{"id":3120,"date":"2017-05-15T09:39:33","date_gmt":"2017-05-15T13:39:33","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5903sec011s17\/?page_id=3120"},"modified":"2017-05-15T11:38:32","modified_gmt":"2017-05-15T15:38:32","slug":"weekly-discussion-questions","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/weekly-discussion-questions\/","title":{"rendered":"Weekly Discussion Questions"},"content":{"rendered":"<p><strong>Answers to Weekly Reading Discussion Questions:<\/strong><\/p>\n<p>Each Friday morning, you will find a post that includes several discussion questions about the coming week\u2019s readings. You will be expected to post your answer to one of the discussion questions on the week\u2019s readings by Sunday @11:59 PM.\u00a0 A paragraph or two of thoughtful analysis is expected for your initial answer to the question.\u00a0 Post your answer to the weekly class assignment blog. You must come to class prepared to discuss all of these questions in detail when we meet.<\/p>\n<table style=\"height: 312px; width: 637px;\">\n<tbody>\n<tr style=\"height: 46.16px;\">\n<td style=\"width: 78px; height: 46.16px; text-align: center;\"><strong>Class #<\/strong><\/td>\n<td style=\"width: 371.455px; height: 46.16px; text-align: center;\"><strong>Assignment\/Discussion Topic<\/strong><\/td>\n<td style=\"width: 167.545px; height: 46.16px; text-align: center;\"><strong>Due<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 78px; height: 22px; text-align: center;\">2<\/td>\n<td style=\"width: 371.455px; height: 22px; text-align: center;\">Cybercrime<\/td>\n<td style=\"width: 167.545px; height: 22px; text-align: center;\">5\/21\/2017<\/td>\n<\/tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 78px; height: 22px; text-align: center;\">3<\/td>\n<td style=\"width: 371.455px; height: 22px; text-align: center;\">Protecting Privacy<\/td>\n<td style=\"width: 167.545px; height: 22px; text-align: center;\">5\/28\/2017<\/td>\n<\/tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 78px; height: 22px; text-align: center;\">4<\/td>\n<td style=\"width: 371.455px; height: 22px; text-align: center;\">Security Engineering<\/td>\n<td style=\"width: 167.545px; height: 22px; text-align: center;\">6\/4\/2017<\/td>\n<\/tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 78px; height: 22px; text-align: center;\">5<\/td>\n<td style=\"width: 371.455px; height: 22px; text-align: center;\">Network Security<\/td>\n<td style=\"width: 167.545px; height: 22px; text-align: center;\">6\/11\/2017<\/td>\n<\/tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 78px; height: 22px; text-align: center;\">6<\/td>\n<td style=\"width: 371.455px; height: 22px; text-align: center;\">Identity &amp; Access Management<\/td>\n<td style=\"width: 167.545px; height: 22px; text-align: center;\">6\/18\/2017<\/td>\n<\/tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 78px; height: 22px; text-align: center;\">7<\/td>\n<td style=\"width: 371.455px; height: 22px; text-align: center;\">Security Assessments<\/td>\n<td style=\"width: 167.545px; height: 22px; text-align: center;\">6\/25\/2017<\/td>\n<\/tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 78px; height: 22px; text-align: center;\">8<\/td>\n<td style=\"width: 371.455px; height: 22px; text-align: center;\">Business Continuity and Disaster Recovery Planning<\/td>\n<td style=\"width: 167.545px; height: 22px; text-align: center;\">7\/2\/2017<\/td>\n<\/tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 78px; height: 22px; text-align: center;\">9<\/td>\n<td style=\"width: 371.455px; height: 22px; text-align: center;\">Application Development Security<\/td>\n<td style=\"width: 167.545px; height: 22px; text-align: center;\">7\/9\/2017<\/td>\n<\/tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 78px; height: 22px; text-align: center;\">10<\/td>\n<td style=\"width: 371.455px; height: 22px; text-align: center;\">New Trends in Information Security<\/td>\n<td style=\"width: 167.545px; height: 22px; text-align: center;\">7\/16\/2017<\/td>\n<\/tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 78px; height: 22px; text-align: center;\">11<\/td>\n<td style=\"width: 371.455px; height: 22px; text-align: center;\">Incident response<\/td>\n<td style=\"width: 167.545px; height: 22px; text-align: center;\">7\/23\/2017<\/td>\n<\/tr>\n<tr style=\"height: 22px;\">\n<td style=\"width: 78px; height: 22px; text-align: center;\">12<\/td>\n<td style=\"width: 371.455px; height: 22px; text-align: center;\">Review: Security Threat and Mitigations<\/td>\n<td style=\"width: 167.545px; height: 22px; text-align: center;\">7\/30\/2017<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Answers to Weekly Reading Discussion Questions: Each Friday morning, you will find a post that includes several discussion questions about the coming week\u2019s readings. You will be expected to post your answer to one of the discussion questions on the week\u2019s readings by Sunday @11:59 PM.\u00a0 A paragraph or two of thoughtful analysis is expected [&hellip;]<\/p>\n","protected":false},"author":14218,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-3120","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/pages\/3120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/users\/14218"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/comments?post=3120"}],"version-history":[{"count":3,"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/pages\/3120\/revisions"}],"predecessor-version":[{"id":3149,"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/pages\/3120\/revisions\/3149"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5903sec011s17\/wp-json\/wp\/v2\/media?parent=3120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}