This document discusses common myths about Catholic indulgences. It begins by defining an indulgence as the remission before God of temporal punishment due to sins whose guilt has already been forgiven. It then addresses seven common myths: 1) Indulgences cannot buy someone out of hell; 2) They cannot be obtained for future sins; 3) They do not provide forgiveness but only reduce temporal punishment; 4) They were not invented to raise money but developed from sacramental theology; 5) They do not reduce time in purgatory by a set number of days; 6) They cannot literally be bought with money; and 7) Pope Pius V reformed indulgences to curb prior abuses involving money. The
Below are various theories and models that have been used and can ChantellPantoja184
Below are various theories and models that have been used and can be used in research (from Dr. Steve Brown)
Behavioral et. al.
Absorptive capacity Theory
Accountability Theory
Activity Theory
Adaptive Structuration Theory
Administrative Behavior Theory
Argumentation Theory
Asch Conformity
Behavioral Decision Model
Belief Action Outcome Framework
Chaos Theory
Cognitive Fit Theory
Cognitive Load Theory
Cognitive Behavioral Therapy
Classical Conditioning
Conditioned Emotional Response
Cognitive Dissonance
Cognitive “purposive” Behaviorism
Consequentialist Ethics
Critical Theory
Csíkszentmihályi’s Flow
Cultural Theory
Deontological Ethics
Diffusion of Innovations Theory
Dynamic Capabilities
Distributed Cognitions Theory
Embodied social presence theory
Equity theory
Evolutionary theory
Eysenck’s Theory
Expectancy-value theory
Expectation Confirmation Theory
False Memory Syndrome
Field Theory
Fishbein's Attitude
General Deterrence Theory
Gestalt Theory of Personality
General Strain theory
Goal Contagion Theory
Gompertz Model (based upon Social Conflict Theory)
Grounded Theory
Hermeneutics
Illusion of Control
Impression Management Theory
Information Processing Theory
Impression Management Theory
Information Asymmetry Theory
Information Security Management Theory
Institutional Theory
Integrated Systems Theory
Keller's Motivational Model
Language action perspective
Law of Effect
Law of Emotion
Learned Helplessness Theory
McClelland’s Needs Theory
Neutralization Theory
Operant Conditioning
Mitchel’s Personality theory
Prospect Theory
Protection Motivation Theory
Self Determination Theory
Self-Efficacy Theory
Social Action Theory
Social Conflict Theory
Social Cognitive Theory
Social Exchange Theory
Social Identity Theory
Social Influence Theory
Social Learning Theory
Socio Technical Systems Theory
Task Closure Theory
Technology Acceptance Model
Technology Threat Avoidance Theory
Theory of Contextualism
Theory of Contiguity
Theory of Equipotentiality
Theory of Planned Behavior
Theory of Protection Motivation
Theory of Reasoned Action
Theory of Planned Behavior
Trait Theory
Virtue Ethics
Unified theory of acceptance and use of technology (UTAUT)
Universal Law of Generalization
Non-Behavioral
Accountability obfuscation
Actor Network theory
Attack Tree and Vague Sets
Bayes Theorem
Bayesian Inference
Bayesian Belief Network
Bayesian Networks
Boundary Object Theory
Broadbent’s Filter Theory Model
Complexity Theory
Cooperative game theory
Conformity Theory
Critical Realism Theory
Customer Based Discrepancy Theory
Customer Focus Theory
Deferred Action Theory
Design Theory
Elaboration Likelihood Model
Fit-Viability Theory
Flow Theory
Game Theory
Garbage Can Theory
General Systems Theory
General Deterrence Theory
Hebbian Theory
Human Agency Theory
Information Warfare
Institutional theory
International Information Systems Theory
Internationalization Theory
Information Technology Portfolio
Knowledge Management
Noncooperative game theory
Organization Based Access C ...
The document discusses the need to transition from digital preservation projects to infrastructure by integrating preservation into the data production process. It outlines gaps between repositories and producer communities and suggests bridging these gaps by developing interoperable tools across production and preservation workflows, and embedding preservation awareness and skills into research training and practice. Building comprehensive digital preservation infrastructure requires considering both technical and social aspects across local, global, and disciplinary contexts.
This document discusses metadata, which is defined as data about data or accompanying information that accumulates around information resources through their creation, use, and sharing. Metadata helps organize and enable the machine-readability and interoperability of resources by establishing predictable structures like controlled vocabularies and standards. The document recommends intentional metadata creation for projects to enable services, reuse, transmission of resources, and gaining new insights. It briefly introduces several common metadata standards like Dublin Core, Cataloging Cultural Objects (CCO), and Darwin Core.
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...IJITE
Team work is an important training element of future software engineers. However, the evaluation of the
performance of collaboration among individuals is very subjective. Meanwhile, how to effectively
promote the collaboration in an academic setting is an even more challenging task. The lack of a common
standard or method for the assessment is a practical issue in software engineering projects. With the
rapid development of shared authoring environments, such as Wiki, more and more educational
institutions are studying the adaptability of such kind of collaborative platforms. In order to study the
applicability of adopting wiki-based shared authoring environments in software engineering education,
we have proposed three major research questions. By solving these problems, we try to answer some of
the most important questions in adopting shared authoring platforms in academic settings.
Cultivating Sustainable Software For ResearchNeil Chue Hong
Keynote given at the NSF Cyberinfrastructure Software and Sustainability Workshop, March 26th-27th 2009, Indianapolis.
Exploration of software sustainability based on experiences from UK.
Big data: Challenges, Practices and TechnologiesNavneet Randhawa
This document summarizes discussions from a workshop organized by the National Institute of Standards and Technology's (NIST) Big Data Public Working Group. The workshop included four panels that discussed: 1) the current state of big data technologies; 2) future trends in big data hardware, computing models, analytics and measurement; 3) methods for improving big data sharing and collaboration; and 4) security and privacy concerns with big data. The panels featured presentations on topics such as big data reference architectures, use cases, benchmarks, data consistency issues, and approaches for enabling secure big data applications while preserving privacy.
Below are various theories and models that have been used and can ChantellPantoja184
Below are various theories and models that have been used and can be used in research (from Dr. Steve Brown)
Behavioral et. al.
Absorptive capacity Theory
Accountability Theory
Activity Theory
Adaptive Structuration Theory
Administrative Behavior Theory
Argumentation Theory
Asch Conformity
Behavioral Decision Model
Belief Action Outcome Framework
Chaos Theory
Cognitive Fit Theory
Cognitive Load Theory
Cognitive Behavioral Therapy
Classical Conditioning
Conditioned Emotional Response
Cognitive Dissonance
Cognitive “purposive” Behaviorism
Consequentialist Ethics
Critical Theory
Csíkszentmihályi’s Flow
Cultural Theory
Deontological Ethics
Diffusion of Innovations Theory
Dynamic Capabilities
Distributed Cognitions Theory
Embodied social presence theory
Equity theory
Evolutionary theory
Eysenck’s Theory
Expectancy-value theory
Expectation Confirmation Theory
False Memory Syndrome
Field Theory
Fishbein's Attitude
General Deterrence Theory
Gestalt Theory of Personality
General Strain theory
Goal Contagion Theory
Gompertz Model (based upon Social Conflict Theory)
Grounded Theory
Hermeneutics
Illusion of Control
Impression Management Theory
Information Processing Theory
Impression Management Theory
Information Asymmetry Theory
Information Security Management Theory
Institutional Theory
Integrated Systems Theory
Keller's Motivational Model
Language action perspective
Law of Effect
Law of Emotion
Learned Helplessness Theory
McClelland’s Needs Theory
Neutralization Theory
Operant Conditioning
Mitchel’s Personality theory
Prospect Theory
Protection Motivation Theory
Self Determination Theory
Self-Efficacy Theory
Social Action Theory
Social Conflict Theory
Social Cognitive Theory
Social Exchange Theory
Social Identity Theory
Social Influence Theory
Social Learning Theory
Socio Technical Systems Theory
Task Closure Theory
Technology Acceptance Model
Technology Threat Avoidance Theory
Theory of Contextualism
Theory of Contiguity
Theory of Equipotentiality
Theory of Planned Behavior
Theory of Protection Motivation
Theory of Reasoned Action
Theory of Planned Behavior
Trait Theory
Virtue Ethics
Unified theory of acceptance and use of technology (UTAUT)
Universal Law of Generalization
Non-Behavioral
Accountability obfuscation
Actor Network theory
Attack Tree and Vague Sets
Bayes Theorem
Bayesian Inference
Bayesian Belief Network
Bayesian Networks
Boundary Object Theory
Broadbent’s Filter Theory Model
Complexity Theory
Cooperative game theory
Conformity Theory
Critical Realism Theory
Customer Based Discrepancy Theory
Customer Focus Theory
Deferred Action Theory
Design Theory
Elaboration Likelihood Model
Fit-Viability Theory
Flow Theory
Game Theory
Garbage Can Theory
General Systems Theory
General Deterrence Theory
Hebbian Theory
Human Agency Theory
Information Warfare
Institutional theory
International Information Systems Theory
Internationalization Theory
Information Technology Portfolio
Knowledge Management
Noncooperative game theory
Organization Based Access C ...
The document discusses the need to transition from digital preservation projects to infrastructure by integrating preservation into the data production process. It outlines gaps between repositories and producer communities and suggests bridging these gaps by developing interoperable tools across production and preservation workflows, and embedding preservation awareness and skills into research training and practice. Building comprehensive digital preservation infrastructure requires considering both technical and social aspects across local, global, and disciplinary contexts.
This document discusses metadata, which is defined as data about data or accompanying information that accumulates around information resources through their creation, use, and sharing. Metadata helps organize and enable the machine-readability and interoperability of resources by establishing predictable structures like controlled vocabularies and standards. The document recommends intentional metadata creation for projects to enable services, reuse, transmission of resources, and gaining new insights. It briefly introduces several common metadata standards like Dublin Core, Cataloging Cultural Objects (CCO), and Darwin Core.
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...IJITE
Team work is an important training element of future software engineers. However, the evaluation of the
performance of collaboration among individuals is very subjective. Meanwhile, how to effectively
promote the collaboration in an academic setting is an even more challenging task. The lack of a common
standard or method for the assessment is a practical issue in software engineering projects. With the
rapid development of shared authoring environments, such as Wiki, more and more educational
institutions are studying the adaptability of such kind of collaborative platforms. In order to study the
applicability of adopting wiki-based shared authoring environments in software engineering education,
we have proposed three major research questions. By solving these problems, we try to answer some of
the most important questions in adopting shared authoring platforms in academic settings.
Cultivating Sustainable Software For ResearchNeil Chue Hong
Keynote given at the NSF Cyberinfrastructure Software and Sustainability Workshop, March 26th-27th 2009, Indianapolis.
Exploration of software sustainability based on experiences from UK.
Big data: Challenges, Practices and TechnologiesNavneet Randhawa
This document summarizes discussions from a workshop organized by the National Institute of Standards and Technology's (NIST) Big Data Public Working Group. The workshop included four panels that discussed: 1) the current state of big data technologies; 2) future trends in big data hardware, computing models, analytics and measurement; 3) methods for improving big data sharing and collaboration; and 4) security and privacy concerns with big data. The panels featured presentations on topics such as big data reference architectures, use cases, benchmarks, data consistency issues, and approaches for enabling secure big data applications while preserving privacy.
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJECTawnaDelatorrejs
CAPSTONE PROJECT: LITERATURE REVIEW ASSIGNMENT 1
CAPSTONE PROJECT: LITERATURE REVIEW ASSIGNMENT 8
LITERATURE REVIEW ASSIGNMENT
Jerry L. Quarles
School of Engineering & Computer Science, Liberty University
Author Note
Jerry L. Quarles
I have no known conflict of interest to disclose.
Correspondence concerning this article should be addressed to Jerry L. Quarles.
Email: [email protected]
Table of Contents
Introduction 3
Problem Statement 5
Research Question(s) 8
Literature Review 9
Literature Review Findings and Gaps……………………………………………………………17
Conclusion 19
References 21
Appendix…..……………………………………………………………………………………..26
Error in red – not booked marked correctly
FAILED THIS ASSIGNMENT ALL THE WORK THAT IS MARKED THRU WAS PLAGARISM COPIED WORK!
Total word count needs to be 4000 words so you can use anything highlighted in yellow again to get a total of 4000 words!
Introduction
DO NOT USE MARKED THRU WORDS -Rapid advancements in modern technology have changed the digital landscape and increased the demand for secure internet and communication Technology and Cloud computing is one of them. Cloud computing has grown in popularity as a study and application field (Rashid, & Chaturvedi, 2019). A growing number of technology companies and manufacturing industries have started to implement cloud-based services or are planning to do so. Nonetheless, there are a few drawbacks to using public and or private cloud technologies. As a result, quite a few institutions are already using private cloud technologies. Day by day cloud computing is in growth as many organizations adopted cloud technology, but in parallel, several security issues are raised. Each organization chooses secure infrastructures when they move its data to remote locations. According to the NIST security, portability and interoperability are the major obstacles to the adoption of cloud computing.
