SlideShare a Scribd company logo
1 of 39
HUM 200 Project Part One: Exploration Document Guidelines
and Rubric
Overview
We all share common experiences that can be generally
classified within the major themes of art. Examples of these
themes include love, mortality, identity,
truth, and beauty. The representation of these themes through
various media reveals central beliefs shared by a common
people. The comparison of objects
from the humanities with similar themes helps to uncover not
only the uniqueness of each respective cultural artifact, but also
a shared human consciousness
that transcends time and place.
Your project for this course has two parts. In Project Part One,
you will complete an exploration document examining two
cultural artifacts that you select,
identifying a theme common to both of them and developing a
thesis statement related to the theme and artifacts. You will also
identify an audience who would
be interested in your artifacts, theme, and thesis statement. In
Project Part Two, you will develop a presentation for your
audience. In your presentation, you
will discuss the impact of the cultural artifacts, theme, and
thesis statement on both individuals and society, supporting
your claims with evidence. You will also
explain how study of the humanities has impacted you both
personally and professionally.
In Project Part One, you will demonstrate your mastery of the
following course outcomes:
professional experiences
in investigating expressions of human creativity
Communicate effectively to specific audiences in
examining fundamental aspects of human culture
major themes of human culture and creativity
Prompt
Choose two cultural artifacts to analyze. These artifacts may
take the form of any artistic medium, such as literature, poetry,
music, film, dance, painting, and
sculpture, and so on. Then, identify a common theme and
compare your examples to one another as expressions of the
same theme in different cultural
artifacts. Chapters 3 through 6 in the Soomo webtext will walk
you through this process.
Specifically, the following critical elements must be addressed:
I. Describe the cultural artifacts that you chose. Consider
questions such as these in your response: What is the name or
title of the artifact? Who is the
author or artist? What is the date or time period when the
artifact was created? What is the cultural location or physical
setting of the artifact? In
addition, you could consider including a photograph or image of
each cultural artifact, if they are visual artifacts.
II.
Identify at least one common theme that will serve as the
framework of your exploration document. How is the theme
expressed in your artifacts?
1
III. Explain how the theme you identified is related to your
personal experience. For instance, you could discuss how the
expression of the theme in your
cultural artifacts is connected to you personally.
IV. Discuss a profession that could be impacted by the theme
you identified. In other words, how is the theme you identified
related to professional
experiences? How could a working knowledge of the humanities
be useful in this field?
V. Describe at least three humanities resources that you could
use to investigate your theme and artifacts. Your sources must
be relevant to your theme
and of an appropriate academic nature. In your description,
consider questions such as the following: What are the
similarities and differences in the
content of your sources? What makes them appropriate and
relevant for investigating your issue? What was your thought
process when you were
searching for sources? How did you make choices? Did you
encounter any obstacles and, if so, how did you overcome them?
If you did not, why do you
think it was so easy to find what you needed?
VI. Use the humanities resources that you selected to research
your theme and cultural artifacts, making sure that you cite your
sources. Based on your
research, do the following:
A. Discuss the relationship between each cultural artifact and
its historical context. In other words, what were the
circumstances under which each
artifact was created?
B. Explain the similarities and differences that you observe in
the cultural artifacts you selected, in relation to the theme. For
instance, do the
artifacts contain any symbolism? If so, how are the symbols
both similar and different? What do the symbols tell you about
each artifact?
C. Discuss the medium—such as literature, music, or
sculpture—through which your cultural artifacts were created.
For instance, how did the
creator or creators of each artifact use the medium to convey
something about the meaning of the artifact?
VII. Based on your research, develop a thesis statement that
conveys the claim you plan to make about your theme and
artifacts. Your thesis statement
should be clear, specific, and arguable.
VIII. Based on your research, identify an audience that would
be interested in your theme and thesis statement. For example,
who would benefit most from
hearing your message?
IX. Describe how and why you can tailor your message to your
audience, providing specific examples based on your research.
For example, will your
audience understand the terminology and principles used by
humanities scholars, or will you need to explain these? How
will you communicate
effectively with your audience?
X. Provide a reference list that includes all of the humanities
resources you used to research your artifacts, theme, and thesis
statement. Ensure that your
list is formatted according to current APA guidelines (or
another format with instructor permission).
2
Project Part One Rubric
Guidelines for Submission: You will upload the polished
version of the Word document you downloaded from Soomo to
the submission link for instructor
grading and feedback. Please see the feedback provided by your
instructor in your SNHU course. Your exploration document
should adhere to the following
formatting requirements: 3 to 5 pages in length, double-spaced,
using 12-point Times New Roman font and one-inch margins.
You should use current APA style
guidelines (or another format approved by your instructor) for
your citations and reference list.
Critical Elements Exemplary Proficient Needs Improvement Not
Evident Value
Cultural Artifacts Meets “Proficient” criteria and
description is exceptionally
clear and contextualized
(100%)
Describes selected cultural
artifacts (85%)
Describes selected cultural
artifacts but with gaps in detail
or clarity (55%)
Does not describe selected
cultural artifacts (0%)
8
Common Theme Meets “Proficient” criteria and
identified theme is especially
well-aligned with artifacts
(100%)
Identifies at least one common
theme to serve as framework
of exploration document and
explains how theme is
expressed in artifacts (85%)
Identifies at least one common
theme to serve as framework
of exploration document and
explains how theme is
expressed in artifacts but with
gaps in clarity or detail (55%)
Does not identify at least one
common theme to serve as
framework of exploration
document and does not explain
how theme is expressed in
artifacts (0%)
8
Personal Experience Meets “Proficient” criteria and
explanation demonstrates
keen insight into impact of
humanities on personal
experiences (100%)
Explains ho w identified theme
is related to personal
experience (85%)
Explains ho w identified theme
is related to personal
experience but with gaps in
clarity or detail (55%)
Does not explain how identified
theme is related to personal
experience (0%)
8
Profession Meets “Proficient” criteria and
explanation demonstrates
keen insight into impact of
humanities on professional
experiences (100%)
Discusses a profession that
could be impacted by identified
theme (85%)
Discusses a profession that
could be impacted by
identified theme but with gaps
in clarity or detail (55%)
Does not discuss a profession
that could be impacted by
identified theme (0%)
8
Humanities Resources Meets “Proficient” criteria and
description of resources
demonstrates strong
understanding of information
needed to investigate
expressions o f human
creativity (100%)
Describes at least three
relevant and appropriate
humanities resources that
could be used to investigate
theme and artifacts (85%)
Describes at least three
humanities resources that
could be used to investigate
theme and artifacts but with
gaps in appropriateness,
relevance, or detail (55%)
Does not describe humanities
resources that could be used to
investigate theme and artifacts
(0%)
8
3
Critical Elements Exemplary Proficient Needs Improvement Not
Evident Value
Research: Historical
Context
Meets “Proficient” criteria and
response demonstrates insight
into essential humanities
principles (100%)
Discusses relationship between
each cultural artifact and its
historical context, citing
sources (85%)
Discusses relationship between
each cultural artifact and its
historical context but with gaps
in detail, clarity, or citation
(55%)
Does not discuss relationship
between each cultural artifact
and its historical context (0%)
8
Research: Similarities
and Differences
Meets “Proficient” criteria and
response demonstrates insight
into essential humanities
principles (100%)
Explains similarities and
differences observed in cultural
artifacts in relation to theme,
citing sources (85%)
Explains similarities and
differences observed in
cultural artifacts but not in
relation to theme or with gaps
in detail, clarity, or citation
(55%)
Does not explain similarities and
differences observed in cultural
artifacts (0%)
8
Research: Medium Meets “Proficient” criteria and
response demonstrates insight
into essential humanities
principles (100%)
Discusses the medium through
which the cultural artifacts
were created, citing sources
(85%)
Discusses the medium through
which cultural artifacts were
created but with gaps in detail,
clarity, or citation (55%)
Does not discuss the medium
through which the cultural
artifacts were created (0%)
8
Thesis Statement Meets “Proficient” criteria and
claim demonstrates insight into
connection between theme
and artifacts (100%)
Develops c lear, specific, and
arguable thesis statement that
conveys claim about theme
and artifacts, based on
research (85%)
Develops thes is statement that
conveys claim about theme
and artifacts but thesis
statement is not based on
research, lacks clarity or
specificity, or is not arguable
(55%)
Does not develop thesis
statement that conveys claim
about theme and artifacts (0%)
8
Audience Meets “Proficient” criteria and
identification of audience
demonstrates insight into
theme and thesis statement
(100%)
Identifies an audience that
would be interested in theme
and thesis statement, based on
research (85%)
Identifies an audience but
audience is not appropriate for
theme and thesis statement or
is not based on research (55%)
Does not identify an audience
(0%)
8
Message Meets “Proficient” criteria and
response demonstrates
sophisticated understanding of
how to effectively
communicate with specific
audience (100%)
Describes how and why
message can be tailored to
audience, providing specific
examples based on research
(85%)
Describes how and why
message can be tailored to
audience but with gaps in
examples or research support
(55%)
Does not describe how and why
message can be tailored to
audience (0%)
8
4
Critical Elements Exemplary Proficient Needs Improvement Not
Evident Value
Reference List Provides reference list that
includes all humanities
resources used to research
artifacts, theme, and thesis
