1ids 403 Final Project Part Two Guidelines And Rubricoverview This Co ✓ Solved
1 IDS 403 Final Project Part Two Guidelines and Rubric Overview This course explores technology and its impact on the world around us. Technology influences society, and society influences technology, creating a feedback loop between them. We will critically analyze this feedback loop in this course through social, historical, and theoretical approaches to technology as well as the four general education lenses: history, humanities, natural and applied sciences, and social sciences. Each of these four perspectives allows us to better understand the construction of technology and its interrelation with society. From this enhanced understanding, you will be equipped to draw connections between technology, society, and your personal and professional lives, helping you to become a better-informed citizen who can make a positive difference in the world.
Issues and events in technology have a pervading influence on many aspects of society, and how they are dealt with requires diverse knowledge and perspectives to investigate and change. The purpose of this project is to examine a specific issue or event in technology and how it impacts individuals and society through the development of a critical analysis portfolio and a presentation in which you will demonstrate your ability to think critically, investigate, and communicate clearly. These skills are often necessary to achieve personal and professional goals across many disciplines. In this assignment, you will demonstrate your mastery of the following course outcomes: ï‚· Analyze the evolving role of technology in one’s discipline of study or chosen profession by investigating the influence of technology on modern culture [IDS-403-01] ï‚· Integrate interdisciplinary approaches for determining how technology affects modern identity in personal and professional contexts [IDS-403-02] ï‚· Explain how technology influences modern society by employing appropriate research strategies [IDS-403-03] ï‚· Recommend strategies for utilizing current technology to meet personal and professional goals [IDS-403-04] ï‚· Articulate informed viewpoints on how technology shapes the world and can influence change using effective communication skills [IDS-403-05] ï‚· Assess the impact of emerging technologies on societal issues for incorporating diverse perspectives and viewpoints informed by relevant literature and interpersonal experiences [IDS-403-06] Prompt For the second part of this project, you will develop a multimedia presentation in which you will have a chance to reflect on what you have learned about your issue or event, yourself, and society through analyzing its impact on technology.
You will also be able to apply your communication skills and integrate multimedia elements to communicate your message to an audience. In developing this presentation, you will be able to use your analyses from the first part of this project as a starting point. The reflective nature of this activity prompts you to dig deeper and consider the implications posed by the critical analysis of your issue or event in technology. How does studying technology affect how you understand yourself as well as the world around you? You’ll also be challenged to incorporate a dash of creativity to enhance your message.
2 Multimedia Presentation: For the second part of the project, you will create a multimedia presentation that incorporates audio narration and visuals to articulate how critically analyzing your issue or event in technology impacts your own framework of perception and ability to constructively engage in society. PowerPoint: You are required to include a combination of text and visuals in order to support your PowerPoint presentation. Use the Check File Compatibility With Earlier Versions and Are You Having Video or Audio Playback Issues? resources to help you check compatibility between versions of Office. Also, follow the instructions on the Microsoft Support page to compress your presentation as a zipped file.
You may upload a zipped file when submitting this assignment. Reducing the size of the PowerPoint presentation file by compressing it makes it easier for your instructor to download and grade. Microphone: While it is not necessary to purchase a microphone for this project, you will need to have access to a microphone to record the narration of the presentation. This could be the external microphone of your device, a set of earbuds, or borrowed from a friend. This assignment is graded on the content of the narration, and not the quality of the recording.
Specifically, the following critical elements must be addressed: I. Issue/Event: For this section of your presentation, you will introduce the issue/event and how it relates to issues of technology and any of the topics that have been discussed in the course. A. Using appropriate research strategies, describe a social or global issue/event that is related to issues of technology. [IDS-403-03] i. What is the origin of the issue? ii.
What is the issue about? B. Using appropriate research strategies, describe the impact of the issue or event on society. [IDS-403-03] i. Who is impacted by the issue? ii. What is important to know about them?
C. Using relevant research or diverse perspectives, assess how society impacts the chosen issue. [IDS-403-06] II. Yourself: This section of your presentation explores how studying technology influences your individual framework of perception with respect to your discipline of study or profession. A. How has critically analyzing your issue/event in technology informed your individual framework of perception?
Consider how it has altered the way you perceive the world. [IDS-403-05] B. How can critically analyzing technology influence your field of study or profession? How can studying technology inform your understanding of the next big topic of study in your field or profession in the next five to ten years? [IDS-403-01] III. Society: This section of your presentation explores how studying technology enhances your ability to engage constructively in society. A.
How does critically analyzing technology add value to how you interact with people and understand social or global issues or events? Supplement your reasoning with examples. [IDS-403-04] B. Recommend strategies for using this kind of critical analysis for meeting your personal and professional goals. What might this look like in your everyday life? Consider how technology can be used to address the day-to-day responsibilities or questions faced by practitioners in your field or discipline. [IDS-403-04] IV.
Conclusion: A. Using relevant research or diverse perspectives, assess the benefits and challenges of addressing issues in technology. [IDS-403-06] B. Explain how critically analyzing technology adds value to interactions with people in personal and professional contexts. [IDS-403-02] V. Presentation: Throughout your presentation, you will be assessed on your ability to use effective communication skills to deliver your message to your audience. A.
Construct your presentation in a way that ensures the audio and visual elements are logically organized in order to convey your message to your audience. [IDS-403-05] B. Provide supporting evidence in your presentation that supports the importance of the chosen issue or event and its impact within technology. [IDS-403-05] C. Develop the audio narration to logically flow with the presentation to articulate the importance of critically analyzing the chosen issue or event and its impact within technology. [IDS-403-05] Milestones Milestone Three: Technology, You, and Society In Module Five, you will draft the content that will inform your final multimedia presentation, due in Module Seven. This includes the global nature of technology and its impact on one’s individual framework of perception, one’s discipline of study, and society in general.
This milestone will be submitted as a presentation draft that includes speaker’s notes. This milestone will be graded with the Milestone Three Rubric. Final Project Part Two Submission: Multimedia Presentation In Module Seven, you will submit the second part of your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course.
This submission will be graded with the Final Project Part Two Rubric. 4 Final Project Part Two Rubric Guidelines for Submission: Your multimedia presentation should be approximately 10 to 12 slides and 8 to 12 minutes in length. You are required to include a combination of text, visuals, and sound in order to support your work. Support your presentation with relevant resources cited in APA format and noted on a separate slide. If you require alternative accommodations for completing this assignment, reach out to your instructor directly for more information.
Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value Issue/Event: Social or Global Issue/Event [IDS-403-03] Meets “Proficient†criteria, and description demonstrates a nuanced understanding of the relationship between the chosen issue and problems in technology Describes a social or global issue or event and how it relates to problems in technology, using appropriate research strategies Describes a social or global issue or event and how it relates to problems in technology, but description is cursory or research strategies are inappropriate Does not describe a social or global issue or event and how it relates to problems in technology 8 Issue/Event: Impact on Society [IDS-403-03] Meets “Proficient†criteria, and description demonstrates a nuanced understanding of the social impact of the issue or event Describes impact of the issue or event on society using appropriate research strategies Describes the impact of the issue or event on society, but the description is cursory or research strategies are inappropriate Does not describe the impact of the issue or event on society 8 Issue/Event: Society Impacts [IDS-403-06] Meets “Proficient†criteria, and the relevant research or diverse perspectives used demonstrate a nuanced understanding of how society influences the chosen issue and how it is perceived Assesses how society impacts the chosen issue, using relevant research or diverse perspectives Assesses how society impacts the chosen issue, but explanation is cursory or utilization of relevant research or diverse perspectives is inappropriate Does not assess how society impacts the chosen issue 8 Yourself: Individual Framework of Perception [IDS-403-05] Meets “Proficient†criteria, and explanation demonstrates keen insight into how the issue/event has informed individual framework of perception Explains how critically analyzing an issue/event in technology has informed individual framework of perception Explains how critically analyzing an issue or event in technology has informed individual framework of perception, but explanation is cursory Does not explain how critically analyzing an issue or event in technology has informed individual framework of perception 8 Yourself: Individual Field of Study or Profession [IDS-403-01] Meets “Proficient†criteria, and explanation demonstrates keen insight into how issue/event can influence your discipline of study or profession Explains how critically analyzing technology can influence discipline of study or profession Explains how critically analyzing technology can influence discipline of study or profession, but explanation is cursory Does not explain how critically analyzing technology can influence discipline of study or profession Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value Society: Interact [IDS-403-04] Meets “Proficient†criteria, and explanation demonstrates keen insight into how critically analyzing technology adds value to interactions with people and to understanding social or global issues or events Explains how critically analyzing technology adds value to interactions with people and to understanding social or global issues or events Explains how critically analyzing technology adds value to interactions with people and issues or events, but explanation is cursory Does not explain how critically analyzing technology adds value to interactions with people and to understanding social or global issues or events 8 Society: Strategies [IDS-403-04] Meets “Proficient†criteria, and strategies are plausible and detailed Recommends strategies for using critical analysis for meeting personal and professional goals Recommends strategies for using critical analysis for meeting personal and professional goals, but recommendations are inappropriate Does not recommend strategies for using critical analysis for meeting personal and professional goals 8 Conclusion: Benefits and Challenges [IDS-403-06] Meets “Proficient†criteria, and relevant research or diverse perspectives used demonstrate a nuanced understanding of the benefits and challenges of addressing issues in technology Assesses the benefits and challenges of addressing issues in technology, using relevant research or diverse perspectives Assesses the benefits and challenges of addressing issues in technology, but analysis is cursory or utilization of relevant research or diverse perspectives is inappropriate Does not assess the benefits and challenges of addressing issues in technology 8 Conclusion: Adds Value [IDS-403-02] Meets “Proficient†criteria, and explanation demonstrates keen insight into how critically analyzing technology adds value to interactions with people in personal and professional contexts Explains how critically analyzing technology adds value to interactions with people in personal and professional contexts Explains how critically analyzing technology adds value to interactions with people in personal and professional contexts, but explanation is cursory Does not explain how critically analyzing technology adds value to interactions with people in personal and professional contexts 8 Presentation: Organized [IDS-403-05] Meets “Proficient†criteria, and organization cogently conveys the message to the target audience Constructs the presentation in such a way that ensures the audio and visual elements are logically organized Presentation is constructed with audio and visual elements, but the organization is illogical Does not construct the presentation in such a way that it is logically organized in order to convey its message to the target audience 8 Presentation: Evidence [IDS-403-05] Meets “Proficient†criteria, and supporting evidence in the presentation cogently conveys the importance of critically analyzing technology Provides supporting evidence in the presentation that supports the importance of the chosen issue or event and its impact within technology Provides supporting evidence, but it does not support the importance of the chosen issue or event and its impact within technology Does not provide supporting evidence that supports the importance of the chosen issue or event and its impact within technology Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value Presentation: Flow [IDS-403-05] Meets “Proficient†criteria, and flow of the narration cogently articulates the importance of critically analyzing technology Develops the audio narration to logically flow with the presentation to articulate the importance of critically analyzing the chosen issue or event and its impact within technology Develops the audio narration, but it does not logically flow with the presentation to articulate the importance of the chosen issue or event and its impact within technology Does not include audio narration to articulate the importance of the chosen issue or event and its impact within technology 8 Articulation of Response Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to- read format Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 4 Total 100% IDS 403 Final Project Part Two Guidelines and Rubric Overview Prompt Milestones Final Project Part Two Rubric CYB-610 Embedded OS Presentation Scoring Guide Performance Level Ratings Meets Expectations Performance consistently met expectations in all essential areas of the assignment criteria, at times possibly exceeding expectations, and the quality of work overall was very good.
The most critical goals were met. Near Expectations Performance did not consistently meet expectations. Performance failed to meet expectations in one or more essential areas of the assignment criteria, one or more of the most critical goals were not met. Below Expectations Performance was consistently below expectations in most essential areas of the assignment criteria, reasonable progress toward critical goals was not made. Significant improvement is needed in one or more important areas.
Criteria Below Expectations Near Expectations Meets Expectations Earned The students clearly describes the tools used by hackers to penetrate the specified devices and the effects of each penetration type. 0 pts – 6 pts 7 pts – 9 pts 10 pts The student provides insight as to how embedded operating system vendors provide defenses against hacking attempts. 0 pts – 6 pts 7 pts – 9 pts 10 pts The students describes, in steps, at least one strategy used to attack embedded operating systems. 0 pts – 6 pts 7 pts – 9 pts 10 pts The students describes, in steps, at least one strategy to defend against the chosen attack. 0 pts – 2 pts 3 pts – 4 pts 5 pts The student clearly explains innovative ideas to secure devices which host the programs.
0 pts – 2 pts 3 pts – 4 pts 5 pts Industry standard technical writing is correct and utilized throughout. 0 pts – 6 pts 7 pts – 9 pts 10 pts TOTAL /50 Instructor Feedback © 2018. Grand Canyon University. All Rights Reserved.
Paper for above instructions
Title: The Impact of Cybersecurity Breaches on Society: A Critical Analysis
Slide 1: Introduction
- Welcome to my presentation. Today, I will explore the impact of cybersecurity breaches on society—a pressing issue in the digital age. As technology evolves, so do the tactics of cybercriminals, raising concerns about data security, privacy, and societal trust.
Slide 2: Definition of Cybersecurity Breaches
- A cybersecurity breach occurs when unauthorized individuals gain access to sensitive, protected, or confidential data (Ponemon Institute, 2022). These breaches can involve various data types, including personal information, financial records, or proprietary business data.
Slide 3: Origin of the Issue
- The origin of cybersecurity breaches can be traced to the exponential growth in technology and internet usage. As more individuals and organizations rely on digital infrastructure, the vulnerabilities within these systems have grown significantly (Mandiant, 2022). Cybercriminals exploit weak points through various means, aiming for financial gain or information theft.
Slide 4: Society's Demographic Impact
- Cybersecurity breaches impact various demographics, including individuals, businesses, and governments. For instance, a study by the Identity Theft Resource Center (2022) reveals that individuals suffer financial losses and emotional distress due to identity theft. Businesses face reputational damage and financial losses from breaches, while governments grapple with national security issues.
Slide 5: The Importance of Affected Demographics
- Understanding the affected demographics is crucial as it highlights the extensive ramifications of cybersecurity breaches. For example, small businesses often lack the resources for robust cybersecurity defenses, making them prime targets for attackers. Protecting these entities helps sustain the economy and community trust (Verizon, 2022).
Slide 6: Society’s Impact on Cybersecurity Breaches
- Society actively influences the situation concerning cybersecurity. Increased reliance on technology necessitates further regulatory policies and public education on cybersecurity practices (Hu & Tavalok, 2021). As more citizens become tech-savvy, they need to understand their role in preventing data breaches.
Slide 7: Personal Framework of Perception
- Critically analyzing cybersecurity breaches has profoundly informed my perspective on technology. Initially viewing technology as merely advantageous, I now understand the real implications of vulnerabilities and threats. This critical perspective has shaped my understanding of technology as a double-edged sword.
Slide 8: Influence on My Profession
- In my chosen field, understanding cybersecurity is paramount. As industries digitize, cybersecurity awareness will be critical in safeguarding sensitive information (Carney et al., 2020). With the introduction of AI and IoT devices, the next five to ten years will witness a growing need for cybersecurity expertise.
Slide 9: Enhancing Social Engagement
- Analyzing cybersecurity enriches my interaction with societal issues. For instance, understanding the implications of personal data breaches allows me to empathize with affected individuals while motivating me to advocate for ethical practices in technology use.
Slide 10: Strategies for Critical Analysis
- To meet personal and professional goals, I recommend establishing a routine to stay informed on emerging cybersecurity trends and enrolling in courses that emphasize ethical hacking and data protection (Cios et al., 2019). By doing so, I aim to contribute positively to my field while ensuring that I engage with technology responsibly.
Slide 11: Conclusion: Benefits and Challenges of Cybersecurity
- Addressing cybersecurity challenges presents both benefits and risks. While advanced cybersecurity measures can enhance user trust and data integrity, they may also lead to increased costs for businesses and regulatory burden (Karyda et al., 2020). However, creating a balanced approach can allow us to navigate these complexities effectively.
Slide 12: Value of Critical Analysis
- Through this critical analysis, I have come to appreciate the intricate relationship between technology and human existence. Understanding technology's societal impact enriches interpersonal communication and promotes informed decision-making in both personal and professional realms.
References
1. Carney, M., Eser, V., & Ryland, H. (2020). Cybersecurity in Business: Threats, Vulnerabilities, and Responses. Journal of Business Research, 107, 193-205. https://doi.org/10.1016/j.jbusres.2019.11.032
2. Cios, K. J., Pedrycz, W., & Swiniarski, R. (2019). Data Mining: A Knowledge Discovery Approach. Springer.
3. Hu, J., & Tavalok, H. (2021). Societal Understanding of Cybersecurity Risks: A Psychological Perspective. ACM Transactions on Internet Technology, 17(4), 1-39. https://doi.org/10.1145/3447777
4. Identity Theft Resource Center. (2022). 2021 Data Breach Report. Retrieved from https://www.idtheftcenter.org
5. Karyda, M., Kosta, E., & Mitrou, L. (2020). The Impact of Cybersecurity Policy on the Digital Economy: Benefits and Challenges. Information & Computer Security, 28(2), 177-194. https://doi.org/10.1108/ICS-02-2019-0021
6. Mandiant. (2022). The Mandiant Security Effectiveness Report. Retrieved from https://www.mandiant.com
7. Ponemon Institute. (2022). Cost of Data Breach Report 2022. Retrieved from https://www.ibm.com/security/data-breach
8. Verizon. (2022). Data Breach Investigations Report. Retrieved from https://enterprise.verizon.com/resources/reports/dbir
9. Zhang, K., & Zhao, Y. (2019). Cybersecurity Challenges and Responses in Emerging Technology: A Systematic Review. IEEE Access, 7, 113454-113467. https://doi.org/10.1109/ACCESS.2019.2937069
10. Zuehlke, R. (2020). Understanding the Cybersecurity Landscape: Challenges and the Role of Awareness. Journal of Cybersecurity, 4(1), 57-75. https://doi.org/10.3390/cyb4010005
---
This presentation outlines critical facets of the issue of cybersecurity breaches, evaluating their impact on individuals, businesses, and society as a whole, while also reflecting personally on how this analysis informs my understanding and engagement with technology.