computer ethics A2

  

Assignment 2 

In a typical 1000-word essay, discuss what is unique about IT and Computers as far as ethical issues? 

How should people approach ethical issues that IT, Information Networks and Computer Technology present? 

Do not select passages from any resources! You must express your opinion from your reading of the course materials and online resources.

Students have to include proper citations. The essay’s quality of writing is part of the assessment. Therefore, grammatical, typographical or syntactical errors will affect the grade. No late submission. It WON’T be accepted.

Pseudocode and Flowchart Solution

Instructions:

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart.

  • Problem 1: Create a list that contains the months of the year.
  • Problem 2: Create a loop to print the month number and name (do not hard code the month number)

Consider using the attached enumerate method to help!

IT Management Executive Brief

 

Assignment Content

  1. Imagine you are an IT manager at small retail organization that has a new owner. The new owner is from another industry and has expressed a lack of understanding of some of the controls and processes important to IT management and governance. You must help the new owner with understanding these important concepts.

    Write a 2- to 4-page executive brief in which you:

    • Discuss how the 2002 Sarbanes-Oxley Act has affected IT governance, including the major provisions of the act and how this might affect IT, and how IT might assist in compliance.
    • Discuss how IT policies, standards, and procedures can be used to determine if the enterprise is in compliance and support the IT strategy.
    • Discuss how Quality Management Systems (QMS) are important to ensure quality processes are in place.
    • Discuss how IT management and monitoring of controls can be used to assess IT performance.
    • Format your assignment according to APA guidelines.

      Submit your assignment.

Ethical Hacking

 PLEASE FOLLOW THE ATTACHED FORMAT

Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.A reference citation is also required for this assignment. You may just include a link to your article.

Big Data Analytics Dissertation

 In 250-300 words outline your dissertation topic related to Big Data Analytics and goals for this semester as they relate to your dissertation course. If you do not have a dissertation topic please revert those you are considering. Also, include ways that you could improve your dissertation, as well as areas you may be struggling with 

BSWA week2 P2

 

Hello,

i need this paper by 1/21 afternoon.

Strictly No plagiarism please use your own words.

Visit the OWASP website. 

https://www.youtube.com/watch?v=RGA5kLO9vjs

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

CSIA 459

The technology acceptance model (TAM) is a two-factor model that describes user acceptance of new or replacement technology solutions (Davis, 1989). This evaluation model has withstood the test of time and is widely used. The model is based upon perceptions and beliefs of individuals and measures two types of factors: (a) perceived ease of use and (b) perceived usefulness.

Prepare an analysis (briefing paper) (5 to 7 strong paragraphs) in which you explain how cybersecurity researchers could use the TAM model to explore the factors which affect employee acceptance of biometrics used for access to facilities and/or computing systems. What research questions might they ask? What measurements would be needed?

Post your briefing paper as a reply to this topic. Remember to cite your sources (3 minimum) and include a reference list at the end of your posting.

Reference

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340. https://ezproxy.umgc.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=4679168&site=ehost-live&scope=site

knowledge management – how KM used in your company and how knowledge transmitted

Document 4 page with 4 references. NO TITLE PAGE:

Describe how knowledge management used in your current company. Is there a Chief Information Officer? How is knowledge transmitted? Is knowledge hoarded or openly shared among workers.

Subject: Knowledge Management Systems and Processes

Reference:

1. “Why Knowledge Management?” by Antoine Tawa. link: https://www.youtube.com/watch?v=QWQp1EZP3eU

2. “Knowledge Management: An organization’s weapon of choice” link: https://www.youtube.com/watch?v=zUVZn44WT_c  

3.  Chapters 1 and 2 from book Knowledge Management Systems and Processes By Irma Becerra-Fernandez, Rajiv Sabherwal 2nd Edition