Instructions to Assignment #6Case AnalysisRequired AssignmentsChapter 4 -Ethics and Information Security: MIS Business ConcernsPleaseread Chapter 4 in Business Driven Information SystemsYou can view the electronics textbook for Business Driven Information Systemsathttps://www.vitalsource.com/loginby clicking “My Library” or BookshelfLogin Name: chingngian@gmail.comPassword: Rockwell4053!InstructionsEthics (from the Ancient Greek “ethikos” meaning “Theory of living”) attempts to understand the nature of morality; to distinguish that which is right from that which is wrong. Ethics in plain words means studying and analyzing right from wrong; good from bad. Information security deals with several different “trust” aspects of information. Information security is not confined to computer systems, nor to information in an electronic or machine-readable form. It applies to all aspects of safeguarding or protecting information or data, in whatever form.Please complete the “Closing Case One” pertaining to Targeting Target case study at the end of Chapter 4 of your textbookon page 169and answer the questions.These case studies are designed to give you practical experience in strategic management as it pertains to competitiveness and globalization. The case can be found in the Case Studies section of your textbook. Use the Graduate Case Study Formatto completethe case analysis.

In addition to the Case Analysis be sure to answer the following questions given for the case.Your responses must be complete, using terminology and concepts presented in the primary textbook as well as supplementary resources. You must read and follow the Case Submittal Format file found in the course resources area. Please double-space, use 12 point font, with one inch margins. Be sure to cite your resources and provide the references using APA 6th ed. format.format. Remember to reference all work cited or quoted by the text authors. You should be doing this often in your responses.Using the Graduate Case Study Formatfound in the attached document review the case using the Graduate Case Study Formatto structure a comprehensive analysis, and answer the questions at the end of the case.The case study must consist of seven sections and include Introduction, Analysis, Solution, Justification, Summary, Discussion Questions, and References.Discussion

Questions1.How did the hackers steal Target’s customer data?

2.What types of technology could big retailers use to prevent identity thieves from stealing information?

3.What can organizations do to protect themselves from hackers looking to steal account data?

4.In a team, research the Internet and find the best ways to protect yourself from identity theft.Special RequirementsAll in-text citations (directly or not directly quoting the material) must include author’s last name, the year of publication, page number, and para number.

Also, remember that you should have 75% of your references published within the last 10 yrs.Avoid writing in the first person when writing in APA formatting.Avoid writing in passive voice.The idea that you cite in the paper must match with the content of the textbook or journal.Use journals, textbooks, and websitesExample for an In-text Citation(Kreitner & Kinicki, 2013, p.456, para.4).Example for a ReferenceKreitner, R., & Kinicki, A. (2013). Organizational behavior(10th ed.). New York, NY:McGraw-Hill/Irwin.

Special RequirementsAll in-text citations (directly or not directly quoting the material) must include author’s last name, the year of publication, and page number. Do not make them up because I will check them.A complete reference should appear in the reference list at the end of the paper. I will not accept the paper without in-text citation page number and paragraph number.Also, remember that you should have 75% of your references published within the last 10 yrs.Avoid writing in the first person when writing in APA formatting.Avoid writing in passive voice.The idea that you cite in the paper must match with the content of the textbook or journal.Use journals, textbooks, and websitesExample for an In-text Citation(Kreitner & Kinicki, 2013, p.456, para.4).Example for a ReferenceKreitner, R., & Kinicki, A. (2013). Organizational behavior(10th ed.). New York, NY:McGraw-Hill/Irwin.