Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Research Paper Using Word

This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly incorporate citations and references in APA format. Students may use the tools and techniques within Word to format the research paper, including use of the References and citation tools.These skills will be valuable throughout a student's academic career. The paper will require a title page, NO abstract, three to four full pages of content with incorporation of a minimum of 3 external resources from credible sourcesand a Works Cited/References page. Wikipedia and similar general information sites, blogsor discussion groups are not considered creditable sources for a research project. No more than 10% of the paper may be in the form of a direct citation from an external source.

A list of topics from which students can choose is provided below.

Topics for Research Paper

1. Social Engineering - what it is, how it is used, and potential positive and negative impacts on individuals and on society

2. Employee Monitoring - why and how it is used, the legal issues surrounding its use, and impacts on employer and employee

3. Biometrics - various implementations and the ethical and privacy issues related to the use of biometrics

4. Use of Cookies - what they are, how they are used, and potential positive and negative impacts

5. What are the privacy laws related to Information Technology use and how do they impact you personally?

6. Intellectual Property Rights; issues related to copyright, fair use, copyright infringement, and the potential personal and financial impacts

7. The Edward Snowden case - the dilemma between the "Official Secrets Act" versus a perceived duty to share versus the damage it may do to national security.

8. The Apple vs. FBI controversy over unlocking the iPhone

If there is another topic that addresses ethical issues as related to information technology that is of special interest to you but one that is not in the list above, request permission from your instructor before selecting this alternate topic.

Writing Quality for the Research Paper

* All Grammar, Verb Tenses, Pronouns, Spelling, Punctuation, and Writing Competency should be without error.

* Be particularly careful about mis-matching a noun and pronoun. For example, if you say "A person does this..." then do not use "their" or "they" when referring to that person. "Person" is singular; "their" or "they" is plural.

* Remember: there is not their, your is not you're, itsis not it's, too is not to or two, site is not cite, and who should be used after an individual, not that. For example, "the person WHO made the speech" not "the person THAT made the speech."

* In a professional paper one does not use contractions (doesn't, don't, etc.) and one does not use the personal I,you or your. Use the impersonal as in the previous sentence. It is more business-like to say "In a professional paper one should not use contractions," rather than saying, "In a professional paper you don't use contractions."

*Remember: spell-check, then proofread. Better yet, have a friend or colleague read it before submitting it. Read it out loud to yourself. Read it as if you are submitting it to your boss.

You can find instructions on how to use the References tool in Word on a PC or on a Mac in the separate file attached here.

Complete rubrics for this paper are found in the table on the next page.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92291632
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Stockholdingwrite a class stockholding the purpose of a

StockHolding Write a class StockHolding. The purpose of a StockHolding object is to represent a single stock in someone's investment portfolio. The StockHolding class has the following specification: instance variable of ...

What are some of the skill sets required for the various

What are some of the skill sets required for the various aspects of cloud administration. Are there any certifications related to cloud computing? Is there value in obtaining one of these certifications?

Question suppose that x 00271 and y 608 are correctly

Question : Suppose that x* = 0.0271 and y* = 6.08 are correctly rounded versions of x and y to 3 digit mantissas. The smallest interval [a,b] that would contain x is [0.02705, 0.02715] since 0.0271 is between those numbe ...

We say that a binary tree t is perfectly balanced if for

We say that a binary tree T is perfectly balanced if, for each node n in T , the number of keys in the left and right subtrees of n differ at most by 1. Write an algorithm called Is-Perfectly-Balanced that, given a binar ...

Systems and networksconsider sending a large file from a

(Systems and Networks) Consider sending a large file from a host to another host using a reliable connection such as TCP. Suppose the reliable connection uses additive-increase, multiplicative-decrease (AIMD) without slo ...

This is a chemistry question regarding physical and

This is a chemistry question regarding physical and chemical changes. The question is the following: You mix 3 liquids and the resulting solution becomes very hot. A short time later bubbles began to form. There is a che ...

Submit a report in which you plan a strategy for

Submit a report in which you plan a strategy for introducing or improving a mobile Web site in your organisation (or an organisation with which you are familiar). Your report must outline how your choice of strategy will ...

1 what do we mean by financial intelligence how to assess a

1. What do we mean by financial intelligence? How to assess a company's health? 2. Use the plain language to define operating experience, capital expenditure, accruals, depreciation, and goodwill. 3. Describe differences ...

Question suppose we have a hash table which has the hash

Question : Suppose we have a hash table which has the hash function integer % 13. For Quadratic and Linear Probing, what sequence of 13 different integers > 0 (positive) would create a worst-case situation over the entir ...

What are some topics that must be covered in a business

What are some topics that must be covered in a business case presented to management?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As