SlideShare a Scribd company logo

THIS IS DO NOT ACCEPT IT IF YOU WILL.docx

W
W

course material

THIS IS DO NOT ACCEPT IT IF YOU WILL.docx

1 of 3
Download to read offline
THIS IS URGENT. DO NOT ACCEPT IT IF YOU WILL
THIS IS URGENT. DO NOT ACCEPT IT IF YOU WILL NOT FINISH IT TODAY. Research
Report #2: Emerging Issues Risk Analysis and ReportCAUTION: there are a number of
websites which are offering “professionally written” versions of this assignment. Please do
not make the mistake of trying to use such papers as sources for your research. They do not
meet the requirement for authoritativeness (see https://libguides.umgc.edu/credibility ).
Your submitted work WILL be scanned by Turn It In and your grade will reflect the quality
of your research and writing for this assignment.ScenarioThe Entertainment Team (ET —
part of Resort Operations at Padgett-Beale, Inc.) is excited about a new event management
platform and is ready to go to contract with the vendor. This platform is a cloud-based
service that provides end-to-end management for events (conferences, concerts, festivals).
The head of Marketing & Media (M&M) is on board and strongly supports the use of this
system. M&M believes that the data collection and analysis capabilities of the system will
prove extremely valuable for its efforts. Resort Operations (RO) also believes that the
technology could be leveraged to provide additional capabilities for managing participation
in hotel sponsored “kids programs” and related children-only events. For an additional fee,
the event management platform’s vendor will provide customized RFID bands to be worn
by attendees. The RFID bands and RFID readers use near-field communications to identify
the wearer and complete the desired transactions (e.g. record a booth visit, make a
purchase, vote for a favorite activity or performer, etc.).The RFID bands have unique
identifiers embedded in the band that allow tracking of attendees (admittance, where they
go within the venue, what they “like,” how long they stay in a given location, etc.). The RFID
bands can also be connected to an attendee’s credit card or debit card account and then
used by the attendee to make purchases for food, beverages, and souvenirs. For children,
the RFID bands can be paired with a parent’s band, loaded with allergy information, and
have a parent specified spending limit or spending preauthorization tied to the parent’s
credit card account.The head of Corporate IT has tentatively given approval for this
outsourcing because it leverages cloud-computing capabilities. IT’s approval is very
important to supporters of this the acquisition because of the company’s ban on “Shadow
IT.” (Only Corporate IT is allowed to issue contracts for information technology related
purchases, acquisitions, and outsourcing contracts.) Corporate IT also supports a cloud-
based platform since this reduces the amount of infrastructure which IT must support and
manage directly. The project has come to a screeching halt, however, due to an objection by
the Chief Financial Officer. The CFO has asked that the IT Governance Board investigate this
project and obtain more information about the benefits and risks of using RFID bands
linked to an external system which processes transactions and authorizations of mobile /
cashless payments for goods and services. The CFO is concerned that the company’s PCI
Compliance status may be adversely affected.The Chief Privacy Officer has also expressed
an objection about this project. The CPO is concerned about the privacy implications of
tracking both movement of individuals and the tracking of their purchasing behaviors.The
IT Governance Board agreed that the concerns expressed by two of its members (the CFO
and CPO) have merit. The board has requested an unbiased analysis of the proposed use
cases and the security and privacy issues which could be reasonably expected to arise. The
IT Governance Board has also agreed to a request from the Chief of Staff that the
management interns be allowed to participate in this analysis as their final project. Per the
agreement, their involvement will be limited to providing background research into the
defined use cases for cashless purchases. These use cases are:1. Purchases for craft
materials and snacks by children (under the age of 13) attending a hotel sponsored “kids
club” program. 2. Purchases by Individuals attending a music festival or other event where
IDs must be checked to establish proof of age (legal requirement for local alcoholic beverage
consumption).3. Purchases by attendees at trade shows (attendees are “adults”).Your
TaskPick one of the three use cases listed above. Then, follow the directions below to
complete the required research and write your final report. Research1. Read / Review the
readings in the LEO classroom.2. Read this introductions to RFID technologies:
https://www.gettoken.com/beginners-guide-rfid-technology-events/ 3. Research one or
more of the Use Casesa. Children: 8 Benefits of Using RFID Wristbands for Resorts &
Attractions (see section 4: Family Freedom) https://www.idcband.com/en-us/blog-us/8-
benefits-of-using-rfid-wristbands-resorts-attractions/ and
https://tappit.com/resources/blog/rfid-wristband-safety b. Managing Adult Attendees at
Music Festivals (includes RFID bands linked to twitter, Facebook, and credit/debit card)
http://www.techradar.com/news/world-of-tech/rfid-wristbands-vs-nfc-smartphones-
what-s-winning-the-contactless-battle-1167135 c. Tracking Adults at Trade
Shows https://blog.printsome.com/rfid-wristbands-good-bad/4. Choose one of the Use
Cases then find and review at least one additional resource on your own that provides
information about privacy and security related laws that could limit or impose additional
responsibilities upon Padgett-Beale’s collection, storage, transmission, and use of data
about guests. (Note: laws may differ with respect to collecting data from or about children.)
You should also investigate laws, regulations, or standards which impact the use of the RFID
bands for mobile purchases.5. Using all of your readings, identify and research at least 5
security and privacy issues which the IT Governance Board needs to consider and address
as it considers the implications of your chosen use case upon the adoption or rejection of
the proposed IT project (Event Management Platform & RFID bands). 6. Then, identify 5
best practices that you can recommend to Padgett-Beale’s leadership team to reduce and/or
manage risks associated with the security and privacy of data associated with the event
management platform.WriteWrite a five to seven (5-7) page report using your research. At
a minimum, your report must include the following:1. An introduction or overview of event
management systems and the potential security and privacy concerns which could arise
when implementing this technology. This introduction should be suitable for an executive
audience. Provide a brief explanation as to why three major operating units believe the
company needs this capability. 2. An analysis section in which you address the following:a.
Identify and describe your chosen Use Caseb. Identify and describe five or more types of
personal / private information or data that will be collected, stored, processed, and
transmitted in conjunction with the use case. c. Identify and describe five or more
compliance issues related to the use of the RFID bands to make and track mobile
purchases.d. Analyze and discuss five or more privacy and security issues related to the use
case.e. Identify and discuss 3 or more relevant laws, regulations, or standards which could
impact the planned implementation of the event management system with RFID wrist
bands.3. A recommendations section in which you identify and discuss five or more best
practices for security and privacy that should be implemented before the technology is put
into use by the company. Include at least one recommendation in each of the following
categories: people, processes, policies, and technologies. 4. A closing section (summary) in
which you summarize the issues related to your chosen use case and the event management
platform overall. Include a summary of your recommendations to the IT Governance
Board.Submit for GradingSubmit your research paper in MS Word format (.docx or .doc file)
using the Research Report #2 Assignment in your assignment folder. (Attach your file to the
assignment entry.)Additional Information1. To save you time, a set of appropriate resources
/ reference materials has been included as part of this assignment. You must incorporate at
least five of these resources into your final deliverable. You must also include one resource
that you found on your own.2. Your research report should use standard terms and
definitions for cybersecurity. 3. Your research report should be professional in appearance
with consistent use of fonts, font sizes, margins, etc. You should use headings to organize
your paper. The CSIA program recommends that you follow standard APA formatting since
this will give you a document that meets the “professional appearance” requirements. APA
formatting guidelines and examples are found under Course Resources > APA Resources. An
APA template file (MS Word format) has also been provided for your use.4. You are
expected to write grammatically correct English in every assignment that you submit for
grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c)
verifying that your punctuation is correct and (d) reviewing your work for correct word
usage and correctly structured sentences and paragraphs. 5. You are expected to credit
your sources using in-text citations and reference list entries. Both your citations and your
reference list entries must follow a consistent citation style (APA, MLA, etc.).
Ad

Recommended

THIS IS URGENT- DO NOT ACCEPT IT IF YOU WILL NOT FINISH IT TODAY-Resea.docx
THIS IS URGENT- DO NOT ACCEPT IT IF YOU WILL NOT FINISH IT TODAY-Resea.docxTHIS IS URGENT- DO NOT ACCEPT IT IF YOU WILL NOT FINISH IT TODAY-Resea.docx
THIS IS URGENT- DO NOT ACCEPT IT IF YOU WILL NOT FINISH IT TODAY-Resea.docxkdennis3
 
CSIA 300 Cybersecurity for Leaders and Managers Researc
CSIA 300 Cybersecurity for Leaders and Managers ResearcCSIA 300 Cybersecurity for Leaders and Managers Researc
CSIA 300 Cybersecurity for Leaders and Managers ResearcMargenePurnell14
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceObservePoint
 
Technology & Product Review for Identity Governance & Administration.docx
Technology & Product Review for Identity Governance & Administration.docxTechnology & Product Review for Identity Governance & Administration.docx
Technology & Product Review for Identity Governance & Administration.docxjacqueliner9
 
Scenario insurance CyberOne Business and Casualty.docx
Scenario insurance CyberOne Business and Casualty.docxScenario insurance CyberOne Business and Casualty.docx
Scenario insurance CyberOne Business and Casualty.docxwrite12
 
Backup of FinalExam-EssayQ-Mon
Backup of FinalExam-EssayQ-MonBackup of FinalExam-EssayQ-Mon
Backup of FinalExam-EssayQ-MonFares Sharif
 
TTL Specifications And Boolean Function
TTL Specifications And Boolean FunctionTTL Specifications And Boolean Function
TTL Specifications And Boolean FunctionPatricia Viljoen
 
MOBILE SECURITY 1MOBILE SECURITYAbstractI am selecting the
MOBILE SECURITY 1MOBILE SECURITYAbstractI am selecting the MOBILE SECURITY 1MOBILE SECURITYAbstractI am selecting the
MOBILE SECURITY 1MOBILE SECURITYAbstractI am selecting the IlonaThornburg83
 

More Related Content

Similar to THIS IS DO NOT ACCEPT IT IF YOU WILL.docx

Cloud Computing Is An Altering Technology Essay
Cloud Computing Is An Altering Technology EssayCloud Computing Is An Altering Technology Essay
Cloud Computing Is An Altering Technology EssayAshley Davis
 
Company And Preliminary Accounting Analysis
Company And Preliminary Accounting AnalysisCompany And Preliminary Accounting Analysis
Company And Preliminary Accounting AnalysisJennifer Moore
 
S6 Standard Operating Procedure
S6 Standard Operating ProcedureS6 Standard Operating Procedure
S6 Standard Operating ProcedureJessica Cannella
 
CSIA 300 Cybersecurity for Leaders and ManagersResearch Report #1.docx
CSIA 300 Cybersecurity for Leaders and ManagersResearch Report #1.docxCSIA 300 Cybersecurity for Leaders and ManagersResearch Report #1.docx
CSIA 300 Cybersecurity for Leaders and ManagersResearch Report #1.docxmydrynan
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 
1190 Assignment Specifications1190.12 25 Points PossibleC.docx
1190 Assignment Specifications1190.12 25  Points PossibleC.docx1190 Assignment Specifications1190.12 25  Points PossibleC.docx
1190 Assignment Specifications1190.12 25 Points PossibleC.docxRAJU852744
 
1190 Assignment Specifications1190.12 25 Points PossibleC.docx
1190 Assignment Specifications1190.12 25  Points PossibleC.docx1190 Assignment Specifications1190.12 25  Points PossibleC.docx
1190 Assignment Specifications1190.12 25 Points PossibleC.docxaulasnilda
 
IRJET- Smart Wardrobe – IoT based Application
IRJET- Smart Wardrobe – IoT based ApplicationIRJET- Smart Wardrobe – IoT based Application
IRJET- Smart Wardrobe – IoT based ApplicationIRJET Journal
 
Software Development Life Cycle In Real Life Application Buying.docx
Software Development Life Cycle In Real Life Application Buying.docxSoftware Development Life Cycle In Real Life Application Buying.docx
Software Development Life Cycle In Real Life Application Buying.docxrosemariebrayshaw
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Steven Meister
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docxevonnehoggarth79783
 
Digital strategy overview
Digital strategy overviewDigital strategy overview
Digital strategy overviewAshish Bhasin
 
White Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan EnglishWhite Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan EnglishFelipe Lamus
 
Reasons For Improving The Level Of Commitment And Employee...
Reasons For Improving The Level Of Commitment And Employee...Reasons For Improving The Level Of Commitment And Employee...
Reasons For Improving The Level Of Commitment And Employee...Lisa Netkowicz
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
 
Project #1 Supply Chain Risk AnalysisOverviewFor this project.docx
Project #1 Supply Chain Risk AnalysisOverviewFor this project.docxProject #1 Supply Chain Risk AnalysisOverviewFor this project.docx
Project #1 Supply Chain Risk AnalysisOverviewFor this project.docxsimonlbentley59018
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical HackingIRJET Journal
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco
 
Evaluation Of A Database Developmental Methodology
Evaluation Of A Database Developmental MethodologyEvaluation Of A Database Developmental Methodology
Evaluation Of A Database Developmental MethodologyMaria Parks
 

Similar to THIS IS DO NOT ACCEPT IT IF YOU WILL.docx (20)

Cloud Computing Is An Altering Technology Essay
Cloud Computing Is An Altering Technology EssayCloud Computing Is An Altering Technology Essay
Cloud Computing Is An Altering Technology Essay
 
Company And Preliminary Accounting Analysis
Company And Preliminary Accounting AnalysisCompany And Preliminary Accounting Analysis
Company And Preliminary Accounting Analysis
 
S6 Standard Operating Procedure
S6 Standard Operating ProcedureS6 Standard Operating Procedure
S6 Standard Operating Procedure
 
CSIA 300 Cybersecurity for Leaders and ManagersResearch Report #1.docx
CSIA 300 Cybersecurity for Leaders and ManagersResearch Report #1.docxCSIA 300 Cybersecurity for Leaders and ManagersResearch Report #1.docx
CSIA 300 Cybersecurity for Leaders and ManagersResearch Report #1.docx
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
1190 Assignment Specifications1190.12 25 Points PossibleC.docx
1190 Assignment Specifications1190.12 25  Points PossibleC.docx1190 Assignment Specifications1190.12 25  Points PossibleC.docx
1190 Assignment Specifications1190.12 25 Points PossibleC.docx
 
1190 Assignment Specifications1190.12 25 Points PossibleC.docx
1190 Assignment Specifications1190.12 25  Points PossibleC.docx1190 Assignment Specifications1190.12 25  Points PossibleC.docx
1190 Assignment Specifications1190.12 25 Points PossibleC.docx
 
