1 / 19

CMGT 582 Social Responsibility / snaptutorial.com

CMGT 582 Week 1 Discussion Information Systems<br>t<br>CMGT 582 Week 1 Vampire Legends<br><br> <br>

Richhard29
Download Presentation

CMGT 582 Social Responsibility / snaptutorial.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CMGT 582 Entire Course (June,2020) For more classes visit www.snaptutorial.com CMGT 582 Week 1 Discussion Information Systems CMGT 582 Week 1 Vampire Legends CMGT 582 Week 2 Discussion Digital Rights Management CMGT 582 Week 2 Crusin’ Fusion, Part 1 CMGT 582 Week 3 Discussion Privacy v. Convenience CMGT 582 Week 3 Crusin’ Fusion, Part 2 CMGT 582 Week 3 Team Privacy Challenges

  2. CMGT 582 Week 4 Discussion Safeguarding Against Security Threats CMGT 582 Week 4 Devil’s Canyon, Part 1 CMGT 582 Week 5 Discussion Information Security Risks CMGT 582 Week 5 Devil’s Canyon, Part 2 CMGT 582 Week 6 Discussion Security Life Cycle Steps CMGT 582 Week 6 Signature Assignment Security Audit ************************************************* CMGT 582 Week 1 Discussion Information Systems

  3. For more classes visit www.snaptutorial.com As customers, students, patients, taxpayers, and citizens, we are surrounded by information systems that support customer interactions. Respond to the following in a minimum of 175 words: Identify and describe two such systems that you have used. Briefly discuss the types of customer interactions you have experienced with these systems. Compare what you found to be important security features of each one. ************************************************* CMGT 582 Week 1 Vampire Legends

  4. For more classes visit www.snaptutorial.com Resource: Simulation Transcript Part A: Ch. 10 Role Playing Sim: Vampire Legends In this role-playing simulation, you will be the acting CIO and will specifically work on the strategy and the budget of the game Ancient Age, the sequel to Vampire Legends. The simulation will require you to give a breakdown of the budget report, choose an allocation strategy based on the risks and expenses involved, choose the best advertising campaign, analyze threats related to information security, and decide the course of action in handling threats to information security. Using the Vampire Legends Access link, complete the interactive before moving to Part B. Part B: Memo to CEO Write a 2- to 3-page memo to the Chief Executive Officer (CEO) of the Vampire Legends organization to: Analyze the components of information security asit applies to the scenario presented in Vampire Legends, including:

  5. A breakdown of the budget report Your allocation strategy based on the risks and expenses involved Your choice for the best advertising campaign The course of action in handling information security threats in the future Illustrate the role of ethics as presented in the Vampire Legends simulation conflict to reflect the relationship between ethics the success of the Vampire Legends organization. Include: The ethical conflict in this scenario The consequences of the conflict The solution to the conflict The impact of ethics on revenue Submit your assignment. ************************************************* CMGT 582 Week 2 Crusin’ Fusion, Part 1 For more classes visit www.snaptutorial.com Part A: Ch. 6 Role Playing Sim: Cruisin' Fusion

  6. In this simulation, you will understand how to develop a website for a chain of concession stands you inherited from Uncle Al. You’re not sure what to do with the concession truck, but a couple of your friends think Al was onto something with his unusual taco food truck. They want to partner with you to expand, targeting sports events, outdoor concerts, political rallies, holiday marches, and other events where customers might pay a little more for a very distinctive and healthier meal. With the right marketing, this could be a promising business venture. Using the Crusin’ Fusion Simulation Access link, complete the interactive before moving to Part B. Part B: Cruisin’ Fusion Contest Now that the Crusin’ Fusion website is up-and-running, you and your team have decided to run a contest on the blog asking customers to name the latest fusion recipe. In order to participate, the customer will need to enter first and last name, phone number, and an email address, as well as the suggested fusion name. The winner of the contest will receive a $20 gift card. Kiran supports this idea but has concerns she wants the team to consider before moving forward. She has asked that you prepare a 6- to 10-slide presentation with speaker notes for the next web meeting to address the following:

  7. Research and assess the ethical issues related to data customer collection and information management. How will customer information be protected? Research and examine the need to protect the intellectual property of the customers who submit name suggestions. What protection will Cruisin’ Fusion need in order to use the name suggested by the winner? What protection or disclaimer does the customer require? Include a 1/2-page disclaimer to add to the blog for customers outlining the contest rules, explaining how their personal information will be used and stored, and discussing the use of all intellectual property submitted as part of the contest. Submit your assignment. ************************************************* CMGT 582 Week 2 Discussion Digital Rights Management For more classes visit www.snaptutorial.com

  8. Respond to the following in a minimum of 175 words: Discuss digital rights management. Why do organizations use technology to protect intellectual capital? Describe a typical DRM application that can be used to manage access to digital content. Discus any disadvantages to using DRM. ************************************************* CMGT 582 Week 3 Discussion Privacy v. Convenience For more classes visit www.snaptutorial.com Access Google’s Privacy Policy by visiting Google.com and selecting the “Privacy” link located at the bottom of that page.

  9. Respond to the following in a minimum of 175 words: Discuss privacy versus convenience. Consider the following questions as you create your post. Does Google place cookies on your computer or other devices? Why do they use cookies? What are location-enabled services? Does Google have information about your actual location? Under what circumstances does Google share personal information with other companies? How do you describe the information security measures that Google takes to safeguard access to personal information? Is there anything in the privacy policy that makes you uncomfortable? Are you likely to change your Google search habits as a result of reviewing its privacy policy? ************************************************* CMGT 582 Week 3 Team Privacy Challenges For more classes visit www.snaptutorial.com

  10. Using the Case Study #1 Facebook and Instagram: Privacy Challenges Access link, review the information presented in the Case Study: Facebook and Instagram: Privacy Challenges. Working together as a team, prepare an email analyzing ethical privacy trends, confidentiality, and privacy regulations based on the information in the Case Study for the employees in the Vampire Legends organization from Week 1. Consider the following questions as you create your email: How might privacy and user considerations differ for an application such as Facebook, which is used primarily by individual users, compared with an application such as an ERP system that is used primarily by corporations? How does the default selection of sharing versus not sharing information affect the subsequent choices of individual users? What is the likely perspective of marketers on privacy issues at Facebook? How do app developers fit into the social media industry? Submit your assignment. ************************************************* CMGT 582 Week 3Crusin’ Fusion, Part 2

  11. For more classes visit www.snaptutorial.com Refer to Cruisin’ Fusion, Part A in Week 2. The Crusin’ Fusion taco trucks are gaining popularity, fueling a demand for an order-ahead option on the website. After careful consideration, the team has decided to add shopping cart software to the Cruisin’ Fusion website to meet this demand. Research various shopping cart software to determine the best choice for website. Write a 1- to 2-page blog post to launch this new feature and to reassure your customers that placing online orders is safe. In addition to introducing the order-ahead option, your blog post should: Analyze how the new shopping cart software upholds ethical trends in consumer privacy. Examine ethical considerations for maintaining confidentiality and consumer data. Describe the various privacy regulations upheld with the shopping cart software.

