SlideShare a Scribd company logo
1 of 14
Rubric Name: Case Study #3 Rubric
Criteria
Excellent
Outstanding
Acceptable
Needs Improvement
Needs Significant Improvement
Missing or Unacceptable
Introduction or Overview for the Case Study
20 points
Provided an excellent introduction which included a well-
reasoned explanation as to why “cybersecurity” is considered an
industry but does not have a unique NAICS code. The overview
appropriately used information from 3 or more authoritative
sources.
18 points
Provided an outstanding introduction which included a well-
reasoned explanation as to why “cybersecurity” is considered an
industry but does not have a unique NAICS code. Explained the
importance of standardized industry classification codes (who
uses them and why).The overview appropriately used
information from 3 or more authoritative sources.
16 points
Provided an introduction which included an explanation as to
why “cybersecurity” is considered an industry but does not have
a unique NAICS code. Explained the importance of standardized
industry classifications. The overview appropriately used
information from 2 or more authoritative sources.
14 points
Provided an overview but the section lacked important details
about the case. Information from authoritative sources was cited
and used in the overview.
10 points
Attempted to provide an introduction to the case study but this
section lacked detail and/or was not well supported by
information drawn from authoritative sources.OR, the Case
Study was posted late for discussion (mandatory 10 point
deduction).
0 points
The introduction and/or overview sections of the paper were off
topic.OR, the Case Study was not posted for discussion or was
posted more than two days late (mandatory 20 point deduction).
NAICS Codes and Industry Classification (What, Why, Who
uses them)
10 points
Introduction included an excellent explanation of the
importance of standardized industry classification codes
including 3 or more examples of who uses NAICS codes and
why. Appropriately used information from 3 or more
authoritative sources.
8.5 points
Introduction included an outstanding explanation of the
importance of standardized industry classification codes
including 2 or more examples of who uses NAICS codes and
why. Appropriately used information from 2 or more
authoritative sources.
7 points
Introduction included an explanation of the importance of
standardized industry classification codes including at least one
example of who uses NAICS codes and why. Appropriately used
information from authoritative sources.
6 points
Introduction mentioned the importance of standardized industry
classification codes and gave at least one example of who uses
NAICS codes and why.
4 points
Attempted to provide information about NAICS codes but the
discussion lacked detail and/or was not well supported by
information drawn from authoritative sources.
0 points
This section was missing, off topic, or failed to provide
information about NAICS codes.
Identified and Explained Industry Codes used by Cybersecurity
Companies
20 points
Provided an excellent analysis and discussion of one or more
industry codes which could be used by the cybersecurity
company & product as listed in the assignment. Included a
comparison between the company’s business activities and the
industry characteristics for the four classification families listed
in this assignment (prefixes 334, 44, 51, & 54). Appropriately
used information from 3 or more authoritative sources.
18 points
Provided an outstanding analysis and discussion of one or more
industry codes which could be used by the cybersecurity
company & product as listed in the assignment. Included a
comparison between the company’s business activities and the
industry characteristics for the four classification families listed
in this assignment (prefixes 334, 44, 51, & 54). Appropriately
used information from 2 or more authoritative sources.
16 points
Provided a discussion of one or more industry codes which
could be used by the cybersecurity company & product as listed
in the assignment. Compared the company’s business activities
and the industry characteristics for at least 2 classification
families listed in this assignment (prefixes 334, 44, 51, & 54).
Appropriately used information from authoritative sources.
14 points
Provided a discussion of one or more industry codes which
could be used by the cybersecurity company & product as listed
in the assignment. Compared the company’s business activities
and the industry characteristics to NAICS classifications.
Appropriately used information from authoritative sources.
9 points
Provided a discussion of NAICS industry codes as used by
cybersecurity companies. The discussion lacked detail and/or
was not well supported by information drawn from authoritative
sources.
0 points
This section was off topic or failed to provide information about
cybersecurity related NAICS codes.
Recommendation for “Best Fit” for a NAICS Code for a
Cybersecurity Company
20 points
Provided an excellent “best fit” recommendation for a single
NAICS code to be used by the target cybersecurity company (a)
on its website, (b) in its business directory listings, and (c) in
financial reports. Justification included discussion of the
company’s cybersecurity product as part of the rationale for the
selected NAICS code. Appropriately used information from 3 or
more authoritative sources.
18 points
Provided an outstanding “best fit” recommendation for a single
NAICS code to be used by the target cybersecurity company (a)
on its website, (b) in its business directory listings, and (c) in
financial reports.Justification included discussion of the
company’s cybersecurity product as part of the rationale for the
selected NAICS code. Appropriately used information from 2 or
more authoritative sources.
16 points
