The first component of the summative assessment for this course is the development and creation of a risk analysis paper. The assessment will allow students the opportunity to inves
The first component of the summative assessment for this course is the development and creation of a risk analysis paper. The assessment will allow students the opportunity to investigate international and U.S. cyberlaws; state statutes; criminal, civil, private, and public laws; and ethics and then compare them within the current cyber business model of an organization to identify any implications for information technology. Students will research their chosen organization, studying the business models, to identify key areas of potential risk due to the business activities and industry.
Prompt
Submit a comprehensive risk analysis paper that identifies the cyberlaw foundations that affect the current information technology business model. The framework for the assessment will include how the business model ensures that their current cyber practices are both legal and ethical.
Specifically the following critical elements must be addressed:
- Define and evaluate the information technology business model of the organization.
- Analyze the precise cyber-security laws, private and public laws, state statutes, criminal and civil laws, and ethical guidelines that are pertinent to the organization.
- Evaluate the current cyberlaws, regulations, and policies within the organization as they relate to the organization’s information systems.
- Cyberlaw crimes
- Evaluate how cyber-related crimes should be investigated and handled within an organization.
- Analyze the impact that these cyber-crimes can have on an organization’s information technology structure.
- Evaluate the appropriate information security measures that should be in place to safeguard an organization’s information.
- Cyber-crime and e-commerce
- Analyze the organization’s current information systems security measures in place that allow users to access the organization’s data.
- Evaluate the current cyberlaws to ensure that they protect the organization’s data against outside intrusion.
What to Submit
Your paper must be submitted as a three- to five-page Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.