Presenter: Analysis and Synthesis of Prior Research

At professional conferences, blocks of time may be set aside for what are termed “poster sessions.” A large open area will include a number of individuals who use displays such as posters or electronic presentations. These sessions provide an opportunity to share one’s research in an intimate setting, with a small group who share a similar interest gathered around.

The seminar format of this course is very similar to this academic exchange. During one 2-week session of study, you will be appointed as a Presenter. If you are one of the Presenters for this 2-week session, you will prepare an academic presentation, much like a poster session.

WE WRITE PAPERS FOR STUDENTS

Tell us about your assignment and we will find the best writer for your project.

Write My Essay For Me

Your presentation should include analysis and synthesis of prior research, an evaluation of current trends in the field, and an evaluation of the foundational literature and seminal works included in the week’s resources. Your presentation will begin the interaction with your classmates.

You will prepare an academic paper of 5–7 pages in APA format, as well as a PowerPoint presentation of 5–7 slides. This analysis will be an open-ended introduction explaining how failures in information security technical controls can be avoided or mitigated with strong Security Education Training and Awareness (SETA) programs.

Your goal, as the Presenter, should be to persuade your classmates that the approaches you have analyzed and synthesized are a sound means for developing more effective SETA programs. You should acknowledge that there are other models, or means to develop and deliver SETA programs. However, you should strive also to be as persuasive as possible that the specific concepts and operationalizations you have reviewed are exciting research avenues, and that they are potentially breakthrough areas in the development and delivery of SETA programs.

Your paper and presentation should contain the following elements:

Incorporation and analysis of the Learning Resources from this 2-week session
Incorporation and analysis of five additional resources from the Walden Library that are 5 or less years old
Identification of principal schools of thought, tendencies in the academic literature, or commonalities that define the academic scholarship regarding your topic
Evaluation of the main concepts, with a focus on their application to information security
Incorporation of the Learning Objectives from this 2-week session

SAMPLE SOLUTION

The use of strong Security Education Training and Awareness (SETA) programs have emerged as reliable ways to guarantee the security of an organization’s security infrastructure. Often, SETA programs will help businesses to sensitize and inform employees and other stakeholders on some of the fundamental security issues and the general security expectations. Such measures eventually help the organization to prevent some of the emerging cyber security mistakes that may likely result in data breaches (Hueca, Manley & Rogers, 2020). Since human error is one of the major causes of network security breaches, the use of SETA can go a long way in improving network infrastructural security in the organization.
The program ensure that people are aware of the existing information security policies and then applying them in the daily operations in the organization to help reduce emerging security incidents. For technical controls, SETA programs may entail the need to report security violations, management of passwords and access controls among others…

BEST-ESSAY-WRITERS-ONLINE

Order Original and Plagiarism-free Papers Written from Scratch:

PLACE YOUR ORDER