What you think should be done to resolve the privacy issue

Assignment Help Management Information Sys
Reference no: EM131325276

Assignment

First, submit your proposed topic for the opinion paper and turn this into me first so I can make sure the topic is ok. Provide the following:

Title of Paper (your topic)

Why this topic meets the requirement that the paper discuss one or more "Internet Privacy" issues.

Three different areas that will be discussed in your paper.

Submit a doc. A good place to look for Internet Privacy topics is https://www.eff.org. (Links to an external site.)

THEN, after I approve the topic, write it as a research paper on the topic itself, or a research paper with a theme of "for or against" the topic you choose. A "for or against" paper will still have research completed but will have research that gives support for, and research that gives support against your topic. In either situation the last paragraph will be your stance/opinion on the subject.

You must have the topic pre-approved by the instructor. Information on this is here.

The minimum word count for the paper is one thousand (1000) words. You must include a bibliography or list of references at the end of the paper. Follow APA guidelines for your paper

Your discussion of the issue must cover:

The Internet privacy/eithics issue;

Why the issue exists;

What is being done to address the issue, and

What you think should be done to resolve the privacy issue. (This is the final paragraph only)

Your paper will be graded based upon the 4 areas described above, as well as a portion (20 points) for the use of references, spelling, grammar, formatting and organization. Be sure to include a bibliography in your paper specifying the articles to which you refer in your paper. If you do not refer to an article in your paper, do not include it in the list of references. You must refer to those articles using APA citation format in the body of your paper. The reference section MUST also be in APA format. Wikipedia is not an acceptable reference.

You are encouraged to contact the CWU Writing Center for more information and assistance for writing your paper and formatting APA style.

A good place to start for ideas on your opinion paper is https://www.eff.org (Links to an external site.). and this list.Preview the documentView in a new window Also, the Cyberethics textbook contains a number of privacy issues that you might address in your paper. Be sure to look at the format of the included example of a well- written opinion paper listed below.

Reference no: EM131325276

Questions Cloud

Determine the training requirements of the organization : Describe the components of a needs assessment used to determine the training requirements of the organization. Explain the importance of developing learning activities, be sure to incorporate adult learning principles and methods of experiential le..
What is responsibility of tcp part of tcp-ip protocol suite : What is the responsibility of the TCP part of the TCP/IP protocol suite? (Comprehension) What is the responsibility of the IP part of the TCP/IP protocol suite? (Comprehension)
Opportunity to apply career management theory : The purpose of the Career Management paper is to provide you the opportunity to apply career management theory to enhance an organization's effectiveness
What is the point of view in fitzgerald : What is the point of view in Fitzgerald's "Babylon Revisited," and what difference does it make?
What you think should be done to resolve the privacy issue : Why the issue exists; What is being done to address the issue, and What you think should be done to resolve the privacy issue. (This is the final paragraph only)
What is loiss current state of mind : In Atwood's story, what is Lois's current state of mind? In your opinion, why is she still seemingly obsessed by an event that occurred when she was a child?
Explain the steps that would reflect triangular arbitrage : Given this information, is triangular arbitrage possible?- If so, explain the steps that would reflect triangular arbitrage, and calculate the profit from this strategy if you had $1,000,000 to use.
How does the radio function as a metaphorical narrator : How would your reaction to "The Short, Happy Life of Francis Macomber" change, if Francis Macomber had told the story in first person?
Implement the unsigned multiplication subroutine unsmul : Implement the unsigned multiplication subroutine UNSMUL. The algorithm requires double-word shifts: ShiftRight(ACC:MPR). You must solve a bit carry-over problem since the double-words are stored as two single words.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain the various aspects of cp

You are now in the phase of developing a business continuity plan (BCP) for an organization. Describe the basic activities that must be managed by the BCP. Develop plans for alternate site relocation, and develop an estimated monthly budget for th..

  Explain the human implications of advancing audio visual

Explain the human implications of advancing audio visual - Explain how the five models or theories of change could address these human implications

  Ability to create new knowledge

How do you know that you have captured the right data - the nature of success is tied to the ability to create new knowledge, what skills are needed by the people in my organization to succeed?

  How does data leakage occur in an organization

The focus of the research paper is Data Leakage. How does data leakage occur in an organization? What are the common causes of this problem? How would use address this troublesome trend

  Strategic supply chain management

How does Core Discipline 4 apply to your current or previous workplace and Does it characterize the organization?

  Compare client-server computing and cloud computing

Assess the significance of protocols and standards in computer systems. Determine one (1) standard and one (1) protocol that you believe to be the most important ones utilized today. Provide a rationale for your response.

  Does the statement mention the research site

Does the statement identify the research approach (quantitative, qualitative, or mixed)? Does the statement clearly state the intent of the study? Does the statement mention the participants?

  Describe the key components of a data communication system

Describe the key components of a data communication system. Next, discuss the overall manner in which a company uses data communication in order to reduce its operations cost.

  Importance of a systems development life cycle

Assess the importance of a systems development life cycle as it pertains to both the development of a custom application, coupled with the selection of proprietary systems. Provide an example to support the response

  Question about it infrastructureuse of information

question about it infrastructureuse of information technology within a typical bankassess the organizations it

  Find the capacity of the channel

‘The binary erasure channel has two inputs and three outputs as described in Figure.- Find the capacity of the channel.

  Describe at least five needed internal control improvements

Describe at least five needed internal control improvements. What makes point-of-sale systems different from revenue cycles of manufacturing firms? Give three examples of Access Control in a Point-of-Sale (POS) system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd