Warning: include(/home/smartonl/royalcustomessays.com/wp-content/advanced-cache.php): failed to open stream: No such file or directory in /home/smartonl/royalcustomessays.com/wp-settings.php on line 95

Warning: include(): Failed opening '/home/smartonl/royalcustomessays.com/wp-content/advanced-cache.php' for inclusion (include_path='.:/opt/alt/php56/usr/share/pear:/opt/alt/php56/usr/share/php') in /home/smartonl/royalcustomessays.com/wp-settings.php on line 95
Software Piracy – RoyalCustomEssays

Software Piracy

Employability–Microbusiness
November 2, 2018
Free Trade Under Fire by Douglas A. Irvin
November 2, 2018

MIS Bonus

Expanding on the information in the last chapter of your textbook, select a research topic related to computer security, conduct a brief research on the topic referencing current events as they relate to the topic, analyze the information with respect to different perspectives, theories or solutions.
Select from one of the following topics are:

Cyber Security
Software Piracy
One of the Several US Federal Laws related to Computer Crime (see your textbook)
One of the ways terrorists are Using the Internet (see your textbook)
One of the categories of potential Cyberterrorist Attacks (see your textbook)
One of the commonly used Controls to safeguard Information Systems (see your textbook)

Below is an example of Cyber Security:
a. Define cyber security, discuss a specific aspect of cyber security, and state your thesis.
b. Present in-depth information regarding existing knowledge and/or research on the topic of cyber security. What are the various viewpoints and ideas regarding cyber security?
c. How is cyber security understood? What methodology is implemented? How is data collected? Who collects the data?
d. Based on existing literature and data, what insightful patterns, similarities/differences, or trends can you identify that relate to your thesis and topic focus?
e. What limitations exist with cyber security and what are the implications?
f. What conclusions can you draw from your findings?
g. Present and describe at least three possible solutions to enhance cyber security.

Task 2: Write a research paper with the following report specifications. Save your work with your yourlastname-first name-bonus as the file name (e.g., smith-jane-bonus). See attached for a sample report and the rubric that will be used to grade this assignment.

Use Word 2016 to generate a report with the following specifications:
• The report body should be a maximum of two double-spaced pages (not including the cover page, table of contents, bibliography page, and appendices).
• Use Arial font size 12 with 1” for all margins.
• Not including your textbook, use at least three different and recent references (less than 3 years old), and use citation to credit sources of information (see below)
• You may find it helpful to create a Google Alert, which will provide you with frequent alerts when information is found on your topic. See: www.google.com/alerts
• Cover page: The report should have a cover page that includes your name, course name and CRN, and date.
• Table of Contents (TOC): The report should have a table of contents showing page numbers for the rest of the report.
• Abstract: The report should have an abstract that briefly summarizes the research.
• Introduction. The report should start with an introduction section that introduces the research topics.
• Report Body: The body of report should contain compilation of the research findings.
• Conclusion: The report should end with a conclusion section that summarizes the research findings.
• References: The report should have a reference page that lists all citations and sources (see below).
• Appendices: You may include any diagram, chart, or picture that is associated with the research (use citation to credit sources).

Notes:
References:
• Do not use or include any Wikipedia resource as a reference.
• Do not use books for resources as a reference.
• When using websites, each web page on a single website is a part of the same reference.
• Make sure you have at least 3 references that are less than 3 years old.

Citations:
• Utilize APA formatting for citations. You will want to use a tool such as www.citationmachine.net to assist you with correctly reference formatting. In addition, you may want to use a pdf document with more information at APA Citation Style (PDF), and/or watch a video on creating a document at How to Format a Letter in APA Style (Video).
• You should make the citation, copy it, and then paste each of the references into the reference section on a separate page after the letter, in alphabetical order. Label this section as References. For more information on formatting for APA style, access information at the following site: http://library.uhd.edu/apa
• You may find it helpful to use www.citationmachine.net to assist with the formatting of the citations.

Place Order