SlideShare una empresa de Scribd logo
1 de 5
THIS IS URGENT. DO NOT ACCEPT IT IF YOU WILL NOT FINISH IT TODAY.
Research Report #2: Emerging Issues Risk Analysis and Report
CAUTION
: there are a number of websites which are offering “professionally written― versions of
this assignment. Please do not make the mistake of trying to use such papers as sources for your
research. They do not meet the requirement for authoritativeness (see
https://libguides.umgc.edu/credibility
). Your submitted work WILL be scanned by Turn It In and your grade will reflect the quality of
your research and writing for this assignment.
Scenario
The Entertainment Team (ET -- part of Resort Operations at Padgett-Beale, Inc.) is excited about
a new event management platform and is ready to go to contract with the vendor. This platform
is a cloud-based service that provides end-to-end management for events (conferences, concerts,
festivals). The head of Marketing & Media (M&M) is on board and strongly supports the use of
this system. M&M believes that the data collection and analysis capabilities of the system will
prove extremely valuable for its efforts. Resort Operations (RO) also believes that the technology
could be leveraged to provide additional capabilities for managing participation in hotel
sponsored “kids programs― and related children-only events.
For an additional fee, the event management platform's vendor will provide customized RFID
bands to be worn by attendees.
The RFID bands and RFID readers use near-field communications to identify the wearer and
complete the desired transactions (e.g. record a booth visit, make a purchase, vote for a favorite
activity or performer, etc.).
The RFID bands have unique identifiers embedded in the band that allow tracking of attendees
(admittance, where they go within the venue, what they "like," how long they stay in a given
location, etc.).
The RFID bands can also be connected to an attendee's credit card or debit card account and then
used by the attendee to make purchases for food, beverages, and souvenirs.
For children, the RFID bands can be paired with a parent’s band, loaded with allergy
information, and have a parent specified spending limit or spending preauthorization tied to the
parent’s credit card account.
The head of Corporate IT has tentatively given approval for this outsourcing because it leverages
cloud-computing capabilities. IT's approval is very important to supporters of this the acquisition
because of the company's ban on "Shadow IT." (Only Corporate IT is allowed to issue contracts
for information technology related purchases, acquisitions, and outsourcing contracts.) Corporate
IT also supports a cloud-based platform since this reduces the amount of infrastructure which IT
must support and manage directly.
The project has come to a screeching halt, however, due to an objection by the Chief Financial
Officer. The CFO has asked that the IT Governance Board investigate this project and obtain
more information about the benefits and risks of using RFID bands linked to an external system
which processes transactions and authorizations of mobile / cashless payments for goods and
services. The CFO is concerned that the company’s PCI Compliance status may be adversely
affected.
The Chief Privacy Officer has also expressed an objection about this project. The CPO is
concerned about the privacy implications of tracking both movement of individuals and the
tracking of their purchasing behaviors.
The IT Governance Board agreed that the concerns expressed by two of its members (the CFO
and CPO) have merit. The board has requested an unbiased analysis of the proposed use cases
and the security and privacy issues which could be reasonably expected to arise.
The IT Governance Board has also agreed to a request from the Chief of Staff that the
management interns be allowed to participate in this analysis as their final project. Per the
agreement, their involvement will be limited to providing background research into the defined
use cases for cashless purchases. These use cases are:
1. Purchases for craft materials and snacks by children (under the age of 13) attending a hotel
sponsored “kids club― program.
2. Purchases by Individuals attending a music festival or other event where IDs must be checked
to establish proof of age (legal requirement for local alcoholic beverage consumption).
3. Purchases by attendees at trade shows (attendees are “adults―).
Your Task
Pick one of the three use cases listed above. Then, follow the directions below to complete the
required research and write your final report.
Research
1. Read / Review the readings in the LEO classroom.
2. Read this introductions to RFID technologies:
https://www.gettoken.com/beginners-guide-rfid-technology-events/
3. Research one or more of the Use Cases