Can Use Highlighted words
Our motivation for creating a new design of a hybrid architecture using key cloud technologies build a new private cloud platform for Amazon Inc. that requires high data availability at a low cost. Big data approaches relying on traditional data warehouses often pose latency problems, making them unsuitable for new data use cases (Hsu, Fox, and Min, 2019). Many cloud services are provided by a trusted third party which arises new security threats. The cloud provider provides its services through the Internet and uses many web technologies that arise new security issues. This paper discussed the basic features of cloud computing, security issues, threats, and their solutions. Additionally, the paper describes several key topics related to the cloud, namely cloud architecture framework, service and deployment model, cloud technologies, cloud security concepts, threats, and attacks.
When data is stored in remote storage, the cloud user loses control over the data, at this time consumers may not be conscious of the details of security policies, vulne ...
Step 1 Consider the Purpose for the ResearchYou have been given.docxwhitneyleman54422
Step 1: Consider the Purpose for the Research
You have been given your assignment. It is now time to think about the purpose of your research. You have written papers in your classes and done some research for work projects. This project requires that you review your previous work and construct a basic research plan. At the graduate level, your work will be expected to meet a higher level of cognitive objective, using analysis, synthesis, and supporting conclusions with facts. There are several elements in the project that your department head will want to see to ensure that your work is on the right track. For one, he may want to see your research question to ensure that you are looking for the right information. If you can develop a specific and focused research question, you will have a good start. Next, you will look to see what information is already out there, and if your question has already been answered. Using a scientific approach, you will create a working hypothesis that will present your findings and conclusions. Remember that your ultimate objective is to arrive at a reasonable, well-supported analysis of the impact of the issue on your industry. This can be the first step that leads to practical solutions for your organization’s issues.
Next, you will prepare to do your research.
Step 2: Prepare to Do Research
You already have your assignment and a purpose for your research. In this step you will prepare for the research. For more information, see Why Do We Do Research? on the Conducting Research page, also in Project 2.
Another reason to do research is to answer basic questions. While there are many times that you should research using a traditional library and peer-reviewed journals, there will be many questions that are answerable by targeted internet searches. These are valid skills for you to develop and they will serve you well in your professional life. So, get acquainted with the Google Search tools so that you have them at your fingertips.
To get some background on various Cybersecurity issues, read Critical Challenges in Cybersecurity.
In the next step, you will select an issue.Step 3: Choose an Issue
In the last step, you prepared for your research. Now it is time to focus on an issue. Choose an issue from your research on a trend in your industry that has potential for great impact on the field, and then draft a preliminary question. Next, do some preliminary reading to see if the question has already been answered, or if there is enough information on the topic. Refine your question and submit it to the “so what” test. Will your answer contribute to knowledge about the issue you have selected? Is the question answerable? Remember that in academic work you do not normally write normative or open-ended questions, which start with the words should or would.
In the next step, you will create a hypothesis.
Step 4: Craft a Hypothesis
You have selected an issue to research. Now it is time to craft a working hypothesis as.
Application and Methods of Deep Learning in IoTIJAEMSJORNAL
In this talk, we provide a comprehensive overview of how to use a subset of advanced AI techniques, most specifically Deep Learning (DL), to bolster analytics as well as learning in the IoT URL. First and foremost, we define a development environment that integrates big data designs with deep learning models to promote rapid experimentation. There are three main promises made in the proposal: To begin, it illustrates a big data engineering that facilitates big data assortment in the same way that businesses facilitate deep learning models. Then, the language for creating a data perspective is shown, one that transforms the many streams of large data into a format that can be used by an advanced learning system. Third, it demonstrates the success of the framework by applying the tool to a wide range of deep learning use cases. We provide a generalized basis for a variety of DL architectures using numerical examples. We also evaluate and summarize major published research projects that made use of DL in the IoT context. Wonderful Internet of Things gadgets that have integrated DL into their prior knowledge are often discussed.
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essaysorayan5ywschuit
HIT164 COMPUTING FUNDAMENTALS
Assignment 1: Research Essay
Due Date: Week 7, Friday 11: 59 pm
Length: 1500 words maximum (not including references)
Value: 20% of the total marks for the unit
TASKS
1. Research a few issues in use of IT in a discipline of current relevance. You may choose issues from any of the disciplines given in the following pages or a discipline of your choice.
2. Prepare an essay about your topic with no more than 1500 words (excluding reference list).
3. Your topic of choice must be posted to the Discussion Board titled “Post your essay topic here” by Week 3, Friday 5pm,
4. Note that if you have not posted a topic by this time, you may be assigned a topic by your lecturer.
REQUIREMENTS
· The assignment should be word-processed.
· It should include a reference list.
· Use Harvard referencing style.
· Do not include sources in the reference list that are not cited in the document.
· You need to use a minimum of 10 sources and there needs to be at least 3 different types (i.e., websites, book, journal article, etc.).
HIT164 Computing Fundamentals
TOPICS (CHOOSE ONE)
Option 1: Social Media
GeoCities is a web hosting service which employs the concept/metaphors of “cities” and “neighbourhood” in real-world. For example, computer-related sites are placed in “SiliconValley” and entertainment sites in “Hollywood”. GeoCities was the third-most visited website at its peak when it was acquired by Yahoo! in 1999.
10 years later as social media had taken over and become mainstream on the Internet, GeoCities was shutdown and
deleted. However, the Internet Archive team made a backup of the site just before it was shut down to preserve the effort put in by around 35 million people since it started. The resulting 650GB archive was published online as a remembrance of the glorious days of GeoCities.
Will current social media (i.e., Facebook) eventually face the same fate? Justify your arguments with robust supporting evidence.
Option 2: Li-Fi
Wi-Fi is a popular networking technology that allows electronic devices to connect to the Internet wirelessly using radio frequency. It can be commonly seen from mobile devices to government facility. However in recent years, researchers have found a way to utilise visible light from light-emitting diodes (LEDs) to transmit data: such technology is called Li-Fi (light fidelity).
Even though Li-Fi is still at its infancy, many universities and researchers are actively studying to reach its potential.
Compare Wi-Fi and Li-Fi critically and discuss the advantages and disadvantages of Li-Fi.
Option 3: Wearable Technology
Google Glass is one of the first and most talked about augmented reality wearable computers in 2013. Its usage varies from personal entertainment to surgical practise. Similar to other emerging technologies, Google Glass has also received quite a few negative critical receptions, such as privacy concern.
Critically discuss the pros and cons of ...
The document discusses big data testing using the Hadoop platform. It describes how Hadoop, along with technologies like HDFS, MapReduce, YARN, Pig, and Spark, provides tools for efficiently storing, processing, and analyzing large volumes of structured and unstructured data distributed across clusters of machines. These technologies allow organizations to leverage big data to gain valuable insights by enabling parallel computation of massive datasets.
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...ijseajournal
There has been tremendous growth in the field of AI and machine learning. The developments across these
fields have resulted in a considerable increase in other FinTech fields. Cyber security has been described
as an essential part of the developments associated with technology. Increased cyber security ensures that
people remain protected, and that data remains safe. New methods have been integrated into developing AI
that achieves cyber security. The data analysis capabilities of AI and its cyber security functions have
ensured that privacy has increased significantly. The ethical concept associated with data privacy has also
been advocated across most FinTech regulations. These concepts and considerations have all been
engaged with the need to achieve the required ethical requirements. The concept of federated learning is a
recently developed measure that achieves the abovementioned concept. It ensured the development of AI
and machine learning while keeping privacy in data analysis. The research paper effectively describes the
issue of federated learning for confidentiality. It describes the overall process associated with its
development and some of the contributions it has achieved. The widespread application of federated
learning in FinTech is showcased, and why federated learning is essential for overall growth in FinTech.
IEEE augmented reality learning experience model (ARLEM)fridolin.wild
The document discusses the development of a standard called ARLEM (Augmented Reality Learning Experience Models) for defining augmented reality learning experiences. It begins with an introduction to ARLEM's purpose of providing interoperability for AR learning content and experiences. Then it provides several example use cases for AR learning in areas like job training, healthcare, remote tutoring and more. It proposes using an activity modeling language and workplace modeling language to define AR learning activities and the environments in which they are set. It provides an example of how to define an initial activity using XML tags to specify attributes, instructions, triggers and the flow between action steps. The goal is for ARLEM to allow learning experiences to be shared and built upon across different technologies and platforms
Recommender System in light of Big DataKhadija Atiya
This document summarizes a research paper that investigates using singular value decomposition (SVD) to address challenges faced by recommender systems in light of big data. It discusses how collaborative filtering recommender systems are impacted by issues like scalability, sparsity, and cold starts with large datasets. The document then provides background on SVD and how it can be applied to collaborative filtering as a model-based approach. It describes an implementation of SVD-based recommender system using Apache Hadoop and Spark on a large dataset to validate its applicability for big data and evaluate the tools. The results showed SVD approach provides comparable performance to previous experiments on smaller datasets.
A Framework for Geospatial Web Services for Public Health by Dr. Leslie LenertWansoo Im
A Framework for Geospatial Web Services for Public Health
by Leslie Lenert, MD, MS, FACMI, Director
National Center for Public Health Informatics, CCHIS, CDC
June 8 2009 URISA Public Health Conference
uploaded by Wansoo Im, Ph.D.
URISA Membership Committee Chair
http://www.gisinpublichealth.org
DevOps Support for an Ethical Software Development Life Cycle (SDLC)Mark Underwood
As part of the IEEE SA P7000 and P2675 working groups, it has been determined that DevOps engineering practices can support (or hinder) the environment for an ethical software development life cycle (SDLC). This deck scratches the surface.
This document summarizes a systematic review of challenges and recommendations for improving the usability and accessibility of virtual reality systems for cultural heritage practices. The review identified 45 challenges that were mapped into five categories: system design, development process, technology, assessment process, and knowledge transfer. Based on the identified challenges, 58 recommendations were proposed across three groups: discovery and planning, design and development, and assessment factors. Key challenges included limitations in navigating virtual spaces, non-ideal navigation controls, and issues affecting the user experience like rendering delays. The document aims to provide guidance for future research on applying, developing, and evaluating virtual reality for digital cultural heritage.
This document summarizes a systematic review of challenges and recommendations for improving the usability and accessibility of virtual reality systems for cultural heritage practices. The review identified 45 challenges that were mapped into five categories: system design, development process, technology, assessment process, and knowledge transfer. Based on the identified challenges, 58 recommendations were proposed across three groups: discovery and planning, design and development, and assessment factors. Key challenges included limitations in navigating virtual spaces, non-ideal navigation controls, and issues affecting the user experience like rendering delays. The document aims to provide guidance for future research on applying, developing, and evaluating virtual reality for digital cultural heritage.
Machine and deep learning techniques for detecting internet protocol version ...IJECEIAES
This document provides a review of machine and deep learning techniques for detecting internet protocol version six (IPv6) attacks, specifically distributed denial of service (DDoS) attacks. It begins with an introduction on the growth of IPv6 usage and its vulnerabilities. It then compares this review to previous related works and provides overviews of IPv6, DDoS attacks, and intrusion detection systems. The review discusses machine learning techniques including naive Bayes, decision trees, and neural networks that have been used in intrusion detection systems. It also discusses deep learning techniques and provides a qualitative comparison of machine and deep learning approaches.
Pistoia Alliance Debates: Moving Research Informatics into the Cloud: 25th Ma...Pistoia Alliance
This document summarizes a webinar on moving research informatics to the cloud. It introduces four panelists from Elsevier, Accenture, Merck, and Google who discuss their experiences with cloud computing. They cover challenges around data management, the benefits of a cloud-based approach for data sharing and scalability, and how a platform strategy enabled by cloud infrastructure can help transform research processes over multiple years. The panelists describe case studies of migrating applications and databases to the cloud and discuss how a cloud-based platform can drive productivity and cost savings.
Research Paper TopicITS835 – Enterprise Risk Managemen.docxaudeleypearl
Research Paper Topic
ITS835 – Enterprise Risk Management
Dr. Jerry Alsay
University of the Cumberlands
Introduction
All research reports begin with an introduction. (1 – 2 Pages)
Background
Provide your reader with a broad base of understanding of the research topic. The goal is to give the reader an overview of the topic, and its context within the real world, research literature, and theory. (3 – 5 Pages)
Problem Statement
This section should clearly articulate how the study will relate to the current literature. This is done by describing findings from the research literature that define the gap. Should be very clear what the research problem is and why it should be solved. Provide a general/board problem and a specific problem (150 – 200 Words)
Literature Review
Using your annotated bibliography, construct a literature review. (3-5 pages)
Discussion
Provide a discussion about your specific topic findings. Using the literature, you found, how do you solve your problem? How does it affect your general/board problem?
