SlideShare a Scribd company logo
1 of 2
Article:
Reading Assignments
Chen, J. & Zhu, Q. (2019). Interdependent Strategic Security
Risk Management With Bounded Rationality in the Internet of
Things. IEEE Transactions on Information Forensics and
Security, 14(11), 2958-2971.
Borek, A. (2014). Total Information Risk Management:
Maximizing the Value of Data and Information Assets (Vol.
First edition). Amsterdam: Morgan Kaufmann
Retrieved from
http://search.ebscohost.com/login.aspx?direct=true&AuthType=
shib&db=e000xna&bquery=Total+Information+Risk+Manageme
nt%3a+Maximizing+the+Value+of+Data+and+Information+Ass
ets&type=0&searchMode=And&site=ehost-
live&custID=s8501869&groupID=main&profID=ehost
The readings this week discusses broad context of risk and
investigative forensics. Part of risk management is to
understand when things go wrong, we need to be able to
investigate and report our findings to management. Using this
research, or other research you have uncovered discuss in detail
how risk and investigate techniques could work to help the
organization. ERM helps to protect an organization before an
attack, where as forensics investigate technique will help us
after an attack - so lets discus both this week.
A substantive post will do the following:
Ask an interesting, thoughtful question pertaining to the topic
Answer a question (in detail) posted by another student or the
instructor
Provide extensive additional information on the topic
Explain, define, or analyze the topic in detail
Share an applicable personal experience
Provide an outside source (for example, an article from the UC
Library) that applies to the topic, along with additional
information about the topic or the source (please cite properly
in APA 7)
Make an argument concerning the topic.
At least one scholarly source should be used in the initial
discussion thread. Be sure to use information from your
readings and other sources from the UC Library. Use proper
citations and references in your post.

More Related Content

Similar to Article             Reading Assignments   Chen, J. & Zhu,.docx

Technology delivers improved opportunities for success to an organiz.docx
Technology delivers improved opportunities for success to an organiz.docxTechnology delivers improved opportunities for success to an organiz.docx
Technology delivers improved opportunities for success to an organiz.docx
jacqueliner9
 
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdfTwin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Sreevalsan V.K.
 
Comparative review dele
Comparative review deleComparative review dele
Comparative review dele
yoboy7
 
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxRunning head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
jeanettehully
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
daniahendric
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
April Dillard
 
5-Information Extraction (IE) and Machine Translation (MT).ppt
5-Information Extraction (IE) and Machine Translation (MT).ppt5-Information Extraction (IE) and Machine Translation (MT).ppt
5-Information Extraction (IE) and Machine Translation (MT).ppt
milkesa13
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docx
cockekeshia
 

Similar to Article             Reading Assignments   Chen, J. & Zhu,.docx (20)

Measuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsMeasuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate Metrics
 
All About Phishing Exploring User Research Through A Systematic Literature R...
All About Phishing  Exploring User Research Through A Systematic Literature R...All About Phishing  Exploring User Research Through A Systematic Literature R...
All About Phishing Exploring User Research Through A Systematic Literature R...
 
Technology delivers improved opportunities for success to an organiz.docx
Technology delivers improved opportunities for success to an organiz.docxTechnology delivers improved opportunities for success to an organiz.docx
Technology delivers improved opportunities for success to an organiz.docx
 
TOP CITED 2 ARTICLES IN 2017 - INTERNATIONAL JOURNAL OF MANAGING INFORMATION ...
TOP CITED 2 ARTICLES IN 2017 - INTERNATIONAL JOURNAL OF MANAGING INFORMATION ...TOP CITED 2 ARTICLES IN 2017 - INTERNATIONAL JOURNAL OF MANAGING INFORMATION ...
TOP CITED 2 ARTICLES IN 2017 - INTERNATIONAL JOURNAL OF MANAGING INFORMATION ...
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
 
The data science revolution in insurance
The data science revolution in insuranceThe data science revolution in insurance
The data science revolution in insurance
 
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdfTwin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
Twin Behavioral Security Chung Galletta 2014 IFIP Roode Revised.pdf
 
Comparative review dele
Comparative review deleComparative review dele
Comparative review dele
 
Ics 3210 information systems security and audit - edited
Ics 3210   information systems security and audit - editedIcs 3210   information systems security and audit - edited
Ics 3210 information systems security and audit - edited
 