a. Children: 8 Benefits of Using RFID Wristbands for Resorts & Attractions (see section 4:
Family Freedom)
https://www.idcband.com/en-us/blog-us/8-benefits-of-using-rfid-wristbands-resorts-attractions/
and
https://tappit.com/resources/blog/rfid-wristband-safety
b. Managing Adult Attendees at Music Festivals (includes RFID bands linked to twitter,
Facebook, and credit/debit card)
http://www.techradar.com/news/world-of-tech/rfid-wristbands-vs-nfc-smartphones-what-s-
winning-the-contactless-battle-1167135
c. Tracking Adults at Trade Shows
https://blog.printsome.com/rfid-wristbands-good-bad/
4.
Choose one of the Use Cases
then find and review at least one additional resource on your own that provides information
about privacy and security related laws that could limit or impose additional responsibilities
upon Padgett-Beale’s collection, storage, transmission, and use of data about guests. (Note:
laws may differ with respect to collecting data from or about children.) You should also
investigate laws, regulations, or standards which impact the use of the RFID bands for mobile
purchases.
5. Using all of your readings, identify and research at least 5 security and privacy issues which
the IT Governance Board needs to consider and address as it considers the implications of your
chosen use case upon the adoption or rejection of the proposed IT project (Event Management
Platform & RFID bands).
6. Then, identify 5 best practices that you can recommend to Padgett-Beale’s leadership team
to reduce and/or manage risks associated with the security and privacy of data associated with
the event management platform.
Write
Write a five to seven (5-7) page report using your research. At a minimum, your report must
include the following:
1. An introduction or overview of event management systems and the potential security and
privacy concerns which could arise when implementing this technology. Â This introduction
should be suitable for an executive audience. Provide a brief explanation as to why three major
operating units believe the company needs this capability.
2. An analysis section in which you address the following:
a. Identify and describe your chosen Use Case
b. Identify and describe five or more types of personal / private information or data that will be
collected, stored, processed, and transmitted in conjunction with the use case.
c. Identify and describe five or more compliance issues related to the use of the RFID bands to
make and track mobile purchases.
d. Analyze and discuss five or more privacy and security issues related to the use case.
e. Identify and discuss 3 or more relevant laws, regulations, or standards which could impact the
planned implementation of the event management system with RFID wrist bands.
3. A recommendations section in which you identify and discuss five or more best practices for
security and privacy that should be implemented before the technology is put into use by the
company. Include at least one recommendation in each of the following categories: people,
processes, policies, and technologies.
4. A closing section (summary) in which you summarize the issues related to your chosen use
case and the event management platform overall. Include a summary of your recommendations
to the IT Governance Board.
Submit for Grading
Submit your research paper in MS Word format (.docx or .doc file) using the Research Report #2
Assignment in your assignment folder. (Attach your file to the assignment entry.)
Additional Information
1. To save you time, a set of appropriate resources / reference materials has been included as part
of this assignment. You must incorporate at least five of these resources into your final
deliverable. You must also include one resource that you found on your own.
2. Your research report should use standard terms and definitions for cybersecurity.
3. Your research report should be professional in appearance with consistent use of fonts, font
sizes, margins, etc. You should use headings to organize your paper. The CSIA program
recommends that you follow standard APA formatting since this will give you a document that
meets the “professional appearance― requirements. APA formatting guidelines and
examples are found under Course Resources > APA Resources. An APA template file (MS
Word format) has also been provided for your use.
4. You are expected to write grammatically correct English in every assignment that you submit
for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c)
verifying that your punctuation is correct and (d) reviewing your work for correct word usage
and correctly structured sentences and paragraphs.
5. You are expected to credit your sources using in-text citations and reference list entries. Both
your citations and your reference list entries must follow a consistent citation style (APA, MLA,
etc.).