References
Running Head: CLOUD COMPUTING AND DATA SECURITY1
Cloud Computing and Data Security
Naresh Rama
Professor Dr.Jerry Alsay
07/14/2019
Cloud Computing and Data Security
Introduction
In today's world, the movement of data is from a store that is severe and it is located centrally to the storage of cloud, services in the cloud offer the flexibility, scalability, and concerns that are proportionate that concerns the issue of security. Safety is an aspect that is important and it associated with the computing of cloud because information can be stored on the cloud by the users with the help of providers that works in the service of the cloud. In the security f data and computing of the cloud, there are some problems that are available. They include backups of data that is improper and inadequate that have caused organizations been among those that are vulnerable to threats that re-associated with security measures.
Data that is found in an organization and is stored in files that are encrypted are interfered by these threats. Problem found under these investigations is significant to this study and these show that the threats that emerge because of backups concerning data that is improper lead to an issue that is significant in the security of data in the computing cloud and also security concerning data.
The study tends to shows that security of data and computing of data leads to the provision of ways that helps in the protection of data that is private and also information that is classified away from such threats. That may include attacks in the cyber sector and losses that occur in case of disasters (Strategic Cyber Security, 2011). This study has limitations that state that assurance of security to the computing of cloud is not available and that there is no protection of data that is vital in an organization to a hundred percent.
Background
Hacke ...
The document discusses the need for an NIH Data Commons to address challenges with data sharing and storage. It describes how factors like increasing data volumes, availability of cloud technologies, and emphasis on FAIR data principles are driving the need for a centralized data platform. The proposed NIH Data Commons would provide findable, accessible, interoperable and reusable data through cloud-based services and tools. It would enable data-driven science by facilitating discovery, access and analysis of biomedical data across different sources. Plans are outlined to develop and test an initial Data Commons pilot using existing genomic and other biomedical datasets.
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxzmark3
response.pdf
response
by Abc Abc
Submission date: 14-May-2020 05:58AM (UTC-0400)
Submission ID: 1324028097
File name: response.docx (36.28K)
Word count: 355
Character count: 1780
0%
SIMILARITY INDEX
0%
INTERNET SOURCES
0%
PUBLICATIONS
0%
STUDENT PAPERS
Exclude quotes On
Exclude bibliography On
Exclude matches Off
response
ORIGINALITY REPORT
PRIMARY SOURCES
responseby Abc AbcresponseORIGINALITY REPORTPRIMARY SOURCES
response. d.docx
Running Head: RESPONSE
1
RESPONSE 2
Response
Name
Course
Date of Submission
Discussion 1
Hello, it was interesting to read your post. It is indeed true that honeypots are much expensive than the real security system. There exist several issues with honeypots and most of which make 'it hard for individuals to deal with them. One such issue is individuals' lack of familiarity with them, as you have stated in the post. The main objective of designing and using honeypots is for the attackers to make brute attacks on the system without being noticed by the administration. This is the reason why if a single honeypot gets into the system, it can end up being used to compromise the entire host system, as you have stated in your post. As you have stated in your post, a honeypot is highly relied upon when individuals are considering acquiring valuable intelligence from an organization but one that is still not the most sensitive. Some of the questions which arise with the usage of honeypots in such ventures are whether they can be used by forces to help counter-terrorism. In the age of technology, police are using the internet and its filtering capabilities to identify terrorists and how they conduct recruitment (Sharma & Kaul, 2018).
Discussion 2
Hello, it was interesting to read your post; it was informative. From your research, you have identified the primary objective of honeypot being diversion of assassins so as to extract critical information and data about them by following all the moves they make. This objective does not, however, acknowledge whether there are means of injecting honeypots to the assassins and whether they have measures of protecting their systems against such attempts. Honey pots have been noted to be effective at identifying potential assaults, as you have stated in your post. They are, however, not much effective as attacks still occur in their presence and can only identify a single attack at a time, as you have stated in the post.
References
Sharma, S., & Kaul, A. (2018). A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud. Vehicular Communications, 12, 138-164.
Discussion 1 :
Top of Form
Network separation is a standard network practice that has security architecture concepts that are implemented to secure the entire system. It uses various approaches such as.
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
From introducing new international standards to having an important role to play in several industries, computer science is one of the powerful subjects right now. You cannot guess a single area that does not need computer systems or efficient networking options. Because Technology and Computer Science go together for any field.
Stating this, there are a few core subjects inside computer science that are unpredictable in its future use. One such case is with computing technologies.
Visite : https://www.phdassistance.com/blog/
Contact Us:
UK NO: +44-1143520021
India No: +91-8754446690
Email: info@phdassistance.com
This document discusses mobile data analytics and big data analysis using cloud computing. It introduces how massive amounts of data are generated from mobile devices and networks. Big data analysis tools like Hadoop, Spark and Storm are described for processing large datasets. Challenges of mobile big data analytics include limited device resources and connectivity. The document discusses how cloud computing addresses these issues by providing scalable infrastructure and handling computation and storage remotely. It also covers security considerations for cloud-based mobile analytics.
This document proposes developing a competence-based model for securing the internet of things (IoT) in organizations. It aims to define the required set of organizational competences for IoT products and services regarding information security. The research will use a design science methodology to develop and empirically test a model of organizational competence for IoT security based on an existing model. This will help managers assess their competences against future requirements and properly align their IoT approaches regarding customer information security.
Your initial post should be 2-3 paragraphs in length.Inclu.docxdanhaley45372
Your initial post should be
2-3 paragraphs
in length.
Include one peer reviewed journal article to support your post. You can search for a journal article from Welder Library EResources. (Ex: Risk of social media or social media polices, etc.).
Your
initial post is due by Thursday
. This allows you and your classmates time to read and reply.
Make sure to demonstrate critical thinking and analysis by using research and personal work experiences.
For full credit, you are required to
respond
to a minimum of two classmates
. Please begin your reply by addressing the student by name. Your
responses
must be completed by Sunday at midnight
.
Please refer to the rubric for the grading requirements. You can view the rubric by clicking on the wheel in the upper right corner and selecting "show rubric."
Scott Lefor,
The release of information to the public – including through social media – can impact everything from a company’s image before the public to an individual’s image before a company. Jackson et al. (2020) note that while “strategic HR use of social media can build the employer’s reputation in the labor market and help HR professionals to reach candidates and current employees,” the use of social media can also “lead to the disclosure of trade secrets” or present a negative image of the company (p. 21). While companies place substantial hours and dollars into cultivating a favorable brand image before the public, a careless comment or complaint by an employee or contractor on social media can go viral and counteract such marketing efforts. In such cases, companies may find themselves forced to address such comments or complaints before the public in an attempt to save the brand image they have worked so hard to build.
In addition to impacting the image of a company, careless social media posts can also impact potential and current employees before the company. According to Melton and Miller (2015), while “most students appear to know that the content they post” on social media could be viewed negatively by “potential employers,” many students continue to do so (p. 678). Through social media, what would have been a careless comment if spoken aloud becomes a permanent statement viewable by countless individuals. Furthermore, comments and images referencing illegal activities or poor decision-making and communicating abilities become enshrined for potential and current employers to reference and base hiring and firing decisions upon.
It is worth noting that careless comments via social media can go beyond “negative,” and can sometimes involve trade secrets (as noted). While negative comments can cast a shadow over a company’s brand, comments revealing trade secrets can jeopardize long-term strategies, losing hard-won competitive edges. As referenced above, Melton and Miller (2015) assert that even though individuals know of such risks, many continue to post comments that can be understood to be “careless.”
In short, informa.
Your initial post should be made during Unit 2, January 21st at 4.docxdanhaley45372
Your initial post should be made during
Unit 2, January 21st at 4:00 pm.
Submissions after this time will not be accepted.
Please respond to the following questions:
In 6-7 sentences, compare and contrast one of the dance television shows referenced in this unit (try to choose a show that has not already been referenced by another student) to that of the American Dance Marathons, considering such questions as:
How does the socioeconomic and sociopolitical climate of the time affect how dance is presented and how the participants are treated/portrayed?
Discuss the Issue of exploitation, who was exploited, who did the exploiting, and how?
What aspects were theatre, and what aspects were real? How were these exaggerated?
What are the reinforced stereotypes present in the competitions?
Tell us about the idea that drama sells.
Use specific terminology and concepts discussed in class thus far. Make sure that you are citing all sources, or being clear that your statement is your idea/belief/observation.
.
More Related Content
Similar to Part 1My Discussion Please check with Ulrich’s Periodical Dir.docx
CAPSTONE PROJECT LITERATURE REVIEW ASSIGNMENT 1CAPSTONE PROJECTawnaDelatorrejs
CAPSTONE PROJECT: LITERATURE REVIEW ASSIGNMENT 1
CAPSTONE PROJECT: LITERATURE REVIEW ASSIGNMENT 8
LITERATURE REVIEW ASSIGNMENT
Jerry L. Quarles
School of Engineering & Computer Science, Liberty University
Author Note
Jerry L. Quarles
I have no known conflict of interest to disclose.
Correspondence concerning this article should be addressed to Jerry L. Quarles.
Email: [email protected]
Table of Contents
Introduction 3
Problem Statement 5
Research Question(s) 8
Literature Review 9
Literature Review Findings and Gaps……………………………………………………………17
Conclusion 19
References 21
Appendix…..……………………………………………………………………………………..26
Error in red – not booked marked correctly
FAILED THIS ASSIGNMENT ALL THE WORK THAT IS MARKED THRU WAS PLAGARISM COPIED WORK!
Total word count needs to be 4000 words so you can use anything highlighted in yellow again to get a total of 4000 words!
Introduction
DO NOT USE MARKED THRU WORDS -Rapid advancements in modern technology have changed the digital landscape and increased the demand for secure internet and communication Technology and Cloud computing is one of them. Cloud computing has grown in popularity as a study and application field (Rashid, & Chaturvedi, 2019). A growing number of technology companies and manufacturing industries have started to implement cloud-based services or are planning to do so. Nonetheless, there are a few drawbacks to using public and or private cloud technologies. As a result, quite a few institutions are already using private cloud technologies. Day by day cloud computing is in growth as many organizations adopted cloud technology, but in parallel, several security issues are raised. Each organization chooses secure infrastructures when they move its data to remote locations. According to the NIST security, portability and interoperability are the major obstacles to the adoption of cloud computing.
Can Use Highlighted words
Our motivation for creating a new design of a hybrid architecture using key cloud technologies build a new private cloud platform for Amazon Inc. that requires high data availability at a low cost. Big data approaches relying on traditional data warehouses often pose latency problems, making them unsuitable for new data use cases (Hsu, Fox, and Min, 2019). Many cloud services are provided by a trusted third party which arises new security threats. The cloud provider provides its services through the Internet and uses many web technologies that arise new security issues. This paper discussed the basic features of cloud computing, security issues, threats, and their solutions. Additionally, the paper describes several key topics related to the cloud, namely cloud architecture framework, service and deployment model, cloud technologies, cloud security concepts, threats, and attacks.
When data is stored in remote storage, the cloud user loses control over the data, at this time consumers may not be conscious of the details of security policies, vulne ...
Step 1 Consider the Purpose for the ResearchYou have been given.docxwhitneyleman54422
Step 1: Consider the Purpose for the Research
You have been given your assignment. It is now time to think about the purpose of your research. You have written papers in your classes and done some research for work projects. This project requires that you review your previous work and construct a basic research plan. At the graduate level, your work will be expected to meet a higher level of cognitive objective, using analysis, synthesis, and supporting conclusions with facts. There are several elements in the project that your department head will want to see to ensure that your work is on the right track. For one, he may want to see your research question to ensure that you are looking for the right information. If you can develop a specific and focused research question, you will have a good start. Next, you will look to see what information is already out there, and if your question has already been answered. Using a scientific approach, you will create a working hypothesis that will present your findings and conclusions. Remember that your ultimate objective is to arrive at a reasonable, well-supported analysis of the impact of the issue on your industry. This can be the first step that leads to practical solutions for your organization’s issues.
Next, you will prepare to do your research.
Step 2: Prepare to Do Research
You already have your assignment and a purpose for your research. In this step you will prepare for the research. For more information, see Why Do We Do Research? on the Conducting Research page, also in Project 2.
Another reason to do research is to answer basic questions. While there are many times that you should research using a traditional library and peer-reviewed journals, there will be many questions that are answerable by targeted internet searches. These are valid skills for you to develop and they will serve you well in your professional life. So, get acquainted with the Google Search tools so that you have them at your fingertips.
To get some background on various Cybersecurity issues, read Critical Challenges in Cybersecurity.
