The document discusses community policing and the shift from a traditional policing model to one that emphasizes community involvement. It notes that the traditional "experts" model alienated the police from the public, as crime rose communities wanted more involvement. Therefore, community policing emerged where police work closely with communities. Today, most law enforcement agencies subscribe to community policing in some form to more effectively address crime through positive community relationships. The document assigns a report analyzing the reasons for this shift and aspects of different policing models.
Submit by 6am on 16th JuneAs a backlash, the professional mode.docx
1. Submit by 6am on 16th June
As a backlash, the professional model, which reflects a "we are
the experts and you are not" attitude, alienated the police from
the public. Problems and crime kept growing, and people
wanted to be more involved in their communities. Therefore,
community members started to work closely with the police.
The police saw their resources diminish and decided it was
critical to engage the communities to more effectively combat
rising crime.
Today, the vast majority of law enforcement agencies state that
they subscribe to the community policing philosophy. The
implementation of the philosophy is varied, but most agencies
acknowledge the value of having a positive working relationship
within the community.
Thus, it is important to understand the history of modern
policing to comprehend some possible conclusions as to why
agencies began adopting the community policing philosophy.
Tasks:
Prepare a three to four page report answering the following
questions.
· What are the main reasons for the majority of US law
enforcement agencies to adopt the community policing
philosophy?
· What is the most important aspect of community policing that
is attractive to the community?
· What is the most important aspect of community policing that
is attractive to the police?
· What aspects of prior policing models are not acceptable in
today's communities?
Note: Use at least three scholarly sources, with at least one
source that is not part of the assigned readings. Include a
separate page at the end of the report, in APA format, that links
2. back to your in-text citations and supports your
recommendations.
Assignment 3 Grading Criteria
Maximum Points
Analyzed the main reasons that led the majority of US law
enforcement agencies to adopt the community policing
philosophy.
28
Evaluated the most important aspect of community policing that
is attractive to the community and the police.
28
Evaluated various aspects of prior policing models that are not
acceptable in today's communities.
24
Wrote in a clear, concise, and organized manner; demonstrated
ethical scholarship in the accurate representation and attribution
of sources; and used accurate spelling, grammar, and
punctuation.
20
Total:
100
Class,
I'm providing a recently example of a critical analysis written
by Dr. Valorie King. This example is based on the 1st case
study for this class, CSIA 350.
I think most of you have a good idea of what's required for the
case studies, but use the information as you need. I will
continue to grade appropriate.
A Critical Analysis (CA) is a discussion response that has an
3. introductory paragraph, an analysis section (around 3
paragraphs or so), and a brief summary. For Case Study #1, a
really good CA would have looked something like this:
There are many reasons why a business should invest in
cybersecurity products and services. In [her / his] essay,
[student name] addressed ethical principles which drive such
investments. While ethics are important, the business needs and
requirements for IT security must also be considered. In this
critical analysis response, I would like to take a deeper look at
three important points which drive businesses to invest in IT
security.
First, consider the question of the Business Benefits of IT
Security products and services. Businesses exist to make a
profit (Vitez, 2016). Making a profit requires that losses and
unnecessary costs be avoided. This is where the business benefit
of IT security products comes into play. An anti-virus product
can prevent a malware infection (Drew, 2011). Spending some
money to buy an anti-virus product to prevent malware will save
money in the long run since the business will not have to pay to
cleanup malware infections on laptops, workstations, and
servers.
Second, consider the question of Why an organization should
invest in IT security technologies. This is very similar to the
first question. But, in addition to the financial benefits (cost
avoidance) there are also legal and regulatory reasons why an
organization should invest in IT security technologies
(Smedinghoff, 2005). Many laws require that companies use
encryption to protect private information (HIPAA, FERPA,
etc.). This is an IT security technology that a company may be
legally required to purchase (invest in).
Third, consider Where an organization should focus its attention
& why. Technology is only one type of investment that a
4. company should make when it comes to IT security. Investing in
people by hiring well qualified security professionals and then
providing ongoing training is another area where a company
needs to spend money to protect information, information
systems, and information infrastructures (ISACA, 2009). Even
the best IT security products need people who understand how
to configure, test, and operate those products. For this reason,
an organization should also focus its attention on hiring the best
security professionals that it can afford. Then, the company
should keep these people the best by investing in training.
In summary, there are many reasons why a business should
invest in IT security and why those investments should include
both people and products (technologies). But, the bottom line is
that a business needs to make a profit to stay in business.
Investing in IT security products is an important part of
protecting profits and avoiding unnecessary costs.