statement, ensuring that list is
formatted according to current
APA guidelines (100%)
Provides reference list that
includes all humanities
resources used to research
artifacts, theme, and thesis
statement, but list has gaps i n
adherence to current APA
formatting guidelines (55%)
Does not provide reference list
that includes all humanities
resources used to research
artifacts, theme, and thesis
statement (0%)
8
Articulation of
Response
Submission is free of errors
related to citations, grammar,
spelling, syntax, and
organization and is presented
in a professional and easy-to-
read format (100%)
Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
(85%)
Submission has major errors
related to citations, grammar,
spelling, syntax, or
organization that negatively
impact readability and
articulation of main ideas
(55%)
Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas (0%)
4
Total 100%
5
HUM 200 Project Part One: Exploration Document Guidelines
and RubricOverviewPromptProject Part One Rubric
case4rev.docx
by Matthew Pankey
Submission date: 18-Apr-2022 09:54PM (UTC-0500)
Submission ID: 1814107232
File name: case4rev.docx (65.43K)
Word count: 3140
Character count: 19302
1
3
1
1
1
1
1
1
1
5
7
1
2
4
6
1
1
1
1
17%
SIMILARITY INDEX
16%
INTERNET SOURCES
0%
PUBLICATIONS
1%
STUDENT PAPERS
1 14%
2 1%
3 <1%
4 <1%
5 <1%
6 <1%
7 <1%
Exclude quotes Off
Exclude bibliography On
Exclude matches < 4 words
case4rev.docx
ORIGINALITY REPORT
PRIMARY SOURCES
www.coursehero.com
Internet Source
Submitted to Bridgepoint Education
Student Paper
Submitted to University of Malaya
Student Paper
Submitted to Park Lane College
Student Paper
sharpexperts.com
Internet Source
www.accaglobal.com
Internet Source
www.springerprofessional.de
Internet Source
1
6
Matthew Pankey
Cybersecurity in Data Management at Workplace: Draft
With the ubiquitous and pervasive application of information
technology in business organizations' environments, a
significant and sensitive amount of data is generated and stored
on cloud computing platforms, creating substantial
Cybersecurity threats and vulnerabilities Garraghan et al. 2018).
In the workforce environment, some fundamental duties and
responsibilities involve customers' data management, calling for
effective IT-based Cybersecurity customers. Cybersecurity in a
workplace occurred in a twofold dimension including the
growing data sophistication and data security and privacy
compromise due to Cyberattacks and Cybersecurity issues. In
the data management role and data manager, collecting and
securing data is prone to data breaches and cyber-attackers
aging access to sensitive data. Admittedly, Cybersecurity is a
fundamental IT-based challenge facing employees,
organizations, and stakeholders that require an effective
platform for data security and privacy concerns. Thus,
Cybersecurity in Data Management at Workplace resonates with
fundamental articulation on IT-based challenges in the
management information system. Therefore, addressing the
topic in detail will offer effective recognition of the IT-based
challenges and pragmatic solutions to ensure a secured data
management system. Suggesting fundamental Cybersecurity
measures to counteract customer data leakage experience is
fundamental.
Solution
s
Notably, the business case experiences require practical
approaches to ensure data privacy and security, limiting
possibilities of other customers' sensitive data leakage to
unauthorized individuals. Notably, a robust access control,
compliance by third-party vendors, employee data security and
awareness training, and developing an effective data breach
responses plan demonstrate real-time solutions to data breaches
in any organization. According to the authors, Data Leakage
Protection Based on Context provides an effective platform for
data breach and leakage management within an organization,
ensuring robust security and privacy concerns (Yu et al. 2018).
Similarly, in this analysis of the business, there is an
acknowledgment of Data Leakage Protection Based on Context
strategy to accommodate access control, compliance by third-
party vendors, employee data security and awareness training,
and developing an effective data breach responses plan. Thus, a
comprehensive explanation of each suggestion to counteract
data leakage experience within a workforce, exposing
customers' sensitive data to unauthorized personnel is necessary
for data security models' decision-making.
Access control
Access control accommodates several models that provide a
restrictive platform to ensure that only authorized individuals
within an organization have access to sensitive data. Notably,
mandatory access control, directory, rule-based, role-based,
risk-related, and attribute-based access control models are
effective for the security of data. For example, the rule-based
access control model offers significant security rules for
securing administrator systems. Specifically, access control
strategies such as user authentication, verification and
identification, password, data encryption and decryption
techniques, cryptographic analytics among other access control
measures provide an effective platform to restrict unauthorized
individuals for effective decision-making.
Similarly, the business case whereby there is a significant
Cybersecurity breach, causing customers' sensitive information
leakage to unauthorized individuals requires effective
articulation on access control strategies user authentication,
verification and identification, password, data encryption and
decryption techniques, cryptographic analytics for internal and
external customers data security in the workplace environment.
According to the researchers, effective access control and
Cybersecurity policies within domains such as healthcare,
finance, education, aviation, and commerce have been effective,
embracing robust information management system architecture,
accommodating information under control, and significant
Cybersecurity requirements within an organization (Mishra et
al. 2022). Similarly, the business case, via Data Leakage
Protection, Based on Context should accommodate
Cybersecurity policies and requirements such as data security,
privacy, confidentiality, integrity, and availability to create a
secured security infrastructure. Additionally, fundamental
access control practices such as user authentication,
verification, and identification, password, data encryption,
decryption techniques, cryptographic analytics among other
access control measures need fundamental applications to
ensure internal and external data privacy and security in an
organization.
Compliance by Third-Party Vendors
Importantly third-party compliance is a fundamental suggestion
for an organization that deals with sensitive data on a cloud
computing platform that supports information security. Notably,
a business organization that offers regulated data or access to IT
systems that contains sensitive data requires fundamental
articulation to third-party compliance obligations and
requirements. Third-party Compliance requirements
accommodate IM and presence services components, compliance
server, and support clients that are fundamental for information
security from Third-party organizations, accessing sensitive
data or IT Systems for business organizations. Specifically,
embracing vital steps such as the risk evaluation process, in
identifying, segmenting, mitigating, risk, and risk factors for
effective third-party preparedness is effective. Similarly, due
diligence proportion of risks involving data breaches is
effective in third-party compliance requirements. According to
the authors, accommodating Cyber Third-Party Risk
Management is effective for robust data security within an
organization, embracing Company-wide approach strategies for
the entire information security coverage (Keskin, et al. 2021).
Fundamentally, creating an effective platform for information
security through a comprehensive workflow system and a
Company-wide approach for risk management is an effective
obligation for third-party vendors' consideration. Similarly, the
business case should accommodate fundamental considerations
to ensure that third-party vendors with authority to access
significant and sensitive data meet all the third-party
compliance obligations.
Employee data security and awareness training
In the business case, Cybersecurity is a fundamental IT-based
challenge facing employees, organizations, and stakeholders
that require an effective platform for data security and privacy
concerns. Specifically, offering extensive and comprehensive
employee training on Cybersecurity and awareness is
fundamental in managing internal threats and vulnerabilities of
data security. According to the authors, training and creating
awareness on information security awareness, accommodating
current model and content provides an effective platform for
information security, managing internal threats and
vulnerabilities to information (Khando et al. 2021). Similarly,
the business case on customers' data breach and leakage due to
employees lacking awareness and knowledge on data security
and privacy require fundamental articulation on information
security wares, embracing modern and real-time methods
towards effective data management. Notably, training on
phishing attacks, password and authentication, physical
security, mobile device security, working remotely, public Wi -
Fi and Cloud security are underpinning. Importantly, the
business organization case requires fundamental employee
training and awareness on an information security system for a
robust solution on data leakage cases. Thus, employee training
and awareness on information security offers knowledge and
concepts in preventing data breaches and customers' data
leakage in an organization setting.
References
Garraghan, P, Yang, R, Wen, Z., Romanovsky, A., and Xu, J.
(2018) Emergent Failures: Rethinking Cloud Reliability at
Scale. IEEE Cloud Computing, 5 (5). pp. 12-21.
Khando, K., Gao, S., Islam, S., and Salman, A. (2021).
Enhancing employee’s information security awareness in private
and public organizations: A systematic literature review.
Computer & Security. DOI: 10.1016/j.cose.2021.102267
Keskin, O., Caramancion, K., Tatar, I., Raza, O., and Tatar, U.
(2021). Cyber Third-Party Risk Management: A Comparison of
Non-Intrusive Risk Scoring Reports, Electronics 2021, 10,
1168. https://doi.org/10.3390/electronics10101168
Mishra, A., Alzoubi, Y., Gill, A., and Anwar, M. (2022).
Cybersecurity Enterprises Policies: A Comparative Study.
Sensors, 22, 538.
https://doi.org/10.3390/s22020538
Yu, X., Tian, Z., Qiu, J., and Jiang, J. (2018). A Data Leakage
Prevention Method Based on the Reduction of Confidential and
Context Terms for Smart Mobile Devices. Hindawi Wireless
Communications and Mobile Computing.
https://doi.org/10.1155/2018/5823439
Running head: CYBERSECURITY AT WORKPLACE
1
CYBERSECURITY AT WORKPLACE
7
Cybersecurity methods: SWOT Analysis
Method 1: Access Control solution
Strengths of this method
Access control is a vital component of data security in cloud
computing. It dictates who is allowed to access and use the
company resources and information. Through authorization and
authentication, the access control standards and policies ensure
that users are correctly identified through login credentials such
as passwords, biometric scans, usernames, and passwords
(Colombo and Ferrari, 2019). Therefore, access control helps to
limit access to users’ data and this is a key strategy that can
