Identify a trend in the field of IT security; analyze the trend in terms of both the involved technologies and the managerial implications; and predict the potential influence of the trend in the near future, say, in two years.
This assignment is to identify, analyze, and/or predict a trend in the field of IT security. The topic can be a particular security threat, technology, or managerial practice that is new to the field. The assignment will be due on April 19, Wednesday, at noon. I hope that this assignment will enhance our understanding of the emerging challenges and practices of IT security in today’s business.
This is an individual assignment. In the assignment, you are asked to:
identify a trend in the field of IT security;
analyze the trend in terms of both the involved technologies and the managerial implications; and
predict the potential influence of the trend in the near future, say, in two years.
The topic can be:
a particular security threat, technology, or managerial practice that is triggered by a security event. For example, the case of GoDaddy being down by a possible distributed denial-of-service (DDoS) attack on Sept 10th, 2012.
Note: you cannot use Target data breach or similar attacks (third-party data breach) for this assignment; we studied it in Assignment 1.
or, the response to a new IT technology. For example, the use of iPhone/iPad in your workplace.
Required assignment deliverables:
Research paper
Writing Requirements for the research paper
Although business writing is not a main purpose of the course, as business students, you are expected to produce quality writing in a professional fashion. Here below are the guidelines (or the requirements) for the writing.
References of any cited concept, theory, idea, and figure
All formal styles of writing require that when you use the ideas of or information from a source, you give that person or source credit next to those ideas. If you use the exact words from another source, you must put those words in quotes and give credit to the source next to those words. These sources must be further identified so that the reader can find and check those sources either through a reference system or footnotes.
Errors
The paper should be error-free so that writer’s credibility is not damaged.
Format
The writing should adopt an appropriate format (e.g., in the form of a business memo, an analysis report, a business proposal etc.) with proper margins, font size (preferably Times New Roman 12), line space, and Headers for each section. Appropriate headers help to frame the writing and improve the readability of the paper.
Coherence
Ideas and discussions are logically developed. The writing should form a meaningful whole.
Persuasiveness of the writing
Looks at how effectively the writer demonstrates awareness of the reader’s perspective and incorporates that perspective into the message. More exactly, writer should take reader’s perspective, address reader objections and concerns, explain how to implement conclusion/recommendation, and demonstrate how readers can benefit from accepting conclusion/recommendation.
Reasoning
The reasoning should be logic and convincing; claims presented in the writing should be supported with evidence/theories
Requirements: 4-5pages
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.