SlideShare a Scribd company logo
Due Date: 11:59 p.m. EST, Sunday of Unit 7
Points: 100
Overview:
Congratulations on your new position, Director of Corporate
Training! This is such an
exciting time for you to put your training and development
knowledge to work and hit the
ground running. You have just received an email from your
boss with the details of your
first project:
Good morning!
We are thrilled to have you take the lead of our corporate
training program. The
first project we have for you is to create a standardized training
program that you
will present to your new staff in the form of a PowerPoint
presentation. Essentially,
I need you to train the Trainers. There is more information
about what is required
below. Please be sure to complete the Notes section of each
slide in PowerPoint
with a robust and meaningful narrative, and remember to use
relevant sources of
information to support your training program design. I will
need this project
completed in 7 weeks.
Thank you!
Instructions:
• Your project will include the topics listed below. Address
each topic providing
evidence as to why each is important to training program
design:
o Curriculum road map to show the overall training program and
sequence.
o Top five (5) KSA’s of your training staff.
o Competency Model based off of those KSA’s.
o Essential considerations for choosing trainers.
o Conducting a Needs Analysis.
o Selecting and preparing a training site conducive to learning.
o Learning theories used to guide training preparations and
implementation.
o Appropriate pre- and post-training activities for adult
learners.
o Levels of management in support of training.
o Assessing a training program’s success.
HRM308 – Training and Development
Train-the-Trainer Program
• The presentation will present the major findings of your
research through the
units. The final product should showcase the concepts you have
learned
throughout the course and an understanding of how the concepts
are put into
real-world applications.
• Each slide should provide succinct points of the key
information that you wish to
convey.
• Include a narrative for the slides in your presentation by using
the Notes section
in PowerPoint to narrate the information presented in each
slide.
Requirements:
• All works should be written in proper APA format.
• Include Title and Reference slides.
• Include an Introduction and Conclusion.
• Must consist of 12-15 slides, not including the required Title
and Reference
slides.
• On your title slide, include the name for the project, your
name, and date.
• Use at least three (3) academic references to support your
work. You may use
your textbook, resources from the units, or peer-reviewed
outside resources
(Wikipedia is not considered an academic resource).
Be sure to read the criteria by which your work will be
evaluated before you write and
again after you write.
Evaluation Rubric for Train-the-Trainer Program
CRITERIA Development Needed Proficient Exemplary
(0-13 Points) (14-17 Points) (18-20 Points)
Content Elements of the
assignment are not
addressed, poorly
constructed, lacking
critical thought, or
difficult to evaluate.
Slides generally
address all elements of
the assignment in a
clear manner, showing
evidence of critical
thinking and research.
Slides clearly address
all elements of the
assignment in a
thorough and detailed
manner. Critical
thinking and research
are apparent.
Overall
Organization
Content is difficult to
follow due to lack of
logical structure or flow.
Information flow is
generally logical and
easy to follow but may
lack fluency.
Information is
presented in a logical
and interesting
sequence that is easy
to follow. Topics flow
smoothly from one to
another with
appropriate transitions.
Narrative/Notes
Section
Narrative/notes are
missing, weak, or
difficult to evaluate.
Narrative/notes are
provided and mostly
support the slide
content.
Robust and meaningful
narrative/notes are
provided to support the
slide content.
(0-6 Points) (7-8 Points) (9-10 Points)
Professionalism Slides are unclear,
overloaded, or lack a
consistent design style.
Slides and supporting
notes are and
presented in a
generally consistent
and effective design
style, though there are
some inconsistencies
present.
Slides and supporting
notes are presented in
a consistently
professional and
effective manner.
Template design, fonts,
and colors enhance the
presentation.
Preparation and
Development
Slides demonstrate
frequent errors of layout
or lack of attention to
detail in preparation.
Slides demonstrate
general attention to
detail in layout, titling,
or use of
images/tables/etc.
Slides demonstrate
consistent attention to
detail in preparation.
Information is
presented in a relevant
and original manner,
with effective use of
images/tables/etc.
CRITERIA Development Needed Proficient Exemplary
Clear and
Professional
Writing
Writing is sometimes
difficult to understand
because of several
errors in grammar,
punctuation, and
spelling. Word choice is
sometimes inappropriate
for an academic setting.
Sentence structure is
sometimes unclear.
Writing is easy to
understand despite
minor errors in
punctuation, spelling,
and grammar.
Appropriate word
choice is used for an
academic setting.
Sentence structure is
mostly clear.
Writing is free of almost
all punctuation, spelling,
and grammar errors.
Appropriate word
choice is used for an
academic setting.
Sentence structure is
clear.
References and
APA Formatting
None to two academic
references present or
reference formatting has
significant errors.
Three or more
academic references
are present but may
have a few errors in
formatting.
Three or more
academic references
are present and
formatted properly.
Running head: CYBER SECURITY1
CYBER SECURITY7
Emerging Cyber Security Threats
Name: Supriya Mutyala
Literature review
Papers for Cyber Security research
1. Abomhara, M. (2015). Cyber security and the internet of
