Policy, Legal, Ethics

  

1) You are the web master of a college website. You share a server with other school departments such as accounting and HR.Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security. your own work and use your own words.  Write min of 300 words.

2) Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  Write in essay format not in bulleted, numbered or other list format. Discuss in 500 words your opinion, Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraph.

3) Answer below questions, each of these questions in a paragraph with at least five to six sentences.Include the question and number your responses accordingly. Min 1 citation for EVERY question and it needs to be referenced. References & citations should be less than 6 years old. They also need to be an academic source something from the library or scholar Google not just any random website. It must be a peer reviewed academic source or an industry recognized type reference. Make sure your citations and your references use proper APA formatting if you are unsure consult the OWL website. 

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Wroting parposal

Create a 1-2 page single-spaced Analysis of Research abstract published scholarly articles related to your mock dissertation topic/research question. 
Brevity and being concise are important as this analysis is intended to be a brief summation of the research.
Each abstract must therefore consist of the following in this order:
1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.
2. Author Qualifications – name and qualification of each author conducting the research
3. Research Concern – one paragraph summary of the reason for the overall research topic

Exploring Multiple Levels of Dependencies

 

In this Task,  we want to explore the dependencies of a project. The steps to follow are:

  • Download the “OWASP Juice Shop” project source code and extract the zip file.
  • Browse to http://npm.broofa.com.
  • Find the “package.json” file in the Juice Shop source code and upload the file to the tool for analysis.

Observe the generated dependencies tree for this application. Note that there may be more than one path to a particular dependency; there are different levels of dependencies for a module to work. Use this dependencies tree as a sample and discuss how having multiple levels and paths of dependencies can affect the security of an application. Also, what do you think about remediation challenges in an application with a complex dependencies tree similar to this example?
write your analysis,/ Not more than One page/ 

IT345 Week 6 discussion

 Pick a topic below and post your reply. Your response should be at least 500 words and appropriately cites your resources. 

 

Topics:

  • What jobs have been eliminated due to technology? What jobs have been created?
  • Do automated systems mean fewer jobs for high-skilled workers?
  • Would you want to telecommute? Why or why not? Is it a viable solution for all employers?
  • Is hacking that does no direct damage a victimless crime? Give an example to support your case

Operational Excellence: Information Systems for Business and Beyond Study Questions.

Chapter 12 – study questions 1-11, Exercise 1 & 2

Study Questions:

  1. What does the term information systems ethics mean?
     
  2. What is a code of ethics? What is one advantage and one
    disadvantage of a code of ethics?
     
  3. What does the term intellectual property mean? Give an
    example.
     
  4. What protections are provided by a copyright? How do you
    obtain one?
     
  5. What is fair use?
     
  6. What protections are provided by a patent? How do you obtain
    one?
     
  7. What does a trademark protect? How do you obtain one?
     
  8. What does the term personally identifiable information mean?
     
  9. What protections are provided by HIPAA, COPPA, and FERPA?
     
  10. How would you explain the concept of NORA?
     
  11. What is GDPR and what was the motivation behind this regulation?
     

Exercises :

  1. Provide one example of how information technology has created an ethical dilemma that would not have existed before the advent of I.T.
     
  2. Find an example of a code of ethics or acceptable use policy related to information technology and highlight five points that you think are important.
     

Computer Science

 

Before you begin writing your research question, it is first important to craft a purpose statement. What can be a purpose of your study?

Examples of a purpose for a quantitative study include:

  • Examining a relationship between students who take computing classes in high school and those who pursue computer science as a major in college,
  • Evaluating the effectiveness of an outreach activity among underrepresented students, or
  • Measuring engagement or interest in computing among middle school students.

Examples for a qualitative study include:

  • Exploring parent stories about helping their students with computing homework or
  • Developing a theory of effective management techniques in a computer lab.

Once you define the purpose of your study, you can then create a clear purpose statement. Purpose statements help you define your research in a straightforward manner. Here is an example of a well-defined purpose statement.

The purpose of this study is to examine the relationship between the completion of an 9-week computational thinking unit among 7th and 8th grade students in a rural middle school and student achievement on mathematics exams.

This purpose statement explicitly answers these questions:

  • What is the intent of the study?
  • What population group is targeted in the study (i.e., age, location, etc.)?
  • What was the intervention (activity or curriculum), including its duration?

After you have decided on the purpose of your study and have written your purpose statement, you can then craft your research question.

Writing a Well-crafted Research Question

Research questions provide an overarching direction for your study to follow. It guides the type of study you will choose, the type of data you will collect, and the type of analysis on the data that you will perform.

Writing good research questions, then, is an important step in framing your study. What makes a good research question? Research questions should be clear, concise, specific, neutral, and focused. They should also be complex enough that the question requires more than just a “yes” or “no” answer. An example of a thorough research question for a quantitative study follows:

Does guardian understanding of computational thinking affect student performance on computational thinking tasks among primary school students in an urban school district?

For a qualitative study, a thorough research question may look like this:

What are the major challenges teachers face when teaching computational thinking to Kindergarten, 1st grade and 2nd grade students in the United States?

Logical Database Design

 If your boss asked you to create a  database that integrated logical design best practices, what are the  three most important features you would integrate in your end solution?  Remember to not only just state them, but explain why and show examples.  Don’t repeat the same examples of others. That constitutes cheating. 

Instructions

  • This is a required assignment, worth 15 points. The assignment  must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of  others. Use in-text citation and list the reference of your supporting  source following APA’s style and formatting. Points are deducted per the  rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet  and claim that is your work. It will be considered Plagiarism and you  will receive zero for your work. A second offense results in a zero for  the course. A third is termination from the university.

policy

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry? 

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam? 

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned? 

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean? 

Organ Leader and Decision Making

 

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Physical Security

 

Per Fennelly (2017: 219-228), countermeasures concentrate extensively on deterring unauthorized users entering the organization’s security center. It is worth noting that external and internal users are conspirators. External perpetrators often gain legitimate access to organization’s network center in the guise of technicians, professional consultants and irritated employees. You have been retained as the lead director of Adam Smith, Inc. Security Data Center:

  • Provide an active three long-range plan to deter and deny external perpetrators access to the corporate center?
  • Provide an active three long-range plan to deter and deny internal perpetrators access to the corporate center?
  • Provide an active three long-range plan to deter and deny disgruntled employees access to the corporate center?
  • How can you identify such individuals or group of individuals? 

Instructions:

no plagarism

atleast 2 references must include

reference must properly cited