1-3 Final Project Review and Topic Submission
The final project for this course is the creation of an information technology incident report. The rubric (Topic) attached covers the topic, while the “Final Rubric” covers the actual final project broken down in modules. The project is broken down into 3 modules. The person chosen will come up with a topic for this specific question and I will work with them throughout the remaining modules. Willing to pay $10 just to come up with a topic that will be used for the remaining modules and final.
IT 659 Topic Guidelines and Rubric
The purpose of this assignment is to submit a topic for your final project. The instructor will review your topic and provide you with feedback on your topic
choice.
Prompt: You will select a recent or current incident from the public record that will support the creation of an information technology incident report as
described in the Final Project Document. Provide rationale as to why you are interested in this topic.
Guidelines for Submission: You will submit a onepage Microsoft Word document with double spacing and 12point Times New Roman font with oneinch
margins.
You must score Evident on the critical element to earn your points for this assignment. Please see the feedback provided by your instructor. You may need to
resubmit based upon your instructor’s approval.
Critical Element Evident (100%) Not Evident (0%) Value
Topic Selects a recent or current
incident from the public record
that will support the creation of
an information technology
incident report with reason for
selecting.
Does not select a recent or
current incident from the public
record that will support the
creation of an information
technology incident report with
reason for selecting.
100
Earned Total 100%
IT 659 Final Project Guidelines and Rubric
Overview
The final project for this course is the creation of an information technology incident report.
Successful management in information technology requires knowledge of the legal and ethical environment. Globalization, increasing commerce between
graphical locations brought on by the ability to connect online, and the increasing mix of cultures bring additional complexity to the considerations of law and
ethics in cyber security and information technology (IT). The final project for this course will require you to research a recent (within the last five years) incident
or event in the field of IT, ecommerce, or cyber security in the context of the legal and ethical standards of that time period. You will identify the issues the
organization(s) had, recommend changes for that organization(s), and write a report that highlights your recent analysis, findings, and recommendations.
The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Modules Two, Four, and Seven. The final submission will occur in Module Nine.
In this assignment you will demonstrate your mastery of the following course outcomes:
Apply cyberlaw principles appropriately to everyday circumstances, business models, and information technology issues
Assess legal and compliance issues related to information technology for their impact to organizations, society, and culture
Propose relevant changes to organizations and standards that ensure legal and ethical cyber practice and behavior
Determine the impact of various legal cases on compliance and regulatory standards within information technology
Analyze the impact of various cultural attitudes and legal issues related to global communication on information technology
Prompt
You will select a recent or current incident from the public record and analyze the case to identify the issues that led to the incident. What recommendations can
you make to ensure the incident will not occur again? What were the results of the incident? And, finally, what were the cultural, societal, or global impacts of
this case and the subsequent changes to the legal environment? Please note: Your selection will need to be submitted and approved by the instructor.
Specifically the following critical elements must be addressed:
I. Introduction
a) Apply cyberlaw and security principles to the business, ecommerce, and ecommunication industries. What purpose does the application of
cyber principles serve for these industries?
b) Summarize the selected case, including the necessary organizational information, industry, problem, and time period of the incident.
II. Case Analysis
a) Analyze the case to determine the ethical issues within the organization that may have led to the incident. What are these issues and why do
you credit them for the incident?
b) Determine legal compliance issues within the organization that may have led to the incident or could lead to future incidents. Were there any
legal and ethical standards in existence at the time that were not followed by the organization? What were these issues and how did they impact
the organization?
c) Determine the societal and cultural impact of these compliance issues. Some things to consider in your assessment include specific targeting of
demographic groups, victimization of certain customers, and so on.