In the next step, you will select an issue.Step 3: Choose an Issue
In the last step, you prepared for your research. Now it is time to focus on an issue. Choose an issue from your research on a trend in your industry that has potential for great impact on the field, and then draft a preliminary question. Next, do some preliminary reading to see if the question has already been answered, or if there is enough information on the topic. Refine your question and submit it to the “so what” test. Will your answer contribute to knowledge about the issue you have selected? Is the question answerable? Remember that in academic work you do not normally write normative or open-ended questions, which start with the words should or would.
In the next step, you will create a hypothesis.
Step 4: Craft a Hypothesis
You have selected an issue to research. Now it is time to craft a working hypothesis as.
Application and Methods of Deep Learning in IoTIJAEMSJORNAL
In this talk, we provide a comprehensive overview of how to use a subset of advanced AI techniques, most specifically Deep Learning (DL), to bolster analytics as well as learning in the IoT URL. First and foremost, we define a development environment that integrates big data designs with deep learning models to promote rapid experimentation. There are three main promises made in the proposal: To begin, it illustrates a big data engineering that facilitates big data assortment in the same way that businesses facilitate deep learning models. Then, the language for creating a data perspective is shown, one that transforms the many streams of large data into a format that can be used by an advanced learning system. Third, it demonstrates the success of the framework by applying the tool to a wide range of deep learning use cases. We provide a generalized basis for a variety of DL architectures using numerical examples. We also evaluate and summarize major published research projects that made use of DL in the IoT context. Wonderful Internet of Things gadgets that have integrated DL into their prior knowledge are often discussed.
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essaysorayan5ywschuit
HIT164 COMPUTING FUNDAMENTALS
Assignment 1: Research Essay
Due Date: Week 7, Friday 11: 59 pm
Length: 1500 words maximum (not including references)
Value: 20% of the total marks for the unit
TASKS
1. Research a few issues in use of IT in a discipline of current relevance. You may choose issues from any of the disciplines given in the following pages or a discipline of your choice.
2. Prepare an essay about your topic with no more than 1500 words (excluding reference list).
3. Your topic of choice must be posted to the Discussion Board titled “Post your essay topic here” by Week 3, Friday 5pm,
4. Note that if you have not posted a topic by this time, you may be assigned a topic by your lecturer.
REQUIREMENTS
· The assignment should be word-processed.
· It should include a reference list.
· Use Harvard referencing style.
· Do not include sources in the reference list that are not cited in the document.
· You need to use a minimum of 10 sources and there needs to be at least 3 different types (i.e., websites, book, journal article, etc.).
HIT164 Computing Fundamentals
TOPICS (CHOOSE ONE)
Option 1: Social Media
GeoCities is a web hosting service which employs the concept/metaphors of “cities” and “neighbourhood” in real-world. For example, computer-related sites are placed in “SiliconValley” and entertainment sites in “Hollywood”. GeoCities was the third-most visited website at its peak when it was acquired by Yahoo! in 1999.
10 years later as social media had taken over and become mainstream on the Internet, GeoCities was shutdown and
deleted. However, the Internet Archive team made a backup of the site just before it was shut down to preserve the effort put in by around 35 million people since it started. The resulting 650GB archive was published online as a remembrance of the glorious days of GeoCities.
Will current social media (i.e., Facebook) eventually face the same fate? Justify your arguments with robust supporting evidence.
Option 2: Li-Fi
Wi-Fi is a popular networking technology that allows electronic devices to connect to the Internet wirelessly using radio frequency. It can be commonly seen from mobile devices to government facility. However in recent years, researchers have found a way to utilise visible light from light-emitting diodes (LEDs) to transmit data: such technology is called Li-Fi (light fidelity).
Even though Li-Fi is still at its infancy, many universities and researchers are actively studying to reach its potential.
Compare Wi-Fi and Li-Fi critically and discuss the advantages and disadvantages of Li-Fi.
Option 3: Wearable Technology
Google Glass is one of the first and most talked about augmented reality wearable computers in 2013. Its usage varies from personal entertainment to surgical practise. Similar to other emerging technologies, Google Glass has also received quite a few negative critical receptions, such as privacy concern.
Critically discuss the pros and cons of ...
The document discusses big data testing using the Hadoop platform. It describes how Hadoop, along with technologies like HDFS, MapReduce, YARN, Pig, and Spark, provides tools for efficiently storing, processing, and analyzing large volumes of structured and unstructured data distributed across clusters of machines. These technologies allow organizations to leverage big data to gain valuable insights by enabling parallel computation of massive datasets.
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...ijseajournal
There has been tremendous growth in the field of AI and machine learning. The developments across these
fields have resulted in a considerable increase in other FinTech fields. Cyber security has been described
as an essential part of the developments associated with technology. Increased cyber security ensures that
people remain protected, and that data remains safe. New methods have been integrated into developing AI
that achieves cyber security. The data analysis capabilities of AI and its cyber security functions have
ensured that privacy has increased significantly. The ethical concept associated with data privacy has also
been advocated across most FinTech regulations. These concepts and considerations have all been
engaged with the need to achieve the required ethical requirements. The concept of federated learning is a
recently developed measure that achieves the abovementioned concept. It ensured the development of AI
and machine learning while keeping privacy in data analysis. The research paper effectively describes the
issue of federated learning for confidentiality. It describes the overall process associated with its
development and some of the contributions it has achieved. The widespread application of federated
learning in FinTech is showcased, and why federated learning is essential for overall growth in FinTech.
IEEE augmented reality learning experience model (ARLEM)fridolin.wild
The document discusses the development of a standard called ARLEM (Augmented Reality Learning Experience Models) for defining augmented reality learning experiences. It begins with an introduction to ARLEM's purpose of providing interoperability for AR learning content and experiences. Then it provides several example use cases for AR learning in areas like job training, healthcare, remote tutoring and more. It proposes using an activity modeling language and workplace modeling language to define AR learning activities and the environments in which they are set. It provides an example of how to define an initial activity using XML tags to specify attributes, instructions, triggers and the flow between action steps. The goal is for ARLEM to allow learning experiences to be shared and built upon across different technologies and platforms
Recommender System in light of Big DataKhadija Atiya
This document summarizes a research paper that investigates using singular value decomposition (SVD) to address challenges faced by recommender systems in light of big data. It discusses how collaborative filtering recommender systems are impacted by issues like scalability, sparsity, and cold starts with large datasets. The document then provides background on SVD and how it can be applied to collaborative filtering as a model-based approach. It describes an implementation of SVD-based recommender system using Apache Hadoop and Spark on a large dataset to validate its applicability for big data and evaluate the tools. The results showed SVD approach provides comparable performance to previous experiments on smaller datasets.
A Framework for Geospatial Web Services for Public Health by Dr. Leslie LenertWansoo Im
A Framework for Geospatial Web Services for Public Health
by Leslie Lenert, MD, MS, FACMI, Director
National Center for Public Health Informatics, CCHIS, CDC
June 8 2009 URISA Public Health Conference
uploaded by Wansoo Im, Ph.D.
URISA Membership Committee Chair
http://www.gisinpublichealth.org
DevOps Support for an Ethical Software Development Life Cycle (SDLC)Mark Underwood
As part of the IEEE SA P7000 and P2675 working groups, it has been determined that DevOps engineering practices can support (or hinder) the environment for an ethical software development life cycle (SDLC). This deck scratches the surface.
This document summarizes a systematic review of challenges and recommendations for improving the usability and accessibility of virtual reality systems for cultural heritage practices. The review identified 45 challenges that were mapped into five categories: system design, development process, technology, assessment process, and knowledge transfer. Based on the identified challenges, 58 recommendations were proposed across three groups: discovery and planning, design and development, and assessment factors. Key challenges included limitations in navigating virtual spaces, non-ideal navigation controls, and issues affecting the user experience like rendering delays. The document aims to provide guidance for future research on applying, developing, and evaluating virtual reality for digital cultural heritage.
This document summarizes a systematic review of challenges and recommendations for improving the usability and accessibility of virtual reality systems for cultural heritage practices. The review identified 45 challenges that were mapped into five categories: system design, development process, technology, assessment process, and knowledge transfer. Based on the identified challenges, 58 recommendations were proposed across three groups: discovery and planning, design and development, and assessment factors. Key challenges included limitations in navigating virtual spaces, non-ideal navigation controls, and issues affecting the user experience like rendering delays. The document aims to provide guidance for future research on applying, developing, and evaluating virtual reality for digital cultural heritage.
Machine and deep learning techniques for detecting internet protocol version ...IJECEIAES
This document provides a review of machine and deep learning techniques for detecting internet protocol version six (IPv6) attacks, specifically distributed denial of service (DDoS) attacks. It begins with an introduction on the growth of IPv6 usage and its vulnerabilities. It then compares this review to previous related works and provides overviews of IPv6, DDoS attacks, and intrusion detection systems. The review discusses machine learning techniques including naive Bayes, decision trees, and neural networks that have been used in intrusion detection systems. It also discusses deep learning techniques and provides a qualitative comparison of machine and deep learning approaches.
Pistoia Alliance Debates: Moving Research Informatics into the Cloud: 25th Ma...Pistoia Alliance
This document summarizes a webinar on moving research informatics to the cloud. It introduces four panelists from Elsevier, Accenture, Merck, and Google who discuss their experiences with cloud computing. They cover challenges around data management, the benefits of a cloud-based approach for data sharing and scalability, and how a platform strategy enabled by cloud infrastructure can help transform research processes over multiple years. The panelists describe case studies of migrating applications and databases to the cloud and discuss how a cloud-based platform can drive productivity and cost savings.
Research Paper TopicITS835 – Enterprise Risk Managemen.docxaudeleypearl
Research Paper Topic
ITS835 – Enterprise Risk Management
Dr. Jerry Alsay
University of the Cumberlands
Introduction
All research reports begin with an introduction. (1 – 2 Pages)
Background
Provide your reader with a broad base of understanding of the research topic. The goal is to give the reader an overview of the topic, and its context within the real world, research literature, and theory. (3 – 5 Pages)
Problem Statement
This section should clearly articulate how the study will relate to the current literature. This is done by describing findings from the research literature that define the gap. Should be very clear what the research problem is and why it should be solved. Provide a general/board problem and a specific problem (150 – 200 Words)
Literature Review
Using your annotated bibliography, construct a literature review. (3-5 pages)
Discussion
Provide a discussion about your specific topic findings. Using the literature, you found, how do you solve your problem? How does it affect your general/board problem?
References
Running Head: CLOUD COMPUTING AND DATA SECURITY1
Cloud Computing and Data Security
Naresh Rama
Professor Dr.Jerry Alsay
07/14/2019
Cloud Computing and Data Security
Introduction
In today's world, the movement of data is from a store that is severe and it is located centrally to the storage of cloud, services in the cloud offer the flexibility, scalability, and concerns that are proportionate that concerns the issue of security. Safety is an aspect that is important and it associated with the computing of cloud because information can be stored on the cloud by the users with the help of providers that works in the service of the cloud. In the security f data and computing of the cloud, there are some problems that are available. They include backups of data that is improper and inadequate that have caused organizations been among those that are vulnerable to threats that re-associated with security measures.
Data that is found in an organization and is stored in files that are encrypted are interfered by these threats. Problem found under these investigations is significant to this study and these show that the threats that emerge because of backups concerning data that is improper lead to an issue that is significant in the security of data in the computing cloud and also security concerning data.
The study tends to shows that security of data and computing of data leads to the provision of ways that helps in the protection of data that is private and also information that is classified away from such threats. That may include attacks in the cyber sector and losses that occur in case of disasters (Strategic Cyber Security, 2011). This study has limitations that state that assurance of security to the computing of cloud is not available and that there is no protection of data that is vital in an organization to a hundred percent.
Background
Hacke ...
The document discusses the need for an NIH Data Commons to address challenges with data sharing and storage. It describes how factors like increasing data volumes, availability of cloud technologies, and emphasis on FAIR data principles are driving the need for a centralized data platform. The proposed NIH Data Commons would provide findable, accessible, interoperable and reusable data through cloud-based services and tools. It would enable data-driven science by facilitating discovery, access and analysis of biomedical data across different sources. Plans are outlined to develop and test an initial Data Commons pilot using existing genomic and other biomedical datasets.
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxzmark3
response.pdf
response
by Abc Abc
Submission date: 14-May-2020 05:58AM (UTC-0400)
Submission ID: 1324028097
File name: response.docx (36.28K)
Word count: 355
Character count: 1780
0%
SIMILARITY INDEX
0%
INTERNET SOURCES
0%
PUBLICATIONS
0%
STUDENT PAPERS
Exclude quotes On
Exclude bibliography On
Exclude matches Off
response
ORIGINALITY REPORT
PRIMARY SOURCES
responseby Abc AbcresponseORIGINALITY REPORTPRIMARY SOURCES
response. d.docx
Running Head: RESPONSE
1
RESPONSE 2
Response
Name
Course
Date of Submission
Discussion 1
Hello, it was interesting to read your post. It is indeed true that honeypots are much expensive than the real security system. There exist several issues with honeypots and most of which make 'it hard for individuals to deal with them. One such issue is individuals' lack of familiarity with them, as you have stated in the post. The main objective of designing and using honeypots is for the attackers to make brute attacks on the system without being noticed by the administration. This is the reason why if a single honeypot gets into the system, it can end up being used to compromise the entire host system, as you have stated in your post. As you have stated in your post, a honeypot is highly relied upon when individuals are considering acquiring valuable intelligence from an organization but one that is still not the most sensitive. Some of the questions which arise with the usage of honeypots in such ventures are whether they can be used by forces to help counter-terrorism. In the age of technology, police are using the internet and its filtering capabilities to identify terrorists and how they conduct recruitment (Sharma & Kaul, 2018).
