SlideShare a Scribd company logo
1 of 18
Autobed Manufacturing Update Management Hijacking
usability 4.3 2.5 3.5 4.5 telehealth Manufacturing
Update Management Hijacking usability 2.4
4.4000000000000004 1.8 2.8 E Alert
Manufacturing Update Man agement Hijacking
usability 2 2 3 5
Scholarly Article Discussion: The Three Strike Law
The three strike law was enacted on March 4th, 1994 in the
hopes of permanently reducing recidivism rates especially
among violent offenders (Helland & Tabarrok, 2007). The
legislation, just as the name implies in baseball, sentences a
criminal to a minimum 25-year sentence to life after their third
offense, or strike. There are variations of the three strike law in
different states, with California being the most aggressive state
to adhere to the legislation. Proponents of the law believe that
harsher penalties for repeat felons will deter them from
committing more crimes; however, there is not enough wide-
spread reliable data to support this conclusion. Critics claim
that the three strike law is undefined which leads to a violation
of a criminal’s eighth amendment right against cruel and
unusual punishment coupled with a fiscal cost too high, that is
overcrowding prisons and the legal system (Eaton, 2003).
In the article, “Three Strikes and You’re Out: Enhanced
Sentences for Repeat Offenders Research Pathfinder,” Lisa
Eaton discusses the public’s concern with crime and the three
strikes effectiveness on recidivism rates. She explains that the
genesis of the three strike law began in Washington in 1993 and
since then, more and more states began to adopt the legislation,
but on their own terms. The intended criminal is the violent
anti-social offender and states modified the law in their own
way. The varied definitions include:
different sentencings lengths, parole eligibility, the number of
strikes required to trigger a mandatory sentence, the nature of
crimes that qualify as strikes, the time elapsed between strikes,
the type of felony that triggers the sentencing enhancement, and
the degree of discretion permitted in invoking and applying the
law (Eaton, 2003).
California is one of the most well-known states to enact the law
with, “36,043 ‘second strike’ and 4,468 ‘third strike’
convictions in California” (Eaton, 2003). Opponents of three
strikes claim the law violates the eighth amendment right
against cruel and unusual punishment considering a majority of
three strike defendants are charged with petty crimes so their
sentencing is “disproportionate” (Eaton, 2003).
Eaton’s methodology focuses on each state’s three strike
variation and uses legal periodicals, books, reports, treatise and
individual/state cases and other secondary sources in an attempt
to locate the most accurate and reliable studies. The article
explains the difficulty in establishing the effectiveness of the
law because of the variations within each state and inconclusive
data showing long-term results. Eaton suggests each state can
affect the outcome of a study because there isn’t a cohesive
definition of a strike. How a “‘strike zone’ is defined, how
many strikes are required to be ‘out,’ and what it means to be
‘out,’ varies widely” (2003). By examining each state’s
definition of the law and individual cases, the article further
points to the difficulty in studying its effectiveness. Although
Eaton’s article is filled with rich and reliable studies regarding
the legislation, what seems to be lacking is the overall
conclusion of how researchers can resolve these shortcomings in
future research. Eaton does include “recent developments in
three-strikes case law,” but the reader would need to make their
own assertions of the article to draw a conclusion (2003).
In the article, “Symbol and Substance: Effects of California’s
Three Strikes Law on Felony Sentencing,” John Sutton (2013)
explains three schools of thought related to the three strike law.
There are the governmental advocates who believe the law will
help fight crime and reduce costs associated with public safety,
the second school involves critics who believe the law will
create injustices for those tried under it, overcrowding in jails
and increased government costs to uphold it. The third school
is one of neutrality as the law is viewed as a “symbolic
accomplishment” in the fight towards crime, but neither wreaks
havoc on the criminal justice system nor makes advancements in
reduced recidivism rates (Sutton, 2013). In Sutton’s analysis,
he tests the “severity, racial disparities, and individual- and
jurisdiction-level variability in sentence outcomes using data on
felony cases from the 12 most populous counties in California”
(2013). Three factors are used in the analysis, the seriousness
of the crime, the potential bias in the sentencing process, and
the bias that occurs within the criminal justice system itself.
The fact that there are many different stages within the justice
system increases the potential bias in each stage. For example,
pretrial detention for those who cannot afford bail may be
viewed by officials as defendants who need to stay in jail
because they are more dangerous, when in fact they don’t have
the means to leave (Sutton, 2013).
A few hypotheses were used in the study. One involved “macro
level-studies” that tended to be more conservative in nature
because of the political climate and the second focused on the
prosecution’s means and limitations. There are only so many
cases that can be tried and the rest must be pled out. The
sample consisted of all male subjects in felony cases in twelve
California counties. Possible outcomes that affected the results
included the prosecutor’s decision of what type of crime
constituted a defendant’s third strike. Independent variables
like race and ethnicity were binary and prison length and
sentence were calculated separately.
For hypothesis one, Sutton (2013) found that the law was more
punitive and increased the defendant’s sentencing length and
increased the likelihood they would go to prison once tried.
The effects of race and ethnicity were not as significant as
expected. For example, black defendants were sentenced at the
same rate before the law and after, the only change being longer
sentence lengths in line with the legislation. Also, “legal
factors” viewed to enhance sentences showed no real change
between the seriousness of the crime or the “effect of a prior
felony conviction” (Sutton, 2013). An important finding
revealed zero evidence of prosecutors using their power unfairly
to decide what qualifies as a third strike offense, thus
manipulation was not at play in the legal process. In
conclusion, it is much more difficult to quantify an individual
offender into separate variables and the likelihood that they
would be sentenced more severely depends on the cluster of
attributes they have as a whole (Sutton, 2013).
Marvell & Moody describe in “The Lethal Effects of
Three‐Strikes Laws” how deterrence is affected, specifically in
homicides (2001). They focus on how deterrence affects a
criminal with two strikes against them and their decision to
engage in a felony. Marvell & Moody (2001) surmise that the
“cost” is what the criminal takes into account when they make
the choice to commit a crime. Even if the cost is too high,
deterrence might not be the outcome. Suppose for example a
second strike individual commits a robbery and realizes that if
he or she gets caught, they would receive a minimum of 25
years to life. They murder the victims they robbed in order to
eradicate the possibility any witnesses can identify them as
suspects. Marvell & Moody hypothesize that the opposite effect
of deterrence occurs and there is an actual increase that a
criminal will murder their victim (s) to escape capture (2001).
“The difference between three-strikes states and other states is
roughly 10 percentage points, which translates to some 1,400
extra murders per year in the three-strikes states” (Marvell &
Moody, 2001).
The research design used during the 29-year study in all
fifty states is a fixed-effect model. The dependent variable is
crime rate and a dummy rate variable is used for the three strike
law. Their findings revealed that homicide rates increased
short-term (and also long-term) averaging “60 additional
homicides occurred” short-term, and for states who have not
enacted the law, those states saved lives yearly (Marvell &
Moody, 2001).
A shortcoming of the study indicated that perhaps the increase
in homicides for violent crimes is because of an overall trend
and not necessarily connected with the law. Also noteworthy,
states with the most severe three strike law, had the least
increase in homicide rates. Although more studies need to be
done, Marvell and Moody (2001) concluded that the three strike
law has no overall reduction in crime, although incapacitation
was not taken into account. They surmise that the cost is too
high to continue to keep the three strike law in effect.
In the article, “Does Three Strikes Deter?” Helland &
Tabarrok (2007) compare deterrence in criminals with two
strikes and in criminals with one or two strikes, but who
underwent two separate trials to create a stronger causal
relationship. They claim that there is a detriment for those who
study deterrence because researchers cannot discern the
difference between incapacitation and those truly deterred,
which significantly skews results. Their study is limited by the
fact that bias does occur because the profile of the criminal’s
arrests focuses on a marginal effect and not the total outcome.
The data was a random sample of prisoners released in
California and the study was conducted as a quasi-experiment
(Helland & Tabarrok, 2007).
There are two important values used in the study. One being
the number of arrests and the risk involved for released
prisoners. The findings showed in some states that criminals
with two strikes against them had an increased chance of a new
felony conviction. For those who were tried twice for separate
felonies, but only convicted of one or two strikes, the findings
revealed a significant reduction in the chance of committing
another strike, although the findings varied in each state. In
California, the three strike legislation has reduced “felony
arrest rates among the class of criminals with two strikes by 17
to 20 percent” (Helland & Tabarrok, 2007).
In the article, “Officer Down: Implications of Three Strikes for
Public Safety” Johnson & Saint-Germain investigate the impact
that the three strike law has on suspects and law enforcement
officers and whether there was an increase in violent
confrontations (2005). The study was longitudinal in nature
using a time series analysis from 1990-2001. Questionnaires
were mailed to six large police departments in California and
one in Arizona where the three strike law has not been
implemented. The data included the number of arrests, whether
those arrests involved threat or harm to a police officer and
whether use of force was used by the police officer (Johnson &
Saint-Germain, 2005).
The findings showed a statistically significant increase in
arrests made after the three strike policy was implemented,
despite lower crime rates. The study did not discern between
felony and misdemeanor arrests. The use of force by a police
officer became more unpredictable after the three strike law and
did not correlate to the number of arrests made. The same
results were found with officer-related shootings after 1994. In
order for this study to become more reliable, the number of
arrests versus the number of officer-related harm must increase
over time to show a valid correlation. The three strike law
might be dangerous for officers, but no evidence was significant
enough to support that conclusion (Johnson & Saint-Germain,
2005).
References
Eaton, L. (2003). Three strikes and you're out: Enhanced
sentences for repeat offenders
research pathfinder. Legal Reference Services Quarterly, 22(4),
55-85. doi:10.1300/j113v22n04_0
Helland, E., & Tabarrok, A. (2007). Does three strikes
deter? Journal of Human
Resources,XLII(2), 309-330. doi:10.3368/jhr.xlii.2.309
John R., S. (2013). Symbol and substance: Effects of
California's three strikes law on felony
sentencing. Law & Society Review, (1), 37.
doi:10.1111/lasr.12001
Johnson, J. L., & Saint-Germain, M. A. (2005). Officer down:
Implications of three strikes for
public safety. Criminal Justice Policy Review, 16(4), 443-460.
doi:10.1177/0887403405277001
Marvell, T. B., & Moody, C. E. (2001). The lethal effects of
three‐strikes
laws. The Journal of Legal Studies, (1), 89. doi:10.1086/468112
4
References
Barrenger, S., Draine, J., Angell, B., & Herman, D. (2017).
Reincarceration Risk Among Men with Mental Illnesses
Leaving Prison: A Risk Environment Analysis. Community
Mental Health Journal, 53(8), 883–892. https://doi-
org.ezproxy.fiu.edu/10.1007/s10597-017- 0113-z
Garot, R. (2019). Rehabilitation Is Reentry. Prisoner Reentry in
the 21st Century: Critical Perspectives of Returning Home.
Hlavka, H., Wheelock, D., & Jones, R. (2015). Exoffender
Accounts of Successful Reentry from Prison. Journal of
Offender Rehabilitation, 54(6), 406–428. https://doi-
org.ezproxy.fiu.edu/10.1080/10509674.2015.1057630
Ho, D. (2011). Intervention-A New Way-Out to Solve the
Chronic Offenders. International Journal of Interdisciplinary
Social Sciences, 6(2), 167–172.
Mobley, A. (2014). Prison reentry as a rite of passage for the
formerly incarcerated. Contemporary Justice Review, 17(4),
465–477. https://doi-
org.ezproxy.fiu.edu/10.1080/10282580.2014.980968
Reisdorf, B. C., & Rikard, R. V. (2018). Digital Rehabilitation:
A Model of Reentry Into the Digital Age. American
Behavioral Scientist, 62(9), 1273–1290. https://doi-
org.ezproxy.fiu.edu/10.1177/0002764218773817
Serowik, K. L., & Yanos, P. (2013). The relationship between
services and outcomes for a prison reentry population of those
with severe mental illness. Mental Health & Substance Use:
Dual Diagnosis, 6(1), 4–14. https://doi-
org.ezproxy.fiu.edu/10.1080/17523281.2012.660979
SHUFORD, J. A. (2018). The missing link in reentry: Changing
prison culture. Corrections Today, 80(2), 42–102.
Thompkins, D. E., Curtis, R., & Wendel, T. (2010). Forum: the
prison reentry industry. Dialectical Anthropology, 34(4), 427–
429. https://doi- org.ezproxy.fiu.edu/10.1007/s10624-010-
9164-z
Woods, L. N., Lanza, A. S., Dyson, W., & Gordon, D. M.
(2013). The Role of Prevention in Promoting Continuity of
Health Care in Prisoner Reentry Initiatives. American Journal of
Public Health, 103(5), 830–838. https://doi-
org.ezproxy.fiu.edu/10.2105/AJPH.2012.300961
CCJ 4497
Professor Leimberg
Scholarly Article Discussion
Directions
The purpose of this assignment is to help you understand how to
read scholarly articles and gather important information from
the article such as the research question/hypothesis, the methods
used, and the findings. Reading these articles will help you to
discover your ideas and thoughts about a topic and to prepare
you to write a formal paper on the subject.
Cite your references according to APA guidelines. See
http://libguides.fiu.edu/criminology for sources related to
criminal justice and criminology.
The grade for this assignment will be based on the selection and
quality of the articles chosen, the proper formatting of the
references, and the quality of your interpretation.
You will need to submit annotations for 5 peer-reviewed articles
from the list of 10 that were selected as part of last week’s
assignment.
Additional Information
Reading a scholarly journal article is not easy. If an article has
been published in a scholarly journal, presumably, the editors