Culture Of Security
Culture Of SecurityCulture Of Security
Culture Of Security
 
IRJET- Smart Wardrobe – IoT based Application
IRJET- Smart Wardrobe – IoT based ApplicationIRJET- Smart Wardrobe – IoT based Application
IRJET- Smart Wardrobe – IoT based Application
 
Software Development Life Cycle In Real Life Application Buying.docx
Software Development Life Cycle In Real Life Application Buying.docxSoftware Development Life Cycle In Real Life Application Buying.docx
Software Development Life Cycle In Real Life Application Buying.docx
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
Digital strategy overview
Digital strategy overviewDigital strategy overview
Digital strategy overview
 
White Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan EnglishWhite Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan English
 
Reasons For Improving The Level Of Commitment And Employee...
Reasons For Improving The Level Of Commitment And Employee...Reasons For Improving The Level Of Commitment And Employee...
Reasons For Improving The Level Of Commitment And Employee...
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 
Project #1 Supply Chain Risk AnalysisOverviewFor this project.docx
Project #1 Supply Chain Risk AnalysisOverviewFor this project.docxProject #1 Supply Chain Risk AnalysisOverviewFor this project.docx
Project #1 Supply Chain Risk AnalysisOverviewFor this project.docx
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco Portfolio
 
Evaluation Of A Database Developmental Methodology
Evaluation Of A Database Developmental MethodologyEvaluation Of A Database Developmental Methodology
Evaluation Of A Database Developmental Methodology
 

More from write5

Your individual project in this Unit is based on the.docx
Your individual project in this Unit is based on the.docxYour individual project in this Unit is based on the.docx
Your individual project in this Unit is based on the.docxwrite5
 
Your work with the companies is coming to a.docx
Your work with the companies is coming to a.docxYour work with the companies is coming to a.docx
Your work with the companies is coming to a.docxwrite5
 
Your instructor will assign one of the three stages of.docx
Your instructor will assign one of the three stages of.docxYour instructor will assign one of the three stages of.docx
Your instructor will assign one of the three stages of.docxwrite5
 
Your project lead has asked you to determine if PVSS.docx
Your project lead has asked you to determine if PVSS.docxYour project lead has asked you to determine if PVSS.docx
Your project lead has asked you to determine if PVSS.docxwrite5
 
Your Investment and their Competition Write a word.docx
Your Investment and their Competition Write a word.docxYour Investment and their Competition Write a word.docx
Your Investment and their Competition Write a word.docxwrite5
 
Your comprehensive health history that was assigned in Module 01.docx
Your comprehensive health history that was assigned in Module 01.docxYour comprehensive health history that was assigned in Module 01.docx
Your comprehensive health history that was assigned in Module 01.docxwrite5
 
The Legend of Sleepy Hollow by Washington Irving.docx
The Legend of Sleepy Hollow by Washington Irving.docxThe Legend of Sleepy Hollow by Washington Irving.docx
The Legend of Sleepy Hollow by Washington Irving.docxwrite5
 
You would like to buy a new car in five.docx
You would like to buy a new car in five.docxYou would like to buy a new car in five.docx
You would like to buy a new car in five.docxwrite5
 
You will perform a history of a musculoskeletal problem that.docx
You will perform a history of a musculoskeletal problem that.docxYou will perform a history of a musculoskeletal problem that.docx
You will perform a history of a musculoskeletal problem that.docxwrite5
 
You will write at least six full pages summarizing.docx
You will write at least six full pages summarizing.docxYou will write at least six full pages summarizing.docx
You will write at least six full pages summarizing.docxwrite5
 
you will select one of the six model nations to.docx
you will select one of the six model nations to.docxyou will select one of the six model nations to.docx
you will select one of the six model nations to.docxwrite5
 
You will be watching ONE episode of one of the.docx
You will be watching ONE episode of one of the.docxYou will be watching ONE episode of one of the.docx
You will be watching ONE episode of one of the.docxwrite5
 
This week I will be discussing induction cooktops Research and.docx
This week I will be discussing induction cooktops Research and.docxThis week I will be discussing induction cooktops Research and.docx
This week I will be discussing induction cooktops Research and.docxwrite5
 
This week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxThis week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxwrite5
 
The Power Grid and Big Data Contains unread posts.docx
The Power Grid and Big Data Contains unread posts.docxThe Power Grid and Big Data Contains unread posts.docx
The Power Grid and Big Data Contains unread posts.docxwrite5
 
This is a case study to help you understand the.docx
This is a case study to help you understand the.docxThis is a case study to help you understand the.docx
This is a case study to help you understand the.docxwrite5
 
Week 2 Activity Healthcare Finance Questions Overview This activity.docx
Week 2 Activity Healthcare Finance Questions Overview This activity.docxWeek 2 Activity Healthcare Finance Questions Overview This activity.docx
Week 2 Activity Healthcare Finance Questions Overview This activity.docxwrite5
 
