Get help from the best in academic writing.

200 word question

Post 3: An answer to one of the questions that a classmate or the professor has asked you OR if no one has asked you a question, a follow-up question for yourself and your answer. This post should be at least 200 words long and include at least one quote or specific reference to a concept or vocabulary from the Learning Materials with a citation in MLA format.
Here is the question….
You mentioned that the advertisement sector is undermining the free will of consumers, could you elaborate more on how the advertisement sector is undermining? In my mind I think of advertising as a method to convince and market to consumers. In advertising technology do you believe that there is a difference between advertising context in a persuasive manner compared to advertising in a manipulative manner? If so, what differences do you see between the two?

This table lists criteria and criteria group names in the first column. The first row lists level names and

This table lists criteria and criteria group names in the first column. The first row lists level names and includes scores if the rubric uses a numeric scoring method. You can give feedback on each criterion by tabbing to the add feedback buttons in the table.
Criteria
Excellent
Outstanding
Acceptable
Needs Improvement
Needs Significant Improvement
Missing or Unacceptable
Criterion Score
Introduction or Overview for the Report
15 points
Provided an excellent overview of the problem (security and privacy concerns arising from implementation of a new technology). The introduction was clear, concise, and accurate. Writer appropriately used information from 3 or more authoritative sources

13.5 points
Provided an outstanding overview of the problem (security and privacy concerns arising from implementation of a new technology). The introduction was clear and accurate. Writer appropriately used information from at least 2 authoritative sources

12 points
Provided an acceptable overview of the problem (implementation of a new technology). Mentioned the security and privacy concerns. Writer appropriately used information from authoritative sources

10 points
Provided an overview but the section lacked important details about the problem. Information from authoritative sources was cited and used in the overview.

6 points
Attempted to provide an introduction to the research report but this section lacked detail, was off topic, and/or was not well supported by information drawn from authoritative sources.

0 points
The introduction and/or overview sections of the paper were missing.

Score of Introduction or Overview for the Report,/ 15
Analysis: Use Cases for the Technology
20 points
Provided an excellent overview / introduction to the new technology. Fully described at least one of the use cases. Clearly identified five or more types of personal / private information or data collected, stored, processed, and transmitted in conjunction with the use case. Appropriately used information from 3 or more authoritative sources.

18 points
Provided an outstanding overview / introduction to the new technology. Partially described one of the use cases and identified three or more types of personal / private information or data collected, stored, processed, and transmitted in conjunction with the use case. Appropriately used information from 2 or more authoritative sources.

16 points
Provided an acceptable overview / introduction to the new technology. Mentioned at least one of the use cases and identified some types of personal / private information or data collected, stored, processed, and transmitted in conjunction with the use case. Appropriately used information from authoritative sources.

14 points
Provided a discussion of a use case for the technology. Identified at least one type of personal or private information collected or stored. Information from authoritative sources was cited and used.

7 points
Attempted to provide information about the technology. The discussion was significantly lacking in detail and/or was not well supported by information drawn from authoritative sources.

0 points
This section was missing, off topic, or failed to provide information about the technology.

Score of Analysis: Use Cases for the Technology,/ 20
Analysis: Privacy and Security Issues
15 points
Provided an excellent analysis of five or more privacy and security issues related to the use case. The analysis was presented in a clear, concise, and accurate manner. Identified and discussed at least three relevant laws which could impact the planned use. Appropriately used information from 3 or more authoritative sources.

13.5 points
Provided an outstanding analysis of three or more privacy and security issues related to the use case. The analysis was presented in a clear and accurate manner. Identified and discussed at least two relevant laws which could impact the planned use. Appropriately used information from 2 or more authoritative sources.

12 points
Provided an acceptable analysis of two or more privacy and security issues related to the use case. The analysis was presented in a clear, concise, and accurate manner. Identified and discussed at least one relevant law which could impact the planned use. Appropriately used information from authoritative sources.

10 points
Provided a discussion of the technology and mentioned at least one planned use (use case). Information from authoritative sources was cited and used.

6 points
Attempted to provide information about the technology. The discussion was significantly lacking in detail and/or was not well supported by information drawn from authoritative sources.

0 points
This section was missing, off topic, or failed to provide information about the technology or a relevant use case.

Score of Analysis: Privacy and Security Issues,/ 15
Best Practice Recommendations: People, Processes, Policies and Technologies
15 points
Provided an excellent discussion of at least five best practice based recommendations for ensuring that privacy and security concerns are addressed before the technology is put into use by the company. Included at least one recommendation in each of the following categories:

People
Processes
Policies
Technologies
The discussion appropriately used information from three or more authoritative sources.

13.5 points
Provided an outstanding discussion of at least four best practice based recommendations ensuring that privacy and security concerns are addressed before the technology is put into use by the company. Included at least one recommendation in three of the following categories:

People
Processes
Policies
Technologies
The discussion appropriately used information from two or more authoritative sources.

12 points
Provided an acceptable discussion of at least three best practice based recommendations for ensuring that privacy and security concerns are addressed before the technology is put into use by the company. Included at least one recommendation in two of the following categories:

People
Processes
Policies
Technologies
The discussion appropriately used information from authoritative sources.