things: vulnerabilities, threats, intruders and attacks. Journal of
Cyber Security and Mobility, 4(1), 65-88.
The article provides a lot of information about cyber security
attacks and it also shows enough evidence that is relevant for
the research and to give examples. This article can be bought
online or its html version can be accessed for free.
2. Sutton, D. (2017). Cyber Security : A Practitioner’s Guide.
BCS, The Chartered Institute for IT.
This book covers the various types of cyber threat and explains
what you can do to mitigate these risks and keep your data
secure. The book can be found online and can also be
downloaded as a PDF version.
3. Ďulík, M., & Ďulík jr., M. (2019). Cyber Security Challenges
in Future Military Battlefield Information Networks. Advances
in Military Technology, 14(2), 263–277.
This paper is relevant for this research because it deals with
complex threats to military cyberspace, in which primarily
wireless channels may be easily available by the enemy.
Employed sub-networks may have different properties. For the
research the paper points out at the importance of maximum
security
4. Svilicic, B., Rudan, I., Frančić, V., & Doričić, M. (2019).
Shipboard ECDIS Cyber Security: Third-Party Component
Threats. Scientific Journal of Maritime Research, 33(2), 176–
180.
The analysis is based on the cyber security testing of the
shipboard ECDIS using an industry vulnerability scanner. This
analysis is relevant because it provides areas of weakness in
cyber security. In this research this analysis helps to point out
the areas of weakness in cyber security. The paper can be
purchased online or accessed as a PDF.
5. Fuller, C. J. (2019). The Roots of the United States’ Cyber
(In)Security. Diplomatic History, 43(1), 157–185.
This paper is relevant because it shows the vulnerability of
computer networks to cyber-attacks exposed the security flaws
across the computer networks of the U.S. Department of
Defense. This paper adds more information on the
vulnerabilities that exist in the US security computers. The
paper can be found at EBSCO.
6. Svilicic, B., Brčić, D., Žuškin, S., & Kalebić, D. (2019).
Raising Awareness on Cyber Security of ECDIS. TransNav:
International Journal on Marine Navigation & Safety of Sea
Transportation, 13(1), 231–236.
In this paper, it is estimated ECDIS cyber security in order to
study the origin of ECDIS cyber security risks. This paper
comes in to help in the finding of solutions to the cyber-attacks
and raise awareness. The paper can be found at the EBSCO site.
7. KOVÁCS L. Cyber Security Policy and Strategy in the
European Union and Nato. Revista Academiei Fortelor Terestre.
2018;23(1):16-24.
The paper is relevant for this research because it discusses the
cyber security of infrastructures such as water systems which
are present in public utilities, economic life, public
administration, defence sector or even in the smallest detail of
everyday life. The paper can be found at the EBSCO site.
8. Fielding, J. (2020). The people problem: how cyber security’s
weakest link can become a formidable asset. Computer Fraud &
Security, 2020(1), 6–9.
The paper discusses how technological changes that have come
with lifestyle shift have increased threats. Insider threat has
increased as working practices have evolved and new
technologies. The paper can be accessed online as a html
version or PDF
9. Kerner, S. M. (2019). Why Trust Is Key for Cyber-Security
Risk Management. EWeek, N.PAG.
This paper outlines the intersection of identity, risk and trust
and how his firm is bringing them together to help improve
security outcomes. It can be found at EBSCO site.
10. Osborn, E., & Simpson, A. (2018). Risk and the Small-Scale
Cyber Security Decision Making Dialogue--a UK Case Study.
Computer Journal, 61(4), 472–495
This paper discusses results from a survey that considered (in
part) cyber security decisions made by SSITUs. For the research
this paper can reveal threats and help in finding solutions.
11. Kerner, S. M. (2019). How Superforecasting Can Help
Improve Cyber-Security Risk Assessment. EWeek, N.PAG.
This paper outlines an advanced approach to help organizations
go beyond basic methods for evaluating and reporting on risk.
This resource can be accessed at the EBSCO site.
12. Quigley, K., & Roy, J. (2012). Cyber-Security and Risk
Management in an Interoperable World: An Examination of
Governmental Action in North America. Social Science
Computer Review, 30(1), 83–94
This article deploys an anthropological understanding of risk in
order to examine public sector action and capacity with respect
to the multidimensional challenge of cyber-security and
suggests some solutions. This paper can be accessed online for
free.
13. Falco, G., Eling, M., Jablanski, D., Weber, M., Miller, V.,
Gordon, L. A., Shaun Shuxun Wang, Schmit, J., Thomas, R.,
Elvedi, M., Maillart, T., Donavan, E., Dejung, S., Durand, E.,
Nutter, F., Scheffer, U., Arazi, G., Ohana, G., & Lin, H. (2019).
Cyber risk research impeded by disciplinary barriers. Science,
366(6469), 1066–1069
The article reports on Cyber risk research impeded by
disciplinary barriers and explores how security progress
requires cross-disciplinary collaboration. The paper can be
accessed at the EBSCO site.
14. Siegel, C. A., Sagalow, T. R., & Serritella, P. (2002).
Cyber-Risk Management: Technical and Insurance Controls for
Enterprise-Level Security. Information Systems Security, 11(4),
33.
This paper presents a risk management approach to the security
of information technology systems in the enterprise. The paper
can be accessed at the EBSCO site.
15. Yin, X. C., Liu, Z. G., Nkenyereye, L., & Ndibanje, B.
(2019). Toward an Applied Cyber Security
Solution
in IoT-Based Smart Grids: An Intrusion Detection System
Approach. Sensors (14248220), 19(22), 4952.
The paper presents an innovative approach for a Cybersecurity