help to enhance the privacy of data and information that is
stored by an organization through its cloud servers. In any
organization, access control helps to secure an organization’s
confidential information such as intellectual property, customer
data, and personally identifiable information from getting into
the wrong hands (Hasbini and Tom-Petersen, Jordan, 2017). It is
most effective with organizations that are uses hybrid and
multi-cloud computing systems that data, resources, and
applications in the companies’ hardware systems and their cloud
servers.
Weaknesses of this method
The access control method is limited by insider threats. Despite
the methods being effective in keeping off third-party users,
rogue employees can still leak the login credentials to the
wrong individuals and organizations (Colombo and Ferrari,
2019). In the US, insider threats are on the rise due to high
employee turnover in many organizations across the country.
Employees or leaders who retire or quit their jobs often end up
selling their former companies’ information or access
credentials that make it easy to access and steal or tamper with
the users' data. Therefore, Valenzano (2014) notes that insider
threats may render access control useless.
Another challenge with access control is hacking. Even though
organizations may try to control and monitor people who access
data and information from their systems, hackers have also
taken advantage of modern technology to develop powerful anti -
software tools that crack almost every system (Hasbini and
Tom-Petersen, Jordan, 2017). Examples of this software include
intruder, Nets parker, and Nmap.
Opportunity
With increasing technology, companies can test their access
control strategies. Ethical hacking allows companies to organize
hacking drills on their systems to test their effectiveness and
their employees’ level of preparedness (Valenzano, 2014). This
is crucial as it may help companies to identify the gaps in their
systems and enhance their access control strategies.
Furthermore, access control also allows companies to disable
the accounts of employees who leave their companies or change
the login credentials including passwords and encryption
protocols. Therefore, companies can still secure their systems
despite the threats from insiders and hackers.
Threats
Increasing cases of insider threats and hackers threaten the
integrity of access control methods. Nowadays, it is very
difficult to determine who to trust with the company’s
information. Access control methods cannot be effective if
employees lack self-control, transparency, and ethics. It has
become difficult to trust employees with critical business
information (Valenzano, 2014).
Method 2: Compliance by the third-party vendors
Strengths of this method
Increasing security concerns on cloud computing have forced
many organizations to use the third party-vendors to secure the
users' data (Shaverdian, 2019). The use of third-party vendors
helps to eliminate common cloud computing such as insider
threats. The third-party companies help to monitor a company’s
security system and therefore, it becomes difficult for rogue
employees or third parties to access the users’ data and a
company’s classified information such as its IP rights. One of
the strengths of using the third party method is its third-party
risk management program (TPRM). The TPRM involves the
third-party company and the host organization creating a risk
management program that addresses all the risks from both
sides (Li and Xu, 2021). Therefore, the TRPM helps the third
party company and the host organization to create monitoring
programs and remediation plans that help to manage all the
possible risks that may affect the integrity of the users’ data and
the privacy of the company’s vital information.
Furthermore, the TPRM is crucial is it assesses the internal
controls of the host company to test their effectiveness and
utilize the current software to fend off any risks and threats and
create a strong security program (Shaverdian, 2019). Using the
TPRM, this factor is made possible through the help of proper
technological tools such as automated monitoring, prompt
alerting of any threat, and tracking of high-risk behaviors
within the company. Therefore, these tools help to keep the
third-party program ahead of other methods.
Weaknesses of the method
The main weakness of third-party solutions is a lack of control.
By using this method, all the security procedures and protocols
are controlled by the third-party company. Although it may
seem to be effective at enhancing the security of the users’ data,
it also prevents large-scale organizations from expanding their
cloud-computing protocols (Li and Xu, 2021). Most
organizations often want to expand their cloud computing
servers to have both private and public cloud computing. Once
an organization selects the third-party method, other options are
not allowed.
Opportunities
The third-party method is the best option as it allows
organizations to draft security maps to identify the strengths
and weaknesses of both parties. Therefore, it gives
organizations a chance of testing their security systems and
protocols to determine their effectiveness and also address the
gaps that exist in the systems (Shaverdian, 2019). Using the
third-party solution, the challenge of hacking or insider threats
is almost zero since the entire security system is controlled and
managed by a third-party organization.
Threats
An organization may not have much control over the security
systems and security protocols since the entire work is
undertaken by a third-party company. However, if the security
system of the third-party company also fails, the host
organization is also likely to lose valuable data and information
(Li and Xu, 2021).
Method 3: employee data security and awareness training
The strengths
Employee training and awareness are crucial in equipping the
employees with the necessary skills to handle all the security
challenges on their cloud systems. It gives employees a chance
to effectively monitor the company systems and respond to any
security alerts that may arise from both internal and external
environments (Khando et al., 2021). With data security and
training awareness, it becomes easy for employees to enhance a
company’s private information and also secure the users’ data.
Weaknesses
No matter how good the data security and awareness security
training might be, this method is still challenged by the
increasing cases of insider threats and hackers. Since the
company’s employees may still be in charge of its systems, they
are likely to leak the company’s vital information to rivals or
unauthorized people (Khando et al., 2021).
Opportunities
Training programs help employees to learn how to be ethical
when handling the users’ data. They learn new methods and
tactics they can use to secure the company’s data and also
protect the users’ data. It is also among the ways that
organizations use to hone their employees’ skills in responding
to emergencies (Li et al., 2019).
Threats
This method is costly and it may take long before the employees
acquire all the skills that are necessary to protect the company’s
systems and cloud servers. Furthermore, hackers usually evolve
their skills almost all the time and therefore, this method may
not be effective at eliminating future or long-term security
threats from an organization (Khando et al., 2021).
Conclusion
In conclusion, using a third-party solution is the best method
that any organization can adopt to enhance the security of its
systems and cloud servers. This method gives helps an
organization to have a clear map regarding the strengths and
weaknesses of its systems and the security protocols that need
to be followed to secure the users’ data and information. In a
third-party solution, the risks of internal threats and hacking are
almost zero and hence, this method may be effective is effective
in protecting the users’ data.
References
Colombo, P., & Ferrari, E. (2019). Access control technologies
for Big Data
management systems: literature review and future
trends. Cybersecurity, 2(1), 1-13.
Hasbini, M. A., Tom-Petersen, M., & Jordan, D. (2017). The
Smart Cities Internet
of Access Control, opportunities and cybersecurity
challenges. Securing Smart Cities.
Khando, K., Gao, S., Islam, S. M., & Salman, A. (2021).
Enhancing employees
information security awareness in private and public
organizations: A systematic literature review. Computers &
Security, 106, 102267.
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019).
Investigating the
impact of cybersecurity policy awareness on employees’
cybersecurity behavior. International Journal of Information
Management, 45, 13-24.
Li, Y., & Xu, L. (2021). Cybersecurity investments in a two-
echelon supply chain
with third-party risk propagation. International Journal of
Production Research, 59(4), 1216-1238.
Shaverdian, P. (2019). Start with trust: utilizing blockchain to
resolve the third-party
data breach problem. UCLA L. Rev., 66, 1242.
Valenzano, A. (2014). Industrial cybersecurity: improving
security through access
control policy models. IEEE Industrial Electronics
Magazine, 8(2), 6-17.
Business Case Study structure
This Project Will Be Individual, not a Group project.
The Subject of the case study Will focus on Information
technology (IT) Hardware, software, or application solutions to
Improve a personal or Business challenge.
Ten Pages Minimum. Full APA-compliant Title and Reference
Pages will be in addition to the ten pages of the study.
Ten Scholarly or professional Sources Minimum, Properly
referenced and Cited in-Text. Wiki sites and advertisements will
not be counted.
American Psychological Association (APA) Formatting is
required. This includes headers, margins, indentation, spacing,
font, etc.
Business Case Outline
Section 1 (Introduction) / Describe one challenge that you or an
organization you have worked for have had which can be
resolved with an information technology (IT) hardware,
software, or application solution. (Appx one page).
Section 2 / research and describe three possible solutions to the
challenge presented in section 1. choose one type of solution
(hardware or software) for future comparison (appx three
pages).
Section 3 / compare the three possible solutions from section 2
using the swot (Strength, Weakness, opportunity, & Threat)
analysis model (appx four pages).
Section 4 (Conclusion) / Identify and Defend the solution
(choose one of the three) that provides the greatest benefit to
the organization. (appx two pages).
Additional Instructions
This is a Research paper, thus requiring numerous references
and citations. The minimum number of references is 10, but all
direct quotations and paraphrases must be properly cited in-text,
even content from your own previous papers. Your final paper
will be submitted automatically through Turnitin and plagiarism
will be dealt with according to the university’s policies. When
In doubt, cite the source of the information (according to APA
formatting) .
You may submit the final paper as many times as you wish. The
final feedback from the instructor will come with your draft
submission. I will provide corrections, but not so much detail
that I feel I am writing your paper for you. I also cannot see any
suspected plagiarism until the final submission (through
Turnitin), so be cognizant that your draft submission’s feedback
will not include that aspect.