10 points
Identified 2 or more best practices for preventing / responding to privacy and security concerns associated with the planned uses of the technology. Included at least one recommendation in two or more of the following categories:

People
Processes
Policies
Technologies
The discussion appropriately used information from authoritative sources.

6 points
Attempted to provide information about best practices for addressing privacy and/or security concerns. OR, the discussion was not well supported by information from authoritative sources.

0 points
Discussion of best practices was missing or lacked relevancy to the topic of privacy and security for the planned uses of the technology.

Score of Best Practice Recommendations: People, Processes, Policies and Technologies,/ 15
Summary of Recommendations
10 points
The closing section provided an excellent summary of the issues and best-practice based recommendations for ensuring that security and privacy requirements are met.

8.5 points
The closing section provided an outstanding summary of the issues and best-practice based recommendations for ensuring that security and privacy requirements are met.

7 points
The closing section provided an acceptable summary of the issues and best-practice based recommendations for ensuring that security and privacy requirements are met.

6 points
The closing section provided some information summarizing the issues and recommendations but lacked detail or was disorganized.

4 points
A closing section was provided but was not relevant OR was not well supported by information from authoritative sources.

0 points
Did not provide a summary or closing section.

Score of Summary of Recommendations,/ 10
Professionalism: Addressed security issues using standard cybersecurity terminology
5 points
Demonstrated excellence in the integration of standard cybersecurity terminology into the report.

4 points
Provided an outstanding integration of standard cybersecurity terminology into the report.

3 points
Integrated standard cybersecurity terminology into the into the report.

2 points
Used standard cybersecurity terminology but this usage was not well integrated with the discussion.

1 point
Misused standard cybersecurity terminology.

0 points
Did not integrate standard cybersecurity terminology into the discussion.

Score of Professionalism: Addressed security issues using standard cybersecurity terminology,/ 5
Professionalism: Consistent Use and Formatting for Citations and Reference List
5 points
Work contains a reference list containing entries for all cited resources. Sufficient information is provided to allow a reader to find and retrieve the cited sources. Reference list entries and in-text citations are consistently and correctly formatted using an appropriate citation style (APA, MLA, etc.).

4 points
Work contains a reference list containing entries for all cited resources. Sufficient information is provided to allow a reader to find and retrieve the cited sources. One or two inconsistencies or errors in format for in-text citations and/or reference list entries.

3 points
Work contains a reference list containing entries for all cited resources. Sufficient information is provided to allow a reader to find and retrieve the cited sources. No more than 5 inconsistencies or errors in format for in-text citations and/or reference list entries.

2 points
Work has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 10 inconsistencies or errors in format.

1 point
Work attempts to credit sources but demonstrates a fundamental failure to understand and/or consistently apply a professional formatting style for the reference list and/or citations.

0 points
Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.

Score of Professionalism: Consistent Use and Formatting for Citations and Reference List,/ 5
Professionalism: Organization

Discussion question

Computer Science Assignment Help Please respond to the following in a substantive post (4-6 paragraphs):
In your view what are some of the social, ethical, and political issues raised by information systems? What are the tools available to make ethical decisions? What impact do the information systems have on the protection of individual privacy and intellectual property?
What are the primary reasons for the worldwide success of e-commerce? How does e-commerce differ from m-commerce? What is the impact of e-commerce on routine business transactions?
Be sure to respond to at least one of your classmates’ posts.
No plagiarism of any kind

In this project, there are eight steps, including a lab, that will help you create your final deliverables. The

In this project, there are eight steps, including a lab, that will help you create your final deliverables. The deliverables for this project are as follows:
Security Assessment Report (SAR): This should be an eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
Risk Assessment Report (RAR): This report should be a five- to six-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
Lab: In a Word document, share your lab experience and provide screenshots to demonstrate that you performed the lab.

You are an information assurance management officer (IAMO) at an organization of your choosing. One morning, as you’re getting ready for work, you see an email from Karen, your manager. She asks you to come to her office as soon as you get in. When you arrive to your work, you head straight to Karen’s office. “Sorry for the impromptu meeting,” she says, “but we have a bit of an emergency. There’s been a security breach at the Office of Personnel Management.”
We don’t know how this happened, but we need to make sure it doesn’t happen again, says Karen. You’ll be receiving an email with more information on the security breach. Use this info to assess the information system vulnerabilities of the Office of Personnel Management.

At your desk, you open Karen’s email. She’s given you an OPM report from the Office of the Inspector General, or OIG. You have studied the OPM OIG report and found that the hackers were able to gain access through compromised credentials. The security breach could have been prevented, if the Office of Personnel Management, or OPM, had abided by previous auditing reports and security findings. In addition, access to the databases could have been prevented by implementing various encryption schemas and could have been identified after running regularly scheduled scans of the systems.

Karen and the rest of the leadership team want you to compile your findings into a Security Assessment Report, or SAR. You will also create a Risk Assessment Report, or RAR, in which you identify threats, vulnerabilities, risks, and likelihood of exploitation and suggested remediation.

error: Content is protected !!