Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Task - In this assessment you are required to -

Select a topic from the list given below and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, associated challenges & problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions etc.)

Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own report and make refinements accordingly.

Raise questions about the information provided by other students (this must be done in an adequately professional manner)

Respond to questions raised about your own information and that of other students

Contribute to discussions in general

Note that the aim of this task is:

1. To build an understanding and perspective of current hot topics in Information Security; and

2. To build generic skills including, but not limited to:

- a capacity for teamwork and collaboration;

- an ability for critical thinking, analysis and problem solving;

- information technology literacy;

- a capacity for lifelong learning and an appreciation of its necessity.

As such, the more you contribute to the development of these topics and related discussion the more likely you will score well in this task.

Topics Set

1. Digital signatures for secure e-commerce.

2. Biometrics for authentication: past, present and future.

3. Attacks against browsers and the potential countermeasures.

4. Recent trends in malware.

5. Signature-based intrusion detection systems.

6. Security and privacy issues of VoIP and Skype.

7. Privacy and security issues associated with Big Data.

8. Smart device security.

9. Internet of Things (IOT): Security issues and solutions.

10. Threats to wireless networks and countermeasures.

11. Bring Your Own Device (BYOD) security.

12. Security and privacy issues in cloud computing.

You are required to prepare and submit a report on your topic to address the following issues (Length of the report: 1500words,

a. Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarification on vague areas and research questions.

b. Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate.

c. Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Discuss why you view this issue/these issues as important.

d. Discuss the impact of the above mentioned issues and their application/impact in the real world.

e. Reflect on what you believe to be the most important lesson you have learnt as a result of these discussions.

f. Provide references (at least three) using APA referencing system including in text citations.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91999681

Have any Question?


Related Questions in Management Information System

Current amp emerging technologypart ii - war quiz 9 chapter

Current & Emerging Technology Part II - WAR Quiz 9/ Chapter 9 Essay Question 1: What is the challenging route to disciplined imagination? Essay Question 2: Describe disciplined imagination? Part II - WAR Quiz 10/ Chapter ...

Risk is inherent in providing healthcare services we will

Risk is inherent in providing healthcare services. We will always deal with a certain amount of risk as we go about our work of caring for patients each day. Discuss at least two specific healthcare projects, services, o ...

During the course of your employment you may have

During the course of your employment you may have experienced working for both a male and female supervisor. Discuss from your personal point of view the advantages/disadvantages and like/dislike of working for each gend ...

The main project in this project you are either work on the

The main project: In this project, you are either work on the hypothetical company or an existing company. In either case, you are supposed to develop a Business Intelligence Development Plan for a local corporation. In ...

Qestion write on any topic related to technology security

Question : Write on any topic related to technology security - 11 Pages and 5 References Describe and discuss at least two backup strategies. Discuss the use of cloud backup strategies 1- 2 pages with References Explain ...

Need answers to the below questions 12 - 1 page each

Need Answers to the below Questions (1/2 - 1 page each answer) This is of the assigned textbook "Wharton Managing Emerging Technologies" Q1: Clarify any 2 of the variable evaluation approaches for future markets and emer ...

Search the csu library the internet or any specific

Search the CSU library, the Internet, or any specific websites, and scan IT industry magazines to find an example of an IT project that had problems due to organizational issues. Write a paper summarizing the key stakeho ...

Instructionsyou have just been hired as a compliance

Instructions You have just been hired as a compliance officer for your healthcare organization, and you have discovered that the food services department of the organization is not in compliance with state food safety re ...

Case study design scenario - a read the harriets fruit and

Case Study : Design Scenario - A Read the Harriet's Fruit and Chocolate Company case study found in Chapter 2 of the textbook. Then, answer the questions below. Each response should be one (1) paragraph in length submitt ...

Confidentiality integrity and availability or the cia triad

Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As