#Sales Offer!| Get upto 25% Off:

Research Project Proposal

The purpose of this assignment is to pick a topic for your research project and respond to classmate post

1.

Your Research Project will be a presentation on some aspect of the surveillance state.  Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth LIbrary research databases

Use at least five sources.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything.

2.)

Respond helpfully to below, posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. Wtite to help them focus and say something that you think would help them say something that would be valuable.

Ethics and Security Policies in IT

Throughout the project paper, I intend to explore diverse areas on the topic. First, the project will cover what information technology entails and why it is essential to incorporate ethics. It will also be necessary to cover aspects of ethics to lay a clear foundation for the paper. Exploring how ethics can enhance IT security is also relevant. Next, the project will work to cover on why how ethical behavior and practice can be implemented on IT.  Further, the project will cover the procedures involved in developing policies. Also, key under the topic is the advantages and reasons why IT security policies are required, why companies should strive to establish them. To better exhaust the topic, I will make use of peer-reviewed articles, related publications, and electronic sources.

The topic is relevant as it covers key issues that are at the core of the contemporary business platform. Information technology today is part of almost every organization. “Managing IT operations well is necessary for firms and organizations to prevail” (Acquisti et al., 2019). This makes sense with the understanding that Information is an essential tool that drives all functions within organizations. IT systems have to be designed and regulated in such a manner that the mutual interests of businesses and their clients are served. “Security and privacy concerns over customer details and related Information have never been such important as it is currently” (Acquisti et al., 2019). It is now not a matter of the business world only, but also government agencies are taking the issue very seriously. Laws and regulations have been developed to enhance information security. The laws, however, are not enough, and more techniques and ways are required to instill sanity over IT security (Acquisti et al., 2019). Security policies and ethical practices are alternative approaches that are proving their worth in this area.

The topic is also crucial, taking into consideration the constant changes that are experienced in today’s business environment. “Change due to such factors as technology is inevitable” (Acquisti et al., 2019). When a change occurs, various aspects have to conform for things to run smoothly. Issues to do with ethical practice and policies have to be updated to reflect the changes that organizations undergo. IT system is an excellent platform to illustrate the importance of ethics, and the role of developing policies is vital for organizational development. “Ethics and policies are vital factors that can facilitate compliance with set standards and regulations” (Peltier, 2016)). Therefore, this topic is relevant as a pointer to ways through which organizations can progress towards a more secure business environment.

Apart from compliance with the law, Cyber-security in organizations has to be structured along with ethics and regulations. The security of Information, as we have seen, is essential. It is a term that is here to stay. Understanding how ethical practice can be encouraged with policies in place is critical. Employees with knowledge on this and willing to put it into practice stand a better chance of creating value within the capacity of work. Again organizations that will manage to formulate favorable policies and provide an ethical platform are likely to succeed (peltier, 2016). The topic, therefore, is not only exciting but also covers real issues in the present world.

References

Acquisti, A., Dinev, T., & Keil, M. (2019). Special issue on cyber security, privacy and ethics of information systems. Information Systems Frontiers, 21(6), 1203-1205.

Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications.

Found something interesting ?

• On-time delivery guarantee
• PhD-level professional writers
• Free Plagiarism Report

• 100% money-back guarantee
• Absolute Privacy & Confidentiality
• High Quality custom-written papers

Related Model Questions

Feel free to peruse our college and university model questions. If any our our assignment tasks interests you, click to place your order. Every paper is written by our professional essay writers from scratch to avoid plagiarism. We guarantee highest quality of work besides delivering your paper on time.

Grab your Discount!

25% Coupon Code: SAVE25
get 25% !!