SlideShare a Scribd company logo
1 of 16
Technology Review #1: Emerging Application of Technology
(Consumer or Business).
This paper is the first of two Technology Reviews that you will
research and write for this course. For this paper, you must
choose an emerging application of technology which is suitable
for future use in a consumer-oriented product or service (i.e. a
new product for personal or home use) or a business-oriented
product or service.
The technology review papers will be used to prepare your
technology selection paper for the Analysis of Alternatives
exercise later in the course. Your audience for these papers is a
group of senior executives who will be meeting to decide which
emerging technologies or emerging applications of technologies
should be selected for one or more security-focused, Internal
Research & Development projects during the next budget cycle.
Each of these executives is responsible for a business area that
will (a) develop products which incorporate the emerging
technologies or (b) depend upon such products to support their
organization’s operations.
For this paper, you will perform the first three stages of the
technology scan:
Technology scanning is an evaluation model that is used when
you need to develop a list of candidate technology solutions. A
technology scan can also be used when you need to obtain
information about the latest advancements in security products
and technologies.
The technology scan has four stages: scoping, searching,
evaluating, and recommending.
SCOPING
The scoping phase of this technology scan has already been
performed. Your scope is stages 3, 4, and early stage 5 as shown
in the figure below.
Image
Source:http://web.archive.org/web/20160501225520/http://www
.atp.nist.gov/eao/gcr02-841/chapt2.htm
SEARCHING
To begin, select a technology which is in the early-stage
technology development, product development or early
production/marketing stages of the product lifecycle (Stages 3,
4, or early stage 5 in the figure above). You may use news
articles, press releases, and government or company Web sites
to help you find an appropriate technology. (Remember to cite
these sources in your paper.)
Technologies which are currently in these stages include:
· Big Data Analytics
· Wearable Computing Devices (choose 1 specific device)
· Physical Unclonable Functions (PUFs) (devices & electrical
circuits)
· Graphene
· Dielectric thin films
· Magneto-electric magnetic sensors
· Nano imprinting
· Nano machines
· Neuromorphic computer chips
You are encouraged to look for and investigate additional
appropriate technologies before deciding upon your technology
choice for this assignment.
If you decide to research a technology that is not on the
suggested technologies list (see above), you must first request
and receive your instructor’s permission. Your instructor may
require that you do preliminary library searches for research
papers and technical papers to prove that you can find a
sufficient number of resources to complete the assignment.
Survey of the Professional Literature
During your survey of the professional literature, you will
identify 10 research papers or technical papers which provide
technical information about your selected technology (see
selection requirements for each paper). These papers must be
dated between 2012 - 2017 (five year window).
Allowable sources for research papers / technical papers are: (a)
professional journals, (b) conference proceedings, (c)
dissertations or theses, and (d) technical magazines (published
by either the ACM or IEEE). If an article from one of the above
sources does not have a reference list containing at least 3
references you may use it in your review paper but it WILL
NOT COUNT towards the “10 research or technical papers”
requirement.
The requirement to “survey the professional literature” must be
met by using research papers/publications and technical papers
which are available from the following UMUC online library
databases:
· ACM Digital Library
http://ezproxy.umuc.edu/login?url=http://www.acm.org/dl
· Dissertations & Theses (Pro Quest)
http://ezproxy.umuc.edu/login?url=http://search.proquest.com/p
qdtft/advanced?accountid=14580
· IEEE Computer Society Digital Library
http://ezproxy.umuc.edu/login?url=http://www.computer.org/por
tal/web/csdl/home
· Science Direct
http://ezproxy.umuc.edu/login?url=http://www.sciencedirect.co
m/science/search
EVALUATING
In this stage, you will evaluate and report upon the information
found during your survey of the professional literature. Read
the abstract, introduction section, and closing sections for each
of the sources identified in your survey of the professional
literature. From this information, develop a summary of the
technology that includes: (a) a description of technology and (b)
planned uses of the technology (products, services, etc.).
IMPORTANT: your technology review must incorporate
information from each of your 10 “papers” from the
professional literature.
Note: You may use other sources in addition to the papers
which comprise your survey of the professional literature.
Next, brainstorm the security implications of this technology (if
these are not specifically discussed by your sources). You
should consider use of the technology to improve cybersecurity
and uses which will negatively impact the security posture of an
organization or the security of individual consumers or users of
the product. It is very important that you consider BOTH SIDES
OF THIS ISSUE.
Note: Remember that the security posture of a system or product
is framed in terms of risk, threats, vulnerabilities, etc.
Improvements to the security posture (positive security
implications) will result in reduced risk, increased resistance to
threats or attacks, and decreased vulnerability. Negative
impacts on the security posture will result in increased risk,
decreased resistance to threats / attacks, and increased
vulnerability (weakness).
Write down your thoughts and ideas about the security
implications of this technology using (a) the Five Pillars of
Information Assurance and/or (b) the Five Pillars of
Information Security. For your paper, you do not need to
include all ten “pillars” but you should address a minimum of
three. If you are targeting an “A” on your paper, address at least
five of the pillars.
· Five Pillars of Information Assurance: confidentiality,
integrity, availability, authentication, and non-repudiation.
These are defined in CNSSI-4009 and discussed quite nicely by
K. S. Wilson in Conflicts Among the Pillars of Information
Assurance
http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/
login.aspx?direct=true&db=edswsc&AN=000322695100011&sit
e=eds-live&scope=site
· Five Pillars of Information Security: protection, detection,
reaction, documentation, prevention. If you are not familiar
with the origins of the five pillars of Information Security, read
a copy of the original article by Amir Ameri at
http://cf.rims.org/Magazine/PrintTemplate.cfm?AID=2409
You should provide specific examples using characteristics
and/or applications of the technology, e.g. an emerging
technology which can be used to manufacture cell phone cases
which are less breakable may be chosen to replace current
materials because the new material will decrease the risk of
breakage. Decreased risk of breakage will decrease the
probability of loss of availability caused by a broken case.
Decreasing the probability of a negative event will decrease the
risk associated with that event.
WRITING YOUR EVALUATION
Your paper must provide the reader with an overview of the
technology followed by information about the potential security
risks and/or benefits of its use (the security posture ).You
