辅导案例-ICT380-Assignment 1

欢迎使用51辅导,51作业君孵化低价透明的学长辅导平台,服务保持优质,平均费用压低50%以上! 51fudao.top
ICT380 Assignment 1 Instructions
Due Date: Saturday, 29th February 2020

Research the topic of Information Security Management from quality sources and write
research essay on the topic of: The Need for Information Security Management for Small
to Medium Size Enterprises (SMEs)

The research essay is an individual assignment. It is not part of the group’s work for the unit.
The essay should not exceed 3500 words, including references. The essay should not be
below 2900 words or exceed 3500 words (5% penalty will apply).

Your research essay should explore four (4) topics among the ones listed below, focusing on
the major relevant issues of the chosen topics. The research essay should describe and
discuss the challenges in the introduction and implementation of information security
regimes in small to medium enterprises (SMEs) compared against implementation in much
larger organizations.

Student must discuss the following:-
 Introduction, and
 Justifying the need for sound Information Security Management in SMEs, include
o Statistics of cyber-security threats targeting large originations vs
o Statistics of cyber-security threats targeting SMEs originations
Then, choose four (4) topics among the following:-
 Implementation of Information Security Frameworks
 Implementation of AI and Machine Learning in Cyber Security
 Data Privacy issues in Information Security Management
 Disaster Recovery Planning in Information Security Management
 Regulatory Compliance in Information Security Management
 Smartphone Security Management

NOTE: This is NOT an essay about what SMEs should do, but rather it’s a research based
analysis of challenges they face in implementing ISM regimes in the security areas—topics—
you will be discussing. You will therefore be marked as follows: For each topic, (i) describe
the topic; (ii) discuss the major relevant issues relating to its implementation in SMEs with
supporting evidence/references; (iii) against larger organization with supporting
evidence/references. You must base your discussion on the work of credible and relevant
authors – that means in-text citation and references must be provided. See next page, for
acceptable references and a referencing guide.

You must produce a research essay based on the work of credible and relevant authors (not
your opinion or gut-feeling about information security management). The research essay
should be fully referenced. The essay is marked purely on content, so essays that simply try
to make up the word limit but provide limited information will receive poor marks.
Please format your document in font size 12, double line spacing and single column.
You must submit the essay in WORD format to the unit coordinator through the LMS
assignment submission system. So that your work doesn't get mixed up with others', use a
filename that follows the convention: Unit code, trimester, year, assignment name, your last
name, e.g., ICT380_TJA_2020_Research_Essay_Lastname.docx.
Acceptable references and appropriate referencing
 Include appropriate citations throughout the paper and a list of references at the end,
using APA style. See http://libguides.murdoch.edu.au/APA
 Your paper should include a minimum of 14 references.
 Only 4 of the references can be news articles, textbooks, websites such as CNET or
government websites etc. otherwise all other references MUST be academic/scholarly.
 Scholarly references can be found via Google Scholar or through Murdoch University
Library Search (http://www.murdoch.edu.au/library/).
 Published no earlier than 2011, unless you are adding a historical perspective.
 Wikipedia and references from essay or assignment websites are NOT valid
references. ZERO marks will be awarded (to the entire topic discussion) for use of
such references.
 Use your own words, paraphrase your work.
 Any part of your research essay that has been copied word-for-word (verbatim) from
any source will NOT be marked, and may be reported as plagiarism.
 NOTE: Plagiarism is not acceptable. Urkund will be used to report on potential
plagiarism.
 Find out more about how to reference properly and avoid plagiarism at,
http://our.murdoch.edu.au/Student-life/Study-successfully/Referencing-and-citing/

Research Essay Marking Guide
The marks will be allocated as follows, with a total of 25 Marks being available


Component Max marks Structure
Introduction and
Justification

4 - Introduction
- Justification
Coverage of the Topic 12 - Coverage of all four the topics
- Detailed discussion with research support
Conclusion

2 - Effective conclusion

Research

5 - References from 2011 onward
- Minimum 14 references
- Mostly academic/scholarly articles (e.g. journal articles and
conference papers),
- Only 4 can be from new articles or textbook
- Correct use of APA references and APA in-text citation
- APA style
Grammar, spelling 2 - Fluent correct grammar
- Spell-checked and
- Correctly punctuated
TOTAL MARKS out of 25

51作业君

Email:51zuoyejun

@gmail.com

添加客服微信: abby12468