  12. Submit your assignment. ************************************************* CMGT 582 Week 4 Devil’s Canyon, Part 1 For more classes visit www.snaptutorial.com In this simulation, you will evaluate how to design an enterprise architecture for a Mountain Resort. Your job is to utilize the team’s vision to design the enterprise architecture using the interactive map tools while staying in budget. Using the Devil’s Canyon Simulation Access link, complete the interactive before moving to Part B. Part B: Policies, Plans, and Risks

  13. Now that you’ve seen all of the elements contributing to the Devil’s Canyon enterprise architecture, Justin wants to move forward with developing privacy policies to ensure videos aren’t distributed or uploaded to the net without the consent of the people in them. This opens a much larger conversation: Devil’s Canyon is also in need of a complete security plan, as well as risk assessments. In a 2- to 3-page rationale and table, prepare the following information to present to the Devil’s Canyon team: Explain the relationship between policies and security plans. Identify potential policy needs, noting Justin’s privacy policy, in relation to the Devil’s Canyon enterprise structure. Outline the importance of a security plan in relation to security roles and safeguards. Analyze at least 5 security-related risks/threats that Devil’s Canyon may face. Assess the probability and impact to the Devil’s Canyon if each risk occurs. Based on these two factors, determine the overall risk level. For purposes of this assignment, evaluate and categorize each factor as low, medium, or high, and create a table to illustrate the risks. For example, a risk/threat with a low likelihood of occurrence and a high impact would represent an overall medium risk. Consider digital elements mentioned in the designing of the enterprise architecture, such as software, hardware, proposed security measures, smart lift tickets, web cam systems, and smartphones. Submit your assignment. *************************************************

  14. CMGT 582 Week 4 Discussion Safeguarding Against Security Threats For more classes visit www.snaptutorial.com Individuals and organizations today face a variety of security threats. To protect themselves from these threats, they usually take certain protective measures—commonly known as safeguards. Respond to the following in a minimum of 175 words: Discuss some important safeguards and explain how they function in protecting organizations from security threats. Use a specific example when possible. *************************************************

  15. CMGT 582 Week 5 Devil’s Canyon, Part 2 For more classes visit www.snaptutorial.com Refer to Devil’s Canyon, Part A in Week 4. Using the potential risks for Devil’s Canyon you identified in Week 4, create a 3- to 4-page matrix to share with the team. In your matrix: Briefly describe each of the identified risks/threats. Analyze and evaluate the security controls that mitigate each of the risks/threats identified. Provide a rationale for how each of the controls identified mitigates the risk to an acceptable level. Research and describe the security technologies and security design that can be used to mitigate each of the identified information security risks. Submit your assignment.

  16. ************************************************* CMGT 582 Week 5 Discussion Information Security Risks For more classes visit www.snaptutorial.com Respond to the following in a minimum of 175 words: Discuss the steps that an organization takes in order to manage information security risks and build a risk matrix. What is involved in each step of this process? Use a specific organization in your response. ************************************************* CMGT 582 Week 6 Discussion Security Life Cycle Steps

  17. For more classes visit www.snaptutorial.com Respond to the following in a minimum of 175 words: Discuss the differences between the systems development life cycle (SDLC) and the security life cycle. Include in your discussion, both management and non-management IT security positions that perform security life cycle steps and briefly describe their role. ************************************************* CMGT 582 Week 6 Signature Assignment Security Audit For more classes visit

  18. www.snaptutorial.com You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course. Vampire Legends (Week 1) Cruisin’ Fusion (Weeks 2- 3) Devil’s Canyon (Weeks 4 – 5) Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process: Potential Risk to be Reviewed:Describe the risk. Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data. Regulation and Compliance Issues:Analyze how regulations and compliance issues could impact the organization. Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two. Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues. Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk. Example: Determine whether anti-virus software is in use. Example: Determine whether virus signatures are periodically updated. Example: Determine whether periodic virus scans are performed.

  19. Provide a detailed analysis of the resources and/or tools available, beyond the simple explanation in score point two. IT Security – Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources. Review the various options available to address those processes and methods previously explained, and which ones might be feasible. IT Security – Measures: Analyze the various security measures that could be taken within the organization. Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc. Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level). Example: 100% of servers and PCs have virus software installed. Example: 100% of the virus software installed is set to automatically update, including virus signatures. Example: 100% of the virus software installed is set to automatically perform a scan at least weekly. Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references. Submit your assignment. *************************************************

More Related