Main street and The Generic city
In this lecture, I learned a lot of about the urban design. Like
the cities in history, how the cities are planned and how to
recognize the fabric of the urban. Organic, geometric or hybrid
of the two.
Over through the book, The birth of urban design was after the
industrial revolution and world war I, the CIAM and the idea of
urban design was coming up from Europe and developed in
United States. Many people who are knowledgeable and has
creative thinking is make up a group called “Creative class”. It
is a group believed to bring economic growth to countries that
can attract its members. They are the key driver of urban design
development in the industrial city in the United States.
Then the large scale urban renewal projects in the US started in
the interwar period as an attempt to clear out blight inner cities
and it is called urban renewal plan.
Many future concept of urban planning and design is also
coming up in that time. One of the creative concept is The
Generic City which come from Rem Koolhass. He mainly
expressed the negation of the identity of the city, thereby to
bring the theory of the Generic city as the city in the future. In
general, the Generic city concept promoted by Koolhaas is a
city with nonidentity, no history, no center, high efficient, can
tolerate many different kinds of people from different area or
country.
As time goes by, up to twenty first-century, Urbanism takes
shape. Because of the rapidly changing economy, the innovation
neighborhood is appeared. It is new area that combines living,
working, shopping and the private sector. The private sector is
the businesses in research- driven industries such as
pharmaceuticals, technology, specialized manufacturing,
university and educational or healthcare institution. With the
innovation neighborhood came up, the traditional neighborhood
street Main street is functioned as “Third places”, neither home
nor workplace. People in this street can see movies, eat at
restaurants, attended church, etc. In United States, after
Depression and World war II, many people have their own car
and very few neighborhoods could continue to support Main
Street as a retail center. Most urban Main Street did not retain
their traditional scale and character. The Suburban malls grew
larger and came to dominate their markets. Then the urban Main
Street should be focus on amenity, walkability, and authenticity,
local experience that are the antithesis of the formulas and mass
production that drive suburban malls.
As the city developed, urban designer should look forward. As
the Generic city concept, if a city have traditional city center, it
has a heavy price to continuous support, restoration the
traditional city center. It is neither practical nor constraining
the development of the nearby area if the traditional ancient
center continues become the city center in the future. It is like
human will lost themselves by worshiping the patrimony of
their ancestors. The generic city is built for the need of modern
human. The urban population is movable. It is only a temporary
home built by the floating population and the foundation of
generic city is unstable. The generic city is more like a place
where do not have the past and future. People will come and
live there just because of the develop of the city and the good
job opportunity. Nobody really care what is the history of the
generic city.
My home town Wenzhou also developed as a generic city.
There are lot of people come from another city and they come
there for the job or business.
CSIA 300: Cybersecurity for Leaders and ManagersResearch
Report #2: Emerging Issues Analysis and Report
Scenario
The Entertainment Team (ET -- part of Resort Operations at
Padgett-Beale, Inc.) is excited about a new event management
platform and is ready to go to contract with the vendor. This
platform is a cloud-based service that provides end-to-end
management for events (conferences, concerts, festivals). The
head of Marketing & Media (M&M) is on board and strongly
supports the use of this system. M&M believes that the data
collection and analysis capabilities of the system will prove
extremely valuable for its efforts. Resort Operations (RO) also
believes that the technology could be leveraged to provide
additional capabilities for managing participation in hotel
sponsored “kids programs” and related children-only events.
Several other high level managers have expressed concerns
however, about one of the capabilities that ET, M&M, and RO
are most excited about – customizable RFID wrist bands for
managing and tracking attendees.
For an additional fee, the event management platform's vendor
will provide customized RFID bands to be worn by attendees.
These bands have unique identifiers embedded in the band that
allow tracking of attendees (admittance, where they go within
the venue, what they "like," how long they stay in a given
location, etc.). The RFID bands can also be connected to an
attendee's credit card or debit card account and then used by the
attendee to make purchases for food, beverages, and souvenirs.
The head of Corporate IT has tentatively given approval for this
outsourcing because it leverages cloud-computing capabilities.