More Related Content

Similar to HUM 200 Pr

Annotated BibliographyDue Nov 2829GenreMediumAnnotated .docx
Annotated BibliographyDue Nov 2829GenreMediumAnnotated .docxAnnotated BibliographyDue Nov 2829GenreMediumAnnotated .docx
Annotated BibliographyDue Nov 2829GenreMediumAnnotated .docxdurantheseldine
 
Click here to view the full Final Project description.Final .docx
Click here to view the full Final Project description.Final .docxClick here to view the full Final Project description.Final .docx
Click here to view the full Final Project description.Final .docxbartholomeocoombs
 
ENGL 309 Project 2 Assignment Sheet: Semester Topic Proposal and Annotated Bi...
ENGL 309 Project 2 Assignment Sheet: Semester Topic Proposal and Annotated Bi...ENGL 309 Project 2 Assignment Sheet: Semester Topic Proposal and Annotated Bi...
ENGL 309 Project 2 Assignment Sheet: Semester Topic Proposal and Annotated Bi...Jodie Nicotra
 
Overview The enduring relevance of the humanities is that they encou.docx
Overview The enduring relevance of the humanities is that they encou.docxOverview The enduring relevance of the humanities is that they encou.docx
Overview The enduring relevance of the humanities is that they encou.docxjacksnathalie
 
HIS 200 Project 2 Guidelines a
HIS 200 Project 2 Guidelines aHIS 200 Project 2 Guidelines a
HIS 200 Project 2 Guidelines aSusanaFurman449
 
1 HIS 200 Project 2 Guidelines and Rubric Overvie.docx
1 HIS 200 Project 2 Guidelines and Rubric  Overvie.docx1 HIS 200 Project 2 Guidelines and Rubric  Overvie.docx
1 HIS 200 Project 2 Guidelines and Rubric Overvie.docxjeremylockett77
 
i have already done like 8 pages already but i.docx
i have already done like 8 pages already but i.docxi have already done like 8 pages already but i.docx
i have already done like 8 pages already but i.docxstirlingvwriters
 
Course Project OverviewYour Popular Culture Project, a portfolio o.docx
Course Project OverviewYour Popular Culture Project, a portfolio o.docxCourse Project OverviewYour Popular Culture Project, a portfolio o.docx
Course Project OverviewYour Popular Culture Project, a portfolio o.docxbuffydtesurina
 
ATH 111 Final Project
ATH 111 Final ProjectATH 111 Final Project
ATH 111 Final ProjectAntonioBennet
 
Points 100Assignment 1 EssayCriteriaUnacceptableBelow .docx
Points 100Assignment 1 EssayCriteriaUnacceptableBelow .docxPoints 100Assignment 1 EssayCriteriaUnacceptableBelow .docx
Points 100Assignment 1 EssayCriteriaUnacceptableBelow .docxLeilaniPoolsy
 
HIS 100 Project 3 Multimedia Pre
HIS 100 Project 3 Multimedia PreHIS 100 Project 3 Multimedia Pre
HIS 100 Project 3 Multimedia PreSusanaFurman449
 

Similar to HUM 200 Pr (12)

Annotated BibliographyDue Nov 2829GenreMediumAnnotated .docx
Annotated BibliographyDue Nov 2829GenreMediumAnnotated .docxAnnotated BibliographyDue Nov 2829GenreMediumAnnotated .docx
Annotated BibliographyDue Nov 2829GenreMediumAnnotated .docx
 
Click here to view the full Final Project description.Final .docx
Click here to view the full Final Project description.Final .docxClick here to view the full Final Project description.Final .docx
Click here to view the full Final Project description.Final .docx
 
ENGL 309 Project 2 Assignment Sheet: Semester Topic Proposal and Annotated Bi...
ENGL 309 Project 2 Assignment Sheet: Semester Topic Proposal and Annotated Bi...ENGL 309 Project 2 Assignment Sheet: Semester Topic Proposal and Annotated Bi...
ENGL 309 Project 2 Assignment Sheet: Semester Topic Proposal and Annotated Bi...
 
Overview The enduring relevance of the humanities is that they encou.docx
Overview The enduring relevance of the humanities is that they encou.docxOverview The enduring relevance of the humanities is that they encou.docx
Overview The enduring relevance of the humanities is that they encou.docx
 
HIS 200 Project 2 Guidelines a
HIS 200 Project 2 Guidelines aHIS 200 Project 2 Guidelines a
HIS 200 Project 2 Guidelines a
 
SOCI/ANT 441 Meeting 3
SOCI/ANT 441 Meeting 3SOCI/ANT 441 Meeting 3
SOCI/ANT 441 Meeting 3
 
1 HIS 200 Project 2 Guidelines and Rubric Overvie.docx
1 HIS 200 Project 2 Guidelines and Rubric  Overvie.docx1 HIS 200 Project 2 Guidelines and Rubric  Overvie.docx
1 HIS 200 Project 2 Guidelines and Rubric Overvie.docx
 
i have already done like 8 pages already but i.docx
i have already done like 8 pages already but i.docxi have already done like 8 pages already but i.docx
i have already done like 8 pages already but i.docx
 
Course Project OverviewYour Popular Culture Project, a portfolio o.docx
Course Project OverviewYour Popular Culture Project, a portfolio o.docxCourse Project OverviewYour Popular Culture Project, a portfolio o.docx
Course Project OverviewYour Popular Culture Project, a portfolio o.docx
 
ATH 111 Final Project
ATH 111 Final ProjectATH 111 Final Project
ATH 111 Final Project
 
Points 100Assignment 1 EssayCriteriaUnacceptableBelow .docx
Points 100Assignment 1 EssayCriteriaUnacceptableBelow .docxPoints 100Assignment 1 EssayCriteriaUnacceptableBelow .docx
Points 100Assignment 1 EssayCriteriaUnacceptableBelow .docx
 
HIS 100 Project 3 Multimedia Pre
HIS 100 Project 3 Multimedia PreHIS 100 Project 3 Multimedia Pre
HIS 100 Project 3 Multimedia Pre
 

More from NarcisaBrandenburg70

1. A frequently asked question is Can structured techniques and obj.docx
1. A frequently asked question is Can structured techniques and obj.docx1. A frequently asked question is Can structured techniques and obj.docx
1. A frequently asked question is Can structured techniques and obj.docxNarcisaBrandenburg70
 
1. Which of the following BEST describes the primary goal of a re.docx
1.  Which of the following BEST describes the primary goal of a re.docx1.  Which of the following BEST describes the primary goal of a re.docx
1. Which of the following BEST describes the primary goal of a re.docxNarcisaBrandenburg70
 
1. Can psychological capital impact satisfaction and organizationa.docx
1. Can psychological capital impact satisfaction and organizationa.docx1. Can psychological capital impact satisfaction and organizationa.docx
1. Can psychological capital impact satisfaction and organizationa.docxNarcisaBrandenburg70
 
1. Apply principles and practices of human resource function2. Dem.docx
1. Apply principles and practices of human resource function2. Dem.docx1. Apply principles and practices of human resource function2. Dem.docx
1. Apply principles and practices of human resource function2. Dem.docxNarcisaBrandenburg70
 
1. A logistics specialist for Charm City Inc. must distribute case.docx
1. A logistics specialist for Charm City Inc. must distribute case.docx1. A logistics specialist for Charm City Inc. must distribute case.docx
1. A logistics specialist for Charm City Inc. must distribute case.docxNarcisaBrandenburg70
 
