CriteriaFaculty of Science, Engineering and Computing Assessment Brief Module: CI4450 Setter: Graeme Jones Title of Assignment: Technical Report 3 Deadline: 2359 Monday January 9th,...

1 answer below ยป






Criteria Faculty of Science, Engineering and Computing Assessment Brief Module: CI4450 Setter: Graeme Jones Title of Assignment: Technical Report 3 Deadline: 2359 Monday January 9th, 2023 Module weighting: 10% Overview In this assessment you will be asked to write a two-page technical report on a digital security or intellectual property topic that is relevant to your course and which would demonstrate to a future employer your commitment to protecting digital or intellectual assets. Relationship of this Assessment to the Module Communication Skills One of the key learning outcomes of this module is to enable students to Communicate effectively within the work environment in terms of written, verbal and presentational skills, be able to search for, critically evaluate and reference appropriately information from a variety of sources (Kingston University 2019). The Communications Skills Portfolio element of assessment (which is worth 30% of the total module mark) will focus on writing skills as well as research and referencing skills; more generally the ability to construct well-crafted and well-researched technical reports. This Communications Skills Portfolio element of assessment consists of three assignments each worth 10% i.e. Technical Report 1, Technical Report 2, and Technical Report 3. This third assignment will focus more on research and referencing skills and the ability to develop and articulate reasoned arguments rather than the presentational aspects. Assessment Specification Choose a digital security or intellectual property topic that is relevant to your course and which would demonstrate to a future employer your commitment to protecting digital and intellectual assets. A list of example topics is given at the end of this document. You are free to use these or come up with a topic that really interests you. If you select your own topic then you should have it checked by the module delivery team first. You cannot choose a topic that you have previously tackled in Technical Report 1 and Technical Report 2. It should have a clear digital security or intellectual property theme that you will need to research and discuss critically i.e. explore the issue from a critical standpoint. It is recommended that you take no particular ethical stance personally but rather report the literature in a balanced manner. Develop your narrative taking care to clearly explain and justify the key claim(s). Justifications and evidence should be supported by appropriate high-quality references. (The majority of your references should not be websites.) You should present your discussion as a technical report using an appropriate structure and written in a suitable format and style as outlined in the accompanying Communication Skills lectures. Your report should be no more than 1000 words i.e. roughly two pages long using a Calibri 11pt font. (It will be marked down if significantly different from this.) The main text should not contain any pictures, diagrams, or tables but you may choose to provide non- written content in the appendices (although these will not contribute to the marks). You should avoid quotes. The structure of your report should be derived from a mind map developed from your research over the four weeks of the assessment. This mind map must be included as an appendix to the report. The word count does not include the text in the references or appendices but does include the title, author, and section titles. You should use Kingston Universityโ€™s Harvard referencing style and you will be penalised if either your citations or references do not conform to this style. You are encouraged to use the Word 2010 style file and use one of the technical report templates available on the links below. Mac users should adopt some similar simple professional style file. Two approaches to the report are envisaged. The first is a simple technical report style. The second is a technical memo which explores the background to the topic in the first half and then goes onto make specific recommendations for professional practice in the second half. Templates for both these styles are given in the Box links below. Technical Report template Technical Memo with Recommendations template Submission Details You should upload your technical report to the submission box within the Assignments page of the Canvas module by midnight of the day of the deadline. The allowed document types are Word or PDF. (Other formats will be considered on request.) Deadline: 2359 Monday January 9th, 2023 Aim to complete and upload the assignment well before the deadline even if it is an early draft. Missing the deadline by even a few minutes will result in a cap of 40%. If you miss the deadline then you still have a further week before a cap of 0% is applied. If you are ill or have problems which prevent you from meeting the deadline you may be able to negotiate an extension in advance. The University Mitigating Circumstances policy may apply. You will need to use the online Extensions and Mitigation Circumstances system. Remember if you submit a piece of work or attend an examination, you have judged yourself fit to undertake the assessment and cannot claim mitigating circumstances retrospectively. Top Tip: Aim to submit a couple of days before the deadline. You can always improve it and submit multiple times. Assessment Criteria Continued overleaf โ€ฆ https://kingston.box.com/s/s873nnlo69ccg1pdnwhvkf7st9c04iuw https://kingston.box.com/s/mm1o6og4itiiohfpaxzaebh7vbuhfmhq Assessment Criteria Marking and the generation of feedback will be performed against the following marking criteria. Within each category the different criteria have equal weighting. (Please note that the criteria have changed from Technical Report 1 and Technical Report 2. The quality of the sources of information you cite is now measured within the Content assessment criteria while the accuracy of your Harvard citing and referencing has moved to the Presentation assessment criteria.) Content (67%) Digital security or intellectual property topic chosen capable of providing a critical discussion Arguments appropriately structured and supported by evidence Quality (CRAAP) of evidence used to support argument Presentation (33%) Appropriate section structure and formatting of a professional quality Referencing and citing accurate and uses the Harvard referencing style Language of a professional quality (style, grammar and spelling) Academic Misconduct Plagiarism is presenting somebody elseโ€™s work as your own. It is an offence to copy materials (even if it is a phrase or a sentence) from the Internet or other work and publications. You must write everything in your own words. Collusion is also an offence i.e. allowing another student to use your work even if it is just as a template! There is a heavy penalty for plagiarism and collusion which could see you receiving a ZERO mark and your subsequent academic record may be affected. Further details about plagiarism and referencing can be found at: http://www.kingston.ac.uk/aboutkingstonuniversity/howtheuniversityworks/policiesandregulations /documents/Plagiarism_%20Student.pdf Top Tip: Never cut and paste paragraphs from a source of information even if it is just for your own research notes! References Kingston University (2019) โ€˜Module Descriptor CI4450 Professional Environmentsโ€™. Available at: https://mykingston.kingston.ac.uk/myfaculty/sec/Pages/SEC-Module-Guides.aspx (Accessed: 03 Sep 2019) Topic Ideas โ€ข Encryption โ€“ a mathematical arms race? โ€ข Authentication โ€“ security issues with the public key infrastructure โ€ข Users โ€“ the weakest link in business security systems? โ€ข Peer-to-peer โ€“ securing digital rights โ€ข Does patenting promote or hinder human progress? โ€ข Creating digital artefacts - recommendations for the workplace โ€ข Minimising vulnerabilities in code โ€“ best practice and professionalism โ€ข Invention versus discovery โ€“ monetarising equations โ€ข Rights and copyright in digital media โ€ข Are patent wars a justifiable form of commercial competition? โ€ข Data Protection Principles โ€“ recommendations for the workplace โ€ข Licencing digital media - recommendations for the workplace โ€ข Data Mining and Machine Learning โ€“ recommendations for the workplace http://www.kingston.ac.uk/aboutkingstonuniversity/howtheuniversityworks/policiesandregulations/documents/Plagiarism_%20Student.pdf http://www.kingston.ac.uk/aboutkingstonuniversity/howtheuniversityworks/policiesandregulations/documents/Plagiarism_%20Student.pdf https://mykingston.kingston.ac.uk/myfaculty/sec/Pages/SEC-Module-Guides.aspx
Answered 49 days AfterJan 09, 2023