believed that it contained information significant to the
discipline(s) covered by the journal. Here are a few tips that
should assist you in critically evaluating the research articles
you read.
The Title
Read the title carefully: more information is contained in the
title than you think. It is very important that you pay attention
to information in the title.
What are the major ideas addressed in the article?
Who were the participants? What was their affiliation?
Were they a special kind of group (e.g., adolescents, girls
only)?
The Abstract
The purpose of the abstract is to summarize the article. Read the
abstract carefully. If the author has done a good job, the
abstract should provide you with the theoretical motivation for
the paper, the major results and a brief general discussion. You
should not JUST read the abstract, but often it is a great help to
understanding the entire article.
What variables were examined? What were the findings?
Does the study show a cause-and-effect relationship between
variables, or does it just show that a relationship exists?
Where was the work conducted (i.e., laboratory or field). If
field, what was the geographical location?
The Introduction
The introduction will give you the rationale for the study (an
explanation of what the study investigates and why). The
introduction typically includes a review of previous research or
theory that provides a context for the specific questions being
addressed in the article. You should understand what the
research question(s) being studied and what the authors
predicted they would find? Reading the introduction of a journal
article can be made easier if you keep a number of key
questions in mind, and look for the answers to them:
What is the purpose of the article?
Is it reporting an empirical study, a new theory, or is it
reviewing previously published theory and research on a certain
topic?
What is the topic of the article?
What specifically is the article addressing? Is it answering a
specific question, trying to explain certain observations,
presenting a model of some process, exploring the relationship
between two or more variables, or something else? Look to the
title and abstract for guidance. What variables are mentioned?
Where is the article going?
Look over the structure of the article, paying particular note to
headings and subheadings. Scan tables and figures. You want to
get an overview of what the article starts out discussing, what it
ends up concluding, and how it leads you to that conclusion. If
you get a rough outline of the entire article in your head before
you begin reading, you have a better chance of seeing how each
piece fits into a larger framework.
Why is this an interesting or worthwhile topic/phenomenon to
research? Why would this article interest researchers in the field
(the journal editors would not have accepted the article for
publication unless it met this role in some way)?
What is already known about this topic/phenomenon?
Where are the gaps in contemporary knowledge or
understanding of this topic/phenomenon?
How does the research being reported fill gaps in our
knowledge/ or understanding of this topic/phenomenon? What
niche does this work fill?
What specific prediction(s) or hypothesis(es) are being tested?
What were the main independent variables (what the researchers
manipulated) and dependent variables (what the researchers
measured)?
The Method
Generally speaking, when reading the method section you
should ask yourself:
What research techniques are used by the author(s)?
Reading this section should provide you with a better idea of
what was actually done in the research as well as a clue into the
thinking of the researcher.
Is the method employed a valid test of the predictions or
hypotheses?
There is rarely (if ever) a single way of testing a prediction or
hypothesis. The researcher will have made a choice between a
number of possible research designs/sets of
materials/procedures/sample groups, etc. You need to consider
whether the choices made by the researcher will allow them to
make valid claims about their predictions or hypotheses.
Has the researcher overlooked any possible confounds or
extraneous variables which could affect interpretations of the
findings?
No piece of research is 'perfect', and there are usually limits as
to how much 'control' can be achieved over the research
environment. However, some researchers attempt to achieve
more control in their research designs than others do. You need
to consider whether sufficient control has been achieved.
How do the methods employed compare with the methods used
in other investigations of the same topic/phenomenon?
As researchers usually seek to make comparisons between their
study and earlier studies, you need to consider whether or not
the method employed allows the researcher to make valid
comparisons between studies, and how much you feel they are
entitled to generalize their findings.
The Results
This section is very important because it provides numerical
evidence that supports or refutes the hypotheses being studied.
When reading the results section you should ask yourself:
How do the results relate to the predictions/hypotheses set out
in the introduction (i.e., are they supported or not)?
What differences did the authors find that support or refute the
project hypotheses?
Are the results reported and analyzed in an unbiased manner?
The manner in which data are reported and analyzed could
dramatically affect interpretation. For example, different types
or formats of graphs can emphasize or de-emphasize the sizes of
effects, and different inferential tests can yield different results.
The Discussion
The discussion should summarize the main findings in
(relatively) plain English. How do the authors interpret the
findings? That is, what do they say the findings tell us about
their research question? Do we now know' something new? Are
there new questions raised? Do the authors discuss implications
of their findings for theory, or for the "real world"? When
reading the discussion section you should ask yourself:
Have the appropriate interpretations of the results been made?
Are there ways of interpreting the results that haven't been
considered?
Has the researcher presented an unbiased evaluation of the
study/method employed?
Is the researcher justified in making any theoretical claims that
are made on the basis of the study's findings? Were the
hypotheses supported or rejected?
What are the implications of those findings (what do they tell us
about theory, research, or real life concerns)?
What suggestions are being made about future research into this
topic/phenomenon or what does the researcher consider to be
'the way forward'?
The Conclusion
The conclusions may be in a separate section at the end of the
article or incorporated as part of the discussion section. The
conclusions should summarize the important findings of the
study and point out their significance to the general research
area. They might also point out some limitations to the study
and avenues for future research based on the findings of the
study.
Writing a Project Report
By Gail Marie, eHow Contributor
Project reports communicate a project's background, its
objectives, the methods used to achieve the objectives and the
results of these efforts. The writer may also discuss important
aspects of the project and draw certain conclusions. Like most
reports, the information should be formatted with headings,
clearly communicated and well supported. There are countless
ways to write a
project report. The steps below represent one method.
Information needed in advance includes:
Project details
Background information
Supporting information
Sources of information
Steps include:
1. Create a title or cover page, followed by a table of contents
and an abstract (see Step 9).
The project report's title should convey the area and scope of
the project.
2. Consider your reader, his or her knowledge of your project
and its subject. If your project was, for example, scientific but
your reader is not a scientist, consider using less technical
language than if he were.
3. Describe the project's scope, its objective and the main
result(s) in the Introduction. You may include what you
personally contributed to the project as well.
4. Tell the reader about the research behind the project in a
Background section, if too extensive to include in the
Introduction.
5. Describe the methods you used during the project to
accomplish the stated objectives in a Methods/Procedures
section. Don't forget to use the past tense, as these actions have
already been taken.
6. Present the results of the project, which may not be the
intended results. Use a Results section heading. Depending on
your reader and what your project entailed, you may want to
discuss the results by explaining what they show, analyzing
uncertainties, noting trends, comparing the results with known
theories or with the expected results, evaluating limitations of
the project, detailing the possibilities of faulty interpretation or
simply
discussing assumptions about the results.
7. Conclude by summarizing, once again, the project report's
content and by suggesting the implications of the project's
results. Because your reader is familiar with your work, you
may use project-specific terms and reference names of people
and places under the
Conclusion heading.
8. Propose, under a Recommendations heading, suggestions
based on the conclusions outlined earlier. Describe actions you
think should be taken because of the project's results or
additional work that you think is needed to gain more
knowledge about the subject.
9. Write the report abstract, which summarizes, like the
conclusion, the report's contents.
The abstract is actually the first section of the report, so keep it
more general than the conclusion. Because the abstract is such a
comprehensive summary, it is most easily written last.
10. Include references and appendices such as charts, graphs,
photos or additional
information at the end of the report.
1
Running Head: The security Vulnerabilities of IoT devices in
the medical fieldCarmelia DalmeidaIT680 – Research
PaperProject Proposal
The security vulnerabilities of IoT devices in the medical
fieldObjective
The core objective of the topic will be to explore and examine
the security vulnerabilities of the devices used in the medical
field. As some devices are working as IoT, the chances of
security breaches are enhanced. The devices contain information
from different patients, and it is vulnerable when it is connected
to the internet. If the device itself is not securing the
information, then the administrator who is running the system
operation and operating system on the device is responsible.
The objective is to find the vulnerabilities and propose a
solution that will give surety on the security factor of the
devices.Project Plan
The security issues in medical devices have been arising since
their invention. Many companies are denying the fact that these
are promoting data leaks and contain personally identifiable
information (PII). It will probably create problems in different
companies and patients. The patient record will be vulnerable,
and some of the companies that are utilizing these devices are
mainly using outdated software and operating systems. The
main point of the research is to point out the vulnerabilities in
the IoT devices and what type of security breaches they cause.
In taking the example of some IoT devices with different
abilities, infusion and insulin pump comes first then, smart
pens, cardiac devices, wireless vital monitors, thermometer and
temperature sensors, security cameras, and various other
hardware. Every device has its benefits and its security
concerns. Especially when you are working in the medical field,
many inventions prevent humans from getting a disease and
making upgrade through to cure any problem, but they also have
a drawback when you try to more the very nature of the
hardware. This project will elaborate on security vulnerabilities
and present counter solutions for their issues. The task will
involve taking few devices condition into consideration,
exploring the working and mechanism of the devices, examining
the security vulnerabilities and results gathered from different
operations, comparing the reserves with the research findings,
and presenting a proper report for solution providing with the
exposed vulnerabilities. There will be teams running different
module of the proposal, and they will collect single device and
the team will run its functionalities in the programming side,
and the other team will run for the architecture design and see
what type of operation and how long it takes to send the data
from device to the administrator server. The gap between the
transmissions will be analysed for vulnerabilities, and the
device hardware and software configuration will also be held
responsible for any data leak. Literature Overview
In the literature review, we will describe the function of IoT
devices and how they can be used in the medical field. In the
healthcare department, the IoT devices are growing rapidly and
are packed with interesting features and factors like
technological advancements, decrease prices of sensor
technology, better accessibility of high-speed internet, and
more. What type of application is the medical field currently
running with the devices, and in how many sectors these devices
are utilized and what type of result they generate? After that,
we will conduct a study on one or two hospital for their IoT
devices that poses a security threat, and it is vulnerable for data
extraction. The study will elaborate on every module of the
system and it will provide an in-depth view of the working
device and we will also propose a countermeasure for any issue
found in operation.
Likely Outcome
We will focus on one outcome that will be to ensuring the
safety of any security leek. We will also elaborate on the
methods by which you can make the device more secure and less
vulnerable, which will also give the authentication protocol
provided for both the patient and the administrator. The results
will ensure the integrity of the IoT device and ensure the patient
that the device will run efficiently, and records and data will be
monitored with care, and find the solution for the generated
outcomes.Relationship to the Master’s Program
This project will be best suited for the master program because
the subject elaborates on the internet devices, and it concern
every type of protocol we run before giving a final product. It
will also elaborate on the hardware structure of the program so
that it will ensure that before running it in the field
implementation and testing phase will be thoroughly examined.
The Programming course and System Architecture course will
help more in understanding and working on this proposed
project.Reviews
The survey shows 82 percent of healthcare organizations
experienced IoT-focused cyber-attack in the previous 12
months, with only 6 percent of organizations saying they have
resources to tackle cybersecurity challenges.( Davis, 2019) The
paper highlight the security risk in the healthcare department
and its integration with the internet of things devices. What
type of vulnerabilities expects it exposes to its administrator
and patient, and if the data they collected is still under
surveillance or not? (Cansu Eken, 2016)
References
Cansu ken, H. E. (2016). Retrieved from
http://www.ep.liu.se/ecp/142/054/ecp17142054.pdf
Davis, Jessica (2019) Health IT Security-
https://healthitsecurity.com/news/82-iot-devices-of-health-
providers-vendors-targeted-by-cyberattacks