We require a portfolio of design including representative examples.docx
We require a portfolio of design including representative examples.docxWe require a portfolio of design including representative examples.docx
We require a portfolio of design including representative examples.docxwrite5
 
Watch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxWatch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxwrite5
 
The value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxThe value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxwrite5
 

More from write5 (20)

Your individual project in this Unit is based on the.docx
Your individual project in this Unit is based on the.docxYour individual project in this Unit is based on the.docx
Your individual project in this Unit is based on the.docx
 
Your work with the companies is coming to a.docx
Your work with the companies is coming to a.docxYour work with the companies is coming to a.docx
Your work with the companies is coming to a.docx
 
Your instructor will assign one of the three stages of.docx
Your instructor will assign one of the three stages of.docxYour instructor will assign one of the three stages of.docx
Your instructor will assign one of the three stages of.docx
 
Your project lead has asked you to determine if PVSS.docx
Your project lead has asked you to determine if PVSS.docxYour project lead has asked you to determine if PVSS.docx
Your project lead has asked you to determine if PVSS.docx
 
Your Investment and their Competition Write a word.docx
Your Investment and their Competition Write a word.docxYour Investment and their Competition Write a word.docx
Your Investment and their Competition Write a word.docx
 
Your comprehensive health history that was assigned in Module 01.docx
Your comprehensive health history that was assigned in Module 01.docxYour comprehensive health history that was assigned in Module 01.docx
Your comprehensive health history that was assigned in Module 01.docx
 
The Legend of Sleepy Hollow by Washington Irving.docx
The Legend of Sleepy Hollow by Washington Irving.docxThe Legend of Sleepy Hollow by Washington Irving.docx
The Legend of Sleepy Hollow by Washington Irving.docx
 
You would like to buy a new car in five.docx
You would like to buy a new car in five.docxYou would like to buy a new car in five.docx
You would like to buy a new car in five.docx
 
You will perform a history of a musculoskeletal problem that.docx
You will perform a history of a musculoskeletal problem that.docxYou will perform a history of a musculoskeletal problem that.docx
You will perform a history of a musculoskeletal problem that.docx
 
You will write at least six full pages summarizing.docx
You will write at least six full pages summarizing.docxYou will write at least six full pages summarizing.docx
You will write at least six full pages summarizing.docx
 
you will select one of the six model nations to.docx
you will select one of the six model nations to.docxyou will select one of the six model nations to.docx
you will select one of the six model nations to.docx
 
You will be watching ONE episode of one of the.docx
You will be watching ONE episode of one of the.docxYou will be watching ONE episode of one of the.docx
You will be watching ONE episode of one of the.docx
 
This week I will be discussing induction cooktops Research and.docx
This week I will be discussing induction cooktops Research and.docxThis week I will be discussing induction cooktops Research and.docx
This week I will be discussing induction cooktops Research and.docx
 
This week you are exploring what it means to have.docx
This week you are exploring what it means to have.docxThis week you are exploring what it means to have.docx
This week you are exploring what it means to have.docx
 
The Power Grid and Big Data Contains unread posts.docx
The Power Grid and Big Data Contains unread posts.docxThe Power Grid and Big Data Contains unread posts.docx
The Power Grid and Big Data Contains unread posts.docx
 
This is a case study to help you understand the.docx
This is a case study to help you understand the.docxThis is a case study to help you understand the.docx
This is a case study to help you understand the.docx
 
Week 2 Activity Healthcare Finance Questions Overview This activity.docx
Week 2 Activity Healthcare Finance Questions Overview This activity.docxWeek 2 Activity Healthcare Finance Questions Overview This activity.docx
Week 2 Activity Healthcare Finance Questions Overview This activity.docx
 
We require a portfolio of design including representative examples.docx
We require a portfolio of design including representative examples.docxWe require a portfolio of design including representative examples.docx
We require a portfolio of design including representative examples.docx
 
Watch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docxWatch the TED Talk for Chapter 8 on Pay.docx
Watch the TED Talk for Chapter 8 on Pay.docx
 
The value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docxThe value of diversity in groups and society is continually.docx
The value of diversity in groups and society is continually.docx
 

Recently uploaded

Sudden Death of Beliefs
Sudden Death of BeliefsSudden Death of Beliefs
Sudden Death of BeliefsRay Poynter
 
Appendicular SkeletonSystem PPT.....pptx
Appendicular SkeletonSystem PPT.....pptxAppendicular SkeletonSystem PPT.....pptx
Appendicular SkeletonSystem PPT.....pptxRenuka N Sunagad
 
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRASACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRASMaria Lucia Céspedes
 
Shapley Tech Talk - SHAP and Shapley Discussion
Shapley Tech Talk - SHAP and Shapley DiscussionShapley Tech Talk - SHAP and Shapley Discussion
Shapley Tech Talk - SHAP and Shapley DiscussionTushar Tank
 
BTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic LeukemiaBTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic LeukemiaFaheema Hasan
 
Different types of animal Tissues DMLT .pptx
Different types of animal Tissues DMLT .pptxDifferent types of animal Tissues DMLT .pptx
Different types of animal Tissues DMLT .pptxPunamSahoo3
 
Evaluation and management of patients with Dyspepsia.pptx
Evaluation and management of patients with Dyspepsia.pptxEvaluation and management of patients with Dyspepsia.pptx
Evaluation and management of patients with Dyspepsia.pptxgarvitnanecha
 
FILIPINO 7 IKATLO AT IKAAPAT NA LINGGO 3RD QUARTER.pptx
FILIPINO 7 IKATLO AT IKAAPAT NA LINGGO 3RD QUARTER.pptxFILIPINO 7 IKATLO AT IKAAPAT NA LINGGO 3RD QUARTER.pptx
FILIPINO 7 IKATLO AT IKAAPAT NA LINGGO 3RD QUARTER.pptxmarielouisemiranda1
 
2.15.24 The Birmingham Campaign and MLK.pptx
2.15.24 The Birmingham Campaign and MLK.pptx2.15.24 The Birmingham Campaign and MLK.pptx
2.15.24 The Birmingham Campaign and MLK.pptxMaryPotorti1
 
2.15.24 Making Whiteness -- Baldwin.pptx
2.15.24 Making Whiteness -- Baldwin.pptx2.15.24 Making Whiteness -- Baldwin.pptx
2.15.24 Making Whiteness -- Baldwin.pptxMaryPotorti1
 
Media Relations for Public Relations Class
Media Relations for Public Relations ClassMedia Relations for Public Relations Class
Media Relations for Public Relations ClassCorinne Weisgerber
 
Unleashing the Power of AI Tools for Enhancing Research, International FDP on...
Unleashing the Power of AI Tools for Enhancing Research, International FDP on...Unleashing the Power of AI Tools for Enhancing Research, International FDP on...
Unleashing the Power of AI Tools for Enhancing Research, International FDP on...Dr. Vinod Kumar Kanvaria
 
Introduction of General Pharmacology PPT.pptx
Introduction of General Pharmacology PPT.pptxIntroduction of General Pharmacology PPT.pptx
Introduction of General Pharmacology PPT.pptxRenuka N Sunagad
 
mean stack mean stack mean stack mean stack
mean stack mean stack  mean stack  mean stackmean stack mean stack  mean stack  mean stack
mean stack mean stack mean stack mean stackNuttavutThongjor1
 
Detailed Presentation on Human Rights(1).pptx
Detailed Presentation on Human Rights(1).pptxDetailed Presentation on Human Rights(1).pptx
Detailed Presentation on Human Rights(1).pptxDrOsiaMajeed
 
The Institutional Origins of Canada’s Telecommunications Mosaic
The Institutional Origins of Canada’s Telecommunications MosaicThe Institutional Origins of Canada’s Telecommunications Mosaic
The Institutional Origins of Canada’s Telecommunications MosaicUniversity of Canberra
 
Website Fixer-Upper Series to Boost your Online Presence
Website Fixer-Upper Series to Boost your Online PresenceWebsite Fixer-Upper Series to Boost your Online Presence
Website Fixer-Upper Series to Boost your Online PresenceSamantha Russell
 
Kochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment Model
Kochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment ModelKochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment Model
Kochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment Modelsandeepmenon62
 

Recently uploaded (20)

Sudden Death of Beliefs
Sudden Death of BeliefsSudden Death of Beliefs
Sudden Death of Beliefs
 
Appendicular SkeletonSystem PPT.....pptx
Appendicular SkeletonSystem PPT.....pptxAppendicular SkeletonSystem PPT.....pptx
Appendicular SkeletonSystem PPT.....pptx
 
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRASACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
ACTIVIDAD DE CLASE No 1 - SOPA DE LETRAS
 
Shapley Tech Talk - SHAP and Shapley Discussion
Shapley Tech Talk - SHAP and Shapley DiscussionShapley Tech Talk - SHAP and Shapley Discussion
Shapley Tech Talk - SHAP and Shapley Discussion
 
BTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic LeukemiaBTKi in Treatment Of Chronic Lymphocytic Leukemia
BTKi in Treatment Of Chronic Lymphocytic Leukemia
 
Different types of animal Tissues DMLT .pptx
Different types of animal Tissues DMLT .pptxDifferent types of animal Tissues DMLT .pptx
Different types of animal Tissues DMLT .pptx
 
Time-Honored Wisdom: African Teachings for VUCA Leaders
Time-Honored Wisdom: African Teachings for VUCA LeadersTime-Honored Wisdom: African Teachings for VUCA Leaders
Time-Honored Wisdom: African Teachings for VUCA Leaders
 
Evaluation and management of patients with Dyspepsia.pptx
Evaluation and management of patients with Dyspepsia.pptxEvaluation and management of patients with Dyspepsia.pptx
Evaluation and management of patients with Dyspepsia.pptx
 
