Coursename Legal Regulation Compliance Investment

Your fictitious company must create a privacy policy document between five to six total pages (all pages in your file will count toward the limit). The document shall include an introductory section, such as an “Executive Summary,” a “Preamble,” or an “Introduction.”

The document shall also include policy statements. The policies need to focus on governing your company and its employees. You need to give evidence in the policy section of your knowledge gained in this course.

Example Document is attached

Ethics 19536539

 

CSCI 415 Ethics, Law and Cybersecurity

Chapter 7 Quiz

NAME:___________________________                            DATE: ____________

Chapter 7 – Quiz 7

Instructions:  There are four (4) topic areas listed below that are designed to measure your knowledge level specific to learning outcome (LO 7) shown in your course syllabus.  You must respond to #3 and select any other two of these topic areas providing appropriate responses in essay form.  In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate.

Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text.  Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. 

You may type your responses directly under the appropriate question.  Be sure to include the question you are responding to and your name on the quiz.  Only the first three (3) questions with answers will be graded.   Include your name in the document filename. Your completed quiz must be placed in the appropriate Dropbox, no later than 11:59pm on the due date.   Do well.  Using argument components discussed in Chapter 3, assess arguments for and against the use of biometric technologies for security, especially in airports and large stadiums. (a) Should biometric technologies such as face-recognition programs and iris scanners be used in public places to catch criminals? Since 9/11 there is much more support for these technologies than there was when biometrics were used at Super Bowl XXXV in January 2001. (b) Granted that such technologies can help the government to catch criminals and suspected terrorists, what kinds of issues do they raise from a civil liberties perspective? (c) Compare the arguments for and against the use of biometric technologies in tracking down criminals to arguments discussed in Chapter 5. (d) Do you support the use of biometrics in large, public gathering places in the United States? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension) In looking at the case of Internet entrapment involving a pedophile that was discussed in this chapter (a) which arguments can be made in favor of entrapment or “sting operations” on the internet? (b) From a utilitarian perspective, entrapment might seem like a good thing because it may achieve desirable consequences, but can it be defended on constitutional grounds in the United States? (c) Justify your position by appealing to one or more of the ethical theories described back in Chapter 2. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension) (a) Are the distinctions that were drawn between cyberspecific and cyberrelated crimes useful? (b) Why would cyberstalking be classified as a cyberrelated crime, according to this distinction? (c) Among cyberrelated crimes, is it useful to distinguish further between cyberexacerbated and cyberassisted crimes? (d) Why would cyberstalking be categorized as a “cyberexacerbated” rather than a cyberassisted crime? (e) Why not simply call every crime in which cybertechnology is either used or present a cybercrime? (f) Would doing so pose any problems for drafting coherent cybercrime legislation? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension) (a) What implications does the conviction of the four cofounders of The Pirate Bay Web site (in 2009) have for international attempts to prosecute intellectual property crimes globally? (b) Should the four men also have been required to stand trial in all of the countries in which copyrighted material had been downloaded from their Web site? (c) Will the outcome of The Pirate Bay trail likely deter individuals and organizations, worldwide, from setting up future P2P sites that allow the illicit file sharing of copyrighted material?  Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

Grading Rubric for Quizzes

Grading criterion                                                                                          Unit Points           Total Points

Uploaded to correct Dropbox                                                                            2                            2

Submitted on time                                                                                            15                          15

Document Filename:

Your Last Name,first and middle initial with correct quiz number                   5                            5

(Example only: Creider_RD_q1)

Rationally expressed opinions, experiences (personal or observed),                  8

arguments and premises (where appropriate) to support responses

(did not simply restate/summarize author/textbook

Clearly presented classical ethics theories relative to topic                                8

Included ‘URL’ for appropriate verifiable current event                                 12                          28

(i.e., example of topic being discussed WITH EXPLANATION)

 NOTE: Must be less than 4 years old

Grammatically correct and appropriate tone                                10

(professional, non offensive language)

Typographically correct                                                               10                     20

Included full citations as needed                                                    3

Used correct APA format                                                               7                     10

Addressed each item within selected topic area                           20                     20

Maximum grade                                                                         100                   100

NOTE: POINTS WILL BE DEDUCTED FROM TOTAL ASSIGNMENT GRADE IF EACH QUESTION YOU SELECTED IS NOT INCLUDED IMMEDIATELY BEFORE EACH ANSWER.

Global Economy 19667009

  

Read about entrepreneurship in a global economy, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

• Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s strategy for staying global if it is.

• Research other company’s strategy for going global and explain if this will or will not work for your company. 

Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

• Be approximately four to six pages in length not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Operational Excellence 4 1

 Note: Plagiarism should be less than 20% and a minimum of 2 APA references with in-text citations. I need the Answer by Sunday 9:00 am EST(3/29/2020).

you should refer to the following open-textbook link or the pdf in the attachment and prepare the answers for the below questions. you can find the study questions and exercises at the end of the chapter for both chapter 7 and chapter 8.

Open textbook link:   https://opentextbook.site/informationsystems2019/ 

Please answer the study questions from 1-10 in both chapters 7 and 8 and also Exercise 2 from both 7 and 8 chapters.

Chapter 7:

study questions 1-10

Exercise 2

Chapter 8:

study questions 1-10

Exercise 2

Data Mining Discussion6

 

Financial services are experienced by consumers and businesses. This may be with a checking or savings account, credit cards, loans, and other offerings. With all of these services available, there is a level of financial fraud that occurs. This may be with credit card charges not done by the credit card holder, fake checks, or other issues. In analysis, these would be an anomaly or outlier.

For the discussion question, please choose a form of financial fraud a consumer may experience and an approach or method the bank may to detect this. 

Security Policies 19480135

There are three types of security policies whch an organization or company must define including an Enterprise Information Security Policies (EISP), Issue-Specific Security Policies (ISSP), and Systems-Specific Security Policies (SysSP). Please conduct an Internet search, define each in your own words citing any sources used in APA format, and provide real-world examples of all three types of security policies. A minimum of 5 sources and two pages are required.

Business Strategy 19479121

 Why is it important for business strategy to drive organizational strategy and  Information Systems strategy? What might happen if the business strategy was not the driver?  

Please make your posts are substantive. A substantive post will do at least TWO of the following: Ask an interesting, thoughtful question pertaining to the topic Answer a question (in detail) posted by another student or the instructor Provide extensive additional information on the topic Explain, define, or analyze the topic in detail Share an applicable personal experience Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA) Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.

Business Information Systems 19584283

1.  Prepare a one page paper on Web mining. You may research the internet for more information.

Please double space your paper and cite your sources. ( 350 words)

2.  Type a one page paper explaining why a project manager would use Gantt and PERT charts to ensure a project is performing as expected. Please double space your paper and cite your references. ( 350 Words)

3.  Watch the following video:

(OLD VERSION) Intro to Agile Scrum in Under 10 Minutes 

Then type a one page (minimum) paper answering the following questions. 

Why would a company want to use SCRUM to develop software?

Why would you as a student benefit from learning about SCRUM?

Please double space your paper and cite any additional sources  you may use. (350 Words)
 

Emerging Security Threats National Disaster Recovery Effectiveness

Evaluate the National disaster recovery effectiveness based on case studies from the text or recent news stories and make recommendations for improvements based on your research. This essay should have a minimum of 500 words and follow the below guidelines.

Minimum APA formatting guidelines: 12-pt, Times New Roman font Double-spaced 1” margins on all sides Please provide a title page including your Name and Assignment name. Paraphrasing of content – Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally. Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines. If you need guidance or a refresher on this, please visit: https://owl.english.purdue.edu/owl/resource/560/10/ (link is external) Be sure to include at least three (3) reputable sources. In-text citations – If you need additional guidance, please visit: https://owl.english.purdue.edu/owl/resource/560/02/

Reflection2

Reflect on the connection between knowledge or concepts from these courses and how those have been, or could be, applied in the work place ( you should write a total of 400-500 words).

Courses:

Access Control (ISOL-531-04)

Applied Learning Practicum (INTR-599-12)

Info Security & Risk Mgmt (ISOL-533-42)