Facebook's Career Page

Company Name: Facebook, INC

 Facebook, Inc. is an American online social media and social networking service company based in Menlo Park, California. It was founded by Mark Zuckerberg along with other fellow Harvard College students. As of the end of 2018, the number of Facebook employees reached 35,587 full-time staff. It is considered one of the Big Four technology companies along with Amazon, Apple, and Google. From our Thompson text, read Chapter 10 Assurance of Learning Exercise #3 related to Facebook’s Career page and click on the website link to provide you with information to use in your response to the following:

  • How do Facebook’s internal management training programs integrate the traits and stated goals on the Careers page into specific and tangible construction of employee capabilities?  How does this apply to our reading of the week?
  • How does the internal training Boot Camp program prepare Facebook employees of all types to “move fast and break things”?  How does this apply to our readings of the week?
  • What does this case have to do with overall organizational Strategy?

Submission Details: 

  • Your analysis should be between 1000 and 1500 words.
  • Incorporate a minimum of at least our course text and one non-course scholarly/peer reviewed source in your paper.  All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, be double-spaced, and proper in-text citations using APA guidelines.

Website Link: https://www.facebookcareers.com/

References link: 

Professor last week feedback:

This is not a numbered exercise.  Please review APA for propper formating.  

Building Ethical Judgment Capabilities

 

Introduction

Computer ethics is a rich topic that affects all of us in our interconnected world. To build good ethical judgment capabilities, Bynum and Rogerson (1) suggest applying a multi-staged approach to case study analysis where these stages are defined as: (1) detailing the case study, (2) identifying key ethical principles and specific ethical issues raised by the case, (3) calling on your experience and skills for evaluation, and (4) applying a systematic analysis technique. In this assignment, you will perform the first three of these steps for a case study.The specific course learning outcome associated with this assignment is:

  • Examine the ethical considerations and dilemmas of a diverse and interconnected world.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Instructions

Write a 3- to 5-page paper in which you analyze a computer ethics cases.Read the article entitled, “Your Botnet is My Botnet: Analysis of a Botnet Takeover,” about a team of researchers who reverse engineered the Torpig botnet, controlled it, and captured data.

  • Describe the nature and details of the case, including the persons, organizations, and stakeholders involved.
  • Describe ethical principles both supporting the actions of the principal actors (such as minimizing harm or damage to targets of the attacks) in a computer ethics case and contradicting the actions of the principal actors, citing specific, credible sources that support one’s assertions and conclusions.
  • Explain why you agree or disagree with the actions of the principal actors in the case, citing specific, credible sources that support your position from an ethical perspective.
    • Justify your position from an ethical perspective.
  • Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence.
    • Cite each source listed on your references page at least one time within your assignment.
    • For help with research, writing, and citation, access the library or review library guides.
  • Write clearly and concisely in a manner that is well-organized; grammatically correct; and nearly free of spelling, typographical, formatting, and/or punctuation errors.
    • Use section headers in your paper to clearly delineate your main topics.

3/2 Reading

  1. Read Chapters 9–13 in your textbook (Textbook: Principles of Computer Security: CompTIA Security and Beyond)
  2. Using the discussion link below, respond to the following questions:
    1. What was the most useful takeaway for you from this workshop’s reading?
    2. What concept from the reading is the most applicable to you now in your profession, and how might you implement it?
  3. While responding to your classmates is not necessary for this discussion, read a couple of your fellow classmates’ posts to learn from their experiences. You must make your initial post first in order to see theirs.
  4. Your initial post is due by the end of the workshop.

Discussion

 Explain in your own words what “FOOTPRINTING” (or digital reconnaissance) is and how you would go about gathering the information you need to determine the location of a recently stolen late model car that was last seen in the parking lot of our college. 

Discussion 2- Strategy Applied in Project management

Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.

Also, provide a graduate-level response to each of the following questions:

  1. The culture of the organization can impact the effectiveness of different project management structures. Organizational cultures that do not encourage teamwork, collaboration, and cross-functional integration need a stronger project management structure (i.e., project team, project matrix) to be successful. Conversely, a functional matrix can be effective in an organization in which the culture of the organization is conducive to project management.
  2. You work for LL Company, which manufactures high-end optical scopes for hunting rifles. LL Company has been the market leader for the past 20 years and has decided to diversify by applying its technology to develop a top-quality binocular. What kind of project management structure would you recommend they use for this project? What information would you like to have to make this recommendation, and why?

