Critical issues with social media marketing

The paper should be written in English (either US or UK spelling), font 11 or 12On your first (cover) page, include your full names and the topic chosenThe paper shouldnot exceed 1500 words (excluding references) and should notbe less than 1000 wordsThe paper should include a minimum of 5 scholarly references (e.g. books, book chapters, academic journal articles)Use APA style for referencing your sources in the textQuotations if longer than 30 words should be indented (font 11, in italics)The paper should include a brief introduction (where the topic is introduced, its relevance and the key issue(s) are clearly articulated), a main section where you may define key concepts, present the main arguments and discuss them withpractical illustrations(where you provide real-world examples to the concepts and arguments presented), and a conclusion where you synthesize the key issues, articulate your views and mention the broader implications for marketers/societyList your references by alphabetical order (following APA rules)Please paraphrase the work of others accordingly. To check for plagiarism, your paper may be processed through a plagiarism software. Cases of plagiarism will be sanctioned.

Factors that led to the defeat of the Aztec and Inca Empire

The essay will be based on the question, “What factors led to the defeat of the Aztec and Inca empires?” Answer the question posed with clear, specific examples and cover all the important topics with detailed explanations from the modules.
The only resources you can use is the from the textbook that I have attached to, it should cover the first half of the textbook. Any sources from the internet and/or from another textbook will not be allowed.

Project 10 – Drafting Security Policies

This week’s topic, information security policies, is perhaps the most important topic that a Business major can take from this course.  This is the governance layer that lays the bedrock for your organization’s security posture.  Sure, the technical folks are responsible for executing on that policy but this is where the leaders of a business get together, reach agreement, at times do a sanity check on what is enforceable in the organization, and draft the rules that will make sure the organization is secure.

This is not an exercise in putting down whatever “sounds” good in order to check the box and claim that your organization has policies.  It takes a realistic perspective and evaluation on what is needed, what is possible, and what is enforceable.  It is typically better to a have a weak policy that is enforced than to have a strong policy that is ignored.

The resources provided include three articles on approaches to drafting and information security policy.  Among the steps is to select a framework or set of standards.  These could include “best practice” frameworks such as ISO 27001, NIST SP 800 Series, COBIT, ITIL, or similar guidelines.  Depending on the industry, this will likely also include “compliance” standards such as PCI-DSS, HIPAA/HITECH, SOX, FISMA, GLBA, or other legal and regulatory obligations.  The resources provided include the NIST CyberSecurity Framework as an example of best practice frameworks and the PCI-DSS compliance standards for those who process credit cards.  Both of these will include specific elements or policies that should be included in your overall policy set.

Additionally, I have included links to the Greater Houston Partnership’s Cybersecurity Assessment Tool, the FCC’s CyberPlanner Tool, and the Traveler’s Insurance Cyber Risk Pressure Test.  These tools can help you evaluate your organizations current posture.  Such evaluations can help to flesh out the organizations policies much like the best practice standards.  Additionally, from a learning standpoint, they are a bit easier to go through than something like the full PCI-DSS standard.

Last, but definitely not least, I have included a link to the SANS security policy template library.  When it comes to actually drafting policies.  These or similar “out-of-the-box” policy templates can provide a good start and help to understand the level of detail needed.  Remember that details are important, but it should not be so complicated that it must be updated constantly or that it becomes unmanageable.  This includes considering how much time you have available for dealing with policy issues.

This is a lot of information.  My primary concern this week is that you take the time to review the resources.  It would be impractical to have you draft a policy or try to regurgitate all of what you see here.  Read the articles, skim the frameworks and standards, tinker with some of the assessment/planning tools.

For your web project, I’d like you to pick three things that stood out to you.  This could relate to the process of drafting the policies, the contents of the frameworks or standards, the usefulness of the assessment/planning tools, the format/contents/level of detail in the policy templates, etc.  Just choose any three things you learned and share your thoughts about them in about 500 words.  This is an informal assignment.  Citations are not necessary unless you are quoting, but may be useful to indicate what you are referencing.

Resources:

https://laulima.hawaii.edu/access/content/attachment/WOA.69675.202110/Assignments/04d7477c-02a8-46fc-b022-ff33b1018566/https%3A__er.educause.edu_articles_2013_4_an-incremental-approach-to-building-an-information-security-program

https://laulima.hawaii.edu/access/content/attachment/WOA.69675.202110/Assignments/de2c81b2-1040-4b85-b2b6-758f748268e0/https%3A__nvlpubs.nist.gov_nistpubs_CSWP_NIST.CSWP.04162018.pdf

https://laulima.hawaii.edu/access/content/attachment/WOA.69675.202110/Assignments/982782af-264d-4dce-9639-cec75459d82a/PCI_DSS_v3-2.pdf

https://laulima.hawaii.edu/access/content/attachment/WOA.69675.202110/Assignments/78f18c76-fbcd-4f34-b171-dc01fb05750c/https%3A__nvlpubs.nist.gov_nistpubs_ir_2016_nist.ir.7621r1.pdf

https://laulima.hawaii.edu/access/content/attachment/WOA.69675.202110/Assignments/d9d779e8-9644-4c56-bc47-92552c2e0fcc/http%3A__resources.infosecinstitute.com_key-elements-information-security-policy_

https://laulima.hawaii.edu/access/content/attachment/WOA.69675.202110/Assignments/9d492a88-ef10-482e-933b-17db897f9f52/https%3A__www.sans.org_security-resources_policies

https://laulima.hawaii.edu/access/content/attachment/WOA.69675.202110/Assignments/d0cbe113-3df4-4387-a06e-a399c862de17/https%3A__www.travelers.com_quiz_cyber-security_cyber-risk-pressure

https://laulima.hawaii.edu/access/content/attachment/WOA.69675.202110/Assignments/7904c684-ef13-4d35-807c-8b3ed00ffeb4/https%3A__www.fcc.gov_cyberplanner

https://laulima.hawaii.edu/access/content/attachment/WOA.69675.202110/Assignments/083b6ab1-9ad5-466d-97e4-a88f7ef92538/https%3A__www.csoonline.com_article_2124114_it-strategy_strategic-planning-erm-how-to-write-an-information-security-policy.html

Week 2: D2 Case Study

Please complete the Case Study:

A 25 year old male presents with chronic sinusitis and allergic rhinitis.

Define adaptive vs. acquired immunity.
Discuss the genetic predisposition of allergens.
Describe the antigen-antibody response.
What is the pathology of sinusitis?

Citations: At least one high-level scholarly reference in APA from within the last 5 years