Project Deliverable 1
This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment.
Label each file name according to the section of the assignment it is written for.
Additionally, you may create and/or assume all necessary assumptions needed for the completion of this assignment.
-------------------------------------/
Section 1: Project Introduction
Write a four to six (4-6) page project introduction that documents the current state of the organization, expands upon the information given above, and includes the following:
Background information of the company.
Details regarding the type of business that the company is engaged in.
A description of current outsourcing and off shoring activities.
Identification of current skilled information systems personnel in position and responsibilities.
The specific types of data that the company collects.
A description of the information systems that the company currently has to support the business. The description at a minimum should include the following:
Operational Systems and Databases
Analytics and Interfaces
Infrastructure and Security
The use of at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Use a title page, abstract, in-text citations and references
---------------------------------------------------------------------------------------
Section 2: Project Plan
Use Microsoft Project to:
Create a project plan (summary and detailed) using Microsoft Office Project. The project plan should:
Record all tasks, subtasks, resources, and time-related to the project.
Outline the planning, analysis, design, and implementation phases.
Develop in accordance with the systems development lifecycle (SDLC).
---------------------------------------------------------------------------------------------------------
See below on how to setup up your Project Plan using the Project Management Phases
For this assignment, we will we use at least four of the PMI Phases.
Initiating or Initiation, Planning, Executing and Closing
See the Video below on how to incorporate this requirement.
Reference
Microsoft Project for Software Developers Tutorial | Adding The Phase And Section Headings. (2014, February 28). Retrieved fromhttps://www.youtube.com/watch?v=6dr1LGJb1I4
------------------------------------------------------------------------------------------------------
See below the details on the SDLC
1. Planning
This is the first phase of the systems development process. Identify whether or not there is the need for a new system to achieve the business"s strategic objectives.
2. Systems Analysis and Requirements
The second phase is where businesses will work on the source of their problem or the need for a change. In the event of a problem, possible solutions are submitted and analyzed to identify the best fit for the ultim.
Workplace Violence Prevention: A Practical Guide to Security on the Job provides thorough examinations of the many levels and types of workplace violence prevention, and how to deal with the issue systematically.
For this Unit 4 assignment, you will prepare an APA-formatted essa.docxhanneloremccaffery
For this Unit 4 assignment, you will prepare an APA-formatted essay of at least 500 words reflecting the opposing view of the topic that you selected in Unit 3.
When preparing an informative or expository essay, it is important to identify multiple perspectives. Investigating all sides of a topic enables you to interpret a larger picture and prepare logical content. In Unit 3, you selected a topic question, determined a viewpoint, and created your assignment based on that viewpoint. For Unit 4, you will write an APA-formatted essay on the opposite viewpoint of your selected topic.
Specifically, your submission must include the following:
· A title page with the correct APA formatting
· An abstract page with correct APA formatting
· An introduction paragraph based on the opposing viewpoint of your Unit 3 topic question
· This requires the creation of a new thesis statement.
· It requires 3 supporting subtopics.
· It requires the new thesis statement to be the last sentence of the introduction paragraph.
· Develop at least 3 transitional paragraphs. Transitional paragraphs are the expanded paragraph information based on your thesis subtopics.
· Develop a concluding paragraph. Remember to restate your thesis statement in the conclusion.
Readings and Notes “Levels of Evaluation”
Policy Evaluation
The notion of “systematic” policy and program evaluation only dates back to the 1970s when questions were raised about the outcomes of the Johnson era's War on Poverty programs. Simply, the poor did not seem too much better off, despite some programmatic attention--and dollars--spent on improving their situation. This story ends as it began. Recall that the first week discussed the emergence of hyperfederalism in which all parties (jurisdictions and agencies) try to get as much of the others' share without too much common (national) public good associated with their efforts.
One of the better-known War on Poverty programs was called the Model Cities Program. The original (White House) idea for this program was experimental. It called for funding a small number of large cities, such as New York, Philadelphia and Chicago with especially acute slum problems. When the bill went to Congress, it was clear that unless the base of (support for) the program grew, it would not pass. (Recall GCT on expanding the base to insure a bill's passage often waters down its original intentions, or, dissipates them.) A then leading senator, Senator Edward Muskie (D-Maine) said he would only vote for the bill if cities such as Augusta, Bangor and Portland were made eligible for aid. The bill passed in 1966 and even small cities like Poughkeepsie were not only eligible, but received money as well for public housing projects. By most people's sights, the program utterly failed to reduce the existence of slums anywhere. No one now knows whether the original intentions might have led to a greater chance for program success. Instead of massive funding for a few projects, t ...
HIM 500 Milestone Two Guidelines and Rubric
Overview: In this milestone, you will submit an analysis of how the company in the case study is noncompliant and the strategies (general, not specifics) to move
it toward compliance.
Specifically the following critical elements must be addressed:
II. Health Regulations and Laws Ramifications: In this section of your final project, you will finish your preparation by reviewing and explaining the
ramifications for the organization if it decides to wait on addressing its recent violations regarding technology use.
A. Determine how violating health regulations and laws regarding technology could impact the finances of the institution if these violations are not
addressed. Be sure to support your response with examples.
B. Determine how violating health regulations and laws regarding technology could impact the daily operations of the institution if these violations
are not addressed. Be sure to support your response with examples.
C. Determine how violating health regulations and laws regarding technology could impact the security of the health information in the institution
if these violations are not addressed. Be sure to support your response with examples.
Guidelines for Submission: This milestone must be 1–2 pages in length (plus a cover page and references) and must be written in APA format. Use double
spacing, 12-point Times New Roman font, and one-inch margins. All references cited in APA format.
Critical Elements Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value
Health Regulations and
Laws Ramifications:
Finances
Determines how violating health
regulations and laws regarding
technology might impact the
finances of the institution if these
violations are not addressed,
supporting response with
examples
Determines how violating health
regulations and laws regarding
technology might impact the
finances of the institution if these
violations are not addressed,
supporting response with
examples, but explanation is
cursory or illogical, or supporting
examples are misaligned
Does not determine how violating
health regulations and laws
regarding technology might
impact the finances of the
institution if these violations are
not addressed
30
Health Regulations and
Laws Ramifications: Daily
Operations
Determines how violating health
regulations and laws regarding
technology might impact the
daily operations of the institution
if these violations are not
addressed, supporting response
with examples
Determines how violating health
regulations and laws regarding
technology might impact the
daily operations of the institution
if these violations are not
addressed, supporting response
with examples but explanation is
cursory or illogical, or supporting
examples are misaligned
Does not determine how violating
health regulations and laws
regarding technology might
impac ...
FN3440 Project 1 P ROJECT D ES CRIP TION .docxAKHIL969626
FN3440
Project
1
P ROJECT D ES CRIP TION
Project Introduction:
This project signifies a milestone for you in your quest to earn an associate’s degree in the Business Accounting
Technology program. The focus of a financial analysis is to help management identify potential issues in the
organization. A horizontal analysis compares the income statement and balance sheet information of different periods
for the same organization. A vertical analysis uses the relationships among financial statement data elements to detect
trends. A ratio analysis uses the relationships among various financial elements to measure liquidity, efficiency, and
solvency. In this project, you need to carry out a financial analysis and comparisons for three different companies.
Course Objectives Tested:
1. Analyze the logic behind the determination of interest rates and the required rates of return in the capital
markets.
2. Compute a firm’s debt ratio to ascertain how the firm is financing its assets.
3. Calculate the present and future value of an investment and an annuity.
4. Demonstrate how portfolio diversification can affect the expected return and the riskiness of investments.
5. Compute the present and future value of a bond under conditions of varying market interest rates.
6. Research and use the guidelines for capital budgeting to evaluate investment proposals. Measure a project’s
free cash flows.
7. Calculate the cost of debt capital, preferred stock, and common stock.
P ROJECT S UBMIS S ION P LA N
Description/Requirements of Project Evaluation Criteria
Assessment Preparation Checklist:
Perform the following tasks to prepare for this assessment:
Review the topic “Project Reckoner” in Week 6 online
lesson.
Read Chapters 1–6, pp. 1–187, from your textbook,
Foundations of Finance: The Logic and Practice of
Financial Management. These chapters will help you
while you are completing your research and compiling
the ratios. The financial analysis will further enhance
Did you analyze the trend for each
ratio during the three year timeframe?
Did you compare the three company’s
ratios properly?
Did you provide sufficient rationale to
justify your analysis of ratios for each
company?
Did you effectively and completely
answer all the questions contained in
project detail three?
FN3440
Project
2
Description/Requirements of Project Evaluation Criteria
your conceptual understanding of the material.
Title: Financial Analysis
1. Identify three companies from the Standard and Poor’s
500 Companies found in the ITT Tech Virtual Library. Two
of the companies should be in the same industry Global
Industry Classification Standards (GICS) while one should
be from a different industry segment.
2. Obtain the financial information for the selected
companies for the last three years by visiting the
individual company website and utilizing the Investor ...
Instruction for the Final ReportAdministration Cybersecurity Pol.docxcarliotwaycave
The document provides instructions for a final report on administration cybersecurity policy that should include:
- A review of current and prior administration cybersecurity policies and their key tenets.
- An analysis of FISMA and the role of NIST in cybersecurity standards and guidelines.
- A statement agreeing or disagreeing with the idea that not all agencies need strict cybersecurity policies since attacks cause no real harm.
