How do they impact the information security field


Assignment

Read the attached article: "Enterprise-risk-management practices: Where's the evidence?" By Sven Heiligtag, Andreas Schlosser, and Uwe Stegemann.

GUIDELINES FOR WRITING A CASE STUDY

A case study analysis requires you to investigate a problem, examine the alternative solutions, and propose the most effective solution using supporting evidence.

Preparing the Case

Before you begin writing, follow these guidelines to help you prepare and understand the case study:

Read and examine the case thoroughly

Take notes, highlight relevant facts, underline key problems.

Focus your analysis

Identify two to three key problems

Why do they exist?

How do they impact the information security field?

Who is responsible for them?

Uncover possible solutions

Review course readings, discussions, outside research, and your experience.

Select the best solution

Consider strong supporting evidence, pros, and cons: is this solution realistic?

Drafting the Case

Once you have gathered the necessary information, a draft of your analysis should include these sections:

Introduction

Identify the key problems and issues in the case study.

Formulate and include a thesis statement, summarizing the outcome of your analysis in 1-2 sentences.

Background

Set the scene: background information, relevant facts, and the most important issues.

Alternatives

Outline possible alternatives (not necessarily all of them)

Why are alternatives not possible at this time (if not possible)?

Proposed Solution

Provide one specific and realistic solution

Explain why this solution was chosen

Support this solution with solid evidence

Recommendations

Determine and discuss specific strategies for accomplishing the proposed solution.

If applicable, recommend further action to resolve some of the issues

What should be done and who should do it?

Finalizing the Case

After you have composed the first draft of your case study analysis, read through it to check for any gaps or inconsistencies in content or structure: Is your thesis statement clear and direct? Have you provided solid evidence? Is any component from the analysis missing?

When you make the necessary revisions, proofread and edit your analysis before submitting the final draft.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Business Management: How do they impact the information security field
Reference No:- TGS03008619

Now Priced at $35 (50% Discount)

Recommended (97%)

Rated (4.9/5)