Provided a “best fit” recommendation for a single NAICS code
to be used by the target cybersecurity company(a) on its
website, (b) in its business directory listings, and (c) in
financial reports.Justification included discussion of the
company’s cybersecurity product as part of the rationale for the
selected NAICS code. Appropriately used information from
authoritative sources.
14 points
Recommended a NAICS code to be used by the target
cybersecurity company. Discussion included mention of the
company’s cybersecurity product. Appropriately used
information from authoritative sources.
9 points
Identified an appropriate NAICS code but the discussion lacked
detail and/or was not supported by information from
authoritative sources.
0 points
Did not address selection of an appropriate NAICS code.
Addressed security issues using standard cybersecurity
terminology
5 points
Demonstrated excellence in the integration of standard
cybersecurity terminology into the case study.
4 points
Provided an outstanding integration of standard cybersecurity
terminology into the case study.
3 points
Integrated standard cybersecurity terminology into the into the
case study
2 points
Used standard cybersecurity terminology but this usage was not
well integrated with the discussion.
1 point
Misused standard cybersecurity terminology.
0 points
Did not integrate standard cybersecurity terminology into the
discussion.
APA Formatting for Citations and Reference List
5 points
Work contains a reference list containing entries for all cited
resources. Reference list entries and in-text citations are
correctly formatted using the appropriate APA style for each
type of resource.
4 points
Work contains a reference list containing entries for all cited
resources. One or two minor errors in APA format for in-text
citations and/or reference list entries.
3 points
Work contains a reference list containing entries for all cited
resources. No more than 3 minor errors in APA format for in-
text citations and/or reference list entries.
2 points
Work has no more than three paragraphs with omissions of
citations crediting sources for facts and information. Work
contains a reference list containing entries for cited resources.
Work contains no more than 5 minor errors in APA format for
in-text citations and/or reference list entries.
1 point
Work attempts to credit sources but demonstrates a fundamental
failure to understand and apply the APA formatting standard as
defined in the Publication Manual of the American
Psychological Association (6th ed.).
0 points
Reference list is missing. Work demonstrates an overall failure
to incorporate and/or credit authoritative sources for
information used in the paper.
Professionalism Part I: Organization & Appearance
5 points
Submitted work shows outstanding organization and the use of
color, fonts, titles, headings and sub-headings, etc. is
appropriate to the assignment type.
4 points
Submitted work has minor style or formatting flaws but still
presents a professional appearance. Submitted work is well
organized and appropriately uses color, fonts, and section
headings (per the assignment’s directions).
3 points
Organization and/or appearance of submitted work could be
improved through better use of fonts, color, titles, headings, etc.
OR Submitted work has multiple style or formatting errors.
Professional appearance could be improved.
2 points
Submitted work has multiple style or formatting errors.
Organization and professional appearance need substantial
improvement.
1 point
Submitted work meets minimum requirements but has major
style and formatting errors. Work is disorganized and needs to
be rewritten for readability and professional appearance.
0 points
Submitted work is poorly organized and formatted. Writing and
presentation are lacking in professional style and appearance.
Work does not reflect college level writing skills.
Professionalism Part II: Execution
15 points
No formatting, grammar, spelling, or punctuation errors.
14 points
Work contains minor errors in formatting, grammar, spelling or
punctuation which do not significantly impact professional
appearance.
13 points
Errors in formatting, spelling, grammar, or punctuation which
detract from professional appearance of the submitted work.
11 points
Submitted work has numerous errors in formatting, spelling,
grammar, or punctuation. Work is unprofessional in appearance.
4 points
Submitted work is difficult to read / understand and has
significant errors in formatting, spelling, grammar, punctuation,
or word usage.
0 points
Submitted work is poorly executed OR does not reflect college
level work.
Overall Score
Excellent
90 or more
Outstanding
80 or more
Acceptable
70 or more
Needs Improvement
56 or more
Needs Significant Improvement
36 or more
Missing or Unacceptable
0 or more
Assignment Instructions 2_5
You are health information management professional who has
been asked to brief a medical organization’s executive team on
the topic of electronic health records (EHR). Your brief should
provide the executive team information to address the following
topics:
1. Comparison of EHRs to paper records
2. EHR content
3. Advantages
4. Disadvantages
5. Privacy and security considerations
6. Functionality
Written brief in APA format
· Minimum 3-4 pages (excluding cover page and reference page)
· Include a minimum of (2) scholarly references (not Wikipedia,
etc.)
· Paper should be in proper APA format
· Adhere to the Graduate Level Writing Rubric
Case Study #3: Is there a cybersecurity industry?Case Scenario:
You recently joined a small start-up company that has
developed a suite of cybersecurity products that integrate
network sensors (hardware) with big data analytics (software) to
provide advanced threat detection at an affordable price. As is
often the case with small companies, you are expected to lend
your hand to whatever task needs doing. Yesterday, you were
helping to write the online product brochures and other
marketing materials. Today, your tasks include adding the North
American Industry Classification System (NAICS) code(s) for
the “cybersecurity” industry to the company’s Website. As you
delve into the matter, you quickly discover that there is no
NAICS code for a “cybersecurity” industry (see
http://www.census.gov/cgi-bin/sssd/naics/naicsrch?chart=2012).
After additional research, you learned that the NAICS codes for
your company’s direct competitors (companies selling similar
cybersecurity products) included the following:
1. Computer and Electronic Product Manufacturing (NAICS
prefix “334”)
0. Computer Terminal and Other Computer Peripheral
Equipment Manufacturing
0. Computer Storage Device Manufacturing
1. Information Industry (NAICS prefix “51”)
1. Custom Computer Programming Services
1. Software Publishers
1. Professional, Scientific, and Technical Services Industry
(NAICS prefix “54”)
2. Computer Systems Design Services
2. Electronic Stores
1. Retail Trade (NAICS prefix “44”)
3. Electronic Stores
You also learned that the NAICS system was designed to be
production or product oriented and that provisions exist for
adding new or emerging industries to the NAICS classification
system (see NAICS Update Process Fact Sheet, p. 4, section
“The Four Principles of NAICS” https://www.census.gov/eos/
www/naics/reference_files_tools/
NAICS_Update_Process_Fact_Sheet.pdf )
Your team leader has asked you to write a short report detailing
your findings andrecommending which industry your company
should declare as its primary industry (out of the four listed
above). Your report should include a justification for your
selection. Your team leader has also asked you to provide a
well-reasoned explanation as to why “cybersecurity” is
considered an industry by many reporters and market analysts
but is not listed as a unique industry under NAICS.
NAICS codes are incorporated into many business directory
listings, independent financial reports / market analyses, and
credit reports. Many large organizations, especially government
agencies, require that a company have both a Dun & Bradstreet
Data Universal Numbering System (D-U-N-S) number and one
or more NAICS codes assigned to the company prior to being
listed as an approved supplier. Research:
1. Read / Review the Week 5 readings. Pay close attention to
those readings which provide evidence that “cybersecurity” is,
in fact, an industry.
1. Research additional information about industry
classifications, why they were developed, and how they are
used. Here are some suggested sources:
1. http://www.naics.com/history-naics-code/
1. http://www.naics.com/naicswp2014/wp-
content/uploads/2014/10/How_to_Use_NAICS_SIC_Codes_for_
Marketing_NAICSAssociation.pdf
1. http://www.bls.gov/bls/naics.htm
1.
https://www.census.gov/eos/www/naics/reference_files_tools/N
AICS_Update_Process_Fact_Sheet.pdf (See page 4: “The Four
Principles of NAICS” Principles #1 & #2)
1. Find three or more additional sources which provide evidence
that “cybersecurity” is or is not a distinct industry.Write:
Using standard terminology (see case study #1), write a two to
three page summary of your research. At a minimum, your
summary must include the following:
1. Introduction which includes a well-reasoned explanation as to
why “cybersecurity” is considered an industry by many
reporters and market analysts but is not listed as a unique
industry under NAICS. Your introduction should include an
explanation of the importance of standardized industry
classification codes (who uses them and why).
1. Analysis and discussion of one or more industry codes which
could be used by your cybersecurity company (based upon the
product listed in this assignment). The discussion should
include a comparison between your company’s business
activities and the industry characteristics for the four
classification families listed in this assignment (prefixes 334,
44, 51, & 54).
1. Recommendation for the best fit for a single NAICS code to
be used by your company on its website and included in its
business directory listings and financial reports.Submit For
Grading & Discussion
1. Submit your case study in MS Word format (.docx or .doc
file) using the Case Study #3 Assignment in your assignment
folder. (Attach the file.)
1. Post your case study for discussion with your classmates.
First, create a new topic in the Case Study #3 Discussion
Forum. Then, paste the contents of your Case Study #3
document directly into that message. (Do not attach the file.)
1. Last posting or no posting for discussion will be penalized
heavily so it is in your best interests to post your case study
before the assigned due date.Formatting Instructions
1. Use standard APA formatting for the MS Word document that
you submit to your assignment folder. Formatting requirements
and examples are found under Course Resources > APA
Resources.
1. Use the “Paste from Word” paste option in the LEO editor
when posting your Case Study to the Case Study #3 Discussion
forum.Additional Information
1. You are expected to write grammatically correct English in
every assignment that you submit for grading. Do not turn in
any work without (a) using spell check, (b) using grammar
check, (c) verifying that your punctuation is correct and (d)
reviewing your work for correct word usage and correctly
structured sentences and paragraphs. These items are graded
under Professionalism and constitute 20% of the assignment
grade.
1. You are expected to credit your sources using in-text
citations and reference list entries. Both your citations and your
reference list entries must comply with APA 6th edition Style
requirements. Failure to credit your sources will result in
penalties as provided for under the university’s Academic
Integrity policy.