The report should be tailored for a non-technical audience and address cybersecurity issues, policies, standards, stakeholders, and defense vs attack strategies. Templates and modules are provided to help with researching administration policies, comparing FISMA and NIST, and drafting the final report.
ISSUES 2
3-2 Milestone One: Submit Selection of Contemporary Criminal Justice Issue
Destiny Nance
ISSUES 2
Southern New Hampshire University
In every other nation, the criminal justice system plays a very huge role in delivering justice and punishing those who break the law. However, all around the globe, there are several issues that almost every other justice system is struggling to deal with. One of the most common issues that are being dealt with is the issue of inordinate/ excessive use of force by law enforcement. In the least technical terms possible, the use of excessive force can be defined as the use of too much force by the police when dealing with people. In most cases, the use of this excess force may end up harming the same people that the police forces are initially supposed to protect. Even though police forces are punishable by the courts of law for use of excessive force, the issue remains one of the major issues that affect the criminal system to date. (Hargreaves‐Heap, 2002).
In the modern day, people tend to think that excessive use of force by police officers is an issue of the past and one that no one should talk about. However, this is not all true as discrimination has not ended but has only evolved. In the old days, policemen mainly used excessive force on people of color or even slaves who at that time did not have rights that could make the officers be punished for doing this. However, in the modern days, the issue has evolved all over the globe, there have been cases where policemen have used excessive force on their subjects regardless of their color. One of the things that have made the issue keep changing is the advancement of technology where police officers are expected to wear body cams that will monitor all their actions while on duty. different amendments that have been made to the constitution with the main aim of empowering people of color.
For quite some time now, people have been fighting against the use of excessive force. However, I believe that recently there might have been a breakthrough all because of technology. technology has changed people's perspectives especially by showing them how brutal police officers can be when they use excessive force. For instance, in the year 2020, a man named George Floyd was murdered by a police officer due to the use of excessive force. The video of the incident went viral and people came together to protest against the issue. This was one of the biggest protests where people protested together regardless of their color, culture, and even location (Hutson, 2009).
References
Ajilore, O., & Shirey, S. (2017). Do# AllLivesMatter? An evaluation of race and exc ...
Outline TemplateIntroductionIntroduce the topic with background .docxgerardkortney
Outline Template
IntroductionIntroduce the topic with background information and define terminology
Body Paragraph 1 – Technical aspects of your topicTopic Sentence:_________________________________________________Supporting detail 1:________________________________________
Supporting detail 2:________________________________________
Supporting detail 3:________________________________________
Body Paragraph 2 – Description of public policy debates surrounding your topicTransition:_____________________________________________________
Topic Sentence:_________________________________________________Supporting detail 1:________________________________________
Supporting detail 2:________________________________________
Supporting detail 3:________________________________________
Body Paragraph 3 -ArgumentsTransition:_____________________________________________________
Topic Sentence:_________________________________________________Supporting detail 1:________________________________________
Supporting detail 2:________________________________________
Supporting detail 3:________________________________________
Body Paragraph 4 - ArgumentsTransition:_____________________________________________________
Topic Sentence:_________________________________________________Supporting detail 1:________________________________________
Supporting detail 2:________________________________________
Supporting detail 3:________________________________________
Opinion and ConclusionTransition:_____________________________________________________Statement of Opinion:_____ _______________________________________
POLICY PAPER GUIDANCE ***MUST CITE WORK WITH PAGE NUMBER****
You have a lot of guidance already! There is a second Announcement following this one. Just to remind you all of the core goals:
1. Identify the leading NGO that deals with your problem area (e.g., human rights) and the corresponding UN agency. Search for materials relating to their findings. This CAN be from the open web.
2. Starting with the paywalled database JSTOR, begin searching for scholarly articles on your subject. Branch out from there as needed. CITE!!! There was an issue with plagiarism on the PDE Film Response. Please be careful. Protect yourself by offering citations for anything that is not your original idea.
You need a minimum of two (2) policy reports from an NGO and two (2) peer-reviewed academic papers.
As a reminder, I posted detailed overviews of where to search and how in previous Announcements. Please review the Policy Paper-focused Announcements.
Those seeking to utilize the UN document delivery service can find the URL here:
http://www.un.org/en/databases/index.html
Additional Guidance and Rubric - Policy Paper
Posted on: Wednesday, December 6, 2017 8:20:35 AM EST
The main guidance has been offered already in the form of two Announcements. Please scroll down through the Announcements until you find them...
The additional guidance today relates to s.
Workplace Violence Prevention: A Practical Guide to Security on the Job provides thorough examinations of the many levels and types of workplace violence prevention, and how to deal with the issue systematically.
For this Unit 4 assignment, you will prepare an APA-formatted essa.docxhanneloremccaffery
For this Unit 4 assignment, you will prepare an APA-formatted essay of at least 500 words reflecting the opposing view of the topic that you selected in Unit 3.
When preparing an informative or expository essay, it is important to identify multiple perspectives. Investigating all sides of a topic enables you to interpret a larger picture and prepare logical content. In Unit 3, you selected a topic question, determined a viewpoint, and created your assignment based on that viewpoint. For Unit 4, you will write an APA-formatted essay on the opposite viewpoint of your selected topic.
Specifically, your submission must include the following:
· A title page with the correct APA formatting
· An abstract page with correct APA formatting
· An introduction paragraph based on the opposing viewpoint of your Unit 3 topic question
· This requires the creation of a new thesis statement.
· It requires 3 supporting subtopics.
· It requires the new thesis statement to be the last sentence of the introduction paragraph.
· Develop at least 3 transitional paragraphs. Transitional paragraphs are the expanded paragraph information based on your thesis subtopics.
· Develop a concluding paragraph. Remember to restate your thesis statement in the conclusion.
Readings and Notes “Levels of Evaluation”
Policy Evaluation
The notion of “systematic” policy and program evaluation only dates back to the 1970s when questions were raised about the outcomes of the Johnson era's War on Poverty programs. Simply, the poor did not seem too much better off, despite some programmatic attention--and dollars--spent on improving their situation. This story ends as it began. Recall that the first week discussed the emergence of hyperfederalism in which all parties (jurisdictions and agencies) try to get as much of the others' share without too much common (national) public good associated with their efforts.
One of the better-known War on Poverty programs was called the Model Cities Program. The original (White House) idea for this program was experimental. It called for funding a small number of large cities, such as New York, Philadelphia and Chicago with especially acute slum problems. When the bill went to Congress, it was clear that unless the base of (support for) the program grew, it would not pass. (Recall GCT on expanding the base to insure a bill's passage often waters down its original intentions, or, dissipates them.) A then leading senator, Senator Edward Muskie (D-Maine) said he would only vote for the bill if cities such as Augusta, Bangor and Portland were made eligible for aid. The bill passed in 1966 and even small cities like Poughkeepsie were not only eligible, but received money as well for public housing projects. By most people's sights, the program utterly failed to reduce the existence of slums anywhere. No one now knows whether the original intentions might have led to a greater chance for program success. Instead of massive funding for a few projects, t ...
HIM 500 Milestone Two Guidelines and Rubric
Overview: In this milestone, you will submit an analysis of how the company in the case study is noncompliant and the strategies (general, not specifics) to move
it toward compliance.
Specifically the following critical elements must be addressed:
II. Health Regulations and Laws Ramifications: In this section of your final project, you will finish your preparation by reviewing and explaining the
ramifications for the organization if it decides to wait on addressing its recent violations regarding technology use.
A. Determine how violating health regulations and laws regarding technology could impact the finances of the institution if these violations are not
addressed. Be sure to support your response with examples.
B. Determine how violating health regulations and laws regarding technology could impact the daily operations of the institution if these violations
are not addressed. Be sure to support your response with examples.
C. Determine how violating health regulations and laws regarding technology could impact the security of the health information in the institution
if these violations are not addressed. Be sure to support your response with examples.
Guidelines for Submission: This milestone must be 1–2 pages in length (plus a cover page and references) and must be written in APA format. Use double
spacing, 12-point Times New Roman font, and one-inch margins. All references cited in APA format.
Critical Elements Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value
Health Regulations and
Laws Ramifications:
Finances
Determines how violating health
regulations and laws regarding
technology might impact the
finances of the institution if these
violations are not addressed,
supporting response with
examples
Determines how violating health
regulations and laws regarding
technology might impact the
finances of the institution if these
violations are not addressed,
supporting response with
examples, but explanation is
cursory or illogical, or supporting
examples are misaligned
Does not determine how violating
health regulations and laws
regarding technology might
impact the finances of the
institution if these violations are
not addressed
30
Health Regulations and
Laws Ramifications: Daily
Operations
Determines how violating health
regulations and laws regarding
technology might impact the
daily operations of the institution
if these violations are not
addressed, supporting response
with examples
Determines how violating health
regulations and laws regarding
technology might impact the
daily operations of the institution
if these violations are not
addressed, supporting response
with examples but explanation is
cursory or illogical, or supporting
examples are misaligned
Does not determine how violating
health regulations and laws
regarding technology might
impac ...
