6 Page work – IT –
Our reading by Arinze and Ezema discusses Web 2.0. In our second discussion forum this week, please discuss how you think Web 2.0 has changed the behavior of Internet users. Do you feel the behavior change is for the good or are there disadvantages? Please discuss your thoughts on Web 2.0 including concepts of privacy and social media in a substantive, well-researched discussion thread.
Write 250 words
At least one scholarly source should be used in the initial discussion thread.
Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA).
According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.
For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. Remember to critical respond appropriately to two other leaners for full points.
Write 250 words
At least one scholarly source should be used in the initial discussion thread.
Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
Week 4 Research Paper: Mastering Blockchain
Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing.
You should use the UC library and/or Google Scholar to find these types of articles (https://scholar.google.com/ )
Once you find the article, you will read it and write a review of it. This is considered a research article review.
Your paper should meet these requirements:
Be approximately four to six pages in length, not including the required cover page and reference page.
Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.