More Related Content

Similar to Rubric Name Case Study #3 RubricCriteriaExcel.docx

Provided an excellent overview of disaster recovery IT service con.docx
Provided an excellent overview of disaster recovery  IT service con.docxProvided an excellent overview of disaster recovery  IT service con.docx
Provided an excellent overview of disaster recovery IT service con.docxbfingarjcmc
 
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...JanuMorandy
 
Term Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerDTerm Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerDalehosickg3
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...shyaminfo30
 
Term Paper The Rookie Chief Information Security Officer.docx
Term Paper The Rookie Chief Information Security Officer.docxTerm Paper The Rookie Chief Information Security Officer.docx
Term Paper The Rookie Chief Information Security Officer.docxmanningchassidy
 
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docxCIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docxsleeperharwell
 
The Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poiThe Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poijacvzpline
 
PMG300 Portfolio Project Scoring Rubric Criteria.docx
PMG300 Portfolio Project Scoring Rubric Criteria.docxPMG300 Portfolio Project Scoring Rubric Criteria.docx
PMG300 Portfolio Project Scoring Rubric Criteria.docxLeilaniPoolsy
 
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics  Assignment 1 Creatin.docxCIS333 – Assignments and Rubrics  Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docxAASTHA76
 
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxThe Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxteresehearn
 
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docxTerm Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docxjacqueliner9
 
This table lists criteria and criteria group name in the first colum
This table lists criteria and criteria group name in the first columThis table lists criteria and criteria group name in the first colum
This table lists criteria and criteria group name in the first columrochellwa9f
 
This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxgasciognecaren
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxrhetttrevannion
 
Concert Calendar Websites (2 pages)Look specifically for free co.docx
Concert Calendar Websites (2 pages)Look specifically for free co.docxConcert Calendar Websites (2 pages)Look specifically for free co.docx
Concert Calendar Websites (2 pages)Look specifically for free co.docxmaxinesmith73660
 

Similar to Rubric Name Case Study #3 RubricCriteriaExcel.docx (15)

Provided an excellent overview of disaster recovery IT service con.docx
Provided an excellent overview of disaster recovery  IT service con.docxProvided an excellent overview of disaster recovery  IT service con.docx
Provided an excellent overview of disaster recovery IT service con.docx
 
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
 
Term Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerDTerm Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerD
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
 
Term Paper The Rookie Chief Information Security Officer.docx
Term Paper The Rookie Chief Information Security Officer.docxTerm Paper The Rookie Chief Information Security Officer.docx
Term Paper The Rookie Chief Information Security Officer.docx
 
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docxCIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
CIS333 – Assignments and Rubrics Assignment 1 Creating an.docx
 
The Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poiThe Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poi
 
PMG300 Portfolio Project Scoring Rubric Criteria.docx
PMG300 Portfolio Project Scoring Rubric Criteria.docxPMG300 Portfolio Project Scoring Rubric Criteria.docx
PMG300 Portfolio Project Scoring Rubric Criteria.docx
 
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics  Assignment 1 Creatin.docxCIS333 – Assignments and Rubrics  Assignment 1 Creatin.docx
CIS333 – Assignments and Rubrics Assignment 1 Creatin.docx
 
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxThe Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
 
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docxTerm Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
 
This table lists criteria and criteria group name in the first colum
This table lists criteria and criteria group name in the first columThis table lists criteria and criteria group name in the first colum
This table lists criteria and criteria group name in the first colum
 
This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
 
Concert Calendar Websites (2 pages)Look specifically for free co.docx
Concert Calendar Websites (2 pages)Look specifically for free co.docxConcert Calendar Websites (2 pages)Look specifically for free co.docx
Concert Calendar Websites (2 pages)Look specifically for free co.docx
 

More from joellemurphey

Eastern European countries appear to have become dependent on Ru.docx
Eastern European countries appear to have become dependent on Ru.docxEastern European countries appear to have become dependent on Ru.docx
Eastern European countries appear to have become dependent on Ru.docxjoellemurphey
 
EAS 209 Second Response Paper Topic Assignment Due .docx
EAS 209 Second Response Paper Topic Assignment Due .docxEAS 209 Second Response Paper Topic Assignment Due .docx
EAS 209 Second Response Paper Topic Assignment Due .docxjoellemurphey
 
Earth Science LabIn what order do materials settle in waterSo t.docx
Earth Science LabIn what order do materials settle in waterSo t.docxEarth Science LabIn what order do materials settle in waterSo t.docx
Earth Science LabIn what order do materials settle in waterSo t.docxjoellemurphey
 
EarlyIntervention Strategies Paper (15 points)The pu.docx
EarlyIntervention Strategies Paper (15 points)The pu.docxEarlyIntervention Strategies Paper (15 points)The pu.docx
EarlyIntervention Strategies Paper (15 points)The pu.docxjoellemurphey
 
Early Hominids & Australopithecus SubscribeWhat is a too.docx
Early Hominids & Australopithecus SubscribeWhat is a too.docxEarly Hominids & Australopithecus SubscribeWhat is a too.docx
Early Hominids & Australopithecus SubscribeWhat is a too.docxjoellemurphey
 
Early scholarly and philosophical manuscripts were in Greek. However.docx
Early scholarly and philosophical manuscripts were in Greek. However.docxEarly scholarly and philosophical manuscripts were in Greek. However.docx
Early scholarly and philosophical manuscripts were in Greek. However.docxjoellemurphey
 
Early Learning & Developmental Guidelines July 2017 1 .docx
Early Learning & Developmental Guidelines July 2017 1 .docxEarly Learning & Developmental Guidelines July 2017 1 .docx
Early Learning & Developmental Guidelines July 2017 1 .docxjoellemurphey
 
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docx
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docxEarly Innovations and Their Impact Today Wilbur and Orville Wrig.docx
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docxjoellemurphey
 
Early childhood professionals have an essential role in creating.docx
Early childhood professionals have an essential role in creating.docxEarly childhood professionals have an essential role in creating.docx
Early childhood professionals have an essential role in creating.docxjoellemurphey
 
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docxEarly Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docxjoellemurphey
 
Early Civilizations MatrixUsing your readings and outside sour.docx
Early Civilizations MatrixUsing your readings and outside sour.docxEarly Civilizations MatrixUsing your readings and outside sour.docx
Early Civilizations MatrixUsing your readings and outside sour.docxjoellemurphey
 
Early childhood teachers need to stay connected to what is occurring.docx
Early childhood teachers need to stay connected to what is occurring.docxEarly childhood teachers need to stay connected to what is occurring.docx
Early childhood teachers need to stay connected to what is occurring.docxjoellemurphey
 
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docxEarly and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docxjoellemurphey
 
Earlier this semester, you participated in a class discussion about .docx
Earlier this semester, you participated in a class discussion about .docxEarlier this semester, you participated in a class discussion about .docx
Earlier this semester, you participated in a class discussion about .docxjoellemurphey
 
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docxEAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docxjoellemurphey
 
Earlean, please write these notes for me. October 01, 20181. My .docx
Earlean, please write these notes for me. October 01, 20181. My .docxEarlean, please write these notes for me. October 01, 20181. My .docx
Earlean, please write these notes for me. October 01, 20181. My .docxjoellemurphey
 
eam Assignment 4 Teaming Across Distance and Culture..docx
eam Assignment 4 Teaming Across Distance and Culture..docxeam Assignment 4 Teaming Across Distance and Culture..docx
eam Assignment 4 Teaming Across Distance and Culture..docxjoellemurphey
 
ead the following articleMother Tongue Maintenance Among North .docx
ead the following articleMother Tongue Maintenance Among North .docxead the following articleMother Tongue Maintenance Among North .docx
ead the following articleMother Tongue Maintenance Among North .docxjoellemurphey
 
eActivityGo to the United States Equal Employment Oppo.docx
eActivityGo to the United States Equal Employment Oppo.docxeActivityGo to the United States Equal Employment Oppo.docx
eActivityGo to the United States Equal Employment Oppo.docxjoellemurphey
 
Each year on or around June 15, communities and municipalities aroun.docx
Each year on or around June 15, communities and municipalities aroun.docxEach year on or around June 15, communities and municipalities aroun.docx
Each year on or around June 15, communities and municipalities aroun.docxjoellemurphey
 

More from joellemurphey (20)

Eastern European countries appear to have become dependent on Ru.docx
Eastern European countries appear to have become dependent on Ru.docxEastern European countries appear to have become dependent on Ru.docx
Eastern European countries appear to have become dependent on Ru.docx
 
EAS 209 Second Response Paper Topic Assignment Due .docx
EAS 209 Second Response Paper Topic Assignment Due .docxEAS 209 Second Response Paper Topic Assignment Due .docx
EAS 209 Second Response Paper Topic Assignment Due .docx
 
Earth Science LabIn what order do materials settle in waterSo t.docx
Earth Science LabIn what order do materials settle in waterSo t.docxEarth Science LabIn what order do materials settle in waterSo t.docx
Earth Science LabIn what order do materials settle in waterSo t.docx
 
EarlyIntervention Strategies Paper (15 points)The pu.docx
EarlyIntervention Strategies Paper (15 points)The pu.docxEarlyIntervention Strategies Paper (15 points)The pu.docx
EarlyIntervention Strategies Paper (15 points)The pu.docx
 
Early Hominids & Australopithecus SubscribeWhat is a too.docx
Early Hominids & Australopithecus SubscribeWhat is a too.docxEarly Hominids & Australopithecus SubscribeWhat is a too.docx
Early Hominids & Australopithecus SubscribeWhat is a too.docx
 
Early scholarly and philosophical manuscripts were in Greek. However.docx
Early scholarly and philosophical manuscripts were in Greek. However.docxEarly scholarly and philosophical manuscripts were in Greek. However.docx
Early scholarly and philosophical manuscripts were in Greek. However.docx
 
