Project Combination Plus Summary
IT 659 Final Project Guidelines and Rubric Overview The final project for this course is the creation of a n information technology incident report . Successful management in information technology requires knowledge of the legal and ethical environment. G lobalization, increasing commerce between graphical locations brought on by the ability to connect online, and the i ncreasing mix of cultures bring additional complexity to the considerations of law and ethics in cyber security and information technology ( IT). The final project for this course will require you to research a recent (within the last five years) incident or event in the field of IT, e -commerce, or cyber security in the context of the legal and ethical standards of that time period. You will id entify the issues the organization(s) had, recommend changes for that organization(s), and write a report that highlights your recent analysis, fin dings, and recommendations. The project is divided in to three m ilestones , which will be submitted at variou s points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Two, Four , and Seven. The final submission will occur in Module Nine. In this assignment you will demonstrate your mast ery of the following course outcomes: Apply cyberlaw principles appropriately to everyday circumstances, business models, and information technology issues Assess legal and compliance issues related to information technology for their impact to organiza tions, society, and culture Propose relevant changes to organizations and standards that ensure legal and ethical cyber practice and behavior Determine the impact of various legal cases on compliance and regulatory standards within information technology Analyze the impact of various cultural attitudes and legal issues related to global communication on information technology Prompt You will select a recent or current incident from the public record and analyze the case to identify the issues that led to the incident. What recommendations can you make to ensure the incident will not occur again ? What were the results of the incident? And, finally, what were the cultural, societal, or global impacts of this case and the subsequent changes to the legal envi ronment? Please note: Your selection will need to be submitted and approved by the instructor. Specifically the following critical elements must be addressed: I. Introduction a) Apply cyberlaw and security principles to the business, e -commerce, and e -communic ation industries. What purpose does the application of cyber principles serve for these industries? b) Summarize the selected case , including the necessary organizational information, industry, problem, and time period of the incident. II. Case Analysis a) Analyze the case to determine the ethical issues within the organization that may have led to the incident. What are these issues and why do you credit them for the incident? b) Determine legal compliance issues within the organiza tion that may have led to the incident or could lead to future incidents. Were there any legal and ethical standards in existence at the time that were not followed by the organization? What were these issues and h ow did they impact the organization? c) Determine the societal and cultural impact of these compliance issues. Some things to consider in your assessment include specific targeting of demographic groups, victimization of certain customers, and so on. III. Incident Impact a) Determine the impact this incident may have had on the ethical and legal IT regulations of the time. If there were no direct results of this case, what may have been the indirect impact and/or what was the impact of similar cases? For example, what regulatory chang es resulted from this or similar cases? What is your reasoning? b) Determine the connection between the industry standards and the standards in existence for information technology. Specifically, determine if the organization was lacking in either industry -specific or IT -specific alignment with regulations that may have contributed to the incident, and provide support for your conclusions. For example, misalignment with HIPAA laws in healthcare is an industry -specific deviation from standards. c) Cultural Impact : Analyze the influence this incident may have had on various cultural attitudes toward IT and cyber communication or commerce. In other words, how could this incident impact views of information technology use ? IV. Recommen dations a) Propose relevant changes to the organization that may have prevented the incident. How would these changes have helped to prevent the occurrence? b) Propose reasonable ethical guidelines that could have helped prevent the incident and that might help the organization prevent future incidents . c) Propose changes to the standards external to the organization that might have helped prevent the incident. This can include changes to regulations and regulatory and ethical standards that might exist today but did not exist or were not properly delivered at the time of the incident. Be sure to support your conclusions . V. Global Considerations a) What international compliance standards (either at the time of the incident or today) wo uld have been relevant to the incident, and how? If your company is not global, imagine that is . b) Analyze the impact of the incident on global communication and commerce (again, if your organization is not global, imagine otherwise). In other wo rds, what impact did (or would) the incident have on views and use of information technology and communication in global cont exts? c) Global Technology Environment : Based on your research and analysis of this case, determine the global legal and r egulatory impacts this case had on the information technology overall. In other words, determine the relationship between this case and the global regula tory standards that are now in place, will be put in place shortly, or should be put in place as a resu lt of this or related incident(s). VI. Summary : Given your knowledge of cyberlaw principles, ethical needs, and legal compliance