SlideShare a Scribd company logo
1 of 43
IT 659 Milestone Three Guidelines and Rubric
In Milestone Three you will submit the Recommendations and
Global Considerations portion of the final project. The purpose
of this assignment is to suggest
relevant changes to the organization itself and changes to the
ethical guidelines that could have prevented the incident.
Prompt: Suggest relevant changes to the organization itself and
changes to the ethical guidelines that could have prevented the
incident. Standards external to
the organization that may have helped prevent the incident
should also be proposed. This assignment will also address
international compliance standards and
how they would have been relevant to the incident. The impact
of the incident on global communication and commerce will be
analyzed, as well as the impact on
the global technology environment.
Specifically the following critical elements must be addressed:
IV. Recommendations
a) Propose relevant changes to the organization that may have
prevented the incident. How would these changes have helped to
prevent the
occurrence?
b) Propose reasonable ethical guidelines that could have helped
prevent the incident and that might help the organization
prevent future incidents.
Propose changes to the standards external to the organization
that might have helped prevent the incident. This can include
changes to
regulations and regulatory and ethical standards that might exist
today but did not exist or were not properly delivered at the
time of the
incident. Be sure to support your conclusions.
V. Global Considerations
a) What international compliance standards (either at the time
of the incident or today) would have been relevant to the
incident, and how? If your
company is not global, imagine that is.
b) Analyze the impact of the incident on global communication
and commerce (again, if your organization is not global,
imagine otherwise). In
other words, what impact did (or would) the incident have on
views and use of information technology and communication in
global contexts?
c) Global Technology Environment: Based on your research and
analysis of this case, determine the global legal and regulatory
impacts this case
had on the information technology overall. In other words,
determine the relationship between this case and the global
regulatory standards
that are now in place, will be put in place shortly, or should be
put in place as a result of this or related incident(s).
Rubric
Guidelines for Submission: The format for this assignment will
be a three- to five-page Microsoft Word document with double
spacing, 12-point Times New
Roman font, one-inch margins, and at least three sources cited
in APA format.
Instructor Feedback: This activity uses an integrated rubric in
Blackboard. Students can view instructor feedback in the Grade
Center. For more information,
review these instructions.
Critical Elements Exemplary (100%) Proficient (90%) Needs
Improvement (70%) Not Evident (0%) Value
Recommendations:
Organizational
Changes
Meets “Proficient” criteria and
evidences keen insight into
solving organizational issues
Proposes and defends relevant
changes to the organization that
would have helped prevent the
incident
Proposes and defends changes
to the organization, but changes
are not relevant or not
comprehensively defended, or
would not have helped prevent
the incident
Does not propose and defend
changes to the organization
15
Recommendations:
Ethical Guidelines
Meets “Proficient” criteria and
evidences keen insight into the
nuanced ethical standard needs
of organizations
Proposes reasonable ethical
guidelines that could have
helped prevent the incident and
that might help prevent future
incidents within the
organization
Proposes ethical guidelines, but
guidelines are not reasonable
or would not have helped
prevent the incident or would
not prevent future incidents
within the organization
Does not propose ethical
guidelines for the organization
15
Recommendations:
External Standards
Meets “Proficient” criteria and
evidences keen insight into the
nuanced considerations
required when recommending
external standards for
organizations to follow
Proposes external standards
that may have helped prevent
the incident, with relevant and
logical support
Proposes external standards
with support, but the standards
would not have helped prevent
the incident, or the support is
not relevant or logical given the
case
Does not propose external
standards with support
15
Global
Considerations:
International
Compliance
Meets “Proficient” criteria and
evidences keen insight into the
application of international
standards
Accurately identifies and
explains in detail the
international compliance
standards relevant to the
incident
Identifies and explains the
international compliance
standards relevant to the
incident, but with gaps in
accuracy or detail
Does not identify and explain
the international compliance
standards relevant to the
incident
15
Global
Considerations:
Cultural Impacts
Meets “Proficient” criteria and
evidences keen insight into
cultural perspectives toward
cyber communication and
commerce within a global
context
Accurately analyzes the impact
of the incident on cyber
communication and commerce
from the larger cultural
perspective
Analyzes the impact of the
incident on cyber
communication and commerce
globally but not in terms of the
larger cultural perspective or
with gaps in accuracy
Does not analyze the impact of
the incident on cyber
communication and commerce
globally
15
http://snhu-
media.snhu.edu/files/production_documentation/formatting/rubr
ic_feedback_instructions_student.pdf
Global
Considerations:
Global Technology
Environment
Meets “Proficient” criteria and
evidences a nuanced, in-depth
understanding of global legal
impacts of related cases
Analyzes in detail the global
legal and regulatory impact of
this or similar cases to
determine global laws and
regulations that resulted or
should have resulted
Analyzes the global legal and
regulatory impact of this or
similar cases to determine
global laws and regulations that
resulted or should have
resulted, but with gaps in detail
Does not analyze the global
legal and regulatory impact of
this or similar cases to
determine global laws and
regulations that resulted or
should have resulted
15
Articulation of
Response
Submission is free of errors
related to citations, grammar,
spelling, syntax, and
organization and is presented in
a professional and easy-to-read
format
Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
Submission has major errors
related to citations, grammar,
spelling, syntax, or organization
that negatively impact
readability and articulation of
main ideas
Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas
10
Earned Total 100%
IT 659 Milestone Two Guidelines and Rubric
In Milestone Two, you will submit the Case Analysis and
Incident Impacts portion of the final project. The purpose of
this assignment is to analyze the case and
determine the impact of the incident.
Prompt: Analyze the ethical issues and determine the legal
compliance issues within the organization, as well as the social
and cultural impacts of these
compliance issues. You will be expected to address the impact
the incident may have had on the ethical and legal IT
regulations at the time. The connection
between the industry standards and the standards for
informational technology should be determined, as well as the
influence of the cultural impact on IT and
cyber communication or commerce.
Specifically the following critical elements must be addressed:
II. Case Analysis
a) Analyze the case to determine the ethical issues within the
organization that may have led to the incident. What are these
issues and why do you
credit them for the incident?
b) Determine legal compliance issues within the organization
that may have led to the incident or could lead to future
incidents. Were there any
legal and ethical standards in existence at the time that were not
followed by the organization? What were these issues and how
did they impact
the organization?
c) Determine the societal and cultural impact of these
compliance issues. Some things to consider in your assessment
include specific targeting of
demographic groups, victimization of certain customers, and so
on.
III. Incident Impact
a) Determine the impact this incident may have had on the
ethical and legal IT regulations of the time. If there were no
direct results of this case,
what may have been the indirect impact and/or what was the
impact of similar cases? For example, what regulatory changes
resulted from this
or similar cases? What is your reasoning?
b) Determine the connection between the industry standards and
the standards in existence for information technology.
Specifically, determine if
the organization was lacking in either industry-specific or IT-
specific alignment with regulations that may have contributed to
the incident, and
provide support for your conclusions. For example,
misalignment with HIPAA laws in healthcare is an industry-
specific deviation from standards.
c) Cultural Impact: Analyze the influence this incident may
have had on various cultural attitudes toward IT and cyber
communication or
commerce. In other words, how could this incident impact views
of information technology use?
Rubric
Guidelines for Submission: The format of this assignment will
be a three- to five-page Word document with double spacing,
12-point Times New Roman font,
one-inch margins, and at least three sources cited in APA
format.
Instructor Feedback: This activity uses an integrated rubric in
Blackboard. Students can view instructor feedback in the Grade
Center. For more information,
review these instructions.
Critical Elements Exemplary (100%) Proficient (90%) Needs
Improvement (70%) Not Evident (0%) Value
Case Analysis: Ethical
Issues
Meets “Proficient” criteria, and
reasoning evidences strong
ethical criteria or keen analytic
skills regarding organizational
ethics
Accurately analyzes the case to
determine which ethical issues
within the organization led to
the incident and why
Analyzes the case to determine
which ethical issues within the
organization led to the incident,
and why, but with gaps in
accuracy or detail
Does not analyze the case to
determine which ethical issues
within the organization led to
the incident and why
15
Case Analysis: Legal
Compliance
Meets “Proficient” criteria and
evidences keen understanding
of legal criteria of the time
Accurately determines the legal
compliance issues within the
organization that led to this
incident and could have
resulted in other issues
Determines the legal
compliance issues within the
organization that led to this
incident and could have
resulted in other issues, but
with gaps in accuracy or detail
Does not determine the legal
compliance issues within the
organization that led to this
incident and could have
resulted in other issues
15
Case Analysis:
Societal and Cultural
Impact
Meets “Proficient” criteria and
evidences deep insight into
unexpected, hidden, or complex
impacts on culture and society
Comprehensively and
accurately determines the
societal and cultural impacts of
the legal and ethical
compliance issues
Determines the societal and
cultural impacts of the legal and
ethical compliance issues, but
with gaps in accuracy or detail
Does not determine the societal
and cultural impacts of the legal
and ethical compliance issues
15
Incident Impact:
Regulations
Meets “Proficient” criteria and
evidences keen understanding
of ethical and legal regulations
following the incident
Accurately determines the
direct or indirect impact of this
or similar case on ethical and
legal IT regulations at the time
Determines the direct or
indirect impact of this or similar
case on ethical and legal IT
regulations at the time, but
with gaps in accuracy or logical
reasoning
Does not determine the direct
or indirect impact of this or
similar case on ethical and legal
IT regulations at the time
15
Incident Impact:
Standards
Meets “Proficient” criteria and
evidences keen insight into
understanding and applying IT
and industry-specific standards
for information security
Accurately determines the
connection between the
industry standards and the
standards in existence for
information technology with
logical reasoning and support
Determines the connection
between the industry standards
and the standards in existence
for information technology, but
with gaps in accuracy or gaps in
reasoning and support
Does not determine the
connection between the
industry standards and the
standards in existence for
information technology
15
http://snhu-
media.snhu.edu/files/production_documentation/formatting/rubr
ic_feedback_instructions_student.pdf
Incident Impact:
Cultural Impact
Meets “Proficient” criteria and
evidences keen insight into
nuances of various cultural
interpretations and views
toward technology and cyber
security
Accurately analyzes the
influence this incident may
have had on various cultural
attitudes toward IT and cyber
communication or commerce
Analyzes the influence this
incident may have had on
various cultural attitudes
toward IT and cyber
communication or commerce,
but with gaps in accuracy or
detail
Does not analyze the influence
this incident may have had on
various cultural attitudes
toward IT and cyber
communication or commerce
15
Articulation of
Response
Submission is free of errors
related to citations, grammar,
spelling, syntax, and
organization and is presented in
a professional and easy-to-read
format
Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
Submission has major errors
related to citations, grammar,
spelling, syntax, or organization
that negatively impact
readability and articulation of
main ideas
Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas
10
Earned Total 100%
IT 659 Milestone One Guidelines and Rubric
For Milestone One, you will submit the introduction portion of
the final project. The purpose of Milestone One is to apply
cyberlaw and security principles and to
summarize the selected case.
Prompt: Identify the cyberlaw principles and explain how each
applies to the business, e-commerce, or e-communication
industries chosen. Describe the
purpose that the application of the principles serves for the
industry. You will also need to include the necessary
organizational information, industry, problem,
and the time period of the incident.
Specifically the following critical elements must be addressed:
a) Apply cyberlaw and security principles to the business, e-
commerce, and e-communication industries. What purpose does
the application of cyber
principles serve for these industries?
b) Summarize the selected case, including the necessary
organizational information, industry, problem, and time period
of the incident.
Guidelines for Submission: The format of this assignment will
be a one- to two-page Microsoft Word document with double
spacing, 12-point Times New Roman
font, one-inch margins, and at least three sources cited in APA
format.
Instructor Feedback: This activity uses an integrated rubric in
Blackboard. Students can view instructor feedback in the Grade
Center. For more information,
review these instructions.
Critical Elements Proficient (100%) Needs Improvement (75%)
Not Evident (0%) Value
Introduction: Application
of Cyber Principles
Accurately applies cyber
principles to the business, e-
commerce, and e-communication
industries to explain the purpose
served by the principles
Applies cyber principles to
business, e-commerce, and e-
communication, but with gaps in
accuracy or without detail
regarding the purpose served by
these principles
Does not apply cyber principles to
business, e-commerce, and e-
communication
40
Introduction: Summary of
Case
Comprehensively and concisely
introduces the selected incident
with necessary organizational
information, the industry type,
the problem, and the time period
of occurrence
Introduces the selected incident
with organizational information,
the industry type, the problem,
and the time period of
occurrence, but lacks necessary
detail or includes superfluous
information
Does not introduce the selected
incident with organizational
information, the industry type,
the problem, and the time period
of occurrence
40
http://snhu-
media.snhu.edu/files/production_documentation/formatting/rubr
ic_feedback_instructions_student.pdf
Articulation of Response Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
Submission has major errors
related to citations, grammar,
spelling, syntax, or organization
that negatively impact readability
and articulation of main ideas
Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas
20
Earned Total 100%
IT 659 Final Project Guidelines and Rubric
Overview
The final project for this course is the creation of an
information technology incident report.
Successful management in information technology requires
knowledge of the legal and ethical environment. Globalization,
increasing commerce between
graphical locations brought on by the ability to connect online,
and the increasing mix of cultures bring additional complexity
to the considerations of law and
ethics in cyber security and information technology (IT). The
final project for this course will require you to research a recent
(within the last five years) incident
or event in the field of IT, e-commerce, or cyber security in the
context of the legal and ethical standards of that time period.
You will identify the issues the
organization(s) had, recommend changes for that
organization(s), and write a report that highlights your recent
analysis, findings, and recommendations.
The project is divided into three milestones, which will be
submitted at various points throughout the course to scaffold
learning and ensure quality final
submissions. These milestones will be submitted in Modules
Two, Four, and Seven. The final submission will occur in
Module Nine.
In this assignment you will demonstrate your mastery of the
following course outcomes:
circumstances, business models, and information technology
issues
technology for their impact to organizations, society, and
culture
ensure legal and ethical cyber practice and behavior
and regulatory standards within information technology
issues related to global communication on information
technology
Prompt
You will select a recent or current incident from the public
record and analyze the case to identify the issues that led to the
incident. What recommendations can
you make to ensure the incident will not occur again? What
were the results of the incident? And, finally, what were the
cultural, societal, or global impacts of
this case and the subsequent changes to the legal environment?
Please note: Your selection will need to be submitted and
approved by the instructor.
Specifically the following critical elements must be addressed:
I. Introduction
a) Apply cyberlaw and security principles to the business, e-
commerce, and e-communication industries. What purpose does
the application of
cyber principles serve for these industries?
b) Summarize the selected case, including the necessary
organizational information, industry, problem, and time period
of the incident.
II. Case Analysis
a) Analyze the case to determine the ethical issues within the
organization that may have led to the incident. What are these
issues and why do
you credit them for the incident?
b) Determine legal compliance issues within the organization
that may have led to the incident or could lead to future
incidents. Were there any
legal and ethical standards in existence at the time that were not
followed by the organization? What were these issues and how
did they impact
the organization?
c) Determine the societal and cultural impact of these
compliance issues. Some things to consider in your assessment
include specific targeting of
demographic groups, victimization of certain customers, and so
on.
III. Incident Impact
a) Determine the impact this incident may have had on the
ethical and legal IT regulations of the time. If there were no
direct results of this case,
what may have been the indirect impact and/or what was the
impact of similar cases? For example, what regulatory changes
resulted from this
or similar cases? What is your reasoning?
b) Determine the connection between the industry standards and
the standards in existence for information technology.
Specifically, determine if
the organization was lacking in either industry-specific or IT-
specific alignment with regulations that may have contributed to
the incident, and
provide support for your conclusions. For example,
misalignment with HIPAA laws in healthcare is an industry-
specific deviation from standards.
c) Cultural Impact: Analyze the influence this incident may
have had on various cultural attitudes toward IT and cyber
communication or
commerce. In other words, how could this incident impact views
of information technology use?
IV. Recommendations
a) Propose relevant changes to the organization that may have
prevented the incident. How would these changes have helped to
prevent the
occurrence?
b) Propose reasonable ethical guidelines that could have helped
prevent the incident and that might help the organization
prevent future
incidents.
c) Propose changes to the standards external to the organization
that might have helped prevent the incident. This can include
changes to
regulations and regulatory and ethical standards that might exist
today but did not exist or were not properly delivered at the
time of the
incident. Be sure to support your conclusions.
V. Global Considerations
a) What international compliance standards (either at the time
of the incident or today) would have been relevant to the
incident, and how? If
your company is not global, imagine that is.
b) Analyze the impact of the incident on global communication
and commerce (again, if your organization is not global,
imagine otherwise). In
other words, what impact did (or would) the incident have on
views and use of information technology and communication in
global contexts?
c) Global Technology Environment: Based on your research and
analysis of this case, determine the global legal and regulatory
impacts this case
had on the information technology overall. In other words,
determine the relationship between this case and the global
regulatory standards
that are now in place, will be put in place shortly, or should be
put in place as a result of this or related incident(s).
VI. Summary: Given your knowledge of cyberlaw principles,
ethical needs, and legal compliance standards, summarize how
you applied these principles to
your analysis of the case. In other words, how did you apply
cyberlaw principles to the circumstances, business model, and
IT issues that the selected
organization faced?
Milestones
Milestone One: Introduction
In Module Two, you will submit the introduction. In this
assignment you will identify the cyberlaw principles and
explain how each applies to the business, e-
commerce, or e-communication industries chosen. Describe the
purpose of the application of the principles serve for the
industry. You will also need to include
the necessary organizational information, industry, problem,
and the time period of the incident that occurred. The format of
this assignment will be a one- to
two-page Word document. This milestone is graded with the
Milestone One Rubric.
Milestone Two: Case Analysis and Incident Impact
In Module Four, you will submit the Case Analysis and Incident
Impacts. In this assignment you will analyze the ethical issues
and determine the legal
compliance issues within the organization as well as the social
and cultural impacts of these compliance issues. You will be
expected to address the impact the
incident may have had on the ethical and legal IT regulations at
the time. The connection between the industry standards and
the standards for informational
technology should be determined, as well as the influence of the
cultural impact to IT and cyber communication or commerce.
The format of this assignment will
be a three- to five-page Word document. This milestone is
graded with the Milestone Two Rubric.
Milestone Three: Recommendations and Global Considerations
In Module Seven, you will submit the Recommendations and
Global Considerations. In this assignment you will suggest
relevant changes to the organization
itself and changes to the ethical guidelines that could have
prevented the incident. Standards external to the organization
that may have helped prevent the
incident should also be proposed. This assignment will also
address international compliance standards and how they would
have been relevant to the incident.
The impact of the incident on global communication and
commerce will be analyzed, as well as the impact on the global
technology environment. The format of
this assignment will be a three- to five-page Word document.
This milestone is graded with the Milestone Three Rubric.
Final Submission: Information Technology Incident Report and
Summary
In Module Nine, you will submit your Information Technology
Incident Report along with a summary explaining how you
applied the principles to your analysis
of the case. It should be a complete, polished artifact containing
all of the critical elements of the final product. It should reflect
the incorporation of feedback
gained throughout the course. This submission will be graded
using the Final Product Rubric.
Deliverables
Milestone Deliverable Module Due Grading
1 Introduction Two Graded separately; Milestone One Rubric
2 Case Analysis and Incident Impact Four Graded separately;
Milestone Two Rubric
3 Recommendations and Global
Considerations
Seven Graded separately; Milestone Three Rubric
Final Submission: Information Technology
Incident Report and Summary
Nine Graded separately; Final Product Rubric
Final Product Rubric
Guidelines for Submission: Your report should be long enough
to contain all relevant information, reasoning, and research. It
should be formatted logically and
written in a professional manner, following APA guidelines.
Instructor Feedback: This activity uses an integrated rubric in
Blackboard. Students can view instructor feedback in the Grade
Center. For more information,
review these instructions.
Critical Elements Exemplary (100%) Proficient (90%) Needs
Improvement (70%) Not Evident (0%) Value
Introduction:
Application of Cyber
Principles
Meets “Proficient” criteria and
evidences keen insight into the
nuanced purpose of cyber
principles in multiple industries
Accurately applies cyber
principles to the business, e-
commerce, and e-
communication industries to
explain the purpose served by
the principles
Applies cyber principles to
business, e-commerce, and e-
communication but with gaps in
accuracy or without detail
regarding the purpose served by
these principles
Does not apply cyber principles
to business, e-commerce, and
e-communication
6.5
Introduction:
Summary of Case
Meets “Proficient” criteria, and
quality of introductions
establishes expertise in the
discipline
Comprehensively and concisely
introduces the selected incident
with necessary organizational
information, the industry type,
the problem, and the time
period of occurrence
Introduces the selected incident
with organizational information,
the industry type, the problem,
and the time period of
occurrence, but lacks necessary
detail or includes superfluous
information
Does not introduce the selected
incident with organizational
information, the industry type,
the problem, and the time
period of occurrence
6.5
http://snhu-
media.snhu.edu/files/production_documentation/formatting/rubr
ic_feedback_instructions_student.pdf
Case Analysis: Ethical
Issues
Meets “Proficient” criteria, and
reasoning evidences strong
ethical criteria or keen analytic
skills regarding organizational
ethics
Accurately analyzes the case to
determine which ethical issues
within the organization led to
the incident, and why
Analyzes the case to determine
which ethical issues within the
organization led to the incident,
and why, but with gaps in
accuracy or detail
Does not analyze the case to
determine which ethical issues
within the organization led to
the incident, and why
6.5
Case Analysis: Legal
Compliance
Meets “Proficient” criteria and
evidences keen understanding
of legal criteria of the time
Accurately determines the legal
compliance issues within the
organization that led to this
incident and could have
resulted in other issues
Determines the legal
compliance issues within the
organization that led to this
incident and could have
resulted in other issues, but
with gaps in accuracy or detail
Does not determine the legal
compliance issues within the
organization that led to this
incident and could have
resulted in other issues
6.5
Case Analysis:
Societal and Cultural
Impact
Meets “Proficient” criteria and
evidences deep insight into
unexpected, hidden, or complex
impacts on culture and society
Comprehensively and
accurately determines the
societal and cultural impacts of
the legal and ethical compliance
issues
Determines the societal and
cultural impacts of the legal and
ethical compliance issues, but
with gaps in accuracy or detail
Does not determine the societal
and cultural impacts of the legal
and ethical compliance issues
6.5
Incident Impact:
Regulations
Meets “Proficient” criteria and
evidences keen understanding
of ethical and legal regulations
following the incident
Accurately determines the
direct or indirect impact of this
or similar case on ethical and
legal IT regulations at the time
Determines the direct or
indirect impact of this or similar
case on ethical and legal IT
regulations at the time, but with
gaps in accuracy or logical
reasoning
Does not determine the direct
or indirect impact of this or
similar case on ethical and legal
IT regulations at the time
6.5
Incident Impact:
Standards
Meets “Proficient” criteria and
evidences keen insight into
understanding and applying IT
and industry-specific standards
for information security
Accurately determines the
connection between industry
standards and standards in
existence for information
technology with logical
reasoning and support
Determines the connection
between the industry standards
and the standards in existence
for information technology, but
with gaps in accuracy or gaps in
reasoning and support
Does not determine the
connection between the
industry standards and the
standards in existence for
information technology
6.5
Incident Impact:
Cultural Impact
Meets “Proficient” criteria and
evidences keen insight into
nuances of various cultural
interpretations and views
toward technology and cyber
security
Accurately analyzes the
influence this incident may have
had on various cultural
attitudes toward IT and cyber
communication or commerce
Analyzes the influence this
incident may have had on
various cultural attitudes
toward IT and cyber
communication or commerce,
but with gaps in accuracy or
detail
Does not analyze the influence
this incident may have had on
various cultural attitudes
toward IT and cyber
communication or commerce
6.5
Recommendations:
Organizational
Changes
Meets “Proficient” criteria and
evidences keen insight into
solving organizational issues
Proposes and defends relevant
changes to the organization that
would have helped prevent the
incident
Proposes and defends changes
to the organization, but changes
are not relevant or not
comprehensively defended, or
would not have helped prevent
the incident
Does not propose and defend
changes to the organization
6.5
Recommendations:
Ethical Guidelines
Meets “Proficient” criteria and
evidences keen insight into the
nuanced ethical standard needs
of organizations
Proposes reasonable ethical
guidelines that could have
helped prevent the incident and
that might help prevent future
incidents within the
organization
Proposes ethical guidelines, but
guidelines are not reasonable or
would not have helped prevent
the incident or would not
prevent future incidents within
the organization
Does not propose ethical
guidelines for the organization
6.5
Recommendations:
External Standards
Meets “Proficient” criteria and
evidences keen insight into the
nuanced considerations
required when recommending
external standards for
organizations to follow
Proposes external standards
that may have helped prevent
the incident, with relevant and
logical support
Proposes external standards
with support, but the standards
would not have helped prevent
the incident, or the support is
not relevant or logical given the
case
Does not propose external
standards with support
6.5
Global
Considerations:
International
Compliance
Meets “Proficient” criteria and
evidences keen insight into the
application of international
standards
Accurately identifies and
explains in detail the
international compliance
standards relevant to the
incident
Identifies and explains the
international compliance
standards relevant to the
incident, but with gaps in
accuracy or detail
Does not identify and explain
the international compliance
standards relevant to the
incident
6.5
Global
Considerations:
Cultural Impacts
Meets “Proficient” criteria and
evidences keen insight into
cultural perspectives toward
cyber communication and
commerce within a global
context
Accurately analyzes the impact
of the incident on cyber
communication and commerce
from the larger cultural
perspective
Analyzes the impact of the
incident on cyber
communication and commerce
globally, but not in terms of the
larger cultural perspective or
with gaps in accuracy
Does not analyze the impact of
the incident on cyber
communication and commerce
globally
6.5
Global
Considerations:
Global Technology
Environment
Meets “Proficient” criteria and
evidences a nuanced, in-depth
understanding of global legal
impacts of related cases
Analyzes in detail the global
legal and regulatory impact of
this or similar cases to
determine global laws and
regulations that resulted or
should have resulted
Analyzes the global legal and
regulatory impact of this or
similar cases to determine
global laws and regulations that
resulted or should have
resulted, but with gaps in detail
Does not analyze the global
legal and regulatory impact of
this or similar cases to
determine global laws and
regulations that resulted or
should have resulted
6.5
Summary
Meets “Proficient” criteria and
evidences keen insight into
appropriate application of
knowledge to organizations
Concisely summarizes and
reflects on how knowledge of
cyberlaw principles, ethical
needs, and legal compliance
standards were applied to the
selected case
Summarizes and reflects on
how knowledge of cyberlaw
principles, ethical needs, and
legal compliance standards
were applied to the selected
case
Does not summarize and reflect
on how knowledge of cyberlaw
principles, ethical needs, and
legal compliance standards
were applied to the selected
case
6.5
Articulation of
Response
Submission is free of errors
related to citations, grammar,
spelling, syntax, and
organization and is presented in
a professional and easy-to-read
format
Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
Submission has major errors
related to citations, grammar,
spelling, syntax, or organization
that negatively impact
readability and articulation of
main ideas
Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas
2.5
Earned Total 100%

More Related Content

Similar to IT 659 Milestone Three Guidelines and Rubric In Milest.docx

IHP 525 Private Discussion Rubric Overview Your act
IHP 525 Private Discussion Rubric  Overview Your actIHP 525 Private Discussion Rubric  Overview Your act
IHP 525 Private Discussion Rubric Overview Your actMalikPinckney86
 
Paper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docxPaper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docxdunnramage
 
InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework lauricesatu
 
HIM 500 Milestone One Gu
HIM 500 Milestone One GuHIM 500 Milestone One Gu
HIM 500 Milestone One GuSusanaFurman449
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelPaul Di Gangi
 
Project 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxProject 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxbriancrawford30935
 
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...ThelmaSneed
 
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...DennisHine
 
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...Yolanda Stacey
 
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...BrittneDean
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft CorpAntoinette Williams
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...Habib Ullah Qamar
 
ComplianceGuidelinesUploaded6.14PDF
ComplianceGuidelinesUploaded6.14PDFComplianceGuidelinesUploaded6.14PDF
ComplianceGuidelinesUploaded6.14PDFPaulette Wunsch
 

Similar to IT 659 Milestone Three Guidelines and Rubric In Milest.docx (13)

IHP 525 Private Discussion Rubric Overview Your act
IHP 525 Private Discussion Rubric  Overview Your actIHP 525 Private Discussion Rubric  Overview Your act
IHP 525 Private Discussion Rubric Overview Your act
 
Paper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docxPaper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docx
 
InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework
 
HIM 500 Milestone One Gu
HIM 500 Milestone One GuHIM 500 Milestone One Gu
HIM 500 Milestone One Gu
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
 
Project 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxProject 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docx
 
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
 
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
 
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
 
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
Hlt313 v (safety, quality, and interdisciplinary approaches to care) entire c...
 
Standards For Wright Aircraft Corp
Standards For Wright Aircraft CorpStandards For Wright Aircraft Corp
Standards For Wright Aircraft Corp
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
ComplianceGuidelinesUploaded6.14PDF
ComplianceGuidelinesUploaded6.14PDFComplianceGuidelinesUploaded6.14PDF
ComplianceGuidelinesUploaded6.14PDF
 

More from christiandean12115

100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
100 Original WorkZero PlagiarismGraduate Level Writing Required.docx100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
100 Original WorkZero PlagiarismGraduate Level Writing Required.docxchristiandean12115
 
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docxchristiandean12115
 
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docxchristiandean12115
 
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docxchristiandean12115
 
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docxchristiandean12115
 
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docxchristiandean12115
 
10.1 What are three broad mechanisms that malware can use to propa.docx
10.1 What are three broad mechanisms that malware can use to propa.docx10.1 What are three broad mechanisms that malware can use to propa.docx
10.1 What are three broad mechanisms that malware can use to propa.docxchristiandean12115
 
10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docx10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docxchristiandean12115
 
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docxchristiandean12115
 
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docxchristiandean12115
 
10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docx10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docxchristiandean12115
 
10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docxchristiandean12115
 
10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docx10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docxchristiandean12115
 
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docxchristiandean12115
 
10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docxchristiandean12115
 
10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docx10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docxchristiandean12115
 
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docxchristiandean12115
 
10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docx10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docxchristiandean12115
 
10 academic sources about the topic (Why is America so violent).docx
10 academic sources about the topic (Why is America so violent).docx10 academic sources about the topic (Why is America so violent).docx
10 academic sources about the topic (Why is America so violent).docxchristiandean12115
 

More from christiandean12115 (20)

100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
100 Original WorkZero PlagiarismGraduate Level Writing Required.docx100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
100 Original WorkZero PlagiarismGraduate Level Writing Required.docx
 
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
10.11771066480704270150THE FAMILY JOURNAL COUNSELING AND THE.docx
 
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
10.11771066480703252339 ARTICLETHE FAMILY JOURNAL COUNSELING.docx
 
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
10.11770022427803260263ARTICLEJOURNAL OF RESEARCH IN CRIME AN.docx
 
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
10.11770022487105285962Journal of Teacher Education, Vol. 57,.docx
 
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST  M.docx
10.11770011000002250638ARTICLETHE COUNSELING PSYCHOLOGIST M.docx
 
10.1 What are three broad mechanisms that malware can use to propa.docx
10.1 What are three broad mechanisms that malware can use to propa.docx10.1 What are three broad mechanisms that malware can use to propa.docx
10.1 What are three broad mechanisms that malware can use to propa.docx
 
10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docx10.0 ptsPresentation of information was exceptional and included.docx
10.0 ptsPresentation of information was exceptional and included.docx
 
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
10-K1f12312012-10k.htm10-KUNITED STATESSECURIT.docx
 
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
10-K 1 f12312012-10k.htm 10-K UNITED STATESSECURITIES AN.docx
 
10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docx10 What does a golfer, tennis player or cricketer (or any othe.docx
10 What does a golfer, tennis player or cricketer (or any othe.docx
 
10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx10 September 2018· Watch video· Take notes withfor students.docx
10 September 2018· Watch video· Take notes withfor students.docx
 
10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docx10 Research-Based Tips for Enhancing Literacy Instruct.docx
10 Research-Based Tips for Enhancing Literacy Instruct.docx
 
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
10 Strategic Points for the Prospectus, Proposal, and Direct Pract.docx
 
10 Most Common Err.docx
10 Most Common Err.docx10 Most Common Err.docx
10 Most Common Err.docx
 
10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx
 
10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docx10 Customer Acquisition and Relationship ManagementDmitry .docx
10 Customer Acquisition and Relationship ManagementDmitry .docx
 
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​  (seri.docx
10 ELEMENTS OF LITERATURE (FROM A TO Z)   1  ​PLOT​ (seri.docx
 
10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docx10 ers. Although one can learn definitions favor- able to .docx
10 ers. Although one can learn definitions favor- able to .docx
 
10 academic sources about the topic (Why is America so violent).docx
10 academic sources about the topic (Why is America so violent).docx10 academic sources about the topic (Why is America so violent).docx
10 academic sources about the topic (Why is America so violent).docx
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

