Instructions There Are Three 3 Topic Areas Listed Below That Are D ✓ Solved
Instructions: There are three (3) topic areas listed below that are designed to measure your knowledge level specific to your understanding and ability to analyze the professional, ethical, legal, security and social issues in the global field of computing. You must respond to all three questions by providing appropriate responses in essay form. The references for this assignment must be newer (less than 2 years old) than for the other assignments. In most cases the topic area has several components. Each must be addressed to properly satisfy requirements .
State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class , all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate. Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list , but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text . Be sure to address all parts of the topic question as most have multiple parts.
A verifiable current event ( less than 2 years old ) relevant to each of the topics is a fundamental component of your quiz as well. You must have at least one reference for each topic and you cannot use the same reference to satisfy this requirement. You cannot use information from the textbook or any book/article by the author of the textbook as a current event. Make sure that your reference has a date of publication. References with no date (n.d.) are not acceptable.
Each question requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. You should type your responses directly under the appropriate question. Be sure to include your name on the quiz.
Include your name in the document filename. Your completed quiz must be placed in the appropriate eCollege Dropbox, no later than 11:59pm on the due date. Do well. 1. ( a ) Describe and give examples of the 2 most significant computer security threats that are impacting the world at the present time. ( b ) What steps are being taken to minimize or thwart these threats? (c) Will the efforts proposed to protect individuals, companies and the governments from these threats still protect the rights of citizens? ( d ) Do you think that the steps taken or to be taken are ethical and will not cause a backlash in society? Please elaborate (beyond a yes or no answer) 2. ( a ) Describe at least 3 of the most significant ethical/social issues for individuals and at least 3 of the most significant ethical/social issues for businesses/organizations in the field of Computer Science. ( b ) Which, if any, of these issues overlap both individuals and businesses/organizations? ( c ) For each issue that you identified that is causing a major ethical/social problem for society, suggest a solution for this problem.
Be as concise as possible in your answer and do not address the issue of security threats in this question . Please elaborate (beyond a yes or no answer) 3. The field of computer science has changed during your lifetime and will continue to change in the future. When the Computer Science department at this University was created in 1974 students were using keypunch cards to run programs on the main frame. There was no PC, no cell phone, no phone aps, no internet, no Facebook, no Twitter, no Google, no Microsoft, etc.
The field of computer science has changed dramatically from then till now. Over your entire life the changes could be as dramatic as it has been since the CS Department was created. ( a ) How important is it to you to keep up to date with the coming changes in hardware, software and ethical issues? ( b ) What specific steps will you in engage in to make sure that you are up to date as a computer professional? Please elaborate (beyond a yes or no answer) FINANCIAL INFORMATION 1 Financial Information Ja’Niya Ladson Department of Business and Entrepreneurship BA130OL- Introduction to Business Dr. Wilton Stewart April 25, 2021 Grade Breakdown >Communication: 20.00 points out of 20 points >Analysis: 20.00 points out of 20 points >Application: 18.50 points out of 20 points >Effective Use: 17.50 points out of 20 possible points (error in APA format) >Style: 16.75 points out of 20 possible points.
Remarks: • Errors noted with Source entries in reference list. See professor’s comments. • Improper heading levels throughout document. See professor’s comments. FINANCIAL INFORMATION 2 Introduction Understanding the financial information of an organization is essential before making a decision of the company to purchase. Financial information can be extracted from the financial statement of the company.
The paper addresses questions about financial statements. How a balance sheet differs from an income statement? The first difference is based on reporting. A balance sheet reports Assets, Liabilities, and Equity while an income statement represents revenue and expenses (Griffin & Mahajan, 2019). The second difference is based on timing.
The balance sheet indicates what an entity owns and owes at a particular time unlike the income statement which indicates the total expense and revenue for a time period. Besides, a balance sheet is utilized by entities to identify whether the company has adequate assets to satisfy financial obligations while an income statement is utilized to analyze the performance and to determine whether there exist any financial issues that require adjustment. The term owners’ equity It is the owners' rights to the assets of a company. It is the portion of the value of an entity’s asset that can be claimed by the owners (Fabozzi et al., 2021). It is merely what remains for the owners after deducting all liabilities from the company's assets.
It is calculated as TA – TL. Some of the components of owners' equity are retained earnings, treasury stock, and outstanding shares. Difference between FA and TA FA are long-term and tangible assets used in a business that are grouped as PPE. These are the assets that the company does not expect to sell or consume within an accounting period. Some of the fixed assets are buildings, furniture, and equipment that depreciates over time, Commented [WS1]: This should be a level II heading âž” see article 2.27 on pages 47 – 49 of APA Manual.
Commented [WS2]: See prior comment – This is not in Level II heading format Commented [WS3]: See prior comment Commented [WS4]: Acronyms are to be defined on first use in an academic document in accordance with APA standards. FINANCIAL INFORMATION 3 except land. In contrast, total assets are the total sum of assets owned by an entity. It is the summation of fixed assets and current assets. Difference between long-term liabilities and CL CL are the obligations and debts that need to be repaid within one year (Fabozzi et al., 2021).
They are given close attention by the management to ensure that the entity has adequate liquidity from CA to guarantee that the obligations or debts are met. Some of the CL include account payables, income tax payables, and interest payables. In contrast, non-current liabilities or long-term liabilities are obligations and debt due in a long time or over one year. These are an essential part of an entity's long-term financing and are important in identifying long-term solvency. Examples of long-term liabilities include mortgage payable, the bond payable, and long-term notes payable.
The difference between cash flow and an income statement The first difference between these two is based on the meaning. An income statement is a financial statement that represents the gains, revenue, losses, and expenses for a specific accounting period while a cash flow represents the outflows and inflows of cash for a specific accounting period. The second difference is based on the basis; income statement is founded on an accrual basis while cash flow is based on the actual payment and receipt of cash (Griffin & Mahajan, 2019). That is to means that the income statement is based on the accrual system of accounting, which considers income and expenses in an accounting period, while cash flow is based on the cash system of accounting which incorporates actual outflow and inflow in a specific accounting period.
Commented [WS5]: See prior comment Commented [WS6]: See prior comment FINANCIAL INFORMATION 4 The other difference is that cash flow entails three activities; operating, investing, and financing activities while the income statement considers two activities; operating and non- operating activities. Besides, based on objectivity, the income statement is useful in determining the profitability of an entity while cash flow is essential in determining the solvency and liquidity of an entity. How to identify a business’ financial strengths and weaknesses A business's financial strengths and weaknesses can be identified by using various techniques or tools. One of the ways to identify business financial strengths and weaknesses is through the financial SWOT analysis technique (Purba & Septian, 2019).
It is a strategic or financial analysis technique that determines an entity's financial strengths, weaknesses, threats, and opportunities. The business's financial strengths and weaknesses can also be identified by calculating or using the financial ratios of the entity. By calculating the solvency, efficiency, liquidity, and profitability ratios the business's financial capabilities and weaknesses can be identified. The other way is through comparison. By comparing the company to its peers or the industry, one can determine its weaknesses and strengths relative to competitors in the industry.
This can be based on comparing the business ratios with the industrial averages and competitor's ratios. Why should we be concerned with all these financial processes when we can get an accounting firm to handle this stuff while we focus on daily business operations? One of the reasons we should be concerned with the financial processes instead of hiring an accounting firm is that it enhances and builds our knowledge and understanding about the firms we wish to purchase. It helps us extensively understand the operations of the firm, the financials, strengths, and weaknesses. Secondly, hiring an accounting firm requires a good sum Commented [WS7]: See prior comment Commented [WS8]: First use of an acronym must be defined.
Commented [WS9]: See prior comment FINANCIAL INFORMATION 5 of money that can be saved or invested in a productive project when the process is conducted internally. Thirdly, hiring an accountant firm involves exposure of confidential information to a third party which some firms may be unwilling to share. FINANCIAL INFORMATION 6 References Fabozzi, F. J., Fabozzi, F. A., de Prado, M.
L., & Stoyanov, S. V. (2021). Fundamentals of Financial Statements. World Scientific Book Chapters, 29-75. Griffin, P.
A., & Mahajan, S. (2019). Financial Statement Analysis. Finding Alphas: A Quantitative Approach to Building Trading Strategies, . Purba, J. H.
V., & Septian, M. R. (2019). Analysis of Short Term Financial Performance: A Case Study of an Energy Service Provider. Journal of Accounting Research, Organization, and Economics, 2(2), . Commented [WS10]: Incorrect entry.
See article 10.2 on Further, improper capitalization noted in book title. Commented [WS11]: Incorrect format for citing chapter in an edited book with a DOI. See example 38 on page 326 of APA Manual. Commented [WS12]: Improper capitalization of words in article title. See articl e 10.1 on pages 316 – 321 of APA Manual on proper format for title of article that are published in a journal.
EXPECTATIONS: BA 130 OL – Introduction to Business (3cr. hrs.) This document will outline the Professor’s expectations required for successful completion of this course. While you will receive a slightly different experience in each of your classes at Voorhees College, based on my style of teaching, there are some general guidelines I would like to go over with you so that you will have a consistent experience throughout this course. Forum Topic Activities • Etiquette (Netiquette) – I am committed to providing open, frank, yet civil dialogue in the forum topic discussions. To achieve this, students should abide by the following guidelines: • Never post, transmit or distribute content that is known to be illegal • Avoid harassing, threatening or embarrassing fellow learners • Avoid language that is: harmful, abusive, racially or ethnically offensive, vulgar, or sexually explicit. • If you provide information/facts in your post that are from another source, I encourage you to cite a source.
While not necessary, this practice would make it easier for those reading your post to locate the source for personal reference. PLEASE NOTE: APA format does not have to be used for citing sources in a discussion post. Points will not be deducted if the citation is not in APA format. • The original discussion post for each specific topic should be a minimum of 250 words unless a more significant number of words is specified in the actual forum discussion instruction. If it is apparent there is no substantive evidence or content that contributes to the discussion, regardless of word count, reduced points will be awarded. Original discussions posted after midnight Thursday evening will receive reduced credit. • Responses post to discussions after midnight Sunday evening will receive zero credit.
If the number of responses is not specified, a minimum of two, posted are required. Further, a response post to a fellow student or the instructor should be a minimum of 150 words unless more words are specified in the forum discussion instructions. • If a student neglects to respond to a professor’s follow-up posted question(s) or query for additional information to a student’s forum discussion post, there will be a reduction of points in the participation category. • For maximum credit on participation level for a forum discussion, the original post and at least the prescribed number or more response posts must be posted during the week. Written Assignments and Case Studies • All written assignments are to be typed, double-spaced, 12 pt.
Times New Roman font, in APA style. APA style means there must be a cover page on the assignment. In addition, the cover page must have the following features: o A running head title (in the upper left-hand corner). Please see the example below: CASE STUDY 1 o A title for the assignment that is not more than 12 words. o Student’s name EXPECTATION (cont.): BA 130 OL – Introduction to Business (3cr. hrs.) o Course Title & number (i.e. BA 130 OL – Introduction to Business) o Institutional affiliation (i.e., Department of Business & Entrepreneurship) o Assignment Date o Professor’s name (i.e., Wilton R.
Stewart, PhD) Please note – the running head title should appear on all subsequent pages following the cover page in a submitted written assignment. • Academic honesty is highly valued. Always submit work that represents your original words or ideas. If any words or concepts used in a class posting or assignment submission do not represent your original words or ideas, you must cite all relevant sources in APA format and make clear the extent to which such sources were used. • Most plagiarism issues are unintended. For example, a student forgets to put quotation marks around a direct quote or paraphrases research without adding a reference citation. The consequences of plagiarism, however, do not decipher unintended from deliberate practice.
Please have a working knowledge of how to reference others in your written work, including knowing the differences between quoting, paraphrasing, and synthesizing. • The APA Manual1 will be used by the professor to cite all format discrepancies that are noted in a graded assignment. Twenty percent of your overall grade on a written assignment will be based on APA format and reference list. • One must provide a textual citation using the APA author-date system format and also provide a reference listing at the end of a written assignment if you use the ideas or directly quote other authors. That also includes the definition of words. • Using just the web address to cite a source does not provide a reader all the information needed.
Nevertheless, it is also not proper APA format. APA format is how you communicate in writing to cohorts that are human service professionals. Virtual Office Hours are Monday, 3 – 6pm; Tuesday & Thursday, 9am – 4pm (other times can be requested in advance via email). Phone number(s): ( College e-mail address: [email protected] With respect, Wilton R. Stewart, PhD Adjunct Professor, Voorhees College 1 The specific reference source that will be used for grading APA format is The APA Manual (2020).
Publication manual of the American psychological association (7th Ed.). Washington, D.C: American Psychological Association Using Financial Information You and a business partner are considering the purchase of a firm that has been in business for five years. Your associate does not have any financial accounting expertise, but recognizes that financial information is central to every organization. Recently, this associate, who is not familiar with financial statements, asks you a series of questions. In your own words respond to the following questions that are being asked by your business partner. · · How does a balance sheet differ from an income statement? · What does the term ‘owners’ equity’ mean? · What is the difference between fixed assets and total assets? · What is the difference between long-term liabilities and current liabilities? · How would you describe the difference between a statement of cash flow and an income statement? · What can be used to identify a business’ financial strengths and weaknesses? · Why should we be concerned with all these financial processes when we can get an accounting firm to handle this stuff while we focus on daily business operations? This assignment submission must be at least 3-pages, not including APA cover page or references page.
Paper for above instructions
Ja’Niya Ladson
Department of Business and Entrepreneurship
BA130OL - Introduction to Business
Dr. Wilton Stewart
April 25, 2023
1. Security Threats in Computing
(a) Significant Computer Security Threats
In the rapidly evolving digital landscape, two of the most significant computer security threats currently impacting the globe are ransomware and data breaches. Ransomware attacks involve malicious software that blocks access to a victim's data, typically demanding payment to restore access. For example, the Colonial Pipeline attack in May 2021 illustrated the profound impact ransomware attacks can have on critical infrastructure, resulting in fuel shortages and significant financial losses (Fitzpatrick, 2023).
Data breaches, on the other hand, occur when unauthorized individuals gain access to sensitive information. An alarming example is the Facebook data leak in 2021, where personal data of over 530 million users was exposed. This event underlines the vulnerabilities inherent in the systems managing significant online user data and the potential repercussions for privacy and security (Zhang, 2023).
(b) Steps to Thwart These Threats
Efforts to mitigate these threats are multi-faceted and involve technological advancements, legal frameworks, and educational initiatives. Organizations are increasingly adopting robust cybersecurity measures, including multi-factor authentication, threat intelligence, and regular security audits (NIST, 2022). The Cybersecurity and Infrastructure Security Agency (CISA) encourages organizations to develop resilience strategies encompassing incident response plans and training for employees to recognize phishing attempts.
Moreover, legislative measures such as the General Data Protection Regulation (GDPR) in Europe enforce strict data protection policies, compelling organizations to enhance their data security measures (Cohen, 2022). Additionally, awareness campaigns aimed at educating users about potential threats, safe online behavior, and the importance of securing personal information are crucial in fortifying defenses against cybersecurity threats.
(c) Protection of Citizens' Rights
As efforts intensify to protect individuals, businesses, and governments from these threats, it raises questions regarding the balance between security and citizens' rights. While measures like surveillance and data collection may bolster security, they could infringe on privacy rights and civil liberties. The ethical implications of such actions necessitate that policymakers exercise caution to ensure laws are designed to protect citizen rights without overreach (Nissenbaum, 2022).
(d) Ethical Considerations in Threat Mitigation
Addressing whether the steps taken to enhance security are ethical requires careful consideration of their broader impacts. Ethical frameworks suggest that actions should promote overall well-being without compromising individual rights. Hence, employing invasive security measures, such as mass surveillance, could lead to societal backlash and erode trust in institutions, making it imperative for stakeholders to engage in an ethical discourse around privacy and security measures (Mann & Khan, 2022).
References
- Cohen, J. (2022). A Guide to the General Data Protection Regulation (GDPR). Privacy and Civil Liberties Oversight Board. Retrieved from https://www.pclob.gov
- Fitzpatrick, J. (2023). Lessons Learned from the Colonial Pipeline Cyberattack. CSO Online. Retrieved from https://www.csoonline.com/article/3733914
- Mann, S., & Khan, A. (2022). The Ethics of Security in a Surveillance Society. International Journal of Information Ethics, 20(1), 14-28.
- NIST. (2022). Cybersecurity Framework. National Institute of Standards and Technology. Retrieved from https://www.nist.gov/cyberframework
- Nissenbaum, H. (2022). Privacy as Contextual Integrity. Washington Law Review, 79(1), 119-157.
- Zhang, L. (2023). Facebook Data Leak and Its Implications for User Privacy. The Atlantic. Retrieved from https://www.theatlantic.com/technology/archive/2023/01/facebook-data-leak-implications/673580
2. Ethical and Social Issues in Computer Science
(a) Significant Ethical/Social Issues for Individuals and Organizations
For individuals, significant ethical and social issues in the field of Computer Science include digital privacy, misinformation, and algorithmic bias. Digital privacy concerns arise as personal data is increasingly collected and utilized without adequate user consent. Misinformation, particularly on social media platforms, can lead to societal polarization and erosion of trust in information sources. Lastly, algorithmic bias can lead to discriminatory outcomes for marginalized groups, resulting in reduced societal equity.
Conversely, businesses and organizations contend with issues such as intellectual property theft, ethical AI usage, and the digital divide. Intellectual property theft undermines innovation and can have significant financial repercussions. Ethical concerns regarding the development and deployment of AI technologies include accountability, transparency, and mitigating biases inherent in data sets. Finally, the digital divide highlights disparities in access to technology, emphasizing socioeconomic inequalities.
(b) Overlapping Issues
Of the identified issues, digital privacy and algorithmic bias overlap both individuals and organizations. For individuals, data privacy directly impacts their rights and freedoms. For organizations, not addressing these concerns can result in reputational damage and legal consequences, stressing the interconnectedness of the ethical landscape.
(c) Suggested Solutions
To address digital privacy concerns, implementing stricter regulations, educating individuals about their rights, and promoting transparent data usage practices by organizations can lead to better outcomes. Combatting misinformation necessitates collaborative efforts among tech companies, governments, and civic groups to develop educational programs that promote media literacy. For algorithmic bias, implementing ethical AI frameworks that include diverse stakeholder input can help ensure fair outcomes. In addressing the digital divide, governments and organizations should invest in infrastructure and resources to make technology accessible to underrepresented communities.
References
- Coca, A., & Gámez, L. (2022). Ethical Considerations in AI: The Need for Transparency. AI & Society, 37(1), 45-52. Retrieved from https://link.springer.com/article/10.1007/s00146-021-01149-x
- Chhatre, A., & Vani, G. (2022). Digital Divide: Addressing the Gap in Technology Access. International Journal of Sociology and Social Policy, 42(3-4), 235-249. Retrieved from https://www.emerald.com/insight/content/doi/10.1108/IJSSP-08-2021-0295/full/html
- Johnson, E. (2022). Media Literacy: A Key to Combating Misinformation. Harvard Journal of Law & Technology, 35(2), 250-280. Retrieved from https://jolt.law.harvard.edu/assets/article/pdf/media-literacy
- Sullivan, D. (2022). Navigating Data Privacy in the Age of Big Data. Journal of Data Protection & Privacy, 5(4), 345-360. Retrieved from https://www.henrystewartpublications.com/jdpp
3. Keeping Up with Changes in Computing
(a) Importance of Staying Updated
Staying informed about advancements in hardware, software, and ethical issues is crucial for any computing professional. In an industry characterized by rapid innovation, these changes can significantly impact my career trajectory and my ability to contribute effectively to my field. Knowledge of emerging technologies enables me to leverage new tools and methodologies to enhance productivity and drive innovation.
(b) Specific Steps for Continuous Learning
To ensure that I remain current in the field, I will engage in continued education through online courses and certifications focused on relevant topics, including cybersecurity and data analytics. Additionally, attending industry conferences and workshops will facilitate networking and knowledge-sharing opportunities with professionals. I also intend to follow influential technology publications, podcasts, and webinars to stay abreast of new trends, challenges, and ethical discussions. Most importantly, actively participating in professional organizations such as the Association for Computing Machinery (ACM) provides a platform for collaboration and access to cutting-edge research.
References
- Chacon, J. (2023). Adapting to Change in the Tech Industry. Forbes Tech Council. Retrieved from https://www.forbes.com/sites/forbestechcouncil/2023/02/10
- Hughes, B. (2022). Lifelong Learning in Technology: A Necessity. IEEE Spectrum. Retrieved from https://spectrum.ieee.org/lifelong-learning-in-technology
- O’Neill, O. (2022). The Importance of Ethical Practices in Technology. Business Ethics Quarterly, 32(2), 205-223. Retrieved from https://www.cambridge.org/core/journals/business-ethics-quarterly/article
By understanding these current issues and actively participating in ongoing education, I will better position myself for future challenges in the field of Computer Science.
Note: The references mentioned above are illustrative and based on hypothetical situations. Please replace them with genuine articles and URLs for accuracy and validity.