MUST use information paraphrased from the papers found
during your Survey of the Professional Literature (with
appropriate in-text citations).
Your Technology Review papers should be at least three pages
in length but no more than five pages (excluding the title page
and references page).
Your papers must comply with the formatting guidance provided
by your instructor. All papers in this course must also comply
with APA Style for references and citations. See the resources
posted under Content > Course Documents > APA Resources.
You are expected to write grammatically correct English in
every assignment that you submit for grading. Do not turn in
any work without (a) using spell check, (b) using grammar
check, (c) verifying that your punctuation is correct and (d)
reviewing your work for correct word usage and correctly
structured sentences and paragraphs. Together, these items
constitute the professionalism category in the assignment
grading rubrics (worth 20% of the assignment’s grade).
Grading Rubric: Consult the grading rubric for this assignment
for specific information about content and formatting
requirements.
Criteria
Excellent
Outstanding
Acceptable
Needs Improvement
Needs Significant Improvement
Missing or Unacceptable
Identified an appropriate technology and provided an overview
of the technology
20 points
Provided an excellent overview of an emerging technology or
emerging application of technology. The overview appropriately
used information from the survey of the professional literature
in addition to information from other sources, i.e. news articles,
industry or government white papers and authoritative Web
sites.
17 points
Provided an outstanding overview of an emerging technology or
emerging application of technology. The overview appropriately
used information from the survey of the professional literature
in addition to information from other sources, i.e. news articles,
industry or government white papers and authoritative Web
sites.
15 points
Provided an overview of an emerging technology or emerging
application of technology. The overview provided some details
about how the technology is used. The overview drew some
information from the survey of the professional literature in
addition to information from other sources, i.e. news articles,
industry or government white papers or from authoritative Web
sites.
12 points
Identified an appropriate technology. Provided an overview or
introduction that was lacking in detail. Information from the
survey of the professional literature was used in the overview.
9 points
Identified an appropriate technology but the overview of that
technology lacked detail and/or was not well supported by
information drawn from the survey of the professional
literature.
0 points
The introduction and/or overview sections of the paper were off
topic or failed to provide an overview of the emerging
application of technology.
Surveyed Professional Literature (10 or more papers identified
and cited)
20 points
Identified 10 or more papers from the professional literature.
All papers used in the survey were from the four approved
sources (ACM Digital Library, IEEE Computer Society Digital
Library, Pro Quest Dissertations and Theses, and Science
Direct). Appropriately used 10 or more papers from the survey
of the literature throughout the discussion (as demonstrated by
correctly formatted and placed citations).
17 points
Survey of the literature was based upon eight papers from one
or more of the four approved sources (ACM Digital Library,
IEEE Computer Society Digital Library, Pro Quest Dissertations
and Theses, and Science Direct). Appropriately used at least 8
papers from the survey of the literature throughout the
discussion of the technology (as demonstrated by correctly
formatted and placed citations).
15 points
Survey of the literature was based upon six or seven papers
from one or more of the four approved sources (ACM Digital
Library, IEEE Computer Society Digital Library, Pro Quest
Dissertations and Theses, and Science Direct). Appropriately
used at least 6 papers from the survey of the literature
throughout the discussion of the technology (as demonstrated by
correctly formatted and placed citations).
12 points
Survey of the literature was based upon four or five papers from
one or more of the four approved sources (ACM Digital Library,
IEEE Computer Society Digital Library, Pro Quest Dissertations
and Theses, and Science Direct). Appropriately used at least 4
papers from the survey of the literature throughout the
discussion of the technology (as demonstrated by correctly
formatted and placed citations).
9 points
Survey of the literature was based upon three or more papers
from one or more of the four approved sources (ACM Digital
Library, IEEE Computer Society Digital Library, Pro Quest
Dissertations and Theses, and Science Direct). Appropriately
used at least 3 papers from the survey of the literature
throughout the discussion of the technology (as demonstrated by
correctly formatted and placed citations).
0 points
Survey of the literature was based upon two or fewer papers
from one or more of the four approved sources (ACM Digital
Library, IEEE Computer Society Digital Library, Pro Quest
Dissertations and Theses, and Science Direct). Did not
appropriately use papers from the survey of the literature
throughout the discussion of the technology (as demonstrated by
paraphrasing and correctly formatted and placed citations).
Reported on how tech could be used to improve or support
cybersecurity
15 points
Provided an excellent discussion of how the emerging
technology or emerging application of technology could be used
to improve or support cybersecurity by reducing risk, increasing
resistance to threats/attacks, decreasing vulnerabilities, etc.
Discussion provided five or more specific examples of how
these improvements would impact cybersecurity for
information, information systems, and/or networks. The
discussion appropriately used five or more "pillars" and was
based upon information from the survey of the professional
literature in addition to information from other sources, i.e.
news articles, industry or government white papers and
authoritative Web sites.
13 points
Provided an outstanding discussion of how the emerging
technology or emerging application of technology could be used
to improve or support cybersecurity by reducing risk, increasing
resistance to threats/attacks, decreasing vulnerabilities, etc.
Discussion provided four or more specific examples of how
these improvements would impact cybersecurity for
information, information systems, and/or networks. The
discussion appropriately used four or more "pillars" and was
based upon information from the survey of the professional
literature in addition to information from other sources, i.e.
news articles, industry or government white papers and
authoritative Web sites.
11 points
Provided a discussion of how the emerging technology or
emerging application of technology could be used to improve or
support cybersecurity for information, information systems,
and/or networks. Discussion provided three or more appropriate
examples, and used three or more "pillars." Information from
the survey of the professional literature was used. Additional
information from other sources, i.e. news articles, industry or
government white papers or from authoritative Web sites, may
also be included.
8 points
Discussion provided few details in regards to how the emerging
technology or emerging application of technology could be used
to improve or support cybersecurity for information,
information systems, and/or networks. OR, discussion provided