References
Drew, J. (2011, August 30). The benefits of having anti-virus
protection. TopTenReviews. Retrieved from http://anti-virus-
software-review.toptenreviews.com/learning-center/the-
benefits-of-having-anti-virus-protection.html
ISACA. (2009). An introduction to the business model for IT
security. Retrieved from http://www.isaca.org/knowledge-
center/research/documents/introduction-to-the-business-model-
for-information-security_res_eng_0109.pdf
Smedinghoff, T. (2005, November). The new law of information
security: What companies need to do now. The Computer and
Internet Lawyer Journal, 9-25.
Vitez, O. (2016). What are the effects of profit or loss in a
business organization? Houston Chronicle. Retrieved from
5. http://smallbusiness.chron.com/effects-profit-loss-business-
organization-824.html
Reply 1 needed
At this time, I would definitely not give the sponsor an answer
about the timeline because I have not had a chance to review
and understand the project. Instead, I would let the sponsor
know that I am pleased to have been brought into the project
and I am looking forward to learning about their goals. I would
then let the sponsor know that I need time to review the project
and establish benchmarks and milestones. I would also need to
examine potential risks and downfalls that would need to be
resolved or avoided in order to minimize the possibility of the
project taking longer than it should. Once I drew up a true
schedule and timeline, including my research, then I would be
able to give him a better idea on whether or not his time goals
could be met.
Reply 2 needed
Based on our readings, No, I definitely would not give the
executive sponsor an answer at this time. If you were to say yes
we could do in 6 months or less, or even a ‘maybe,’ you would
pretty much be setting yourself up for failure and giving false
hope to the executives. As a PM, I would answer the executive
sponsor with “Since this is a new project for the company, I will
need to do some research and analyze the project specifics
first. Then I prefer to use software in order to accurately
calculate everything and come up with the best possible
timeline for you.”
Reply 3 needed
Based on the scenario that has been given I would not be able to
give the executive sponsor an answer because I have not yet
analyzed the project. What if I gave the answer of 6months and
saw the project afterwards but then realized I made a mistake.
6. Well, if it were a lower duration maybe that is good but if it
were more time to consume that when the little problem comes
since the answer has already been given. I think the way I
would phrase it to him is : "I'm currently the new appointed PM
for this major project, I have not yet gotten a chance to look at
it, but I will let you know as soon as possible what the duration
time will be after the planning and scheduling have been
settled". I would expect him to be understanding and say
"indeed not a problem, just email me or let me know when you
do get the chance."
I think this is the way I would have handled it because I work
for a hotel, and I have many of these projects handed to me, I
usually answer the way I did and 9/10 I get the answer that I
was expecting. On the other hand, I think it would be perfect
after reviewing the project to create deadlines and plan the
delivery of the projects so that we know the duration that should
be estimated. By having the effort, duration and the elapsed
times for the planning of the project, I think that it could be
accomplished with a good amount of months. With this, you can
give the executive a great answer.
Reply 1 needed
John,
Seems you developed a vast understanding of how real cyber
attacks are. In saying that, I would venture to say that you will
agree administrations must take the necessary measure to
combat cyber attacks. Based on the high level targets that have
been successfully infiltrated, clearly no one is exempt from
being attacked. The proper handling of government data is very
important. Government employees must be aware of how
information should be cared for based on it's sensitivity.
All agencies should be manned with a cyber security
team who are responsible for training all data custodians as well
7. maintained security features.
R,
E.W.
Reply 2 needed
I thought we were supposed to answer the question of our
administration would ensure that Digital Government services
are secure?
· What is meant by "Digital Government services?" (previously
called "e-Government" services)
· Where have past administrations fallen short in protecting
Digital Government / e-Government services?
· What is meant by "Threats" (i.e. individual hackers, politically
motivated hacktivists, criminal enterprises, and unfriendly
"nation state" actors)
I feel like the questions for the debate were not answered.
Growth has been observed in the Information Technology field
since the 1940s. Now, in more modern times, the role of E-
government, or virtual government has been on the rise. This is
providing the American people an open platform allowing for
the use and re-use of government data while preserving privacy
in the process. (Office of Management and Budget, 2016)
Privacy is paramount in this process; the people won't trust the
government with data, if they feel the data is not protected.
That being said, the government is taking stride to anonymize
data, especially when we are discussing health data, PII, or tax
data. We have seen that between "January 1, 2009 and May 31,
2012, there have been 268 breach incidents in government
agencies with more than 94 million records containing
personally identifiable information exposed." (Data Breaches,
2012) Threats come in many forms: malicious software, nation
state actors (people who are working for adversaral
governments), hacktivists (hackers with a cause), etc. Threats
are what we can expect to exploit vulnerabilities in computer
systems.
You did mention some of this, but I feel you touched the tip of
8. the iceberg.
Digital government services are built three "layers": the
information, or data, such as weather and census data plus other
supporting data, the platform by which data is delivered and
managed for access by people, and the presentation layer, which
determines the way in which people see the and receive the data
through the Internet, mobile applications, and other delivery
methods (Office of Management and Budget, 2016) These
layers are functional in that they are designed to facilitate the
development of open government through the use Internet -
based media functionality. The problem lies with the number of
breaches that occur constantly. Hopefully, the Data Security
and Breach Notification Act of 2015, will help enforce
disclosure of breaches when they happen. (Nelson, 2015)
Because there have been 268 breaches recorded between the
beginning of 2009 and 2012 where we have seen the breach of
personal information, we need to be vigilant in mitigating
them. Even a breach by Russian hackers exfiltrating
information from the Democratic national Convention just was
reported; information regarding presidential candidates was
stolen.
Can you tell us how past administrations failed at securing
services?
P.S. I am not trying to be rude by any means; I simply did not
feel the questions were answered here. If you feel I
misunderstood your viewpoint, then help me to better
understand.
Reply 3 needed
Incident response is a piece of the cyber security puzzle, but it
is worthless unless you do it in a timely fashion. Creating a
culture of security awareness is imperative to creating a defense
in depth strategy for enterprise networks. Users are the weakest
link in this, and attackers will frequently exploit them. Many
breaches stem internally from people's ignorance or being
careless with opening email or sharing passwords.
9. (Abawajy, 2014). This can easily result in a breach of any
network, whether intentional or not. I have personally seen this
in action; mostly because people do not understand what they
are doing when they are clicking things while browsing the
Internet. Likewise, one user can bypass all the security
mechanism present on a network. Check out
"(http://www.theregister.co.uk/2010/01/14/google_china_attack
_analysis/)." (Grauer, 2016) “Failing to deliver the cyber risk
information that board members want, in a way they understand,
will not go unnoticed,” said Ryan Stolte, Chief Technology
Officer and Co-Founder of Bay Dynamics. And there will be
repercussions. 59 percent of board members surveyed said that
there is a good chance that one or more IT and security
executives who fail to provide useful and actionable
information in their reports would lose their jobs.
So if that wasn't enough motivation, there are guides that can be
obtain from NIST to guide you on create secure configurations
for computer systems and servers. You can also access
iase.disa.mil to get information on Secure Technical
Information Guides (STIGs) to assist in endeavors like this as
well.
Abawajy, J. (2014). User preference of cyber security awareness
delivery methods. Behaviour & Information Technology, 33(3),
236-247.
Grauer, Y. (2016). Forbes Welcome. Forbes.com. Retrieved 14
June 2016, from
http://www.forbes.com/sites/ygrauer/2016/06/14/cyber-security-
executives-need-to-step-up-their-game-heres-
why/#d8c3ea43be1a
Digital Government, also know an E-Government is the
government’s way of making government data easily assessable
10. through Internet Technology (I.T.). Digital Government also
aids and encourages the interaction between citizens and
government agencies as well as allows agencies to provide easy,
efficient government services to customers (107th Congress,
2002). With the convenience of massive amounts of easily
accessible government data comes the need for cyber security to
protect from threats. A cyber security threat is any malicious
entity that can directly cause or influence the lost, theft or
misuse of secured data. These threats can be launched from
various sources, e.g., common hackers, insider threats, criminal
enterprises (ICS-Cert, 2016).
As an administration we will ensure digital government services
are secure by first developing an engrained understanding of the
potential threats. After such, we will establish the necessary
security mechanisms to combat these threats and employ
maintainers to ensure our security methods are updated and
remain effective. We will constantly monitor potential threats
and adjust/upgrade our security measure to defend all new
threats. We will ensure handlers of information are trained and
cognizant of how to properly receive, distribute and maintain
government information. In addition all employees will be able
to recognize any system behavior that may imply the system is
under attack. We will ensure reporting procedures are well
known amongst all handlers of government information. We
will emphasize and enforce the requirement to report all
security breaches in a timely manner and conduct rehearsals on
system recovery procedures.
In the past, seemingly in an attempt to conceal the information,
administrations have delayed reporting security breaches. In a
2014 Computer World article, Darlene Storm wrote about
hacked government agencies. These agencies included the White
House, USPS and NOAA. All of the aforementioned had
unexplainable delays in reporting cyber security
breaches (Storm, 2014). When administrations fail to
immediately report data breaches they risk the chance of
hackers doing more damage. The sooner the violation is
11. reported the sooner a solution can be implemented and recovery
can begin.
