Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Research Paper Using Word

This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly incorporate citations and references in APA format. Students may use the tools and techniques within Word to format the research paper, including use of the References and citation tools. These skills will be valuable throughout a student's academic career. The paper will require a title page, NO abstract, three to four full pages of content with incorporation of a minimum of 3 external resources from credible sources and a Works Cited/References page. Wikipedia and similar general information sites, blogs or discussion groups are not considered creditable sources for a research project. No more than 10% of the paper may be in the form of a direct citation from an external source.

A list of topics from which students can choose is provided below.

Topics for Research Paper

1. Social Engineering - what it is, how it is used, and potential positive and negative impacts on individuals and on society
2. Employee Monitoring - why and how it is used, the legal issues surrounding its use, and impacts on employer and employee
3. Biometrics - various implementations and the ethical and privacy issues related to the use of biometrics
4. Use of Cookies - what they are, how they are used, and potential positive and negative impacts
5. What are the privacy laws related to Information Technology use and how do they impact you personally?
6. Intellectual Property Rights; issues related to copyright, fair use, copyright infringement, and the potential personal and financial impacts
7. The Edward Snowden case - the dilemma between the "Official Secrets Act" versus a perceived duty to share versus the damage it may do to national security.
8. The Apple vs. FBI controversy over unlocking the iPhone

If there is another topic that addresses ethical issues as related to information technology that is of special interest to you but one that is not in the list above, request permission from your instructor before selecting this alternate topic.

Writing Quality for the Research Paper

* All Grammar, Verb Tenses, Pronouns, Spelling, Punctuation, and Writing Competency should be without error.

* Be particularly careful about mis-matching a noun and pronoun. For example, if you say "A person does this..." then do not use "their" or "they" when referring to that person. "Person" is singular; "their" or "they" is plural.

* Remember: there is not their, your is not you're, its is not it's, too is not to or two,site is not cite, and who should be used after an individual, not that. For example, "the person WHO made the speech" not "the person THAT made the speech."

* In a professional paper one does not use contractions (doesn't, don't, etc.) and one does not use the personal I, you or your. Use the impersonal as in the previous sentence. It is more business-like to say "In a professional paper one should not use contractions," rather than saying, "In a professional paper you don't use contractions."

*Remember: spell-check, then proofread. Better yet, have a friend or colleague read it before submitting it. Read it out loud to yourself. Read it as if you are submitting it to your boss.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92370554
  • Price:- $45

Priced at Now at $45, Verified Solution

Have any Question?


Related Questions in Management Information System

Topic we all had the unfortunate experience of seeing how

Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey abit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly i ...

Review the swot analysis microsoftreg powerpointreg prior

Review the SWOT Analysis Microsoft® PowerPoint® prior to completing this assignment. Based on the Community Hospital scenario located in this week's required reading, conduct a SWOT analysis to generate a list of perceiv ...

A crucial starting point to develop an effective disaster

A crucial starting point to develop an effective disaster recovery plan is to cultivate an efficient Business Impact Analysis (BIA). The BIA evaluates the potential effect of interruptions to an organization's critical b ...

Promptidentify a news story or current event that

Prompt Identify a news story or current event that demonstrates a logical fallacy. Identify the fallacy and explain how it can be avoided. Also, be sure to explain why you believe logical fallacies are used, and what pur ...

Identify the high level logical modules in the system and

Identify the high level logical modules in the system and the relationships between them. You can concentrate on part of a system and not a whole complex system, as long as you can come up with at least 5 high level logi ...

Assignmentas a member of the information security team at a

Assignment As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory ...

Question onesuppose the following mib for a certain

Question One Suppose the following MIB for a certain enterprise BikesFun selling bikes and t-shirts. Draw request-response messages, as shown in figures 6.40 and 6.41 (chapter 6), to retrieve all columnar objects of the ...

The scenariomusic university has asked you to help them to

The Scenario Music University has asked you to help them to design their student performance data mart. Your requirements elicitation with the clients has determined that they are interested in answering questions such a ...

Question suppose that in a divide and conquer algorithm we

Question : Suppose that, in a divide and conquer algorithm, we divide an instance of size n of a problem into 16 sub instances of size n/4 and the dividing takes O(1) time (you may ignore this step). Then we combine the ...

Question write a 1- to 2-page paper on cloud computing

Question : Write a 1- to 2-page paper on cloud computing services, paying particular attention to cloud storage, security, and application services. Begin with a brief history of cloud computing, and relate your paper to ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As