III. Incident Impact
a) Determine the impact this incident may have had on the ethical and legal IT regulations of the time. If there were no direct results of this case,
what may have been the indirect impact and/or what was the impact of similar cases? For example, what regulatory changes resu lted from this
or similar cases? What is your reasoning?
b) Determine the connection between the industry standards and the standards in existence for information technology. Specifically, determine if
the organization was lacking in either industryspecific or ITspecific alignment with regulations that may have contributed to the incident, and
provide support for your conclusions. For example, misalignment with HIPAA laws in healthcare is an industryspecific deviation from standards.
c) Cultural Impact: Analyze the influence this incident may have had on various cultural attitudes toward IT and cyber communication or
commerce. In other words, how could this incident impact views of information technology use?
IV. Recommendations
a) Propose relevant changes to the organization that may have prevented the incident. How would these changes have helped to prevent the
occurrence?
b) Propose reasonable ethical guidelines that could have helped prevent the incident and that might help the organization prevent future
incidents.
c) Propose changes to the standards external to the organization that might have helped prevent the incident. This can include changes to
regulations and regulatory and ethical standards that might exist today but did not exist or were not properly delivered at the time of the
incident. Be sure to support your conclusions.
V. Global Considerations
a) What international compliance standards (either at the time of the incident or today) would have been relevant to the incident, and how? If
your company is not global, imagine that is.
b) Analyze the impact of the incident on global communication and commerce (again, if your organization is not global, imagine otherwise). In
other words, what impact did (or would) the incident have on views and use of information technology and communication in global contexts?
c) Global Technology Environment: Based on your research and analysis of this case, determine the global legal and regulatory impacts this case
had on the information technology overall. In other words, determine the relationship between this case and the global regulatory standards
that are now in place, will be put in place shortly, or should be put in place as a result of this or related incident(s).
VI. Summary: Given your knowledge of cyberlaw principles, ethical needs, and legal compliance standards, summarize how you applied these principles to
your analysis of the case. In other words, how did you apply cyberlaw principles to the circumstances, business model, and IT issues that the selected
organization faced?
Milestones
Milestone One: Introduction
InModule Two, you will submit the introduction. In this assignment you will identify the cyberlaw principles and explain how each applies to the business, e
commerce, orecommunication industries chosen.Describethe purpose of the applicationof the principles serve for the industry. Youwill alsoneed to include
the necessary organizational information, industry, problem, and the time period of the incident that occurred. The format of this assignment will be a one to
twopage Word document. This milestone is graded with the Milestone One Rubric.
Milestone Two: Case Analysis and Incident Impact
InModule Four, you will submit the Case Analysis and Incident Impacts. In this assignment you will analyze the ethical issues and determine the legal
compliance issues within the organization as well as the social and cultural impacts of these compliance issues. You will be expected to address the impact the
incident may have had on the ethical and legal IT regulations at the time. The connection between the industry standards and the standards for informational
technology should be determined, as well as the influence of the cultural impact to IT and cyber communication or commerce. The format of this assignment will
be a three to fivepage Word document. This milestone is graded with the Milestone Two Rubric.
Milestone Three: Recommendations and Global Considerations
InModule Seven, you will submit the Recommendations and Global Considerations. In this assignment you will suggest relevant changes to the organization
itself and changes to the ethical guidelines that could have prevented the incident. Standards external to the organization that may have helped prevent the
incident should also be proposed. This assignment will also address international compliance standards and how they would have been relevant to the incident.
The impact of the incident onglobal communicationandcommercewillbe analyzed, aswellas the impact on the global technology environment. The format of
this assignment will be a three to fivepage Word document. This milestone is graded with the Milestone Three Rubric.
Final Submission: Information Technology Incident Report and Summary
InModule Nine, you will submit your Information Technology Incident Report along with a summary explaining how you applied the principles to your analysis
of the case. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback
gained throughout the course. This submission will be graded using the Final Product Rubric.
Deliverables
Milestone Deliverable Module Due Grading
1 Introduction Two Graded separately; Milestone One Rubric
2 Case Analysis and Incident Impact Four Graded separately; Milestone Two Rubric
3 Recommendations and Global
Considerations
Seven Graded separately; Milestone Three Rubric
Final Submission: Information Technology
Incident Report and Summary
Nine Graded separately; Final Product Rubric
Final Product Rubric
Guidelines for Submission: Your report should be long enough to contain all relevant information, reasoning, and research. It should be formatted logically and
written in a professional manner, following APA guidelines.
Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value
Introduction:
Application of Cyber
Principles
Meets “Proficient” criteria and
evidences keen insight into the
nuanced purpose of cyber
principles in multiple industries
Accurately applies cyber
principles to the business, e
commerce, and e
communication industries to
explain the purpose served by
the principles
Applies cyber principles to
business, ecommerce, and e
communication but with gaps in
accuracy or without detail
regarding the purpose served
by these principles
Does not apply cyber principles
to business, ecommerce, and
ecommunication
6.5
Introduction:
Summary of Case
Meets “Proficient” criteria, and
quality of introductions
establishes expertise in the
discipline
Comprehensively and concisely
introduces the selected incident
with necessary organizational
information, the industry type,
the problem, and the time
period of occurrence
Introduces the selected incident
with organizational information,
the industry type, the problem,
and the time period of
occurrence, but lacks necessary
detail or includes superfluous
information
Does not introduce the selected
incident with organizational
information, the industry type,
the problem, and the time
period of occurrence
6.5
Case Analysis: Ethical
Issues
Meets “Proficient” criteria, and
reasoning evidences strong
ethical criteria or keen analytic
skil ls regarding organizational
ethics
Accurately analyzes the case to
determine which ethical issues
within the organization led to
the incident, and why
Analyzes the case to determine
which ethical issues within the
organization led to the incident,
and why, but with gaps in
accuracy or detail
Does not analyze the case to
determine which ethical issues
within the organization led to
the incident, and why
6.5
Case Analysis: Legal
Compliance
Meets “Proficient” criteria and
evidences keen understanding
of legal criteria of the time
Accurately determines the legal
compliance issues within the
organization that led to this
incident and could have
resulted in other issues
Determines the legal
compliance issues within the
organization that led to this
incident and could have
resulted in other issues, but
with gaps in accuracy or detail
Does not determine the legal
compliance issues within the
organization that led to this
incident and could have
resulted in other issues
6.5
Case Analysis:
Societal and Cultural
Impact
Meets “Proficient” criteria and
evidences deep insight into
unexpected, hidden, or complex
impacts on culture and society
Comprehensively and
accurately determines the
societal and cultural impacts of
the legal and ethical compliance
issues
Determines the societal and
cultural impacts of the legal and
ethical compliance issues, but
with gaps in accuracy or detail
Does not determine the societal
and cultural impacts of the legal
and ethical compliance issues
6.5
Incident Impact:
Regulations
Meets “Proficient” criteria and
evidences keen understanding
of ethical and legal regulations
following the incident
Accurately determines the
direct or indirect impact of this
or similar case on ethical and
legal IT regulations at the time
Determines the direct or
indirect impact of this or similar
case on ethical and legal IT
regulations at the time, but with
gaps in accuracy or logical
reasoning
Does not determine the direct
or indirect impact of this or
similar case on ethical and legal
IT regulations at the time
6.5
Incident Impact:
Standards
Meets “Proficient” criteria and
evidences keen insight into
understanding and applying IT
and industryspecific standards
for information security
Accurately determines the
connection between industry
standards and standards in
existence for information
technology with logical
reasoning and support
Determines the connection
between the industry standards
and the standards in existence
for information technology, but
with gaps in accuracy or gaps in
reasoning and support
Does not determine the
connection between the
industry standards and the
standards in existence for
information technology
6.5
Incident Impact:
Cultural Impact
Meets “Proficient” criteria and
evidences keen insight into