FN3440 Project 1 P ROJECT D ES CRIP TION .docxAKHIL969626
FN3440
Project
1
P ROJECT D ES CRIP TION
Project Introduction:
This project signifies a milestone for you in your quest to earn an associate’s degree in the Business Accounting
Technology program. The focus of a financial analysis is to help management identify potential issues in the
organization. A horizontal analysis compares the income statement and balance sheet information of different periods
for the same organization. A vertical analysis uses the relationships among financial statement data elements to detect
trends. A ratio analysis uses the relationships among various financial elements to measure liquidity, efficiency, and
solvency. In this project, you need to carry out a financial analysis and comparisons for three different companies.
Course Objectives Tested:
1. Analyze the logic behind the determination of interest rates and the required rates of return in the capital
markets.
2. Compute a firm’s debt ratio to ascertain how the firm is financing its assets.
3. Calculate the present and future value of an investment and an annuity.
4. Demonstrate how portfolio diversification can affect the expected return and the riskiness of investments.
5. Compute the present and future value of a bond under conditions of varying market interest rates.
6. Research and use the guidelines for capital budgeting to evaluate investment proposals. Measure a project’s
free cash flows.
7. Calculate the cost of debt capital, preferred stock, and common stock.
P ROJECT S UBMIS S ION P LA N
Description/Requirements of Project Evaluation Criteria
Assessment Preparation Checklist:
Perform the following tasks to prepare for this assessment:
Review the topic “Project Reckoner” in Week 6 online
lesson.
Read Chapters 1–6, pp. 1–187, from your textbook,
Foundations of Finance: The Logic and Practice of
Financial Management. These chapters will help you
while you are completing your research and compiling
the ratios. The financial analysis will further enhance
Did you analyze the trend for each
ratio during the three year timeframe?
Did you compare the three company’s
ratios properly?
Did you provide sufficient rationale to
justify your analysis of ratios for each
company?
Did you effectively and completely
answer all the questions contained in
project detail three?
FN3440
Project
2
Description/Requirements of Project Evaluation Criteria
your conceptual understanding of the material.
Title: Financial Analysis
1. Identify three companies from the Standard and Poor’s
500 Companies found in the ITT Tech Virtual Library. Two
of the companies should be in the same industry Global
Industry Classification Standards (GICS) while one should
be from a different industry segment.
2. Obtain the financial information for the selected
companies for the last three years by visiting the
individual company website and utilizing the Investor ...
Instruction for the Final ReportAdministration Cybersecurity Pol.docxcarliotwaycave
The document provides instructions for a final report on administration cybersecurity policy that should include:
- A review of current and prior administration cybersecurity policies and their key tenets.
- An analysis of FISMA and the role of NIST in cybersecurity standards and guidelines.
- A statement agreeing or disagreeing with the idea that not all agencies need strict cybersecurity policies since attacks cause no real harm.
The report should be tailored for a non-technical audience and address cybersecurity issues, policies, standards, stakeholders, and defense vs attack strategies. Templates and modules are provided to help with researching administration policies, comparing FISMA and NIST, and drafting the final report.
ISSUES 2
3-2 Milestone One: Submit Selection of Contemporary Criminal Justice Issue
Destiny Nance
ISSUES 2
Southern New Hampshire University
In every other nation, the criminal justice system plays a very huge role in delivering justice and punishing those who break the law. However, all around the globe, there are several issues that almost every other justice system is struggling to deal with. One of the most common issues that are being dealt with is the issue of inordinate/ excessive use of force by law enforcement. In the least technical terms possible, the use of excessive force can be defined as the use of too much force by the police when dealing with people. In most cases, the use of this excess force may end up harming the same people that the police forces are initially supposed to protect. Even though police forces are punishable by the courts of law for use of excessive force, the issue remains one of the major issues that affect the criminal system to date. (Hargreaves‐Heap, 2002).
In the modern day, people tend to think that excessive use of force by police officers is an issue of the past and one that no one should talk about. However, this is not all true as discrimination has not ended but has only evolved. In the old days, policemen mainly used excessive force on people of color or even slaves who at that time did not have rights that could make the officers be punished for doing this. However, in the modern days, the issue has evolved all over the globe, there have been cases where policemen have used excessive force on their subjects regardless of their color. One of the things that have made the issue keep changing is the advancement of technology where police officers are expected to wear body cams that will monitor all their actions while on duty. different amendments that have been made to the constitution with the main aim of empowering people of color.
For quite some time now, people have been fighting against the use of excessive force. However, I believe that recently there might have been a breakthrough all because of technology. technology has changed people's perspectives especially by showing them how brutal police officers can be when they use excessive force. For instance, in the year 2020, a man named George Floyd was murdered by a police officer due to the use of excessive force. The video of the incident went viral and people came together to protest against the issue. This was one of the biggest protests where people protested together regardless of their color, culture, and even location (Hutson, 2009).
References
Ajilore, O., & Shirey, S. (2017). Do# AllLivesMatter? An evaluation of race and exc ...
Outline TemplateIntroductionIntroduce the topic with background .docxgerardkortney
Outline Template
IntroductionIntroduce the topic with background information and define terminology
Body Paragraph 1 – Technical aspects of your topicTopic Sentence:_________________________________________________Supporting detail 1:________________________________________
Supporting detail 2:________________________________________
Supporting detail 3:________________________________________
Body Paragraph 2 – Description of public policy debates surrounding your topicTransition:_____________________________________________________
Topic Sentence:_________________________________________________Supporting detail 1:________________________________________
Supporting detail 2:________________________________________
Supporting detail 3:________________________________________
Body Paragraph 3 -ArgumentsTransition:_____________________________________________________
Topic Sentence:_________________________________________________Supporting detail 1:________________________________________
Supporting detail 2:________________________________________
Supporting detail 3:________________________________________
Body Paragraph 4 - ArgumentsTransition:_____________________________________________________
Topic Sentence:_________________________________________________Supporting detail 1:________________________________________
Supporting detail 2:________________________________________
Supporting detail 3:________________________________________
Opinion and ConclusionTransition:_____________________________________________________Statement of Opinion:_____ _______________________________________
POLICY PAPER GUIDANCE ***MUST CITE WORK WITH PAGE NUMBER****
You have a lot of guidance already! There is a second Announcement following this one. Just to remind you all of the core goals:
1. Identify the leading NGO that deals with your problem area (e.g., human rights) and the corresponding UN agency. Search for materials relating to their findings. This CAN be from the open web.
2. Starting with the paywalled database JSTOR, begin searching for scholarly articles on your subject. Branch out from there as needed. CITE!!! There was an issue with plagiarism on the PDE Film Response. Please be careful. Protect yourself by offering citations for anything that is not your original idea.
You need a minimum of two (2) policy reports from an NGO and two (2) peer-reviewed academic papers.
As a reminder, I posted detailed overviews of where to search and how in previous Announcements. Please review the Policy Paper-focused Announcements.
Those seeking to utilize the UN document delivery service can find the URL here:
http://www.un.org/en/databases/index.html
Additional Guidance and Rubric - Policy Paper
Posted on: Wednesday, December 6, 2017 8:20:35 AM EST
The main guidance has been offered already in the form of two Announcements. Please scroll down through the Announcements until you find them...
The additional guidance today relates to s.
Running head THE COST OF INADEQUATE CONTROLS .docxtodd521
Running head: THE COST OF INADEQUATE CONTROLS 1
THE COST OF INADEQUATE CONTROLS 7
Assignment 2
The Cost Of Inadequate Controls
i) The annual loss of revenue
Investing in data security is an important function of LOTR Experience. There is a need to ensure that the company has adequate controls in terms of IT personnel as well as IT equipment. This will save the company from incurring losses in multiple areas that are a concern of the business. If data is stolen irrespective of the exposure the whole company will lose money as well as the whole business (Meyer, 2017). In a recent study by CISCO, a highly reputable company that has invested in information and data security reveal that thousands of companies are losing billions of their revenue as indicated below.
Image sourced from: https://www.securitymagazine.com/articles/87778-measuring-the-impact-of-cyberattacks-lost-revenue-reputation-customers
It was also established that the majority of the companies that lost revenue was due to cutting off their budget expenditure on data security as it has been indicated below:
Image sourced form: https://www.securitymagazine.com/articles/87778-measuring-the-impact-of-cyberattacks-lost-revenue-reputation-customers
Looking at the above table, it is the same scenario that is likely to happen in the company if budget cuts are implemented. The worst part is how the company will be affected in case of a data breach. The same study revealed how much the majority of the victim companies were affected negatively as indicated below.
Image sourced from: https://www.securitymagazine.com/articles/87778-measuring-the-impact-of-cyberattacks-lost-revenue-reputation-customers
It is hence risky to not implement the recommendations that I had earlier on started. I have reviewed the LOTR Network Design artifacts and the critical areas of concern that are related to access control are as follows:
a) Secure configuration
There are no corporate policies that can update as well as patch the systems. There is a need to establish and also maintain policies that explain the priorities as well as the timescales for which updates can be applied and also patches. Here, there us need to make and take care of hardware as well as software inventories whereby a there is the need for automatic tools that can be used to create as well as maintains the inventories of all the devices and the applications that the company uses (Antón & United States, 2003). There is a need to lock down the operating systems as well as software, here there is the need to have a baseline security build which brings together workstations, the servers, the firewalls, and the routers. Also, I found out that there are no regular vulnerability scans. Here the company needs to acquire vulnerability scanning tools which can run automatically on a weekly basis to remedy .