few details in regards to support or improvements for
cybersecurity. Information from the survey of the professional
literature was used in the discussion.
4 points
Discussed cybersecurity benefits from the use of the emerging
technology but the discussion lacked detail and/or was not well
supported by information drawn from authoritative sources.
0 points
The discussion of cybersecurity improvements / support from
use of the emerging technology was missing or was not relevant
to the selected technology.
Reported on how tech could be used by attackers, criminals,
terrorists, etc. (OR, discussed specific vulnerabilities to attack
which are present in this technology)
15 points
Provided an excellent discussion of how the emerging
technology or emerging application of technology could be used
by attackers to further their own goals and/or how specific
anticipated or known vulnerabilities could be exploited.
Discussion fully described how the technology could by
attackers against information, information systems, and/or
networks. The discussion appropriately used information from
the survey of the professional literature in addition to
information from other sources, i.e. news articles, industry or
government white papers and authoritative Web sites.
13 points
Provided an outstanding discussion of how the emerging
technology or emerging application of technology could be used
by attackers to further their own goals and/or how specific
anticipated or known vulnerabilities could be exploited.
Described how the technology could by attackers against
information, information systems, and/or networks. The
discussion appropriately used information from the survey of
the professional literature in addition to information from other
sources, i.e. news articles, industry or government white papers
and authoritative Web sites.
11 points
Provided a discussion of how the emerging technology or
emerging application of technology could be used by attackers
to further their own goals and/or how specific anticipated or
known vulnerabilities could be exploited. Described how the
technology could by attackers against information, information
systems, and/or networks. The discussion drew some
information from the survey of the professional literature in
addition to information from other sources, i.e. news articles,
industry or government white papers or from authoritative Web
sites.
8 points
Discussion provided few details in regards to how the emerging
technology or emerging application of technology could be used
by attackers against information, information systems, and/or
networks. Provided few details regarding known or suspected
(anticipated) vulnerabilities in the technology. Information from
the survey of the professional literature was used in the
discussion.
4 points
Discussed attacks and/or reported on how the technology could
be used against defenders but the discussion lacked detail
and/or was not well supported by information drawn from
authoritative sources.
0 points
Did not report on how the technology could be used by
attackers, criminals, terrorists, etc. Did not discuss specific
vulnerabilities to attack which are present or anticipated in the
identified technology.
Addressed security issues using standard terms (e.g.5 Pillars IA,
5 Pillars Information Security)
10 points
Demonstrated excellence in the use of standard cybersecurity
terminology to support discussion of the technology.
Appropriately used terminology from five or more pillars of
IA/IS.
8 points
Discussion showed an outstanding understanding and
integration of standard cybersecurity terminology to support
discussion of the technology. Appropriately used terminology
from five or more pillars of IA/IS.
7 points
Correctly used standard cybersecurity terminology to support
discussion of the technology. Appropriately used terminology
from five or more pillars of IA/IS.
6 points
Correctly used standard cybersecurity terminology to support
discussion of the technology. Appropriately used terminology
from three or more pillars of IA/IS.
4 points
Used some standard cybersecurity terminology to support
discussion of the technology but the discussion was not well
supported by information drawn from authoritative sources.
0 points
Did not integrate standard cybersecurity terminology into the
discussion OR misused or incorrectly defined standard terms
from the pillars of IA/IS.
Professionalism Part I: APA Formatting for Citations and
Reference List
5 points
Work contains a reference list containing entries for all cited
resources. Reference list entries and in-text citations are
correctly formatted using the appropriate APA style for each
type of resource.
4 points
Work contains a reference list containing entries for all cited
resources. One or two minor errors in APA format for in-text
citations and/or reference list entries.
3 points
Work contains a reference list containing entries for all cited
resources. No more than 3 minor errors in APA format for in-
text citations and/or reference list entries
2 points
Work has no more than three paragraphs with omissions of
citations crediting sources for facts and information. Work
contains a reference list containing entries for cited resources.
Work contains no more than 5 minor errors in APA format for
in-text citations and/or reference list entries.
1 point
Work attempts to credit sources but demonstrates a fundamental
failure to understand and apply the APA formatting standard as
defined in the Publication Manual of the American
Psychological Association (6th ed.).
0 points
Reference list is missing. Work demonstrates an overall failure
to incorporate and/or credit authoritative sources for
information used in the paper.
Professionalism Part II: Organization & Appearance
5 points
Submitted work shows outstanding organization and the use of
color, fonts, titles, headings and sub-headings, etc. is
appropriate to the assignment type.
4 points
Submitted work has minor style or formatting flaws but still
presents a professional appearance. Submitted work is well
organized and appropriately uses color, fonts, and section
headings (per the assignment’s directions).
3 points
Organization and/or appearance of submitted work could be
improved through better use of fonts, color, titles, headings, etc.
OR Submitted work has multiple style or formatting errors.
Professional appearance could be improved.
2 points
Submitted work has multiple style or formatting errors.
Organization and professional appearance need substantial
improvement.
1 point
Submitted work meets minimum requirements but has major
style and formatting errors. Work is disorganized and needs to
be rewritten for readability and professional appearance.
0 points
No work submitted.
Professionalism Part III: Execution
10 points
No formatting, grammar, spelling, or punctuation errors.
8 points
Work contains minor errors in formatting, grammar, spelling or
punctuation which do not significantly impact professional
appearance.
7 points
Errors in formatting, spelling, grammar, or punctuation which
detract from professional appearance of the submitted work.
6 points
Submitted work has numerous errors in formatting, spelling,
grammar, or punctuation. Work is unprofessional in appearance.
4 points
Submitted work is difficult to read / understand and has
significant errors in formatting, spelling, grammar, punctuation,
or word usage.
0 points
No work submitted.
Overall Score
Excellent
90 or more
Outstanding
80 or more
Acceptable
70 or more
Needs Improvement
56 or more
Needs Significant Improvement
36 or more
Missing or Unacceptable
0 or more
Copyright © 2017 by University of Maryland University
College. All rights reserved.

