Week 4
Part 1-Apa Format- 300 Words
For this assignment you will post your answers to the questions in each thread. Use examples from the readings, or from your own research, to support your views, as appropriate. You are encouraged to conduct research and use other sources to support your answers. Be sure to list your references at the end of your post. References must be in APA citation format. All posts must be a minimum of 300 words.
Read the case study on pp. 198-199 of the textbook and answer the following questions:
1. If you are reading a web page about a particular topic and see related advertisements appear along the side of the page, do you feel the advertising constitutes an invasion of your privacy? What if the advertisements were generated not only on the basis of content on the page you are currently viewing, but on the basis of the most recent 5 or 10 web pages that you viewed?
Read the case study on pp. 221-222 of the textbook and answer the following questions:
2. According to the court, did Byce acquire the source code through improper means? Why or why not?
3. What do you think of Byce's negotiation tactics? If you were in Byce's position, what other options might you have considered?
Forum Grading Rubric (100 Points)
Synthesis of Concepts
55
Clear Citations using APA format
10
Writing Standards
10
Peer Reviews (minimum of 2) – Responses posted after the current week will not be accepted
25
Timeliness – 10% penalty per week for late work
Part 2- APA Format- 300 Words
For this assignment you will post your answers to the questions in each thread You are encouraged to conduct research and use other sources to support your answers. Be sure to list your references at the end of your post. References must be in APA citation format. All posts must be a minimum of 300 words.
1. What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Others? Be prepared to support your answers.
2. In a corporate, networked setting, should end users be permitted to install applications on their workstations, whether they applications are on a disk or downloaded from the Internet? What kind of judgments should people make before downloading a piece of software?
Forum Grading Rubric (100 Points)
Synthesis of Concepts
55
Clear Citations using APA format
10
Writing Standards
10
Timeliness
10
Peer Reviews (minimum of 2)
15
This assignment is a formative assessment for Course Objective 4.
Part 3- APA Format-1 full page
Assignment Instructions
In order to complete assignment #4 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source.
RESEARCHING INTRUSION DETECTION SYSTEMS
Using the Internet and other print material, gather data about intrusion-detection systems (IDSs). Research 3-5 different vendor systems. Compare their list of features (active IDS, passive IDS, network-based, host-based, anomaly systems, etc.). Create a table that compares the features. Based on your research, which system would you recommend and why?
Assignment Rubric ( 100 Points)
Synthesis of Concepts
60
Writing Standards – APA format
20
Timeliness
20
Part 4- APA Format- 1 Full Page
Assignment Instructions
In order to complete assignment #4 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source.
Chapter 6
Chapter 6 noted that Friendster has obtained a number of social networking patents that it could potentially assert against other social networking sites such as Facebook and MySpace. Suppose you are corporate counsel at one of these two companies and you expect that you may eventually be sued by Friendster. In addition to contesting the validity or enforceability of the Friendster patents, what are some of your other options?