Caldecott Medal Book Winners and Media Used
Caldecott Medal Book Winners and Media UsedCaldecott Medal Book Winners and Media Used
Caldecott Medal Book Winners and Media Used
 
FILIPINO 7 IKATLO AT IKAAPAT NA LINGGO 3RD QUARTER.pptx
FILIPINO 7 IKATLO AT IKAAPAT NA LINGGO 3RD QUARTER.pptxFILIPINO 7 IKATLO AT IKAAPAT NA LINGGO 3RD QUARTER.pptx
FILIPINO 7 IKATLO AT IKAAPAT NA LINGGO 3RD QUARTER.pptx
 
2.15.24 The Birmingham Campaign and MLK.pptx
2.15.24 The Birmingham Campaign and MLK.pptx2.15.24 The Birmingham Campaign and MLK.pptx
2.15.24 The Birmingham Campaign and MLK.pptx
 
2.15.24 Making Whiteness -- Baldwin.pptx
2.15.24 Making Whiteness -- Baldwin.pptx2.15.24 Making Whiteness -- Baldwin.pptx
2.15.24 Making Whiteness -- Baldwin.pptx
 
Media Relations for Public Relations Class
Media Relations for Public Relations ClassMedia Relations for Public Relations Class
Media Relations for Public Relations Class
 
Unleashing the Power of AI Tools for Enhancing Research, International FDP on...
Unleashing the Power of AI Tools for Enhancing Research, International FDP on...Unleashing the Power of AI Tools for Enhancing Research, International FDP on...
Unleashing the Power of AI Tools for Enhancing Research, International FDP on...
 
Introduction of General Pharmacology PPT.pptx
Introduction of General Pharmacology PPT.pptxIntroduction of General Pharmacology PPT.pptx
Introduction of General Pharmacology PPT.pptx
 
mean stack mean stack mean stack mean stack
mean stack mean stack  mean stack  mean stackmean stack mean stack  mean stack  mean stack
mean stack mean stack mean stack mean stack
 
Detailed Presentation on Human Rights(1).pptx
Detailed Presentation on Human Rights(1).pptxDetailed Presentation on Human Rights(1).pptx
Detailed Presentation on Human Rights(1).pptx
 
The Institutional Origins of Canada’s Telecommunications Mosaic
The Institutional Origins of Canada’s Telecommunications MosaicThe Institutional Origins of Canada’s Telecommunications Mosaic
The Institutional Origins of Canada’s Telecommunications Mosaic
 
Website Fixer-Upper Series to Boost your Online Presence
Website Fixer-Upper Series to Boost your Online PresenceWebsite Fixer-Upper Series to Boost your Online Presence
Website Fixer-Upper Series to Boost your Online Presence
 
Kochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment Model
Kochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment ModelKochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment Model
Kochi Mulesoft Meetup # 17 - RTF on OpenShift Deployment Model
 