1. (TCO 4) Major fructose sources include (Points 4)     .docx
1. (TCO 4) Major fructose sources include (Points  4)     .docx1. (TCO 4) Major fructose sources include (Points  4)     .docx
1. (TCO 4) Major fructose sources include (Points 4)     .docxNarcisaBrandenburg70
 
1. Which major change in western society altered the image of chi.docx
1.  Which major change in western society altered the image of chi.docx1.  Which major change in western society altered the image of chi.docx
1. Which major change in western society altered the image of chi.docxNarcisaBrandenburg70
 
1. Briefly explain the meaning of political power and administrative.docx
1. Briefly explain the meaning of political power and administrative.docx1. Briefly explain the meaning of political power and administrative.docx
1. Briefly explain the meaning of political power and administrative.docxNarcisaBrandenburg70
 
1. Assume that you are assigned to conduct a program audit of a gran.docx
1. Assume that you are assigned to conduct a program audit of a gran.docx1. Assume that you are assigned to conduct a program audit of a gran.docx
1. Assume that you are assigned to conduct a program audit of a gran.docxNarcisaBrandenburg70
 
1. Which of the following is most likely considered a competent p.docx
1.  Which of the following is most likely considered a competent p.docx1.  Which of the following is most likely considered a competent p.docx
1. Which of the following is most likely considered a competent p.docxNarcisaBrandenburg70
 
1. The most notable philosophies influencing America’s founding w.docx
1.  The most notable philosophies influencing America’s founding w.docx1.  The most notable philosophies influencing America’s founding w.docx
1. The most notable philosophies influencing America’s founding w.docxNarcisaBrandenburg70
 
1. The disadvantages of an automated equipment operating system i.docx
1.  The disadvantages of an automated equipment operating system i.docx1.  The disadvantages of an automated equipment operating system i.docx
1. The disadvantages of an automated equipment operating system i.docxNarcisaBrandenburg70
 
1. Which one of the following occupations has the smallest percen.docx
1.  Which one of the following occupations has the smallest percen.docx1.  Which one of the following occupations has the smallest percen.docx
1. Which one of the following occupations has the smallest percen.docxNarcisaBrandenburg70
 
1. Unless otherwise specified, contracts between an exporter and .docx
1.  Unless otherwise specified, contracts between an exporter and .docx1.  Unless otherwise specified, contracts between an exporter and .docx
1. Unless otherwise specified, contracts between an exporter and .docxNarcisaBrandenburg70
 
1. Which Excel data analysis tool returns the p-value for the F-t.docx
1.  Which Excel data analysis tool returns the p-value for the F-t.docx1.  Which Excel data analysis tool returns the p-value for the F-t.docx
1. Which Excel data analysis tool returns the p-value for the F-t.docxNarcisaBrandenburg70
 
1. The common currency of most of the countries of the European U.docx
1.  The common currency of most of the countries of the European U.docx1.  The common currency of most of the countries of the European U.docx
1. The common currency of most of the countries of the European U.docxNarcisaBrandenburg70
 
1. Expected value” in decision analysis is synonymous with most.docx
1.  Expected value” in decision analysis is synonymous with most.docx1.  Expected value” in decision analysis is synonymous with most.docx
1. Expected value” in decision analysis is synonymous with most.docxNarcisaBrandenburg70
 
1. Anna gathers leaves that have fallen from a neighbor’s tree on.docx
1.  Anna gathers leaves that have fallen from a neighbor’s tree on.docx1.  Anna gathers leaves that have fallen from a neighbor’s tree on.docx
1. Anna gathers leaves that have fallen from a neighbor’s tree on.docxNarcisaBrandenburg70
 
1. One of the benefits of a railroad merger is (Points 1)     .docx
1.  One of the benefits of a railroad merger is (Points  1)     .docx1.  One of the benefits of a railroad merger is (Points  1)     .docx
1. One of the benefits of a railroad merger is (Points 1)     .docxNarcisaBrandenburg70
 
1. President Woodrow Wilson played a key role in directing the na.docx
1.  President Woodrow Wilson played a key role in directing the na.docx1.  President Woodrow Wilson played a key role in directing the na.docx
1. President Woodrow Wilson played a key role in directing the na.docxNarcisaBrandenburg70
 

More from NarcisaBrandenburg70 (20)

1. A frequently asked question is Can structured techniques and obj.docx
1. A frequently asked question is Can structured techniques and obj.docx1. A frequently asked question is Can structured techniques and obj.docx
1. A frequently asked question is Can structured techniques and obj.docx
 
1. Which of the following BEST describes the primary goal of a re.docx
1.  Which of the following BEST describes the primary goal of a re.docx1.  Which of the following BEST describes the primary goal of a re.docx
1. Which of the following BEST describes the primary goal of a re.docx
 
1. Can psychological capital impact satisfaction and organizationa.docx
1. Can psychological capital impact satisfaction and organizationa.docx1. Can psychological capital impact satisfaction and organizationa.docx
1. Can psychological capital impact satisfaction and organizationa.docx
 
1. Apply principles and practices of human resource function2. Dem.docx
1. Apply principles and practices of human resource function2. Dem.docx1. Apply principles and practices of human resource function2. Dem.docx
1. Apply principles and practices of human resource function2. Dem.docx
 
1. A logistics specialist for Charm City Inc. must distribute case.docx
1. A logistics specialist for Charm City Inc. must distribute case.docx1. A logistics specialist for Charm City Inc. must distribute case.docx
1. A logistics specialist for Charm City Inc. must distribute case.docx
 
1. (TCO 4) Major fructose sources include (Points 4)     .docx
1. (TCO 4) Major fructose sources include (Points  4)     .docx1. (TCO 4) Major fructose sources include (Points  4)     .docx
1. (TCO 4) Major fructose sources include (Points 4)     .docx
 
1. Which major change in western society altered the image of chi.docx
1.  Which major change in western society altered the image of chi.docx1.  Which major change in western society altered the image of chi.docx
1. Which major change in western society altered the image of chi.docx
 
1. Briefly explain the meaning of political power and administrative.docx
1. Briefly explain the meaning of political power and administrative.docx1. Briefly explain the meaning of political power and administrative.docx
1. Briefly explain the meaning of political power and administrative.docx
 
1. Assume that you are assigned to conduct a program audit of a gran.docx
1. Assume that you are assigned to conduct a program audit of a gran.docx1. Assume that you are assigned to conduct a program audit of a gran.docx
1. Assume that you are assigned to conduct a program audit of a gran.docx
 
1. Which of the following is most likely considered a competent p.docx
1.  Which of the following is most likely considered a competent p.docx1.  Which of the following is most likely considered a competent p.docx
1. Which of the following is most likely considered a competent p.docx
 
1. The most notable philosophies influencing America’s founding w.docx
1.  The most notable philosophies influencing America’s founding w.docx1.  The most notable philosophies influencing America’s founding w.docx
1. The most notable philosophies influencing America’s founding w.docx
 
1. The disadvantages of an automated equipment operating system i.docx
1.  The disadvantages of an automated equipment operating system i.docx1.  The disadvantages of an automated equipment operating system i.docx
1. The disadvantages of an automated equipment operating system i.docx
 
1. Which one of the following occupations has the smallest percen.docx
1.  Which one of the following occupations has the smallest percen.docx1.  Which one of the following occupations has the smallest percen.docx
1. Which one of the following occupations has the smallest percen.docx
 
1. Unless otherwise specified, contracts between an exporter and .docx
1.  Unless otherwise specified, contracts between an exporter and .docx1.  Unless otherwise specified, contracts between an exporter and .docx
1. Unless otherwise specified, contracts between an exporter and .docx
 
1. Which Excel data analysis tool returns the p-value for the F-t.docx
1.  Which Excel data analysis tool returns the p-value for the F-t.docx1.  Which Excel data analysis tool returns the p-value for the F-t.docx
1. Which Excel data analysis tool returns the p-value for the F-t.docx
 
1. The common currency of most of the countries of the European U.docx
1.  The common currency of most of the countries of the European U.docx1.  The common currency of most of the countries of the European U.docx
1. The common currency of most of the countries of the European U.docx
 
1. Expected value” in decision analysis is synonymous with most.docx
1.  Expected value” in decision analysis is synonymous with most.docx1.  Expected value” in decision analysis is synonymous with most.docx
1. Expected value” in decision analysis is synonymous with most.docx
 
1. Anna gathers leaves that have fallen from a neighbor’s tree on.docx
1.  Anna gathers leaves that have fallen from a neighbor’s tree on.docx1.  Anna gathers leaves that have fallen from a neighbor’s tree on.docx
1. Anna gathers leaves that have fallen from a neighbor’s tree on.docx
 
1. One of the benefits of a railroad merger is (Points 1)     .docx
1.  One of the benefits of a railroad merger is (Points  1)     .docx1.  One of the benefits of a railroad merger is (Points  1)     .docx
1. One of the benefits of a railroad merger is (Points 1)     .docx
 
