Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

DISCUSSION POST.

Prepare a 300-word Group discussion post in response to the following: The authors of "The Virtue of War" assert that the government has a responsibility to protect their citizens (i.e., the people of God) from unjust internal and/or external aggression.

What responsibilities do corporate entities (e.g., Target, Bank of America, Google, etc.) have? What is this based on?

What options are available to them, and what legal restrictions hamper them?

What issues prevent their more fully cooperating with the Federal government? Your response should reflect information you synthesized from this week's readings.

WEEKLY PAPER.

Choose a topic for your Final Paper, and complete the Week 1 assignment: Explain why you selected the topic and include a theological statement. (250 - 350 Words)

Some suggested topics are listed here, but you may propose others as well:

The potential impact (positive, negative, both) of cybercrime (or cyber espionage, or cyber warfare) on society, the economy, or on Christianity.

Long-term implications of the increasing dependence on constant and immediate interconnectedness (i.e., use of smart phones) on families, society in general, the economy, or Christianity.

Long-term implications of the increasing dependence on technical oligarchies (Google, Amazon, Facebook, etc.) on society, the economy or Christianity.

Final Project - There is a research paper for this course. We will work on the sections of this paper in our weekly assignments. APA format will be followed for all writing submissions.

The topics to select from are provided as questions starting in the Course Schedule section of this syllabus.

For this assignment, the student is to select one topic, and then for the next seven weeks write and research about the topic selected. You may select a topic from those listed, or propose a different topic.

Each week, you will work on the assignment building out the paper. At the end of seven weeks, you will have a research paper which you will submit for the eighth week in a Word Document.

You are to provide citations and have a minimum of 2 citations per week. These citations must be from peer-reviewed works (Journals, Books, Government/Industry Papers, Master's and Doctoral Dissertations).

Here are weekly assignments for the Final Paper items to address for each week:

Week 1 - Select your topic. Explain why you selected the topic and include a theological statement. (250 - 350 Words)

Week 2 - What are the key issues about the topic you selected? (250 - 350 Words)

Week 3 - Discuss your topic as it relates to the role of the US government. (250 - 350 Words)

Week 4 - Discuss your topic as it relates to the responsibilities of the individuals who are involved in creating the technology. (250 - 350 Words)

Week 5 - Discuss your topic as it relates to the role of the corporations involved in creating the technology. (250 - 350 Words)

Week 6 - Discuss your topic as it relates to the behavior of individual bconsumers. (250 - 350 Words)

Week 7 - What are the most serious future issues to be concerned with babout your topic? (250 - 350 Words)

Week 8 - Finalize your paper, develop an introduction and conclusion for the bpaper. Check for APA correctness, reference page, and grammar. Submit byour paper. (2,000 - 2,500 Words)

Required Reading:

"Virtue of War", Chapters 2, 6

"Terrorism & Its Civilized Discontent "

"Opinion: Why distinguishing moral injury from PTSD is important "

"'Cybervandalism' or 'Digital acts of war'? America's muddled approach to cyber incidents won't deter more crises "

"White House says US will retaliate against Russia "

"What Options Does the US Have After Accusing Russia of Hacks "

"The DoD Cyber Strategy " - Introduction section

"US Still Has No Definition for Cyber Act of War"

"Military, Feds train alongside private companies to defend American infrastructure from cyber threats"

"Inside the Pentagon's secretive preparations for a 'cyber 9/11 "

"U.S. Cyber Command Chief on What Threats to Fear the Most "

"Pentagon Mobilizes Military Hackers Against Islamic State "

"Command and Control Vulnerabilities to Communications Jamming "

"NATO Weighs Making Cyber Wartine Domain"

"Cyberspace: A new front-line fight for NATO "

"Russian government hackers penetrate DNC; steal opposition research on Trump "

"Iran-Saudi tensions erupt in 'cyberwar' "

"Cyber-Allies: Strengths and Weaknesses of NATO's Cyberdefense Posture "

"Does God Do Cyberwarfare? "

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M93085782
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Management Information System

Crime prevention through environmental design cpted is

Crime Prevention Through Environmental Design (CPTED) is defined as a multi-disciplinary approach to deterring criminal behavior through environmental design. CPTED strategies rely upon the ability to influence offender ...

Review the cloudcrushers business scenario to understand

Review the "CloudCrushers Business Scenario" to understand the various components needed to ensure connectivity. Prepare a 1.5 page paper describing these components, as well as how the types of connectivity, such as Eth ...

Discuss about the following question you can transfer your

Discuss about the following Question : You can transfer your health data to another personal health record provider such as Microsoft Health Vault. What privacy issues are involved? Express your views on using this type ...

Project 6 policy review and recommendations

Project #6 Policy Review and Recommendations Presentation Instructions This is the final phase of the case study assignments. The primary purpose of this project is for you to demonstrate your understanding of the princi ...

Please find a total of 4 websites that are related to

Please find a total of 4 websites that are related to modeling policy with simulations. These can be and include eGovPoliNet and others that have been mentioned in the papers, readings or videos. They can be community ba ...

Questionnbsp - software patterns part 1 - pattern

Question  - Software Patterns Part 1 - Pattern Selection For the small case study provided, decide on an appropriate pattern or of patterns to support the requirements of that case study, and explain those decisions. Par ...

Discussion boardfor this discussion board please write

Discussion Board For this discussion board, please write 400-600 words discussing the following. List and discuss some of the natural deterrence provided by topographies. Why should topographies be considered when design ...

Provide a background of the organizationhow was the

Provide a background of the organization. How was the organization impacted? What losses did it suffer? Describe the disaster recovery and business continuity that the business had in place? What were the lessons learned ...

Confidentiality integrity and availability or the cia triad

Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, ...

Assignmentthere have been more than a few newsworthy

Assignment There have been more than a few newsworthy failures to succeed relating to the implementation of enterprise resource planning systems (ERP) that resulted in lawsuits between companies and contracted solution p ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As