Course: InfoTech in a Global Economy
LATE SUBMISSION WILL NOT BE ACCEPTED BY PROF.
Due Date – 1 day
Final Research Paper:
The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). Start your paper with an introductory paragraph.
- Prompt 1 Blockchain (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future.
University library source Citation: attached image doc.
- Prompt 2 Big Data (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? How does big data affect a global economy.
University library source Citation: Marr, Bernard. Data Strategy : How to Profit from a World of Big Data, Analytics and the Internet of Things . London: Kogan Page, 2017. Print.
- Prompt 3 Government and Policies (2-3 pages): Discuss the role government plays in a global economy. Also, look at what policies are currently in place and then discussion what policies should be put in place.
Conclude your paper with a detailed conclusion section (1-2 pages long).
Textbook, Chapter 1: Federal Cybersecurity Research and Development Strategic Plan: Ensuring Prosperity and National Security.
STOYKOV, S.; DIMITROVA, S.; MARINOV, R. The Development of Educational Capacity of Human Resources in the Field of Security – Main Priority of National Security. 2019 International Conference on Creative Business for Smart and Sustainable Growth (CREBUS), Creative Business for Smart and Sustainable Growth (CREBUS),2019 International Conference on, [s. l.], p. 1–5, 2019. DOI 10.1109/CREBUS.2019.8840062.
KUHN, M. L. 147 Million Social Security Numbers for Sale: Developing Data Protection Legislation After Mass Cybersecurity Breaches. Iowa Law Review, [s. l.], v. 104, n. 1, p. 417–445, 2018.
Textbook, Chapter 2: Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Programs.
Shaverdian, P. (2019). Start With Trust: Utilizing Blockchain to Resolve the Third-Party Data Breach Problem. UCLA Law Review, 66(5), 1242–1288.
CHATFIELD, A. T. et al. Crowdsourced cybersecurity innovation: The case of the Pentagon’s vulnerability reward program. Information Polity: The International Journal of Government & Democracy in the Information Age, [s. l.], v. 23, n. 2, p. 177–194, 2018.
- Be approximately seven to ten pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Required Books & Resources
Title: Entrepreneurship in the Global Economy ISBN: 9781139536660Authors: Henry Kressel, Thomas V. LentoPublisher: Cambridge University PressPublication Date: 2012-07-19
Title: Federal Cybersecurity ISBN: 9781634853965Authors: Cory MedinaPublication Date: 2016-01-01
Title: Mastering Blockchain ISBN: 9781787125445Authors: Imran BashirPublication Date: 2017-04-28
Title: Global Technology ISBN: 9780309185059Authors: Steve Olson, National Academy of EngineeringPublisher: National Academies PressPublication Date: 2011-02-08
Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.