1. President Woodrow Wilson played a key role in directing the na.docx
1.  President Woodrow Wilson played a key role in directing the na.docx1.  President Woodrow Wilson played a key role in directing the na.docx
1. President Woodrow Wilson played a key role in directing the na.docx
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

HUM 200 Pr

  • 1. HUM 200 Project Part One: Exploration Document Guidelines and Rubric Overview We all share common experiences that can be generally classified within the major themes of art. Examples of these
  • 2. themes include love, mortality, identity, truth, and beauty. The representation of these themes through various media reveals central beliefs shared by a common people. The comparison of objects from the humanities with similar themes helps to uncover not only the uniqueness of each respective cultural artifact, but also a shared human consciousness that transcends time and place. Your project for this course has two parts. In Project Part One, you will complete an exploration document examining two cultural artifacts that you select, identifying a theme common to both of them and developing a thesis statement related to the theme and artifacts. You will also identify an audience who would be interested in your artifacts, theme, and thesis statement. In Project Part Two, you will develop a presentation for your audience. In your presentation, you will discuss the impact of the cultural artifacts, theme, and thesis statement on both individuals and society, supporting your claims with evidence. You will also explain how study of the humanities has impacted you both personally and professionally. In Project Part One, you will demonstrate your mastery of the following course outcomes: professional experiences in investigating expressions of human creativity Communicate effectively to specific audiences in examining fundamental aspects of human culture major themes of human culture and creativity
  • 3. Prompt Choose two cultural artifacts to analyze. These artifacts may take the form of any artistic medium, such as literature, poetry, music, film, dance, painting, and sculpture, and so on. Then, identify a common theme and compare your examples to one another as expressions of the same theme in different cultural artifacts. Chapters 3 through 6 in the Soomo webtext will walk you through this process. Specifically, the following critical elements must be addressed: I. Describe the cultural artifacts that you chose. Consider questions such as these in your response: What is the name or title of the artifact? Who is the author or artist? What is the date or time period when the artifact was created? What is the cultural location or physical setting of the artifact? In addition, you could consider including a photograph or image of each cultural artifact, if they are visual artifacts. II. Identify at least one common theme that will serve as the framework of your exploration document. How is the theme expressed in your artifacts? 1
  • 4. III. Explain how the theme you identified is related to your personal experience. For instance, you could discuss how the expression of the theme in your cultural artifacts is connected to you personally. IV. Discuss a profession that could be impacted by the theme you identified. In other words, how is the theme you identified related to professional experiences? How could a working knowledge of the humanities be useful in this field? V. Describe at least three humanities resources that you could use to investigate your theme and artifacts. Your sources must be relevant to your theme and of an appropriate academic nature. In your description, consider questions such as the following: What are the similarities and differences in the content of your sources? What makes them appropriate and relevant for investigating your issue? What was your thought process when you were searching for sources? How did you make choices? Did you
  • 5. encounter any obstacles and, if so, how did you overcome them? If you did not, why do you think it was so easy to find what you needed? VI. Use the humanities resources that you selected to research your theme and cultural artifacts, making sure that you cite your sources. Based on your research, do the following: A. Discuss the relationship between each cultural artifact and its historical context. In other words, what were the circumstances under which each artifact was created? B. Explain the similarities and differences that you observe in the cultural artifacts you selected, in relation to the theme. For instance, do the artifacts contain any symbolism? If so, how are the symbols both similar and different? What do the symbols tell you about each artifact? C. Discuss the medium—such as literature, music, or sculpture—through which your cultural artifacts were created. For instance, how did the creator or creators of each artifact use the medium to convey something about the meaning of the artifact? VII. Based on your research, develop a thesis statement that conveys the claim you plan to make about your theme and artifacts. Your thesis statement should be clear, specific, and arguable. VIII. Based on your research, identify an audience that would be interested in your theme and thesis statement. For example,
  • 6. who would benefit most from hearing your message? IX. Describe how and why you can tailor your message to your audience, providing specific examples based on your research. For example, will your audience understand the terminology and principles used by humanities scholars, or will you need to explain these? How will you communicate effectively with your audience? X. Provide a reference list that includes all of the humanities resources you used to research your artifacts, theme, and thesis statement. Ensure that your list is formatted according to current APA guidelines (or another format with instructor permission). 2
  • 7. Project Part One Rubric Guidelines for Submission: You will upload the polished version of the Word document you downloaded from Soomo to the submission link for instructor grading and feedback. Please see the feedback provided by your instructor in your SNHU course. Your exploration document should adhere to the following formatting requirements: 3 to 5 pages in length, double-spaced, using 12-point Times New Roman font and one-inch margins. You should use current APA style guidelines (or another format approved by your instructor) for your citations and reference list. Critical Elements Exemplary Proficient Needs Improvement Not Evident Value Cultural Artifacts Meets “Proficient” criteria and description is exceptionally clear and contextualized (100%) Describes selected cultural artifacts (85%) Describes selected cultural artifacts but with gaps in detail or clarity (55%) Does not describe selected cultural artifacts (0%) 8 Common Theme Meets “Proficient” criteria and
  • 8. identified theme is especially well-aligned with artifacts (100%) Identifies at least one common theme to serve as framework of exploration document and explains how theme is expressed in artifacts (85%) Identifies at least one common theme to serve as framework of exploration document and explains how theme is expressed in artifacts but with gaps in clarity or detail (55%) Does not identify at least one common theme to serve as framework of exploration document and does not explain how theme is expressed in artifacts (0%) 8 Personal Experience Meets “Proficient” criteria and explanation demonstrates keen insight into impact of humanities on personal experiences (100%) Explains ho w identified theme is related to personal experience (85%)
  • 9. Explains ho w identified theme is related to personal experience but with gaps in clarity or detail (55%) Does not explain how identified theme is related to personal experience (0%) 8 Profession Meets “Proficient” criteria and explanation demonstrates keen insight into impact of humanities on professional experiences (100%) Discusses a profession that could be impacted by identified theme (85%) Discusses a profession that could be impacted by identified theme but with gaps in clarity or detail (55%) Does not discuss a profession that could be impacted by identified theme (0%) 8 Humanities Resources Meets “Proficient” criteria and description of resources demonstrates strong understanding of information
  • 10. needed to investigate expressions o f human creativity (100%) Describes at least three relevant and appropriate humanities resources that could be used to investigate theme and artifacts (85%) Describes at least three humanities resources that could be used to investigate theme and artifacts but with gaps in appropriateness, relevance, or detail (55%) Does not describe humanities resources that could be used to investigate theme and artifacts (0%) 8 3
  • 11. Critical Elements Exemplary Proficient Needs Improvement Not Evident Value Research: Historical Context Meets “Proficient” criteria and response demonstrates insight into essential humanities
  • 12. principles (100%) Discusses relationship between each cultural artifact and its historical context, citing sources (85%) Discusses relationship between each cultural artifact and its historical context but with gaps in detail, clarity, or citation (55%) Does not discuss relationship between each cultural artifact and its historical context (0%) 8 Research: Similarities and Differences Meets “Proficient” criteria and response demonstrates insight into essential humanities principles (100%) Explains similarities and differences observed in cultural artifacts in relation to theme, citing sources (85%) Explains similarities and differences observed in cultural artifacts but not in relation to theme or with gaps
  • 13. in detail, clarity, or citation (55%) Does not explain similarities and differences observed in cultural artifacts (0%) 8 Research: Medium Meets “Proficient” criteria and response demonstrates insight into essential humanities principles (100%) Discusses the medium through which the cultural artifacts were created, citing sources (85%) Discusses the medium through which cultural artifacts were created but with gaps in detail, clarity, or citation (55%) Does not discuss the medium through which the cultural artifacts were created (0%) 8 Thesis Statement Meets “Proficient” criteria and claim demonstrates insight into connection between theme and artifacts (100%) Develops c lear, specific, and
  • 14. arguable thesis statement that conveys claim about theme and artifacts, based on research (85%) Develops thes is statement that conveys claim about theme and artifacts but thesis statement is not based on research, lacks clarity or specificity, or is not arguable (55%) Does not develop thesis statement that conveys claim about theme and artifacts (0%) 8 Audience Meets “Proficient” criteria and identification of audience demonstrates insight into theme and thesis statement (100%) Identifies an audience that would be interested in theme and thesis statement, based on research (85%) Identifies an audience but audience is not appropriate for theme and thesis statement or is not based on research (55%) Does not identify an audience
  • 15. (0%) 8 Message Meets “Proficient” criteria and response demonstrates sophisticated understanding of how to effectively communicate with specific audience (100%) Describes how and why message can be tailored to audience, providing specific examples based on research (85%) Describes how and why message can be tailored to audience but with gaps in examples or research support (55%) Does not describe how and why message can be tailored to audience (0%) 8 4
