Policy Research Paper: Mobile Application Security

Policy Research Paper: Mobile Application Security

Title:Mobile Application Security, Research Paper
Paper format APA, pages4   Double Spacing
sources 9
Paper Details
Policy Research Paper: Mobile Application Security
Research and write a 5-page academic research paper on one of the following policy related topics. Your research paper should fully address your chosen topic and be suitable for use as a policy brief distributed to an executive audience whose members are meeting to discuss IT Governance issues and policy needs within their respective organizations.
Your paper must present a summary of your research, discuss the applicability to IT governance, present a discussion of five or more policy issues related to the topic, and provide compelling reasons as to why busy executives should become more informed about these issues.
Your summary for the paper must address the question: How can this information be used to improve policy implementation? The summary should include five or more recommendations, which you developed from your research.
Preapproved Topics
•Assessment and Authorization Requirements for IT Systems
•Audit Requirements for Finance Systems (Sarbanes-Oxley, GLBA Compliance)
•Change Management (Configuration Control) for information systems and infrastructures.
•Implementing the NIST Risk Management Framework
•Information Security Metrics and Measurements (Audits and/or Governance)
•Information Sharing for Threats, Warnings, and Indicators (legal ramifications)
•Mobile Application Security
•Product Liability for Cyber security Products and Services
If you wish to research a policy topic not on this list, you must ASK FIRST (email your instructor or use the specified LEO discussion forum).
Requirements:
1.Your paper must be based upon 5 or more authoritative sources obtained from peer reviewed journals, published dissertations and theses, reports from public policy research organizations (e.g. Brookings, CSIS, PEW, etc.) or published government documents (not including Web pages). These authoritative sources must have been published within the last ten years.
2.Use the UMUC library databases and the Cybersecurity research guide http://libguides.umuc.edu/cybersecurity (in the OneSearch box, type “policy†and then check the boxes for “Full-text Only†and Scholarly journals only†)
3.You must submit your paper to Turn It In for originality checking. You must ensure that you have properly paraphrased and cited information obtained from your authoritative sources. Do not construct your paper by gluing together quotations.
4.Your paper must meet the APA formatting requirements as shown in the sample papers provided in the LEO classroom. See Course Resources > APA Resources and Course Resources > Writing Resources for more information.
Criteria, Steps and Rubric to follow (Below in bold are subheadings)
***Please make sure three reference sites per subheading.***
Introduction
Provided an excellent introduction section, which clearly and concisely identified the selected cyber security policy topic and included a brief overview of three or more major policy issues related to this topic. Appropriately used information from 3 or more authoritative sources.
Research Summary for the Selected Policy Topic
Provided an excellent discussion, which clearly, concisely, and accurately summarized the student’s research for the topic.
Appropriately used 5 or more authoritative sources obtained from peer-reviewed journals, published dissertations and theses, reports from public policy research organizations (e.g. Brookings, CSIS, PEW, etc.) or published government documents (not including Web pages). These authoritative sources were published within the last ten years.
Identification and Discussion of Policy Issues
Provided an excellent discussion, which clearly, concisely, and accurately discussed five or more policy issues related to the selected cyber security topic. Explained why these issues are important in the context of IT Governance and provided a compelling case as to why executives should become informed about these issues (at least five specific and compelling reasons). Appropriately used 5 or more authoritative sources obtained from peer-reviewed journals, published dissertations and theses, reports from public policy research organizations (e.g. Brookings, CSIS, PEW, etc.) or published government documents (not including Web pages). These authoritative sources were published within the last ten years.
Recommendations for Improving Policy Implementation
Presented an excellent summary of the research, which clearly and concisely explained how executives can use this information to improve policy implementation. Provided 5 or more specific and relevant recommendations for improving policy implementation. Appropriately used information from 3 or more authoritative sources.
Quality of Research

 

Used 10 or more authoritative sources to support the paper. At least five of these sources were obtained from peer-reviewed journals, published dissertations and theses, reports from public policy research organizations (e.g. Brookings, CSIS, PEW, etc.) or published government documents (not including Web pages). At least 10 authoritative sources were published within the last ten years. Work contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource. No formatting, grammar, spelling, or punctuation errors.
 

"Is this question part of your assignment? We Can Help!"