More Related Content

Similar to Due Date 1159 p.m. EST, Sunday of Unit 7 Points 10.docx

1 IDS 403 Final Project Part Two Guidelines and Rubric
1 IDS 403 Final Project Part Two Guidelines and Rubric 1 IDS 403 Final Project Part Two Guidelines and Rubric
1 IDS 403 Final Project Part Two Guidelines and Rubric
AbbyWhyte974
 
C aptitude book
C aptitude bookC aptitude book
C aptitude book
MadipadigaYashwanth
 
ASSIGNMENT 2 - Research Proposal Weighting 30 tow.docx
ASSIGNMENT 2 - Research Proposal    Weighting 30 tow.docxASSIGNMENT 2 - Research Proposal    Weighting 30 tow.docx
ASSIGNMENT 2 - Research Proposal Weighting 30 tow.docx
sherni1
 
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docxMultigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
ssuserf9c51d
 
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docxMultigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
rosemarybdodson23141
 
Anatomy Of A Paper
Anatomy Of A PaperAnatomy Of A Paper
Anatomy Of A Paper
Hend Al-Khalifa
 
Spr21 syllabus davidson
Spr21 syllabus davidsonSpr21 syllabus davidson
Spr21 syllabus davidson
NeilDavidson14
 
MNG81001 MANAGEMENT COMMUNICATIONAssessment 2PERSUASIVE MEMO.docx
MNG81001 MANAGEMENT COMMUNICATIONAssessment 2PERSUASIVE MEMO.docxMNG81001 MANAGEMENT COMMUNICATIONAssessment 2PERSUASIVE MEMO.docx
MNG81001 MANAGEMENT COMMUNICATIONAssessment 2PERSUASIVE MEMO.docx
raju957290
 
Issues in the Global EconomyLearning Outc.docx
Issues in the Global EconomyLearning Outc.docxIssues in the Global EconomyLearning Outc.docx
Issues in the Global EconomyLearning Outc.docx
christiandean12115
 
ENGL317 Syllabus Fall 2020
ENGL317 Syllabus Fall 2020ENGL317 Syllabus Fall 2020
ENGL317 Syllabus Fall 2020
TobiasWray
 
6062 comp cwk2 17 18 new template
6062 comp cwk2 17 18 new template6062 comp cwk2 17 18 new template
6062 comp cwk2 17 18 new template
Elliot Byrne
 
Writers Workshop RubricPeer Conference Form for Persuasive Essa.docx
Writers Workshop RubricPeer Conference Form for Persuasive Essa.docxWriters Workshop RubricPeer Conference Form for Persuasive Essa.docx
Writers Workshop RubricPeer Conference Form for Persuasive Essa.docx
annetnash8266
 
CIS 5681 Research ProjectBig Data Solution for Businesses
CIS 5681 Research ProjectBig Data Solution for BusinessesCIS 5681 Research ProjectBig Data Solution for Businesses
CIS 5681 Research ProjectBig Data Solution for Businesses
VinaOconner450
 
Eng 317 Syllabus Summer 2021
Eng 317 Syllabus Summer 2021Eng 317 Syllabus Summer 2021
Eng 317 Syllabus Summer 2021
Victoria Arthur
 
Eng 317H Syllabus
Eng 317H SyllabusEng 317H Syllabus
Eng 317H Syllabus
Victoria Arthur
 
SPE ESUT TECHNICAL SERIES BY DR. AUSTIN.pptx
SPE ESUT TECHNICAL SERIES BY DR. AUSTIN.pptxSPE ESUT TECHNICAL SERIES BY DR. AUSTIN.pptx
SPE ESUT TECHNICAL SERIES BY DR. AUSTIN.pptx
SPEESUTChapter
 
English317 syllabus-schab-2017-spring
English317 syllabus-schab-2017-springEnglish317 syllabus-schab-2017-spring
English317 syllabus-schab-2017-spring
Batchseven Hotsauce
 
Technology and Project Management (MGMT7020)Assignment 1 Speci.docx
Technology and Project Management (MGMT7020)Assignment 1 Speci.docxTechnology and Project Management (MGMT7020)Assignment 1 Speci.docx
Technology and Project Management (MGMT7020)Assignment 1 Speci.docx
bradburgess22840
 
Mjg storyboard 1712
Mjg storyboard 1712Mjg storyboard 1712
Mjg storyboard 1712
Gerry Mc Cann Cleary
 
Engl317 04,05,08 syllabus
Engl317 04,05,08 syllabusEngl317 04,05,08 syllabus
Engl317 04,05,08 syllabus
Stephanie Hamilton
 

Similar to Due Date 1159 p.m. EST, Sunday of Unit 7 Points 10.docx (20)

1 IDS 403 Final Project Part Two Guidelines and Rubric
1 IDS 403 Final Project Part Two Guidelines and Rubric 1 IDS 403 Final Project Part Two Guidelines and Rubric
1 IDS 403 Final Project Part Two Guidelines and Rubric
 
C aptitude book
C aptitude bookC aptitude book
C aptitude book
 
ASSIGNMENT 2 - Research Proposal Weighting 30 tow.docx
ASSIGNMENT 2 - Research Proposal    Weighting 30 tow.docxASSIGNMENT 2 - Research Proposal    Weighting 30 tow.docx
ASSIGNMENT 2 - Research Proposal Weighting 30 tow.docx
 
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docxMultigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
 
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docxMultigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
Multigenre ProjectEN101O Fall 2019 Dr. WalterA Multigenre Pr.docx
 
Anatomy Of A Paper
Anatomy Of A PaperAnatomy Of A Paper
Anatomy Of A Paper
 
Spr21 syllabus davidson
Spr21 syllabus davidsonSpr21 syllabus davidson
Spr21 syllabus davidson
 
MNG81001 MANAGEMENT COMMUNICATIONAssessment 2PERSUASIVE MEMO.docx
MNG81001 MANAGEMENT COMMUNICATIONAssessment 2PERSUASIVE MEMO.docxMNG81001 MANAGEMENT COMMUNICATIONAssessment 2PERSUASIVE MEMO.docx
MNG81001 MANAGEMENT COMMUNICATIONAssessment 2PERSUASIVE MEMO.docx
 
Issues in the Global EconomyLearning Outc.docx
Issues in the Global EconomyLearning Outc.docxIssues in the Global EconomyLearning Outc.docx
Issues in the Global EconomyLearning Outc.docx
 
ENGL317 Syllabus Fall 2020
ENGL317 Syllabus Fall 2020ENGL317 Syllabus Fall 2020
ENGL317 Syllabus Fall 2020
 
6062 comp cwk2 17 18 new template
6062 comp cwk2 17 18 new template6062 comp cwk2 17 18 new template
6062 comp cwk2 17 18 new template
 
Writers Workshop RubricPeer Conference Form for Persuasive Essa.docx
Writers Workshop RubricPeer Conference Form for Persuasive Essa.docxWriters Workshop RubricPeer Conference Form for Persuasive Essa.docx
Writers Workshop RubricPeer Conference Form for Persuasive Essa.docx
 
CIS 5681 Research ProjectBig Data Solution for Businesses
CIS 5681 Research ProjectBig Data Solution for BusinessesCIS 5681 Research ProjectBig Data Solution for Businesses
CIS 5681 Research ProjectBig Data Solution for Businesses
 
Eng 317 Syllabus Summer 2021
Eng 317 Syllabus Summer 2021Eng 317 Syllabus Summer 2021
Eng 317 Syllabus Summer 2021
 
Eng 317H Syllabus
Eng 317H SyllabusEng 317H Syllabus
Eng 317H Syllabus
 
SPE ESUT TECHNICAL SERIES BY DR. AUSTIN.pptx
SPE ESUT TECHNICAL SERIES BY DR. AUSTIN.pptxSPE ESUT TECHNICAL SERIES BY DR. AUSTIN.pptx
SPE ESUT TECHNICAL SERIES BY DR. AUSTIN.pptx
 
English317 syllabus-schab-2017-spring
English317 syllabus-schab-2017-springEnglish317 syllabus-schab-2017-spring
English317 syllabus-schab-2017-spring
 
Technology and Project Management (MGMT7020)Assignment 1 Speci.docx
Technology and Project Management (MGMT7020)Assignment 1 Speci.docxTechnology and Project Management (MGMT7020)Assignment 1 Speci.docx
Technology and Project Management (MGMT7020)Assignment 1 Speci.docx
 
Mjg storyboard 1712
Mjg storyboard 1712Mjg storyboard 1712
Mjg storyboard 1712
 
Engl317 04,05,08 syllabus
Engl317 04,05,08 syllabusEngl317 04,05,08 syllabus
Engl317 04,05,08 syllabus
 

More from gertrudebellgrove

-I am unable to accept emailed exams or late exams. No exception.docx
-I am unable to accept emailed exams or late exams. No exception.docx-I am unable to accept emailed exams or late exams. No exception.docx
-I am unable to accept emailed exams or late exams. No exception.docx
gertrudebellgrove
 
-delineate characteristics, prevalence of  exceptionality-evalua.docx
-delineate characteristics, prevalence of  exceptionality-evalua.docx-delineate characteristics, prevalence of  exceptionality-evalua.docx
-delineate characteristics, prevalence of  exceptionality-evalua.docx
gertrudebellgrove
 
-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx
-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx
-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx
gertrudebellgrove
 
-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx
-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx
-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx
gertrudebellgrove
 
- write one 5-7 page paper about All forms of Euthanasia are moral..docx
- write one 5-7 page paper about All forms of Euthanasia are moral..docx- write one 5-7 page paper about All forms of Euthanasia are moral..docx
- write one 5-7 page paper about All forms of Euthanasia are moral..docx
gertrudebellgrove
 
-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx
-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx
-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx
gertrudebellgrove
 
. 1. Rutter and Sroufe identified _____________ as one of three impo.docx
. 1. Rutter and Sroufe identified _____________ as one of three impo.docx. 1. Rutter and Sroufe identified _____________ as one of three impo.docx
. 1. Rutter and Sroufe identified _____________ as one of three impo.docx
gertrudebellgrove
 
-Prior to the Civil War, how did the (dominant) discourse over the U.docx
-Prior to the Civil War, how did the (dominant) discourse over the U.docx-Prior to the Civil War, how did the (dominant) discourse over the U.docx
-Prior to the Civil War, how did the (dominant) discourse over the U.docx
gertrudebellgrove
 
- Using the definition Awareness of sensation and perception to ex.docx
- Using the definition Awareness of sensation and perception to ex.docx- Using the definition Awareness of sensation and perception to ex.docx
- Using the definition Awareness of sensation and perception to ex.docx
gertrudebellgrove
 
- should include an introduction to the environmental issue and its .docx
- should include an introduction to the environmental issue and its .docx- should include an introduction to the environmental issue and its .docx
- should include an introduction to the environmental issue and its .docx
gertrudebellgrove
 
- FIRST EXAM SPRING 20201. Describe how the view of operations.docx
- FIRST EXAM SPRING 20201. Describe how the view of operations.docx- FIRST EXAM SPRING 20201. Describe how the view of operations.docx
- FIRST EXAM SPRING 20201. Describe how the view of operations.docx
gertrudebellgrove
 
- Considering the concepts, examples and learning from the v.docx
- Considering the concepts, examples and learning from the v.docx- Considering the concepts, examples and learning from the v.docx
- Considering the concepts, examples and learning from the v.docx
gertrudebellgrove
 
- Discuss why a computer incident response team (CIRT) plan is neede.docx
- Discuss why a computer incident response team (CIRT) plan is neede.docx- Discuss why a computer incident response team (CIRT) plan is neede.docx
- Discuss why a computer incident response team (CIRT) plan is neede.docx
gertrudebellgrove
 
- Discuss why a computer incident response team (CIRT) plan is n.docx
- Discuss why a computer incident response team (CIRT) plan is n.docx- Discuss why a computer incident response team (CIRT) plan is n.docx
- Discuss why a computer incident response team (CIRT) plan is n.docx
gertrudebellgrove
 
- 2 -Section CPlease write your essay in the blue book.docx
- 2 -Section CPlease write your essay in the blue book.docx- 2 -Section CPlease write your essay in the blue book.docx
- 2 -Section CPlease write your essay in the blue book.docx
gertrudebellgrove
 
- Confidence intervals for a population mean, standard deviation kno.docx
- Confidence intervals for a population mean, standard deviation kno.docx- Confidence intervals for a population mean, standard deviation kno.docx
- Confidence intervals for a population mean, standard deviation kno.docx
gertrudebellgrove
 
) Create a new thread. As indicated above, select  two tools describ.docx
) Create a new thread. As indicated above, select  two tools describ.docx) Create a new thread. As indicated above, select  two tools describ.docx
) Create a new thread. As indicated above, select  two tools describ.docx
gertrudebellgrove
 
(Write 3 to 4 sentences per question)  1. Describe one way y.docx
(Write 3 to 4 sentences per question)  1. Describe one way y.docx(Write 3 to 4 sentences per question)  1. Describe one way y.docx
(Write 3 to 4 sentences per question)  1. Describe one way y.docx
gertrudebellgrove
 
( America and Venezuela) this is a ppt. groups assignment. Below is .docx
( America and Venezuela) this is a ppt. groups assignment. Below is .docx( America and Venezuela) this is a ppt. groups assignment. Below is .docx
( America and Venezuela) this is a ppt. groups assignment. Below is .docx
gertrudebellgrove
 