THIS IS DO NOT ACCEPT IT IF YOU WILL.docx

  • 1. THIS IS URGENT. DO NOT ACCEPT IT IF YOU WILL THIS IS URGENT. DO NOT ACCEPT IT IF YOU WILL NOT FINISH IT TODAY. Research Report #2: Emerging Issues Risk Analysis and ReportCAUTION: there are a number of websites which are offering “professionally written” versions of this assignment. Please do not make the mistake of trying to use such papers as sources for your research. They do not meet the requirement for authoritativeness (see https://libguides.umgc.edu/credibility ). Your submitted work WILL be scanned by Turn It In and your grade will reflect the quality of your research and writing for this assignment.ScenarioThe Entertainment Team (ET — part of Resort Operations at Padgett-Beale, Inc.) is excited about a new event management platform and is ready to go to contract with the vendor. This platform is a cloud-based service that provides end-to-end management for events (conferences, concerts, festivals). The head of Marketing & Media (M&M) is on board and strongly supports the use of this system. M&M believes that the data collection and analysis capabilities of the system will prove extremely valuable for its efforts. Resort Operations (RO) also believes that the technology could be leveraged to provide additional capabilities for managing participation in hotel sponsored “kids programs” and related children-only events. For an additional fee, the event management platform’s vendor will provide customized RFID bands to be worn by attendees. The RFID bands and RFID readers use near-field communications to identify the wearer and complete the desired transactions (e.g. record a booth visit, make a purchase, vote for a favorite activity or performer, etc.).The RFID bands have unique identifiers embedded in the band that allow tracking of attendees (admittance, where they go within the venue, what they “like,” how long they stay in a given location, etc.). The RFID bands can also be connected to an attendee’s credit card or debit card account and then used by the attendee to make purchases for food, beverages, and souvenirs. For children, the RFID bands can be paired with a parent’s band, loaded with allergy information, and have a parent specified spending limit or spending preauthorization tied to the parent’s credit card account.The head of Corporate IT has tentatively given approval for this outsourcing because it leverages cloud-computing capabilities. IT’s approval is very important to supporters of this the acquisition because of the company’s ban on “Shadow IT.” (Only Corporate IT is allowed to issue contracts for information technology related purchases, acquisitions, and outsourcing contracts.) Corporate IT also supports a cloud- based platform since this reduces the amount of infrastructure which IT must support and manage directly. The project has come to a screeching halt, however, due to an objection by the Chief Financial Officer. The CFO has asked that the IT Governance Board investigate this
  • 2. project and obtain more information about the benefits and risks of using RFID bands linked to an external system which processes transactions and authorizations of mobile / cashless payments for goods and services. The CFO is concerned that the company’s PCI Compliance status may be adversely affected.The Chief Privacy Officer has also expressed an objection about this project. The CPO is concerned about the privacy implications of tracking both movement of individuals and the tracking of their purchasing behaviors.The IT Governance Board agreed that the concerns expressed by two of its members (the CFO and CPO) have merit. The board has requested an unbiased analysis of the proposed use cases and the security and privacy issues which could be reasonably expected to arise. The IT Governance Board has also agreed to a request from the Chief of Staff that the management interns be allowed to participate in this analysis as their final project. Per the agreement, their involvement will be limited to providing background research into the defined use cases for cashless purchases. These use cases are:1. Purchases for craft materials and snacks by children (under the age of 13) attending a hotel sponsored “kids club” program. 2. Purchases by Individuals attending a music festival or other event where IDs must be checked to establish proof of age (legal requirement for local alcoholic beverage consumption).3. Purchases by attendees at trade shows (attendees are “adults”).Your TaskPick one of the three use cases listed above. Then, follow the directions below to complete the required research and write your final report. Research1. Read / Review the readings in the LEO classroom.2. Read this introductions to RFID technologies: https://www.gettoken.com/beginners-guide-rfid-technology-events/ 3. Research one or more of the Use Casesa. Children: 8 Benefits of Using RFID Wristbands for Resorts & Attractions (see section 4: Family Freedom) https://www.idcband.com/en-us/blog-us/8- benefits-of-using-rfid-wristbands-resorts-attractions/ and https://tappit.com/resources/blog/rfid-wristband-safety b. Managing Adult Attendees at Music Festivals (includes RFID bands linked to twitter, Facebook, and credit/debit card) http://www.techradar.com/news/world-of-tech/rfid-wristbands-vs-nfc-smartphones- what-s-winning-the-contactless-battle-1167135 c. Tracking Adults at Trade Shows https://blog.printsome.com/rfid-wristbands-good-bad/4. Choose one of the Use Cases then find and review at least one additional resource on your own that provides information about privacy and security related laws that could limit or impose additional responsibilities upon Padgett-Beale’s collection, storage, transmission, and use of data about guests. (Note: laws may differ with respect to collecting data from or about children.) You should also investigate laws, regulations, or standards which impact the use of the RFID bands for mobile purchases.5. Using all of your readings, identify and research at least 5 security and privacy issues which the IT Governance Board needs to consider and address as it considers the implications of your chosen use case upon the adoption or rejection of the proposed IT project (Event Management Platform & RFID bands). 6. Then, identify 5 best practices that you can recommend to Padgett-Beale’s leadership team to reduce and/or manage risks associated with the security and privacy of data associated with the event management platform.WriteWrite a five to seven (5-7) page report using your research. At a minimum, your report must include the following:1. An introduction or overview of event management systems and the potential security and privacy concerns which could arise
  • 3. when implementing this technology. This introduction should be suitable for an executive audience. Provide a brief explanation as to why three major operating units believe the company needs this capability. 2. An analysis section in which you address the following:a. Identify and describe your chosen Use Caseb. Identify and describe five or more types of personal / private information or data that will be collected, stored, processed, and transmitted in conjunction with the use case. c. Identify and describe five or more compliance issues related to the use of the RFID bands to make and track mobile purchases.d. Analyze and discuss five or more privacy and security issues related to the use case.e. Identify and discuss 3 or more relevant laws, regulations, or standards which could impact the planned implementation of the event management system with RFID wrist bands.3. A recommendations section in which you identify and discuss five or more best practices for security and privacy that should be implemented before the technology is put into use by the company. Include at least one recommendation in each of the following categories: people, processes, policies, and technologies. 4. A closing section (summary) in which you summarize the issues related to your chosen use case and the event management platform overall. Include a summary of your recommendations to the IT Governance Board.Submit for GradingSubmit your research paper in MS Word format (.docx or .doc file) using the Research Report #2 Assignment in your assignment folder. (Attach your file to the assignment entry.)Additional Information1. To save you time, a set of appropriate resources / reference materials has been included as part of this assignment. You must incorporate at least five of these resources into your final deliverable. You must also include one resource that you found on your own.2. Your research report should use standard terms and definitions for cybersecurity. 3. Your research report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use.4. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 5. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).