CMST_301_Final Examination

  1. Download the CMST_301_Final Examination.docx file attached to this assignment.
    • Type your responses to the essay questions directly in the attached exam and save the file as: CMST_301_Final Examination.docx.
    • Submit the completed document to the Final Exam assignment folder 
  2. You must answer 4 of the 8 essay questions. Should you answer more than 4, only the first 4 will be graded. Each essay is worth 25 points for a total of 100 points for the exam. The exam is worth 20% of your final grade. Be sure you organize your response covering all the aspects of the questions.
  3. Length Requirement: Each essay response is required to be at least 500 words in length. Essay responses that are shorter will receive deductions based on how many words under (the farther from the designated length, the higher the deduction). Between 400-499 words, you will lose 5 points, under 400 words, you will lose 10 points.  Direct quotes do not count toward the word total. Please keep direct quotes to a minimum. Your response should be at least 90% original thought.   Also, I am expecting to see analysis and the synthesis of ideas in your essays (not just a manipulation of direct quotes with your words spliced in between). 
  4. Content Requirements: Content must be comprehensive, accurate, and persuasive. Your response should be at least 90% original thought.  Must use data from a minimum of two scholarly sources to support statements and draw a thorough and convincing conclusion from the data. 
  5. Bibliographical Requirement: Please do not use unprofessional sources such as Wikipedia, About.com, Answers.com, Dictionary.com, How.com, or anything remotely similar.  Examples of scholarly sources include our course content (e.g. Read & Watch resources), textbooks, journal articles, trade magazines, and conference proceedings. UMUC has a top-notch, extensive online library. You can find many scholarly sources there. Note: “Personal communications (e.g. Twitter Posts, Blogs, and YouTube Videos)” are not considered professional or scholarly sources.  Include at least TWO in-essay citations in EACH essay and a reference list at the END of each essay.
  6. Formatting Requirements
    • The paper must follow APA guidelines throughout.  See Course Content>Course Resources>Sample Paper to Show Appropriate Document Formatting.
    • Double-spaced (including the reference page) with the first line of each paragraph indented.
    • 1-inch Margins
    • 12 point professional font 
    • Begin each essay on a separate page
  7. This exam is **not** a group project. Your answers should be yours alone.
  8. Please spell-check your work.

frameworks

 

Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6.  https://ieeexplore.ieee.org/document/8760937?arnumber=8760937 

Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43.

 The required article readings of above articles give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches. For research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

DQ

How do you feel blockchain will change the global economy or will it?  Explain your answer.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

Scholarly Abstract Assignment

 

Create a 1-2 page single-spaced Analysis of Research abstract published scholarly articles related to a topic you selected in 2.2. (topic  cybersecurity)

Brevity and being concise are important as this analysis is intended to be a brief summation of the research.

Each abstract must therefore consist of the following in this order:

1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.

2. Author Qualifications – name and qualification of each author conducting the research

3. Research Concern – one paragraph summary of the reason for the overall research topic

4. Research Purpose Statement AND Research Questions or Hypotheses – specific focus of the research

5. Precedent Literature – key literature used in proposing the needed research (not the full bibliography or reference list)

6. Research Methodology – description of the population, sample, and data gathering techniques used in the research

7. Instrumentation – description of the tools used to gather data (surveys, tests,interviews, etc.)

8. Findings – summation of what the research discovered and the types of analysis that were used to describe the findings (tables, figures, and statistical measures)

Additional information on writing scholarly abstracts can be found via this link

See completed example

css215 discussion post

Consider the Millennium Health project that you have been working on throughout the course and provide answers to the following prompts based the Business Support System (BSS):

  1. Which installation strategy would you recommend? Support your answer with an explanation.
  2. List three or four testing criteria that you would use to test the BSS system to ensure it is ready for production use. Make sure that your testing criteria is adequately descriptive. If not, provide an explanation for it.
  3. Consider the four types of maintenance discussed in Chapter 14 of the textbook. Which type do you think is most likely to be needed for the BSS system? Support your answer with an explanation.
  4. Corrective maintenance is by far the most frequent form of maintenance. What can you do as a systems analyst to reduce this form of maintenance?