Project Assignment

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • What are the principles and limitations to an individual’s right to privacy?
  • What are the trade offs between security and privacy?
  • What is the issue of freedom of speech versus the protection of children online?

Due: Assignment is due on the day stated in  the Course Schedule

  • Provide three articles to substantiate the above three questions.
  • Use APA format to provide a citation for each of the articles you read.
  • Suggestion: Use a search engine (Google) and keywords.

CIS 500 WEEK 5

Customers use mobile devices for a wide range of shopping and commercial activities. Mobile devices are becoming an attractive way to pay for products or conduct banking. Select an organization with which you regularly do business, but not one you have used in a previous discussion. Do not repeat an example that has been posted by another student.

Describe the benefits this organization provides through its mobile computing options.

  • What risks most concern you in using this app?
  • How would you mitigate these risks?

Cyber law

 On November 3, 2020, California’s Privacy Rights Act is on the ballot. As of the time this assignment is being written, we do not know whether it will pass or not. Please write a 250 word essay on what the Act contains, and if it passed the ballot or not. Please tell why it passed or did not pass. 

Cryptography

in our technological world, cryptography is all around us. Examine your everyday connections to technology for evidence of cryptography.  Provide detailed examples of how cryptography exists in your world.  Next, explore the level of security for two of your examples and offer your opinion on whether the current security is strong enough.  

2 pages papers

project

Project – Part 5 – Modules

Modify the pseudocode design that you created in ITP 100 Project – Part 4 to include at least the following modules.

•    studentID    – to Enter the Student ID

•    calcBill        – to Calculate the Bill

•    prtBill        – to Print the Bill

After the student has finished entering the course titles, the system will calculate and print the bill.

Create a hierarchy chart for the modules.  Save the hierarchy chart as ITP100Project-Part4-Hierarchy-LastName.doc

Save the pseudocode design using the filename ITP100Project-Part4-LastName.doc

Submit for a Grade:

•    Upload the files ITP100Project-Part4-Hierarchy-LastName.doc and ITP100Project-Part4-LastName.doc file to the ITP100_Project_Part4 file upload area.

Data Quality and Security

Data Quality and Security

The reading in the text provides two key reasons for poor data quality, “the rush to install new systems and the failure to take an integrated view of the organization’s data” (p. 109). Data security breaches seem to occur every other day, and as discussed in the Week Three lecture, there are serious implications for organizations that do not take the necessary measures to ensure data security. Include the following elements in your paper supporting your statements using the required sources for this assignment.

Analyze the role of data in information systems for business and describe the risks that can arise from poor data quality.

Explain the challenges that can result from poor data quality. Provide an example of the results of poor data quality from your own personal or professional experience.

Explain at least two methods of how organizations can ensure good data including the structure and applications necessary.

Analyze the risks of poor data security.

Research an article in the popular media that covers a recent data breach. Explain the impact of the data security breach on the organization and its leaders using evidence from your article.

Explain the role of data governance in keeping data secure.

The Data Quality and Security Paper

Must be two to three double-spaced pages (600-900 words) in length (not including title and references pages) and formatted according to APA style 

Must include a separate title page with the following:

Title of paper

Student’s name

Course name and number

Instructor’s name

Date submitted

Must use at least two credible sources in addition to the course text.

Apply: Database Management Plan: Part 1 – Storing and Extracting Information

 

Scenario

You are the Vice President for Information Technology at a small, growing business. You have been tasked with developing a plan for maintaining databases for storage of business data and use in business analytics. In Weeks 1-5 you will work on gathering information in a Database Management Plan. In Week 6, you will present your plan in a 20-minute presentation (10-12 slides) to the President of Information Technology. 

Create a 700-word entry in your Database Management Plan. You will use information from this entry in your presentation due in Week 6. In your Database Management Plan entry, ensure you:   

  • Provide an overview of how databases can be used in a company to store and extract information. 
  • Decide what data elements need to be stored. 
  • Analyze major component of the SDLC when developing this database application. 

A Database Management Plan template is available to help you record and organize your information.

Submit your assignment.