SaaS Computing and its impact on the workplace

 SaaS computing and its impact on the workplace

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

This week as a group each team is required to deliver:

  • The Project Design of your project. The paper must be well structured.
  • State:

    The focus of your research, (that is the problem that you were working on).
    How was the problem identified? ( that is the background of the problem)
    What are the benefits of your research? (that is the significance of your problem that you have researched)

 

 Descriptive Research Study

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

10.- Instruments – (Worth 6-points)

11.- Research procedures – (Worth 6-points)

12.- Data Analysis – (Worth 6-points)

 
NOTE1: You are not required to collect data from the primary source. Make sure you don’t state in your paper that you have collected data through interviews. If you mention in you paper that you have or will be collecting data, your group will receive zero (0) for this assignment.

NOTE2: You will only work with secondary data from Peer-Reviewed Journals.

NOTE3:  This is a continuation of your proposed project that you started in week-2  Each group to deliver:
     
Steps and Procedures:

  • To complete this assignment, you are required to use “ONLY” Peer-Reviewed Journals. Do not use any other source to support your research. Use only Peer-Reviewed Journals.
  • You need to list the reference of the article from The Peer-Reviewed Journal. All references must follow APA style, structure, and formatting.
  • Use the basic citation styles mentioned in the APA Manual, Sixth or Seventh Editions, to cite your sources.
  • Do not send your work via e-mail. Your document will be ignored. I will not grade your document if you send it via e-mail.
  • Make sure you include the selected 10-Articles from Peer-Reviewed Journal as your references and sources (10-Annotated Bibliography).
  • “Only” The leader of your team for week four (5) will submit the assignment.
  • Please observe the Required Practical Connection Assignment Rubric

 

Title (Font 14)

by

Students’ Name

An assignment submitted in partial fulfillment of the requirements

for ISOL 633 course as part of the degree of ___________

In

______________________

School of Computing and Information Sciences

University of the Cumberlands

ISOL 633 – Legal, Regulations, Investigations, and Compliance

Professor: Dr. Zadok Hakim

Due: December 2, 2018

Fall 2018

ii

Table of Content

Theory summary ……………………………………………………………………………………………………………..

1

References ………………………………………………………………………………………………………………………

3

1

Theory Summary

Deterrence theory

Deterrence theory (DT) is originally a term used in psychology and criminology, and it is

used to provide a model for understanding human thoughts, emotions, and behaviors. Erickson,

Gibbs, and Jensen (1977, p. 305) stated that, XXXXXXXXXXXXXXXXXXXXXXXXXXX.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX. Additionally, the literature reveals that,

the more severe a punishment, it is thought, the more likely that a rationally calculating human

being will desist from criminal acts. In criminology, “the concept of deterrence is used to

describe the prevention of criminal behavior through the use of, or by the threat of, legal

sanctions” (Meier & Johnson, 1977, p. 293)

According to D’arcy and Herath (2011, p. 488), deterrence theory is “one of the most

widely applied theories in information systems (IS) security research, particularly within

behavioral IS security studies”.

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

2

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

Conclusion

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

X.

3

References

D’arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security

literature: Making sense of the disparate findings. European Journal of Information

Systems, 20(6), 643-658.

Erickson, M. L., Gibbs, J. P., & Jensen, G. F. (1977). The deterrence doctrine and the perceived

certainty of legal punishments. American Sociological Review, 305-317.

Meier, R. F., & Johnson, W. T. (1977). Deterrence as social control: The legal and extralegal

production of conformity. American Sociological Review, 292-304.

4

University of the Cumberlands

School of Computing and Information Sciences

Certification of Authorship

Submitted to (Professor’s Name): Dr. Zadok Hakim

Course: ________________________

Student’s Name: ________________

Date of Submission: December 2, 2018

Purpose and Title of Submission: ____________________________________________

Certification of Authorship: I hereby certify that I am the author of this document and that any

assistance I received in its preparation is fully acknowledged and disclosed in the document. I

have also cited all sources from which I obtained data, ideas, or words that are copied directly or

paraphrased in the document. Sources are properly credited according to accepted standards for

professional publications. I also certify that this paper was prepared by (me or by my group #)

for this purpose.

Students’ Signature: ____________________________

Order a unique copy of this paper

600 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
Top Academic Writers Ready to Help
with Your Research Proposal

Order your essay today and save 25% with the discount code GREEN