Administration Policy Matrix
Current Administration
Regulation Name and Date
Four Key Principles
Reference
Previous Administration
Regulation Name and Date
Four Key Principles
Reference
Relevant State Law or Regulation
Name and Date
Four Key Principles
Reference
NIST Template
Document Number
Document Name
Date
NIST Guidance
Federal Cybersecurity Agency Simtray Report – 1 page
Administration Policy Matrix – chart
Administration Compare and Contrast Chart – 1 page chart
Focus on FISMA Report - 2 page discussion
NIST Template – refer to nist template document
Final Report on National Cybersecurity Policy – refer to final report document
you will analyze the current and previous administration's cybersecurity policies within the context of current cybersecurity concerns. You will identify the issues in the policies about which an organization should be concerned, taking into account the effects of the policy on civil liberties with some focus on FISMA and NIST. You will also evaluate FISMA's ability to both assess compliance and insure accountability. By the end of the course, you will understand the effect that administration cybersecurity policy has on your own organization, public or private sector
Scenario
As the newly hired cybersecurity policy analyst, you are the most qualified in your company to understand the overall framework of cybersecurity initiatives, which often change and evolve over several presidential administrations. Knowing your background, your boss asks you to prepare a comprehensive overview that compares cyber policy tenets from the prior administration to the current. She will present the report to the board of directors.
"It's important for us to take a step back periodically to see where we've been, where we are now, and where we are going," she says. The report can include recommendations for improving the current policies with a look toward maintaining civil liberties.
The report, your boss says, also should feature updates and the effects of the Federal Information Security Management Acts (FISMA) of 2002 and 2014, and also should consider the role that the National Institute of Standards and Technology (NIST) assumes in terms of cybersecurity policy.
You realize that your report has to be crafted in plain language so that the board members who do not have the technical background in cybersecurity matters will understand. Creating such a broad-based document will require some historical research as well as a look at the current laws. It is due in two weeks, so it's best to get started right away.
Federal Cybersecurity Agency Simtray Report
In this step, you should continue to explore the scenarios within SIMTRAY, "Federal Cybersecurity Agency: Find Your Way in Three Days." If you have not already, you will most likely encounter the following topics in this exercise: classifying information types, intellectual property issues ( intellectual property - cybersecurity), Cyb ...
Royal Commission for Jubail and YanbuFX-ACA-002Issue 0 Rev. 1.docxSUBHI7
Royal Commission for Jubail and Yanbu
FX-ACA-002
Issue 0 Rev. 1
January 2, 2014
i
Jubail University College
Computer Science & Engineering Department
Cover Page
Assignment 1 & 2, CS415, Sem 372, JUC Female Branch
1.
Group
Members
2.
Project Title
WAN (wide area network)
3.
Project Topics
Choose and tick from the given type below:
· Mobile Computing
· Cloud Computing
· Wireless Network
· Others :
4.
Literature Review (survey the works of other researchers)
Instructions:
· Journals or articles must be taken from year 2010 onwards
· Journals or articles must be retrieved from the IEEE or ACM
· At least 5 papers should be reviewed 15 (I want 7 pages)
5.
Abstract (overview and purpose of the research)
6.
Introduction (to the research ideas)
Introduce the broad context of the research and explain why this is an interesting area to work in
7.
Project Objectives
8.
Project Scope
9.
Problem Statements
(e.g. problem context, rationale, description of problem area, nature of challenge)
10
Research Plan/Methodology (identify the methodology that will be used in project
(e.g : interview, questionnaires that will be carried)*** details and clear explanation
11.
Layout/Design of the Project
12.
Resources
( Brief description of the resources needed by the proposal: e.g : hardware, software, access to information/expertise, user involvement etc)
13.
References
Note: Use the format given below.
· Page margin: T,B,R,L=1”, paper size: A4
· Line spacing: 2”
· Typeface: Calibri, size 12pts (content), 14 pts for title heading
· Number of pages: 5-15 (I want 7 pages)
Post your Panel Briefing and Presentation. Please post your Panel Briefing and Presentation here.
First, -------------------this is my bill: 17-017 Colorado ------------------------------------------
This is for Colorado SB 17-017:
Panel Presentation.pptx
Panel Briefing.docx
Second, -----------------------------------
Texas HB 375 - Constitutional Carry
HAP334-BriefingHandouts.docx
HAP 334 Bill Project.pdf
Third, ----------------------------
Minnesota SF143: Modification of Immunization Exemptions
MN Modifying Immunization Exemptions Presentation.pdf
Group Briefing Handout.pdf
Fourth, -----------------------------
Delaware HB 21: Ensure individuals with disabilities are not denied access to organ transplant services
HAP 334- HB 21.pptx
HAP 334 Panel Briefing .pdf
HAP 334-Executive Summary .docx
Fifth, --------------------
Arkansas HB1035 - Healthy Foods Improvement Act
Panel Briefing- Obesity PPT-2.pptx
Panel Brief Final.pdf
Sixth, -------------------------
Oregon's HB 2232: Reproductive Health Equality Act
Oregon HB 2232_Powerpoint.pptx
Oregon HB 2232__Briefing.docx..docx
Seventh, --------------------------------------
California Maternal Mental Health AB-244
Panel Presentations.pptx
PanelBrief.docx
PLS/HAP 334 / Final Spring 2017 (50 points)/ DUE: April 29th – 05:00 PM – Blue Line
Work mu ...
Paper Prompt Political Ideologies It is often said .docxLacieKlineeb
This performance report makes recommendations to improve the Florida Re-entry program based on the assessment. It determines areas of compliance and noncompliance with the program's mission, and provides specific recommendations justified by evidence. Implementation approaches are explained, considering short- and long-term efforts, costs, staffing needs, and potential policy changes.
Grading for this assignment will be based on answer quality, log.docxwhittemorelucilla
Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric.
Points: 80
Assignment 1: Standards Research
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Select one (1) of the working groups in the IETF or IEEE and briefly summarize what this group is working on.
Weight: 5%
Did not submit or incompletely selected one (1) of the working groups in the IETF or IEEE and did not submit or incompletely summarized what this group is working on.
Partially selected one (1) of the working groups in the IETF or IEEE and partially summarized what this group is working on.
Satisfactorily selected one (1) of the working groups in the IETF or IEEE and satisfactorily summarized what this group is working on.
Thoroughly selected one (1) of the working groups in the IETF or IEEE and thoroughly summarized what this group is working on.
2. Justify the need of the IEEE 802 standard used in networking.
Weight: 25%
Did not submit or incompletely justified the need of the IEEE 802 standard used in networking.
Partially justified the need of the IEEE 802 standard used in networking.
Satisfactorily justified the need of the IEEE 802 standard used in networking.
Thoroughly justified the need of the IEEE 802 standard used in networking.
3. Evaluate the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
Weight: 30%
Did not submit or incompletely evaluated the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
Partially evaluated the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
Satisfactorily evaluated the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
Thoroughly evaluated the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
4. Take a position on the need for a federal regulating body of standards such as NIST. Include supporting evidence to justify your opinion.
Weight: 25%
Did not submit or incompletely took a position on the need for a federal regulating body of standards such as NIST. Did not submit or incompletely included supporting evidence to justify your opinion.
Partially took a position on the need for a federal regulating body of standards such as NIST. Partially included supporting evidence to justify your opinion.
Satisfactorily took a position on the need for a federal regulating body of standards such as NIST. Satisfactorily included supporting evidence to justify your opinion.
Thoroughly took a position on the need for a federal regulating body of standards such as NIST. Thoroughly included supporting evidence to justify your opinion.
5. 3 referen ...
862118190-1
Nan zhou
862118190
Word Count: 591
https://www.bbc.com/news/business-49934309
According to my suggestion, it is an example of bad framing. I can say that there must be the title of “US trade war with China is bringing fall in the unemployment rate to a 50-year low of 3.5%”. it is an appropriate and better frame to use. The stats of the previous fifteen months with the introduction of a trade war are a clear depiction of it that frame is not appropriate here. It doesn’t highlight the actual issue behind the rate of employment decline. The new frame is suitable to show how badly a trade war is affecting the US economy. This new frame is not changing the context of the news or the agenda but actually paying a more objective look to the issue. the numerical data is supporting the frame that not only the wording is appropriate there is an issue which is ignored while framing the title. The stats are ignored, the numerical data shows that the sharp slowdown in the manufacturing industry is coming after September. The US-China trade dispute is not only affecting the US but also effecting the whole global economy.
My new frame is not changing the objective information but it giving new insights to the issue. The US economy report came with a decline in the manufacturing rate which is slower than 10 years in September. There is fear that the US economy will face a further decline in the 15 months trade war so it would be best to use a better new frame here which highlights the issue in a title and attracts the reader to go through the current problem with a cause. The title is a major thing that can force the reader to engage in a topic and the agenda must be there in the title. The new frame is a great way to express the current issue of trade and its effects on the US economy.
As WTO warns the US about the trade war that it could hit the living standards because the employment is sharply decreased and jobless people are increasing. The federal reserve interest rate cut is expected this year which could be dangerous. The manufacturing sector has the weakest point now in the US economy and the US economy faced this issue from the past three years but with the service sector, the recession is expected to avoid. The problem is that the US economy matters a lot because it is the biggest economy and if the growth of the American economy slows down then expect china the rest of the world will suffer from it.
According to my observation, the title is badly framed because it shows the employment decline only but not really give the issue behind this decline. As the US economy matters along then the US recession would bring suffering to the entire world. the US federal rates are cut in the year and more interest cut is expected at the end of the year. So, the issue is serious to consider and the better frame would make it more effective for the readers.
