Review the following articles: "A Framework for Health Care Information Assurance and Policy Compliance" by Sherrie Drye Cannoy and A.F. Salam "Information Assurance and Corporate Strategy" by Elsp
Points: 200 | Project Deliverable 6: Information Assurance Compliance with Government Regulations | |||
Criteria | Unacceptable Below 70% F | Fair 70-79% C | Proficient 80-89% B | Exemplary 90-100% A |
1. Discuss which employees and organizations have a deeper-level of information assurance (IA) policy compliance. Weight: 10% | Did not submit or incompletely discussed which employees and organizations have a deeper-level of information assurance (IA) policy compliance. | Partially discussedwhich employees and organizations have a deeper-level of information assurance (IA) policy compliance. | Satisfactorily discussed which employees and organizations have a deeper-level of information assurance (IA) policy compliance. | Thoroughly discussed which employees and organizations have a deeper-level of information assurance (IA) policy compliance. |
2. Examine the factors that increased the individual’s level of propensity for compliance. | Did not submit or incompletely examined the factors that increased the individual’s level of propensity for compliance. | Partially examinedthe factors that increased the individual’s level of propensity for compliance. | Satisfactorily examined the factors that increased the individual’s level of propensity for compliance. | Thoroughly examined the factors that increased the individual’s level of propensity for compliance. |
3. Determine the internal and external factors affecting IA policy compliance. Weight: 15% | Did not submit or incompletely determined the internal and external factors affecting IA policy compliance. | Partially determinedthe internal and external factors affecting IA policy compliance. | Satisfactorily determined the internal and external factors affecting IA policy compliance. | Thoroughly determined the internal and external factors affecting IA policy compliance. |
4. Ascertain which of the organizational requirements poses difficulty in adopting technical features to enhance security policy. Weight: 15% | Did not submit or incompletely ascertained which of the organizational requirements poses difficulty in adopting technical features to enhance security policy. | Partially ascertained which of the organizational requirements poses difficulty in adopting technical features to enhance security policy. | Satisfactorily ascertained which of the organizational requirements poses difficulty in adopting technical features to enhance security policy. | Thoroughly ascertained which of the organizational requirements poses difficulty in adopting technical features to enhance security policy. |
5. Discuss factors related to IA and policy compliance that are affected by government regulations. Weight: 15% | Did not submit or incompletely discussed factors related to IA and policy compliance that are affected by government regulations. | Partially discussedfactors related to IA and policy compliance that are affected by government regulations. | Satisfactorily discussed factors related to IA and policy compliance that are affected by government regulations. | Thoroughly discussed factors related to IA and policy compliance that are affected by government regulations. |
6. Suggest a framework that could be used to address the issues described in the “Five Most Common Cybersecurity Mistakes” article, based on the “Audit Program for Application Systems for Auditing”. Weight: 15% | Did not submit or incompletely suggested a framework that could be used to address the issues described in the “Five Most Common Cybersecurity Mistakes” article, based on the “Audit Program for Application Systems for Auditing”. | Partially suggesteda framework that could be used to address the issues described in the “Five Most Common Cybersecurity Mistakes” article, based on the “Audit Program for Application Systems for Auditing”. | Satisfactorily suggested a framework that could be used to address the issues described in the “Five Most Common Cybersecurity Mistakes” article, based on the “Audit Program for Application Systems for Auditing”. | Thoroughly suggested a framework that could be used to address the issues described in the “Five Most Common Cybersecurity Mistakes” article, based on the “Audit Program for Application Systems for Auditing”. |
7. 3 references Weight: 5% | No references provided. | Does not meet the required number of references; some or all references poor quality choices. | Meets number of required references; all references high quality choices. | Exceeds number of required references; all references high quality choices. |
8. Clarity, writing mechanics, and formatting requirements Weight: 10% | More than 6 errors present | 5-6 errors present | 3-4 errors present | 0-2 errors present |