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxRunning head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Akamai 2018 Spring state of the Internet security report
Akamai 2018 Spring state of the Internet security reportAkamai 2018 Spring state of the Internet security report
Akamai 2018 Spring state of the Internet security report
 
5-Information Extraction (IE) and Machine Translation (MT).ppt
5-Information Extraction (IE) and Machine Translation (MT).ppt5-Information Extraction (IE) and Machine Translation (MT).ppt
5-Information Extraction (IE) and Machine Translation (MT).ppt
 
Cyber terrorism.. sir summar
Cyber terrorism.. sir summarCyber terrorism.. sir summar
Cyber terrorism.. sir summar
 
Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015Data Metrics and Automation: A Strange Loop - SIRAcon 2015
Data Metrics and Automation: A Strange Loop - SIRAcon 2015
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docx
 
Epistemology of Intelligence Analysis
Epistemology of Intelligence AnalysisEpistemology of Intelligence Analysis
Epistemology of Intelligence Analysis
 

More from rossskuddershamus

As a former emergency department Registered Nurse for over seven.docx
As a former emergency department Registered Nurse for over seven.docxAs a former emergency department Registered Nurse for over seven.docx
As a former emergency department Registered Nurse for over seven.docx
rossskuddershamus
 
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin .docx
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin  .docxARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin  .docx
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin .docx
rossskuddershamus
 
AS 4678—2002www.standards.com.au © Standards Australia .docx
AS 4678—2002www.standards.com.au © Standards Australia .docxAS 4678—2002www.standards.com.au © Standards Australia .docx
AS 4678—2002www.standards.com.au © Standards Australia .docx
rossskuddershamus
 
arugumentative essay on article given belowIn Parents Keep Chil.docx
arugumentative essay on article given belowIn Parents Keep Chil.docxarugumentative essay on article given belowIn Parents Keep Chil.docx
arugumentative essay on article given belowIn Parents Keep Chil.docx
rossskuddershamus
 
artsArticleCircling Round Vitruvius, Linear Perspectiv.docx
artsArticleCircling Round Vitruvius, Linear Perspectiv.docxartsArticleCircling Round Vitruvius, Linear Perspectiv.docx
artsArticleCircling Round Vitruvius, Linear Perspectiv.docx
rossskuddershamus
 
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docxARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
rossskuddershamus
 
ARTIGO ORIGINALRevista Cient.docx
ARTIGO ORIGINALRevista Cient.docxARTIGO ORIGINALRevista Cient.docx
ARTIGO ORIGINALRevista Cient.docx
rossskuddershamus
 

More from rossskuddershamus (20)

As a human resources manager, you need to advise top leadership (CEO.docx
As a human resources manager, you need to advise top leadership (CEO.docxAs a human resources manager, you need to advise top leadership (CEO.docx
As a human resources manager, you need to advise top leadership (CEO.docx
 
As a homeowner, you have become more concerned about the energy is.docx
As a homeowner, you have become more concerned about the energy is.docxAs a homeowner, you have become more concerned about the energy is.docx
As a homeowner, you have become more concerned about the energy is.docx
 
As a healthcare professional, you will be working closely with o.docx
As a healthcare professional, you will be working closely with o.docxAs a healthcare professional, you will be working closely with o.docx
As a healthcare professional, you will be working closely with o.docx
 
As a future teacher exposed to the rising trend of blogs and adv.docx
As a future teacher exposed to the rising trend of blogs and adv.docxAs a future teacher exposed to the rising trend of blogs and adv.docx
As a future teacher exposed to the rising trend of blogs and adv.docx
 
As a fresh research intern, you are a part of the hypothetical.docx
As a fresh research intern, you are a part of the hypothetical.docxAs a fresh research intern, you are a part of the hypothetical.docx
As a fresh research intern, you are a part of the hypothetical.docx
 
As a fresh research intern, you are a part of the hypothetical Nat.docx
As a fresh research intern, you are a part of the hypothetical Nat.docxAs a fresh research intern, you are a part of the hypothetical Nat.docx
As a fresh research intern, you are a part of the hypothetical Nat.docx
 
As a former emergency department Registered Nurse for over seven.docx
As a former emergency department Registered Nurse for over seven.docxAs a former emergency department Registered Nurse for over seven.docx
As a former emergency department Registered Nurse for over seven.docx
 
As a doctorally prepared nurse, you are writing a Continuous Qua.docx
As a doctorally prepared nurse, you are writing a Continuous Qua.docxAs a doctorally prepared nurse, you are writing a Continuous Qua.docx
As a doctorally prepared nurse, you are writing a Continuous Qua.docx
 
As a consumer of information, do you generally look for objectivity .docx
As a consumer of information, do you generally look for objectivity .docxAs a consumer of information, do you generally look for objectivity .docx
As a consumer of information, do you generally look for objectivity .docx
 
As a center of intellectual life and learning, Timbuktua. had ver.docx
As a center of intellectual life and learning, Timbuktua. had ver.docxAs a center of intellectual life and learning, Timbuktua. had ver.docx
As a center of intellectual life and learning, Timbuktua. had ver.docx
 
ary AssignmentCertified medical administrative assistants (CMAAs) .docx
ary AssignmentCertified medical administrative assistants (CMAAs) .docxary AssignmentCertified medical administrative assistants (CMAAs) .docx
ary AssignmentCertified medical administrative assistants (CMAAs) .docx
 
As (or after) you read The Declaration of Independence, identify.docx
As (or after) you read The Declaration of Independence, identify.docxAs (or after) you read The Declaration of Independence, identify.docx
As (or after) you read The Declaration of Independence, identify.docx
 
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin .docx
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin  .docxARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin  .docx
ARTWORK Markus Linnenbrink HOWTOSURVIVE, 2012, epoxy resin .docx
 
AS 4678—2002www.standards.com.au © Standards Australia .docx
AS 4678—2002www.standards.com.au © Standards Australia .docxAS 4678—2002www.standards.com.au © Standards Australia .docx
AS 4678—2002www.standards.com.au © Standards Australia .docx
 
arugumentative essay on article given belowIn Parents Keep Chil.docx
arugumentative essay on article given belowIn Parents Keep Chil.docxarugumentative essay on article given belowIn Parents Keep Chil.docx
arugumentative essay on article given belowIn Parents Keep Chil.docx
 
artsArticleCircling Round Vitruvius, Linear Perspectiv.docx
artsArticleCircling Round Vitruvius, Linear Perspectiv.docxartsArticleCircling Round Vitruvius, Linear Perspectiv.docx
artsArticleCircling Round Vitruvius, Linear Perspectiv.docx
 
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docxARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
ARTS & NATURE MARKETING PROJECT OF SHEFFIELDYang yux.docx
 
ARTIGO ORIGINALRevista Cient.docx
ARTIGO ORIGINALRevista Cient.docxARTIGO ORIGINALRevista Cient.docx
ARTIGO ORIGINALRevista Cient.docx
 
Artist Analysis Project – Due Week 61)Powerpoint project at le.docx
Artist Analysis Project – Due Week 61)Powerpoint project at le.docxArtist Analysis Project – Due Week 61)Powerpoint project at le.docx
Artist Analysis Project – Due Week 61)Powerpoint project at le.docx
 
Artist Research Paper RequirementsYou are to write a 3 page double.docx
Artist Research Paper RequirementsYou are to write a 3 page double.docxArtist Research Paper RequirementsYou are to write a 3 page double.docx
Artist Research Paper RequirementsYou are to write a 3 page double.docx
 

Recently uploaded

MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 

Recently uploaded (20)

MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 

Article             Reading Assignments   Chen, J. & Zhu,.docx

  • 1. Article: Reading Assignments Chen, J. & Zhu, Q. (2019). Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things. IEEE Transactions on Information Forensics and Security, 14(11), 2958-2971. Borek, A. (2014). Total Information Risk Management: Maximizing the Value of Data and Information Assets (Vol. First edition). Amsterdam: Morgan Kaufmann Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType= shib&db=e000xna&bquery=Total+Information+Risk+Manageme nt%3a+Maximizing+the+Value+of+Data+and+Information+Ass ets&type=0&searchMode=And&site=ehost- live&custID=s8501869&groupID=main&profID=ehost The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack - so lets discus both this week. A substantive post will do the following:
  • 2. Ask an interesting, thoughtful question pertaining to the topic Answer a question (in detail) posted by another student or the instructor Provide extensive additional information on the topic Explain, define, or analyze the topic in detail Share an applicable personal experience Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7) Make an argument concerning the topic. At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.