More Related Content

Similar to AutobedManufacturingUpdate ManagementHijacking usability4.docx

Three Strikes Legislation Review
Three Strikes Legislation ReviewThree Strikes Legislation Review
Three Strikes Legislation ReviewDm Gibson
 
MY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docx
MY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docxMY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docx
MY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docxgilpinleeanna
 
Hall Elizabeth Analysis Essay Unit 3
Hall Elizabeth Analysis Essay Unit 3Hall Elizabeth Analysis Essay Unit 3
Hall Elizabeth Analysis Essay Unit 3Elizabeth Hall
 
Running head DEATH SENTENCE .docx
Running head DEATH SENTENCE                                      .docxRunning head DEATH SENTENCE                                      .docx
Running head DEATH SENTENCE .docxsusanschei
 
Deterrence%20 briefing%20
Deterrence%20 briefing%20Deterrence%20 briefing%20
Deterrence%20 briefing%20sevans-idaho
 
POLICY ISSUE Mandatory minimum sentencing is a judicial po.docx
POLICY ISSUE Mandatory minimum sentencing is a judicial po.docxPOLICY ISSUE Mandatory minimum sentencing is a judicial po.docx
POLICY ISSUE Mandatory minimum sentencing is a judicial po.docxstilliegeorgiana
 