Más contenido relacionado

Similar a THIS IS URGENT- DO NOT ACCEPT IT IF YOU WILL NOT FINISH IT TODAY-Resea.docx

Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
dewhirstichabod
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
stilliegeorgiana
 
1190 Assignment Specifications1190.12 25 Points PossibleC.docx
1190 Assignment Specifications1190.12 25  Points PossibleC.docx1190 Assignment Specifications1190.12 25  Points PossibleC.docx
1190 Assignment Specifications1190.12 25 Points PossibleC.docx
RAJU852744
 
1190 Assignment Specifications1190.12 25 Points PossibleC.docx
1190 Assignment Specifications1190.12 25  Points PossibleC.docx1190 Assignment Specifications1190.12 25  Points PossibleC.docx
1190 Assignment Specifications1190.12 25 Points PossibleC.docx
aulasnilda
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
evonnehoggarth79783
 
httpswww.ted.comtalksshyam_sankar_the_rise_of_human_computer_.docx
httpswww.ted.comtalksshyam_sankar_the_rise_of_human_computer_.docxhttpswww.ted.comtalksshyam_sankar_the_rise_of_human_computer_.docx
httpswww.ted.comtalksshyam_sankar_the_rise_of_human_computer_.docx
wellesleyterresa
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco Portfolio
Sandy DiFranco
 
Purpose of Assignment The purpose of this assignment is to help .docx
Purpose of Assignment The purpose of this assignment is to help .docxPurpose of Assignment The purpose of this assignment is to help .docx
Purpose of Assignment The purpose of this assignment is to help .docx
makdul
 

Similar a THIS IS URGENT- DO NOT ACCEPT IT IF YOU WILL NOT FINISH IT TODAY-Resea.docx (15)

How to choose the right modern bi and analytics tool for your business_.pdf
How to choose the right modern bi and analytics tool for your business_.pdfHow to choose the right modern bi and analytics tool for your business_.pdf
How to choose the right modern bi and analytics tool for your business_.pdf
 
White Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan EnglishWhite Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan English
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
 
Audit PC content
Audit PC content Audit PC content
Audit PC content
 
Digital strategy overview
Digital strategy overviewDigital strategy overview
Digital strategy overview
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 
1190 Assignment Specifications1190.12 25 Points PossibleC.docx
1190 Assignment Specifications1190.12 25  Points PossibleC.docx1190 Assignment Specifications1190.12 25  Points PossibleC.docx
1190 Assignment Specifications1190.12 25 Points PossibleC.docx
 
1190 Assignment Specifications1190.12 25 Points PossibleC.docx
1190 Assignment Specifications1190.12 25  Points PossibleC.docx1190 Assignment Specifications1190.12 25  Points PossibleC.docx
1190 Assignment Specifications1190.12 25 Points PossibleC.docx
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
httpswww.ted.comtalksshyam_sankar_the_rise_of_human_computer_.docx
httpswww.ted.comtalksshyam_sankar_the_rise_of_human_computer_.docxhttpswww.ted.comtalksshyam_sankar_the_rise_of_human_computer_.docx
httpswww.ted.comtalksshyam_sankar_the_rise_of_human_computer_.docx
 
Kaptur mrd questions
Kaptur mrd questionsKaptur mrd questions
Kaptur mrd questions
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco Portfolio
 
Purpose of Assignment The purpose of this assignment is to help .docx
Purpose of Assignment The purpose of this assignment is to help .docxPurpose of Assignment The purpose of this assignment is to help .docx
Purpose of Assignment The purpose of this assignment is to help .docx
 

Más de kdennis3

Unit VII Assignment IntroductionThe Nature vs- Nurture debate is a lon.docx
Unit VII Assignment IntroductionThe Nature vs- Nurture debate is a lon.docxUnit VII Assignment IntroductionThe Nature vs- Nurture debate is a lon.docx
Unit VII Assignment IntroductionThe Nature vs- Nurture debate is a lon.docx
kdennis3
 
Unit VI Project Government Funding1Unit VI Project Government Fundin.docx
Unit VI Project  Government Funding1Unit VI Project  Government Fundin.docxUnit VI Project  Government Funding1Unit VI Project  Government Fundin.docx
Unit VI Project Government Funding1Unit VI Project Government Fundin.docx
kdennis3
 
Week 1 Lecture The Nature of Business ResearchBusiness researc.docx
Week 1 Lecture        The Nature of Business ResearchBusiness  researc.docxWeek 1 Lecture        The Nature of Business ResearchBusiness  researc.docx
Week 1 Lecture The Nature of Business ResearchBusiness researc.docx
kdennis3
 

Más de kdennis3 (20)

Unit VII Assignment IntroductionThe Nature vs- Nurture debate is a lon.docx
Unit VII Assignment IntroductionThe Nature vs- Nurture debate is a lon.docxUnit VII Assignment IntroductionThe Nature vs- Nurture debate is a lon.docx
Unit VII Assignment IntroductionThe Nature vs- Nurture debate is a lon.docx
 
