300-word Group discussion post in response to the following: The authors of "The Virtue of War" assert that the government has a responsibility to protect their citizens (i.e., the people of God) from unjust internal and/or external aggression.

What responsibilities do corporate entities (e.g., Target, Bank of America, Google, etc.) have? What is this based on?

What options are available to them, and what legal restrictions hamper them?

What issues prevent their more fully cooperating with the Federal government? Your response should reflect information you synthesized from this week's readings.

WEEKLY PAPER.

Choose a topic for your Final Paper, and complete the Week 1 assignment: Explain why you selected the topic and include a theological statement. (250 - 350 Words)

Some suggested topics are listed here, but you may propose others as well:

The potential impact (positive, negative, both) of cybercrime (or cyber espionage, or cyber warfare) on society, the economy, or on Christianity.

Long-term implications of the increasing dependence on constant and immediate interconnectedness (i.e., use of smart phones) on families, society in general, the economy, or Christianity.

Long-term implications of the increasing dependence on technical oligarchies (Google, Amazon, Facebook, etc.) on society, the economy or Christianity.

Final Project - There is a research paper for this course. We will work on the sections of this paper in our weekly assignments. APA format will be followed for all writing submissions.

The topics to select from are provided as questions starting in the Course Schedule section of this syllabus.

For this assignment, the student is to select one topic, and then for the next seven weeks write and research about the topic selected. You may select a topic from those listed, or propose a different topic.

Each week, you will work on the assignment building out the paper. At the end of seven weeks, you will have a research paper which you will submit for the eighth week in a Word Document.

You are to provide citations and have a minimum of 2 citations per week. These citations must be from peer-reviewed works (Journals, Books, Government/Industry Papers, Master's and Doctoral Dissertations).

Here are weekly assignments for the Final Paper items to address for each week:

Week 1 - Select your topic. Explain why you selected the topic and include a theological statement. (250 - 350 Words)

Week 2 - What are the key issues about the topic you selected? (250 - 350 Words)

Week 3 - Discuss your topic as it relates to the role of the US government. (250 - 350 Words)

Week 4 - Discuss your topic as it relates to the responsibilities of the individuals who are involved in creating the technology. (250 - 350 Words)

Week 5 - Discuss your topic as it relates to the role of the corporations involved in creating the technology. (250 - 350 Words)

Week 6 - Discuss your topic as it relates to the behavior of individual bconsumers. (250 - 350 Words)

Week 7 - What are the most serious future issues to be concerned with babout your topic? (250 - 350 Words)

Week 8 - Finalize your paper, develop an introduction and conclusion for the bpaper. Check for APA correctness, reference page, and grammar. Submit byour paper. (2,000 - 2,500 Words)

Required Reading:

"Virtue of War", Chapters 2, 6

"Terrorism & Its Civilized Discontent "

"Opinion: Why distinguishing moral injury from PTSD is important "

"'Cybervandalism' or 'Digital acts of war'? America's muddled approach to cyber incidents won't deter more crises "

"White House says US will retaliate against Russia "

"What Options Does the US Have After Accusing Russia of Hacks "

"The DoD Cyber Strategy " - Introduction section

"US Still Has No Definition for Cyber Act of War"

"Military, Feds train alongside private companies to defend American infrastructure from cyber threats"

"Inside the Pentagon's secretive preparations for a 'cyber 9/11 "

"U.S. Cyber Command Chief on What Threats to Fear the Most "

"Pentagon Mobilizes Military Hackers Against Islamic State "

"Command and Control Vulnerabilities to Communications Jamming "

"NATO Weighs Making Cyber Wartine Domain"

"Cyberspace: A new front-line fight for NATO "

"Russian government hackers penetrate DNC; steal opposition research on Trump "

"Iran-Saudi tensions erupt in 'cyberwar' "

"Cyber-Allies: Strengths and Weaknesses of NATO's Cyberdefense Posture "

"Does God Do Cyberwarfare? "

Reference no: EM132098312

Questions Cloud

When initiating social media campaign : The first action a marketing team should take when initiating a social media campaign is:
Summarize the article-designing team and team identity : Using the Internet, each member of your team should read at least 3 academically reviewed articles on designing. Summarize the articles in 300 words or more.
Discuss how the product worked through the technology cycles : Discuss how the product worked through the technology cycles as is shown attached example for the progression from VCRs to DVD players to BluRay players.
What is the most important aspect of the web : To begin discussing in this forum, click the PC Chat Forum title below, which navigates to the discussion forum. Then, click Reply at the end of each message.
What responsibilities do corporate entities have : What responsibilities do corporate entities (e.g., Target, Bank of America, Google, etc.) have? What is this based on?
Write report on a difficult international business situation : Identify a media article that you will analyse. It should report on- a difficult international business situation and involving cross-cultural management issues
Create the tables and relationships from the database design : Create the tables and relationships from the database design discussed in Lab 2. Create a query with all fields from the student table, where the student's.
Discuss why variable pay-for-performance plans : Discuss why variable pay-for-performance plans have become popular and what elements are needed to make them successful.
Convert the amounts back into aud and print the total sum : HIT137 : Write a program that will allow you to enter two or more amounts of foreign currency and their associated exchange rate.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Differences between data warehousing vs data miningdescribe

differences between data warehousing vs. data miningdescribe both data warehousing and data mining. how are they

  Which is true in regard to consumer spending of money online

Which of the following is true in regard to consumer spending of money online? Online reviews and expert opinions are successful in influencing consumer purchases of what type of goods?

  Create a diagram of a virtual server environment

In this assignment, you will have the opportunity to create a diagram of a virtual server environment. How the virtualization system works?

  Infomation technologhy system management in hsc

Write a brief report on the given topic"Infomation Technologhy System Management in HSC"The research concentrates on the application of Information Technology Management System in HSC. The initial phase starts with the introduction to HSC and need fo..

  Develop an it risk assessment opinion

Develop an IT Risk Assessment opinion from both a bottom-up perspective of assessing controls, threats and vulnerabilities, and translate these findings into business risk language.

  Analyze the steps involved in building a strategic plan

Analyze the SWOT and FIVE Factors Analyses and determine which would be more valuable from a marketing perspective. Provide specific examples of how you could use the results of either analysis to support informed marketing efforts.

  Why do virtual memory systems include a modified bit

Why do virtual memory systems include a modified bit in the page table entry?

  Describe six items that an organizations it should consider

Describe at least six items that an organization's IT / IS department should consider when an organization's strategy calls for the use of SaaS, PaaS, or IaaS.

  Evaluate relative risks involved at each stage of a systems

Evaluate the relative risks involved at each stage of a systems development project (or within the different activities of a rapid applications development project) and suggest techniques that can be used to control these risks.

  When should a firm purchase its it services from the cloud

The Case Assignment for this module involves thinking systematically about the IT services movement in general and about cloud computing as a particular instance of that approach. You'll start by reading a number of sources discussing both of thes..

  Develope an information system for an organization

Explain how a business user could be involved in the core activities of building an information system.

  Identify challenges that may arise

Identify one security risks and one possible security assurance methods that would mitigate these risks.Identify challenges that may arise.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd