Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / CSIA 459: Evaluating Emerging Technologies Technology Selection Study Recommendation Paper This assignment will be completed in two stages

CSIA 459: Evaluating Emerging Technologies Technology Selection Study Recommendation Paper This assignment will be completed in two stages

Computer Science

CSIA 459: Evaluating Emerging Technologies

Technology Selection Study Recommendation Paper

This assignment will be completed in two stages.

Stage 1: Post your draft of this paper no later than Friday of Week 6 in the weekly conference for review and evaluation by your peers.

Stage 2: Using the feedback from your peers, revise and finalize your paper and then submit it for grading via your assignment folder. Follow the instructions posted by your instructor regarding peer review and “best paper” voting.

For this paper, you will construct a recommendation to study and evaluate a specific technology. To support your recommendation you will use information from either your Technology Review #1 or Technology Review #2. Your sources which support your paper must have a publication date of 2017 or later, i.e. 2017, 2018, 2019, 2020, 2021.

GETTING STARTED

Choose one of your technology reviews (#1 or #2) and then use the authoritative sources from your bibliography to write a recommendation for study analysis for senior managers and executives. These decision makers will be responsible for determining which emerging technologies or emerging applications of technologies will become part of the company’s portfolio of Internal Research & Development projects during the next budget cycle. Since your paper is being submitted for the Cybersecurity Category you must make sure that you address cybersecurity requirements and considerations in your recommendation.

Write down your thoughts and ideas about the security implications of incorporating this technology into the company’s operations, products, or services? What are the vulnerabilities or risks associated with this technology which could cause a loss of confidentiality, integrity, availability, etc.  

Throughout your recommendation (see below), you must keep your focus upon the security posture of this technology and its applications (e.g. products or services built upon this technology or which incorporate this technology).

RECOMMENDATIONS FOR STUDY

Your focus in this paper must be upon identifying and presenting information from authoritative sources which supports a recommendation to select this technology for further study as part of an Internal Research & Development project (IR&D). Your recommendation should be based upon the following (at a minimum):

    • characteristics (features and capabilities) of the technology
    • interactions among the selected technology, people, environments, and processes (how will it be used; use cases if known)
    • risks or vulnerabilities associated with adoption of this technology
    • costs and benefits associated with adoption of this technology

Addressing Costs and Benefits: Do not tell the reader how much the technology will cost. Discuss instead how much it might cost to SECURE this technology against cyber-attacks and/or how difficult it will be to deny criminals and terrorists the use of this technology.

WRITING YOUR PAPER

Your paper must provide the reader with an overview of the technology followed by information about the potential security risks and/or benefits of its use (the security posture ).You MUST use information paraphrased from the papers found during your Survey of the Professional Literature (with appropriate in-text citations).

Your paper should be 5 to 7 pages in length (excluding the title page and references page).

Additional Information

  1. Consult the grading rubric for specific content and formatting requirements for this assignment.
  2. Your Technology Selection Study Recommendation paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.
  3. Your paper should use standard terms and definitions for cybersecurity.
  4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.  
  5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count. 
  6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 
  7. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

Identified an appropriate technology and provided an overview of the technology Excellent Score of Identified an appropriate technology and provided an overview of the technology,/ 10 Provided an excellent overview of an emerging technology or emerging application of technology. The overview appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. (Authoritative sources were cited). Surveyed Professional Literature (10 or more papers identified and cited) Excellent Score of Surveyed Professional Literature (10 or more papers identified and cited),/ 10 Identified 10 or more papers from the professional literature. All papers used in the survey were from the four approved sources (ACM Digital Library, IEEE Computer Society Digital Library, Pro Quest Dissertations and Theses, and Science Direct). Appropriately used 10 or more papers from the survey of the literature throughout the discussion (as demonstrated by correctly formatted and placed citations). Summarized cybersecurity issues that need investigation using the characteristics (features and capabilities) of the technology Excellent Score of Summarized cybersecurity issues that need investigation using the characteristics (features and capabilities) of the technology,/ 10 Provided an excellent discussion of the cybersecurity issues that need investigating using the characteristics of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. Summarized cybersecurity issues that need investigation using the technology interactions with people / environments / processes associated with the emerging technology or emerging application of technology Excellent Score of Summarized cybersecurity issues that need investigation using the technology interactions with people / environments / processes associated with the emerging technology or emerging application of technology,/ 10 Provided an excellent discussion of the cybersecurity issues that need investigating using the interactions between the technology and people / environments / processes associated with the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. Summarized cybersecurity related costs and benefits associated with the adoption of the emerging technology or emerging application of technology Excellent Score of Summarized cybersecurity related costs and benefits associated with the adoption of the emerging technology or emerging application of technology,/ 10 Provided an excellent discussion of the cybersecurity related costs and benefits associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. Summarized cybersecurity related risks and/or vulnerabilities associated with the adoption of the emerging technology or emerging application of technology Excellent Score of Summarized cybersecurity related risks and/or vulnerabilities associated with the adoption of the emerging technology or emerging application of technology,/ 10 Provided an excellent discussion of the cybersecurity related risks and/or vulnerabilities associated with the adoption of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. Provided a summary recommendation which provides a justification for spending money on EVALUTING the selected emerging technology or emerging application of technology using a pilot implementation or other formal evaluation study Excellent Score of Provided a summary recommendation which provides a justification for spending money on EVALUTING the selected emerging technology or emerging application of technology using a pilot implementation or other formal evaluation study,/ 10 Provided an excellent summary recommendation which was well supported by the body of the paper and included: (a) an explicit statement regarding recommendation that this technology be selected by the panel for formal evaluation, (b) justification expressed in terms of return on investment for monies spent during the evaluation, (c) identification of a specific recommended type of formal evaluation study. Addressed security issues using standard terms (e.g. confidentiality, integrity, availability, non-repudiation, authenticity, accountability, auditability, etc.). Excellent Score of Addressed security issues using standard terms (e.g. confidentiality, integrity, availability, non-repudiation, authenticity, accountability, auditability, etc.).,/ 10 Demonstrated excellence in the use of standard cybersecurity terminology to support discussion of the technology. Appropriately used 5 or more standard terms. Professionalism Part 1: Consistent Use and Formatting for Citations and Reference List Excellent Score of Professionalism Part 1: Consistent Use and Formatting for Citations and Reference List,/ 5 Work contains a reference list containing entries for all cited resources. Sufficient information is provided to allow a reader to find and retrieve the cited sources. Reference list entries and in-text citations are consistently and correctly formatted using an appropriate citation style (APA, MLA, etc.). Professionalism Part 2: Organization & Appearance Excellent Score of Professionalism Part 2: Organization & Appearance,/ 5 Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type. Professionalism Part 3: Execution Excellent Score of Professionalism Part 3: Execution,/ 10 No formatting, grammar, spelling errors

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions