Makeup Assignment Research Paper

| January 22, 2016

Makeup Assignment Research Paper

Due date: 29 September 2016
Value: 100 Marks
30% Weighting
Objectives
The course objectives met by this assignment include:
• Course specifications are available online from the USQ website <http://www.usq.edu.au/course/specification/>. Always check the website for the latest version.
Background
This assessment item covers the chapters 5-8 of your textbook. Research the topic of big data security and privacy and discuss how effectively current
(1) Security programs,
(2) Security models and
(3) Security practices
Are addressing the risks associated with ensuring adequate security and privacy of big data initiatives in organisations. Ensure that you consider at least 2 current security standards and 2 current privacy standards and at least 2 current security certifications in your answer.
Write a report in accordance to the recommendations of the links on the study desk. The word-count limit for the introduction, body and conclusion of this report is set at about 3000 words. Use at least (10) or more resources for your citing and referencing in Harvard style.
Submission requirements
• Submit your word document through your study desk – a link will be available on the study desk.

Marking criteria for Makeup Assignment research paper – CIS8018
Student name: ___________________________ Student number: ____________________
Marks
Structured development of report
Logical flow leading the reader from start to finish on a clear path of addressing the assessment requirements; clear identification and description of current state; clearly leading into a critical review of the key issues concerning security and privacy of big data in an organisation; application of correct report format.
Excellent meets all the requires for this objective 21-30
Good work – minor issue 11-20
Requires more work 5-10
Very poor effort 0-5
Comment:
/30
Depth of research/ critical reflection
Reason to support findings: showing depth of understanding critical security and privacy issues in relation to big data for an organisation; being able to reason for the most suitable security programs and models, training, roles to address these issues; showed depth of understanding threat identifications, ISO, model, etc. (chapter 5-8 concepts); selections of addition journal articles specifically address and support.
Excellent meets all the requires for this objective 21-30
Good work – minor issue 11-20
Requires more work 5-10
Very poor effort 0-5
Comment:
/30
Understanding of key ideas and concepts
Understood the course material; able to identify key ideas and concepts within the context of security and privacy issues for big data for an organisation; able to explain an issue with the use of key ideas and concepts; able to relate own experience to course material and issue by introducing own perspective
Excellent meets all the requires for this objective 21-30
Good work – minor issue 11-20
Requires more work 5-10
Very poor effort 0-5
Comment:
/30
Evidence of support
Citing and referencing: Correct within text Harvard citing; correct Harvard referencing; used more than five (5) sources (book, journal article, report, news article on the internet) in addition to the course text book.
Excellent meets all the requires for this objective 9-10
Good work – minor issue 7-8
Requires more work 4-6
Very poor effort 0-3
Comment:
/10
Total /100
General Comments:

Get a 30 % discount on an order above $ 50
Use the following coupon code:
COCONUT
Order your essay today and save 30% with the discount code: COCONUTOrder Now
Positive SSL