Early Learning & Developmental Guidelines July 2017 1 .docx
Early Learning & Developmental Guidelines July 2017 1 .docxEarly Learning & Developmental Guidelines July 2017 1 .docx
Early Learning & Developmental Guidelines July 2017 1 .docx
 
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docx
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docxEarly Innovations and Their Impact Today Wilbur and Orville Wrig.docx
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docx
 
Early childhood professionals have an essential role in creating.docx
Early childhood professionals have an essential role in creating.docxEarly childhood professionals have an essential role in creating.docx
Early childhood professionals have an essential role in creating.docx
 
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docxEarly Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
 
Early Civilizations MatrixUsing your readings and outside sour.docx
Early Civilizations MatrixUsing your readings and outside sour.docxEarly Civilizations MatrixUsing your readings and outside sour.docx
Early Civilizations MatrixUsing your readings and outside sour.docx
 
Early childhood teachers need to stay connected to what is occurring.docx
Early childhood teachers need to stay connected to what is occurring.docxEarly childhood teachers need to stay connected to what is occurring.docx
Early childhood teachers need to stay connected to what is occurring.docx
 
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docxEarly and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
 
Earlier this semester, you participated in a class discussion about .docx
Earlier this semester, you participated in a class discussion about .docxEarlier this semester, you participated in a class discussion about .docx
Earlier this semester, you participated in a class discussion about .docx
 
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docxEAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
 
Earlean, please write these notes for me. October 01, 20181. My .docx
Earlean, please write these notes for me. October 01, 20181. My .docxEarlean, please write these notes for me. October 01, 20181. My .docx
Earlean, please write these notes for me. October 01, 20181. My .docx
 
eam Assignment 4 Teaming Across Distance and Culture..docx
eam Assignment 4 Teaming Across Distance and Culture..docxeam Assignment 4 Teaming Across Distance and Culture..docx
eam Assignment 4 Teaming Across Distance and Culture..docx
 
ead the following articleMother Tongue Maintenance Among North .docx
ead the following articleMother Tongue Maintenance Among North .docxead the following articleMother Tongue Maintenance Among North .docx
ead the following articleMother Tongue Maintenance Among North .docx
 
eActivityGo to the United States Equal Employment Oppo.docx
eActivityGo to the United States Equal Employment Oppo.docxeActivityGo to the United States Equal Employment Oppo.docx
eActivityGo to the United States Equal Employment Oppo.docx
 
Each year on or around June 15, communities and municipalities aroun.docx
Each year on or around June 15, communities and municipalities aroun.docxEach year on or around June 15, communities and municipalities aroun.docx
Each year on or around June 15, communities and municipalities aroun.docx
 

Recently uploaded

UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45MysoreMuleSoftMeetup
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the lifeNitinDeodare
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...Nguyen Thanh Tu Collection
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Denish Jangid
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatmentsaipooja36
 

Recently uploaded (20)

UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 

Rubric Name Case Study #3 RubricCriteriaExcel.docx

  • 1. Rubric Name: Case Study #3 Rubric Criteria Excellent Outstanding Acceptable Needs Improvement Needs Significant Improvement Missing or Unacceptable Introduction or Overview for the Case Study 20 points Provided an excellent introduction which included a well- reasoned explanation as to why “cybersecurity” is considered an industry but does not have a unique NAICS code. The overview appropriately used information from 3 or more authoritative sources. 18 points Provided an outstanding introduction which included a well- reasoned explanation as to why “cybersecurity” is considered an industry but does not have a unique NAICS code. Explained the importance of standardized industry classification codes (who uses them and why).The overview appropriately used information from 3 or more authoritative sources. 16 points
  • 2. Provided an introduction which included an explanation as to why “cybersecurity” is considered an industry but does not have a unique NAICS code. Explained the importance of standardized industry classifications. The overview appropriately used information from 2 or more authoritative sources. 14 points Provided an overview but the section lacked important details about the case. Information from authoritative sources was cited and used in the overview. 10 points Attempted to provide an introduction to the case study but this section lacked detail and/or was not well supported by information drawn from authoritative sources.OR, the Case Study was posted late for discussion (mandatory 10 point deduction). 0 points The introduction and/or overview sections of the paper were off topic.OR, the Case Study was not posted for discussion or was posted more than two days late (mandatory 20 point deduction). NAICS Codes and Industry Classification (What, Why, Who uses them) 10 points Introduction included an excellent explanation of the importance of standardized industry classification codes including 3 or more examples of who uses NAICS codes and why. Appropriately used information from 3 or more authoritative sources. 8.5 points Introduction included an outstanding explanation of the importance of standardized industry classification codes including 2 or more examples of who uses NAICS codes and
  • 3. why. Appropriately used information from 2 or more authoritative sources. 7 points Introduction included an explanation of the importance of standardized industry classification codes including at least one example of who uses NAICS codes and why. Appropriately used information from authoritative sources. 6 points Introduction mentioned the importance of standardized industry classification codes and gave at least one example of who uses NAICS codes and why. 4 points Attempted to provide information about NAICS codes but the discussion lacked detail and/or was not well supported by information drawn from authoritative sources. 0 points This section was missing, off topic, or failed to provide information about NAICS codes. Identified and Explained Industry Codes used by Cybersecurity Companies 20 points Provided an excellent analysis and discussion of one or more industry codes which could be used by the cybersecurity company & product as listed in the assignment. Included a comparison between the company’s business activities and the industry characteristics for the four classification families listed in this assignment (prefixes 334, 44, 51, & 54). Appropriately used information from 3 or more authoritative sources. 18 points Provided an outstanding analysis and discussion of one or more
  • 4. industry codes which could be used by the cybersecurity company & product as listed in the assignment. Included a comparison between the company’s business activities and the industry characteristics for the four classification families listed in this assignment (prefixes 334, 44, 51, & 54). Appropriately used information from 2 or more authoritative sources. 16 points Provided a discussion of one or more industry codes which could be used by the cybersecurity company & product as listed in the assignment. Compared the company’s business activities and the industry characteristics for at least 2 classification families listed in this assignment (prefixes 334, 44, 51, & 54). Appropriately used information from authoritative sources. 14 points Provided a discussion of one or more industry codes which could be used by the cybersecurity company & product as listed in the assignment. Compared the company’s business activities and the industry characteristics to NAICS classifications. Appropriately used information from authoritative sources. 9 points Provided a discussion of NAICS industry codes as used by cybersecurity companies. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources. 0 points This section was off topic or failed to provide information about cybersecurity related NAICS codes. Recommendation for “Best Fit” for a NAICS Code for a Cybersecurity Company 20 points Provided an excellent “best fit” recommendation for a single
  • 5. NAICS code to be used by the target cybersecurity company (a) on its website, (b) in its business directory listings, and (c) in financial reports. Justification included discussion of the company’s cybersecurity product as part of the rationale for the selected NAICS code. Appropriately used information from 3 or more authoritative sources. 18 points Provided an outstanding “best fit” recommendation for a single NAICS code to be used by the target cybersecurity company (a) on its website, (b) in its business directory listings, and (c) in financial reports.Justification included discussion of the company’s cybersecurity product as part of the rationale for the selected NAICS code. Appropriately used information from 2 or more authoritative sources. 16 points Provided a “best fit” recommendation for a single NAICS code to be used by the target cybersecurity company(a) on its website, (b) in its business directory listings, and (c) in financial reports.Justification included discussion of the company’s cybersecurity product as part of the rationale for the selected NAICS code. Appropriately used information from authoritative sources. 14 points Recommended a NAICS code to be used by the target cybersecurity company. Discussion included mention of the company’s cybersecurity product. Appropriately used information from authoritative sources. 9 points Identified an appropriate NAICS code but the discussion lacked detail and/or was not supported by information from authoritative sources. 0 points
  • 6. Did not address selection of an appropriate NAICS code. Addressed security issues using standard cybersecurity terminology 5 points Demonstrated excellence in the integration of standard cybersecurity terminology into the case study. 4 points Provided an outstanding integration of standard cybersecurity terminology into the case study. 3 points Integrated standard cybersecurity terminology into the into the case study 2 points Used standard cybersecurity terminology but this usage was not well integrated with the discussion. 1 point Misused standard cybersecurity terminology. 0 points Did not integrate standard cybersecurity terminology into the discussion. APA Formatting for Citations and Reference List 5 points Work contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource. 4 points
  • 7. Work contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries. 3 points Work contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in- text citations and/or reference list entries. 2 points Work has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for in-text citations and/or reference list entries. 1 point Work attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6th ed.). 0 points Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper. Professionalism Part I: Organization & Appearance 5 points Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type. 4 points Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well
