Category: Information ethics

  • privacy two

    The topic of my project i want it to be. Workplace Surveillance and Employment Privacy It must be with a specific case study!!! Its a research paper. It must be case study, present theories of that, use legal/ ethical frameworks and everything it needs to be an A research paper. I am attaching the pdf of project instructions, a project sample that has taken an A and slides presentations so you learn exactly what this course offers. Please mention the sources within text, dont forget

    Attached Files (PDF/DOCX): SAMPLEPROJECT.pdf, L5-ITC 3036 Research Paper – Spring 2026.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Written Assignment 6

    This is for an information literacy course. I have attached some examples of past writing assignments I have completed to use as a base for writing. I need to maintain the same format and APA style. Absolutely no AI and full copyleaks AI detection report please. This is the prompt:

    First, review this list of Current Events and Controversial Issues from the University of Michigan-Flint. Choose a topic that interests you and that you know something about already. Next, find an article or opinion essay on your topic from a reputable online source. Your task is to find an article or essay that challenges your thinking on the topic in some way because the goal for this assignment is for you to challenge your biases.

    In a short response essay of approximately 600 to 800 words (212 to 312 pages), explore the biases you have on this issue using the following essay structure as your guide.

    First, in a short introduction, share the article you chose, how you found it, and why you chose it. Then, in your body paragraphs, respond to the following questions:

    What did you already think about this topic before reading the article?

    Where did you get that information? Tell the story of how you came to think what you think about this controversial issue.

    How do your experiences disconnect from the point of view presented in the article?

    What about the article challenged your current beliefs?

    Finally, try to put yourself into someone elses shoes who might disagree with you on this issue. What might they say about this issue? What points might they make that seem the most reasonable to you, even if you still disagree with them? Dont bring it back to your side. Just summarize what you think the other side might think. In this way, you will be forced to consider that side without feeling an urge to disagree with it.

    In your conclusion, reflect on the process of digging into these tough questions. What are some of the benefits of this kind of process? Be sure to provide an APA reference for your chosen article at the end of your response

    Attached Files (PDF/DOCX): Written Assignment 3.docx, Generative AI writing and information literacy.docx, Generative AI writing and information literacy.docx, Written Assignment 3.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • IT-549 Scenario Assignment Module Six: Gathering Quantities…

    IT 549 Scenario Assignment Module Six Guidelines and Rubric

    Overview

    For the Module Six assignment, you will assume an IT consultant role performing a risk assessment. As a consultant, your role is to evaluate an organizations security posture. Once the organizations security risk posture has been analyzed, you will use the analysis to provide insight into the likelihood of specific threats occurring. Skills gained from this assignment are beneficial for the final stages of the information assurance plan.

    Directions

    Review the prompts and provide your responses in a Microsoft Word document. In answering each prompt, be sure to defend your answers and explain how you have come to your solution. Use research-based evidence to support your responses.

    Specifically, you must address the following rubric criteria:

    1. In your consultant risk assessment role, you receive from the organization a List of Possible Threats and Vulnerabilities that is provided in the Supporting Materials section. You are asked to provide qualitative and quantitative data to measure the likelihood that any of the identified threats will occur to the clients information assets.
    2. Conduct research and describe resources you found that might provide insight into determining the likelihood that the threats would occur.
    3. Specify a trend in resources that might indicate a specific industry is particularly involved in gathering this kind of data.
    4. In the submission, evaluate any trends identified in your review of the provided threats and vulnerabilities.

    What to Submit

    Your responses for each prompt must be submitted as two to three paragraphs and as a Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.

    Supporting Materials

    The following resource supports your work on this assignment:

    Resource:

    IT 549 List of Possible Threats and Vulnerabilities

    Spoofing is attempting to gain access to a system by using a false identity. This can be accomplished using stolen user credentials or a false IP address. After the attacker successfully gains access as a legitimate user or host, elevation of privileges or abuse using authorization can begin.

    Tampering is the unauthorized modification of data, for example, as it flows over a network between two computers.

    Repudiation is the ability of userslegitimate or otherwiseto deny that they performed specific actions or transactions. Without adequate auditing, repudiation attacks are difficult to prove.

    Information disclosure is the unwanted exposure of private data. For example, users viewing the contents of a table or file that they are not authorized to open or users monitoring data passed in plain text over a network. Some examples of information disclosure vulnerabilities include the use of hidden form fields, comments embedded in webpages that contain database connection strings and connection details, and weak exception handling that can lead to internal system-level details being revealed to the client. Any of this information can be very useful to the attacker.

    Denial of service is the process of making a system or application unavailable. For example, a denial of service attack might be accomplished by bombarding a server with requests to consume all available system resources or by passing it malformed input data that can crash an application process.

    Elevation of privilege occurs when users with limited privileges assume the identity of a privileged user to gain privileged access to an application. For example, attackers with limited privileges might elevate their privilege level to compromise and take control of a highly privileged and trusted process or account.