As the global economy is linked with the US economy then the overall business decline woul ...
CJ 500 Criminal Justice Library Tips Shapiro Librar.docxsleeperharwell
CJ 500 Criminal Justice Library Tips
Shapiro Library
Shapiro Library Graduate Tutorial
A–Z Database List
o Search by subject. Search term examples:
Law
Justice Studies
Research Guides
o Sometimes there is a guide for a specific topic/discipline.
o Criminal Justice Research Guide
o Google Like a Librarian
o Graduate Student Research Guide
Periodical Finder/ Electronic Journals
o Search by title (“begins with” or “contains”).
o Browse by subject (“law, politics, and government”).
o ProQuest Criminal Justice
o LexisNexis Academic
In this discipline, you will need to cite your sources in APA style. Refer to the following for information on using APA
style:
APA Style Guide
Purdue Online Writing Lab
How do I cite sources in APA style?
http://libguides.snhu.edu/home
http://libguides.snhu.edu/c.php?g=179004
http://ezproxy.snhu.edu/login?url=http://libguides.snhu.edu/az.php?s=21994
http://ezproxy.snhu.edu/login?url=http://libguides.snhu.edu/az.php?s=21987
http://ezproxy.snhu.edu/login?url=http://libguides.snhu.edu/criminal_justice
http://ezproxy.snhu.edu/login?url=http://libguides.snhu.edu/google
http://ezproxy.snhu.edu/login?url=http://libguides.snhu.edu/c.php?g=179004
http://ezproxy.snhu.edu/login?url=http://eds.a.ebscohost.com/eds/search/basic?sid=2531d82e-d5b5-4af3-a79e-1bda84284065%40sessionmgr4010&vid=0&sdb=edspub&tid=3000EP
http://pn8vx3lh2h.search.serialssolutions.com/log?L=PN8VX3LH2H&D=M0O&J=CRIMJUS19&P=EJP&U=http%3A%2F%2Fezproxy.snhu.edu%2Flogin%3Furl%3Dhttp%3A%2F%2Fsearch.proquest.com%2Fpublication%2F35991
http://pn8vx3lh2h.search.serialssolutions.com/log?L=PN8VX3LH2H&D=LXU&J=CRIMJUS19&P=EJP&U=http%3A%2F%2Fezproxy.snhu.edu%2Flogin%3Furl%3Dhttp%3A%2F%2Fwww.lexisnexis.com%2Fhottopics%2Flnacademic%2F%3Fverb%3Dsr%26csi%3D226341
http://ezproxy.snhu.edu/login?url=http://libguides.snhu.edu/apa
http://ezproxy.snhu.edu/login?url=http://libguides.snhu.edu/apa
https://owl.english.purdue.edu/owl/resource/560/01/
http://ezproxy.snhu.edu/login?url=http://libanswers.snhu.edu/faq/8616
CJ 500 Final Project Guidelines and Rubric
Overview
For your final project, you will analyze a contemporary issue in criminal justice and provide an evidence-based recommendation to address the issue, selecting an
issue of interest on which to focus your brief. You will analyze how the issue has evolved, apply criminological theories to identify causes of the issue, assess the
impact of the issue on the community, and propose strategies to address the issue.
Professionals in the field of criminal justice are often faced with making difficult decisions related to critical issues in their field. Those that are able to effectively
take action to address these issues are seen as leaders in the field. To effectively form conclusions and recommend appropriate action, it is essential that
professionals first analyze the background of the issue. Professionals must understand the history of the is.
Delivering an Oral StatementYou will need to deliver an oral sta.docxcuddietheresa
Delivering an Oral Statement
You will need to deliver an oral statement that is clear, confident, and exhibits knowledge of the issue. Usually, written statements must be available to the committee 24-48 hours in advance. In the interest of time, it is usually not necessary or desirable for a witness to read his or her entire written statement.
Some general guidelines for preparing a statement to Congress include the following:
· Introduce yourself, your occupation, organization, and personal relevant background of the subject.
· Greet the chairman of the committee and the committee as a whole.
· Be brief, you will have about five minutes to speak.
· State the issue you will testify on.
· Focus only on key points.
· Focus on the current situation and how the action you recommend will improve it.
· Avoid presentation software (such as PowerPoint).
· Check with committee staff in advance about the use of visual aides.
· At the end, briefly wait for questions from committee members.
References
Davis, C. M. (2015). House committee hearings: Witness testimony. Congressional Research Service. Retrieved from https://www.fas.org/sgp/crs/misc/98-338.pdf
How to Write and Present Testimony. (n.d.). Retrieved from http://www.cbf.org/Document.Doc?id=302
Spafford, E. H. (n.d.). Advice on government testimony. Retrieved November 18, 2016, from http://spaf.cerias.purdue.edu/usgov/testimony.html
Tomasa, T. (n.d.). Chapter 4: Drafting Written Testimony and Presenting Oral Testimony. In M. K. N. Haia, M. C. Jarman, E. A. H. Martin, J. E. Mccarty (Eds.), E alu like mai i ka pono: Coming together for justice (pp. 25-30). Retrieved from http://www.hawaii.edu/ohelo/resources/AluLikeWorkbook/Chap4.pdf
Computer Crime Comparison Table
Statute Comparison
State Statute
Attributes Compared to CFAA
Attributes Contrasted to CFAA
Report on Effectiveness in Its State
Actual Use Case
Name of Case
Statute Reference
Judicial Opinion
Statute Success
Computer fraud and Abuse Act Analysis 2
The Computer Fraud and Abuse Act (CFAA) delineate specific illegal acts relating to computer crimes. The CFAA covers the following:
· Defines specific key terms used throughout the legislation.
· Outlines the components that do and do not constitute criminal acts.
· Specifies the consequences of those acts, as well as certain aggravating factors.
· Describes exceptions to the criminality of these acts in cases of law enforcement and similar contexts.
The essential stipulations said inside the content of the CFAA sanctioned administrative and managerial measures as to the assurance of legitimate contemplations and possibility of between PC get to.
Programmers are often characterized as people undertaking unlawful, unapproved section into work stations, databases, or virtual systems having a place with another with aim to perpetrate a wrong doing or cause devastation.
The principles and practice that are cited inside the computer fraud and abuse act are large num ...
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docxrock73
Assignment 4: The Future of Digital Crimes and Digital Terrorism
Worth 250 points
In the United States, a number of law enforcement agencies, including the Secret Service, the Federal Bureau of Investigation (FBI), and the Department of Homeland Security among others have taken on roles to fight computer crimes and terrorism.
Use the Internet or library to research articles on the efforts of law enforcement agencies to combat digital crimes and digital terrorism, as well as the roles of such agencies in the future of the combat in question.
Write a four to five (4-5) page paper in which you:
1. Describe the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism.
2. Explain the existing challenges that result from the independent nature of the law enforcement agencies within the U.S. with regards to computer crimes and terrorism. Next, propose one (1) strategy that the U.S. could use in order to mitigate the challenges in question.
3. Explain the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorism.
4. Give your opinion of the key future trends in digital crime and digital terrorism. Next, provide one (1) overall strategy that the U.S. could use in order to combat digital crime and digital terrorism.
5. Use at least four (4) quality references for this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must:
· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.
The specific course learning outcomes associated with this assignment are:
· Describe future trends in digital crime and terrorism.
· Describe law enforcement roles and responses.
· Explain the procedures in the investigation of computer-related crime.
· Describe the technologies and processes involved in digital forensics.
· Explain the ethical concerns that information technologies raise in society and the impact of information technologies on crime, terrorism, or war.
· Use technology and information resources to research issues in information technology in criminal justice.
· Write clearly and concisely about information technology in criminal justice topics using proper writing mechanics and technical style convention.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric
Points: 250
Criteria
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Describe the overall impac ...
Socioeconomic drivers of injury compensation claims in NZJohn Wren
This presents the results of early work on the socio-economic drivers of injury compensation claims in NZ. The PPT presents explanatory models of the drivers of claims using a causal loop model, statistical evidence, and discusses the results in the international context. The implications of the analysis for injury prevention and claims management are discussed.
IT 659 Milestone Three Guidelines and Rubric In Milest.docxchristiandean12115
IT 659 Milestone Three Guidelines and Rubric
In Milestone Three you will submit the Recommendations and Global Considerations portion of the final project. The purpose of this assignment is to suggest
relevant changes to the organization itself and changes to the ethical guidelines that could have prevented the incident.
Prompt: Suggest relevant changes to the organization itself and changes to the ethical guidelines that could have prevented the incident. Standards external to
the organization that may have helped prevent the incident should also be proposed. This assignment will also address international compliance standards and
how they would have been relevant to the incident. The impact of the incident on global communication and commerce will be analyzed, as well as the impact on
the global technology environment.
Specifically the following critical elements must be addressed:
IV. Recommendations
a) Propose relevant changes to the organization that may have prevented the incident. How would these changes have helped to prevent the
occurrence?
b) Propose reasonable ethical guidelines that could have helped prevent the incident and that might help the organization prevent future incidents.
Propose changes to the standards external to the organization that might have helped prevent the incident. This can include changes to
regulations and regulatory and ethical standards that might exist today but did not exist or were not properly delivered at the time of the
incident. Be sure to support your conclusions.
V. Global Considerations
a) What international compliance standards (either at the time of the incident or today) would have been relevant to the incident, and how? If your
company is not global, imagine that is.
b) Analyze the impact of the incident on global communication and commerce (again, if your organization is not global, imagine otherwise). In
other words, what impact did (or would) the incident have on views and use of information technology and communication in global contexts?
c) Global Technology Environment: Based on your research and analysis of this case, determine the global legal and regulatory impacts this case
had on the information technology overall. In other words, determine the relationship between this case and the global regulatory standards
that are now in place, will be put in place shortly, or should be put in place as a result of this or related incident(s).
Rubric
Guidelines for Submission: The format for this assignment will be a three- to five-page Microsoft Word document with double spacing, 12-point Times New
Roman font, one-inch margins, and at least three sources cited in APA format.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,
review these instructions.
Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%).
Great Gatsby Theme Analysis Essay. Online assignment writing service.Leahona Lovato
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and select one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions to ensure satisfaction, with a refund option for plagiarized work.
Paper A Application of a decision making framework to an IT-related.docxdunnramage
Paper A: Application of a decision making framework to an IT-related ethical issue.
For this assignment, you are given an opportunity to explore and apply a decision making framework to an IT-related ethical issue.
A framework provides a methodical and systematic approach for decision making
.
UMUC
Module 2 - Methods of Ethical Analysis (see LEO Content – Readings for week 2)
describes three structured frameworks that may be used for ethical analysis, namely
Reynolds Seven-Step Approach, Kidder’s Nine Steps, and Spinello’s Seven-Step Process
.
There are several ways described in UMUC Module 2 to systematically approach an ethical dilemma
, and while each of the frameworks described has its merits, each will result in an ethical decision if straightforwardly and honestly applied.
In addition, you will want to consider the ethical theories described in
Module 1 – Introduction to Theoretical Ethical Frameworks (see LEO Content – Readings for week 1)
which help decision makers find the right balance concerning the acceptability of and justification for their actions. A separate write-up of the ethical theory that supports your decision is part of the following requirements.
For this paper, the following elements must be addressed:
Describe a current IT-related ethical issue
:
Since this is a paper exercise, not a real-time situation,
you may want to construct a brief scenario
where this issue comes into play, and thus causes an ethical dilemma. The dilemma may affect you, your family, your job, or your company; or it may be a matter of public policy or law that affects the general populace.
See the list below for a list of suggested issues, which may be a source of ethical dilemmas
.
Define a concise problem statement
that is
extracted
from the above description or scenario. It is best
if you define a specific problem caused by the dilemma, that needs a specific ethical decision to be made, that will solve the dilemma
. Be aware that if it is a matter of public policy or law, that it may require a regulatory body or congressional approval to take action to implement a solution.
Analyze your problem
using one of the structured decision-making frameworks chosen from Module 2.
Make sure that you identify the decision-making framework utilized. In addition, the steps in the decision-making framework selected must be used as major headings in the Analysis section.
Consider and state the impact of the decision that you made
on an individual, an organization, stakeholders, customers suppliers, and the environment, as applicable!
State and discuss the applicable ethical theory
from Module 1
that supports your decision.
Concerning your paper:
Prepare a minimum 3- 5 page, double-spaced paper and submit it to the LEO Assignments Module as an attached Microsoft Word file.
Provide appropriate American Psychological Association (APA) source citations for all sources you use
. In addition to critical thinking and analysis skills, you.
This document summarizes the results of a survey of standards and best practices used to ensure successful information resource projects. The survey examined practices in the public sector, including federal and state governments, and private sector organizations. Commonly used standards identified include the Capability Maturity Model, Project Management Body of Knowledge, software engineering standards, and ISO 9000 quality standards. State usage of these standards varies, with some states explicitly using standards more than others. Critical success factors for information resource projects identified in research include clear goals and support, detailed planning, stakeholder involvement, adequate resources and expertise, and monitoring progress. The survey findings can help organizations better apply standards and practices to deliver projects on time and on budget.
6/18/2019
1/5
Week 7
Corporate Compliance, Fraud, and Abuse
Fraud and abuse are a threat not only to individual healthcare organizations, but also to
the national healthcare system as a whole. In fiscal year 2016, the U.S. Department of
Justice (DOJ) recovered about $4.7 billion in settlements and judgments from civil cases
involving fraud and false claims. Over half of that amount, $2.5 billion, was from cases
related to the healthcare industry (DOJ, 2016). Throughout the last decade, the media has
often reported on major healthcare scandals. For example, in 2009, 60 Minutes had an
episode that described how Medicare was fraudulently billed $60 billion for services or
products that were never provided or delivered. The Centers for Medicare and Medicaid
are required to pay claims within a short time period, either 15 or 30 days. The payment
turnaround made it difficult to investigate false claims. However, the DOJ, the FBI, and
several state’s attorneys general have taken on investigating these claims. Medicare has
taken steps to make enrollment more stringent so that phony companies are less likely to
be able to commit fraud in the future (CBS News, 2009). Such cases of fraud cause great
harm to the taxpayers, whose dollars go into a public trust to administer two of the largest
direct health services programs in the world. However, it’s the smaller cases of fraud that
go almost unnoticed and not reported by the media that result in a similar degree of harm
to the U.S. healthcare system.
Abuse, providing unnecessary services, and overbilling for services are also detrimental to
the system of healthcare. As stated in Week 3, cases of fraud and abuse result in both
criminal and civil charges. In the face of such large-scale corruption in 1991, the U.S.
Sentencing Commission (USSC) adopted guidelines that provided rules and principles for
the sentencing of organizations that commit fraud and abuse. Moreover, the Thompson
Memorandum, otherwise known as Principles of Federal Prosecution of Business
Organizations, established guidelines that U.S. attorneys can use in determining whether
to bring an enforcement action against an organization (U.S. Sentencing Commission,
2015). These guidelines and principles have been updated in keeping with the changes in
the corporate climate, with the latest proposed changes announced in late 2018 (U.S.
Department of Justice, 2018). In response, leaders of healthcare organizations began to
establish corporate compliance programs to prevent and mitigate the effects of fraud and
abuse. The U.S. Department of Health and Human Services’ Office of the Inspector
https://ncuone.ncu.edu/d2l/home/143543
6/18/2019
2/5
Books and Resources for this Week
Mayer, C. M. (1995). Preventing fraud and
abuse fallout. Healthcare Financial
Management, 49(4), 40, 42, 44.
Link
General (OIG), is responsible for disseminating compliance guidance to
healthcare organizations.
As was discussed i ...
Week 8 Quantitative Research DesignPrevious Next Instructio.docxphilipnelson29183
The document outlines a proposed quantitative research study that will investigate the impact of disclosure of private information by private and governmental agencies on threats to individual privacy rights. The study will seek to answer three research questions through surveys and experiments/quasi-experiments. Statistical analyses like correlations, regressions, t-tests, and ANOVAs will be used to analyze the data and determine relationships between disclosure of information and privacy threat levels. It is hoped the study will provide empirical evidence to inform policies around protecting individual privacy rights in the context of increasing information sharing.
You have collected the following documents (unstructured) and pl.docxbriancrawford30935
You have collected the following documents (unstructured) and plan to apply an index technique to convert them into an inverted index.
Doc 1?Information retrieval is the activity of obtaining information resources relevant to an information need from a collection of information resources. Searches can be based on full-text or other content-based indexing.
Doc 2?Information retrieval is finding material of an unstructured nature that satisfies an information need from within large collections.
Doc 3?Information systems is the study of complementary networks of hardware and software that people and organizations use to collect, filter, process, create, and distribute data.
In the process of creating the inverted index, please complete the following steps:
Remove all stop words and punctuation, and then apply Porter’s stemming algorithm to the documents. Thelist of stop words for this task is provided as follows:
Is, The, Of, To, An, A, From, Can, Be, On, Or, That, Within, And, Use
Create a merged inverted list including the within-document frequencies for each term.
Use the index created in part (b) to create a dictionary and the related posting file.
You may like to test the inverted index by using the following keywords:information, system, index
.
You have been working as a technology associate the information .docxbriancrawford30935
You have been working as a technology associate the information systems department at Corporation Techs for a while now. You have discovered so far that all of Corporation Techs’ computer systems share the same Class C public IP address range, including workstations along with servers providing authentication, e-mail, and both secure and public Web sites.
Your next task in this project is to construct a basic network design. An important requirement for the network design is to reduce the number of public addresses needed as the subnet lease results in very high ISP costs.
Tasks
Construct a basic network design, separating private and public services within the Corporation Techs’ network. To do so, you must:
Access the PCAP files using NetWitness Investigator, and browse the Nmap scan (XML format), topology fisheye chart (PDF format), and Nessus report (HTML format).
Identify vulnerabilities and clear-text information transfer.
Conduct research and determine the best network design to ensure security of internal access while retaining public Web site availability.
Identify any opportunities for reduced ISP costs through port redirection or address translation.
Design a network configuration, identifying network gateways, port or address redirection systems, and the location of hosts within private and protected network segments.
Create a professional report detailing the information above as supportive documentation for the network security plan.
Create a report that includes a basic network diagram and research results.
.
You have chosen to join WHO. They are particularly interested in.docxbriancrawford30935
You have chosen to join WHO. They are particularly interested in your microbiology skills since there have been many outbreaks of disease around the world. Now that you have reviewed your microbiology, you have been notified that you will be sent to one of two areas, West Africa, or the Middle East. In preparation, the Peace Corp would like you to choose one of these areas and complete a plan to deal with outbreaks or potential outbreaks in the area.