Answer To: CriteriaFaculty of Science, Engineering and Computing Assessment Brief Module: CI4450...

Aditi answered on Jan 09 2023
42 Votes
Principles of Data Protection:
The 7 principles of data protection are the guiding principles of data protection and privacy in many countries. These principles are typically found in privacy laws and regulations, such as the Canadian Personal Information Protection and Electronic Documen
ts Act (PIPEDA) and European Union's General Data Protection Regulation (GDPR).
ยท Lawfulness, fairness, and transparency: In particular, data processing must have a legal basis, such as consent from the data subject, a contractual obligation, or a legitimate interest pursued by the data controller. It aims to ensure that personal data is processed in a way that is lawful, ethical, and respectful of individuals' rights and freedoms.
ยท Purpose limitation: The purpose limitation principle is designed to protect individuals from having their personal data used in ways that they did not expect or that may be harmful to them. It also ensures that organizations do not collect or process more personal data than is necessary for the specific purposes for which it is collected.
ยท Data minimization: It is designed to help organizations minimize the risks associated with processing personal data, by limiting the amount of personal data that is collected and processed. This can help reduce the risk of data breaches and unauthorized access.
ยท Accuracy: Personal data should be accurate and this can help in keeping the data updated. It includes controllers along with steps for ensuring that the data is safe, and individuals have the right to request that inaccurate data be corrected or erased.
ยท Storage limitation: The storage limitation principle is designed to help organizations minimize the risks associated with processing personal data, by limiting the amount of time that personal data is stored.
ยท Integrity and confidentiality: It is implemented with appropriate technical and organizational measures to ensure the integrity of personal data, such as data backup and recovery procedures, access controls, and encryption.
ยท Accountability: This principle requires data controllers to be accountable for complying with the other six principles. Data controllers must demonstrate that they comply with these principles and have processes in place to ensure ongoing compliance. This includes establishing clear policies and procedures, conducting regular audits, and appointing a Data Protection Officer in certain circumstances.
The ISO 31000 risk management methodology; What is ISO 31000?
ISO 31000 is an internationally recognized standard that provides guidelines for risk management. It was first published in 2009 by the International Organization for Standardization (ISO) and has since been updated to reflect changing risk management practices.
The purpose of ISO 31000 is to help organizations of all sizes and types to develop a structured and comprehensive approach to risk...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions ยป

Submit New Assignment

Copy and Paste Your Assignment Here