Subject Business Management Information Systems (MIS)

Question

Hypothetical Policy Paper in Cyber National Security
The paper must not be longer than 5 pages. Use 1.5 spacing, Times New Roman 12 pt font, and 1-inch margins. References can be added as a 6th page. Decision tree, any tables, and figures for sensitivity analysis can be presented in an appendix – use reasonable length.
For your quantitative analysis, you may use any decision-making software you wish, but you must copy your tree diagram into the same document as policy paper. It should be formatted to be readable and clean. No software other than a simple spreadsheet program is required.
For your qualitative analysis, research using scholarly sources is essential. This research can include, but should not be limited to, articles in scholarly journals accessible through Google Scholar, Searchworks or the Social Science Research Network (SSRN), magazines like Foreign Policy, recent news events and developments, and required or suggested readings for the course.
Please cite your sources in your paper using numbers in brackets (e.g. “Nuclear fusion is a nuclear reaction in which two or more atomic nuclei join to form a new type of atomic nucleus [1].”) or use Word Footnotes and choose Endnotes to compile at the end. Use Arabic not Roman numerals. The reference section should use a formal standard.

Solution Preview

This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.

On February, 14th, there was a massive data breach at Google Mail. Reliable intelligence attributes the “hack” to Chinese sub-nationals believed to be supported by the Chinese Government. A series of response actions have been proposed by the Intelligence Community (IC), including the Department of Defense and the State Department.
Of the three “action” options presented, as well as the Status Quo option (Do Nothing), Option C, the diplomatic approach advocated by The State Department through John Kerry, has the lowest negative impact and minimal risk. Therefore, it is the recommended course of action in this Policy Position Paper. The Status Quo option is also viable, as Option C (or any of the others) could still be triggered at a later time, but more significant economic loss will result in the interim.
It should be noted that Option B, bringing down the “Great Firewall of China” sets an international precedent related to country sovereignty and international law...

This is only a preview of the solution. Please use the purchase button to see the entire solution

Assisting Tutor

Related Homework Solutions

Three Questions on IT Governance
Homework Solution
$25.00
Major
Point
Nicholas
Carr
Article
IT
Governance
Difference
Professor
Gurbaxani
Statement
Top
Management
Business
Strategic
Advantage
Technology
National Response Framework Review (950 words)
Homework Solution
$33.00
National
Response
Framework
FEMA
Review
Critical
Element
Strategy
Incident
Response
Plan
Operation
Key
Role
Responsibility
NIMS
NRF
Get help from a qualified tutor
Live Chats