See attached
Ethical IT Design
You have just completed 10 weeks of a course on information technology ethics. Imagine you have been asked to create a one-day training course titled “Ethical IT Design and Development.” The course will highlight the important elements of what you have just learned in the past 10 weeks.
- Create a hierarchy of five of the most important and relevant topics you feel need to be addressed in the one-day course.
- Provide a detailed rationale for each of the five topics.
REPLY TO GRISMELDY
Hello professor and class,
1. what are ethical policies, Procedure, and guidelines within an IT organization; Ethical Policies; are a set of guidelines for all employees to do what is right and behave at a specific standard; it also encourages moral conducts defining the culture of a company. Furthermore Standards policies; require a set of rules, these are the rules that govern a company, moreover Procedure; provides the how, providing step-by-step instruction for a specific routine task, sometimes there is a checklist or a series of steps for the employee to follow and lastly guidelines; can be a general, often non-mandatory recommendation, and they can provide better ideas on how to proceed with a specific situation. Understanding the difference can help a company have a strong culture.
2. protecting an organization’s proprietary data, trade secrets, and customer data; companies may require a confidential agreement; also, some of the security controls would be to Identify and prioritize personal information, determine appropriate access, and provide access to employees who need this information to perform their job. Finally, the company can complete the risk assessment. Many businesses are using cloud services to share data with other organizations and safeguard confidential information.
3. protecting identifiable information (PII); some consumer protection laws safeguard identifiable information, such as Health Insurance Portability and Accountability Act (HIPAA), requires the consent of the patient to disclose someone’s medical information being that someone’s medical record is personally identifiable information, Electronic communication act protects communication such as email, telephone conversation, and data store electronically in someone’s computer. Someone carries inside their device personally identifiable information, and Children’s online privacy protection requires websites not to collect or share personal information for a child under 13 years old.
4. what is artificial intelligence (EI); artificial intelligence (AI) is here to help us, not replace us; AI will eliminate specific job categories that are simple—creating other job categories that will enable a person to use their full potential and helps the overall economy.
5. social engineering and social media; social engineering is a method use to exploit human errors to obtain private information, access or valuables in other words these group of people can be call human hackers they tend to lead other to believe that they are someone that they are not in order to have the other party expose data, on the other hand social media is just a platform of communication where people can have a sense of community and also keep up with what others are doing, it is important for a company to set guidelines regarding the use of social media for work also provide the employee the necessary trainings to identify social engineer.
OTHER 5 TOPICS .
Management Information Systems (MIS) is a formal discipline within business education that bridges the gap between computer science and well-known business disciplines such as finance, marketing, and management. In spite of this, most students will only take one or two MIS courses as part of their undergraduate program.
2.MIS basics- Hardware, Software, and securities mentioned in the course introduction, much of MIS is now centered on technology. Accordingly, MIS capabilities are mostly limited to the hardware and software capabilities of a given system. Ten years ago, the average Internet user could download an MP3 music file in a few minutes over a cable. This can now be done in seconds wirelessly from just about anywhere in the developed world thanks to improvements in hardware and software.
3- Information System and Organization Strategy
Strategic MIS is the application of information management in the overall strategy of a business. Many corporations include a Chief Information Officer (CIO) in executive management to implement information systems to be more competitive. What good would it do for Apple to create an iPhone application that can tell where you are and serve you ads based on location?
4- Information System Development
Businesses have diverse needs. While software packages for managing information exist, most software is not “plug and play” ready for most business applications. IT departments, in conjunction with representatives from all lines of business, must work together to develop and implement information system solutions.
5- Information System in Society and the world
Information systems’ reach extends well beyond the world of business. Today it is nearly as easy to communicate with someone on the other side of the world as it is to talk to someone next door. New technologies create situations that society has never dealt with before. How do we handle the new capabilities that these technologies enable? Will societies need new laws, new social mores, to protect us from ourselves regarding technology?
Research Paper
Your task this week is to write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.Your paper should meet the following requirements:
- Be approximately five to six pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
WEB DEVELOP PROJECT
Objectives
• Review of the HTML and CSS skills learned until this point.
Basic Requirements
• Properly use and indent all tags.
• Set up page with ,
• The page should contain your name in the
Assignment
1 page
Read chapter 32 , online resources and reputable articles/journals AND:
Choose an organization that you are familiar with, for example a university, place that you are working for or any other organization and write 1 page and describe your plan and proposal for a comprehensive Disaster Recovery and Business Continuity plan.
List all your references/resources.
Discussion 6
read the instruction
Final paper
Write your Final Project paper that requires the student to find a current case of an organization/brand/company who is either (a) engaging in a positive social responsibility campaign or (b) acting in a manner that is ethically questionable. The paper should include the following:
- Introduce the organization
- Outline the the issues involved in the case
- Document the Strategic Communication Tactics used in the case.
- Offer perspective on the behaviors in the case and its effect on stakeholders and society in general.
- Provide a conclusion
- Assignment Format: MS Word Document; APA format
Length: 10 pages (Not including the Title or Reference Page)
Citations Required: Minimum 5 Scholarly or Professional References
Assignments- Big data , Text processing
1.Write at least 500 words in APA format discussing how to use sentiment analysis how political speech affects voters. Use at least 3 references in APA format.
2.Read the below article(link below) on statistics for categorical variables. Write at least 500 words in APA format discussing how to use these statistics to help understand big data.
Link: https://uc-r.github.io/descriptives_categorical
Study skill 2.2
Please complete excel attachment by following instructions given
Database – Discussions
Create a discussion thread (with your name) and answer the following question(s):
Discussion 1 (Chapter 23): What are the main reasons for an potential advantages of distributed databases?
Instructions: Your response to the initial question should be 250-300 words. Next respond to two postings provided by your classmates. The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often. You are require to create your initial thread in order to view and respond to the threads posted by other students. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post as needed. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.