References
107th Congress. (2002, December 17). Retrieved from National
Institute of Standards and Technology:
http://www.nist.gov/director/oism/upload/PL107-347.pdf
ICS-Cert. (2016). Cyber Threat Source Descriptions. Retrieved
from ICS-Cert: https://ics-cert.us-cert.gov/content/cyber-threat-
source-descriptions
Storm, D. (2014, November 17). List of hacked government
agencies grows: State Department, White House, NOAA &
USPS. Retrieved from Computer World:
http://www.computerworld.com/article/2848779/list-of-hacked-
government-agencies-grows-state-department-white-house-
noaa-and-usps.html
How will your administration ensure that Digital Government
services are secure?
First, my administration will not hide breaches, once they are
identified. We see that with the NOAA hack, Representative
Wolf, stated "NOAA told me it was a hack and it was China."
(Storm, 2016) Representative Wolf goes onto say NOAA
covered up the breach as well. (Storm, 2016) I would set forth
an initiaive to push through the Data Security and Breach
Notification Act of 2015 to hold agencies accountable in the
case of breaches when they occur. This presents a clear and
present danger to government services as they provide
information and services to the American citizens. Digital
government services are built three "layers": the information, or
data, such as weather and census data plus other supporting
data, the platform by which data is delivered and managed for
access by people, and the presentation layer, which determines
the way in which people see the and receive the data through
the Internet, mobile applications, and other delivery methods
12. (Office of Management and Budget, 2016) We have seen that
between "January 1, 2009 and May 31, 2012, there have been
268 breach incidents in government agencies with more than 94
million records containing personally identifiable information
exposed." (Data Breaches, 2012) Threats come in many forms:
malicious software, nation state actors (people who are working
for adversaral governments), hacktivists (hackers with a cause),
etc. Threats are what we can expect to exploit vulnerabilities in
computer systems.
Digital government services are meant to be open platform to
provide the American people with information in a way that
allows for the creation of data once, then allowing agencies to
collaborate to generate consistent data for people to access
while preserving privacy throughout the process. (Office of
Management and Budget, 2016) One way this is accomplished,
agencies are using tools to tailor services to the needs of users
and tools help people to complete complex forms, such as
FAFSA forms, reducing form completion time by 66%. (Keller
& Zinner, 2015) This is done through the use of Application
Programming Interfaces, or APIs. (Office of Management and
Budget, 2016) Also, mobile is quickly transforming the way
data is delivered as well; "By 2015, more Americans will access
the Internet via mobile devices than desktop PCs." (Office of
Management and Budget, 2016) The challenge lies in the
ability of the government to provide the public with data
quickly and securely.
As we have seen just in the past few years, various government
agencies have been breached, and millions of personal records
have been compromised. Past administrations seem to have
failed in establishing a breach and notification standard, making
agencies or other entities accountable for breaches, and enabled
the abilities of agencies to better share threat-based information
(Government Accountability Office, 2016) Now we have the
Data Security and Breach Notification Act of 2015, introduced
to require notification of breaches within the government, which
13. also specifies criminal penalties of fines, jail time, or both, for
not admitting to breaches causing economic damage to people.
(Nelson, 2015) This will help to enforce the standards of
notifications of breaches to better inform the public to enhance
government relationships with the public. Hopefully, this will
lead to better interagency threat knowledge sharing as well.
Legal challenges present issues between agencies to allowing
agencies to share this important information; these barriers need
to be removed to enable agility in securing digital government
services.
REFERENCES
Data Breaches in the Government Sector. (2012). Retrieved 14
June 2016, from https://www.rapid7.com/docs/data-breach-
report.pdf
Government Accountability Office,. (2016). Privacy in the
Digital Age: Preventing Data Breaches and combating cyber
crime.. Washington, D.C.: U.S. Government Publishing Office.
Keller, E., & Zinner, C. (2015). Streamlining Government
Services in the Digital Age. Public Manager, 44(2), 29-30.
Nelson, B. (2015). S.177 - 114th Congress (2015-2016): Data
Security and Breach Notification Act of 2015. Congress.gov.
Retrieved 14 June 2016, from
https://www.congress.gov/bill/114th-congress/senate-bill/177
Office of Management and Budget. (2016). Digital Government:
Building a 21st Century Platform to Better Serve the American
People. Whitehouse.gov. Retrieved 14 June 2016, from
https://www.whitehouse.gov/sites/default/files/omb/egov/digital
-government/digital- government.html
Storm, D. (2016). List of hacked government agencies grows:
State Department, White House, NOAA & USPS.
Computerworld. Retrieved 14 June 2016, from
http://www.computerworld.com/article/2848779/list-of-hacked-
government-agencies-grows- state-department-white-
house-noaa-and-usps.html