Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment

Objectives

This assignment is one of two portfolio item for this course. You will be writing a scholarly paper. There is more to just writing in this assignment, however.

1. Research a topic from the general to the specific.
2. Explain abstract and technical concept using formal English.
3. Articulate an argument in support of a thesis statement.
4. Properly attribute facts and ideas in support of your argument.

Instructions

1. Starting with the research that you have done in a previous assignment, construct a mindmap of the topic and identify areas that are particularly interesting to you. From this, select a thesis statement that you want to explore for your research paper.

2. Expand you research to identify strong sources that are relevant to your thesis statement. Build a database of citations in the citation manager of your choice.

3. For as long as you are unclear about certain aspects, GOTO step 1.

4. Consult the grading rubric for this assignment to understand better what is expected.

5. Using the citation manager, prepare a research paper. If you use a LeTeX document, use the documentclass=article, and the package natbib for citation. The bibliographystyle must be set to ieee.

6. Submit your paper as a PDF. Word documents WILL not be graded.

7. A complete paper should be between 1200-1500 word (not including citations).

Your thesis statement should drill down into a sub-topic that is of interest to you. You may go in any directions with this:

• Go deeper on topics related to assymetriccrytpography, distributed systems, etc.
• Explore the economics of cryptocurrencies.
• Explore the impact of cryptocurrencies on business.
• Explore how people trust currencies.
• Explore the social impact of cryptocurrencies.
• Explore the future applications of the technology.
• etc.

It must, however, be a meaningful exploration of one aspect of the topic that will inform your reader

Gervais, A., Karame, G. O., Capkun, V., &Capkun, S. (2014). Is Bitcoin a Decentralized Currency? IEEE Security and Privacy, 12(3), 54-60. http://doi.org/10.1109/MSP.2014.49

Nachiappan, Crosby, M., Pattanayak, P., Verma, S., &Kalyanaraman, V. (2016). BlockChain Technology: Beyond Bitcoin. Applied Innovation Review, (2). Retrieved from http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf

Van Alstyne, M. (2014). Why Bitcoin has value. Communications of the ACM, 57(5), 30-32. http://doi.org/10.1145/2594288

Wallace, B. (2011). The rise and fall of Bitcoin. Wired Magazine.[Online]. Available, 1-9. Retrieved from http://fromm.robertkeahey.com/wp-content/uploads/2013/07/Session-7-The-Rise-and-Fall-of-Bitcoin.pdf

Reid, F., &Harrigan, M. (2013). An analysis of anonymity in the bitcoin system. In Security and Privacy in Social Networks (pp. 197-223). http://doi.org/10.1007/978-1-4614-4139-7_10

Foroglou, G., &Tsilidou, A. L. (2015). Further applications of the blockchain. Conference: 12th Student Conference on Managerial Science and Technology, At Athens, (MAY), 0-8. http://doi.org/10.13140/RG.2.1.2350.8568

Urrico, R. (2016). Blockchain Brings Hopes and Fears. Credit Union Times, 27(3), 1-16. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=112758275&site=ehost-live

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92078680
  • Price:- $60

Priced at Now at $60, Verified Solution

Have any Question?


Related Questions in Management Information System

Outlinesubmit a one page outline with your proposed term

Outline: Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. Term paper on a computer related crime which can be solved by using ...

Answer the following question 1 does innovation tend to

Answer the following Question : 1.) Does innovation tend to reduce social inequality or deepen it? Explain your answer. 2.) How is the Internet of Things changing the way we live? List and discuss three popular technolog ...

In the realm of it security policies should include a

In the realm of IT Security, policies should include a Physical Security Policy. Our dependence on computers has resulted in massive amounts of sensitive, and valuable information being physically and digitally stored. T ...

Review the steps of the sdlc explain why quality service

Review the steps of the SDLC. Explain why quality service delivery depends on the execution of the service delivery life cycle. Discuss the aspects of the SDLC that are critical to quality service management. Explain you ...

Room air temperature in the engineering classroom ab134 has

Room air temperature in the engineering classroom (AB134) has been measured and the data stored in a file called AB134.txt. This file contains two columns, i.e. Time, and Temperature values. The time values are in minute ...

Assessment instructionsfirst select a global it

Assessment Instructions First, select a global IT organization with which you are currently affiliated or have worked for in the past, or one you would like to learn more about. This organization should be relevant to yo ...

A case study of project and stakeholder management failures

A case study of project and stakeholder management failures: Lessons learned will be analyzed for Case 2. Sutterfield, J. S., Friday-Stroud, S., Shivers-Blackwell, S. (2006). A case study of project and stakeholder manag ...

The part you need to think about is what do all the changes

The part you need to think about is what do all the changes really mean for healthcare? Not only what skills will you require in the future, but who will you be hiring and what role will they fulfill? If we think that he ...

Ransomware to pay or not to pay when it comes to

Ransomware: To pay or not to pay? When it comes to corporate data, should corporations pay? Can you trust paying? What can be done to protect against ransomware? Would you pay if it were your own personal data? How can y ...

Question 1 please post the hyperlink to one federal statute

Question : 1. Please post the hyperlink to one federal statute which discusses cybercrime on the internet and summarize in not less than 100 words what that statute accomplishes. 2. Please post the hyperlink to one feder ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As