Discussion 2
Hello, it was interesting to read your post; it was informative. From your research, you have identified the primary objective of honeypot being diversion of assassins so as to extract critical information and data about them by following all the moves they make. This objective does not, however, acknowledge whether there are means of injecting honeypots to the assassins and whether they have measures of protecting their systems against such attempts. Honey pots have been noted to be effective at identifying potential assaults, as you have stated in your post. They are, however, not much effective as attacks still occur in their presence and can only identify a single attack at a time, as you have stated in the post.
References
Sharma, S., & Kaul, A. (2018). A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud. Vehicular Communications, 12, 138-164.
Discussion 1 :
Top of Form
Network separation is a standard network practice that has security architecture concepts that are implemented to secure the entire system. It uses various approaches such as.
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
From introducing new international standards to having an important role to play in several industries, computer science is one of the powerful subjects right now. You cannot guess a single area that does not need computer systems or efficient networking options. Because Technology and Computer Science go together for any field.
Stating this, there are a few core subjects inside computer science that are unpredictable in its future use. One such case is with computing technologies.
Visite : https://www.phdassistance.com/blog/
Contact Us:
UK NO: +44-1143520021
India No: +91-8754446690
Email: info@phdassistance.com
This document discusses mobile data analytics and big data analysis using cloud computing. It introduces how massive amounts of data are generated from mobile devices and networks. Big data analysis tools like Hadoop, Spark and Storm are described for processing large datasets. Challenges of mobile big data analytics include limited device resources and connectivity. The document discusses how cloud computing addresses these issues by providing scalable infrastructure and handling computation and storage remotely. It also covers security considerations for cloud-based mobile analytics.
This document proposes developing a competence-based model for securing the internet of things (IoT) in organizations. It aims to define the required set of organizational competences for IoT products and services regarding information security. The research will use a design science methodology to develop and empirically test a model of organizational competence for IoT security based on an existing model. This will help managers assess their competences against future requirements and properly align their IoT approaches regarding customer information security.
Similar to Part 1My Discussion Please check with Ulrich’s Periodical Dir.docx (20)
Your initial post should be 2-3 paragraphs in length.Inclu.docxdanhaley45372
Your initial post should be
2-3 paragraphs
in length.
Include one peer reviewed journal article to support your post. You can search for a journal article from Welder Library EResources. (Ex: Risk of social media or social media polices, etc.).
Your
initial post is due by Thursday
. This allows you and your classmates time to read and reply.
Make sure to demonstrate critical thinking and analysis by using research and personal work experiences.
For full credit, you are required to
respond
to a minimum of two classmates
. Please begin your reply by addressing the student by name. Your
responses
must be completed by Sunday at midnight
.
Please refer to the rubric for the grading requirements. You can view the rubric by clicking on the wheel in the upper right corner and selecting "show rubric."
Scott Lefor,
The release of information to the public – including through social media – can impact everything from a company’s image before the public to an individual’s image before a company. Jackson et al. (2020) note that while “strategic HR use of social media can build the employer’s reputation in the labor market and help HR professionals to reach candidates and current employees,” the use of social media can also “lead to the disclosure of trade secrets” or present a negative image of the company (p. 21). While companies place substantial hours and dollars into cultivating a favorable brand image before the public, a careless comment or complaint by an employee or contractor on social media can go viral and counteract such marketing efforts. In such cases, companies may find themselves forced to address such comments or complaints before the public in an attempt to save the brand image they have worked so hard to build.
In addition to impacting the image of a company, careless social media posts can also impact potential and current employees before the company. According to Melton and Miller (2015), while “most students appear to know that the content they post” on social media could be viewed negatively by “potential employers,” many students continue to do so (p. 678). Through social media, what would have been a careless comment if spoken aloud becomes a permanent statement viewable by countless individuals. Furthermore, comments and images referencing illegal activities or poor decision-making and communicating abilities become enshrined for potential and current employers to reference and base hiring and firing decisions upon.
It is worth noting that careless comments via social media can go beyond “negative,” and can sometimes involve trade secrets (as noted). While negative comments can cast a shadow over a company’s brand, comments revealing trade secrets can jeopardize long-term strategies, losing hard-won competitive edges. As referenced above, Melton and Miller (2015) assert that even though individuals know of such risks, many continue to post comments that can be understood to be “careless.”
In short, informa.
Your initial post should be made during Unit 2, January 21st at 4.docxdanhaley45372
Your initial post should be made during
Unit 2, January 21st at 4:00 pm.
Submissions after this time will not be accepted.
Please respond to the following questions:
In 6-7 sentences, compare and contrast one of the dance television shows referenced in this unit (try to choose a show that has not already been referenced by another student) to that of the American Dance Marathons, considering such questions as:
How does the socioeconomic and sociopolitical climate of the time affect how dance is presented and how the participants are treated/portrayed?
Discuss the Issue of exploitation, who was exploited, who did the exploiting, and how?
What aspects were theatre, and what aspects were real? How were these exaggerated?
What are the reinforced stereotypes present in the competitions?
Tell us about the idea that drama sells.
Use specific terminology and concepts discussed in class thus far. Make sure that you are citing all sources, or being clear that your statement is your idea/belief/observation.
.
Your initial post should be at least 450+ words and in APA forma.docxdanhaley45372
Your initial post should be at least
450+ words
and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review
2 Replies each with minimum
100 words
.
.
Your initial post should be made during Unit 2, january 21st at 4.docxdanhaley45372
Your initial post should be made during
Unit 2, january 21st at 4:00 pm.
Submissions after this time will not be accepted.
Please respond to the following questions:
Using the “Tools to Analyze Dance on Screen” document (based off of the video about film analysis), find and provide a link to a music video (not yet shown in class or by another student). Analyze how the video is representing the “brand” for the artist, what the video is representing, and how dance is used to accomplish this. What does this video say about their values and interests and who they are?Analyze by focusing on some of the following: the use of the camera, editing, and art direction, in addition to the dancing/movement and use of the body. Use specific terminology and concepts discussed in class thus far. Make sure that you are citing all sources, or being clear that your statement is your idea/belief/observation.
.
Your initial post should be made during, Submissions after this time.docxdanhaley45372
Your initial post should be made during, Submissions after this time will not be accepted.
Please respond to the following questions:
Consider the movie caricature assigned to your last name, provide a brief description/definition of the caricatures and provide a movie/television/cartoon/internet character that fits this caricature, and one that counters it. Provide a brief explanation of how both do/do not fit. Make sure that you are citing all sources, or being clear that your statement is your idea/belief/observation.
Last names starting with A-E:
The Tom Caricature
Last names starting with F-J:
The Mammy Caricature
Last names starting with K-O:
The Brute/Buck Caricature
Last names starting with P-S:
The Coon Caricature
Last names starting with T-Z:
The Jezebel
.
Your essay should address the following.(a) How is the biologic.docxdanhaley45372
Your essay should address the following.
(a) How is the biological and social elements distinguished in Language?
(b) Explain briefly the phonology, syntax and semantics of language.
(c) The common features of language and pre linguistic mentality.
(d) What has language got that prelinguistic mentality lacks?
(e) What are the features of consciousness tat language lacks?
(f) What are the functions of language and explain the difference between representation and expression.
(g) Show the features of language that is active in creating society.
(h) Sho how commitments are part and parcel of using langue.
(i) How does language enable us to construct social institutions?
The essay should be written in nontechnical, straightforward, ordinary language. The essay should be a approximately a 1000 words, without errors that might impede their understanding as a reader. If you use a technical term please immediately say how the term is to be understood.
.
Your initial post is due by midnight (1159 PM) on Thursday. You mus.docxdanhaley45372
Your initial post is due by midnight (11:59 PM) on Thursday. You must write at least 400 words on Olive Senior's "The Pain Tree" and Ana Menéndez's "Her Mother's House" (in other words, at least 200 words for each story).
Instead of relying on plot summary you will support your interpretation by using and analyzing textual evidence. When you quote the story make sure you cite the page number: for instance, after the quotation put the page number in parenthesis (60). Avoid writing out "on page 60". When you quote a passage from the story make sure you introduce the context and that you are analyzing the meaning of what you quoted.
I encourage your own formulations, but address the following prompts (you can address them in any order and be sure to write at least three or more paragraphs):
In the short stories, you are going to encounter protagonists attempting to reconnect and remember (as in "putting together again") their Caribbean "home" spaces. How have their perceptions of their Caribbean homelands been shaped by their parents? What new perceptions do they gain and how does this transform their view of themselves and their history?
Victor Shklovsky argues that
ostranenie
("making strange" in Russian, and also translated as estrangement/defamiliarization) is the essence of literature. Where in the two stories do we encounter descriptions of estranged perception? Analyze the significance of these moments in the stories. Be sure to consult and cite Shkovsky's essay (especially his definition of
ostranenie
on page 80) to support your analysis.
For our annotation assignment, we learned how to notice patterns and overlooked meanings that helped us understand "Sonny's Blues" more fully. In "The Pain Tree" and "Her Mother's House" what patterns, connections or implied meanings did you notice structuring the stories?
.
Your individual sub-topic written (MIN of 1, MAX 3 pages)You.docxdanhaley45372
Your individual sub-topic written (MIN of 1, MAX 3 pages)
Your portion of the White Paper must include one of the following:
1. Introduction/Summary
2. History/Background and Context
3. Problem (Defined)
4. Discussion to relate point of view from sources used
5. Writer takes a position
6.
Solution
/s
7. Conclusion.
.
Your HR project to develop a centralized model of deliveri.docxdanhaley45372
Your HR project to develop a centralized model of delivering HR services has progressed through very critical stages of the project thus far. It is now time to present actionable, decision-making information to project leaders. This can be best accomplished when projects have been successfully managed, devoid of any major risks, and have been properly closed out and finalized.
Write a five to six (5-6) page paper in which you:
1. Explain what it means to successfully direct and manage project work and identify and discuss 3-4 strategies you might use to manage and sustain progress in your HR project. Be specific.
2. Identify and discuss a minimum of 3 strategies that could be used to address and resolve any risks within the control of the project. HINT: See Exhibit 14.5 in the textbook. Is any one of the strategies you selected more important than the others? Why?
Exhibit 14.5
RISK EVENT RESOLUTION STRATEGIES RISKS WITHIN PROJECT CONTROL
Understand and control WBS
Closely monitor and control activity progress
Closely manage all project changes
Document all change requests
Increase overtime to stay on schedule
Isolate problems and reschedule other activities
Research challenging issues early
RISKS PARTIALLY WITHIN PROJECT CONTROL
Establish limits to customer expectations
Build relationships by understanding project from client’s perspective
Use honesty in managing client expectations
Work with client to reprioritize cost, schedule, scope, and/or quality
Carefully escalate problems
Build team commitment and enthusiasm
RISKS OUTSIDE PROJECT CONTROL
Understand project context and environment
Actively monitor project environment
Understand willingness or reluctance of stakeholders to agree to changes
3. Describe 2-3 actions a project manager may take as they begin to close out the project. Be sure to justify using the actions you discuss.
4. Review Project Management in Action: The Power of Lessons Learned (pages 518-520 in the textbook) and provide an overview to the project team on the significance of the information. Be specific.
Pg 518-520 from book
PROJECT MANAGEMENT IN ACTION The Power of Lessons Learned Projects are discrete. They have a beginning and an end, at which time the project team disbands and moves on to other things. Despite the fact there has inevitably been significant tacit learning during the project, there is often only a limited capture of this into a sharable form for future reuse. Too often, as the project team dissolves, the learning fades into the memories of individuals minds. This makes it extremely difficult for others to benefit in the future from the insights learned. The usual excuses for this loss echoing through the corridors include just too hard, not enough time, team disbanded before we had the chance, and many more. The key error here is the incorrect assumption that learning during or from projects is an added bonus or a nice- to-have luxury. This is not the case in best.
Your Immersion Project for this course is essentially ethnographic r.docxdanhaley45372
Your Immersion Project for this course is essentially ethnographic research. When you hear the words
ethnography
or
ethnographic research
, you may think of Margaret Mead or Franz Boas performing their research on cultures outside their own countries and living among their research subjects. Contemporary ethnographic research includes many other types of research scenarios, such as urban ethnography, neighborhood studies, and even microstudies of groups as small as families and individuals.
Ethnography
is any systematic study of people and cultures, usually conducted through observation, interviews, dialogues, participation, and historical research. Ethnography is used across disciplines as varied as anthropology, linguistics, sociology, advertising, and of course, human services and social work.
Your Immersion Project is just that—a study of a population group with the goal of better understanding the culture of the group. As you complete this project over the course of the semester, keep in mind one of the classical hallmarks of ethnographic research, pioneered by Boas: The beliefs and activities of humans have to be interpreted within their own cultural terms and not evaluated or judged through the cultural lens or terms of the observer or researcher. That is, human beliefs and behavior are culturally relative.
This week, you submit your Immersion Project Paper, one of two culminating parts of your Final Project for this course (along with your narrated PowerPoint, which is due in Week 10).
This 7- to 10-page paper will be a culmination of what you have experienced and explored throughout your work on this project. Since everyone’s experience will be different, the content of the paper will vary for each student; however, there are two sections that everyone should include:
Reflection on your Immersion Project:
Observation: What observational activity did you attend and what insight did it give you into your selected population?
Dialogue: How did you carry out your dialogue? Reflect on your experience and what insight it gave you into your selected population.
Reaction and Critical Analysis of your experience: This section should incorporate your reflections on your experiences, what you learned about the group, what you learned about yourself, and how your perceptions of this group have changed over time.
Several areas to address in this section:
Description of the group
Values/belief orientation
Social interactions (relationships within and between group members)
Religious/spiritual beliefs
Roles and expectations
Language and communication
.
Your country just overthrew its dictator, and you are the newly .docxdanhaley45372
Your country just overthrew its dictator, and you are the newly elected President. Unfortunately, due to the divisions in the country and the years of war, economic, military, and political structures are non-existent. A group of loyalists to the old dictator have been detonating bombs, murdering civilians, assassinating leaders, and terrorizing towns with help from a neighboring country's dictator.
Create a comprehensive plan for your new government. While creating this government identify 1) the governing style of your government and the principles that govern your leaders (see rubric); 2) the functions of various branches of government; 3) how to maintain public good in domestic areas through at least two programs; 4) an economic structure that is most beneficial to your citizens; 5) ways to create national unity; 6) ways to combat terrorism and violence; and, 6) international organizations to join
.
Your have been contracted by HealthFirst Hospital Foundation (HHF),.docxdanhaley45372
Your have been contracted by HealthFirst Hospital Foundation (HHF),?
Your have been contracted by HealthFirst Hospital Foundation (HHF), a charitable organization that provides services to community clinics in Atlanta, Georgia. Due to the organization's tremendous growth, it will need to computerize its operations. By doing so, HHF will be able to continue to meet the needs of both its benefactors and their employees. To this end, it has decided to move its operation to a more modern facility, where it will install a Local Area Network (LAN), and you will be managing the network implementation.
Department # of Employees
Administration 18
Human Resources 9
Accounting 13
Hospital Relations 12
Media Relations 4
Board Room 0
MIS 6
Total 62
Feasibility of the proposed change
HHF has examined its resources and budgetary constraints and determined that the installation of the LAN is feasible. There is a need to maintain as low a budget as possible.
Project Goals
The goals for the LAN project are as follows:
Fully functional networked system
Design a boardroom in which any department's information can be accessed and expressed
Illustrate the complete network and boardroom design
Maintain as low a price as possible
Current state
The new facility consists of 5 six-cubicle work areas and a separate MIS Department and a boardroom. (See the schematic below) Each work area also includes a closed office for the department head.
Deliverables
The deliverables are outlined below:
Begin compiling your project plan by choosing network servers, routers, and hubs. Describe your network model, topology, and selections with an explanation of your choices in a memo to Roger Chen, the chief information officer at HHF. Be sure to use terms and concepts that you have learned in this course.
.
Your group presentationWhat you need to do.docxdanhaley45372
Your group presentation
What you need to do
Your presentation
groups
You can self-select groups (no more than 6)
Or I will put you into groups
Each group will present for a maximum of 20 minutes
You can self-select your topic
Everyone gets the same mark
Do not complain to me about the social loafers
Your presentation
Follow the rubric
Follow the format as presented in the applied cultural proficiency lectures
Let’s review..
How to get the most marks: (part a)
How to get the most marks in part b
During your tutorials, you will be required to peer review the other presentations. You need to demonstrate an understanding of the determinants of health in the presentation (0/10) and to demonstrate an understanding of the APIE system (0/10). See the rubric to get the best points:
Putting it all together
For your group assignments…
Choosing your topic:
Go to Australian Indigenous HealthInfoNet (http://www.healthinfonet.ecu.edu.au/)
Choose a topic that interests you
Choose a program that interests you
Your presentation might look like this:
6
Pick one of these
https://healthinfonet.ecu.edu.au/
Aunty Kerrie & Papa Ron
Aunty Kerrie & Papa Ron
Then you work your way
through the APIE
Check it out to see if you want to do it…
Your presentation MIGHT look like this…
Using the tools from the lectures…
assessment
How did the programmers decide it was a problem?
Eg, did they measure anything with the ABS? use any of the other assessment tools?
if the programmers did not demonstrate it, how do you think they should/might have assessed this problem?
Examples from the lectures:
Y
feel
hear
see
e.g. did the programmers ask the community?
Should they have?
How did they know it was a problem?
Did they do a holistic assessment?
Why was there a need in this community?
Why was there .
Your contribution(s) must add significant information to the dis.docxdanhaley45372
Your contribution(s) must add significant information to the discussion. Your reply should be a very minimum of 250 words.
Research, read, and then write in your own words. Explain examples and incorporate evidence. Cite your sources within your sentences.
Provide complete citations at the end of your posts. A complete citation includes both the website’s title and
Do not copy and paste stuff….that will cause you to lose points and far more importantly, you will have lost the richness of understanding this information.
ADD COMMENT AND INFORMATION TO THE TEXT BELOW
Many people are skeptical that climate change is even occurring on our beautiful planet. Some places worldwide feel its effects through increased temperatures, which is desirable to some. However, many other places, like the lovely island Fiji, are suffering from the effects of climate change. A Youtube video, “Climate Change Fiji,” posted by the user
UN Climate Change
describes the terrible circumstances faced by civilians who are forced to flee their homes due to rising sea levels (www#1). The loss of beach shores has resulted in a drastic decrease in marine life and land species who rely on coastal areas to survive. According to an article posted by author Sarah Taylor, to the site
EuroNews,
titled “Fiji prepares for ‘Climate Refugees’,” since the 19th century, sea levels have risen by around 25 centimeters worldwide (www#2). This rise in sea levels is attributed to the seemingly neverending rise of greenhouse gas emissions into our atmosphere. Another Youtube video, “Climate Change and Fiji,” posted by the user
COP23fj
emphasizes that Fiji is only one of many other Pacific Islands to be battling climate change (www#3). However, Fijians have taken the lead as the spokespeople for all Pacific Islanders to feel protected and not neglected.
These negative biological implications seem to occur in other places around the world, right? Wrong. Our very own city, San Diego, has been facing and will continue to tackle the negative effects of climate change. A typed interview conducted by the Environmental Health Coalition with Kayla Race exemplifies the many ways climate change appears in our communities, including prolonged heat waves, more intense wildfires, increased water costs, and disruptions on electricity (www#4). My family and I have personally been affected by the increased water (and energy) costs and the interruptions on our electricity. We don’t use our AC system and rely on fans for a cool down from our heatwave, yet are charged more than during the year and face blackouts quite often. A video posted in 2017 by the San Diego Union-Tribune, explains the differences between catastrophic and existential climate change (www#5). Catastrophic damage is survivable by humans, while existential climate change threatens the immediate safety of humans. Many still do not believe that these repercussions are created by car emissions into the air, affecting our atmospher.
Your good friends have just adopted a four-year-old child. At th.docxdanhaley45372
Your good friends have just adopted a four-year-old child. At this point, the only socialization decision they have made is that the child is going to preschool. Imagine that you are an expert in your chosen field. Your friends have come to you for advice and to devise a plan to raise their child. They ask you to be frank with them and give them specific examples to support your opinions. They are determined to raise this child to the best of their ability. Since they are new parents, they need advice on everything!
The summative assignment is to develop a user-friendly PowerPoint handbook of suggestions. The handbook will demonstrate your understanding of the material by applying the major topics discussed in the course to a real situation.
The PowerPoint presentation for the Final Project must include:
Title slide (one slide)
Introduction of the material for the new adoptive parents (one to two slides)
At least 15 slides summarizing each of the items listed below (one to two slides for each item). Please note that the content of each slide should appear in the notes section, while the slide itself should contain the information that would be presented to the parents.
An image that represents each item
Conclusion slide that clearly explains why the parents should review this material (one to two slides)
Reference slide with at least three scholarly sources and the course text properly cited (one slide)
Writing the PowerPoint Presentation of the Final Project
Summarize Bronfenbrenner's ecological model and describe why it is important for them to be aware of this theory (one to two slides).
Suggest and explain a parenting style/philosophy (authoritarian, authoritative, or permissive) that you believe will be most beneficial for the child and the family (one to two slides).
Explain which childcare (nanny, center-based, or family-based care) option (before/during/after preschool) you think is best for the child and why (one to two slides). Be sure to include discussion of the social factors that influence the likelihood of the family selecting a particular form of childcare.
Share specific suggestions, including at least two to implement safe technology use in the home. Explain how the media can (both positively and negatively) influence the child (one to two slides).
Discuss the importance of culture and ethnicity in the development of the self-concept. Share your ideas of ways that the new parents can create opportunities for the child to learn about his or her culture (one to two slides).
Describe at least two researched methods to increase the child's self-esteem and positive attitude (one to two slides).
Differentiate between the importance of socialization that occurs in the home and at school. Explain the importance of each venue as a positive haven for the child (one to two slides).
Explain the importance of the teacher’s role in the child's life. Give examples of how the school and the teacher will affect the child's soci.
Your good friends have just adopted a four-year-old child. At this p.docxdanhaley45372
Your good friends have just adopted a four-year-old child. At this point, the only socialization decision they have made is that the child is going to preschool. Imagine that you are an expert in your chosen field. Your friends have come to you for advice and to devise a plan to raise their child. They ask you to be frank with them and give them specific examples to support your opinions. They are determined to raise this child to the best of their ability. Since they are new parents, they need advice on everything!
The summative assignment is to develop a user-friendly PowerPoint handbook of suggestions. The handbook will demonstrate your understanding of the material by applying the major topics discussed in the course to a real situation.
The PowerPoint presentation for the Final Project must include:
Title slide (one slide)
Introduction of the material for the new adoptive parents (one to two slides)
At least 15 slides summarizing each of the items listed below (one to two slides for each item). Please note that the content of each slide should appear in the notes section, while the slide itself should contain the information that would be presented to the parents.
An image that represents each item
Conclusion slide that clearly explains why the parents should review this material (one to two slides)
Reference slide with at least three scholarly sources and the course text properly cited (one slide)
Writing the PowerPoint Presentation of the Final Project
Summarize Bronfenbrenner's ecological model and describe why it is important for them to be aware of this theory (one to two slides).
Suggest and explain a parenting style/philosophy (authoritarian, authoritative, or permissive) that you believe will be most beneficial for the child and the family (one to two slides).
Explain which childcare (nanny, center-based, or family-based care) option (before/during/after preschool) you think is best for the child and why (one to two slides). Be sure to include discussion of the social factors that influence the likelihood of the family selecting a particular form of childcare.
Share specific suggestions, including at least two to implement safe technology use in the home. Explain how the media can (both positively and negatively) influence the child (one to two slides).
Discuss the importance of culture and ethnicity in the development of the self-concept. Share your ideas of ways that the new parents can create opportunities for the child to learn about his or her culture (one to two slides).
Describe at least two researched methods to increase the child's self-esteem and positive attitude (one to two slides).
Differentiate between the importance of socialization that occurs in the home and at school. Explain the importance of each venue as a positive haven for the child (one to two slides).
Explain the importance of the teacher’s role in the child's life. Give examples of how the school and the teacher will affect the child's socializa.
Your goals as the IT architect and IT security specialist are to.docxdanhaley45372
As the IT architect and security specialist, you must develop solutions to issues facing multiple locations of IDI, ensure confidentiality, integrity and availability of information access across the company, and assess and mitigate risks of operating IT facilities in disparate locations. You will also analyze IDI's current systems, address secure access for remote and web users, propose a budget, and prepare network diagrams and a report with solutions to present to management.
Your essay should address the following problem.(a) What is .docxdanhaley45372
This document outlines several topics for an essay to address: the ideas of political power and bio-power as conceived by Foucault; the concept of background or network power and who exercises it; the paradox of political power; whether democratic and religious societies can be consistent; and the overall conclusion about political power presented in the textbook.
Your future financial needs will be based on the income you can reas.docxdanhaley45372
Your future financial needs will be based on the income you can reasonably expect to receive in your field and planning.
Assignment Information
Using the
template provided
, estimate what your budget may look like in the future. Include expenses such as:
Computer hardware and software
Continuing education
Certification and Recertification
Field or Lab Equipment
Any other needs to maintain professional credibility and marketability
This is the Template
CS204 Budget Worksheet
Monthly Expenses
Amount
Mortgage or rent
Taxes: property
Money to Savings Account
Food
Insurance
Health bills (not covered by insurance)
Car loan
Car expenses
Credit card bills
School loans
Other loans
Professional equipment expenses
Other professional development expenses
Child care
Clothing
Children's Education
Entertainment
Vacations
Charity
Miscellaneous
Total Monthly Expenses:
Yearly Income:
Monthly Income from Job:
Any other monthly income (child support, dividends, and interest):
Total Monthly Income*:
Total Monthly Income:
Total Monthly Expenses:
Difference:
.
Your friend Lydia is having difficulty taking in the informati.docxdanhaley45372
Your friend Lydia is having difficulty "taking in" the information in her history class, so she asks you to use your expertise in psychology to offer some suggestions on how to improve her memory performance.
Discuss how attention, deep processing, elaboration, and the use of mental imagery can affect the encoding process. Utilize your readings, lecture, and powerpoints and examples that you might have to help with your post.
Please submit a minimum of 250 words and cite your resources. Turnitin will be utilized. Please make sure, you write your post in your own words.
.
How to Manage Reception Report in Odoo 17Celine George
A business may deal with both sales and purchases occasionally. They buy things from vendors and then sell them to their customers. Such dealings can be confusing at times. Because multiple clients may inquire about the same product at the same time, after purchasing those products, customers must be assigned to them. Odoo has a tool called Reception Report that can be used to complete this assignment. By enabling this, a reception report comes automatically after confirming a receipt, from which we can assign products to orders.
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxOH TEIK BIN
(A Free eBook comprising 3 Sets of Presentation of a selection of Puzzles, Brain Teasers and Thinking Problems to exercise both the mind and the Right and Left Brain. To help keep the mind and brain fit and healthy. Good for both the young and old alike.
Answers are given for all the puzzles and problems.)
With Metta,
Bro. Oh Teik Bin 🙏🤓🤔🥰
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Part 1My Discussion Please check with Ulrich’s Periodical Dir.docx
1. Part 1:
My Discussion
Please check with Ulrich’s Periodical
Directory http://library.waldenu.edu/728.htm to ensure citations
are peer reviewed.
Focus: Developing Your Introduction The introduction to a
research study has a specific purpose and functionality that sets
it apart from introductions you have probably read in books and
popular literature. Although the introduction should engage the
reader, it should also highlight particular information about the
study and its orientation. For example, your introduction should
have a purpose statement that explains particular elements of
your study and sets the context for your study.
To prepare for this Discussion:
Review:
· Chapters 5, 6, and 7 in the Creswell text to learn more about
introductions, the purpose statement, research questions, and
hypotheses; focus on the templates and examples in these
chapters
· Chapter 2, “Manuscript Structure and Content” in the APA
Manual
· The “A Typology of Research Purposes and its Relationship to
Mixed Methods” book excerpt, which examines the research
process, developing research questions, and using mixed
methods
· Sections on Introductions and Conclusions in the Introductions
and Conclusions webpage
· The Problem Statements interactive media
Post a 350-word abbreviated version of your Introduction
required in this week’s Assignment. Be sure to include a
problem statement, purpose statement, research questions, and
hypotheses. Also include a rationale for your proposed study by
referring to your literature review and how your problem
statement emerged out of your analysis of the literature. Include
2. at least two questions that will elicit comments and suggestions
from your colleagues.
Be sure to support your postings and responses with specific
references to the reading(s) and/or media segment(s) and use
APA format.
===============================================
===
Part 2:
Respond to at two of your colleagues' postings
Respond toat two of your colleagues' postings. In your
responses, be sure to consider the following:
· Does the problem or issue identified justify this study?
· How can the problem be framed in a way that is consistent
with a research approach?
· Do the past studies mentioned justify the problem's
importance?
· Do the specific deficiencies in past studies justify this study?
· Does the purpose statement sufficiently provide a general
working direction of the central phenomenon?
· Do the research questions and hypotheses align with the
problem statement and purpose statement?
Colleague #1
Background of the Problem
The general IT promised that new threats are targeting
virtual machines that reside on a hypervisor host. These threats
are able to determine if a machine is a virtual machine and take
actions accordingly (Donaldson, Coull, & McLuskie 2017).
Once the threat is embedded on the host is capable of
intercepting virtual machine and the host therefore
compromising the security of the host and every virtual machine
on it. Lacoste (2013) believes that one of the key areas for
future research will be focusing security solutions that are
closer to the hardware by installing the security solution on the
virtual machine.
Problem Statement
3. The general IT problem is that hypervisor security
threats can potentially compromise all embedded machines on
the host once the virtualization layer is breached (Arya,
Gidwani, & Gupta, 2013). The specific IT problem is generally
virtualization security is dependent on the guest operating
system and does not address the security vulnerability of the
main controller role of the hypervisor.
Purpose Statement
The purpose of this qualitative case study Research is to
identify the most successful security solution for protecting
embedded virtual machines on a hypervisor hosts deployed by
IT departments in the greater Cincinnati area. This study will
provide successful hypervisor security practices that can benefit
organizations of any size.
Research Questions
What best practices do IT security administrators have
in place to protect the virtualization layer?
What is the best location for the security mechanism in
proximity to the virtual machines?
Class Questions
Class,
My first question is, what alternative sources for
research can be suggested? I am looking for something other
than the typical databases.
At a glance, what would be my biggest obstacle
researching this problem?
Thank you in advance.
References
Arya, N., Gidwani, M., & Gupta, S. (2013). Hypervisor security
- a major concern. International Journal of Information and
Computation Technology, 3(6), 533-538.
Donaldson, S., Coull, N., & McLuskie, D. (2017, June). A
methodology for testing virtualisation security. Paper presented
at International Conference on Cyber Situational Awareness,
4. Data Analytics And Assessment (CyberSA 2017), London.
Lacoste, M. (2013). What does the future hold for hypervisor
security? Retrieved from
https://www.zurich.ibm.com/~cca/tclouds13/abstracts/what_doe
s_future.pdf
Colleague #2
The Problem Statement
The explosive use and demand of wireless devices in recent
years amidst technological advances for Internet of Everything
(IoE) poses a great threat of depletion of the current Wireless
Fidelity (Wi-Fi) radio-frequency spectrum, bandwidth, and data
communication speeds as well as the ever increasing security
threats from attackers. The wireless data communication
demands have made the available radio spectrum below 10 GHz
to become insufficient, a problem which has sparked interest in
the wireless communication industry to find new techniques to
go beyond the 10GHz boundary (Haas & Chen, 2015; Haas,
2016). Visible Light Communication (VLC) which can use light
emitting diodes (LED) for Light Fidelity (Li-Fi) technology
promises several advantages and solutions including a 10,000
times wider bandwidth with a significantly improved security
over Wi-Fi, is breaking grounds and generating more interests
in the wireless industry(Sarkar, Agarwal, & Nath, 2015; Singh,
2015; Khan, 2016). Harald Haas, the inventor for Li-Fi talks of
revolutionizing wireless data communication with his idea of
data through illumination - simply where there is light there
will be data. American Computing Machinery, IEEE, and
several reputable service providers like AT&T predict that data
in the amounts of zettabytes (1 billion terabytes) will be moved
across wireless communication channels by 2020 prompting a
dire need for new technologies that will provide faster and
secure transmissions (Haas, 2016, Dhar, 2013).
5. Literature or Study Review
Appreciable research has been conducted in this field with some
important observations in response to the growing needs.
Several reports conclude that Li-Fi will bring tremendous
advantages that include but not limited to better capacity with
high transmission rates up to 10Gbps, improved efficiency due
to less energy consumption by LED lights used, lower running
cost, larger unlicensed bandwidth, a better security, easy
availability, lesser interference, and the capability to use it in
places where WiFi cannot (Gupta, 2015; Aggarwal & Jhanji,
2014). Researchers agree that Li-Fi is faster and a cheaper
optical version of Wi-Fi based on bright LEDs. Survey work
conducted on VLC and Li-Fi showed that more than 75% of
wireless users from a reasonable sample desire better speeds
and security but do not know how, and are just stuck with what
is given them (Ergul et al., 2015; Dutta et al, 2015). Halper
(2017), a contributor for the American Computing Machinery
stated that this breakthrough is long overdue, and the opening
up of the visual spectrum perhaps more than anything else is
driving the development of the technology by a number of
companies. It is important to note that there are challenges that
Li-Fi faces in its young developmental stages including a line of
sight transmission issue, inability to penetrate objects, limited
use outdoors in the presence of strong natural lights, and the
high initial setup cost (Hadi, 2016; Khan, 2017). The potential
application of Li-Fi based on research shows that Li-Fi will go
where Wi-Fi cannot such as surgical rooms in Healthcare,
aviation, power plants, underwater explorations, and toys. The
hazards posed by Wi-Fi restricts its use in medical devices and
avionics.
Deficiencies in Literature or Studies
Despite its potential, Li-Fi has teething pains and it's not yet
ready for mass adoption. Companies like Philips, pureLiFi,
Oledcomm, Lucibel, and others are very engaged in seeing a
rapid development for the market as soon as possible (Halker,
6. 2017). Several retailers are embedding VLC in LED lights for
in-store communications in test runs, including companies like
Target, Aswaaq in Dubai, and Carrefour. Despite the increased
interest in Li-Fi, it is a bit surprising that research in this area
has not addressed extensively the practical use of the
technology, the standardizations to be adopted, and the security
implementations that will be associated with Li-Fi. Very few
research has addressed these issues, although the advantages,
disadvantages, and how it works have been explored extensively
(Khandal & Jain, 2014; Singh, 2015; Aggarwal & Jhanji, 2014).
Target Audience
Whether idealistic or not, the interest to further look at the
practical implementation, uses, standardization, and security
implementations of Li-Fi is worthy of further research that will
benefit society as a whole. The obsessive demands for higher
data speeds and security are common amongst Internet users,
and such a study will be a step closer to the realization of
Haas's dream of data by illumination. Information Technology
practitioners will be the most joyous to have something worthy
of use for the Internet of Everything.
Purpose Statement
The purpose or intent of this research is to find or explore
practical ways of implementing Li-Fi in companies, homes,
schools, government as well as security implementations. The
research will further review, explore and compile standards that
can be practically used for VLC or Li-Fi adoption which is
intended to help vendors to be consistent, compliant, and
interoperable.
References
Aggarwal, A., & Jhanji, D. (2014). Comparative study: li-fi v/s
wi-fi. International Journal of Research & Development in
Technology and Management Science, 21(1).
Creswell, J. W. (2014). Research design: Qualitative,
7. Quantitative, and Mixed Methods Approaches (4th ed.).
Thousand Oaks, CA: SAGE.
Dhar, V. (2013). Data Science and Prediction. Communications
of the ACM, 56 (12) 64-73. doi: 10.1145/2500499
Dutta, K., Chaudhuri, R. R., & Saha, A. (2015). Li-Fi
Technology: Data through illumination. American Journal of
Advanced Computing, Vol. II (2), 37-40.
Ergul, O., Dinc, E., & Akan, O. B. (2015). Communicate to
illuminate: State-of-the-art and research challenges for visible
light communications. Physical Communication, 17, 72-85.
DOI: 10.1016/j.phycom.2015.08.003
Gupta, S. U. (2015). Research on Li-Fi Technology&
Comparison of Li-Fi/Wi-Fi. International Journal of Advanced
Research in Computer Science and Software Engineering, 5(6).
Haas, H., & Chen, C. (2015). What is Li-Fi??. In Optical
Communication (ECOC), 2015 European Conference on (pp. 1-
3). IEEE.
Haas, H. (2016). LiFi: Conceptions, misconceptions, and
opportunities. In Photonics Conference (IPC), 2016 IEEE (pp.
680-681). IEEE.
Hadi, M. A. (2016). Wireless Communication tends to Smart
Technology Li-Fi and its comparison with Wi-Fi. American
Journal of Engineering Research (AJER), 5(5), 40-47.
Halper, M. (2017). Li-Fi Promises Two-way Internet via Light
Waves. Retrieved from https://cacm.acm.org/news/213948-li-fi-
promises-two-way-internet-via-light-waves/fulltext#
Khan, L. U. (2017). Visible light communication: Applications,
architecture, standardization and research challenges. Digital
Communications and Networks, 3(2), 78-88. DOI:
10.1016/j.dcan.2016.07.004
Sarkar, A., Agarwal, S., & Nath, A. (2015). Li-Fi technology:
Data transmission through visible light. International Journal,
3(6).