More Related Content

Similar to Technology Review #1 Emerging Application of Technology (Cons.docx

DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docxDISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docxelinoraudley582231
 
Analytical Research Project InstructionsINFA 630 – Intrusion.docx
Analytical Research Project InstructionsINFA 630 – Intrusion.docxAnalytical Research Project InstructionsINFA 630 – Intrusion.docx
Analytical Research Project InstructionsINFA 630 – Intrusion.docxjack60216
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comdonaldzs8
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.comDavisMurphyA97
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comPrescottLunt385
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comMcdonaldRyan79
 
CIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.comCIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.comMcdonaldRyan139
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comrobertlesew6
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comchrysanthemu49
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comBaileyabw
 
CST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comCST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comagathachristie266
 
CST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comCST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comVSNaipaul15
 
CST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comCST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comKeatonJennings104
 
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comagathachristie113
 
Cst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comCst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comDavis11a
 
CST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.comCST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.comkopiko147
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comclaric241
 
Criteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docxCriteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docxwillcoxjanay
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxrhetttrevannion
 
CIS 560 Effective Communication - tutorialrank.com
CIS 560 Effective Communication - tutorialrank.comCIS 560 Effective Communication - tutorialrank.com
CIS 560 Effective Communication - tutorialrank.comBartholomew22
 

Similar to Technology Review #1 Emerging Application of Technology (Cons.docx (20)

DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docxDISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
 
Analytical Research Project InstructionsINFA 630 – Intrusion.docx
Analytical Research Project InstructionsINFA 630 – Intrusion.docxAnalytical Research Project InstructionsINFA 630 – Intrusion.docx
Analytical Research Project InstructionsINFA 630 – Intrusion.docx
 
CST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.comCST 630 Effective Communication - snaptutorial.com
CST 630 Effective Communication - snaptutorial.com
 
CST 630 Exceptional Education - snaptutorial.com
CST 630   Exceptional Education - snaptutorial.comCST 630   Exceptional Education - snaptutorial.com
CST 630 Exceptional Education - snaptutorial.com
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.com
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.com
 
CIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.comCIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.com
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.com
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.com
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.com
 
CST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comCST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.com
 
CST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comCST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.com
 
CST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comCST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.com
 
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.com
 
Cst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.comCst 630 Believe Possibilities / snaptutorial.com
Cst 630 Believe Possibilities / snaptutorial.com
 
CST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.comCST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.com
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.com
 
Criteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docxCriteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docx
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
 
CIS 560 Effective Communication - tutorialrank.com
CIS 560 Effective Communication - tutorialrank.comCIS 560 Effective Communication - tutorialrank.com
CIS 560 Effective Communication - tutorialrank.com
 

More from ssuserf9c51d

Muslims in the Golden Age is the theme for the research project. You.docx
Muslims in the Golden Age is the theme for the research project. You.docxMuslims in the Golden Age is the theme for the research project. You.docx
Muslims in the Golden Age is the theme for the research project. You.docxssuserf9c51d
 
Multiple Sources of MediaExamine the impact of multiple sour.docx
Multiple Sources of MediaExamine the impact of multiple sour.docxMultiple Sources of MediaExamine the impact of multiple sour.docx
Multiple Sources of MediaExamine the impact of multiple sour.docxssuserf9c51d
 
Multicultural Event WrittenPlease choose and research a cult.docx
Multicultural Event WrittenPlease choose and research a cult.docxMulticultural Event WrittenPlease choose and research a cult.docx
Multicultural Event WrittenPlease choose and research a cult.docxssuserf9c51d
 
Multi-Party NegotiationFor this Essay, you will explore the co.docx
Multi-Party NegotiationFor this Essay, you will explore the co.docxMulti-Party NegotiationFor this Essay, you will explore the co.docx
Multi-Party NegotiationFor this Essay, you will explore the co.docxssuserf9c51d
 
Music has long been used by movements seeking social change.  In the.docx
Music has long been used by movements seeking social change.  In the.docxMusic has long been used by movements seeking social change.  In the.docx
Music has long been used by movements seeking social change.  In the.docxssuserf9c51d
 