standards, summarize how you applied these principles to your analysis of the case. In other words, how did you apply cyberlaw principles to the circumstances, business model, and IT issues that the selected organization faced ? Milestones Milestone One : Introduction In Module Two , you will submit the introduction . In this assignment you will i dentify the cybe rlaw principles and explain how each applie s to the business, e - commerce, or e-communication industries chosen . Describe the purpose of the application of the pri nciples serve for the industry . You will also need to include the necessary organizational inf ormation, industry, problem, and the time period of the incident that occurred. The format of this assignment will be a one - to two -page Word document. Thi s m ilestone is graded with the Milestone One Rubric . Milestone Two : Case Analysis and Incident Im pact In Module Four , you will submit the Case Analysis and Incident Impacts . In this assignment you will analyze the ethical issues and determine the legal compliance issues within the organization as well as the social and cultural impacts of these compli ance issues. You will be ex pected to address the impact th e incident may have had on the ethical and legal IT reg ulations at the time . The connection between the industry standards and the standards for informational technology should be determined , as w ell as th e influence of the cultural impact to IT and cyber communication or c ommerce. The format of this assignment will be a three - to five -page Word document. This milestone is graded with the Milestone Two Rubric. Milestone Three : Recommendations and Global Considerations In Module Seven , you will submit the Recommendations and Global Considerations. In this assignment you will suggest relevant changes to the organization itself and changes to the ethical guidelines that could have prevented the incide nt. Standards external to the organization that may have helped prevent the incident should also be proposed. This assignment will also address international compliance standards and how they would have been relevant to the incident. The impact of the inc ident on global communication and commerce will be analyzed , as well as the impact on the global technology environment. The format of this assignment will be a three - to five -page Word document. This milestone is graded with the Milestone Three Rubric. Final Submission : Information Technology Incident Report and Summary In Module Nine , you will submit your Information Technology Incident Report along with a summary explaining how you applied the principles to your analysis of the case . It should be a com plete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded using the Final Product Rubric . Deliverables Milestone De liverable Module Due Grading 1 Introduction Two Graded separately; Milestone One Rubric 2 Case Analysis and Incident Impact Four Graded separately; Milestone Two R ubric 3 Recommendations and Global Considerations Seven Graded separately; Milestone Thre e Rubric Final Submission: Information Technology Incident Report and Summary Nine Graded separately; Final Product Rubric Final Product Rubric Guidelines for Submission: Your report should be long enough to contain all relevant information, reasoning , and research. It should be formatted logically and written in a professional manner, following APA guidelines. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For mo re information, review these instructions . Critical Elements Exemplary ( 100% ) Proficient ( 90% ) Needs Improvement ( 70% ) Not Evide nt ( 0% ) Value Introduction: Application of Cyber Principles Meets “Proficient” criteria and evidences keen insight into the nuanced purpose of cyber principles in multiple industries Accurately applies cyber principles to the business, e - comm erce, and e - communication industries to explain the purpose served by the principles Applies cyber principles to business, e -commerce, and e - communication but with gaps in accuracy or without detail regarding the purpose served by these principles Does not apply cyber principles to business, e -commerce, and e-communication 6.5 Introduction:
Summary of Case Meets “Proficient” criteria , and quality of introductions establishes expertise in the discipline Comprehensively and concisely introduces t he selected incident with necessary organizational information, the industry type, the problem, and the time period of occurrence Introduces the selected incident with organizational information, the industry type, the problem, and the time period of occur rence , but lacks necessary detail or includes superfluous information Does not introduce the selected incident with organizational information, the industry type, the problem, and the time period of occurrence 6.5 Case Analysis: Ethical Issues Meets “Proficient” criteria , and reasoning evidences strong ethical criteria or keen analytic skills regarding organizational ethics Accurately analyzes the case to determine which ethical issues within the organization led to the incident, and why Analy zes the case to determine which ethical issues within the organization led to the incident, and why, but with gaps in accuracy or detail Does not analyze the case to determine which ethical issues within the organization led to the incident, and why 6.5 Case Analysis: Legal Compliance Meets “Proficient” criteria and evidences keen understanding of legal criteria of the time Accurately determines the legal compliance issues within the organization that led to this incident and could have resulte d in other issues Determines the legal compliance issues within the organization that led to this incident and could have resulted in other issues , but with gaps in accuracy or detail Does not determine the legal compliance issues within the organization t hat led to this incident and could have resulted in other issues 6.5 Case Analysis: Societal and Cultural Impact Meets “Proficient” criteria and evidences deep insight into unexpected, hidden, or complex impacts on culture and society Comprehe nsively and accurately determines the societal and cultural impacts of the legal and ethical compliance issues Determines the societal and cultural impacts of the legal and ethical compliance issues , but with gaps in accuracy or detail Does not determine the societal and cultural impacts of the legal and ethical compliance issues 6.5 Incident Impact:
Regulations Meets “Proficient” criteria and evidences keen understanding of ethical and legal regulations following the incident Accurately deter mines the direct or indirect impact of this or similar case on ethical and legal IT regulations at the time Determines the direct or indirect impact of this or similar case on ethical and legal IT regulations at the time , but with gaps in accuracy or logic al reasoning Does not determine the direct or indirect impact of this or similar case on ethical and legal IT regulations at the time 6.5 Incident Impact: Standards Meets “Proficient” criteria and evidences keen insight into understanding and applying IT and industry -specific standards for information security Accurately determines the connection between industry standards and standards in existence for information technology with logical reasoning and support Determines the connection between the industry standards and the standards in existence for information technology, but with gaps in accuracy or gaps in reasoning and support Does not determine the connection between the industry standards and the standards in existence for information tec hnology 6.5 Incident Impact:
Cultural Impact Meets “Proficient” criteria and evidences keen insight into nuances of various cultural interpretations and views toward technology and cyber security Accurately analyzes the influence this incident may have had on various cultural attitudes toward IT and cyber communication or commerce Analyzes the influence this incident may have had on various cultural attitudes toward IT and cyber communication or commerce, but with gaps in accuracy or detail Doe s not analyze the influence this incident may have had on various cultural attitudes toward IT and cyber communication or commerce 6.5 Recommendations: Organizational Changes Meets “Proficient” criteria and evidences keen insight into solving organizational issues Proposes and defends relevant changes to the organization that would have helped prevent the incident Proposes and defends changes to the organization, but changes are not relevant or not comprehensively defended, or would not have he lped prevent the incident Does not propose and defend changes to the organization 6.5 Recommendations:
Ethical Guidelines Meets “Proficient” criteria and evidences keen insight into the nuanced ethical standard needs of organizations Proposes reasonable ethical guidelines that could have helped prevent the incident and that might help prevent future incidents within the organization Proposes ethical guidelines, but guidelines are not reasonable or would not have helped prevent the incident or w ould not prevent future incidents within the organization Does not propose ethical guidelines for the organization 6.5 Recommendations:
External Standards Meets “Proficient” criteria and evidences keen insight into the nuanced considerations required when recommending external standards for organizations to follow Proposes external standards that may have helped prevent the incident, with relevant and logical support Proposes external standards with support, but the standards would not have hel ped prevent the incident, or the support is not relevant or logical given the case Does not propose external standards with support 6.5 Global Considerations:
International Compliance Meets “Proficient” criteria and evidences keen insight into the application of international standards Accurately identifies and explains in detail the international compliance standards relevant to the incident Identifies and explains the international compliance standards relevant to the incident, but with gaps in accuracy or detail Does not identify and explain the international compliance standards relevant to the incident 6.5 Global Considerations:
Cultural Impacts Meets “Proficient” criteria and evidences keen insight into cultural perspectives t oward cyber communication and commerce within a global context Accurately analyzes the impact of the incident on cyber communication and commerce from the larger cultural perspective Analyzes the impact of the incident on cyber communication and commerce globally, but not in terms of the larger cultural perspective or with gaps in accuracy Does not analyze the impact of the incident on cyber communication and commerce globally 6.5 Global Considerations:
Global Technology Environment Meets “Prof icient” criteria and evidences a nuanced, in -depth understanding of global legal impacts of related cases Analyzes in detail the global legal and regulatory impact of this or similar cases to determine global laws and regulations that resulted or should ha ve resulted Analyzes the global legal and regulatory impact of this or similar cases to determine global laws and regulations that resulted or should have resulted, but with gaps in detail Does not analyze the global legal and regulatory impact of this or similar cases to determine global laws and regulations that resulted or should have resulted 6.5 Summary Meets “Proficient” criteria and evidences keen insight into appropriate application of knowledge to organizations Concisely summarizes a nd reflects on how knowledge of cyberlaw principles, ethical needs, and legal compliance standards were applied to the selected case Summarizes and reflects on how knowledge of cyberlaw principles, ethical needs, and legal compliance standards were applied to the selected case Does not summarize and reflect on how knowledge of cyberlaw principles, ethical needs, and legal compliance standards were applied to the selected case 6.5 Articulation of Response Submission is free of errors related to citations, g rammar, spelling, syntax, and organization and is presented in a professional and easy -to-read format Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 2.5 Earned Total 100%