    Use the List of Possible Threats and Vulnerabilities to respond to the prompts.

    Scenario Assignment Module Six Rubric

    CriteriaExceeds Expectations (100%)Meets Expectations (85%)Partially Meets Expectations (55%)Does Not Meet Expectations (0%)ValueQualitative and Quantitative DataExceeds expectations and the qualitative and quantitative data is substantiated with research-based evidenceProvides qualitative and quantitative data to measure the likelihood that any of these threats will actually occurAttempts to provide qualitative and quantitative data; however, the data requires more substantial evidence to prove the likeliness of the threats occurring or notDoes not provide any qualitative and quantitative data20InsightExceeds expectations and explanation uses content-based vocabulary and research-based evidence to support the answerExplains and provides insight into measuring the likelihood that some of the threats would occurProvides insight into measuring the likelihood that some of the threats would occur but does not explain the likelihood of the threatsDoes not provide insight into measuring the likelihood that some of the threats would occur20Trend in ResourcesExceeds expectations and the trend that is identified is substantiated with research-based evidenceSpecifies a trend in resources that might indicate a specific industry is particularly involved in gathering this kind of dataSpecifies a trend in resources that might indicate a specific industry is particularly involved in gathering the data but does not use content-based vocabulary to support the conclusionDoes not specify a trend in resources20EvaluationExceeds expectations and the evaluation uses content-based vocabulary and research-based evidence to support the answerEvaluates trends identified in the review of the provided threats and vulnerabilities and provides an explanationEvaluates trends identified in the review of the provided threats and vulnerabilities but does not explain the evaluationDoes not evaluate trends identified in the review of the provided threats and vulnerabilities20Clear CommunicationExceeds expectations with an intentional use of language that promotes a thorough understandingConsistently and effectively communicates in an organized way to a specific audienceShows progress toward meeting expectations, but communication is inconsistent or ineffective in a way that negatively impacts understandingShows no evidence of consistent, effective, or organized communication20Total:100%

  • YWCC 307 HW 3

    Let’s take a moment to practice productive disagreement. In this exercise, I’m going to assume the role of a project manager for the Rust application that monitors machines on a factory floor that we mentioned in the first exercise. I’m going to make a request of you that is patently unreasonable. Your job is not to complete the request, but to write a single paragraph refusal describing why it is unreasonable while still finding common ground and assuring me that you want the team to be successful. Here’s my request:

    Now that we have a Rust development environment set up, I think a good first project would be to design a simple operating system that we can use to host our application. Nothing fancy, just a microkernel with multiprocessor support and drivers for common video, networking, and storage devices. It’ll obviously need a TCP/IP stack too. Something like Linux but written in Rust. I guess something like https://www.redox-os.org/ , but with more drivers. Anyway I think this should take us about a week and then we can build the application to put on it. Let me know if you have any questions.

  • Capstone Seminar in Informatics

    Topic 3: Project Planning and Managing Communication

    Research Questions: What are the key components of an effective project plan, and how can they be tailored to your specific concentration area? How can effective project planning and communication management contribute to the success of projects?

    • Examine planning techniques, communication strategies, and tools specific to your projects.
    • Discuss communication planning, information distribution, and stakeholder communication.
    • Keep your topics relevant to real-life experiences, your project idea and/or your concentration area.

    Requirements:

    1. Thorough Research:
    • Investigate the research questions using credible sources. This could include academic journals, industry reports, books, and reputable websites.
    • Provide a well-rounded analysis that demonstrates a deep understanding of the topic.
    1. References and Resources:
    • Cite all the resources and references you use in your research. This not only supports your findings but also helps you practice proper academic and professional citation standards.
    1. Connection to Capstone Projects:
    • Reflect on how the project management processes discussed in your research can be applied to your Capstone Project.
    • Whether your project is individual or team-based, consider how these strategies can enhance your project’s planning, execution, and overall success.
    1. Reflection:
    • Include a section in your response where you reflect on the relevance of the project management techniques to your Capstone Project.
    • Discuss any insights gained and how you plan to implement these strategies in your project work.

    Format and Submission:

    • Your response should be well-organized and clearly written, with a logical flow of ideas.
    • Ensure that your submission is concise yet comprehensive, typically around 500-700 words.
    • Submit your response to the designated platform, by their due dates.

    Why This Matters:

    This exercise is designed to help you bridge the gap between theoretical knowledge and practical application. By engaging with these research questions, you will not only deepen your understanding of project management but also enhance your ability to apply these principles to real-world projects. This will be invaluable as you progress in your career in informatics.

  • write an informative essay on the leadership topic “conflict…

    structure the informative essay using the 1009W rubric as well as the requirements. the essay should be focused on conflict management army wise.