++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx
++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx
++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx
gertrudebellgrove
 

More from gertrudebellgrove (20)

-I am unable to accept emailed exams or late exams. No exception.docx
-I am unable to accept emailed exams or late exams. No exception.docx-I am unable to accept emailed exams or late exams. No exception.docx
-I am unable to accept emailed exams or late exams. No exception.docx
 
-delineate characteristics, prevalence of  exceptionality-evalua.docx
-delineate characteristics, prevalence of  exceptionality-evalua.docx-delineate characteristics, prevalence of  exceptionality-evalua.docx
-delineate characteristics, prevalence of  exceptionality-evalua.docx
 
-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx
-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx
-1st play name is READY STEADY YETI GO-2nd play name is INTO .docx
 
-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx
-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx
-6th-Edition-Template-without-Abstract.dotWhat are Heuristics .docx
 
- write one 5-7 page paper about All forms of Euthanasia are moral..docx
- write one 5-7 page paper about All forms of Euthanasia are moral..docx- write one 5-7 page paper about All forms of Euthanasia are moral..docx
- write one 5-7 page paper about All forms of Euthanasia are moral..docx
 
-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx
-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx
-1st Play name is BERNHARDTHAMLET -2nd Play name is READY ST.docx
 
. 1. Rutter and Sroufe identified _____________ as one of three impo.docx
. 1. Rutter and Sroufe identified _____________ as one of three impo.docx. 1. Rutter and Sroufe identified _____________ as one of three impo.docx
. 1. Rutter and Sroufe identified _____________ as one of three impo.docx
 
-Prior to the Civil War, how did the (dominant) discourse over the U.docx
-Prior to the Civil War, how did the (dominant) discourse over the U.docx-Prior to the Civil War, how did the (dominant) discourse over the U.docx
-Prior to the Civil War, how did the (dominant) discourse over the U.docx
 
- Using the definition Awareness of sensation and perception to ex.docx
- Using the definition Awareness of sensation and perception to ex.docx- Using the definition Awareness of sensation and perception to ex.docx
- Using the definition Awareness of sensation and perception to ex.docx
 
- should include an introduction to the environmental issue and its .docx
- should include an introduction to the environmental issue and its .docx- should include an introduction to the environmental issue and its .docx
- should include an introduction to the environmental issue and its .docx
 
- FIRST EXAM SPRING 20201. Describe how the view of operations.docx
- FIRST EXAM SPRING 20201. Describe how the view of operations.docx- FIRST EXAM SPRING 20201. Describe how the view of operations.docx
- FIRST EXAM SPRING 20201. Describe how the view of operations.docx
 
- Considering the concepts, examples and learning from the v.docx
- Considering the concepts, examples and learning from the v.docx- Considering the concepts, examples and learning from the v.docx
- Considering the concepts, examples and learning from the v.docx
 
- Discuss why a computer incident response team (CIRT) plan is neede.docx
- Discuss why a computer incident response team (CIRT) plan is neede.docx- Discuss why a computer incident response team (CIRT) plan is neede.docx
- Discuss why a computer incident response team (CIRT) plan is neede.docx
 
- Discuss why a computer incident response team (CIRT) plan is n.docx
- Discuss why a computer incident response team (CIRT) plan is n.docx- Discuss why a computer incident response team (CIRT) plan is n.docx
- Discuss why a computer incident response team (CIRT) plan is n.docx
 
- 2 -Section CPlease write your essay in the blue book.docx
- 2 -Section CPlease write your essay in the blue book.docx- 2 -Section CPlease write your essay in the blue book.docx
- 2 -Section CPlease write your essay in the blue book.docx
 
- Confidence intervals for a population mean, standard deviation kno.docx
- Confidence intervals for a population mean, standard deviation kno.docx- Confidence intervals for a population mean, standard deviation kno.docx
- Confidence intervals for a population mean, standard deviation kno.docx
 
) Create a new thread. As indicated above, select  two tools describ.docx
) Create a new thread. As indicated above, select  two tools describ.docx) Create a new thread. As indicated above, select  two tools describ.docx
) Create a new thread. As indicated above, select  two tools describ.docx
 
(Write 3 to 4 sentences per question)  1. Describe one way y.docx
(Write 3 to 4 sentences per question)  1. Describe one way y.docx(Write 3 to 4 sentences per question)  1. Describe one way y.docx
(Write 3 to 4 sentences per question)  1. Describe one way y.docx
 
( America and Venezuela) this is a ppt. groups assignment. Below is .docx
( America and Venezuela) this is a ppt. groups assignment. Below is .docx( America and Venezuela) this is a ppt. groups assignment. Below is .docx
( America and Venezuela) this is a ppt. groups assignment. Below is .docx
 
++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx
++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx
++ 2 PAGES++Topic Make a bill to legalize all felon has the rig.docx
 

Recently uploaded

Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 

Due Date 1159 p.m. EST, Sunday of Unit 7 Points 10.docx

  • 1. Due Date: 11:59 p.m. EST, Sunday of Unit 7 Points: 100 Overview: Congratulations on your new position, Director of Corporate Training! This is such an exciting time for you to put your training and development knowledge to work and hit the ground running. You have just received an email from your boss with the details of your first project: Good morning! We are thrilled to have you take the lead of our corporate training program. The first project we have for you is to create a standardized training program that you will present to your new staff in the form of a PowerPoint presentation. Essentially, I need you to train the Trainers. There is more information about what is required below. Please be sure to complete the Notes section of each slide in PowerPoint with a robust and meaningful narrative, and remember to use relevant sources of information to support your training program design. I will need this project
  • 2. completed in 7 weeks. Thank you! Instructions: • Your project will include the topics listed below. Address each topic providing evidence as to why each is important to training program design: o Curriculum road map to show the overall training program and sequence. o Top five (5) KSA’s of your training staff. o Competency Model based off of those KSA’s. o Essential considerations for choosing trainers. o Conducting a Needs Analysis. o Selecting and preparing a training site conducive to learning. o Learning theories used to guide training preparations and implementation. o Appropriate pre- and post-training activities for adult learners. o Levels of management in support of training. o Assessing a training program’s success. HRM308 – Training and Development Train-the-Trainer Program • The presentation will present the major findings of your research through the units. The final product should showcase the concepts you have learned throughout the course and an understanding of how the concepts
  • 3. are put into real-world applications. • Each slide should provide succinct points of the key information that you wish to convey. • Include a narrative for the slides in your presentation by using the Notes section in PowerPoint to narrate the information presented in each slide. Requirements: • All works should be written in proper APA format. • Include Title and Reference slides. • Include an Introduction and Conclusion. • Must consist of 12-15 slides, not including the required Title and Reference slides. • On your title slide, include the name for the project, your name, and date. • Use at least three (3) academic references to support your work. You may use your textbook, resources from the units, or peer-reviewed outside resources (Wikipedia is not considered an academic resource). Be sure to read the criteria by which your work will be evaluated before you write and
  • 4. again after you write. Evaluation Rubric for Train-the-Trainer Program CRITERIA Development Needed Proficient Exemplary (0-13 Points) (14-17 Points) (18-20 Points) Content Elements of the assignment are not addressed, poorly constructed, lacking critical thought, or difficult to evaluate. Slides generally address all elements of the assignment in a clear manner, showing evidence of critical thinking and research. Slides clearly address all elements of the assignment in a thorough and detailed manner. Critical thinking and research are apparent. Overall
  • 5. Organization Content is difficult to follow due to lack of logical structure or flow. Information flow is generally logical and easy to follow but may lack fluency. Information is presented in a logical and interesting sequence that is easy to follow. Topics flow smoothly from one to another with appropriate transitions. Narrative/Notes Section Narrative/notes are missing, weak, or difficult to evaluate. Narrative/notes are provided and mostly support the slide content. Robust and meaningful narrative/notes are
  • 6. provided to support the slide content. (0-6 Points) (7-8 Points) (9-10 Points) Professionalism Slides are unclear, overloaded, or lack a consistent design style. Slides and supporting notes are and presented in a generally consistent and effective design style, though there are some inconsistencies present. Slides and supporting notes are presented in a consistently professional and effective manner. Template design, fonts, and colors enhance the presentation. Preparation and Development Slides demonstrate frequent errors of layout or lack of attention to detail in preparation.
  • 7. Slides demonstrate general attention to detail in layout, titling, or use of images/tables/etc. Slides demonstrate consistent attention to detail in preparation. Information is presented in a relevant and original manner, with effective use of images/tables/etc. CRITERIA Development Needed Proficient Exemplary Clear and Professional Writing Writing is sometimes difficult to understand because of several errors in grammar, punctuation, and spelling. Word choice is sometimes inappropriate for an academic setting. Sentence structure is sometimes unclear.
  • 8. Writing is easy to understand despite minor errors in punctuation, spelling, and grammar. Appropriate word choice is used for an academic setting. Sentence structure is mostly clear. Writing is free of almost all punctuation, spelling, and grammar errors. Appropriate word choice is used for an academic setting. Sentence structure is clear. References and APA Formatting None to two academic references present or reference formatting has significant errors. Three or more academic references are present but may have a few errors in formatting.
  • 9. Three or more academic references are present and formatted properly. Running head: CYBER SECURITY1 CYBER SECURITY7 Emerging Cyber Security Threats Name: Supriya Mutyala Literature review Papers for Cyber Security research 1. Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88. The article provides a lot of information about cyber security attacks and it also shows enough evidence that is relevant for
  • 10. the research and to give examples. This article can be bought online or its html version can be accessed for free. 2. Sutton, D. (2017). Cyber Security : A Practitioner’s Guide. BCS, The Chartered Institute for IT. This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your data secure. The book can be found online and can also be downloaded as a PDF version. 3. Ďulík, M., & Ďulík jr., M. (2019). Cyber Security Challenges in Future Military Battlefield Information Networks. Advances in Military Technology, 14(2), 263–277. This paper is relevant for this research because it deals with complex threats to military cyberspace, in which primarily wireless channels may be easily available by the enemy. Employed sub-networks may have different properties. For the research the paper points out at the importance of maximum security 4. Svilicic, B., Rudan, I., Frančić, V., & Doričić, M. (2019). Shipboard ECDIS Cyber Security: Third-Party Component Threats. Scientific Journal of Maritime Research, 33(2), 176– 180. The analysis is based on the cyber security testing of the shipboard ECDIS using an industry vulnerability scanner. This analysis is relevant because it provides areas of weakness in cyber security. In this research this analysis helps to point out the areas of weakness in cyber security. The paper can be purchased online or accessed as a PDF. 5. Fuller, C. J. (2019). The Roots of the United States’ Cyber (In)Security. Diplomatic History, 43(1), 157–185. This paper is relevant because it shows the vulnerability of computer networks to cyber-attacks exposed the security flaws across the computer networks of the U.S. Department of Defense. This paper adds more information on the vulnerabilities that exist in the US security computers. The paper can be found at EBSCO. 6. Svilicic, B., Brčić, D., Žuškin, S., & Kalebić, D. (2019).
  • 11. Raising Awareness on Cyber Security of ECDIS. TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 13(1), 231–236. In this paper, it is estimated ECDIS cyber security in order to study the origin of ECDIS cyber security risks. This paper comes in to help in the finding of solutions to the cyber-attacks and raise awareness. The paper can be found at the EBSCO site. 7. KOVÁCS L. Cyber Security Policy and Strategy in the European Union and Nato. Revista Academiei Fortelor Terestre. 2018;23(1):16-24. The paper is relevant for this research because it discusses the cyber security of infrastructures such as water systems which are present in public utilities, economic life, public administration, defence sector or even in the smallest detail of everyday life. The paper can be found at the EBSCO site. 8. Fielding, J. (2020). The people problem: how cyber security’s weakest link can become a formidable asset. Computer Fraud & Security, 2020(1), 6–9. The paper discusses how technological changes that have come with lifestyle shift have increased threats. Insider threat has increased as working practices have evolved and new technologies. The paper can be accessed online as a html version or PDF 9. Kerner, S. M. (2019). Why Trust Is Key for Cyber-Security Risk Management. EWeek, N.PAG. This paper outlines the intersection of identity, risk and trust and how his firm is bringing them together to help improve security outcomes. It can be found at EBSCO site. 10. Osborn, E., & Simpson, A. (2018). Risk and the Small-Scale Cyber Security Decision Making Dialogue--a UK Case Study. Computer Journal, 61(4), 472–495 This paper discusses results from a survey that considered (in part) cyber security decisions made by SSITUs. For the research this paper can reveal threats and help in finding solutions. 11. Kerner, S. M. (2019). How Superforecasting Can Help Improve Cyber-Security Risk Assessment. EWeek, N.PAG.
  • 12. This paper outlines an advanced approach to help organizations go beyond basic methods for evaluating and reporting on risk. This resource can be accessed at the EBSCO site. 12. Quigley, K., & Roy, J. (2012). Cyber-Security and Risk Management in an Interoperable World: An Examination of Governmental Action in North America. Social Science Computer Review, 30(1), 83–94 This article deploys an anthropological understanding of risk in order to examine public sector action and capacity with respect to the multidimensional challenge of cyber-security and suggests some solutions. This paper can be accessed online for free. 13. Falco, G., Eling, M., Jablanski, D., Weber, M., Miller, V., Gordon, L. A., Shaun Shuxun Wang, Schmit, J., Thomas, R., Elvedi, M., Maillart, T., Donavan, E., Dejung, S., Durand, E., Nutter, F., Scheffer, U., Arazi, G., Ohana, G., & Lin, H. (2019). Cyber risk research impeded by disciplinary barriers. Science, 366(6469), 1066–1069 The article reports on Cyber risk research impeded by disciplinary barriers and explores how security progress requires cross-disciplinary collaboration. The paper can be accessed at the EBSCO site. 14. Siegel, C. A., Sagalow, T. R., & Serritella, P. (2002). Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security. Information Systems Security, 11(4), 33. This paper presents a risk management approach to the security of information technology systems in the enterprise. The paper can be accessed at the EBSCO site. 15. Yin, X. C., Liu, Z. G., Nkenyereye, L., & Ndibanje, B. (2019). Toward an Applied Cyber Security Solution
  • 13. in IoT-Based Smart Grids: An Intrusion Detection System Approach. Sensors (14248220), 19(22), 4952. The paper presents an innovative approach for a Cybersecurity