  • 16. Critical Elements Exemplary Proficient Needs Improvement Not Evident Value Reference List Provides reference list that includes all humanities resources used to research artifacts, theme, and thesis statement, ensuring that list is formatted according to current APA guidelines (100%) Provides reference list that includes all humanities resources used to research artifacts, theme, and thesis statement, but list has gaps i n adherence to current APA formatting guidelines (55%) Does not provide reference list that includes all humanities resources used to research artifacts, theme, and thesis statement (0%) 8 Articulation of Response Submission is free of errors related to citations, grammar, spelling, syntax, and
  • 17. organization and is presented in a professional and easy-to- read format (100%) Submission has no major errors related to citations, grammar, spelling, syntax, or organization (85%) Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas (55%) Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas (0%) 4 Total 100% 5 HUM 200 Project Part One: Exploration Document Guidelines and RubricOverviewPromptProject Part One Rubric case4rev.docx by Matthew Pankey
  • 18. Submission date: 18-Apr-2022 09:54PM (UTC-0500) Submission ID: 1814107232 File name: case4rev.docx (65.43K) Word count: 3140 Character count: 19302 1 3 1 1 1 1 1 1 1 5 7
  • 20. 17% SIMILARITY INDEX 16% INTERNET SOURCES 0% PUBLICATIONS 1% STUDENT PAPERS 1 14% 2 1% 3 <1% 4 <1% 5 <1% 6 <1% 7 <1% Exclude quotes Off Exclude bibliography On Exclude matches < 4 words case4rev.docx ORIGINALITY REPORT PRIMARY SOURCES www.coursehero.com Internet Source
  • 21. Submitted to Bridgepoint Education Student Paper Submitted to University of Malaya Student Paper Submitted to Park Lane College Student Paper sharpexperts.com Internet Source www.accaglobal.com Internet Source www.springerprofessional.de Internet Source 1 6 Matthew Pankey Cybersecurity in Data Management at Workplace: Draft
  • 22. With the ubiquitous and pervasive application of information technology in business organizations' environments, a significant and sensitive amount of data is generated and stored on cloud computing platforms, creating substantial Cybersecurity threats and vulnerabilities Garraghan et al. 2018). In the workforce environment, some fundamental duties and responsibilities involve customers' data management, calling for effective IT-based Cybersecurity customers. Cybersecurity in a workplace occurred in a twofold dimension including the growing data sophistication and data security and privacy compromise due to Cyberattacks and Cybersecurity issues. In the data management role and data manager, collecting and securing data is prone to data breaches and cyber-attackers aging access to sensitive data. Admittedly, Cybersecurity is a fundamental IT-based challenge facing employees, organizations, and stakeholders that require an effective platform for data security and privacy concerns. Thus, Cybersecurity in Data Management at Workplace resonates with fundamental articulation on IT-based challenges in the management information system. Therefore, addressing the topic in detail will offer effective recognition of the IT-based challenges and pragmatic solutions to ensure a secured data management system. Suggesting fundamental Cybersecurity measures to counteract customer data leakage experience is fundamental. Solution s Notably, the business case experiences require practical approaches to ensure data privacy and security, limiting possibilities of other customers' sensitive data leakage to
  • 23. unauthorized individuals. Notably, a robust access control, compliance by third-party vendors, employee data security and awareness training, and developing an effective data breach responses plan demonstrate real-time solutions to data breaches in any organization. According to the authors, Data Leakage Protection Based on Context provides an effective platform for data breach and leakage management within an organization, ensuring robust security and privacy concerns (Yu et al. 2018). Similarly, in this analysis of the business, there is an acknowledgment of Data Leakage Protection Based on Context strategy to accommodate access control, compliance by third- party vendors, employee data security and awareness training, and developing an effective data breach responses plan. Thus, a comprehensive explanation of each suggestion to counteract data leakage experience within a workforce, exposing customers' sensitive data to unauthorized personnel is necessary for data security models' decision-making. Access control Access control accommodates several models that provide a restrictive platform to ensure that only authorized individuals within an organization have access to sensitive data. Notably, mandatory access control, directory, rule-based, role-based, risk-related, and attribute-based access control models are effective for the security of data. For example, the rule-based access control model offers significant security rules for
  • 24. securing administrator systems. Specifically, access control strategies such as user authentication, verification and identification, password, data encryption and decryption techniques, cryptographic analytics among other access control measures provide an effective platform to restrict unauthorized individuals for effective decision-making. Similarly, the business case whereby there is a significant Cybersecurity breach, causing customers' sensitive information leakage to unauthorized individuals requires effective articulation on access control strategies user authentication, verification and identification, password, data encryption and decryption techniques, cryptographic analytics for internal and external customers data security in the workplace environment. According to the researchers, effective access control and Cybersecurity policies within domains such as healthcare, finance, education, aviation, and commerce have been effective, embracing robust information management system architecture, accommodating information under control, and significant Cybersecurity requirements within an organization (Mishra et al. 2022). Similarly, the business case, via Data Leakage Protection, Based on Context should accommodate Cybersecurity policies and requirements such as data security, privacy, confidentiality, integrity, and availability to create a secured security infrastructure. Additionally, fundamental access control practices such as user authentication,
  • 25. verification, and identification, password, data encryption, decryption techniques, cryptographic analytics among other access control measures need fundamental applications to ensure internal and external data privacy and security in an organization. Compliance by Third-Party Vendors Importantly third-party compliance is a fundamental suggestion for an organization that deals with sensitive data on a cloud computing platform that supports information security. Notably, a business organization that offers regulated data or access to IT systems that contains sensitive data requires fundamental articulation to third-party compliance obligations and requirements. Third-party Compliance requirements accommodate IM and presence services components, compliance server, and support clients that are fundamental for information security from Third-party organizations, accessing sensitive data or IT Systems for business organizations. Specifically, embracing vital steps such as the risk evaluation process, in identifying, segmenting, mitigating, risk, and risk factors for effective third-party preparedness is effective. Similarly, due diligence proportion of risks involving data breaches is effective in third-party compliance requirements. According to the authors, accommodating Cyber Third-Party Risk Management is effective for robust data security within an organization, embracing Company-wide approach strategies for
  • 26. the entire information security coverage (Keskin, et al. 2021). Fundamentally, creating an effective platform for information security through a comprehensive workflow system and a Company-wide approach for risk management is an effective obligation for third-party vendors' consideration. Similarly, the business case should accommodate fundamental considerations to ensure that third-party vendors with authority to access significant and sensitive data meet all the third-party compliance obligations. Employee data security and awareness training In the business case, Cybersecurity is a fundamental IT-based challenge facing employees, organizations, and stakeholders that require an effective platform for data security and privacy concerns. Specifically, offering extensive and comprehensive employee training on Cybersecurity and awareness is fundamental in managing internal threats and vulnerabilities of data security. According to the authors, training and creating awareness on information security awareness, accommodating current model and content provides an effective platform for information security, managing internal threats and vulnerabilities to information (Khando et al. 2021). Similarly, the business case on customers' data breach and leakage due to employees lacking awareness and knowledge on data security and privacy require fundamental articulation on information security wares, embracing modern and real-time methods
  • 27. towards effective data management. Notably, training on phishing attacks, password and authentication, physical security, mobile device security, working remotely, public Wi - Fi and Cloud security are underpinning. Importantly, the business organization case requires fundamental employee training and awareness on an information security system for a robust solution on data leakage cases. Thus, employee training and awareness on information security offers knowledge and concepts in preventing data breaches and customers' data leakage in an organization setting. References Garraghan, P, Yang, R, Wen, Z., Romanovsky, A., and Xu, J. (2018) Emergent Failures: Rethinking Cloud Reliability at Scale. IEEE Cloud Computing, 5 (5). pp. 12-21. Khando, K., Gao, S., Islam, S., and Salman, A. (2021). Enhancing employee’s information security awareness in private and public organizations: A systematic literature review. Computer & Security. DOI: 10.1016/j.cose.2021.102267 Keskin, O., Caramancion, K., Tatar, I., Raza, O., and Tatar, U. (2021). Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports, Electronics 2021, 10, 1168. https://doi.org/10.3390/electronics10101168 Mishra, A., Alzoubi, Y., Gill, A., and Anwar, M. (2022). Cybersecurity Enterprises Policies: A Comparative Study.
  • 28. Sensors, 22, 538. https://doi.org/10.3390/s22020538 Yu, X., Tian, Z., Qiu, J., and Jiang, J. (2018). A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices. Hindawi Wireless Communications and Mobile Computing. https://doi.org/10.1155/2018/5823439 Running head: CYBERSECURITY AT WORKPLACE 1 CYBERSECURITY AT WORKPLACE 7 Cybersecurity methods: SWOT Analysis
