Review the following articles: "A Framework for Health Care Information Assurance and Policy Compliance" by Sherrie Drye Cannoy and A.F. Salam "Information Assurance and Corporate Strategy" by Elsp

Points: 200

Project Deliverable 6: Information Assurance Compliance with Government Regulations

Criteria

Unacceptable

Below 70% F

Fair

70-79% C

Proficient

80-89% B

Exemplary

90-100% A

1. Discuss which employees and organizations have a deeper-level of information assurance (IA) policy compliance.

Weight: 10%

Did not submit or incompletely discussed which employees and organizations have a deeper-level of information assurance (IA) policy compliance.

Partially discussedwhich employees and organizations have a deeper-level of information assurance (IA) policy compliance.

Satisfactorily discussed which employees and organizations have a deeper-level of information assurance (IA) policy compliance.

Thoroughly discussed which employees and organizations have a deeper-level of information assurance (IA) policy compliance.

2. Examine the factors that increased the individual’s level of propensity for compliance.
Weight: 15%

Did not submit or incompletely examined the factors that increased the individual’s level of propensity for compliance.

Partially examinedthe factors that increased the individual’s level of propensity for compliance.

Satisfactorily examined the factors that increased the individual’s level of propensity for compliance.

Thoroughly examined the factors that increased the individual’s level of propensity for compliance.

3. Determine the internal and external factors affecting IA policy compliance.

Weight: 15%

Did not submit or incompletely determined the internal and external factors affecting IA policy compliance.

Partially determinedthe internal and external factors affecting IA policy compliance.

Satisfactorily determined the internal and external factors affecting IA policy compliance.

Thoroughly determined the internal and external factors affecting IA policy compliance.

4. Ascertain which of the organizational requirements poses difficulty in adopting technical features to enhance security policy.

Weight: 15%

Did not submit or incompletely ascertained which of the organizational requirements poses difficulty in adopting technical features to enhance security policy.

Partially ascertained which of the organizational requirements poses difficulty in adopting technical features to enhance security policy.

Satisfactorily ascertained which of the organizational requirements poses difficulty in adopting technical features to enhance security policy.

Thoroughly ascertained which of the organizational requirements poses difficulty in adopting technical features to enhance security policy.

5. Discuss factors related to IA and policy compliance that are affected by government regulations.

Weight: 15%

Did not submit or incompletely discussed factors related to IA and policy compliance that are affected by government regulations.

Partially discussedfactors related to IA and policy compliance that are affected by government regulations.

Satisfactorily discussed factors related to IA and policy compliance that are affected by government regulations.

Thoroughly discussed factors related to IA and policy compliance that are affected by government regulations.

6. Suggest a framework that could be used to address the issues described in the “Five Most Common Cybersecurity Mistakes” article, based on the “Audit Program for Application Systems for Auditing”.

Weight: 15%

Did not submit or incompletely suggested a framework that could be used to address the issues described in the “Five Most Common Cybersecurity Mistakes” article, based on the “Audit Program for Application Systems for Auditing”.

Partially suggesteda framework that could be used to address the issues described in the “Five Most Common Cybersecurity Mistakes” article, based on the “Audit Program for Application Systems for Auditing”.

Satisfactorily suggested a framework that could be used to address the issues described in the “Five Most Common Cybersecurity Mistakes” article, based on the “Audit Program for Application Systems for Auditing”.

Thoroughly suggested a framework that could be used to address the issues described in the “Five Most Common Cybersecurity Mistakes” article, based on the “Audit Program for Application Systems for Auditing”.

7. 3 references 

Weight: 5%

No references provided.

Does not meet the required number of references; some or all references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

8. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than 6 errors present

5-6 errors present

3-4 errors present

0-2 errors present