IT 659 Milestone Three Guidelines and Rubric In Milest.docx

  • 1. IT 659 Milestone Three Guidelines and Rubric In Milestone Three you will submit the Recommendations and Global Considerations portion of the final project. The purpose of this assignment is to suggest relevant changes to the organization itself and changes to the ethical guidelines that could have prevented the incident. Prompt: Suggest relevant changes to the organization itself and changes to the ethical guidelines that could have prevented the incident. Standards external to the organization that may have helped prevent the incident should also be proposed. This assignment will also address international compliance standards and how they would have been relevant to the incident. The impact of the incident on global communication and commerce will be analyzed, as well as the impact on the global technology environment. Specifically the following critical elements must be addressed: IV. Recommendations a) Propose relevant changes to the organization that may have prevented the incident. How would these changes have helped to prevent the occurrence? b) Propose reasonable ethical guidelines that could have helped prevent the incident and that might help the organization prevent future incidents.
  • 2. Propose changes to the standards external to the organization that might have helped prevent the incident. This can include changes to regulations and regulatory and ethical standards that might exist today but did not exist or were not properly delivered at the time of the incident. Be sure to support your conclusions. V. Global Considerations a) What international compliance standards (either at the time of the incident or today) would have been relevant to the incident, and how? If your company is not global, imagine that is. b) Analyze the impact of the incident on global communication and commerce (again, if your organization is not global, imagine otherwise). In other words, what impact did (or would) the incident have on views and use of information technology and communication in global contexts? c) Global Technology Environment: Based on your research and analysis of this case, determine the global legal and regulatory impacts this case had on the information technology overall. In other words, determine the relationship between this case and the global regulatory standards that are now in place, will be put in place shortly, or should be put in place as a result of this or related incident(s).
  • 3. Rubric Guidelines for Submission: The format for this assignment will be a three- to five-page Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions. Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value Recommendations: Organizational Changes Meets “Proficient” criteria and evidences keen insight into solving organizational issues Proposes and defends relevant changes to the organization that would have helped prevent the incident Proposes and defends changes to the organization, but changes are not relevant or not
  • 4. comprehensively defended, or would not have helped prevent the incident Does not propose and defend changes to the organization 15 Recommendations: Ethical Guidelines Meets “Proficient” criteria and evidences keen insight into the nuanced ethical standard needs of organizations Proposes reasonable ethical guidelines that could have helped prevent the incident and that might help prevent future incidents within the organization Proposes ethical guidelines, but guidelines are not reasonable or would not have helped prevent the incident or would not prevent future incidents within the organization Does not propose ethical guidelines for the organization 15
  • 5. Recommendations: External Standards Meets “Proficient” criteria and evidences keen insight into the nuanced considerations required when recommending external standards for organizations to follow Proposes external standards that may have helped prevent the incident, with relevant and logical support Proposes external standards with support, but the standards would not have helped prevent the incident, or the support is not relevant or logical given the case Does not propose external standards with support 15 Global Considerations: International Compliance
  • 6. Meets “Proficient” criteria and evidences keen insight into the application of international standards Accurately identifies and explains in detail the international compliance standards relevant to the incident Identifies and explains the international compliance standards relevant to the incident, but with gaps in accuracy or detail Does not identify and explain the international compliance standards relevant to the incident 15 Global Considerations: Cultural Impacts Meets “Proficient” criteria and evidences keen insight into cultural perspectives toward cyber communication and commerce within a global context
  • 7. Accurately analyzes the impact of the incident on cyber communication and commerce from the larger cultural perspective Analyzes the impact of the incident on cyber communication and commerce globally but not in terms of the larger cultural perspective or with gaps in accuracy Does not analyze the impact of the incident on cyber communication and commerce globally 15 http://snhu- media.snhu.edu/files/production_documentation/formatting/rubr ic_feedback_instructions_student.pdf Global Considerations: Global Technology Environment Meets “Proficient” criteria and evidences a nuanced, in-depth understanding of global legal
  • 8. impacts of related cases Analyzes in detail the global legal and regulatory impact of this or similar cases to determine global laws and regulations that resulted or should have resulted Analyzes the global legal and regulatory impact of this or similar cases to determine global laws and regulations that resulted or should have resulted, but with gaps in detail Does not analyze the global legal and regulatory impact of this or similar cases to determine global laws and regulations that resulted or should have resulted 15 Articulation of Response Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read format Submission has no major errors
  • 9. related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 10 Earned Total 100% IT 659 Milestone Two Guidelines and Rubric In Milestone Two, you will submit the Case Analysis and Incident Impacts portion of the final project. The purpose of this assignment is to analyze the case and determine the impact of the incident. Prompt: Analyze the ethical issues and determine the legal compliance issues within the organization, as well as the social
  • 10. and cultural impacts of these compliance issues. You will be expected to address the impact the incident may have had on the ethical and legal IT regulations at the time. The connection between the industry standards and the standards for informational technology should be determined, as well as the influence of the cultural impact on IT and cyber communication or commerce. Specifically the following critical elements must be addressed: II. Case Analysis a) Analyze the case to determine the ethical issues within the organization that may have led to the incident. What are these issues and why do you credit them for the incident? b) Determine legal compliance issues within the organization that may have led to the incident or could lead to future incidents. Were there any legal and ethical standards in existence at the time that were not followed by the organization? What were these issues and how did they impact the organization? c) Determine the societal and cultural impact of these compliance issues. Some things to consider in your assessment include specific targeting of demographic groups, victimization of certain customers, and so on. III. Incident Impact
  • 11. a) Determine the impact this incident may have had on the ethical and legal IT regulations of the time. If there were no direct results of this case, what may have been the indirect impact and/or what was the impact of similar cases? For example, what regulatory changes resulted from this or similar cases? What is your reasoning? b) Determine the connection between the industry standards and the standards in existence for information technology. Specifically, determine if the organization was lacking in either industry-specific or IT- specific alignment with regulations that may have contributed to the incident, and provide support for your conclusions. For example, misalignment with HIPAA laws in healthcare is an industry- specific deviation from standards. c) Cultural Impact: Analyze the influence this incident may have had on various cultural attitudes toward IT and cyber communication or commerce. In other words, how could this incident impact views of information technology use? Rubric Guidelines for Submission: The format of this assignment will be a three- to five-page Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade
  • 12. Center. For more information, review these instructions. Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value Case Analysis: Ethical Issues Meets “Proficient” criteria, and reasoning evidences strong ethical criteria or keen analytic skills regarding organizational ethics Accurately analyzes the case to determine which ethical issues within the organization led to the incident and why Analyzes the case to determine which ethical issues within the organization led to the incident, and why, but with gaps in accuracy or detail Does not analyze the case to determine which ethical issues within the organization led to the incident and why 15 Case Analysis: Legal
  • 13. Compliance Meets “Proficient” criteria and evidences keen understanding of legal criteria of the time Accurately determines the legal compliance issues within the organization that led to this incident and could have resulted in other issues Determines the legal compliance issues within the organization that led to this incident and could have resulted in other issues, but with gaps in accuracy or detail Does not determine the legal compliance issues within the organization that led to this incident and could have resulted in other issues 15 Case Analysis: Societal and Cultural Impact Meets “Proficient” criteria and
  • 14. evidences deep insight into unexpected, hidden, or complex impacts on culture and society Comprehensively and accurately determines the societal and cultural impacts of the legal and ethical compliance issues Determines the societal and cultural impacts of the legal and ethical compliance issues, but with gaps in accuracy or detail Does not determine the societal and cultural impacts of the legal and ethical compliance issues 15 Incident Impact: Regulations Meets “Proficient” criteria and evidences keen understanding of ethical and legal regulations following the incident Accurately determines the direct or indirect impact of this or similar case on ethical and legal IT regulations at the time
