Expert answer:perform an analysis on one of the following:1. You are the IT administrator for your company. One of the employees discovers a loophole inthe security whereby the employees may access the personnel records of other employees inthe company. Personnel records include names, addresses, social security numbers,disciplinary actions, annual reviews, and salary information. You are working on a timesensitive project and do not fix the problem for two weeks. As you are fixing the problem, younote that several employees have accessed personnel records using the loophole.2. You are a programmer for a popular social media provider. The terms of service for thisprovider states that data posted on the networking site may be used for “testing, research,and/or data analysis….” The company has requested that you develop an algorithm that allowsthe company to filter posts to a person’s page based upon the mood that is conveyed. Forinstance, a person’s feed can be programmed to show only positive posts, or only negativeposts. This algorithm will then be used for a study being conducted by a local university withoutacquiring additional consent from the social media users other than the “terms of service” theyagree to upon signing up for the service.3. You are the CIO of a large national auto retailer. As a part of your service, you offer auto loansthrough your dealerships. This requires your company to collect and store personallyidentifiable information on your customers. Additionally, you store customer bank account andcredit card information so that customers can use automatic payment options for their loans.Recently, your company has been hacked and a significant number of client accounts havebeen breached. The CEO is demanding that the IT group handle this privately rather thanreporting the breach for fear that publicizing the information will have a negative effect onquarterly earnings.Your case study analysis should be a minimum of 1500 words, written in an appropriate format.References and in-text citations should be in APA format.Assignment RequirementsPointsPossibleStudent identifies stakeholders 0-10Student identifies risks, issues, problems, and consequences 0-10Student lists benefits 0-10Student identifies responsibilities of decision maker 0-10Student identifies rights of stakeholders 0-10Student explains the impact of the action options on stakeholders 0-10Identify sections of the ACM and/or IEEE codes that apply 0-10Identify all options 0-10Student selects the best option and explains why it is appropriate 0-20Total (Sum of all points) 0-100Points deducted for spelling, grammar, and/or APA errors
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more