Unit VI Project Government Funding1Unit VI Project Government Fundin.docx
Unit VI Project  Government Funding1Unit VI Project  Government Fundin.docxUnit VI Project  Government Funding1Unit VI Project  Government Fundin.docx
Unit VI Project Government Funding1Unit VI Project Government Fundin.docx
 
Which (if any) of Aquinass Five Ways of demonstrating Gods existence a.docx
Which (if any) of Aquinass Five Ways of demonstrating Gods existence a.docxWhich (if any) of Aquinass Five Ways of demonstrating Gods existence a.docx
Which (if any) of Aquinass Five Ways of demonstrating Gods existence a.docx
 
When conducting testing on a system the common approaches are-Unit Tes.docx
When conducting testing on a system the common approaches are-Unit Tes.docxWhen conducting testing on a system the common approaches are-Unit Tes.docx
When conducting testing on a system the common approaches are-Unit Tes.docx
 
What type of music- Where does the music come from-Who created this mu.docx
What type of music- Where does the music come from-Who created this mu.docxWhat type of music- Where does the music come from-Who created this mu.docx
What type of music- Where does the music come from-Who created this mu.docx
 
When conducting testing on a system the common approaches are-Unit Tes (1).docx
When conducting testing on a system the common approaches are-Unit Tes (1).docxWhen conducting testing on a system the common approaches are-Unit Tes (1).docx
When conducting testing on a system the common approaches are-Unit Tes (1).docx
 
What were the major causes of the American Civil War-Describe elements.docx
What were the major causes of the American Civil War-Describe elements.docxWhat were the major causes of the American Civil War-Describe elements.docx
What were the major causes of the American Civil War-Describe elements.docx
 
What strategies can staff nurses use to share evidence that could impa.docx
What strategies can staff nurses use to share evidence that could impa.docxWhat strategies can staff nurses use to share evidence that could impa.docx
What strategies can staff nurses use to share evidence that could impa.docx
 
What would our society be like if we suddenly developed a foolproof me.docx
What would our society be like if we suddenly developed a foolproof me.docxWhat would our society be like if we suddenly developed a foolproof me.docx
What would our society be like if we suddenly developed a foolproof me.docx
 
What is motivational interviewing (MI)-What is the righting reflex- Wh.docx
What is motivational interviewing (MI)-What is the righting reflex- Wh.docxWhat is motivational interviewing (MI)-What is the righting reflex- Wh.docx
What is motivational interviewing (MI)-What is the righting reflex- Wh.docx
 
Unit 1 AssignmentAttached Files-Due- Midnight SundayAs the new Chief I.docx
Unit 1 AssignmentAttached Files-Due- Midnight SundayAs the new Chief I.docxUnit 1 AssignmentAttached Files-Due- Midnight SundayAs the new Chief I.docx
Unit 1 AssignmentAttached Files-Due- Midnight SundayAs the new Chief I.docx
 
What is being done to fight child pornography and child exploitationon.docx
What is being done to fight child pornography and child exploitationon.docxWhat is being done to fight child pornography and child exploitationon.docx
What is being done to fight child pornography and child exploitationon.docx
 
What does it mean to be the director of an early childhood program- It.docx
What does it mean to be the director of an early childhood program- It.docxWhat does it mean to be the director of an early childhood program- It.docx
What does it mean to be the director of an early childhood program- It.docx
 
What branch of government should have control over issues of national.docx
What branch of government should have control over issues of national.docxWhat branch of government should have control over issues of national.docx
What branch of government should have control over issues of national.docx
 
What are the benefits of constructing an abstract and a capstone poste.docx
What are the benefits of constructing an abstract and a capstone poste.docxWhat are the benefits of constructing an abstract and a capstone poste.docx
What are the benefits of constructing an abstract and a capstone poste.docx
 
What are some of the challenges of implementing the Whole School- Whol.docx
What are some of the challenges of implementing the Whole School- Whol.docxWhat are some of the challenges of implementing the Whole School- Whol.docx
What are some of the challenges of implementing the Whole School- Whol.docx
 
Week 7 ProjectAssignment Due December 12 at 11-59 PMLeadershipSupport.docx
Week 7 ProjectAssignment  Due December 12 at 11-59 PMLeadershipSupport.docxWeek 7 ProjectAssignment  Due December 12 at 11-59 PMLeadershipSupport.docx
Week 7 ProjectAssignment Due December 12 at 11-59 PMLeadershipSupport.docx
 
Week 6 ProjectAssignment Due December 5 at 11-59 PMChallenges and Opp.docx
Week 6 ProjectAssignment  Due December 5 at 11-59 PMChallenges and Opp.docxWeek 6 ProjectAssignment  Due December 5 at 11-59 PMChallenges and Opp.docx
Week 6 ProjectAssignment Due December 5 at 11-59 PMChallenges and Opp.docx
 
Week 1 - Unconscious BiasOur biases can be dangerous- even deadly as.docx
Week 1 - Unconscious BiasOur biases can be dangerous- even deadly  as.docxWeek 1 - Unconscious BiasOur biases can be dangerous- even deadly  as.docx
Week 1 - Unconscious BiasOur biases can be dangerous- even deadly as.docx
 
Week 1 Lecture The Nature of Business ResearchBusiness researc.docx
Week 1 Lecture        The Nature of Business ResearchBusiness  researc.docxWeek 1 Lecture        The Nature of Business ResearchBusiness  researc.docx
Week 1 Lecture The Nature of Business ResearchBusiness researc.docx
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