  • 15. Determines the direct or indirect impact of this or similar case on ethical and legal IT regulations at the time, but with gaps in accuracy or logical reasoning Does not determine the direct or indirect impact of this or similar case on ethical and legal IT regulations at the time 15 Incident Impact: Standards Meets “Proficient” criteria and evidences keen insight into understanding and applying IT and industry-specific standards for information security Accurately determines the connection between the industry standards and the standards in existence for information technology with logical reasoning and support Determines the connection between the industry standards and the standards in existence for information technology, but with gaps in accuracy or gaps in
  • 16. reasoning and support Does not determine the connection between the industry standards and the standards in existence for information technology 15 http://snhu- media.snhu.edu/files/production_documentation/formatting/rubr ic_feedback_instructions_student.pdf Incident Impact: Cultural Impact Meets “Proficient” criteria and evidences keen insight into nuances of various cultural interpretations and views toward technology and cyber security Accurately analyzes the influence this incident may have had on various cultural attitudes toward IT and cyber communication or commerce Analyzes the influence this incident may have had on various cultural attitudes
  • 17. toward IT and cyber communication or commerce, but with gaps in accuracy or detail Does not analyze the influence this incident may have had on various cultural attitudes toward IT and cyber communication or commerce 15 Articulation of Response Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read format Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar,
  • 18. spelling, syntax, or organization that prevent understanding of ideas 10 Earned Total 100% IT 659 Milestone One Guidelines and Rubric For Milestone One, you will submit the introduction portion of the final project. The purpose of Milestone One is to apply cyberlaw and security principles and to summarize the selected case. Prompt: Identify the cyberlaw principles and explain how each applies to the business, e-commerce, or e-communication industries chosen. Describe the purpose that the application of the principles serves for the industry. You will also need to include the necessary organizational information, industry, problem, and the time period of the incident. Specifically the following critical elements must be addressed: a) Apply cyberlaw and security principles to the business, e- commerce, and e-communication industries. What purpose does the application of cyber principles serve for these industries?
  • 19. b) Summarize the selected case, including the necessary organizational information, industry, problem, and time period of the incident. Guidelines for Submission: The format of this assignment will be a one- to two-page Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions. Critical Elements Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value Introduction: Application of Cyber Principles Accurately applies cyber principles to the business, e- commerce, and e-communication industries to explain the purpose served by the principles Applies cyber principles to business, e-commerce, and e- communication, but with gaps in accuracy or without detail regarding the purpose served by these principles
  • 20. Does not apply cyber principles to business, e-commerce, and e- communication 40 Introduction: Summary of Case Comprehensively and concisely introduces the selected incident with necessary organizational information, the industry type, the problem, and the time period of occurrence Introduces the selected incident with organizational information, the industry type, the problem, and the time period of occurrence, but lacks necessary detail or includes superfluous information Does not introduce the selected incident with organizational information, the industry type, the problem, and the time period of occurrence 40 http://snhu- media.snhu.edu/files/production_documentation/formatting/rubr
  • 21. ic_feedback_instructions_student.pdf Articulation of Response Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 20 Earned Total 100% IT 659 Final Project Guidelines and Rubric Overview The final project for this course is the creation of an
  • 22. information technology incident report. Successful management in information technology requires knowledge of the legal and ethical environment. Globalization, increasing commerce between graphical locations brought on by the ability to connect online, and the increasing mix of cultures bring additional complexity to the considerations of law and ethics in cyber security and information technology (IT). The final project for this course will require you to research a recent (within the last five years) incident or event in the field of IT, e-commerce, or cyber security in the context of the legal and ethical standards of that time period. You will identify the issues the organization(s) had, recommend changes for that organization(s), and write a report that highlights your recent analysis, findings, and recommendations. The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Two, Four, and Seven. The final submission will occur in Module Nine. In this assignment you will demonstrate your mastery of the following course outcomes: circumstances, business models, and information technology issues technology for their impact to organizations, society, and culture
  • 23. ensure legal and ethical cyber practice and behavior and regulatory standards within information technology issues related to global communication on information technology Prompt You will select a recent or current incident from the public record and analyze the case to identify the issues that led to the incident. What recommendations can you make to ensure the incident will not occur again? What were the results of the incident? And, finally, what were the cultural, societal, or global impacts of this case and the subsequent changes to the legal environment? Please note: Your selection will need to be submitted and approved by the instructor. Specifically the following critical elements must be addressed: I. Introduction a) Apply cyberlaw and security principles to the business, e- commerce, and e-communication industries. What purpose does the application of cyber principles serve for these industries? b) Summarize the selected case, including the necessary organizational information, industry, problem, and time period of the incident.
  • 24. II. Case Analysis a) Analyze the case to determine the ethical issues within the organization that may have led to the incident. What are these issues and why do you credit them for the incident? b) Determine legal compliance issues within the organization that may have led to the incident or could lead to future incidents. Were there any legal and ethical standards in existence at the time that were not followed by the organization? What were these issues and how did they impact the organization? c) Determine the societal and cultural impact of these compliance issues. Some things to consider in your assessment include specific targeting of demographic groups, victimization of certain customers, and so on. III. Incident Impact a) Determine the impact this incident may have had on the ethical and legal IT regulations of the time. If there were no direct results of this case, what may have been the indirect impact and/or what was the impact of similar cases? For example, what regulatory changes resulted from this or similar cases? What is your reasoning?
  • 25. b) Determine the connection between the industry standards and the standards in existence for information technology. Specifically, determine if the organization was lacking in either industry-specific or IT- specific alignment with regulations that may have contributed to the incident, and provide support for your conclusions. For example, misalignment with HIPAA laws in healthcare is an industry- specific deviation from standards. c) Cultural Impact: Analyze the influence this incident may have had on various cultural attitudes toward IT and cyber communication or commerce. In other words, how could this incident impact views of information technology use? IV. Recommendations a) Propose relevant changes to the organization that may have prevented the incident. How would these changes have helped to prevent the occurrence? b) Propose reasonable ethical guidelines that could have helped prevent the incident and that might help the organization prevent future incidents. c) Propose changes to the standards external to the organization that might have helped prevent the incident. This can include changes to regulations and regulatory and ethical standards that might exist today but did not exist or were not properly delivered at the time of the
  • 26. incident. Be sure to support your conclusions. V. Global Considerations a) What international compliance standards (either at the time of the incident or today) would have been relevant to the incident, and how? If your company is not global, imagine that is. b) Analyze the impact of the incident on global communication and commerce (again, if your organization is not global, imagine otherwise). In other words, what impact did (or would) the incident have on views and use of information technology and communication in global contexts? c) Global Technology Environment: Based on your research and analysis of this case, determine the global legal and regulatory impacts this case had on the information technology overall. In other words, determine the relationship between this case and the global regulatory standards that are now in place, will be put in place shortly, or should be put in place as a result of this or related incident(s). VI. Summary: Given your knowledge of cyberlaw principles, ethical needs, and legal compliance standards, summarize how you applied these principles to your analysis of the case. In other words, how did you apply cyberlaw principles to the circumstances, business model, and IT issues that the selected
  • 27. organization faced? Milestones Milestone One: Introduction In Module Two, you will submit the introduction. In this assignment you will identify the cyberlaw principles and explain how each applies to the business, e- commerce, or e-communication industries chosen. Describe the purpose of the application of the principles serve for the industry. You will also need to include the necessary organizational information, industry, problem, and the time period of the incident that occurred. The format of this assignment will be a one- to two-page Word document. This milestone is graded with the Milestone One Rubric. Milestone Two: Case Analysis and Incident Impact In Module Four, you will submit the Case Analysis and Incident Impacts. In this assignment you will analyze the ethical issues and determine the legal compliance issues within the organization as well as the social and cultural impacts of these compliance issues. You will be expected to address the impact the incident may have had on the ethical and legal IT regulations at the time. The connection between the industry standards and the standards for informational technology should be determined, as well as the influence of the cultural impact to IT and cyber communication or commerce. The format of this assignment will be a three- to five-page Word document. This milestone is graded with the Milestone Two Rubric. Milestone Three: Recommendations and Global Considerations In Module Seven, you will submit the Recommendations and Global Considerations. In this assignment you will suggest
  • 28. relevant changes to the organization itself and changes to the ethical guidelines that could have prevented the incident. Standards external to the organization that may have helped prevent the incident should also be proposed. This assignment will also address international compliance standards and how they would have been relevant to the incident. The impact of the incident on global communication and commerce will be analyzed, as well as the impact on the global technology environment. The format of this assignment will be a three- to five-page Word document. This milestone is graded with the Milestone Three Rubric. Final Submission: Information Technology Incident Report and Summary In Module Nine, you will submit your Information Technology Incident Report along with a summary explaining how you applied the principles to your analysis of the case. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded using the Final Product Rubric. Deliverables Milestone Deliverable Module Due Grading 1 Introduction Two Graded separately; Milestone One Rubric 2 Case Analysis and Incident Impact Four Graded separately; Milestone Two Rubric
  • 29. 3 Recommendations and Global Considerations Seven Graded separately; Milestone Three Rubric Final Submission: Information Technology Incident Report and Summary Nine Graded separately; Final Product Rubric Final Product Rubric Guidelines for Submission: Your report should be long enough to contain all relevant information, reasoning, and research. It should be formatted logically and written in a professional manner, following APA guidelines. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions. Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value Introduction: Application of Cyber Principles Meets “Proficient” criteria and evidences keen insight into the nuanced purpose of cyber
  • 30. principles in multiple industries Accurately applies cyber principles to the business, e- commerce, and e- communication industries to explain the purpose served by the principles Applies cyber principles to business, e-commerce, and e- communication but with gaps in accuracy or without detail regarding the purpose served by these principles Does not apply cyber principles to business, e-commerce, and e-communication 6.5 Introduction: Summary of Case Meets “Proficient” criteria, and quality of introductions establishes expertise in the discipline Comprehensively and concisely introduces the selected incident with necessary organizational information, the industry type, the problem, and the time
  • 31. period of occurrence Introduces the selected incident with organizational information, the industry type, the problem, and the time period of occurrence, but lacks necessary detail or includes superfluous information Does not introduce the selected incident with organizational information, the industry type, the problem, and the time period of occurrence 6.5 http://snhu- media.snhu.edu/files/production_documentation/formatting/rubr ic_feedback_instructions_student.pdf Case Analysis: Ethical Issues Meets “Proficient” criteria, and reasoning evidences strong ethical criteria or keen analytic skills regarding organizational ethics Accurately analyzes the case to determine which ethical issues
  • 32. within the organization led to the incident, and why Analyzes the case to determine which ethical issues within the organization led to the incident, and why, but with gaps in accuracy or detail Does not analyze the case to determine which ethical issues within the organization led to the incident, and why 6.5 Case Analysis: Legal Compliance Meets “Proficient” criteria and evidences keen understanding of legal criteria of the time Accurately determines the legal compliance issues within the organization that led to this incident and could have resulted in other issues Determines the legal compliance issues within the organization that led to this incident and could have resulted in other issues, but with gaps in accuracy or detail
  • 33. Does not determine the legal compliance issues within the organization that led to this incident and could have resulted in other issues 6.5 Case Analysis: Societal and Cultural Impact Meets “Proficient” criteria and evidences deep insight into unexpected, hidden, or complex impacts on culture and society Comprehensively and accurately determines the societal and cultural impacts of the legal and ethical compliance issues Determines the societal and cultural impacts of the legal and ethical compliance issues, but with gaps in accuracy or detail Does not determine the societal and cultural impacts of the legal and ethical compliance issues 6.5
  • 34. Incident Impact: Regulations Meets “Proficient” criteria and evidences keen understanding of ethical and legal regulations following the incident Accurately determines the direct or indirect impact of this or similar case on ethical and legal IT regulations at the time Determines the direct or indirect impact of this or similar case on ethical and legal IT regulations at the time, but with gaps in accuracy or logical reasoning Does not determine the direct or indirect impact of this or similar case on ethical and legal IT regulations at the time 6.5 Incident Impact: Standards Meets “Proficient” criteria and evidences keen insight into understanding and applying IT
  • 35. and industry-specific standards for information security Accurately determines the connection between industry standards and standards in existence for information technology with logical reasoning and support Determines the connection between the industry standards and the standards in existence for information technology, but with gaps in accuracy or gaps in reasoning and support Does not determine the connection between the industry standards and the standards in existence for information technology 6.5 Incident Impact: Cultural Impact Meets “Proficient” criteria and evidences keen insight into nuances of various cultural interpretations and views toward technology and cyber security
  • 36. Accurately analyzes the influence this incident may have had on various cultural attitudes toward IT and cyber communication or commerce Analyzes the influence this incident may have had on various cultural attitudes toward IT and cyber communication or commerce, but with gaps in accuracy or detail Does not analyze the influence this incident may have had on various cultural attitudes toward IT and cyber communication or commerce 6.5 Recommendations: Organizational Changes Meets “Proficient” criteria and evidences keen insight into solving organizational issues Proposes and defends relevant
  • 37. changes to the organization that would have helped prevent the incident Proposes and defends changes to the organization, but changes are not relevant or not comprehensively defended, or would not have helped prevent the incident Does not propose and defend changes to the organization 6.5 Recommendations: Ethical Guidelines Meets “Proficient” criteria and evidences keen insight into the nuanced ethical standard needs of organizations Proposes reasonable ethical guidelines that could have helped prevent the incident and that might help prevent future incidents within the organization Proposes ethical guidelines, but guidelines are not reasonable or would not have helped prevent the incident or would not
  • 38. prevent future incidents within the organization Does not propose ethical guidelines for the organization 6.5 Recommendations: External Standards Meets “Proficient” criteria and evidences keen insight into the nuanced considerations required when recommending external standards for organizations to follow Proposes external standards that may have helped prevent the incident, with relevant and logical support Proposes external standards with support, but the standards would not have helped prevent the incident, or the support is not relevant or logical given the case Does not propose external standards with support 6.5
  • 39. Global Considerations: International Compliance Meets “Proficient” criteria and evidences keen insight into the application of international standards Accurately identifies and explains in detail the international compliance standards relevant to the incident Identifies and explains the international compliance standards relevant to the incident, but with gaps in accuracy or detail Does not identify and explain the international compliance standards relevant to the incident 6.5 Global Considerations: Cultural Impacts
  • 40. Meets “Proficient” criteria and evidences keen insight into cultural perspectives toward cyber communication and commerce within a global context Accurately analyzes the impact of the incident on cyber communication and commerce from the larger cultural perspective Analyzes the impact of the incident on cyber communication and commerce globally, but not in terms of the larger cultural perspective or with gaps in accuracy Does not analyze the impact of the incident on cyber communication and commerce globally 6.5 Global Considerations: Global Technology Environment Meets “Proficient” criteria and evidences a nuanced, in-depth
  • 41. understanding of global legal impacts of related cases Analyzes in detail the global legal and regulatory impact of this or similar cases to determine global laws and regulations that resulted or should have resulted Analyzes the global legal and regulatory impact of this or similar cases to determine global laws and regulations that resulted or should have resulted, but with gaps in detail Does not analyze the global legal and regulatory impact of this or similar cases to determine global laws and regulations that resulted or should have resulted 6.5 Summary Meets “Proficient” criteria and evidences keen insight into appropriate application of knowledge to organizations
  • 42. Concisely summarizes and reflects on how knowledge of cyberlaw principles, ethical needs, and legal compliance standards were applied to the selected case Summarizes and reflects on how knowledge of cyberlaw principles, ethical needs, and legal compliance standards were applied to the selected case Does not summarize and reflect on how knowledge of cyberlaw principles, ethical needs, and legal compliance standards were applied to the selected case 6.5 Articulation of Response Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read format Submission has no major errors related to citations, grammar,
  • 43. spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 2.5 Earned Total 100%