MSW Advanced Clinical Concentration -Student Learning AgreementW.docx
MSW Advanced Clinical Concentration -Student Learning AgreementW.docxMSW Advanced Clinical Concentration -Student Learning AgreementW.docx
MSW Advanced Clinical Concentration -Student Learning AgreementW.docxssuserf9c51d
 
Multimedia Instructional MaterialsStaying current on technolog.docx
Multimedia Instructional MaterialsStaying current on technolog.docxMultimedia Instructional MaterialsStaying current on technolog.docx
Multimedia Instructional MaterialsStaying current on technolog.docxssuserf9c51d
 
Murray Bowen is one of the most respected family theorists in th.docx
Murray Bowen is one of the most respected family theorists in th.docxMurray Bowen is one of the most respected family theorists in th.docx
Murray Bowen is one of the most respected family theorists in th.docxssuserf9c51d
 
Mrs. Thomas is a 54, year old African American widow, mother and gra.docx
Mrs. Thomas is a 54, year old African American widow, mother and gra.docxMrs. Thomas is a 54, year old African American widow, mother and gra.docx
Mrs. Thomas is a 54, year old African American widow, mother and gra.docxssuserf9c51d
 
Multiple Source Essay, Speculating about CausesProposing a Solution.docx
Multiple Source Essay, Speculating about CausesProposing a Solution.docxMultiple Source Essay, Speculating about CausesProposing a Solution.docx
Multiple Source Essay, Speculating about CausesProposing a Solution.docxssuserf9c51d
 
Multiyear Plans Please respond to the followingDo you.docx
Multiyear Plans Please respond to the followingDo you.docxMultiyear Plans Please respond to the followingDo you.docx
Multiyear Plans Please respond to the followingDo you.docxssuserf9c51d
 
Multinational Financial ManagementDetermine key reasons wh.docx
Multinational Financial ManagementDetermine key reasons wh.docxMultinational Financial ManagementDetermine key reasons wh.docx
Multinational Financial ManagementDetermine key reasons wh.docxssuserf9c51d
 
Murder CasePreambleAn organization system administrator .docx
Murder CasePreambleAn organization system administrator .docxMurder CasePreambleAn organization system administrator .docx
Murder CasePreambleAn organization system administrator .docxssuserf9c51d
 
Multimodal Personal Narrative – Develop a multimodal document to bot.docx
Multimodal Personal Narrative – Develop a multimodal document to bot.docxMultimodal Personal Narrative – Develop a multimodal document to bot.docx
Multimodal Personal Narrative – Develop a multimodal document to bot.docxssuserf9c51d
 
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docxMultigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docxssuserf9c51d
 
Multimedia activity Business OrganizationVisit the Choose Your .docx
Multimedia activity Business OrganizationVisit the Choose Your .docxMultimedia activity Business OrganizationVisit the Choose Your .docx
Multimedia activity Business OrganizationVisit the Choose Your .docxssuserf9c51d
 
Multicultural PerspectiveToday’s classrooms are diverse and .docx
Multicultural PerspectiveToday’s classrooms are diverse and .docxMulticultural PerspectiveToday’s classrooms are diverse and .docx
Multicultural PerspectiveToday’s classrooms are diverse and .docxssuserf9c51d
 
Muhammad Ali, how did his refusal to go into the army affect his.docx
Muhammad Ali, how did his refusal to go into the army affect his.docxMuhammad Ali, how did his refusal to go into the army affect his.docx
Muhammad Ali, how did his refusal to go into the army affect his.docxssuserf9c51d
 
MS 113 Some key concepts that you need to know to navigate th.docx
MS 113 Some key concepts that you need to know to navigate th.docxMS 113 Some key concepts that you need to know to navigate th.docx
MS 113 Some key concepts that you need to know to navigate th.docxssuserf9c51d
 
Much has been made of the new Web 2.0 phenomenon, including social n.docx
Much has been made of the new Web 2.0 phenomenon, including social n.docxMuch has been made of the new Web 2.0 phenomenon, including social n.docx
Much has been made of the new Web 2.0 phenomenon, including social n.docxssuserf9c51d
 

More from ssuserf9c51d (20)

Muslims in the Golden Age is the theme for the research project. You.docx
Muslims in the Golden Age is the theme for the research project. You.docxMuslims in the Golden Age is the theme for the research project. You.docx
Muslims in the Golden Age is the theme for the research project. You.docx
 
Multiple Sources of MediaExamine the impact of multiple sour.docx
Multiple Sources of MediaExamine the impact of multiple sour.docxMultiple Sources of MediaExamine the impact of multiple sour.docx
Multiple Sources of MediaExamine the impact of multiple sour.docx
 
Multicultural Event WrittenPlease choose and research a cult.docx
Multicultural Event WrittenPlease choose and research a cult.docxMulticultural Event WrittenPlease choose and research a cult.docx
Multicultural Event WrittenPlease choose and research a cult.docx
 
Multi-Party NegotiationFor this Essay, you will explore the co.docx
Multi-Party NegotiationFor this Essay, you will explore the co.docxMulti-Party NegotiationFor this Essay, you will explore the co.docx
Multi-Party NegotiationFor this Essay, you will explore the co.docx
 
Music has long been used by movements seeking social change.  In the.docx
Music has long been used by movements seeking social change.  In the.docxMusic has long been used by movements seeking social change.  In the.docx
Music has long been used by movements seeking social change.  In the.docx
 
MSW Advanced Clinical Concentration -Student Learning AgreementW.docx
MSW Advanced Clinical Concentration -Student Learning AgreementW.docxMSW Advanced Clinical Concentration -Student Learning AgreementW.docx
MSW Advanced Clinical Concentration -Student Learning AgreementW.docx
 
