Final project

 

Research Project

Your Research Project on the surveillance state consists of two parts:

1 A Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. 

Artificial intelligence

 The topic  should include defects in software or impacts that said software has on society/users.  Tool reviews, marketing material/blogs, language/technology discussions and related topics are not allowed. 

The paper is to be 2-3 pages (single-spaced) in a 12-point font with 1-inch margins all around.  

IT ( a requirements analysis for an EDRMS (Electronic Documents and Records System)

You are asked to conduct a requirements analysis for an EDRMS (Electronic Documents and Records System) in a specific department at Marymount. Feel free to select a specific department at Marymount university , located in Arlington VA. Some examples are:

  • College of Business, Innovation, Leadership, and Design (BILT) Office
  • International Student Services Office
  • Registrar’s Office
  • Student Access Service
  • Center For Teaching and Learning
  • Admission and Enrollment services
  • Student Health Office
  • Student Account Office
  • Alumni Outreach Office
  • Financial Aid Office
  • Center for Global Education

Come up with 10 significant questions that need to be asked to ensure that you can build an effective and secure electronic documents and records system for the assigned department.

— In your initial post, first state which department you pick; then make a brief description of the context (e.g., what type of documents or records do they collect or create, how many documents or records are there, and how many staffs working for the department would be the users, etc.). Feel free to make appropriate  assumptions if no factual information can be obtained; and at last list 10 questions that can be used to elicit requirements of the EDRMS from users (e.g., department staffs, student workers, etc.).

–You also need to read at least two of your colleagues’ lists and write down your reactions (whether the list is complete, whether there is any important question missing, etc.).

good and not so good systems jan 23

Assignment Content

  1. We spent a large amount of time in class talking about “good” systems and “not so good” systems…and we saw some of the characteristics of each…and I am sure (at least I hope) that while we discussing it, you were thinking of systems that you think are good, and those that you think are not so good…

    So for this assignment, I want you to tell me one system that you think is good, and one system that you think is not so good…if it is a website, include the link…tell me SPECIFICALLY why you think the system is good or not so good…and tell me how you would improve on what they have…

    And I know your next question…how long does this assignment have to be?…well, I am not really into counting words…but just to give you some perspective, I would say that by the time you are done, you should have a least one full page and maybe two full pages…if you wrote half a page, you probably wrote too little…if you wrote 5 full pages, you wrote too much…as I always tell my classes – just write!…and before you know it, you will have 1 to 2 pages…

Construction -8 Dis

 

Choose a GUI program that you are familiar with. Discuss the features of the program from what you learn in chapter 9 that makes this program a very good GUI program in your own opinion.

Benchmark – Legal and Ethical Challenges of Cybersecurity

 Assessment Description

Cybersecurity policies and regulations should support not interfere with organization workflow, and ultimately provide the three most crucial components of security: confidentiality, integrity, and availability. That is, policies should support people doing their jobs. Successful security policy needs to demonstrate to employees the value of security, not just the requirement for security. Thus, establishing adequate organizational culture is important as it affects security structure and policy. In 750-1,200 words, discuss organizational factors in light of Christian worldview by answering questions below:

  1. How does trust grow in organizations? For example, in some organizations there is lots of trust at the base of the organization, but this trust does not necessarily rise up.
  2. When are employees comfortable with whistleblowing? Should technology have a function in extending the whistleblowing capabilities of employees?
  3. It seems reasonable to assume that all organizations have implicit tradeoffs about what is more and less important in their expressions of policy. How can these be made more explicit so that policy and security architectures can more effectively capture these values?
  4. Within an organization, while monitoring can help with technical aspect (such as access violations), it does potentially worsen behavioral aspects. Discuss the deciding factor of how much monitoring is acceptable both ethically and legally by examining the ideological foundation of the Christian worldview.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

Benchmark Information

This benchmark assignment assesses the following programmatic competencies:

MS Cybersecurity

4.3: Analyze the ethical implications of cybersecurity policies and regulations put in place to protect the Confidentiality, Integrity, and Availability of Intellectual Property (CAE KU 3, 7, 10, 11).