Crime, punishment and prejudice
Crime, punishment and prejudiceCrime, punishment and prejudice
Crime, punishment and prejudicesevans-idaho
 
Crime, punishment and prejudice
Crime, punishment and prejudiceCrime, punishment and prejudice
Crime, punishment and prejudicesevans-idaho
 
Week 5 CEA ProjectAssignment Task Submit to complete th
Week 5 CEA ProjectAssignment Task Submit to complete thWeek 5 CEA ProjectAssignment Task Submit to complete th
Week 5 CEA ProjectAssignment Task Submit to complete thlorileemcclatchie
 
Week 1 - AssignmentFinal Research Paper OutlineFor this week’s ass.docx
Week 1 - AssignmentFinal Research Paper OutlineFor this week’s ass.docxWeek 1 - AssignmentFinal Research Paper OutlineFor this week’s ass.docx
Week 1 - AssignmentFinal Research Paper OutlineFor this week’s ass.docxcelenarouzie
 
Running head INEFFECTIVENESS OF THE CAPITAL PUNISHMENT SYSTEM1.docx
Running head INEFFECTIVENESS OF THE CAPITAL PUNISHMENT SYSTEM1.docxRunning head INEFFECTIVENESS OF THE CAPITAL PUNISHMENT SYSTEM1.docx
Running head INEFFECTIVENESS OF THE CAPITAL PUNISHMENT SYSTEM1.docxcowinhelen
 
A Farewell to Firearms? Guns and Murders Through the Looking Glass of Cost-Be...
A Farewell to Firearms? Guns and Murders Through the Looking Glass of Cost-Be...A Farewell to Firearms? Guns and Murders Through the Looking Glass of Cost-Be...
A Farewell to Firearms? Guns and Murders Through the Looking Glass of Cost-Be...Huy Q. Dang
 
AJS Volume 108 Number 5 (March 2003) 937–75 9372003 by T.docx
AJS Volume 108 Number 5 (March 2003) 937–75 9372003 by T.docxAJS Volume 108 Number 5 (March 2003) 937–75 9372003 by T.docx
AJS Volume 108 Number 5 (March 2003) 937–75 9372003 by T.docxsimonlbentley59018
 
Senior Thesis- New Thesis version
Senior Thesis- New Thesis versionSenior Thesis- New Thesis version
Senior Thesis- New Thesis versionLance Hagen
 
Running head GUN CONTROL1GUN CONTROL16RESEARCH PR.docx
Running head GUN CONTROL1GUN CONTROL16RESEARCH PR.docxRunning head GUN CONTROL1GUN CONTROL16RESEARCH PR.docx
Running head GUN CONTROL1GUN CONTROL16RESEARCH PR.docxcowinhelen
 
CJ302 Final Exam1. What is your response to the argument t.docx
CJ302 Final Exam1. What is your response to the argument t.docxCJ302 Final Exam1. What is your response to the argument t.docx
CJ302 Final Exam1. What is your response to the argument t.docxmonicafrancis71118
 
BIS 300 Research proposal
BIS 300 Research proposalBIS 300 Research proposal
BIS 300 Research proposalMelisa Le
 

Similar to AutobedManufacturingUpdate ManagementHijacking usability4.docx (18)

Three Strikes Legislation Review
Three Strikes Legislation ReviewThree Strikes Legislation Review
Three Strikes Legislation Review
 
MY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docx
MY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docxMY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docx
MY DISCUSSIONPUBLISHEDWK4 DISCUSSION CA499 Top of Form.docx
 
Hall Elizabeth Analysis Essay Unit 3
Hall Elizabeth Analysis Essay Unit 3Hall Elizabeth Analysis Essay Unit 3
Hall Elizabeth Analysis Essay Unit 3
 
Running head DEATH SENTENCE .docx
Running head DEATH SENTENCE                                      .docxRunning head DEATH SENTENCE                                      .docx
Running head DEATH SENTENCE .docx
 
Deterrence%20 briefing%20
Deterrence%20 briefing%20Deterrence%20 briefing%20
Deterrence%20 briefing%20
 
POLICY ISSUE Mandatory minimum sentencing is a judicial po.docx
POLICY ISSUE Mandatory minimum sentencing is a judicial po.docxPOLICY ISSUE Mandatory minimum sentencing is a judicial po.docx
POLICY ISSUE Mandatory minimum sentencing is a judicial po.docx
 
Crime, punishment and prejudice
Crime, punishment and prejudiceCrime, punishment and prejudice
Crime, punishment and prejudice
 
Crime, punishment and prejudice
Crime, punishment and prejudiceCrime, punishment and prejudice
Crime, punishment and prejudice
 
Week 5 CEA ProjectAssignment Task Submit to complete th
Week 5 CEA ProjectAssignment Task Submit to complete thWeek 5 CEA ProjectAssignment Task Submit to complete th
Week 5 CEA ProjectAssignment Task Submit to complete th
 
Week 1 - AssignmentFinal Research Paper OutlineFor this week’s ass.docx
Week 1 - AssignmentFinal Research Paper OutlineFor this week’s ass.docxWeek 1 - AssignmentFinal Research Paper OutlineFor this week’s ass.docx
Week 1 - AssignmentFinal Research Paper OutlineFor this week’s ass.docx
 
Running head INEFFECTIVENESS OF THE CAPITAL PUNISHMENT SYSTEM1.docx
Running head INEFFECTIVENESS OF THE CAPITAL PUNISHMENT SYSTEM1.docxRunning head INEFFECTIVENESS OF THE CAPITAL PUNISHMENT SYSTEM1.docx
Running head INEFFECTIVENESS OF THE CAPITAL PUNISHMENT SYSTEM1.docx
 
A Farewell to Firearms? Guns and Murders Through the Looking Glass of Cost-Be...
A Farewell to Firearms? Guns and Murders Through the Looking Glass of Cost-Be...A Farewell to Firearms? Guns and Murders Through the Looking Glass of Cost-Be...
A Farewell to Firearms? Guns and Murders Through the Looking Glass of Cost-Be...
 
AJS Volume 108 Number 5 (March 2003) 937–75 9372003 by T.docx
AJS Volume 108 Number 5 (March 2003) 937–75 9372003 by T.docxAJS Volume 108 Number 5 (March 2003) 937–75 9372003 by T.docx
AJS Volume 108 Number 5 (March 2003) 937–75 9372003 by T.docx
 
Senior Thesis- New Thesis version
Senior Thesis- New Thesis versionSenior Thesis- New Thesis version
Senior Thesis- New Thesis version
 
Running head GUN CONTROL1GUN CONTROL16RESEARCH PR.docx
Running head GUN CONTROL1GUN CONTROL16RESEARCH PR.docxRunning head GUN CONTROL1GUN CONTROL16RESEARCH PR.docx
Running head GUN CONTROL1GUN CONTROL16RESEARCH PR.docx
 
CJ302 Final Exam1. What is your response to the argument t.docx
CJ302 Final Exam1. What is your response to the argument t.docxCJ302 Final Exam1. What is your response to the argument t.docx
CJ302 Final Exam1. What is your response to the argument t.docx
 
BIS 300 Research proposal
BIS 300 Research proposalBIS 300 Research proposal
BIS 300 Research proposal
 
Promseminar SAR 3
Promseminar SAR 3Promseminar SAR 3
Promseminar SAR 3
 

More from celenarouzie

Attaining ExpertiseYou are tr.docx
Attaining ExpertiseYou are tr.docxAttaining ExpertiseYou are tr.docx
Attaining ExpertiseYou are tr.docxcelenarouzie
 
attachment Chloe” is a example of the whole packet. Please follow t.docx
attachment Chloe” is a example of the whole packet. Please follow t.docxattachment Chloe” is a example of the whole packet. Please follow t.docx
attachment Chloe” is a example of the whole packet. Please follow t.docxcelenarouzie
 
AttachmentFor this discussionUse Ericksons theoretic.docx
AttachmentFor this discussionUse Ericksons theoretic.docxAttachmentFor this discussionUse Ericksons theoretic.docx
AttachmentFor this discussionUse Ericksons theoretic.docxcelenarouzie
 
Attachment Programs and Families Working Together Learn.docx
Attachment Programs and Families Working Together Learn.docxAttachment Programs and Families Working Together Learn.docx
Attachment Programs and Families Working Together Learn.docxcelenarouzie
 
Attachment and Emotional Development in InfancyThe purpose o.docx
Attachment and Emotional Development in InfancyThe purpose o.docxAttachment and Emotional Development in InfancyThe purpose o.docx
Attachment and Emotional Development in InfancyThe purpose o.docxcelenarouzie
 
ATTACHEMENT from 7.1 and 7.2 Go back to the Powerpoint for thi.docx
ATTACHEMENT from 7.1 and 7.2 Go back to the Powerpoint for thi.docxATTACHEMENT from 7.1 and 7.2 Go back to the Powerpoint for thi.docx
ATTACHEMENT from 7.1 and 7.2 Go back to the Powerpoint for thi.docxcelenarouzie
 
Attached the dataset Kaggle has hosted a data science competitio.docx
Attached the dataset Kaggle has hosted a data science competitio.docxAttached the dataset Kaggle has hosted a data science competitio.docx
Attached the dataset Kaggle has hosted a data science competitio.docxcelenarouzie
 
Attached you will find all of the questions.These are just like th.docx
Attached you will find all of the questions.These are just like th.docxAttached you will find all of the questions.These are just like th.docx
Attached you will find all of the questions.These are just like th.docxcelenarouzie
 
Attached the dataset Kaggle has hosted a data science compet.docx
Attached the dataset Kaggle has hosted a data science compet.docxAttached the dataset Kaggle has hosted a data science compet.docx
Attached the dataset Kaggle has hosted a data science compet.docxcelenarouzie
 
B. Answer Learning Exercises  Matching words parts 1, 2, 3,.docx
B. Answer Learning Exercises  Matching words parts 1, 2, 3,.docxB. Answer Learning Exercises  Matching words parts 1, 2, 3,.docx
B. Answer Learning Exercises  Matching words parts 1, 2, 3,.docxcelenarouzie
 
B)What is Joe waiting for in order to forgive Missy May in The Gild.docx
B)What is Joe waiting for in order to forgive Missy May in The Gild.docxB)What is Joe waiting for in order to forgive Missy May in The Gild.docx
B)What is Joe waiting for in order to forgive Missy May in The Gild.docxcelenarouzie
 
B)Blanche and Stella both view Stanley very differently – how do the.docx
B)Blanche and Stella both view Stanley very differently – how do the.docxB)Blanche and Stella both view Stanley very differently – how do the.docx
B)Blanche and Stella both view Stanley very differently – how do the.docxcelenarouzie
 
b) What is the largest value that can be represented by 3 digits usi.docx
b) What is the largest value that can be represented by 3 digits usi.docxb) What is the largest value that can be represented by 3 digits usi.docx
b) What is the largest value that can be represented by 3 digits usi.docxcelenarouzie
 
b$ E=EE#s{gEgE lEgEHEFs ig=ii 5i= l; i € 3 r i.Er1 b €€.docx
b$ E=EE#s{gEgE lEgEHEFs ig=ii 5i= l; i € 3 r  i.Er1 b €€.docxb$ E=EE#s{gEgE lEgEHEFs ig=ii 5i= l; i € 3 r  i.Er1 b €€.docx
b$ E=EE#s{gEgE lEgEHEFs ig=ii 5i= l; i € 3 r i.Er1 b €€.docxcelenarouzie
 
B A S I C L O G I C M O D E L D E V E L O P M E N T Pr.docx
B A S I C  L O G I C  M O D E L  D E V E L O P M E N T  Pr.docxB A S I C  L O G I C  M O D E L  D E V E L O P M E N T  Pr.docx
B A S I C L O G I C M O D E L D E V E L O P M E N T Pr.docxcelenarouzie
 
B H1. The first issue that jumped out to me is that the presiden.docx
B H1. The first issue that jumped out to me is that the presiden.docxB H1. The first issue that jumped out to me is that the presiden.docx
B H1. The first issue that jumped out to me is that the presiden.docxcelenarouzie
 
b l u e p r i n t i CONSUMER PERCEPTIONSHQW DQPerception.docx
b l u e p r i n t i CONSUMER PERCEPTIONSHQW DQPerception.docxb l u e p r i n t i CONSUMER PERCEPTIONSHQW DQPerception.docx
b l u e p r i n t i CONSUMER PERCEPTIONSHQW DQPerception.docxcelenarouzie
 
B R O O K I N G SM E T R O P O L I TA N P O L I CY .docx
B R O O K I N G SM E T R O P O L I TA N P O L I CY .docxB R O O K I N G SM E T R O P O L I TA N P O L I CY .docx
B R O O K I N G SM E T R O P O L I TA N P O L I CY .docxcelenarouzie
 
B L O C K C H A I N & S U P P LY C H A I N SS U N I L.docx
B L O C K C H A I N  &  S U P P LY  C H A I N SS U N I L.docxB L O C K C H A I N  &  S U P P LY  C H A I N SS U N I L.docx
B L O C K C H A I N & S U P P LY C H A I N SS U N I L.docxcelenarouzie
 
Año 15, núm. 43 enero – abril de 2012. Análisis 97 Orien.docx
Año 15, núm. 43  enero – abril de 2012. Análisis 97 Orien.docxAño 15, núm. 43  enero – abril de 2012. Análisis 97 Orien.docx
Año 15, núm. 43 enero – abril de 2012. Análisis 97 Orien.docxcelenarouzie
 

More from celenarouzie (20)

Attaining ExpertiseYou are tr.docx
Attaining ExpertiseYou are tr.docxAttaining ExpertiseYou are tr.docx
Attaining ExpertiseYou are tr.docx
 
attachment Chloe” is a example of the whole packet. Please follow t.docx
attachment Chloe” is a example of the whole packet. Please follow t.docxattachment Chloe” is a example of the whole packet. Please follow t.docx
attachment Chloe” is a example of the whole packet. Please follow t.docx
 
AttachmentFor this discussionUse Ericksons theoretic.docx
AttachmentFor this discussionUse Ericksons theoretic.docxAttachmentFor this discussionUse Ericksons theoretic.docx
AttachmentFor this discussionUse Ericksons theoretic.docx
 
Attachment Programs and Families Working Together Learn.docx
Attachment Programs and Families Working Together Learn.docxAttachment Programs and Families Working Together Learn.docx
Attachment Programs and Families Working Together Learn.docx
 
Attachment and Emotional Development in InfancyThe purpose o.docx
Attachment and Emotional Development in InfancyThe purpose o.docxAttachment and Emotional Development in InfancyThe purpose o.docx
Attachment and Emotional Development in InfancyThe purpose o.docx
 
ATTACHEMENT from 7.1 and 7.2 Go back to the Powerpoint for thi.docx
ATTACHEMENT from 7.1 and 7.2 Go back to the Powerpoint for thi.docxATTACHEMENT from 7.1 and 7.2 Go back to the Powerpoint for thi.docx
ATTACHEMENT from 7.1 and 7.2 Go back to the Powerpoint for thi.docx
 
Attached the dataset Kaggle has hosted a data science competitio.docx
Attached the dataset Kaggle has hosted a data science competitio.docxAttached the dataset Kaggle has hosted a data science competitio.docx
Attached the dataset Kaggle has hosted a data science competitio.docx
 
Attached you will find all of the questions.These are just like th.docx
Attached you will find all of the questions.These are just like th.docxAttached you will find all of the questions.These are just like th.docx
Attached you will find all of the questions.These are just like th.docx
 
Attached the dataset Kaggle has hosted a data science compet.docx
Attached the dataset Kaggle has hosted a data science compet.docxAttached the dataset Kaggle has hosted a data science compet.docx
Attached the dataset Kaggle has hosted a data science compet.docx
 
B. Answer Learning Exercises  Matching words parts 1, 2, 3,.docx
B. Answer Learning Exercises  Matching words parts 1, 2, 3,.docxB. Answer Learning Exercises  Matching words parts 1, 2, 3,.docx
B. Answer Learning Exercises  Matching words parts 1, 2, 3,.docx
 
B)What is Joe waiting for in order to forgive Missy May in The Gild.docx
B)What is Joe waiting for in order to forgive Missy May in The Gild.docxB)What is Joe waiting for in order to forgive Missy May in The Gild.docx
B)What is Joe waiting for in order to forgive Missy May in The Gild.docx
 
B)Blanche and Stella both view Stanley very differently – how do the.docx
B)Blanche and Stella both view Stanley very differently – how do the.docxB)Blanche and Stella both view Stanley very differently – how do the.docx
B)Blanche and Stella both view Stanley very differently – how do the.docx
 
b) What is the largest value that can be represented by 3 digits usi.docx
b) What is the largest value that can be represented by 3 digits usi.docxb) What is the largest value that can be represented by 3 digits usi.docx
b) What is the largest value that can be represented by 3 digits usi.docx
 
b$ E=EE#s{gEgE lEgEHEFs ig=ii 5i= l; i € 3 r i.Er1 b €€.docx
b$ E=EE#s{gEgE lEgEHEFs ig=ii 5i= l; i € 3 r  i.Er1 b €€.docxb$ E=EE#s{gEgE lEgEHEFs ig=ii 5i= l; i € 3 r  i.Er1 b €€.docx
b$ E=EE#s{gEgE lEgEHEFs ig=ii 5i= l; i € 3 r i.Er1 b €€.docx
 
B A S I C L O G I C M O D E L D E V E L O P M E N T Pr.docx
B A S I C  L O G I C  M O D E L  D E V E L O P M E N T  Pr.docxB A S I C  L O G I C  M O D E L  D E V E L O P M E N T  Pr.docx
B A S I C L O G I C M O D E L D E V E L O P M E N T Pr.docx
 
B H1. The first issue that jumped out to me is that the presiden.docx
B H1. The first issue that jumped out to me is that the presiden.docxB H1. The first issue that jumped out to me is that the presiden.docx
B H1. The first issue that jumped out to me is that the presiden.docx
 
b l u e p r i n t i CONSUMER PERCEPTIONSHQW DQPerception.docx
b l u e p r i n t i CONSUMER PERCEPTIONSHQW DQPerception.docxb l u e p r i n t i CONSUMER PERCEPTIONSHQW DQPerception.docx
b l u e p r i n t i CONSUMER PERCEPTIONSHQW DQPerception.docx
 
B R O O K I N G SM E T R O P O L I TA N P O L I CY .docx
B R O O K I N G SM E T R O P O L I TA N P O L I CY .docxB R O O K I N G SM E T R O P O L I TA N P O L I CY .docx
B R O O K I N G SM E T R O P O L I TA N P O L I CY .docx
 
B L O C K C H A I N & S U P P LY C H A I N SS U N I L.docx
B L O C K C H A I N  &  S U P P LY  C H A I N SS U N I L.docxB L O C K C H A I N  &  S U P P LY  C H A I N SS U N I L.docx
B L O C K C H A I N & S U P P LY C H A I N SS U N I L.docx
 
Año 15, núm. 43 enero – abril de 2012. Análisis 97 Orien.docx
Año 15, núm. 43  enero – abril de 2012. Análisis 97 Orien.docxAño 15, núm. 43  enero – abril de 2012. Análisis 97 Orien.docx
Año 15, núm. 43 enero – abril de 2012. Análisis 97 Orien.docx
 

Recently uploaded

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 

Recently uploaded (20)

On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 

AutobedManufacturingUpdate ManagementHijacking usability4.docx

  • 1. Autobed Manufacturing Update Management Hijacking usability 4.3 2.5 3.5 4.5 telehealth Manufacturing Update Management Hijacking usability 2.4 4.4000000000000004 1.8 2.8 E Alert Manufacturing Update Man agement Hijacking usability 2 2 3 5 Scholarly Article Discussion: The Three Strike Law The three strike law was enacted on March 4th, 1994 in the hopes of permanently reducing recidivism rates especially among violent offenders (Helland & Tabarrok, 2007). The legislation, just as the name implies in baseball, sentences a criminal to a minimum 25-year sentence to life after their third offense, or strike. There are variations of the three strike law in different states, with California being the most aggressive state to adhere to the legislation. Proponents of the law believe that harsher penalties for repeat felons will deter them from committing more crimes; however, there is not enough wide- spread reliable data to support this conclusion. Critics claim that the three strike law is undefined which leads to a violation of a criminal’s eighth amendment right against cruel and unusual punishment coupled with a fiscal cost too high, that is overcrowding prisons and the legal system (Eaton, 2003). In the article, “Three Strikes and You’re Out: Enhanced Sentences for Repeat Offenders Research Pathfinder,” Lisa Eaton discusses the public’s concern with crime and the three strikes effectiveness on recidivism rates. She explains that the
  • 2. genesis of the three strike law began in Washington in 1993 and since then, more and more states began to adopt the legislation, but on their own terms. The intended criminal is the violent anti-social offender and states modified the law in their own way. The varied definitions include: different sentencings lengths, parole eligibility, the number of strikes required to trigger a mandatory sentence, the nature of crimes that qualify as strikes, the time elapsed between strikes, the type of felony that triggers the sentencing enhancement, and the degree of discretion permitted in invoking and applying the law (Eaton, 2003). California is one of the most well-known states to enact the law with, “36,043 ‘second strike’ and 4,468 ‘third strike’ convictions in California” (Eaton, 2003). Opponents of three strikes claim the law violates the eighth amendment right against cruel and unusual punishment considering a majority of three strike defendants are charged with petty crimes so their sentencing is “disproportionate” (Eaton, 2003). Eaton’s methodology focuses on each state’s three strike variation and uses legal periodicals, books, reports, treatise and individual/state cases and other secondary sources in an attempt to locate the most accurate and reliable studies. The article explains the difficulty in establishing the effectiveness of the law because of the variations within each state and inconclusive data showing long-term results. Eaton suggests each state can affect the outcome of a study because there isn’t a cohesive definition of a strike. How a “‘strike zone’ is defined, how many strikes are required to be ‘out,’ and what it means to be ‘out,’ varies widely” (2003). By examining each state’s definition of the law and individual cases, the article further points to the difficulty in studying its effectiveness. Although Eaton’s article is filled with rich and reliable studies regarding the legislation, what seems to be lacking is the overall conclusion of how researchers can resolve these shortcomings in future research. Eaton does include “recent developments in three-strikes case law,” but the reader would need to make their
  • 3. own assertions of the article to draw a conclusion (2003). In the article, “Symbol and Substance: Effects of California’s Three Strikes Law on Felony Sentencing,” John Sutton (2013) explains three schools of thought related to the three strike law. There are the governmental advocates who believe the law will help fight crime and reduce costs associated with public safety, the second school involves critics who believe the law will create injustices for those tried under it, overcrowding in jails and increased government costs to uphold it. The third school is one of neutrality as the law is viewed as a “symbolic accomplishment” in the fight towards crime, but neither wreaks havoc on the criminal justice system nor makes advancements in reduced recidivism rates (Sutton, 2013). In Sutton’s analysis, he tests the “severity, racial disparities, and individual- and jurisdiction-level variability in sentence outcomes using data on felony cases from the 12 most populous counties in California” (2013). Three factors are used in the analysis, the seriousness of the crime, the potential bias in the sentencing process, and the bias that occurs within the criminal justice system itself. The fact that there are many different stages within the justice system increases the potential bias in each stage. For example, pretrial detention for those who cannot afford bail may be viewed by officials as defendants who need to stay in jail because they are more dangerous, when in fact they don’t have the means to leave (Sutton, 2013). A few hypotheses were used in the study. One involved “macro level-studies” that tended to be more conservative in nature because of the political climate and the second focused on the prosecution’s means and limitations. There are only so many cases that can be tried and the rest must be pled out. The sample consisted of all male subjects in felony cases in twelve California counties. Possible outcomes that affected the results included the prosecutor’s decision of what type of crime constituted a defendant’s third strike. Independent variables like race and ethnicity were binary and prison length and sentence were calculated separately.
  • 4. For hypothesis one, Sutton (2013) found that the law was more punitive and increased the defendant’s sentencing length and increased the likelihood they would go to prison once tried. The effects of race and ethnicity were not as significant as expected. For example, black defendants were sentenced at the same rate before the law and after, the only change being longer sentence lengths in line with the legislation. Also, “legal factors” viewed to enhance sentences showed no real change between the seriousness of the crime or the “effect of a prior felony conviction” (Sutton, 2013). An important finding revealed zero evidence of prosecutors using their power unfairly to decide what qualifies as a third strike offense, thus manipulation was not at play in the legal process. In conclusion, it is much more difficult to quantify an individual offender into separate variables and the likelihood that they would be sentenced more severely depends on the cluster of attributes they have as a whole (Sutton, 2013). Marvell & Moody describe in “The Lethal Effects of Three‐Strikes Laws” how deterrence is affected, specifically in homicides (2001). They focus on how deterrence affects a criminal with two strikes against them and their decision to engage in a felony. Marvell & Moody (2001) surmise that the “cost” is what the criminal takes into account when they make the choice to commit a crime. Even if the cost is too high, deterrence might not be the outcome. Suppose for example a second strike individual commits a robbery and realizes that if he or she gets caught, they would receive a minimum of 25 years to life. They murder the victims they robbed in order to eradicate the possibility any witnesses can identify them as suspects. Marvell & Moody hypothesize that the opposite effect of deterrence occurs and there is an actual increase that a criminal will murder their victim (s) to escape capture (2001). “The difference between three-strikes states and other states is roughly 10 percentage points, which translates to some 1,400 extra murders per year in the three-strikes states” (Marvell & Moody, 2001).
  • 5. The research design used during the 29-year study in all fifty states is a fixed-effect model. The dependent variable is crime rate and a dummy rate variable is used for the three strike law. Their findings revealed that homicide rates increased short-term (and also long-term) averaging “60 additional homicides occurred” short-term, and for states who have not enacted the law, those states saved lives yearly (Marvell & Moody, 2001). A shortcoming of the study indicated that perhaps the increase in homicides for violent crimes is because of an overall trend and not necessarily connected with the law. Also noteworthy, states with the most severe three strike law, had the least increase in homicide rates. Although more studies need to be done, Marvell and Moody (2001) concluded that the three strike law has no overall reduction in crime, although incapacitation was not taken into account. They surmise that the cost is too high to continue to keep the three strike law in effect. In the article, “Does Three Strikes Deter?” Helland & Tabarrok (2007) compare deterrence in criminals with two strikes and in criminals with one or two strikes, but who underwent two separate trials to create a stronger causal relationship. They claim that there is a detriment for those who study deterrence because researchers cannot discern the difference between incapacitation and those truly deterred, which significantly skews results. Their study is limited by the fact that bias does occur because the profile of the criminal’s arrests focuses on a marginal effect and not the total outcome. The data was a random sample of prisoners released in California and the study was conducted as a quasi-experiment (Helland & Tabarrok, 2007). There are two important values used in the study. One being the number of arrests and the risk involved for released prisoners. The findings showed in some states that criminals with two strikes against them had an increased chance of a new felony conviction. For those who were tried twice for separate felonies, but only convicted of one or two strikes, the findings
  • 6. revealed a significant reduction in the chance of committing another strike, although the findings varied in each state. In California, the three strike legislation has reduced “felony arrest rates among the class of criminals with two strikes by 17 to 20 percent” (Helland & Tabarrok, 2007). In the article, “Officer Down: Implications of Three Strikes for Public Safety” Johnson & Saint-Germain investigate the impact that the three strike law has on suspects and law enforcement officers and whether there was an increase in violent confrontations (2005). The study was longitudinal in nature using a time series analysis from 1990-2001. Questionnaires were mailed to six large police departments in California and one in Arizona where the three strike law has not been implemented. The data included the number of arrests, whether those arrests involved threat or harm to a police officer and whether use of force was used by the police officer (Johnson & Saint-Germain, 2005). The findings showed a statistically significant increase in arrests made after the three strike policy was implemented, despite lower crime rates. The study did not discern between felony and misdemeanor arrests. The use of force by a police officer became more unpredictable after the three strike law and did not correlate to the number of arrests made. The same results were found with officer-related shootings after 1994. In order for this study to become more reliable, the number of arrests versus the number of officer-related harm must increase over time to show a valid correlation. The three strike law might be dangerous for officers, but no evidence was significant enough to support that conclusion (Johnson & Saint-Germain, 2005).
  • 7. References Eaton, L. (2003). Three strikes and you're out: Enhanced sentences for repeat offenders research pathfinder. Legal Reference Services Quarterly, 22(4), 55-85. doi:10.1300/j113v22n04_0 Helland, E., & Tabarrok, A. (2007). Does three strikes deter? Journal of Human Resources,XLII(2), 309-330. doi:10.3368/jhr.xlii.2.309 John R., S. (2013). Symbol and substance: Effects of California's three strikes law on felony sentencing. Law & Society Review, (1), 37. doi:10.1111/lasr.12001 Johnson, J. L., & Saint-Germain, M. A. (2005). Officer down: Implications of three strikes for public safety. Criminal Justice Policy Review, 16(4), 443-460. doi:10.1177/0887403405277001 Marvell, T. B., & Moody, C. E. (2001). The lethal effects of three‐strikes laws. The Journal of Legal Studies, (1), 89. doi:10.1086/468112
  • 8. 4 References Barrenger, S., Draine, J., Angell, B., & Herman, D. (2017). Reincarceration Risk Among Men with Mental Illnesses Leaving Prison: A Risk Environment Analysis. Community Mental Health Journal, 53(8), 883–892. https://doi- org.ezproxy.fiu.edu/10.1007/s10597-017- 0113-z Garot, R. (2019). Rehabilitation Is Reentry. Prisoner Reentry in the 21st Century: Critical Perspectives of Returning Home. Hlavka, H., Wheelock, D., & Jones, R. (2015). Exoffender Accounts of Successful Reentry from Prison. Journal of Offender Rehabilitation, 54(6), 406–428. https://doi- org.ezproxy.fiu.edu/10.1080/10509674.2015.1057630 Ho, D. (2011). Intervention-A New Way-Out to Solve the Chronic Offenders. International Journal of Interdisciplinary Social Sciences, 6(2), 167–172. Mobley, A. (2014). Prison reentry as a rite of passage for the formerly incarcerated. Contemporary Justice Review, 17(4), 465–477. https://doi- org.ezproxy.fiu.edu/10.1080/10282580.2014.980968 Reisdorf, B. C., & Rikard, R. V. (2018). Digital Rehabilitation: A Model of Reentry Into the Digital Age. American Behavioral Scientist, 62(9), 1273–1290. https://doi- org.ezproxy.fiu.edu/10.1177/0002764218773817 Serowik, K. L., & Yanos, P. (2013). The relationship between services and outcomes for a prison reentry population of those with severe mental illness. Mental Health & Substance Use: Dual Diagnosis, 6(1), 4–14. https://doi- org.ezproxy.fiu.edu/10.1080/17523281.2012.660979 SHUFORD, J. A. (2018). The missing link in reentry: Changing prison culture. Corrections Today, 80(2), 42–102. Thompkins, D. E., Curtis, R., & Wendel, T. (2010). Forum: the prison reentry industry. Dialectical Anthropology, 34(4), 427– 429. https://doi- org.ezproxy.fiu.edu/10.1007/s10624-010-
  • 9. 9164-z Woods, L. N., Lanza, A. S., Dyson, W., & Gordon, D. M. (2013). The Role of Prevention in Promoting Continuity of Health Care in Prisoner Reentry Initiatives. American Journal of Public Health, 103(5), 830–838. https://doi- org.ezproxy.fiu.edu/10.2105/AJPH.2012.300961 CCJ 4497 Professor Leimberg Scholarly Article Discussion Directions The purpose of this assignment is to help you understand how to read scholarly articles and gather important information from the article such as the research question/hypothesis, the methods used, and the findings. Reading these articles will help you to discover your ideas and thoughts about a topic and to prepare you to write a formal paper on the subject. Cite your references according to APA guidelines. See http://libguides.fiu.edu/criminology for sources related to criminal justice and criminology. The grade for this assignment will be based on the selection and quality of the articles chosen, the proper formatting of the references, and the quality of your interpretation. You will need to submit annotations for 5 peer-reviewed articles from the list of 10 that were selected as part of last week’s assignment. Additional Information Reading a scholarly journal article is not easy. If an article has been published in a scholarly journal, presumably, the editors believed that it contained information significant to the discipline(s) covered by the journal. Here are a few tips that should assist you in critically evaluating the research articles you read.