Multimedia Instructional MaterialsStaying current on technolog.docx
Multimedia Instructional MaterialsStaying current on technolog.docxMultimedia Instructional MaterialsStaying current on technolog.docx
Multimedia Instructional MaterialsStaying current on technolog.docx
 
Murray Bowen is one of the most respected family theorists in th.docx
Murray Bowen is one of the most respected family theorists in th.docxMurray Bowen is one of the most respected family theorists in th.docx
Murray Bowen is one of the most respected family theorists in th.docx
 
Mrs. Thomas is a 54, year old African American widow, mother and gra.docx
Mrs. Thomas is a 54, year old African American widow, mother and gra.docxMrs. Thomas is a 54, year old African American widow, mother and gra.docx
Mrs. Thomas is a 54, year old African American widow, mother and gra.docx
 
Multiple Source Essay, Speculating about CausesProposing a Solution.docx
Multiple Source Essay, Speculating about CausesProposing a Solution.docxMultiple Source Essay, Speculating about CausesProposing a Solution.docx
Multiple Source Essay, Speculating about CausesProposing a Solution.docx
 
Multiyear Plans Please respond to the followingDo you.docx
Multiyear Plans Please respond to the followingDo you.docxMultiyear Plans Please respond to the followingDo you.docx
Multiyear Plans Please respond to the followingDo you.docx
 
Multinational Financial ManagementDetermine key reasons wh.docx
Multinational Financial ManagementDetermine key reasons wh.docxMultinational Financial ManagementDetermine key reasons wh.docx
Multinational Financial ManagementDetermine key reasons wh.docx
 
Murder CasePreambleAn organization system administrator .docx
Murder CasePreambleAn organization system administrator .docxMurder CasePreambleAn organization system administrator .docx
Murder CasePreambleAn organization system administrator .docx
 
Multimodal Personal Narrative – Develop a multimodal document to bot.docx
Multimodal Personal Narrative – Develop a multimodal document to bot.docxMultimodal Personal Narrative – Develop a multimodal document to bot.docx
Multimodal Personal Narrative – Develop a multimodal document to bot.docx
 
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docxMultigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
 
Multimedia activity Business OrganizationVisit the Choose Your .docx
Multimedia activity Business OrganizationVisit the Choose Your .docxMultimedia activity Business OrganizationVisit the Choose Your .docx
Multimedia activity Business OrganizationVisit the Choose Your .docx
 
Multicultural PerspectiveToday’s classrooms are diverse and .docx
Multicultural PerspectiveToday’s classrooms are diverse and .docxMulticultural PerspectiveToday’s classrooms are diverse and .docx
Multicultural PerspectiveToday’s classrooms are diverse and .docx
 
Muhammad Ali, how did his refusal to go into the army affect his.docx
Muhammad Ali, how did his refusal to go into the army affect his.docxMuhammad Ali, how did his refusal to go into the army affect his.docx
Muhammad Ali, how did his refusal to go into the army affect his.docx
 
MS 113 Some key concepts that you need to know to navigate th.docx
MS 113 Some key concepts that you need to know to navigate th.docxMS 113 Some key concepts that you need to know to navigate th.docx
MS 113 Some key concepts that you need to know to navigate th.docx
 
Much has been made of the new Web 2.0 phenomenon, including social n.docx
Much has been made of the new Web 2.0 phenomenon, including social n.docxMuch has been made of the new Web 2.0 phenomenon, including social n.docx
Much has been made of the new Web 2.0 phenomenon, including social n.docx
 

