Short Answer, Research Paper.

User Generated

Ivapl1216

Computer Science

Description

Short Answer: Read Chapter 14 - Ethical Risks and Responsibilities of IT Innovations. Chapter 14 - Ethical Risks and Responsibilities of IT Innovations.pptx Draft an IT policy to protect the security and privacy of users of websites that collect personal information to make buying recommendations. The policy should be about 3 paragraphs. (A paragraph should have at least 3 sentences: beginning, middle, and end.) Do NOT copy an existing policy, but reference examples of existing policies that helped you craft your own policy. Make suggestions to at least 2 other students on how they could strengthen their IT policies.

Research paper: After watching the videos below and reading about the Balanced Scorecard in Chapter 12, compare and contrast the Balanced Scorecard to one of the IT frameworks below (COBIT, ITIL, TOGAF, CMMI-Dev). Describe the context in which the Balanced Scorecard and the IT framework would be used. The paper should 3-4 pages in APA format, not counting the title and reference pages. Make sure you include in-text citations. Your paper should cite at least 3 peer-reviewed articles on IT governance frameworks.

Use the resources below to help you with this week's assignment.

Read the following chapters in the textbook:

Additional resources:

The following are examples of frameworks related to IT governance. You do not need to read the entire the framework--Use the PDFs below for background material for your research. The PDFs below can be referenced in your paper, but do not count as one of the peer-reviewed articles.

  • COBIT 5 Framework - This PDF describes the COBIT 5 (Control Objectives for Information and Related Technologies) framework for management of enterprise IT.
  • ITIL V3 - This PDF describes version 3 of the ITIL (Information Technology Infrastructure Library) framework for IT service management.
  • TOGAF 9.1 - This PDF introduces The Open Group Architecture Framework (TOGAP) for systems architecture.
  • CMMI-Dev v1.3 - This PDF describes the Capability Maturity Model Integration (CMMI) for systems development

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: ETHICAL RISKS AND IT INNOVATIONS

Ethical risks and IT innovations
Student’s name
Institutional affiliation

1

ETHICAL RISKS AND IT INNOVATIONS

2

Draft IT policy
Introduction
The IT system manages to stipulate that several measures should be taken so that the privacy and
security of website users are taken into consideration. The system looks at three critical areas that
should be implemented to ensure that the security issues are managed well. The three key areas
that should be addressed include; security of software and hardware, identification and
verification, as well as the use and storage of private information.
Identification
There should be clear areas that are laid down to ensure that any customer who intends to use the
website is well identified. Such work can be done by the supply of full names, pet names, the
passwords, physical address and email addresses (Ferrell & Fraedrich, 2015). The identification
procedure also includes the way in which one can be able to recover a password in case they are
lost, and one can be able to recover them by appropriately answering the security questions that
will be administered.
Storage and private information usage
The website users should know exactly where they have stored their private information within
site. The task should be done in areas where one cannot be able to access quickly. The use of the
private information should be limited so that it can be used when necessary and after obtaining
an allowance from the user (Schomberg, 2015).
Hardware and software security

ETHICAL RISKS AND IT INNOVATIONS

3

The devices used to login to various websites should well protect against vandalism. The use of
antivirus and firewalls are critical in ensuring that people who have not been authorized do not
access the software.
Conc...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags