Field: Information Systems
Application 1 – Analysis and Synthesis of Prior Research
At professional conferences, blocks of time may be set aside for what are termed “ poster sessions.” A hotel ballroom or large open area will be ringed with individuals who use displays such as posters or electronic presentations displayed via projectors. These sessions provide an opportunity to share one’s research in an intimate setting with a small group who share a similar interest. The seminar format of this course is very similar to this academic exchange. During one set of paired weeks, you will be appointed as a Group Leader. If you are one of the Group Leaders for this week, you are to prepare an academic presentation, much like a poster session.
Your presentation should present analysis and synthesis of prior research and will begin the interaction with your colleagues. You will prepare an academic paper of 5–7 pages in APA format, as well as a PowerPoint presentation of 7–10 slides. This analysis will be an open-ended introduction to relevant topics of study regarding security management and risk assessment. Your goal, as the presenter, should be to persuade your discussants that the approach(es) you have analyzed and synthesized is/are a sound means for discovering new methods in the field. You should acknowledge that there are other models or means to mitigate risks and secure systems, but you should strive to be as persuasive as possible that the specific concepts you have reviewed are exciting research avenues and that they are potentially breakthrough areas for advancing the understanding of systems security.
Your paper and presentation should contain the following elements:
An incorporation and analysis of at least 5 of the required resources from this pair of weeks
The incorporation and analysis of 5 additional resources from the Walden Library
An identification of principal schools of thought, tendencies in the academic literature, or commonalities that define the academic scholarship regarding your topic
An evaluation of the main concepts with a focus on their application to management practice and their impact on positive social change
In addition to the above elements, the Group Leader(s) for this week will focus thematically on:
Determining the role of policies in protecting an organization from fraud
Examining the ethical responsibilities of employers and employees
Comparing and evaluating information security training programs for employees
Reviewing privacy and security legislation that impacts organizations
Identifying the leadership traits of a security officer