IT's approval is very important to supporters of this the
acquisition because of the company's ban on "Shadow IT."
(Only Corporate IT is allowed to issue contracts for information
technology related purchases, acquisitions, and outsourcing
contracts.) Corporate IT also supports a cloud-based platform
since this reduces the amount of infrastructure which IT must
support and manage directly.
The project has come to a screeching halt, however, due to a
request by the Chief Privacy Officer for more information about
the benefits of the RFID system and potential privacy issues.
Once more, the management interns have been tapped to help
out with a research project. The CPO expects and requires an
unbiased analysis of the proposed use cases and the security and
privacy issues which could be reasonably expected to arise. The
defined use cases are:
1. Children (under the age of 13) attending a hotel sponsored
“kids club” program.
2. Individuals attending a music festival or other event where
IDs must be checked to establish proof of age (legal
requirement for local alcoholic beverage consumption).
3. Attendee management for trade shows
Research
1. Read / Review the readings in the LEO classroom.
2. Read this introduction to RFID technologies:
http://www.rfidjournal.com/articles/view?1337
3. Next, read the following descriptions and reviews of event
management platforms
a. http://rfid4u.com/wp-content/uploads/2015/12/Event-
Management-Case-Study.pdf
b. http://www.capterra.com/event-management-software/
c. http://www.cvent.com/en/event-management-software/#
(Scroll down to subheadings to find the links to additional web
pages)
4. Research one or more of the Use Cases
a. Tracking Children in Entertainment Parks and Kids Club
Programs
http://www.rfidjournal.com/blogs/experts/entry?11573 and
http://disneycruiselineblog.com/2013/11/all-new-youth-
activities-oceaneer-bands-replacing-mickey-bands/
b. Managing Adult Attendees at Music Festivals (includes RFID
bands linked to twitter, Facebook, and credit/debit card)
http://musicfestivalsrfid.com/ and
http://www.techradar.com/news/world-of-tech/rfid-wristbands-
vs-nfc-smartphones-what-s-winning-the-contactless-battle-
1167135
c. Tracking Adults at Trade Shows
http://www.universalrfid.com/product/rfid-labels-provide-
technology-at-trade-shows/ and https://blog.printsome.com/rfid-
wristbands-good-bad/
5. Choose one of the Use Cases then find and review at least
one additional resource on your own that provides information
about privacy and security related laws that could limit or
impose additional responsibilities upon Padgett-Beale’s
collection, storage, transmission, and use of data about guests.
(Note: laws may differ with respect to collecting data from or
about children.)
6. Using all of your readings, identify at least 5 security and
privacy issues which the Chief Privacy Officer needs to
consider and address with the Padgett-Beale leadership team as
it considers the implications of your chosen use case.
7. Then, identify 5 best practices that you can recommend to
Padgett-Beale’s leadership team to reduce and/or manage risks
associated with the security and privacy of data associated with
the event management platform.
Write
Write a three to five page report using your research. At a
minimum, your report must include the following:
1. An introduction or overview of event management systems
and the potential security and privacy concerns which could
arise when implementing this technology. This introduction
should be suitable for an executive audience. Provide a brief
explanation as to why three major operating units believe the
company needs this capability.
2. An analysis section in which you address the following:
a. Identify and describe your chosen Use Case
b. Identify and describe five or more types of personal / private
information or data that will be collected, stored, processed, and
transmitted in conjunction with the use case.
c. Analyze and discuss five or more privacy and security issues
related to the use case.
d. Identify and discuss 3 or more relevant laws which could
impact the planned implementation of the event management
system with RFID wrist bands.
3. A recommendations section in which you identify and discuss
five or more best practices for security and privacy that should
be implemented before the technology is put into use by the
company. Include at least one recommendation in each of the
following categories: people, processes, policies, and
technologies.
4. A closing section (summary) in which you summarize the
issues related to your chosen use case and the event
management platform overall. Include a summary of your
recommendations to Padgett-Beale leadership.