  • 8. organized and appropriately uses color, fonts, and section headings (per the assignment’s directions). 3 points Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved. 2 points Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement. 1 point Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance. 0 points Submitted work is poorly organized and formatted. Writing and presentation are lacking in professional style and appearance. Work does not reflect college level writing skills. Professionalism Part II: Execution 15 points No formatting, grammar, spelling, or punctuation errors. 14 points Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance. 13 points Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work.
  • 9. 11 points Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance. 4 points Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage. 0 points Submitted work is poorly executed OR does not reflect college level work. Overall Score Excellent 90 or more Outstanding 80 or more Acceptable 70 or more Needs Improvement 56 or more Needs Significant Improvement 36 or more Missing or Unacceptable 0 or more
  • 10. Assignment Instructions 2_5 You are health information management professional who has been asked to brief a medical organization’s executive team on the topic of electronic health records (EHR). Your brief should provide the executive team information to address the following topics: 1. Comparison of EHRs to paper records 2. EHR content 3. Advantages 4. Disadvantages 5. Privacy and security considerations 6. Functionality Written brief in APA format · Minimum 3-4 pages (excluding cover page and reference page) · Include a minimum of (2) scholarly references (not Wikipedia, etc.) · Paper should be in proper APA format · Adhere to the Graduate Level Writing Rubric Case Study #3: Is there a cybersecurity industry?Case Scenario: You recently joined a small start-up company that has developed a suite of cybersecurity products that integrate network sensors (hardware) with big data analytics (software) to provide advanced threat detection at an affordable price. As is often the case with small companies, you are expected to lend your hand to whatever task needs doing. Yesterday, you were helping to write the online product brochures and other marketing materials. Today, your tasks include adding the North American Industry Classification System (NAICS) code(s) for
  • 11. the “cybersecurity” industry to the company’s Website. As you delve into the matter, you quickly discover that there is no NAICS code for a “cybersecurity” industry (see http://www.census.gov/cgi-bin/sssd/naics/naicsrch?chart=2012). After additional research, you learned that the NAICS codes for your company’s direct competitors (companies selling similar cybersecurity products) included the following: 1. Computer and Electronic Product Manufacturing (NAICS prefix “334”) 0. Computer Terminal and Other Computer Peripheral Equipment Manufacturing 0. Computer Storage Device Manufacturing 1. Information Industry (NAICS prefix “51”) 1. Custom Computer Programming Services 1. Software Publishers 1. Professional, Scientific, and Technical Services Industry (NAICS prefix “54”) 2. Computer Systems Design Services 2. Electronic Stores 1. Retail Trade (NAICS prefix “44”) 3. Electronic Stores You also learned that the NAICS system was designed to be production or product oriented and that provisions exist for adding new or emerging industries to the NAICS classification system (see NAICS Update Process Fact Sheet, p. 4, section “The Four Principles of NAICS” https://www.census.gov/eos/ www/naics/reference_files_tools/ NAICS_Update_Process_Fact_Sheet.pdf ) Your team leader has asked you to write a short report detailing your findings andrecommending which industry your company should declare as its primary industry (out of the four listed above). Your report should include a justification for your selection. Your team leader has also asked you to provide a well-reasoned explanation as to why “cybersecurity” is considered an industry by many reporters and market analysts but is not listed as a unique industry under NAICS.
  • 12. NAICS codes are incorporated into many business directory listings, independent financial reports / market analyses, and credit reports. Many large organizations, especially government agencies, require that a company have both a Dun & Bradstreet Data Universal Numbering System (D-U-N-S) number and one or more NAICS codes assigned to the company prior to being listed as an approved supplier. Research: 1. Read / Review the Week 5 readings. Pay close attention to those readings which provide evidence that “cybersecurity” is, in fact, an industry. 1. Research additional information about industry classifications, why they were developed, and how they are used. Here are some suggested sources: 1. http://www.naics.com/history-naics-code/ 1. http://www.naics.com/naicswp2014/wp- content/uploads/2014/10/How_to_Use_NAICS_SIC_Codes_for_ Marketing_NAICSAssociation.pdf 1. http://www.bls.gov/bls/naics.htm 1. https://www.census.gov/eos/www/naics/reference_files_tools/N AICS_Update_Process_Fact_Sheet.pdf (See page 4: “The Four Principles of NAICS” Principles #1 & #2) 1. Find three or more additional sources which provide evidence that “cybersecurity” is or is not a distinct industry.Write: Using standard terminology (see case study #1), write a two to three page summary of your research. At a minimum, your summary must include the following: 1. Introduction which includes a well-reasoned explanation as to why “cybersecurity” is considered an industry by many reporters and market analysts but is not listed as a unique industry under NAICS. Your introduction should include an explanation of the importance of standardized industry classification codes (who uses them and why). 1. Analysis and discussion of one or more industry codes which could be used by your cybersecurity company (based upon the product listed in this assignment). The discussion should
  • 13. include a comparison between your company’s business activities and the industry characteristics for the four classification families listed in this assignment (prefixes 334, 44, 51, & 54). 1. Recommendation for the best fit for a single NAICS code to be used by your company on its website and included in its business directory listings and financial reports.Submit For Grading & Discussion 1. Submit your case study in MS Word format (.docx or .doc file) using the Case Study #3 Assignment in your assignment folder. (Attach the file.) 1. Post your case study for discussion with your classmates. First, create a new topic in the Case Study #3 Discussion Forum. Then, paste the contents of your Case Study #3 document directly into that message. (Do not attach the file.) 1. Last posting or no posting for discussion will be penalized heavily so it is in your best interests to post your case study before the assigned due date.Formatting Instructions 1. Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources. 1. Use the “Paste from Word” paste option in the LEO editor when posting your Case Study to the Case Study #3 Discussion forum.Additional Information 1. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 20% of the assignment grade. 1. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style
  • 14. requirements. Failure to credit your sources will result in penalties as provided for under the university’s Academic Integrity policy.