Wk 5 – Apply: Corporate Ethics Portfolio

 

The corporate Board of Directors has asked you to provide a portfolio of your research into the expansion of the company into the country you presented on in Wk 4.

Include an overall corporate code of ethics based on your review of professional associations, such as IEEE, ACM, SANS, ISACA, ASIS, and ISC(2). Include the following in your portfolio:

  • Based on the ethical challenges identified in Week 4, choose and depict 2 risks to the corporation related to each challenge in a 1-page table using either Microsoft Word, PowerPoint, or Excel.
  • A 1- to 2-page corporate code of ethics using Microsoft Word based on your review of professional associations, such as IEEE, ACM, SANS, ISACA, ASIS, and ISC(2), and the ethical challenges identified
  • A 1- to 2-page concise synopsis of classical ethical theories
  • A 1- to 2-page process to logically evaluate ethical dilemmas as they arise with the expansion of the company into the country you have chosen. Ensure that the process reflects the code of ethics you provide; for example, your process could start with identifying which part of the code applies to a particular new dilemma and move through assessing the various choices you could make along with any resulting consequences. The end goal is to help your corporation manage complex ethical questions with a variety of stakeholders.

All references need to adhere to APA guidelines and images should not be copied unless you’ve obtained author permission or used copyright-free images. 

professional righting

Select 10 Articles that support your Topic.

Write a review of all the articles and submit.

APA 7TH Edition   12 Font Times New Roman 

The basis precepts for formatting the pages and paragraphs are:
Margins: 1-inch margins
Spacing: double spaced
Font-Size: Times New Roman – 12-point font
Running head (text and page #) noted on header

References (include in text citations) 7the Edition

The specific use of the APA style is to write with clarity, precision, and inclusions. The APA style provides a uniformed platform for research papers to be better structured and organized. In this class, “The term “plagiarism” includes, but is not limited to, the use, by paraphrase or direct quotation, of the published or unpublished work of another person without full and clear acknowledgment.” The specific need is the APA standard writing style helps you to reduce bias languages and show you how to cite references correctly so that you can avoid charges of plagiarism.

Mechanics: Includes complete sentences, proper formatting of margins, spacing, indentation, etc.; typeface and use of emphasis are appropriate to task. Includes thorough documentation or citation as necessary; supports all claims within either text or appendix; properly identifies outside material. Possible Point Deductions 1- 10 pts.

Topic: Discussion

 We all had the unfortunate experience of seeing how computers can, at times, make life’s journey about more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly implemented database that you’ve encountered (or read about) that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature.

UML diagram

System Design Specifications (including System Architectural [Layered, “Physical”] Design Scheme selected; Package Diagram [populated with interrelated classes]; Database Tables; EntityRelational diagrams; Window Navigation Diagrams; Drafts of User Interfaces; and Examples of System-Response Report Forms);

graded assignment

Using a web search tool,identify cases in which private information was disclosed when computer equipment was discarded.Recent examples have included smartphones (like blackberry) that were sold without proper data cleasing and hard drives that were sold without data cleansing after the computers that were originally used in were upgraded.

Cryptography Assignment

 

In this assignment you will decipher messages that are encrypted using two of the classical ciphers. You are encouraged to do them by hand first and resort to the tool available at the link provided below or other tools you find on the Internet to automate the process.

A Substitution Cipher: What does the text say?

Exercise 1:/

IA TK MIMFL OIJK JKFLUBYUDOR ZOUNHIFS LCK TIOM SYXL GR LCK GKXBM XFM LBKWGOIFS YJKB ZBKNIZINKD TK DCYUOM FKJKB GK MKZBKDDKM IJK FY MYUGL GUL XOBKXMR DCYUOM GK AXMKM AXLXOIDLIN XFM XSKM JIBSIFIX TYYOA

Exercise 2:/

WG EGI JZZB IFZ UNURUAIZM RGT GX DGLM XMOZEWAFOB AZUNZW LB LEION DGLM XMOZEWA UMZ WZUW XONN IFZOM NOQZA COIF ACZZIEZAA ABZUJ UBBMGQOEP SFZZMOEP CGMWA CFONZ IFZOM ZUMA SUE FZUM IFZY UEW CFONZ IFZOM FZUMIA SUE RZ IFMONNZW UEW YUWZ FUBBOZM IFZ JOEW GX IFOEPA DGL YZUE IG AUD CFZE IFZD UMZ PGEZ AUD RZXGMZ IFZD PG

Exercise 3:/

LTKHNMEVKG KE CVH VRTMHEC CVKNB KN CVH WXTFM CX HAGFRKN KCE NXC EXQHCVKNB YXP FHRTN KN EZVXXF OPC KL YXP VRIHNC FHRTNHM CVH QHRNKNB XL LTKHNMEVKG YXP THRFFY VRIHNC FHRTNHM RNYCVKNB QPVRQQRM RFK

Exercise 4:/

BMBU SUWKMNMOUN LXS VXBOUBOUH TMYMBR DUQTOD UBXKRD OX FQZU GXSZ Q ITUQNKSU GUQTOD UBXKRD OX NKIIXSO EXKS BUUHN NOSUBROD OX JQOOTU GMOD HMLLMVKTOMUN QBH XYUSVXFU ODUF RSQVU UBXKRD OX VXBLUNN EXKS NMBN QBH LXSNQZU ODUF IQOMUBVU UBXKRD OX OXMT KBOMT NXFU RXXH MN QVVXFITMNDUH VDQSMOE UBXKRD OX NUU NXFU RXXH MB EXKS BUMRDJXKS TXYU UBXKRD OX FXYU EXK OX JU KNULKT QBH DUTILKT OX XODUSN LQMOD UBXKRD OX FQZU SUQT ODU ODMBRN XL RXH DXIU UBXKRD OX SUFXYU QTT QBAMXKN LUQSN VXBVUSBMBR ODU LKOKSU

You can use the tool at:

https://www.mtholyoke.edu/courses/quenell/s2003/ma139/js/count.html (Links to an external site.)Links to an external site.

WHAT to submit

For each cipher:

  1. Suggest two different ways of attacking the cipher. Make sure to indicate which attack scenario applies.
  2. Explain which of the two ways you would choose to break the cipher and why.
  3. Break the cipher and include the plaintext in your submission along with a detailed explanation of how you get the plaintext.

Also provide answers to the following questions, reflecting on your experience with this assignment:

  1. What was the most challenging part of this activity?
  2. What was the most enjoyable part of this activity?
  3. Do you think you have a good understanding of how symmetric key encryption/decryption works as a result of this activity? Why or why not?

week 1 discussion cloud computing

Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.    

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format.