Singh, G. (2015). Li-Fi (Light Fidelity)-An Overview to future
Wireless technology in Field of Data Communication. Journal
of Network Communications and Emerging Technologies
8. (JNCET)(www.jncet.org) Volume, 5.
Myths About Indulgences Handout Questions Part I - Myths
Name:_______________________________________________
_____ Block:_____
Please read the Myths About Indulgences handout and respond
to the following. This assignment is due before you leave.
1. After reading the definition, please explain what an
indulgence is in your own words.
2. Why is it false to say that indulgences can buy your way out
of hell?
3. What is the only way we can try to avoid hell?
4. Why is it wrong to say that indulgences can be bought for
sins that you have not yet committed?
5. Can a person “buy” forgiveness? Why or why not?
6. Where did the idea of indulgences develop?
7. Why is it not true to say that an indulgence will shorten your
time in purgatory?
9. 8. How did Pope Pius V demonstrate the Church’s seriousness
when it came to trying to avoid abuses involving indulgences?
9. Explain why it is false to say that the Church “sold”
indulgences. Why was money involved at all in relation to
indulgences? How did this go wrong in some instances?
10. Is there something essentially evil in donating to the needs
of the Church? If yes, why? If no, why not?
Myths about Indulgences
Indulgences. The very word stirs up more misconceptions than
perhaps any other teaching in Catholic theology. Those who
attack the Church for its use of indulgences rely upon—and take
advantage of—the ignorance of both Catholics and non-
Catholics.
What is an indulgence? The Church explains, "An indulgence is
a remission before God of the temporal punishment due to sins
whose guilt has already been forgiven, which the faithful
Christian who is duly disposed gains under certain defined
conditions through the Church’s help when, as a minister of
redemption, she dispenses and applies with authority the
treasury of the satisfactions won by Christ and the saints"
(Indulgentarium Doctrina 1). To see the biblical foundations for
indulgences, see the Catholic Answers tract A Primer on
Indulgences.
10. Step number one in explaining indulgences is to know what they
are. Step number two is to clarify what they are not. Here are
the seven most common myths about indulgences:
Myth 1: A person can buy his way out of hell with indulgences.
This charge is without foundation. Since indulgences remit only
temporal penalties, they cannot remit the eternal penalty of hell.
Once a person is in hell, no amount of indulgences will ever
change that fact. The only way to avoid hell is by appealing to
God’s eternal mercy while still alive. After death, one’s eternal
fate is set (Heb. 9:27).
Myth 2: A person can buy indulgences for sins not yet
committed.
The Church has always taught that indulgences do not apply to
sins not yet committed. The Catholic Encyclopedia notes, "[An
indulgence] is not a permission to commit sin, nor a pardon of
future sin; neither could be granted by any power."
Myth 3: A person can "buy forgiveness" with indulgences.
The definition of indulgences presupposes that forgiveness has
already taken place: "An indulgence is a remission before God
of the temporal punishment due to sins whose guilt has already
been forgiven" (Indulgentarium Doctrina 1, emphasis added).
Indulgences in no way forgive sins. They deal only with
punishments left after sins have been forgiven.
Myth 4: Indulgences were invented as a means for the Church to
raise money.
Indulgences developed from reflection on the sacrament of
reconciliation. They are a way of shortening the penance of
sacramental discipline and were in use centuries before money-
related problems appeared.
Myth 5: An indulgence will shorten your time in purgatory by a
fixed number of days.
The number of days which used to be attached to indulgences
11. were references to the period of penance one might undergo
during life on earth. The Catholic Church does not claim to
know anything about how long or short purgatory is in general,
much less in a specific person’s case.
Myth 6: A person can buy indulgences.
The Council of Trent instituted severe reforms in the practice of
granting indulgences, and, because of prior abuses, "in 1567
Pope Pius V canceled all grants of indulgences involving any
fees or other financial transactions" (Catholic Encyclopedia).
This act proved the Church’s seriousness about removing abuses
from indulgences.
Myth 7: A person used to be able to buy indulgences.
One never could "buy" indulgences. The financial scandal
surrounding indulgences, the scandal that gave Martin Luther an
excuse for his heterodoxy (dissent), involved alms—indulgences
in which the giving of alms to some charitable fund or
foundation was used as the occasion to grant the indulgence.
There was no outright selling of indulgences. The Catholic
Encyclopedia states: "[I]t is easy to see how abuses crept in.
Among the good works which might be encouraged by being
made the condition of an indulgence, almsgiving would
naturally hold a conspicuous place. . . . It is well to observe that
in these purposes there is nothing essentially evil. To give
money to God or to the poor is a praiseworthy act, and, when it
is done from right motives, it will surely not go unrewarded."
Being able to explain these seven myths will be a large step in
helping others to understand indulgences. But, there are still
questions to be asked:
"How many of one’s temporal penalties can be remitted?"
Potentially, all of them. The Church recognizes that Christ and
the saints are interested in helping penitents deal with the
aftermath of their sins, as indicated by the fact they always pray
12. for us (Heb. 7:25, Rev. 5:8). Fulfilling its role in the
administration of temporal penalties, the Church draws upon the
rich supply of rewards God chose to bestow on the saints, who
pleased him, and on his Son, who pleased him most of all.
The rewards on which the Church draws are infinite because
Christ is God, so the rewards he accrued are infinite and never
can be exhausted. His rewards alone, apart from the saints’,
could remove all temporal penalties from everyone, everywhere.
The rewards of the saints are added to Christ’s—not because
anything is lacking in his, but because it is fitting that they be
united with his rewards as the saints are united with him.
Although immense, their rewards are finite, but his are infinite.
"If the Church has the resources to wipe out everyone’s
temporal penalties, why doesn’t it do so?"
Because God does not wish this to be done. God himself
instituted the pattern of temporal penalties being left behind.
They fulfill valid functions, one of them disciplinary. If a child
were never disciplined, he would never learn obedience. God
disciplines us as his children — "the Lord disciplines him whom
he loves, and chastises every son whom he receives" (Heb.
12:6) — so some temporal penalties must remain.
The Church cannot wipe out, with a stroke of the pen, so to
speak, everyone’s temporal punishments because their remission
depends on the dispositions of the persons who suffer those
temporal punishments. Just as repentance and faith are needed
for the remission of eternal penalties, so they are needed for the
remission of temporal penalties. Pope Paul VI stated,
"Indulgences cannot be gained without a sincere conversion of
outlook and unity with God"(Indulgentarium Doctrina 11). We
might say that the degree of remission depends on how well the
penitent has learned his lesson.
"How does one determine by what amount penalties have been
13. lessened?"
Before Vatican II each indulgence was said to remove a certain
number of "days" from one’s discipline—for instance, an act
might gain "300 days’ indulgence"—but the use of the term
"days" confused people, giving them the mistaken impression
that in purgatory time as we know it still exists and that we can
calculate our "good time" in a mechanical way. The number of
days associated with indulgences actually never meant that that
much "time" would be taken off one’s stay in purgatory.
Instead, it meant that an indefinite but partial (not complete)
amount of remission would be granted, proportionate to what
ancient Christians would have received for performing that
many days’ penance. So, someone gaining 300 days’ indulgence
gained roughly what an early Christian would have gained by,
say, reciting a particular prayer on arising for 300 days.
To overcome the confusion Paul VI issued a revision of the
handbook (Enchiridion is the formal name) of indulgences.
Today, numbers of days are not associated with indulgences.
They are either plenary or partial.
"What’s the difference between a partial and a plenary
indulgence?"
"An indulgence is partial or plenary according as it removes
either part or all of the temporal punishment due to sin"
(Indulgentarium Doctrina 2, 3). Only God knows exactly how
efficacious any particular partial indulgence is or whether a
plenary indulgence was received at all.
"Don’t indulgences duplicate or even negate the work of
Christ?"
Despite the biblical underpinnings of indulgences, some are
sharply critical of them and insist the doctrine supplants the
work of Christ and turns us into our own saviors. This objection
14. results from confusion about the nature of indulgences and
about how Christ’s work is applied to us.
Indulgences apply only to temporal penalties, not to eternal
ones. The Bible indicates that these penalties may remain after a
sin has been forgiven and that God lessens these penalties as
rewards to those who have pleased him. Since the Bible
indicates this, Christ’s work cannot be said to have been
supplanted by indulgences.
The merits of Christ, since they are infinite, comprise most of
those in the treasury of merits. By applying these to believers,
the Church acts as Christ’s servant in the application of what he
has done for us, and we know from Scripture that Christ’s work
is applied to us over time and not in one big lump (Phil. 2:12, 1
Pet. 1:9).
"Isn’t it better to put all of the emphasis on Christ alone?"
If we ignore the fact of indulgences, we neglect what Christ
does through us, and we fail to recognize the value of what he
has done in us. Paul used this very sort of language: "Now I
rejoice in my sufferings for your sake, and in my flesh I
complete what is lacking in Christ’s afflictions for the sake of
his body, that is, the church" (Col. 1:24).
Even though Christ’s sufferings were superabundant (far more
than needed to pay for anything), Paul spoke of completing
what was "lacking" in Christ’s sufferings. If this mode of
speech was permissible for Paul, it is permissible for us, even
though the Catholic language about indulgences is far less
shocking than was Paul’s language about his own role in
salvation.
Catholics should not be defensive about indulgences. They are
based on principles straight from the Bible, and we can be
15. confident not only that indulgences exist, but that they are
useful and worth obtaining.
Pope Paul VI declared, "[T]he Church invites all its children to
think over and weigh up in their minds as well as they can how
the use of indulgences benefits their lives and all Christian
society.... Supported by these truths, holy Mother Church again
recommends the practice of indulgences to the faithful. It has
been very dear to Christian people for many centuries as well as
in our own day. Experience proves this" (Indulgentarium
Doctrina, 9, 11).
HOW TO GAIN AN INDULGENCE
To gain any indulgence you must be a Catholic in a state of
grace. You must be a Catholic in order to be under the Church’s
jurisdiction, and you must be in a state of grace because apart
from God’s grace none of your actions are fundamentally
pleasing to God (meritorious). You also must have at least the
habitual intention of gaining an indulgence by the act
performed.
To gain a partial indulgence, you must perform with a contrite
heart the act to which the indulgence is attached.
To gain a plenary indulgence you must perform the act with a
contrite heart, plus you must go to confession (one confession
may suffice for several plenary indulgences), receive Holy
Communion, and pray for the pope’s intentions. (An Our Father
and a Hail Mary said for the pope’s intentions are sufficient,
although you are free to substitute other prayers of your own
choice.) The final condition is that you must be free from all
attachment to sin, including venial sin.
If you attempt to receive a plenary indulgence, but are unable to
meet the last condition, a partial indulgence is received instead.
16. Below are indulgences listed in the Handbook of
Indulgences (New York: Catholic Book Publishing, 1991). Note
that there is an indulgence for Bible reading. So, rather than
discouraging Bible reading, the Catholic Church promotes it by
giving indulgences for it! (This was the case long before
Vatican II.)
• An act of spiritual communion, expressed in any devout
formula whatsoever, is endowed with a partial indulgence.
• A partial indulgence is granted the Christian faithful who
devoutly spend time in mental prayer.
• A plenary indulgence is granted when the rosary is recited in a
church or oratory or when it is recited in a family, a religious
community, or a pious association. A partial indulgence is
granted for its recitation in all other circumstances.
• A partial indulgence is granted the Christian faithful who read
sacred Scripture with the veneration due God’s word and as a
form of spiritual reading. The indulgence will be a plenary one
when such reading is done for at least one-half hour [provided
the other conditions are met].
• A partial indulgence is granted to the Christian faithful who
devoutly sign themselves with the cross while saying the
customary formula: "In the name of the Father, and of the Son,
and of the Holy Spirit. Amen."
In summary, the practice of indulgences neither takes away nor
adds to the work of Christ. It is his work, through his body the
Church, raising up children in his own likeness. "The Christian
who seeks to purify himself of his sin and to become holy with
the help of God’s grace is not alone. ‘The life of each of God’s
children is joined in Christ and through Christ in a wonderful
17. way to the life of all the other Christian brethren in the
supernatural unity of the Mystical Body of Christ, as in a single
mystical person’" (Catechism of the Catholic Church 1474
[Indulgentarium Doctrina 5]).
NIHIL OBSTAT: I have concluded that the materials
presented in this work are free of doctrinal or moral errors.
Bernadeane Carr, STL, Censor Librorum, August 10,
2004IMPRIMATUR: In accord with 1983 CIC 827
permission to publish this work is hereby granted.
+Robert H. Brom, Bishop of San Diego, August 10, 2004
https://www.catholic.com/tract/myths-about-indulgences