Question: This research paper addresses the following course outcomes: make informed decisions about the advantages and disadvantages and ethical considerations of information technology identify, assess, and

This research paper addresses the following course outcomes:

  • make informed decisions about the advantages and disadvantages and ethical considerations of information technology
  • identify, assess, and mitigate the security risks to PII (personally identifiable information)

This assignment has two goals: 1) to have students increase their understanding of the concept of Protecting Personally Identifiable Information (PPI) and other ethical issues related to the use of information technology through research, and 2) to help students learn to correctly use the tools and techniques within MS Word to format a research paper, including using MS Word's citation tools. These skills will be valuable throughout students academic careers. The paper will require a title page; two to three pages of content with incorporation of a minimum of three external resources from credible sources, and a works cited/reference page. A list of topics will be provided from which students can choose.

Topics for Research Paper

  1. Personally Identifiable Information (PII)
  2. Social Engineering
  3. Employee Monitoring
  4. Content Filtering
  5. Information Privacy
  6. Electronic Medical Records
  7. Biometrics (in terms of ethical and privacy issues)
  8. Identity Theft
  9. Use of Cookies
  10. Privacy Laws related to Information Technology use
  11. Intellectual Property Rights; Copyright

The paper will require a title page, pages of content with incorporation of a minimum of 3 external resources from credible sources, and a References page.

Step by Step Solution

3.44 Rating (151 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Title The Ethical Dilemma and PII Risks in Social Engineering Introduction Social Engineering in information security is manipulating individuals to divulge confidential information This form of secur... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!