    Attached Files (PDF/DOCX): 1009W (Special) – Assessing Writing Informative Essay (Learner).pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Research Paper

    This paper provides you with an opportunity to increase and demonstrate your understanding of ethics and the law. You must write a 1-page term paper (excluding title page and references page) based on the topic chosen, Artificial Intelligence in Healthcare. In addition to the number of pages for the paper itself, you must include a title page and a reference page. Your research paper (including references and in-text citations) must be typed in APA style and format, double-spaced in Times New Roman, 12 pt. size font. Please see the file titled “Research Paper Instructions” for further details. Also, please see “Final A1 ITEC_6240” and “Final A2 ITEC_6240” for previous group submissions that lead up to the final research paper. The course textbook has also been attached, A Gift of Fire.

    Attached Files (PDF/DOCX): A Gift of Fire Textbook.pdf, APA (2020 7th ed) Guidance Resources Links.pdf, Research Paper Instructions.docx, Final A2 ITEC_6240.docx, Final A1 ITEC_6240.docx, D2 Answer.docx, A Gift of Fire Textbook.pdf, APA (2020 7th ed) Guidance Resources Links.pdf, A2 Assignment 2.docx, A1 Assignment 1 Answered.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • IT-549 Scenario Assignment Module Three: Hashing and Authent…

    IT 549 Scenario Assignment Module Three Guidelines and Rubric

    Overview

    For the Module Three assignment, you will be provided with multiple scenarios that contain hypothetical situations pertaining to authentication and security protocols. Each situation requires you to assess the situation and propose appropriate actions. This allows you to practically apply your knowledge of authentication protocols, which will assist you in developing statements of policy for your information assurance plan.

    Directions

    Review the prompts and provide your responses in a Microsoft Word document. Use research-based evidence to support your responses.

    Specifically, you must address the following rubric criteria:

    Explain the threat and environment in each of the following types of authentication and provide a solution for each scenario below:

    1. Alice sends a password, and Bob compares it against a database of passwords.
    2. Alice sends a password, and Bob hashes it and compares it against a database of hashed passwords.
    3. Alice computes the hash of a password and uses it as secret key in challenge response protocol.
    4. Alice computes the hash of a password and sends it to Bob, who hashes it and compares it against a database of double-hashed passwords.

    What to Submit

    Your responses for each prompt must be submitted as two to three paragraphs and as a Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.

    Scenario Assignment Module Three Rubric

    CriteriaExceeds Expectations (100%)Meets Expectations (85%)Partially Meets Expectations (55%)Does Not Meet Expectations (0%)ValueThreat and EnvironmentExceeds expectations substantiated with justification to support rationaleExplains the threat and the likely threat environment that exists within each of the given scenariosMinimally explains the threat and the likely threat environment that exists within each of the given scenariosDoes not explain the threat or the environment that exists within each of the given scenarios40SolutionExceeds expectations and the solution is substantiated by evidence-based researchProposes a solution that will provide the highest likelihood of resolving the situationProposes a solution that will provide the highest likelihood of resolving the situation but requires more research and evaluation of the threat or likely threat environmentDoes not propose a solution that will provide the highest likelihood of resolving the situation40Clear CommunicationExceeds expectations with an intentional use of language that promotes a thorough understandingConsistently and effectively communicates in an organized way to a specific audienceShows progress toward meeting expectations, but communication is inconsistent or ineffective in a way that negatively impacts understandingShows no evidence of consistent, effective, or organized communication20Total:100%

  • Weekly Reflection 6: Surveillance and Tracking

    Reflect on any of the readings from this week on the different approaches to ethics and morality. How are you currently thinking about your own sense of ethics? Has your exposure to these readings caused you to think differently about your ethical judgment?

    Reading:

    https://secure-justice.org/blog/alprs-and-the-fourth-amendment-what-schmidt-v-city-of-norfolk-gets-wrong

    https://library.municode.com/wa/seattle/codes/municipal_code?nodeId=TIT14HURI_CH14.18ACUSSUTE

    Attached Files (PDF/DOCX): Reviglio (2022) The untamed and discreet role of data brokers.pdf, Post9llGovernmentSurveillanceSuppressionSecrecy.pdf, curran-2023-surveillance-capitalism-and-systemic-digital-risk-the-imperative-to-collect-and-connect-and-the-risks-of.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Assignment 1

    1. Define healthcare informatics and list the various kinds of professionals who practice it 2. List at least 4 of the driving forces behind healthcare informatics and discuss 2 in detail 3. List at least 4 barriers to full implementation of healthcare informatics and discuss 2 in detail see attached lecture 2 or 3 pages of fact-based material to answer these questions. atleast 2 citations apa 7th edition

    Attached Files (PDF/DOCX): Lecture 1 – Introduction to Health Informatics and Course.pdf

    Note: Content extraction from these files is restricted, please review them manually.