THIS IS URGENT- DO NOT ACCEPT IT IF YOU WILL NOT FINISH IT TODAY-Resea.docx

  • 1. THIS IS URGENT. DO NOT ACCEPT IT IF YOU WILL NOT FINISH IT TODAY. Research Report #2: Emerging Issues Risk Analysis and Report CAUTION : there are a number of websites which are offering “professionally written― versions of this assignment. Please do not make the mistake of trying to use such papers as sources for your research. They do not meet the requirement for authoritativeness (see https://libguides.umgc.edu/credibility ). Your submitted work WILL be scanned by Turn It In and your grade will reflect the quality of your research and writing for this assignment. Scenario The Entertainment Team (ET -- part of Resort Operations at Padgett-Beale, Inc.) is excited about a new event management platform and is ready to go to contract with the vendor. This platform is a cloud-based service that provides end-to-end management for events (conferences, concerts, festivals). The head of Marketing & Media (M&M) is on board and strongly supports the use of this system. M&M believes that the data collection and analysis capabilities of the system will prove extremely valuable for its efforts. Resort Operations (RO) also believes that the technology could be leveraged to provide additional capabilities for managing participation in hotel sponsored “kids programs― and related children-only events. For an additional fee, the event management platform's vendor will provide customized RFID bands to be worn by attendees. The RFID bands and RFID readers use near-field communications to identify the wearer and complete the desired transactions (e.g. record a booth visit, make a purchase, vote for a favorite activity or performer, etc.). The RFID bands have unique identifiers embedded in the band that allow tracking of attendees (admittance, where they go within the venue, what they "like," how long they stay in a given location, etc.). The RFID bands can also be connected to an attendee's credit card or debit card account and then used by the attendee to make purchases for food, beverages, and souvenirs. For children, the RFID bands can be paired with a parent’s band, loaded with allergy information, and have a parent specified spending limit or spending preauthorization tied to the parent’s credit card account. The head of Corporate IT has tentatively given approval for this outsourcing because it leverages cloud-computing capabilities. IT's approval is very important to supporters of this the acquisition because of the company's ban on "Shadow IT." (Only Corporate IT is allowed to issue contracts for information technology related purchases, acquisitions, and outsourcing contracts.) Corporate IT also supports a cloud-based platform since this reduces the amount of infrastructure which IT
  • 2. must support and manage directly. The project has come to a screeching halt, however, due to an objection by the Chief Financial Officer. The CFO has asked that the IT Governance Board investigate this project and obtain more information about the benefits and risks of using RFID bands linked to an external system which processes transactions and authorizations of mobile / cashless payments for goods and services. The CFO is concerned that the company’s PCI Compliance status may be adversely affected. The Chief Privacy Officer has also expressed an objection about this project. The CPO is concerned about the privacy implications of tracking both movement of individuals and the tracking of their purchasing behaviors. The IT Governance Board agreed that the concerns expressed by two of its members (the CFO and CPO) have merit. The board has requested an unbiased analysis of the proposed use cases and the security and privacy issues which could be reasonably expected to arise. The IT Governance Board has also agreed to a request from the Chief of Staff that the management interns be allowed to participate in this analysis as their final project. Per the agreement, their involvement will be limited to providing background research into the defined use cases for cashless purchases. These use cases are: 1. Purchases for craft materials and snacks by children (under the age of 13) attending a hotel sponsored “kids club― program. 2. Purchases by Individuals attending a music festival or other event where IDs must be checked to establish proof of age (legal requirement for local alcoholic beverage consumption). 3. Purchases by attendees at trade shows (attendees are “adults―). Your Task Pick one of the three use cases listed above. Then, follow the directions below to complete the required research and write your final report. Research 1. Read / Review the readings in the LEO classroom. 2. Read this introductions to RFID technologies: https://www.gettoken.com/beginners-guide-rfid-technology-events/ 3. Research one or more of the Use Cases a. Children: 8 Benefits of Using RFID Wristbands for Resorts & Attractions (see section 4:
  • 3. Family Freedom) https://www.idcband.com/en-us/blog-us/8-benefits-of-using-rfid-wristbands-resorts-attractions/ and https://tappit.com/resources/blog/rfid-wristband-safety b. Managing Adult Attendees at Music Festivals (includes RFID bands linked to twitter, Facebook, and credit/debit card) http://www.techradar.com/news/world-of-tech/rfid-wristbands-vs-nfc-smartphones-what-s- winning-the-contactless-battle-1167135 c. Tracking Adults at Trade Shows https://blog.printsome.com/rfid-wristbands-good-bad/ 4. Choose one of the Use Cases then find and review at least one additional resource on your own that provides information about privacy and security related laws that could limit or impose additional responsibilities upon Padgett-Beale’s collection, storage, transmission, and use of data about guests. (Note: laws may differ with respect to collecting data from or about children.) You should also investigate laws, regulations, or standards which impact the use of the RFID bands for mobile purchases. 5. Using all of your readings, identify and research at least 5 security and privacy issues which the IT Governance Board needs to consider and address as it considers the implications of your chosen use case upon the adoption or rejection of the proposed IT project (Event Management Platform & RFID bands). 6. Then, identify 5 best practices that you can recommend to Padgett-Beale’s leadership team to reduce and/or manage risks associated with the security and privacy of data associated with the event management platform. Write Write a five to seven (5-7) page report using your research. At a minimum, your report must include the following: 1. An introduction or overview of event management systems and the potential security and privacy concerns which could arise when implementing this technology.  This introduction should be suitable for an executive audience. Provide a brief explanation as to why three major operating units believe the company needs this capability. 2. An analysis section in which you address the following: a. Identify and describe your chosen Use Case
  • 4. b. Identify and describe five or more types of personal / private information or data that will be collected, stored, processed, and transmitted in conjunction with the use case. c. Identify and describe five or more compliance issues related to the use of the RFID bands to make and track mobile purchases. d. Analyze and discuss five or more privacy and security issues related to the use case. e. Identify and discuss 3 or more relevant laws, regulations, or standards which could impact the planned implementation of the event management system with RFID wrist bands. 3. A recommendations section in which you identify and discuss five or more best practices for security and privacy that should be implemented before the technology is put into use by the company. Include at least one recommendation in each of the following categories: people, processes, policies, and technologies. 4. A closing section (summary) in which you summarize the issues related to your chosen use case and the event management platform overall. Include a summary of your recommendations to the IT Governance Board. Submit for Grading Submit your research paper in MS Word format (.docx or .doc file) using the Research Report #2 Assignment in your assignment folder. (Attach your file to the assignment entry.) Additional Information 1. To save you time, a set of appropriate resources / reference materials has been included as part of this assignment. You must incorporate at least five of these resources into your final deliverable. You must also include one resource that you found on your own. 2. Your research report should use standard terms and definitions for cybersecurity. 3. Your research report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance― requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use. 4. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
  • 5. 5. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).