I accept receiving promo codes and other educational info from this company.
Get My Code
Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.
This 7-page paper investigates the need for information assurance and information security in a healthcare organization's information system. Bibliography lists 4 sources.
This 10 page paper considers the following statement. "Security in the world of e-commerce is focused on protecting information - information about accounts, credit card numbers, social security numbers, and identities. It is not about hardware or physical access. But there is a built-in paradox; e-Commerce systems must be open enough to be inviting to customers and users, and at the same time the systems must be difficult to penetrate to those who would steal the information. Achieving the balance that satisfies those opposing needs is the challenge of security in the e-Commerce world. Too much security pushes away the people you have invited; too little and valuable information can be stolen". The bibliography cites 7 sources.
An 11 page paper discussing the risk to which personal information is subjected at home. Home is the primary repository for personal information for most people. The paper provides an inventory of the types of personal information held in a single home that also houses a business and a graduate student, followed by assessment of the risks to that information and a security plan intended to control those risks. The plan follows that of the “Risk Management Guide for Information Technology Systems,” Special Publication 800-30 of the National Institutes of Standards and Technology (NISTA), identifying information assets; assigning a loss value to each; and identifying vulnerabilities and the likelihood of each to arrive at a risk-rating factor for each item. The paper concludes with a security plan for those items at greatest risk. Bibliography lists 2 sources.
This 11 page paper looks at the use of information management systems by Sony. The paper examines the company background before looking at the way information is used, including management information systems and the creation of a division to deal specifically with information issues. The bibliography cites 4 sources.
This 14 page paper is written in three parts. Each part of the paper looks at a different type of technology, outlining the purpose and the motivation for it's' existence, how it functions, how it is used by organizations, the market and the way it may evolve in the future. The technologies discussed include information technology security, focusing on cryptography, web services and database management systems. The bibliography cites 15 sources.