{"id":8892,"date":"2024-01-20T23:54:55","date_gmt":"2024-01-20T23:54:55","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/padm-710-research-paper-challenges-and-biblical-principles-in-managing-information\/"},"modified":"2024-01-20T23:54:55","modified_gmt":"2024-01-20T23:54:55","slug":"padm-710-research-paper-challenges-and-biblical-principles-in-managing-information","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/padm-710-research-paper-challenges-and-biblical-principles-in-managing-information\/","title":{"rendered":"PADM 710-Research Paper: Challenges and Biblical Principles in Managing Information"},"content":{"rendered":"<p style=\"cursor: auto; color: inherit;\"><b style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 14pt; line-height: 107%; cursor: auto; color: inherit;\">Research Paper:<br \/>\nChallenges and Biblical Principles in Managing Information Assignment&nbsp; &nbsp; Instructions<\/span><\/b><\/p>\n<p style=\"margin: 6pt 0in 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Overview<\/span><\/p>\n<p style=\"margin: 6pt 0in 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Technology brings significant risks and challenges<br \/>\nalong with its benefits. Wise public administrators need&nbsp; &nbsp;to know about those<br \/>\nrisks and constantly be vigilant to prevent misuse of information by<br \/>\nthemselves, their organizations, or external forces.<\/span><\/p>\n<p style=\"margin: 6pt 0in 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Instructions<\/span><\/p>\n<p style=\"margin: 6pt 0in 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">This paper focuses on the stakeholders in public<br \/>\nsector information management\u2014who are they, what are&nbsp; &nbsp;their roles and impacts,<br \/>\nand why is each important to me as a public servant or citizen? <\/span><\/p>\n<p style=\"margin: 6pt 0in 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">It consists of 3 parts (below) <u style=\"cursor: auto; color: inherit;\">plus an introduction<br \/>\nand references sections<\/u>. To make it easier for readers to&nbsp; &nbsp;follow your<br \/>\nthinking, please discuss the topics in the order presented below, with<br \/>\nappropriate heading. <\/span><\/p>\n<p style=\"margin: 6pt 0in 0in 0.25in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00b7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">8 \u2013 10 pages of<br \/>\ncontent, double-spaced<\/span><\/p>\n<p style=\"margin: 6pt 0in 0in 0.25in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00b7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Current APA format<\/span><\/p>\n<p style=\"margin: 6pt 0in 0in 0.25in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00b7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Must include<br \/>\ncitations from all readings, videos, and presentations for the assigned Module (see&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; attachements):<br \/>\nWeek&nbsp; &nbsp; &nbsp; plus additional, relevant scholarly articles (published within the last<br \/>\nfive years)&nbsp; you select\u2014for a total of 12 \u2013 15 sources.<\/span><\/p>\n<p style=\"margin: 6pt 0in 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><u>Research Paper:<br \/>\nChallenges and Biblical Principles in Managing Information<\/u><\/span><\/p>\n<p style=\"margin: 6pt 0in 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"margin-bottom: 0in; line-height: normal; cursor: auto; color: inherit;\"><u style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Part 1:<br \/>\nEthical\/Legal Issues and Challenges<\/span><\/u><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">:&nbsp;<\/span><\/p>\n<p style=\"margin-bottom: 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00b7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">From your<br \/>\nperspective what are the major ethical and legal challenges and risks for abuse<br \/>\nthat we must&nbsp; &nbsp;keep top of mind in the&nbsp;collection, management, and use of<br \/>\ninformation and technologies overall\u2014and in&nbsp; &nbsp; &nbsp;the public arena<br \/>\nspecifically?&nbsp;<\/span><\/p>\n<p style=\"margin-bottom: 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00b7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Suggest guidelines<br \/>\nto help prevent unethical uses of data in general and especially in the public<br \/>\nsector.<\/span><\/p>\n<p style=\"margin-bottom: 0in; line-height: normal; cursor: auto; color: inherit;\"><u style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/span><\/u><\/p>\n<p style=\"margin-bottom: 0in; line-height: normal; cursor: auto; color: inherit;\"><u style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Part 2:&nbsp;Technology-related<br \/>\nThreats and Challenges, e.g., Cybersecurity<\/span><\/u><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">:&nbsp;<\/span><\/p>\n<p style=\"margin-bottom: 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00b7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Briefly describe<br \/>\nthe major technology-related threats, risks, and challenges to protecting data.<br \/>\nWhat are&nbsp; the major threats and&nbsp;risks?&nbsp;<\/span><\/p>\n<ul style=\"margin-top: 0in; cursor: auto; color: inherit;\">\n<li style=\"margin-bottom: 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">The<br \/>\n     &#8220;dark web&#8221; is big business.&nbsp;<\/span><\/li>\n<ul style=\"margin-top: 0in; cursor: auto; color: inherit;\">\n<li style=\"margin-bottom: 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">What is the &#8220;dark<br \/>\n      web&#8221;?&nbsp;<\/span><\/li>\n<li style=\"margin-bottom: 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">What threats does it pose to your personal\/family<br \/>\n      use and\/or your organization&#8217;s use of&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;technology and information?&nbsp;<\/span><\/li>\n<\/ul>\n<li style=\"margin-bottom: 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">How<br \/>\n     do we minimize the risks you discussed above? E.g., what are some<br \/>\n     best\/next cybersecurity&nbsp; &nbsp; &nbsp; &nbsp; practices for protecting information and<br \/>\n     technology assets?<\/span><\/li>\n<\/ul>\n<p style=\"margin-bottom: 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\"><br \/>\n<u style=\"cursor: auto; color: inherit;\">Part 3: Biblical Principles<\/u>:&nbsp;<\/span><\/p>\n<p style=\"margin-bottom: 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00b7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Which Biblical<br \/>\nprinciples can help inform and shape your collection, management, and ethical use<br \/>\nof&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;information and technologies?<\/span><\/p>\n<p style=\"margin-bottom: 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">\u00b7<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Make this<br \/>\nknowledge personal and actionable&#8211;how will you and how will you help those<br \/>\naround you:&nbsp;<\/span><\/p>\n<p style=\"margin: 0in 0in 0in 1in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">o<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;<br \/>\n<\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Prevent<br \/>\nthe misuse or abuse of information and<\/span><\/p>\n<p style=\"margin: 0in 0in 0in 1in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">o<span style=\"font-size: 7pt; line-height: normal; cursor: auto; color: inherit;\">&nbsp;&nbsp;<br \/>\n<\/span><\/span><\/span><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">Wisely<br \/>\nuse information and technology for the benefits of all?&nbsp;<\/span><\/p>\n<p style=\"margin-bottom: 0in; line-height: normal; cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; line-height: 107%; cursor: auto; color: inherit;\">Note: Your assignment will be checked for originality<br \/>\nvia the Turnitin plagiarism tool.<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\"><\/p>\n<p style=\"cursor: auto; color: inherit;\">watch video below and incorportae into the essay.<\/p>\n<p style=\"cursor: auto; color: inherit;\">https:\/\/youtu.be\/_u6jdFKkWKs?feature=shared<\/p>\n<p style=\"cursor: auto; color: inherit;\"><\/p>\n<p style=\"cursor: auto; color: inherit;\"><span style=\"font-size: 12pt; line-height: 107%; cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Research Paper: Challenges and Biblical Principles in Managing Information Assignment&nbsp; &nbsp; Instructions Overview Technology brings significant risks and challenges along with its benefits. Wise public administrators need&nbsp; &nbsp;to know about those risks and constantly be vigilant to prevent misuse of information by themselves, their organizations, or external forces. Instructions This paper focuses on the stakeholders [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[19],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/8892"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=8892"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/8892\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=8892"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=8892"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=8892"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=8892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}