Recently uploaded

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

Technology Review #1 Emerging Application of Technology (Cons.docx

  • 1. Technology Review #1: Emerging Application of Technology (Consumer or Business). This paper is the first of two Technology Reviews that you will research and write for this course. For this paper, you must choose an emerging application of technology which is suitable for future use in a consumer-oriented product or service (i.e. a new product for personal or home use) or a business-oriented product or service. The technology review papers will be used to prepare your technology selection paper for the Analysis of Alternatives exercise later in the course. Your audience for these papers is a group of senior executives who will be meeting to decide which emerging technologies or emerging applications of technologies should be selected for one or more security-focused, Internal Research & Development projects during the next budget cycle. Each of these executives is responsible for a business area that will (a) develop products which incorporate the emerging technologies or (b) depend upon such products to support their organization’s operations. For this paper, you will perform the first three stages of the technology scan: Technology scanning is an evaluation model that is used when you need to develop a list of candidate technology solutions. A technology scan can also be used when you need to obtain information about the latest advancements in security products and technologies. The technology scan has four stages: scoping, searching, evaluating, and recommending. SCOPING The scoping phase of this technology scan has already been performed. Your scope is stages 3, 4, and early stage 5 as shown in the figure below.
  • 2. Image Source:http://web.archive.org/web/20160501225520/http://www .atp.nist.gov/eao/gcr02-841/chapt2.htm SEARCHING To begin, select a technology which is in the early-stage technology development, product development or early production/marketing stages of the product lifecycle (Stages 3, 4, or early stage 5 in the figure above). You may use news articles, press releases, and government or company Web sites to help you find an appropriate technology. (Remember to cite these sources in your paper.) Technologies which are currently in these stages include: · Big Data Analytics · Wearable Computing Devices (choose 1 specific device) · Physical Unclonable Functions (PUFs) (devices & electrical circuits) · Graphene · Dielectric thin films · Magneto-electric magnetic sensors · Nano imprinting · Nano machines · Neuromorphic computer chips You are encouraged to look for and investigate additional appropriate technologies before deciding upon your technology choice for this assignment. If you decide to research a technology that is not on the suggested technologies list (see above), you must first request and receive your instructor’s permission. Your instructor may require that you do preliminary library searches for research papers and technical papers to prove that you can find a sufficient number of resources to complete the assignment. Survey of the Professional Literature During your survey of the professional literature, you will identify 10 research papers or technical papers which provide technical information about your selected technology (see selection requirements for each paper). These papers must be
  • 3. dated between 2012 - 2017 (five year window). Allowable sources for research papers / technical papers are: (a) professional journals, (b) conference proceedings, (c) dissertations or theses, and (d) technical magazines (published by either the ACM or IEEE). If an article from one of the above sources does not have a reference list containing at least 3 references you may use it in your review paper but it WILL NOT COUNT towards the “10 research or technical papers” requirement. The requirement to “survey the professional literature” must be met by using research papers/publications and technical papers which are available from the following UMUC online library databases: · ACM Digital Library http://ezproxy.umuc.edu/login?url=http://www.acm.org/dl · Dissertations & Theses (Pro Quest) http://ezproxy.umuc.edu/login?url=http://search.proquest.com/p qdtft/advanced?accountid=14580 · IEEE Computer Society Digital Library http://ezproxy.umuc.edu/login?url=http://www.computer.org/por tal/web/csdl/home · Science Direct http://ezproxy.umuc.edu/login?url=http://www.sciencedirect.co m/science/search EVALUATING In this stage, you will evaluate and report upon the information found during your survey of the professional literature. Read the abstract, introduction section, and closing sections for each of the sources identified in your survey of the professional literature. From this information, develop a summary of the technology that includes: (a) a description of technology and (b) planned uses of the technology (products, services, etc.). IMPORTANT: your technology review must incorporate information from each of your 10 “papers” from the professional literature. Note: You may use other sources in addition to the papers
  • 4. which comprise your survey of the professional literature. Next, brainstorm the security implications of this technology (if these are not specifically discussed by your sources). You should consider use of the technology to improve cybersecurity and uses which will negatively impact the security posture of an organization or the security of individual consumers or users of the product. It is very important that you consider BOTH SIDES OF THIS ISSUE. Note: Remember that the security posture of a system or product is framed in terms of risk, threats, vulnerabilities, etc. Improvements to the security posture (positive security implications) will result in reduced risk, increased resistance to threats or attacks, and decreased vulnerability. Negative impacts on the security posture will result in increased risk, decreased resistance to threats / attacks, and increased vulnerability (weakness). Write down your thoughts and ideas about the security implications of this technology using (a) the Five Pillars of Information Assurance and/or (b) the Five Pillars of Information Security. For your paper, you do not need to include all ten “pillars” but you should address a minimum of three. If you are targeting an “A” on your paper, address at least five of the pillars. · Five Pillars of Information Assurance: confidentiality, integrity, availability, authentication, and non-repudiation. These are defined in CNSSI-4009 and discussed quite nicely by K. S. Wilson in Conflicts Among the Pillars of Information Assurance http://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/ login.aspx?direct=true&db=edswsc&AN=000322695100011&sit e=eds-live&scope=site · Five Pillars of Information Security: protection, detection, reaction, documentation, prevention. If you are not familiar with the origins of the five pillars of Information Security, read a copy of the original article by Amir Ameri at http://cf.rims.org/Magazine/PrintTemplate.cfm?AID=2409
  • 5. You should provide specific examples using characteristics and/or applications of the technology, e.g. an emerging technology which can be used to manufacture cell phone cases which are less breakable may be chosen to replace current materials because the new material will decrease the risk of breakage. Decreased risk of breakage will decrease the probability of loss of availability caused by a broken case. Decreasing the probability of a negative event will decrease the risk associated with that event. WRITING YOUR EVALUATION Your paper must provide the reader with an overview of the technology followed by information about the potential security risks and/or benefits of its use (the security posture ).You MUST use information paraphrased from the papers found during your Survey of the Professional Literature (with appropriate in-text citations). Your Technology Review papers should be at least three pages in length but no more than five pages (excluding the title page and references page). Your papers must comply with the formatting guidance provided by your instructor. All papers in this course must also comply with APA Style for references and citations. See the resources posted under Content > Course Documents > APA Resources. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. Together, these items constitute the professionalism category in the assignment grading rubrics (worth 20% of the assignment’s grade). Grading Rubric: Consult the grading rubric for this assignment for specific information about content and formatting requirements.
  • 6. Criteria Excellent Outstanding Acceptable Needs Improvement Needs Significant Improvement Missing or Unacceptable Identified an appropriate technology and provided an overview of the technology 20 points Provided an excellent overview of an emerging technology or emerging application of technology. The overview appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. 17 points Provided an outstanding overview of an emerging technology or emerging application of technology. The overview appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. 15 points Provided an overview of an emerging technology or emerging application of technology. The overview provided some details about how the technology is used. The overview drew some information from the survey of the professional literature in addition to information from other sources, i.e. news articles,
  • 7. industry or government white papers or from authoritative Web sites. 12 points Identified an appropriate technology. Provided an overview or introduction that was lacking in detail. Information from the survey of the professional literature was used in the overview. 9 points Identified an appropriate technology but the overview of that technology lacked detail and/or was not well supported by information drawn from the survey of the professional literature. 0 points The introduction and/or overview sections of the paper were off topic or failed to provide an overview of the emerging application of technology. Surveyed Professional Literature (10 or more papers identified and cited) 20 points Identified 10 or more papers from the professional literature. All papers used in the survey were from the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used 10 or more papers from the survey of the literature throughout the discussion (as demonstrated by correctly formatted and placed citations). 17 points Survey of the literature was based upon eight papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 8 papers from the survey of the literature throughout the
  • 8. discussion of the technology (as demonstrated by correctly formatted and placed citations). 15 points Survey of the literature was based upon six or seven papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 6 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by correctly formatted and placed citations). 12 points Survey of the literature was based upon four or five papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 4 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by correctly formatted and placed citations). 9 points Survey of the literature was based upon three or more papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used at least 3 papers from the survey of the literature throughout the discussion of the technology (as demonstrated by correctly formatted and placed citations). 0 points Survey of the literature was based upon two or fewer papers from one or more of the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Did not appropriately use papers from the survey of the literature
  • 9. throughout the discussion of the technology (as demonstrated by paraphrasing and correctly formatted and placed citations). Reported on how tech could be used to improve or support cybersecurity 15 points Provided an excellent discussion of how the emerging technology or emerging application of technology could be used to improve or support cybersecurity by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc. Discussion provided five or more specific examples of how these improvements would impact cybersecurity for information, information systems, and/or networks. The discussion appropriately used five or more "pillars" and was based upon information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. 13 points Provided an outstanding discussion of how the emerging technology or emerging application of technology could be used to improve or support cybersecurity by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc. Discussion provided four or more specific examples of how these improvements would impact cybersecurity for information, information systems, and/or networks. The discussion appropriately used four or more "pillars" and was based upon information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. 11 points Provided a discussion of how the emerging technology or emerging application of technology could be used to improve or
  • 10. support cybersecurity for information, information systems, and/or networks. Discussion provided three or more appropriate examples, and used three or more "pillars." Information from the survey of the professional literature was used. Additional information from other sources, i.e. news articles, industry or government white papers or from authoritative Web sites, may also be included. 8 points Discussion provided few details in regards to how the emerging technology or emerging application of technology could be used to improve or support cybersecurity for information, information systems, and/or networks. OR, discussion provided few details in regards to support or improvements for cybersecurity. Information from the survey of the professional literature was used in the discussion. 4 points Discussed cybersecurity benefits from the use of the emerging technology but the discussion lacked detail and/or was not well supported by information drawn from authoritative sources. 0 points The discussion of cybersecurity improvements / support from use of the emerging technology was missing or was not relevant to the selected technology. Reported on how tech could be used by attackers, criminals, terrorists, etc. (OR, discussed specific vulnerabilities to attack which are present in this technology) 15 points Provided an excellent discussion of how the emerging technology or emerging application of technology could be used by attackers to further their own goals and/or how specific anticipated or known vulnerabilities could be exploited. Discussion fully described how the technology could by
  • 11. attackers against information, information systems, and/or networks. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. 13 points Provided an outstanding discussion of how the emerging technology or emerging application of technology could be used by attackers to further their own goals and/or how specific anticipated or known vulnerabilities could be exploited. Described how the technology could by attackers against information, information systems, and/or networks. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. 11 points Provided a discussion of how the emerging technology or emerging application of technology could be used by attackers to further their own goals and/or how specific anticipated or known vulnerabilities could be exploited. Described how the technology could by attackers against information, information systems, and/or networks. The discussion drew some information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers or from authoritative Web sites. 8 points Discussion provided few details in regards to how the emerging technology or emerging application of technology could be used by attackers against information, information systems, and/or networks. Provided few details regarding known or suspected (anticipated) vulnerabilities in the technology. Information from
  • 12. the survey of the professional literature was used in the discussion. 4 points Discussed attacks and/or reported on how the technology could be used against defenders but the discussion lacked detail and/or was not well supported by information drawn from authoritative sources. 0 points Did not report on how the technology could be used by attackers, criminals, terrorists, etc. Did not discuss specific vulnerabilities to attack which are present or anticipated in the identified technology. Addressed security issues using standard terms (e.g.5 Pillars IA, 5 Pillars Information Security) 10 points Demonstrated excellence in the use of standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS. 8 points Discussion showed an outstanding understanding and integration of standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS. 7 points Correctly used standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS. 6 points Correctly used standard cybersecurity terminology to support
  • 13. discussion of the technology. Appropriately used terminology from three or more pillars of IA/IS. 4 points Used some standard cybersecurity terminology to support discussion of the technology but the discussion was not well supported by information drawn from authoritative sources. 0 points Did not integrate standard cybersecurity terminology into the discussion OR misused or incorrectly defined standard terms from the pillars of IA/IS. Professionalism Part I: APA Formatting for Citations and Reference List 5 points Work contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource. 4 points Work contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries. 3 points Work contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in- text citations and/or reference list entries 2 points Work has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for
  • 14. in-text citations and/or reference list entries. 1 point Work attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6th ed.). 0 points Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper. Professionalism Part II: Organization & Appearance 5 points Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type. 4 points Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions). 3 points Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved. 2 points Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement. 1 point
  • 15. Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance. 0 points No work submitted. Professionalism Part III: Execution 10 points No formatting, grammar, spelling, or punctuation errors. 8 points Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance. 7 points Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work. 6 points Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance. 4 points Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage. 0 points No work submitted. Overall Score Excellent 90 or more Outstanding
  • 16. 80 or more Acceptable 70 or more Needs Improvement 56 or more Needs Significant Improvement 36 or more Missing or Unacceptable 0 or more Copyright © 2017 by University of Maryland University College. All rights reserved.