Microsoft Word - 500as3change2019.docx MIS500-Assign3 Page 1 of 3 ASSESSMENT BRIEF Subject Code and Name MIS500 Foundations of Information Systems Assessment Assessment Three – Reflective Portfolio...

1 answer below »
i need high distinction professional quality work i am failing in this subject its related to information system please check and do it accordingly


Microsoft Word - 500as3change2019.docx MIS500-Assign3 Page 1 of 3 ASSESSMENT BRIEF Subject Code and Name MIS500 Foundations of Information Systems Assessment Assessment Three – Reflective Portfolio Individual/Group Individual Length 3000 words Learning Outcomes This assessment addresses the following subject learning outcomes: d) Develop own professional practice and ethical standards around business problems and implementation of solutions Submission By 11:59 PM AEST/AEDT Friday of Module 6.1 (week 11) Weighting 40% Total Marks 40 marks Context: The assessment suite in this subject is built on top of skills you are building in your learning activities. Although the learning activities do not carry any assessable weight by themselves, completing them and seeking input from your peers and the learning facilitator is essential for you to achieving a positive result in the subject. Before beginning this assessment, be sure that you have completed the learning activities in all of the modules. Instructions: As you begin this subject, start and keep a learning journal that you add to during the process of learning about the foundations of information systems. A suggested format for the learning journal is as follows: Date Learning Activity Impact Evidence (You are free to have another format of your choosing, and if you do, the following comments will need to be adjusted.) MIS500-Assign3 Page 2 of 3 For each day in your learning journey, write the date and then the learning activity you engaged in. Detail what impact the learning had on you and then include any evidence you might like to keep later. This journal should be appended to this assessment when you submit it. To do this assessment well, you will need to engage in reflective analysis. Reflection is what happens when you are quiet and calm and have appropriate time to study and is how you integrate the materials in this subject with what you already know. Sometimes the materials may challenge what you already know, and at other times it may create new knowledge, opinions or ways you will integrate into your professional practice. Reflection is not a cursory comment about a learning activity but instead is an authentic assessment as it involves you being vulnerable, allowing your personal beliefs and the way you perceive the world around you to be challenged and, if necessary, changed by what you learn. An important element of reflection is your incorporation of your belief system, your morals and ethics as well as how you view the impact of information systems on people. Toward the end of the trimester, take your learning journal and then build a narrative that summarises the journey and learnings you undertook while studying this subject. You should refer to specific journal entries and/or extracts from learning activities to demonstrate your learning. You should refer to how you can apply the learnings in your future career or the organisation you currently work for. Should you wish to you can focus your self reflection on one aspect of the subject from the following topics : - Business Intelligence and Big data - Cybersecurity - Agile Methods and system development - CRM technologies - SCM Technologies There is no required format for the assessment. Students should use initiative and be sure to conform to the APA referencing style, making use of external sources as appropriate. Be sure to bookend your assignment with an introduction and conclusion. You may also like to append your learning activities or other artefacts that demonstrate the attainment of your learning or the ways in which the learning materials have affected you personally. Submission Instructions: Do not leave this assessment to the last minute! You are expected to begin this assessment when you begin the trimester, especially as you relate the learning activities (formative assessment) to this and the other (summative) assessments. Be sure to keep several drafts of your work as well as your notes and any sources you used to draw on in preparing it. Although the journal is not part of the word count in this assessment, to get the level of richness required, it is expected that it will be approximately twice the number of words in the assessable component of the assessment. MIS500-Assign3 Page 3 of 3 Be sure to build a narrative as your learning journal on its own will not be read. Extensions will be considered only in extenuating circumstances where the student has applied before the due date. At that point, students are required to provide the latest draft, in case the extension is not granted. Students are responsible for keeping appropriate back-ups and drafts of their assignments and to submit the correct version. Torrens University Australia policies apply to the preparation and submission of this assignment. Learning Rubric: Assessment Three Assessment Criteria Fail (Unacceptable) 0-49% Pass (Functional) 50-64% Credit (Proficient) 65-74% Distinction (Advanced) 75 -84% High Distinction (Exceptional) 85-100% Cogency and completeness of learning journey 40% The learning journey has been cursorily put together and needs significant work in scoping and recounting how the student has developed. The scope of the report needs significant adjustment and the student needs further work in demonstrating how they have changed as a result of undergoing the subject. The scope of the learning journey may need to be adjusted or the account provided may need more imagination as to how the subject developed the student. The learning journey has a scope that is good and includes a very good account of how the student changed as a person and as a professional. The learning journey narrative has been scoped well and includes a complete account of how the student changed, both as a person and a professional. Depth of learning journey demonstrated in the narrative 40% The learning journey has been cursorily put together and needs significant work in demonstrating how the subject has developed the student. The learning journey has a passable level of detail; more work is needed to demonstrate how the subject has changed the student as a result of undergoing it. The learning journey shows an average level of depth; there may not be any vulnerability or detail in how they have changed as a result of undergoing the subject. The learning journey has a good level of depth and the student has shown a hint of vulnerability as well as good detail in how they have grown as a person and as a professional. The learning journey is chronicled to an appropriate depth and the student has shown vulnerability as well as significant detail in growing as a person as a professional. Use of artefacts to support demonstration of learning journey 20% It may be obvious that the student has not completed self-directed study or completed the learning activities. Significant more work is needed to demonstrate the work the student did in the subject. The student can be seen to have made an attempt to refer to work they have done in their study of the subject to illustrate their journey. The assessment includes a good number of references to work the student has previously done in the subject to illustrate their journey. The assessment includes a very good number and frequency of references to work the student has previously done, to illustrate their journey. The assessment includes numerous references to the learning journal and learning activities throughout. MIS500-Assign3 Page 3 of 3
Answered Same DayNov 19, 2021MIS500Torrens University Australia

Answer To: Microsoft Word - 500as3change2019.docx MIS500-Assign3 Page 1 of 3 ASSESSMENT BRIEF Subject Code and...

Moumita answered on Nov 29 2021
150 Votes
ASSESSMENT 3         15
ASSESSMENT THREE – REFLECTIVE PORTFOLIO
Table of Contents
Reflection Table    3
Introduction    5
Discussion    5
Conclusion    12
References    14
Reflection Table
    Date
    Learning activity
    Impact
    Evidence
    27/05/2019
    Cybercrime
    The study of the topic of cybercrime provides a proper knowledge about cybercrime and also made me aware of the cyber threats.
    In discussing the topic of cybercrime it can take as a piece of evidence in future any tendency of cybercrime can be removed by a proper study of cybercrime.
    29/05/2019
    Cyber security
    The study of cyber security indicates the knowledge a
bout the precautions and the essential process of security that can be taken by me to reduce the risk of cyber attack.
    As evidence it can be said that the concept of cyber security can be used by me in the future aspect in order to avoid any kind of cyber attack. In order to secure all the essential information and data, there is a huge need to use cyber security.
    03/06/2019
    Malware
    Malware is also can be termed as malicious software. I think that malware can be incorporated into the computer and causes damage to the computer.
    By knowing about that malware the necessary precautions can be adopted by me in the future.
    07/06/2019
    Ransomeware
    The Ransomeware is also a special type of malware. By studying the Ransomeware I have understood that the malwares can be installed into the computer from various sources. So the secure use is needed.
    In the future concern, the necessary steps can be taken by me in order to deal with the Ransomeware.
    09/06/2019
    DNS Tunnelling
    The protocol that helps in the conversion of the human-friendly language to the machine language.
    Using this various future aspects of programming can be done. However, I did not completely understand its implication and concept.
    11/06/2019
    Spam
    Files or the software contains virus or malware.
here I studied the overall concept of the spam.
    Studying them various approaches to removing them can be adopted.
by studying about the spam I could understand the various sources and types of spam file.
    15/06/2019
    Malicious crypto mining
    Browser-based attack.
It gave me an account of various cyber attack.
    Essential security model can be designed to deal with it.
In learning this I could understand the various type of the browser based attack.
    18/06/2019
    Network security
    Tells about the security model of the network. However, in this study I managed to learn various topics related to Network security.
    Secure transaction can be possible.
From the study of the network security I have learned the various security management system of networking.
    22/06/2019
    Database security
    Ensure the secure access of data
    Security management purpose
by studying this I have learned about the database security management system.
    25/06/2019
    End-user management
    Ensure the smooth access of data to the end-user.
    Can be dealt with the management system of the cyber world. through this study I have learned a lot of things in order to manage the end user.
    28/06/2019
    Mobile security
    Related with the security model of the mobile. in this study mobile security management has been learned by me.
    Make sure the effective security of the software.
in this study I have learned the management as well as security system of the mobile.
    02/07/2019
    Cloud security
    Set of technology that helps in secure access to the cloud computing system. I have studied the management system regarding the cloud computing.
    Various upgraded technology can be used and the IP address and other important data can be protected. from this I could manage to learn about the security management .
Introduction
    This project is to highlight the cyber crimes in the recent events. Crimes have been a major issue in today's world. The increase in the cyber rimes have led to immense damages to the lives of human beings. In this project, I would like to bring the attention of the readers to the various types of cyber crimes and their impacts on social lives. The assignment contains the definitions of the various kinds of technological related crimes that happen on a regular basis that destroy the peaceful living of our lives. Through this assignment various definitions of cyber related crimes can be identified and acted upon.
Discussion
Cybercrime
    Cybercrime is a type of crime that is now a day that has become the most important matter of concern. The crime related to the computer or the cyber world is termed as cybercrime. Illegal activities like hacking and cyber threat has become a very common issue now a day. Doing any unethical activity by using the virtual medium or internet is termed as the cybercrime. In the era of digitalisation the cybercrime is a harmful issue to the modern world. By putting malicious software into the computer and hacking the information and data is a common method of cyber crime (Gupta, Agrawal & Yamaguchi, 2016). Now in the era of the twenty-first century I have assumed that the rate of the cybercrime is increasing day by day. The cybercrime can be a major issue in case of safety purposes. The government, as well as the concerned authority, is very much concerned about the issues of cybercrime in the current century. The developed countries the rate of cybercrime is more as compared to the developing or underdeveloped countries. The countries main focus is gradually taking the problem of the cybercrime. The hackers are taking access to all the important6 data and retrieve those data and using them in an unethical manner. Those illegal use of data is now a day considered as a crime. Those violate the fundamental right of the privacy of the people.
Cyber security
    In the age of digitalisation there can be seen the touch of the technology in every aspect of life. All the transaction and all the procedure of data storing and data mining has become digitalised now a day. So it has been a necessary part to secure those data in an effective way. Here the application of cyber security lies. The term cyber security indicates the essential protections against cyber crimes. Various software, as well as various...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here