Submit For Grading
Submit your research paper in MS Word format (.docx or .doc
file) using the Research Report #1 Assignment in your
assignment folder. (Attach your file to the assignment entry.)
Additional Information
1. To save you time, a set of appropriate resources / reference
materials has been included as part of this assignment. You
must incorporate at least five of these resources into your final
deliverable. You must also include one resource that you found
on your own.
2. Your research report should use standard terms and
definitions for cybersecurity. See Course Content >
Cybersecurity Concepts for recommended resources.
3. Your research report should be professional in appearance
with consistent use of fonts, font sizes, margins, etc. You
should use headings to organize your paper. The CSIA program
recommends that you follow standard APA formatting since this
will give you a document that meets the “professional
appearance” requirements. APA formatting guidelines and
examples are found under Course Resources > APA Resources.
An APA template file (MS Word format) has also been provided
for your use.
4. You are expected to write grammatically correct English in
every assignment that you submit for grading. Do not turn in
any work without (a) using spell check, (b) using grammar
check, (c) verifying that your punctuation is correct and (d)
reviewing your work for correct word usage and correctly
structured sentences and paragraphs.
5. You are expected to credit your sources using in-text
citations and reference list entries. Both your citations and your
reference list entries must follow a consistent citation style
(APA, MLA, etc.).
4
Copyright ©2018 by University of Maryland University
College. All Rights Reserved

More Related Content

PDF
Twitter for Events - amiando Social Media Study
PDF
Smart Computing Applications In Crowdfunding Marwala Tshilidzi Xing
PDF
Atomico Need-To-Know 29 January 2018
PDF
Fintech Evolution Or Revolution 1st Edition Sumit Chakraborty
PDF
Whitepaper: Why banks need to move if they want to own banking in the future.
PDF
Invisible Engines How Software Platforms Drive Innovation and Transform Indus...
PDF
The future of intelligent transport systems George J. Dimitrakopoulos
PDF
World Bank Report - Digital Africa Presentation
Twitter for Events - amiando Social Media Study
Smart Computing Applications In Crowdfunding Marwala Tshilidzi Xing
Atomico Need-To-Know 29 January 2018
Fintech Evolution Or Revolution 1st Edition Sumit Chakraborty
Whitepaper: Why banks need to move if they want to own banking in the future.
Invisible Engines How Software Platforms Drive Innovation and Transform Indus...
The future of intelligent transport systems George J. Dimitrakopoulos
World Bank Report - Digital Africa Presentation

Similar to Main street and The Generic city In this lecture, I learned a .docx (20)

PDF
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
PDF
BAFT-IFSA Social Media and Banking Global Webinar - June 2013
PDF
E-Commerce Air Asia
PDF
Big Dig Research Paper
PDF
Internet Economics 4th Edition Paolo Cellini
PDF
6 Paragraph Essay Example. How To Write A 5
PDF
The Hackable City Digital Media and Collaborative City Making in the Network ...
PDF
F**NEWS- nº3 sep23_EN.pdf
PDF
Jun Xu_ - Future And Fintech, The_ Abcdi And Beyond-World Scientific Publishi...
PDF
The Hackable City Digital Media and Collaborative City Making in the Network ...
PPT
Presentation To Seda Technology Programme
PDF
Enterprise architecture and new generation information systems 1st Edition Di...
PDF
South By South Best 2018
PDF
Strategic Analysis
PDF
Methodology For Digital Transformation Implementation Path And Data Platform ...
PDF
How To Write An Essay Introduction (With Pict
DOCX
Emerging Issues Risk Analysis ReportScenarioThe Entertai.docx
PDF
Enterprise architecture and new generation information systems 1st Edition Di...
DOCX
Research Report #2 Emerging Issues Risk Analysis and Report.docx
PDF
Dbq Essay Outline Regents. Online assignment writing service.
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806
BAFT-IFSA Social Media and Banking Global Webinar - June 2013
E-Commerce Air Asia
Big Dig Research Paper
Internet Economics 4th Edition Paolo Cellini
6 Paragraph Essay Example. How To Write A 5
The Hackable City Digital Media and Collaborative City Making in the Network ...
F**NEWS- nº3 sep23_EN.pdf
Jun Xu_ - Future And Fintech, The_ Abcdi And Beyond-World Scientific Publishi...
The Hackable City Digital Media and Collaborative City Making in the Network ...
Presentation To Seda Technology Programme
Enterprise architecture and new generation information systems 1st Edition Di...
South By South Best 2018
Strategic Analysis
Methodology For Digital Transformation Implementation Path And Data Platform ...
How To Write An Essay Introduction (With Pict
Emerging Issues Risk Analysis ReportScenarioThe Entertai.docx
Enterprise architecture and new generation information systems 1st Edition Di...
Research Report #2 Emerging Issues Risk Analysis and Report.docx
Dbq Essay Outline Regents. Online assignment writing service.
Ad

More from AASTHA76 (20)

DOCX
(APA 6th Edition Formatting and St.docx
DOCX
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
DOCX
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
DOCX
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docx
DOCX
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docx
DOCX
(Dis) Placing Culture and Cultural Space Chapter 4.docx
DOCX
(1) Define the time value of money.  Do you believe that the ave.docx
DOCX
(chapter taken from Learning Power)From Social Class and t.docx
DOCX
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
DOCX
(a) The current ratio of a company is 61 and its acid-test ratio .docx
DOCX
(1) How does quantum cryptography eliminate the problem of eaves.docx
DOCX
#transformation10EventTrendsfor 201910 Event.docx
DOCX
$10 now and $10 when complete Use resources from the required .docx
DOCX
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
DOCX
#include string.h#include stdlib.h#include systypes.h.docx
DOCX
$ stated in thousands)Net Assets, Controlling Interest.docx
DOCX
#include stdio.h#include stdlib.h#include pthread.h#in.docx
DOCX
#include customer.h#include heap.h#include iostream.docx
DOCX
#Assessment BriefDiploma of Business Eco.docx
DOCX
#include stdio.h#include stdint.h#include stdbool.h.docx
(APA 6th Edition Formatting and St.docx
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docx
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docx
(Dis) Placing Culture and Cultural Space Chapter 4.docx
(1) Define the time value of money.  Do you believe that the ave.docx
(chapter taken from Learning Power)From Social Class and t.docx
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
(a) The current ratio of a company is 61 and its acid-test ratio .docx
(1) How does quantum cryptography eliminate the problem of eaves.docx
#transformation10EventTrendsfor 201910 Event.docx
$10 now and $10 when complete Use resources from the required .docx
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
#include string.h#include stdlib.h#include systypes.h.docx
$ stated in thousands)Net Assets, Controlling Interest.docx
#include stdio.h#include stdlib.h#include pthread.h#in.docx
#include customer.h#include heap.h#include iostream.docx
#Assessment BriefDiploma of Business Eco.docx
#include stdio.h#include stdint.h#include stdbool.h.docx
Ad

Recently uploaded (20)

PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI .pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
Module on health assessment of CHN. pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
International_Financial_Reporting_Standa.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
Empowerment Technology for Senior High School Guide
PDF
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Education and Perspectives of Education.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PPTX
Computer Architecture Input Output Memory.pptx
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI .pdf
AI-driven educational solutions for real-life interventions in the Philippine...
Module on health assessment of CHN. pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Introduction to pro and eukaryotes and differences.pptx
Hazard Identification & Risk Assessment .pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
International_Financial_Reporting_Standa.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Race Reva University – Shaping Future Leaders in Artificial Intelligence
Empowerment Technology for Senior High School Guide
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
HVAC Specification 2024 according to central public works department
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Paper A Mock Exam 9_ Attempt review.pdf.
Education and Perspectives of Education.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Computer Architecture Input Output Memory.pptx
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)

Main street and The Generic city In this lecture, I learned a .docx

  • 1. Main street and The Generic city In this lecture, I learned a lot of about the urban design. Like the cities in history, how the cities are planned and how to recognize the fabric of the urban. Organic, geometric or hybrid of the two. Over through the book, The birth of urban design was after the industrial revolution and world war I, the CIAM and the idea of urban design was coming up from Europe and developed in United States. Many people who are knowledgeable and has creative thinking is make up a group called “Creative class”. It is a group believed to bring economic growth to countries that can attract its members. They are the key driver of urban design development in the industrial city in the United States. Then the large scale urban renewal projects in the US started in the interwar period as an attempt to clear out blight inner cities and it is called urban renewal plan. Many future concept of urban planning and design is also coming up in that time. One of the creative concept is The Generic City which come from Rem Koolhass. He mainly expressed the negation of the identity of the city, thereby to bring the theory of the Generic city as the city in the future. In general, the Generic city concept promoted by Koolhaas is a city with nonidentity, no history, no center, high efficient, can tolerate many different kinds of people from different area or country. As time goes by, up to twenty first-century, Urbanism takes shape. Because of the rapidly changing economy, the innovation neighborhood is appeared. It is new area that combines living, working, shopping and the private sector. The private sector is the businesses in research- driven industries such as pharmaceuticals, technology, specialized manufacturing, university and educational or healthcare institution. With the innovation neighborhood came up, the traditional neighborhood street Main street is functioned as “Third places”, neither home
  • 2. nor workplace. People in this street can see movies, eat at restaurants, attended church, etc. In United States, after Depression and World war II, many people have their own car and very few neighborhoods could continue to support Main Street as a retail center. Most urban Main Street did not retain their traditional scale and character. The Suburban malls grew larger and came to dominate their markets. Then the urban Main Street should be focus on amenity, walkability, and authenticity, local experience that are the antithesis of the formulas and mass production that drive suburban malls. As the city developed, urban designer should look forward. As the Generic city concept, if a city have traditional city center, it has a heavy price to continuous support, restoration the traditional city center. It is neither practical nor constraining the development of the nearby area if the traditional ancient center continues become the city center in the future. It is like human will lost themselves by worshiping the patrimony of their ancestors. The generic city is built for the need of modern human. The urban population is movable. It is only a temporary home built by the floating population and the foundation of generic city is unstable. The generic city is more like a place where do not have the past and future. People will come and live there just because of the develop of the city and the good job opportunity. Nobody really care what is the history of the generic city. My home town Wenzhou also developed as a generic city. There are lot of people come from another city and they come there for the job or business. CSIA 300: Cybersecurity for Leaders and ManagersResearch Report #2: Emerging Issues Analysis and Report Scenario
  • 3. The Entertainment Team (ET -- part of Resort Operations at Padgett-Beale, Inc.) is excited about a new event management platform and is ready to go to contract with the vendor. This platform is a cloud-based service that provides end-to-end management for events (conferences, concerts, festivals). The head of Marketing & Media (M&M) is on board and strongly supports the use of this system. M&M believes that the data collection and analysis capabilities of the system will prove extremely valuable for its efforts. Resort Operations (RO) also believes that the technology could be leveraged to provide additional capabilities for managing participation in hotel sponsored “kids programs” and related children-only events. Several other high level managers have expressed concerns however, about one of the capabilities that ET, M&M, and RO are most excited about – customizable RFID wrist bands for managing and tracking attendees. For an additional fee, the event management platform's vendor will provide customized RFID bands to be worn by attendees. These bands have unique identifiers embedded in the band that allow tracking of attendees (admittance, where they go within the venue, what they "like," how long they stay in a given location, etc.). The RFID bands can also be connected to an attendee's credit card or debit card account and then used by the attendee to make purchases for food, beverages, and souvenirs. The head of Corporate IT has tentatively given approval for this outsourcing because it leverages cloud-computing capabilities. IT's approval is very important to supporters of this the acquisition because of the company's ban on "Shadow IT." (Only Corporate IT is allowed to issue contracts for information technology related purchases, acquisitions, and outsourcing contracts.) Corporate IT also supports a cloud-based platform since this reduces the amount of infrastructure which IT must support and manage directly.
