Subject Business Management Information Systems (MIS)

Question

Hypothetical Policy Paper in Cyber National Security
The paper must not be longer than 5 pages. Use 1.5 spacing, Times New Roman 12 pt font, and 1-inch margins. References can be added as a 6th page. Decision tree, any tables, and figures for sensitivity analysis can be presented in an appendix – use reasonable length.
For your quantitative analysis, you may use any decision-making software you wish, but you must copy your tree diagram into the same document as policy paper. It should be formatted to be readable and clean. No software other than a simple spreadsheet program is required.
For your qualitative analysis, research using scholarly sources is essential. This research can include, but should not be limited to, articles in scholarly journals accessible through Google Scholar, Searchworks or the Social Science Research Network (SSRN), magazines like Foreign Policy, recent news events and developments, and required or suggested readings for the course.
Please cite your sources in your paper using numbers in brackets (e.g. “Nuclear fusion is a nuclear reaction in which two or more atomic nuclei join to form a new type of atomic nucleus [1].”) or use Word Footnotes and choose Endnotes to compile at the end. Use Arabic not Roman numerals. The reference section should use a formal standard.

Solution Preview

This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.

On February, 14th, there was a massive data breach at Google Mail. Reliable intelligence attributes the “hack” to Chinese sub-nationals believed to be supported by the Chinese Government. A series of response actions have been proposed by the Intelligence Community (IC), including the Department of Defense and the State Department.
Of the three “action” options presented, as well as the Status Quo option (Do Nothing), Option C, the diplomatic approach advocated by The State Department through John Kerry, has the lowest negative impact and minimal risk. Therefore, it is the recommended course of action in this Policy Position Paper. The Status Quo option is also viable, as Option C (or any of the others) could still be triggered at a later time, but more significant economic loss will result in the interim.
It should be noted that Option B, bringing down the “Great Firewall of China” sets an international precedent related to country sovereignty and international law...

This is only a preview of the solution. Please use the purchase button to see the entire solution

$83.00

or free if you
register a new account!

Assisting Tutor

Related Homework Solutions

Financial Services Information System - Variation of Products Costs
Homework Solution
$88.00
Bank
Software
Product
Vendor
Application
Commercial
Open-source
Cost
7-year
User
Component
Licensed
Access
Server
CPU
Installed
Production
Environment
Site
Disaster
Recovery
Processing
MS
Excel
Horizontal
Axis
Interval
Vertical
Impact of Some Specific IT Policies in the Industry
Homework Solution
$25.00
GPRA-1993
FASA-1994
GPEA-1998
PRA-1995
E GOV-2002
Circular
A-130
Policy
IT
Framework
Management
Information
System
Governance
Act
CIO
MIB
OMB
Federal
Security
Role Play Script
Homework Solution
$100.00
Role
Play
Script
Business
Management
Information
Systems
MIS
Management Information Systems
Get help from a qualified tutor
Live Chats