Information Security Standard or Compliance Law

Decide on an Information Security Standard or Compliance Law that is applicable to your fictional organization that is just big enough to have a Chief Technology Officer. Explain to your CTO what the rule/law is and what your organization needs to do to ensure compliance. Feel free to vibrantly describe what can happen if you don’t comply. It’s okay to strike fear into the CTO by referring to examples of punishment for non-compliance, even if those are merely in the court of public opinion.

You can use any type of communication that you feel is appropriate, whether that is a letter, memo, slide deck, infographic, interpretive dance, etc.

You should assume your CTO is technical and communicate accordingly. Remember that CTOs can be either women or men and have names other than “Dear CTO” 🙂 Pretend letterhead is always a worthwhile investment of time.

Emerging Technologies Research Paper

Subject:  Emerging Technologies 

Book: Technology Ventures: From Idea to Enterprise 

Research project in stages throughout the course, to include:  selecting a topic, submitting an abstract/outline, and submitting final project (paper) for evaluation.  Must support work by using at least six appropriate, properly cited sources in addition to your course textbook. Project (paper) will comprise 3000 to 3500 words (not including title and reference pages).  

1st need  project abstract/outline

2nd research paper 3000+

Project (paper) must be formatted according to APA guidelines as a Word document, double spaced, Times New Roman, 12-font, with one inch margins.

Question:

Many new clean tech ventures have relied on funding and partnership from established corporations. Select a recently funded clean tech venture with corporate venture involvement. Did the funding impact the structure of the new venture? What does the new venture expect to gain from the backing by the larger corporation? What does the larger corporation expect to gain from being involved in the new venture?

Sheets

Sub Sheets needs to be done as following
# 4&5 Adjusting Entries
# 6 Adjusted TB
#7 Financial Statements

Scholarly Abstract Assignment

 

Create a 1-2 page single-spaced Analysis of Research abstract published scholarly articles related to a topic you selected in 2.2. (topic  cybersecurity)

Brevity and being concise are important as this analysis is intended to be a brief summation of the research.

Each abstract must therefore consist of the following in this order:

1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name and qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data (surveys, tests,interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

Additional information on writing scholarly abstracts can be found via this link

See completed example