  • 4. The project has come to a screeching halt, however, due to a request by the Chief Privacy Officer for more information about the benefits of the RFID system and potential privacy issues. Once more, the management interns have been tapped to help out with a research project. The CPO expects and requires an unbiased analysis of the proposed use cases and the security and privacy issues which could be reasonably expected to arise. The defined use cases are: 1. Children (under the age of 13) attending a hotel sponsored “kids club” program. 2. Individuals attending a music festival or other event where IDs must be checked to establish proof of age (legal requirement for local alcoholic beverage consumption). 3. Attendee management for trade shows Research 1. Read / Review the readings in the LEO classroom. 2. Read this introduction to RFID technologies: http://www.rfidjournal.com/articles/view?1337 3. Next, read the following descriptions and reviews of event management platforms a. http://rfid4u.com/wp-content/uploads/2015/12/Event- Management-Case-Study.pdf b. http://www.capterra.com/event-management-software/ c. http://www.cvent.com/en/event-management-software/# (Scroll down to subheadings to find the links to additional web pages) 4. Research one or more of the Use Cases a. Tracking Children in Entertainment Parks and Kids Club Programs http://www.rfidjournal.com/blogs/experts/entry?11573 and http://disneycruiselineblog.com/2013/11/all-new-youth- activities-oceaneer-bands-replacing-mickey-bands/ b. Managing Adult Attendees at Music Festivals (includes RFID bands linked to twitter, Facebook, and credit/debit card)
  • 5. http://musicfestivalsrfid.com/ and http://www.techradar.com/news/world-of-tech/rfid-wristbands- vs-nfc-smartphones-what-s-winning-the-contactless-battle- 1167135 c. Tracking Adults at Trade Shows http://www.universalrfid.com/product/rfid-labels-provide- technology-at-trade-shows/ and https://blog.printsome.com/rfid- wristbands-good-bad/ 5. Choose one of the Use Cases then find and review at least one additional resource on your own that provides information about privacy and security related laws that could limit or impose additional responsibilities upon Padgett-Beale’s collection, storage, transmission, and use of data about guests. (Note: laws may differ with respect to collecting data from or about children.) 6. Using all of your readings, identify at least 5 security and privacy issues which the Chief Privacy Officer needs to consider and address with the Padgett-Beale leadership team as it considers the implications of your chosen use case. 7. Then, identify 5 best practices that you can recommend to Padgett-Beale’s leadership team to reduce and/or manage risks associated with the security and privacy of data associated with the event management platform. Write Write a three to five page report using your research. At a minimum, your report must include the following: 1. An introduction or overview of event management systems and the potential security and privacy concerns which could arise when implementing this technology. This introduction should be suitable for an executive audience. Provide a brief explanation as to why three major operating units believe the company needs this capability. 2. An analysis section in which you address the following: a. Identify and describe your chosen Use Case b. Identify and describe five or more types of personal / private
  • 6. information or data that will be collected, stored, processed, and transmitted in conjunction with the use case. c. Analyze and discuss five or more privacy and security issues related to the use case. d. Identify and discuss 3 or more relevant laws which could impact the planned implementation of the event management system with RFID wrist bands. 3. A recommendations section in which you identify and discuss five or more best practices for security and privacy that should be implemented before the technology is put into use by the company. Include at least one recommendation in each of the following categories: people, processes, policies, and technologies. 4. A closing section (summary) in which you summarize the issues related to your chosen use case and the event management platform overall. Include a summary of your recommendations to Padgett-Beale leadership. Submit For Grading Submit your research paper in MS Word format (.docx or .doc file) using the Research Report #1 Assignment in your assignment folder. (Attach your file to the assignment entry.) Additional Information 1. To save you time, a set of appropriate resources / reference materials has been included as part of this assignment. You must incorporate at least five of these resources into your final deliverable. You must also include one resource that you found on your own. 2. Your research report should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts for recommended resources. 3. Your research report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this
  • 7. will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use. 4. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 5. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). 4 Copyright ©2018 by University of Maryland University College. All Rights Reserved