Choose an outbreak from those below to investigate.
Ebola or Middle East respiratory syndrome coronavirus (MERS-CoV)
Locate resources that will provide information about the infection, causing microbe, mode of infection, mode of spread, group or groups specifically susceptible, where outbreak occurred and when, clinical evaluation and diagnosis, infection control.
Find first person reports such as interviews or personal reports or journals on the outbreak. If you need help work with the librarian.
Design and submit an outline of the information you have uncovered. You will use this information to complete the project.
The outline should contain information and cited resources for:
Name of the disease chosen
Causing microbe
Mode of infection
Mode of spread
Group or groups specifically susceptible
Where outbreak occurred and when
Clinical evaluation and diagnosis
Infection control.
.
You have been tasked to present at a town hall meeting in your local.docxbriancrawford30935
You have been tasked to present at a town hall meeting in your local town or city to present the details about a new local policy that is being proposed. The presentation will need to define the problem, proposed solutions, risks, challenges, and funding opportunities/challenges. Topics may include local government changes to communities (for example, transportation, commercial enterprise effects on nearby townships, affordable housing construction, environmental effects of new/old business operations, addressing homelessness support, and others).
Using the
Policy Identification and Analysis Assignment Template [PPTX],
develop an 8–10 slide presentation in which you:
Analyze and define the problem to include possible political conflicts.
Identify risks and challenges.
Identify and construct policy alternatives and solutions.
Identify stakeholders and key roles.
Identify funding opportunities, challenges, and budget cost factors, to include saving measures.
Select supportive and evaluative criteria.
Identify incentives, subsidies, and potential benefits.
Draw conclusions in a thorough summary, including lessons learned.
Use the Internet or Strayer databases at the
Strayer Library
to locate at least three quality resources in this assignment.
Note
: Wikipedia and similar websites do not qualify as quality resources.
Use the
Policy Identification and Analysis Assignment Template [PPTX]
.
.
More Related Content
Similar to Project Deliverable 1This assignment consists of two (2) section.docx
Running head THE COST OF INADEQUATE CONTROLS .docxtodd521
Running head: THE COST OF INADEQUATE CONTROLS 1
THE COST OF INADEQUATE CONTROLS 7
Assignment 2
The Cost Of Inadequate Controls
i) The annual loss of revenue
Investing in data security is an important function of LOTR Experience. There is a need to ensure that the company has adequate controls in terms of IT personnel as well as IT equipment. This will save the company from incurring losses in multiple areas that are a concern of the business. If data is stolen irrespective of the exposure the whole company will lose money as well as the whole business (Meyer, 2017). In a recent study by CISCO, a highly reputable company that has invested in information and data security reveal that thousands of companies are losing billions of their revenue as indicated below.
Image sourced from: https://www.securitymagazine.com/articles/87778-measuring-the-impact-of-cyberattacks-lost-revenue-reputation-customers
It was also established that the majority of the companies that lost revenue was due to cutting off their budget expenditure on data security as it has been indicated below:
Image sourced form: https://www.securitymagazine.com/articles/87778-measuring-the-impact-of-cyberattacks-lost-revenue-reputation-customers
Looking at the above table, it is the same scenario that is likely to happen in the company if budget cuts are implemented. The worst part is how the company will be affected in case of a data breach. The same study revealed how much the majority of the victim companies were affected negatively as indicated below.
Image sourced from: https://www.securitymagazine.com/articles/87778-measuring-the-impact-of-cyberattacks-lost-revenue-reputation-customers
It is hence risky to not implement the recommendations that I had earlier on started. I have reviewed the LOTR Network Design artifacts and the critical areas of concern that are related to access control are as follows:
a) Secure configuration
There are no corporate policies that can update as well as patch the systems. There is a need to establish and also maintain policies that explain the priorities as well as the timescales for which updates can be applied and also patches. Here, there us need to make and take care of hardware as well as software inventories whereby a there is the need for automatic tools that can be used to create as well as maintains the inventories of all the devices and the applications that the company uses (Antón & United States, 2003). There is a need to lock down the operating systems as well as software, here there is the need to have a baseline security build which brings together workstations, the servers, the firewalls, and the routers. Also, I found out that there are no regular vulnerability scans. Here the company needs to acquire vulnerability scanning tools which can run automatically on a weekly basis to remedy .
Administration Policy Matrix
Current Administration
Regulation Name and Date
Four Key Principles
Reference
Previous Administration
Regulation Name and Date
Four Key Principles
Reference
Relevant State Law or Regulation
Name and Date
Four Key Principles
Reference
NIST Template
Document Number
Document Name
Date
NIST Guidance
Federal Cybersecurity Agency Simtray Report – 1 page
Administration Policy Matrix – chart
Administration Compare and Contrast Chart – 1 page chart
Focus on FISMA Report - 2 page discussion
NIST Template – refer to nist template document
Final Report on National Cybersecurity Policy – refer to final report document
you will analyze the current and previous administration's cybersecurity policies within the context of current cybersecurity concerns. You will identify the issues in the policies about which an organization should be concerned, taking into account the effects of the policy on civil liberties with some focus on FISMA and NIST. You will also evaluate FISMA's ability to both assess compliance and insure accountability. By the end of the course, you will understand the effect that administration cybersecurity policy has on your own organization, public or private sector
Scenario
As the newly hired cybersecurity policy analyst, you are the most qualified in your company to understand the overall framework of cybersecurity initiatives, which often change and evolve over several presidential administrations. Knowing your background, your boss asks you to prepare a comprehensive overview that compares cyber policy tenets from the prior administration to the current. She will present the report to the board of directors.
"It's important for us to take a step back periodically to see where we've been, where we are now, and where we are going," she says. The report can include recommendations for improving the current policies with a look toward maintaining civil liberties.
The report, your boss says, also should feature updates and the effects of the Federal Information Security Management Acts (FISMA) of 2002 and 2014, and also should consider the role that the National Institute of Standards and Technology (NIST) assumes in terms of cybersecurity policy.
You realize that your report has to be crafted in plain language so that the board members who do not have the technical background in cybersecurity matters will understand. Creating such a broad-based document will require some historical research as well as a look at the current laws. It is due in two weeks, so it's best to get started right away.
Federal Cybersecurity Agency Simtray Report
In this step, you should continue to explore the scenarios within SIMTRAY, "Federal Cybersecurity Agency: Find Your Way in Three Days." If you have not already, you will most likely encounter the following topics in this exercise: classifying information types, intellectual property issues ( intellectual property - cybersecurity), Cyb ...
Royal Commission for Jubail and YanbuFX-ACA-002Issue 0 Rev. 1.docxSUBHI7
Royal Commission for Jubail and Yanbu
FX-ACA-002
Issue 0 Rev. 1
January 2, 2014
i
Jubail University College
Computer Science & Engineering Department
Cover Page
Assignment 1 & 2, CS415, Sem 372, JUC Female Branch
1.
Group
Members
2.
Project Title
WAN (wide area network)
3.
Project Topics
Choose and tick from the given type below:
· Mobile Computing
· Cloud Computing
· Wireless Network
· Others :
4.
Literature Review (survey the works of other researchers)
Instructions:
· Journals or articles must be taken from year 2010 onwards
· Journals or articles must be retrieved from the IEEE or ACM
· At least 5 papers should be reviewed 15 (I want 7 pages)
5.
Abstract (overview and purpose of the research)
6.
Introduction (to the research ideas)
Introduce the broad context of the research and explain why this is an interesting area to work in
7.
Project Objectives
8.
Project Scope
9.
Problem Statements
(e.g. problem context, rationale, description of problem area, nature of challenge)
10
Research Plan/Methodology (identify the methodology that will be used in project
(e.g : interview, questionnaires that will be carried)*** details and clear explanation
11.
Layout/Design of the Project
12.
Resources
( Brief description of the resources needed by the proposal: e.g : hardware, software, access to information/expertise, user involvement etc)
13.
References
Note: Use the format given below.
· Page margin: T,B,R,L=1”, paper size: A4
· Line spacing: 2”
· Typeface: Calibri, size 12pts (content), 14 pts for title heading
· Number of pages: 5-15 (I want 7 pages)
Post your Panel Briefing and Presentation. Please post your Panel Briefing and Presentation here.
First, -------------------this is my bill: 17-017 Colorado ------------------------------------------
This is for Colorado SB 17-017:
Panel Presentation.pptx
Panel Briefing.docx
Second, -----------------------------------
Texas HB 375 - Constitutional Carry
HAP334-BriefingHandouts.docx
HAP 334 Bill Project.pdf
Third, ----------------------------
Minnesota SF143: Modification of Immunization Exemptions
MN Modifying Immunization Exemptions Presentation.pdf
Group Briefing Handout.pdf
Fourth, -----------------------------
Delaware HB 21: Ensure individuals with disabilities are not denied access to organ transplant services
HAP 334- HB 21.pptx
HAP 334 Panel Briefing .pdf
HAP 334-Executive Summary .docx
Fifth, --------------------
Arkansas HB1035 - Healthy Foods Improvement Act
Panel Briefing- Obesity PPT-2.pptx
Panel Brief Final.pdf
Sixth, -------------------------
Oregon's HB 2232: Reproductive Health Equality Act
Oregon HB 2232_Powerpoint.pptx
Oregon HB 2232__Briefing.docx..docx
Seventh, --------------------------------------
California Maternal Mental Health AB-244
Panel Presentations.pptx
PanelBrief.docx
PLS/HAP 334 / Final Spring 2017 (50 points)/ DUE: April 29th – 05:00 PM – Blue Line
Work mu ...