  • 10. The Title Read the title carefully: more information is contained in the title than you think. It is very important that you pay attention to information in the title. What are the major ideas addressed in the article? Who were the participants? What was their affiliation? Were they a special kind of group (e.g., adolescents, girls only)? The Abstract The purpose of the abstract is to summarize the article. Read the abstract carefully. If the author has done a good job, the abstract should provide you with the theoretical motivation for the paper, the major results and a brief general discussion. You should not JUST read the abstract, but often it is a great help to understanding the entire article. What variables were examined? What were the findings? Does the study show a cause-and-effect relationship between variables, or does it just show that a relationship exists? Where was the work conducted (i.e., laboratory or field). If field, what was the geographical location? The Introduction The introduction will give you the rationale for the study (an explanation of what the study investigates and why). The introduction typically includes a review of previous research or theory that provides a context for the specific questions being addressed in the article. You should understand what the research question(s) being studied and what the authors predicted they would find? Reading the introduction of a journal article can be made easier if you keep a number of key questions in mind, and look for the answers to them: What is the purpose of the article? Is it reporting an empirical study, a new theory, or is it reviewing previously published theory and research on a certain topic? What is the topic of the article? What specifically is the article addressing? Is it answering a
  • 11. specific question, trying to explain certain observations, presenting a model of some process, exploring the relationship between two or more variables, or something else? Look to the title and abstract for guidance. What variables are mentioned? Where is the article going? Look over the structure of the article, paying particular note to headings and subheadings. Scan tables and figures. You want to get an overview of what the article starts out discussing, what it ends up concluding, and how it leads you to that conclusion. If you get a rough outline of the entire article in your head before you begin reading, you have a better chance of seeing how each piece fits into a larger framework. Why is this an interesting or worthwhile topic/phenomenon to research? Why would this article interest researchers in the field (the journal editors would not have accepted the article for publication unless it met this role in some way)? What is already known about this topic/phenomenon? Where are the gaps in contemporary knowledge or understanding of this topic/phenomenon? How does the research being reported fill gaps in our knowledge/ or understanding of this topic/phenomenon? What niche does this work fill? What specific prediction(s) or hypothesis(es) are being tested? What were the main independent variables (what the researchers manipulated) and dependent variables (what the researchers measured)? The Method Generally speaking, when reading the method section you should ask yourself: What research techniques are used by the author(s)? Reading this section should provide you with a better idea of what was actually done in the research as well as a clue into the thinking of the researcher. Is the method employed a valid test of the predictions or hypotheses? There is rarely (if ever) a single way of testing a prediction or
  • 12. hypothesis. The researcher will have made a choice between a number of possible research designs/sets of materials/procedures/sample groups, etc. You need to consider whether the choices made by the researcher will allow them to make valid claims about their predictions or hypotheses. Has the researcher overlooked any possible confounds or extraneous variables which could affect interpretations of the findings? No piece of research is 'perfect', and there are usually limits as to how much 'control' can be achieved over the research environment. However, some researchers attempt to achieve more control in their research designs than others do. You need to consider whether sufficient control has been achieved. How do the methods employed compare with the methods used in other investigations of the same topic/phenomenon? As researchers usually seek to make comparisons between their study and earlier studies, you need to consider whether or not the method employed allows the researcher to make valid comparisons between studies, and how much you feel they are entitled to generalize their findings. The Results This section is very important because it provides numerical evidence that supports or refutes the hypotheses being studied. When reading the results section you should ask yourself: How do the results relate to the predictions/hypotheses set out in the introduction (i.e., are they supported or not)? What differences did the authors find that support or refute the project hypotheses? Are the results reported and analyzed in an unbiased manner? The manner in which data are reported and analyzed could dramatically affect interpretation. For example, different types or formats of graphs can emphasize or de-emphasize the sizes of effects, and different inferential tests can yield different results. The Discussion The discussion should summarize the main findings in (relatively) plain English. How do the authors interpret the
  • 13. findings? That is, what do they say the findings tell us about their research question? Do we now know' something new? Are there new questions raised? Do the authors discuss implications of their findings for theory, or for the "real world"? When reading the discussion section you should ask yourself: Have the appropriate interpretations of the results been made? Are there ways of interpreting the results that haven't been considered? Has the researcher presented an unbiased evaluation of the study/method employed? Is the researcher justified in making any theoretical claims that are made on the basis of the study's findings? Were the hypotheses supported or rejected? What are the implications of those findings (what do they tell us about theory, research, or real life concerns)? What suggestions are being made about future research into this topic/phenomenon or what does the researcher consider to be 'the way forward'? The Conclusion The conclusions may be in a separate section at the end of the article or incorporated as part of the discussion section. The conclusions should summarize the important findings of the study and point out their significance to the general research area. They might also point out some limitations to the study and avenues for future research based on the findings of the study. Writing a Project Report By Gail Marie, eHow Contributor Project reports communicate a project's background, its objectives, the methods used to achieve the objectives and the results of these efforts. The writer may also discuss important
  • 14. aspects of the project and draw certain conclusions. Like most reports, the information should be formatted with headings, clearly communicated and well supported. There are countless ways to write a project report. The steps below represent one method. Information needed in advance includes: Project details Background information Supporting information Sources of information Steps include: 1. Create a title or cover page, followed by a table of contents and an abstract (see Step 9). The project report's title should convey the area and scope of the project. 2. Consider your reader, his or her knowledge of your project and its subject. If your project was, for example, scientific but your reader is not a scientist, consider using less technical language than if he were. 3. Describe the project's scope, its objective and the main result(s) in the Introduction. You may include what you personally contributed to the project as well. 4. Tell the reader about the research behind the project in a Background section, if too extensive to include in the Introduction. 5. Describe the methods you used during the project to accomplish the stated objectives in a Methods/Procedures section. Don't forget to use the past tense, as these actions have already been taken. 6. Present the results of the project, which may not be the intended results. Use a Results section heading. Depending on your reader and what your project entailed, you may want to discuss the results by explaining what they show, analyzing uncertainties, noting trends, comparing the results with known
  • 15. theories or with the expected results, evaluating limitations of the project, detailing the possibilities of faulty interpretation or simply discussing assumptions about the results. 7. Conclude by summarizing, once again, the project report's content and by suggesting the implications of the project's results. Because your reader is familiar with your work, you may use project-specific terms and reference names of people and places under the Conclusion heading. 8. Propose, under a Recommendations heading, suggestions based on the conclusions outlined earlier. Describe actions you think should be taken because of the project's results or additional work that you think is needed to gain more knowledge about the subject. 9. Write the report abstract, which summarizes, like the conclusion, the report's contents. The abstract is actually the first section of the report, so keep it more general than the conclusion. Because the abstract is such a comprehensive summary, it is most easily written last. 10. Include references and appendices such as charts, graphs, photos or additional information at the end of the report. 1 Running Head: The security Vulnerabilities of IoT devices in the medical fieldCarmelia DalmeidaIT680 – Research PaperProject Proposal The security vulnerabilities of IoT devices in the medical fieldObjective The core objective of the topic will be to explore and examine the security vulnerabilities of the devices used in the medical field. As some devices are working as IoT, the chances of security breaches are enhanced. The devices contain information
  • 16. from different patients, and it is vulnerable when it is connected to the internet. If the device itself is not securing the information, then the administrator who is running the system operation and operating system on the device is responsible. The objective is to find the vulnerabilities and propose a solution that will give surety on the security factor of the devices.Project Plan The security issues in medical devices have been arising since their invention. Many companies are denying the fact that these are promoting data leaks and contain personally identifiable information (PII). It will probably create problems in different companies and patients. The patient record will be vulnerable, and some of the companies that are utilizing these devices are mainly using outdated software and operating systems. The main point of the research is to point out the vulnerabilities in the IoT devices and what type of security breaches they cause. In taking the example of some IoT devices with different abilities, infusion and insulin pump comes first then, smart pens, cardiac devices, wireless vital monitors, thermometer and temperature sensors, security cameras, and various other hardware. Every device has its benefits and its security concerns. Especially when you are working in the medical field, many inventions prevent humans from getting a disease and making upgrade through to cure any problem, but they also have a drawback when you try to more the very nature of the hardware. This project will elaborate on security vulnerabilities and present counter solutions for their issues. The task will involve taking few devices condition into consideration, exploring the working and mechanism of the devices, examining the security vulnerabilities and results gathered from different operations, comparing the reserves with the research findings, and presenting a proper report for solution providing with the exposed vulnerabilities. There will be teams running different module of the proposal, and they will collect single device and the team will run its functionalities in the programming side, and the other team will run for the architecture design and see
  • 17. what type of operation and how long it takes to send the data from device to the administrator server. The gap between the transmissions will be analysed for vulnerabilities, and the device hardware and software configuration will also be held responsible for any data leak. Literature Overview In the literature review, we will describe the function of IoT devices and how they can be used in the medical field. In the healthcare department, the IoT devices are growing rapidly and are packed with interesting features and factors like technological advancements, decrease prices of sensor technology, better accessibility of high-speed internet, and more. What type of application is the medical field currently running with the devices, and in how many sectors these devices are utilized and what type of result they generate? After that, we will conduct a study on one or two hospital for their IoT devices that poses a security threat, and it is vulnerable for data extraction. The study will elaborate on every module of the system and it will provide an in-depth view of the working device and we will also propose a countermeasure for any issue found in operation. Likely Outcome We will focus on one outcome that will be to ensuring the safety of any security leek. We will also elaborate on the methods by which you can make the device more secure and less vulnerable, which will also give the authentication protocol provided for both the patient and the administrator. The results will ensure the integrity of the IoT device and ensure the patient that the device will run efficiently, and records and data will be monitored with care, and find the solution for the generated outcomes.Relationship to the Master’s Program This project will be best suited for the master program because the subject elaborates on the internet devices, and it concern every type of protocol we run before giving a final product. It will also elaborate on the hardware structure of the program so that it will ensure that before running it in the field
  • 18. implementation and testing phase will be thoroughly examined. The Programming course and System Architecture course will help more in understanding and working on this proposed project.Reviews The survey shows 82 percent of healthcare organizations experienced IoT-focused cyber-attack in the previous 12 months, with only 6 percent of organizations saying they have resources to tackle cybersecurity challenges.( Davis, 2019) The paper highlight the security risk in the healthcare department and its integration with the internet of things devices. What type of vulnerabilities expects it exposes to its administrator and patient, and if the data they collected is still under surveillance or not? (Cansu Eken, 2016) References Cansu ken, H. E. (2016). Retrieved from http://www.ep.liu.se/ecp/142/054/ecp17142054.pdf Davis, Jessica (2019) Health IT Security- https://healthitsecurity.com/news/82-iot-devices-of-health- providers-vendors-targeted-by-cyberattacks