Chapters-

Chapter. 3 Organization: Structure and Culture

Chapter. 4 Defining the Project

Text

Title: Project Management: The Managerial Process 

ISBN: 9781260238860 

Authors: Clifford F. Gray, Erik W. Larson 

Publisher: McGraw-Hill Education 

Publication Date: 2020-01-09

Question 21

 

Last week, you developed a business case for your SCRUM project. This week, define the scope and the requirements of your project. Then, enter them as product backlog features and user stories (or work items) in the Visual Studio Online (VSO) project that you created in Week 1. 

Your product backlog must include at least 3 backlog features and 10 user stories (or work items) in a nested, hierarchical order. The backlog work items must also be arranged based on the value they provide to the customer.
Summary of the backlog features and their associated user stories, and how they contribute toward the successful completion of the project
Explanation of your approach to this assignment and the decisions you made
Reflection on this learning experience and lessons learned

 

Ethics and Discussion

 

This is the second of a series of five assignments focusing on software engineering ethics.

Read the attached Ethics-II.pdf Download Ethics-II.pdfwhich continues the discussion on what Ethics mean  in the context of software engineering.

Then proceed to answer the questions inside the reading:

  • Questions 2.1 and 2.2
  • Questions 3.1 and 3.2
  • Question 4.1

Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides. At least 3 pages 

 Question 2.1: What sorts of things can excellent software engineers contribute to the good life? (Answer as fully/in as many ways as you are able) 

Question 2.2: What kinds of character traits, qualities, behaviors and/or habits do you think mark the kinds of people who tend to contribute most in these ways? (Answer as fully/in as many ways as you are able) 

 Question 3.1: Who are the various stakeholders in this scenario, and what do they each have at stake in your action? Reflect carefully and deeply, and answer as fully as possible.

Question 3.2: What do you think is your ethical obligation in this situation? What do you think an excellent software engineer would do in this situation? Are they the same thing, or different? Please explain your answer. 

 Question 4.1: Which of the contributions in your answer to 2.1 are related to vital public good(s)? What vital public goods might software engineers help to secure that you did not mention in your initial answer to 2.1? 

 

M4 Discussion 1

Read the attached article: “The Mythical Man-Month Download The Mythical Man-Month“, by Frederick Brooks, extracts from The Mythical Man Month book, 1975.

1. Tell us something about what you learn from this article. Your posting should contain at least 100 words;
2. Provide constructive comment on at least one other student’s posting. “Agree”, “good” etc. are not counted as constructive commenting.

 

M4 Discussion 2

Find at least two credible sources to study the recent VW Diesel Scandal and read what this topic is about and what the latest development is.

1. Discuss your understanding of this case from the software engineering ethics viewpoint. Consider including in your post on your thoughts related to questions such as

  • What VW software engineers should have done to in order contribute to the good life for others in this case;
  • Who are the public’ to who the VW software engneers is obligated;
  • Why the software engineers is obligated to protect the public and
  • how VW software engineers failed in this case.

Your posting should contain at least 100 words;

2. List the two sources used in your research at the end of your post;

3. Provide constructive comment on at least one other student’s posting. “Agree”, “good” etc. are not counted as constructive commenting.

CYBERLAWS & ETHICAL HACKING PROJECT

Scenario  It is your first day at the job in the information security department, and you are called for a meeting. In the meeting the need for strengthening the information security for the college is discussed, and everyone agrees that the first step in this direction is to identify the top five threats that are a potential risk to Aim Higher College.  The college’s administrative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students’ laptops may run Windows or macOS. The college’s web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices can connect to the campus network.  Tasks  You have been given the responsibility to determine the top five threats that Aim Higher College faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis: 

    Microsoft Security Advisories and Bulletins (https://docs.microsoft.com/en-us/security-updates/)

    Common Vulnerabilities and Exposure (CVE) database search
(http://cve.mitre.org/find/index.html)

    Security organizations, such as Secunia (http://secunia.com/)

Your supervisor has also asked you to consider the following questions as you shortlist the threats:

What threats are new this year, and which have become more prevalent?

Why are these threats more common and why are they important?

What threats remain constant from year to year? Why?

What threats do you believe will become more critical in the next 12 months? Why?

What is the likelihood of an exploit affecting Aim Higher College, and which operating system(s)does it target?

With these considerations in mind, write a summary report of the top five threats to Aim Higher College. Briefly explain why you have selected them and what effect they might have on the institution or its students, employees, graduates, or other communities on campus.

Submission Requirements

Format: Microsoft Word (or compatible)

Font: Arial, size 12, double-space