Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

Computer Security Versus Privacy Thesis

MIS 1305 – Research Assignment

Computer Security Versus Privacy

Introduction:

Purpose:

The purpose of this assignment is to provide students with an opportunity to enhance their critical and creative thinking skills by conducting research to further learn about current issues in information systems and their impact on society at large.

Directions:

Complete tasks 1-5 as stated below. For this assignment, you will be required to conduct research and report your findings in a written paper (see below for Report Specifications). You will be graded on the depth and breadth of the research, contents of the paper, how well the paper meets the listed requirements for the assignment, spelling, and grammar. By completing this assignment, you should become more familiar with the current issues of IT and relate them to a real-world situation. See attached for additional information.

Task 1 – Research:

First, visit https://www.computerweekly.com/opinion/The-greatest-contest-ever-privacy-versus-security and read “The greatest contest ever – privacy versus security” article on computer security versus privacy to gain an understanding of the topic.

Next, conduct brief research on the “Computer Security Versus Privacy” topic referencing current events as they relate to the topic. Then, analyze the information with respect to different perspectives, theories, or solutions. Finally, present and describe your opinion on the topic.

Below is a list of topics you need to address in your paper:

  • Define computer security and privacy, discuss a specific aspect of computer security and privacy, and state your thesis.
  • How is computer security understood? What methodology is implemented? How is data collected? Who collects the data? What limitations exist with computer security and what are the implications?
  • How is privacy understood? What methodology is implemented? How is data secured? Who uses the data and for what purpose?
  • Present in-depth information regarding existing knowledge and/or research on computer security and privacy. What are the various viewpoints and ideas regarding computer security and privacy?