  • 29. Method 1: Access Control solution Strengths of this method Access control is a vital component of data security in cloud computing. It dictates who is allowed to access and use the company resources and information. Through authorization and authentication, the access control standards and policies ensure that users are correctly identified through login credentials such as passwords, biometric scans, usernames, and passwords (Colombo and Ferrari, 2019). Therefore, access control helps to limit access to users’ data and this is a key strategy that can help to enhance the privacy of data and information that is stored by an organization through its cloud servers. In any organization, access control helps to secure an organization’s confidential information such as intellectual property, customer data, and personally identifiable information from getting into
  • 30. the wrong hands (Hasbini and Tom-Petersen, Jordan, 2017). It is most effective with organizations that are uses hybrid and multi-cloud computing systems that data, resources, and applications in the companies’ hardware systems and their cloud servers. Weaknesses of this method The access control method is limited by insider threats. Despite the methods being effective in keeping off third-party users, rogue employees can still leak the login credentials to the wrong individuals and organizations (Colombo and Ferrari, 2019). In the US, insider threats are on the rise due to high employee turnover in many organizations across the country. Employees or leaders who retire or quit their jobs often end up selling their former companies’ information or access credentials that make it easy to access and steal or tamper with the users' data. Therefore, Valenzano (2014) notes that insider threats may render access control useless. Another challenge with access control is hacking. Even though organizations may try to control and monitor people who access data and information from their systems, hackers have also taken advantage of modern technology to develop powerful anti - software tools that crack almost every system (Hasbini and Tom-Petersen, Jordan, 2017). Examples of this software include intruder, Nets parker, and Nmap. Opportunity
  • 31. With increasing technology, companies can test their access control strategies. Ethical hacking allows companies to organize hacking drills on their systems to test their effectiveness and their employees’ level of preparedness (Valenzano, 2014). This is crucial as it may help companies to identify the gaps in their systems and enhance their access control strategies. Furthermore, access control also allows companies to disable the accounts of employees who leave their companies or change the login credentials including passwords and encryption protocols. Therefore, companies can still secure their systems despite the threats from insiders and hackers. Threats Increasing cases of insider threats and hackers threaten the integrity of access control methods. Nowadays, it is very difficult to determine who to trust with the company’s information. Access control methods cannot be effective if employees lack self-control, transparency, and ethics. It has become difficult to trust employees with critical business information (Valenzano, 2014). Method 2: Compliance by the third-party vendors Strengths of this method Increasing security concerns on cloud computing have forced many organizations to use the third party-vendors to secure the users' data (Shaverdian, 2019). The use of third-party vendors helps to eliminate common cloud computing such as insider
  • 32. threats. The third-party companies help to monitor a company’s security system and therefore, it becomes difficult for rogue employees or third parties to access the users’ data and a company’s classified information such as its IP rights. One of the strengths of using the third party method is its third-party risk management program (TPRM). The TPRM involves the third-party company and the host organization creating a risk management program that addresses all the risks from both sides (Li and Xu, 2021). Therefore, the TRPM helps the third party company and the host organization to create monitoring programs and remediation plans that help to manage all the possible risks that may affect the integrity of the users’ data and the privacy of the company’s vital information. Furthermore, the TPRM is crucial is it assesses the internal controls of the host company to test their effectiveness and utilize the current software to fend off any risks and threats and create a strong security program (Shaverdian, 2019). Using the TPRM, this factor is made possible through the help of proper technological tools such as automated monitoring, prompt alerting of any threat, and tracking of high-risk behaviors within the company. Therefore, these tools help to keep the third-party program ahead of other methods. Weaknesses of the method The main weakness of third-party solutions is a lack of control. By using this method, all the security procedures and protocols
  • 33. are controlled by the third-party company. Although it may seem to be effective at enhancing the security of the users’ data, it also prevents large-scale organizations from expanding their cloud-computing protocols (Li and Xu, 2021). Most organizations often want to expand their cloud computing servers to have both private and public cloud computing. Once an organization selects the third-party method, other options are not allowed. Opportunities The third-party method is the best option as it allows organizations to draft security maps to identify the strengths and weaknesses of both parties. Therefore, it gives organizations a chance of testing their security systems and protocols to determine their effectiveness and also address the gaps that exist in the systems (Shaverdian, 2019). Using the third-party solution, the challenge of hacking or insider threats is almost zero since the entire security system is controlled and managed by a third-party organization. Threats An organization may not have much control over the security systems and security protocols since the entire work is undertaken by a third-party company. However, if the security system of the third-party company also fails, the host organization is also likely to lose valuable data and information
  • 34. (Li and Xu, 2021). Method 3: employee data security and awareness training The strengths Employee training and awareness are crucial in equipping the employees with the necessary skills to handle all the security challenges on their cloud systems. It gives employees a chance to effectively monitor the company systems and respond to any security alerts that may arise from both internal and external environments (Khando et al., 2021). With data security and training awareness, it becomes easy for employees to enhance a company’s private information and also secure the users’ data. Weaknesses No matter how good the data security and awareness security training might be, this method is still challenged by the increasing cases of insider threats and hackers. Since the company’s employees may still be in charge of its systems, they are likely to leak the company’s vital information to rivals or unauthorized people (Khando et al., 2021). Opportunities Training programs help employees to learn how to be ethical when handling the users’ data. They learn new methods and tactics they can use to secure the company’s data and also protect the users’ data. It is also among the ways that organizations use to hone their employees’ skills in responding to emergencies (Li et al., 2019).
  • 35. Threats This method is costly and it may take long before the employees acquire all the skills that are necessary to protect the company’s systems and cloud servers. Furthermore, hackers usually evolve their skills almost all the time and therefore, this method may not be effective at eliminating future or long-term security threats from an organization (Khando et al., 2021). Conclusion In conclusion, using a third-party solution is the best method that any organization can adopt to enhance the security of its systems and cloud servers. This method gives helps an organization to have a clear map regarding the strengths and weaknesses of its systems and the security protocols that need to be followed to secure the users’ data and information. In a third-party solution, the risks of internal threats and hacking are almost zero and hence, this method may be effective is effective in protecting the users’ data. References Colombo, P., & Ferrari, E. (2019). Access control technologies for Big Data management systems: literature review and future
  • 36. trends. Cybersecurity, 2(1), 1-13. Hasbini, M. A., Tom-Petersen, M., & Jordan, D. (2017). The Smart Cities Internet of Access Control, opportunities and cybersecurity challenges. Securing Smart Cities. Khando, K., Gao, S., Islam, S. M., & Salman, A. (2021). Enhancing employees information security awareness in private and public organizations: A systematic literature review. Computers & Security, 106, 102267. Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13-24. Li, Y., & Xu, L. (2021). Cybersecurity investments in a two- echelon supply chain with third-party risk propagation. International Journal of Production Research, 59(4), 1216-1238. Shaverdian, P. (2019). Start with trust: utilizing blockchain to
  • 37. resolve the third-party data breach problem. UCLA L. Rev., 66, 1242. Valenzano, A. (2014). Industrial cybersecurity: improving security through access control policy models. IEEE Industrial Electronics Magazine, 8(2), 6-17. Business Case Study structure This Project Will Be Individual, not a Group project. The Subject of the case study Will focus on Information technology (IT) Hardware, software, or application solutions to Improve a personal or Business challenge. Ten Pages Minimum. Full APA-compliant Title and Reference Pages will be in addition to the ten pages of the study. Ten Scholarly or professional Sources Minimum, Properly referenced and Cited in-Text. Wiki sites and advertisements will not be counted. American Psychological Association (APA) Formatting is required. This includes headers, margins, indentation, spacing,
  • 38. font, etc. Business Case Outline Section 1 (Introduction) / Describe one challenge that you or an organization you have worked for have had which can be resolved with an information technology (IT) hardware, software, or application solution. (Appx one page). Section 2 / research and describe three possible solutions to the challenge presented in section 1. choose one type of solution (hardware or software) for future comparison (appx three pages). Section 3 / compare the three possible solutions from section 2 using the swot (Strength, Weakness, opportunity, & Threat) analysis model (appx four pages). Section 4 (Conclusion) / Identify and Defend the solution (choose one of the three) that provides the greatest benefit to the organization. (appx two pages). Additional Instructions This is a Research paper, thus requiring numerous references and citations. The minimum number of references is 10, but all direct quotations and paraphrases must be properly cited in-text,
  • 39. even content from your own previous papers. Your final paper will be submitted automatically through Turnitin and plagiarism will be dealt with according to the university’s policies. When In doubt, cite the source of the information (according to APA formatting) . You may submit the final paper as many times as you wish. The final feedback from the instructor will come with your draft submission. I will provide corrections, but not so much detail that I feel I am writing your paper for you. I also cannot see any suspected plagiarism until the final submission (through Turnitin), so be cognizant that your draft submission’s feedback will not include that aspect.