nuances of various cultural
interpretations and views
toward technology and cyber
security
Accurately analyzes the
influence this incident may have
had on various cultural
attitudes toward IT and cyber
communication or commerce
Analyzes the influence this
incident may have had on
various cultural attitudes
toward IT and cyber
communication or commerce,
but with gaps in accuracy or
detail
Does not analyze the influence
this incident may have had on
various cultural attitudes
toward IT and cyber
communication or commerce
6.5
Recommendations:
Organizational
Changes
Meets “Proficient” criteria and
evidences keen insight into
solving organizational issues
Proposes and defends relevant
changes to the organization that
would have helped prevent the
incident
Proposes and defends changes
to the organization, but changes
are not relevant or not
comprehensively defended, or
would not have helped prevent
the incident
Does not propose and defend
changes to the organization
6.5
Recommendations:
Ethical Guidelines
Meets “Proficient” criteria and
evidences keen insight into the
nuanced ethical standard needs
of organizations
Proposes reasonable ethical
guidelines that could have
helped prevent the incident and
that might help prevent future
incidents within the
organization
Proposes ethical guidelines, but
guidelines are not reasonable or
would not have helped prevent
the incident or would not
prevent future incidents within
the organization
Does not propose ethical
guidelines for the organization
6.5
Recommendations:
External Standards
Meets “Proficient” criteria and
evidences keen insight into the
nuanced considerations
required when recommending
external standards for
organizations to follow
Proposes external standards
that may have helped prevent
the incident, with relevant and
logical support
Proposes external standards
with support, but the standards
would not have helped prevent
the incident, or the support is
not relevant or logical given the
case
Does not propose external
standards with support
6.5
Global
Considerations:
International
Compliance
Meets “Proficient” criteria and
evidences keen insight into the
application of international
standards
Accurately identifies and
explains in detail the
international compliance
standards relevant to the
incident
Identifies and explains the
international compliance
standards relevant to the
incident, but with gaps in
accuracy or detail
Does not identify and explain
the international compliance
standards relevant to the
incident
6.5
Global
Considerations:
Cultural Impacts
Meets “Proficient” criteria and
evidences keen insight into
cultural perspectives toward
cyber communication and
commerce within a global
context
Accurately analyzes the impact
of the incident on cyber
communication and commerce
from the larger cultural
perspective
Analyzes the impact of the
incident on cyber
communication and commerce
globally, but not in terms of the
larger cultural perspective or
with gaps in accuracy
Does not analyze the impact of
the incident on cyber
communication and commerce
globally
6.5
Global
Considerations:
Global Technology
Environment
Meets “Proficient” criteria and
evidences a nuanced, indepth
understandingof global legal
impacts of related cases
Analyzes in detail the global
legal and regulatory impact of
this or similar cases to
determine global laws and
regulations that resulted or
should have resulted
Analyzes the global legal and
regulatory impact of this or
similar cases to determine
global laws and regulations that
resulted or should have
resulted, but with gaps in detail
Does not analyze the global
legal and regulatory impact of
this or similar cases to
determine global laws and
regulations that resulted or
should have resulted
6.5
Summary
Meets “Proficient” criteria and
evidences keen insight into
appropriate application of
knowledge to organizations
Concisely summarizes and
reflects on how knowledge of
cyberlaw principles, ethical
needs, and legal compliance
standards were applied to the
selected case
Summarizes and reflects on
how knowledge of cyberlaw
principles, ethical needs, and
legal compliance standards
were applied to the selected
case
Does not summarize and reflect
on how knowledge of cyberlaw
principles, ethical needs, and
legal compliance standards
were applied to the selected
case
6.5
Articulation of
Response
Submission is free of errors
related to citations, grammar,
spelling, syntax, and
organization and is presented in
a professional and easytoread
format
Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
Submission has major errors
related to citations, grammar,
spelling, syntax, or organization
that negatively impact
readability and articulation of
main ideas
Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas
2.5
Earned Total 100%