Paper Prompt Political Ideologies It is often said .docxLacieKlineeb
This performance report makes recommendations to improve the Florida Re-entry program based on the assessment. It determines areas of compliance and noncompliance with the program's mission, and provides specific recommendations justified by evidence. Implementation approaches are explained, considering short- and long-term efforts, costs, staffing needs, and potential policy changes.
Grading for this assignment will be based on answer quality, log.docxwhittemorelucilla
Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric.
Points: 80
Assignment 1: Standards Research
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Select one (1) of the working groups in the IETF or IEEE and briefly summarize what this group is working on.
Weight: 5%
Did not submit or incompletely selected one (1) of the working groups in the IETF or IEEE and did not submit or incompletely summarized what this group is working on.
Partially selected one (1) of the working groups in the IETF or IEEE and partially summarized what this group is working on.
Satisfactorily selected one (1) of the working groups in the IETF or IEEE and satisfactorily summarized what this group is working on.
Thoroughly selected one (1) of the working groups in the IETF or IEEE and thoroughly summarized what this group is working on.
2. Justify the need of the IEEE 802 standard used in networking.
Weight: 25%
Did not submit or incompletely justified the need of the IEEE 802 standard used in networking.
Partially justified the need of the IEEE 802 standard used in networking.
Satisfactorily justified the need of the IEEE 802 standard used in networking.
Thoroughly justified the need of the IEEE 802 standard used in networking.
3. Evaluate the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
Weight: 30%
Did not submit or incompletely evaluated the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
Partially evaluated the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
Satisfactorily evaluated the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
Thoroughly evaluated the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.
4. Take a position on the need for a federal regulating body of standards such as NIST. Include supporting evidence to justify your opinion.
Weight: 25%
Did not submit or incompletely took a position on the need for a federal regulating body of standards such as NIST. Did not submit or incompletely included supporting evidence to justify your opinion.
Partially took a position on the need for a federal regulating body of standards such as NIST. Partially included supporting evidence to justify your opinion.
Satisfactorily took a position on the need for a federal regulating body of standards such as NIST. Satisfactorily included supporting evidence to justify your opinion.
Thoroughly took a position on the need for a federal regulating body of standards such as NIST. Thoroughly included supporting evidence to justify your opinion.
5. 3 referen ...
862118190-1
Nan zhou
862118190
Word Count: 591
https://www.bbc.com/news/business-49934309
According to my suggestion, it is an example of bad framing. I can say that there must be the title of “US trade war with China is bringing fall in the unemployment rate to a 50-year low of 3.5%”. it is an appropriate and better frame to use. The stats of the previous fifteen months with the introduction of a trade war are a clear depiction of it that frame is not appropriate here. It doesn’t highlight the actual issue behind the rate of employment decline. The new frame is suitable to show how badly a trade war is affecting the US economy. This new frame is not changing the context of the news or the agenda but actually paying a more objective look to the issue. the numerical data is supporting the frame that not only the wording is appropriate there is an issue which is ignored while framing the title. The stats are ignored, the numerical data shows that the sharp slowdown in the manufacturing industry is coming after September. The US-China trade dispute is not only affecting the US but also effecting the whole global economy.
My new frame is not changing the objective information but it giving new insights to the issue. The US economy report came with a decline in the manufacturing rate which is slower than 10 years in September. There is fear that the US economy will face a further decline in the 15 months trade war so it would be best to use a better new frame here which highlights the issue in a title and attracts the reader to go through the current problem with a cause. The title is a major thing that can force the reader to engage in a topic and the agenda must be there in the title. The new frame is a great way to express the current issue of trade and its effects on the US economy.
As WTO warns the US about the trade war that it could hit the living standards because the employment is sharply decreased and jobless people are increasing. The federal reserve interest rate cut is expected this year which could be dangerous. The manufacturing sector has the weakest point now in the US economy and the US economy faced this issue from the past three years but with the service sector, the recession is expected to avoid. The problem is that the US economy matters a lot because it is the biggest economy and if the growth of the American economy slows down then expect china the rest of the world will suffer from it.
According to my observation, the title is badly framed because it shows the employment decline only but not really give the issue behind this decline. As the US economy matters along then the US recession would bring suffering to the entire world. the US federal rates are cut in the year and more interest cut is expected at the end of the year. So, the issue is serious to consider and the better frame would make it more effective for the readers.
As the global economy is linked with the US economy then the overall business decline woul ...
CJ 500 Criminal Justice Library Tips Shapiro Librar.docxsleeperharwell
CJ 500 Criminal Justice Library Tips
Shapiro Library
Shapiro Library Graduate Tutorial
A–Z Database List
o Search by subject. Search term examples:
Law
Justice Studies
Research Guides
o Sometimes there is a guide for a specific topic/discipline.
o Criminal Justice Research Guide
o Google Like a Librarian
o Graduate Student Research Guide
Periodical Finder/ Electronic Journals
o Search by title (“begins with” or “contains”).
o Browse by subject (“law, politics, and government”).
o ProQuest Criminal Justice
o LexisNexis Academic
In this discipline, you will need to cite your sources in APA style. Refer to the following for information on using APA
style:
APA Style Guide
Purdue Online Writing Lab
How do I cite sources in APA style?
http://libguides.snhu.edu/home
http://libguides.snhu.edu/c.php?g=179004
http://ezproxy.snhu.edu/login?url=http://libguides.snhu.edu/az.php?s=21994
http://ezproxy.snhu.edu/login?url=http://libguides.snhu.edu/az.php?s=21987
http://ezproxy.snhu.edu/login?url=http://libguides.snhu.edu/criminal_justice
http://ezproxy.snhu.edu/login?url=http://libguides.snhu.edu/google
http://ezproxy.snhu.edu/login?url=http://libguides.snhu.edu/c.php?g=179004
http://ezproxy.snhu.edu/login?url=http://eds.a.ebscohost.com/eds/search/basic?sid=2531d82e-d5b5-4af3-a79e-1bda84284065%40sessionmgr4010&vid=0&sdb=edspub&tid=3000EP
http://pn8vx3lh2h.search.serialssolutions.com/log?L=PN8VX3LH2H&D=M0O&J=CRIMJUS19&P=EJP&U=http%3A%2F%2Fezproxy.snhu.edu%2Flogin%3Furl%3Dhttp%3A%2F%2Fsearch.proquest.com%2Fpublication%2F35991
http://pn8vx3lh2h.search.serialssolutions.com/log?L=PN8VX3LH2H&D=LXU&J=CRIMJUS19&P=EJP&U=http%3A%2F%2Fezproxy.snhu.edu%2Flogin%3Furl%3Dhttp%3A%2F%2Fwww.lexisnexis.com%2Fhottopics%2Flnacademic%2F%3Fverb%3Dsr%26csi%3D226341
http://ezproxy.snhu.edu/login?url=http://libguides.snhu.edu/apa
http://ezproxy.snhu.edu/login?url=http://libguides.snhu.edu/apa
https://owl.english.purdue.edu/owl/resource/560/01/
http://ezproxy.snhu.edu/login?url=http://libanswers.snhu.edu/faq/8616
CJ 500 Final Project Guidelines and Rubric
Overview
For your final project, you will analyze a contemporary issue in criminal justice and provide an evidence-based recommendation to address the issue, selecting an
issue of interest on which to focus your brief. You will analyze how the issue has evolved, apply criminological theories to identify causes of the issue, assess the
impact of the issue on the community, and propose strategies to address the issue.
Professionals in the field of criminal justice are often faced with making difficult decisions related to critical issues in their field. Those that are able to effectively
take action to address these issues are seen as leaders in the field. To effectively form conclusions and recommend appropriate action, it is essential that
professionals first analyze the background of the issue. Professionals must understand the history of the is.
Delivering an Oral StatementYou will need to deliver an oral sta.docxcuddietheresa
Delivering an Oral Statement
You will need to deliver an oral statement that is clear, confident, and exhibits knowledge of the issue. Usually, written statements must be available to the committee 24-48 hours in advance. In the interest of time, it is usually not necessary or desirable for a witness to read his or her entire written statement.
Some general guidelines for preparing a statement to Congress include the following:
· Introduce yourself, your occupation, organization, and personal relevant background of the subject.
· Greet the chairman of the committee and the committee as a whole.
· Be brief, you will have about five minutes to speak.
· State the issue you will testify on.
· Focus only on key points.
· Focus on the current situation and how the action you recommend will improve it.
· Avoid presentation software (such as PowerPoint).
· Check with committee staff in advance about the use of visual aides.
· At the end, briefly wait for questions from committee members.
References
Davis, C. M. (2015). House committee hearings: Witness testimony. Congressional Research Service. Retrieved from https://www.fas.org/sgp/crs/misc/98-338.pdf
How to Write and Present Testimony. (n.d.). Retrieved from http://www.cbf.org/Document.Doc?id=302
Spafford, E. H. (n.d.). Advice on government testimony. Retrieved November 18, 2016, from http://spaf.cerias.purdue.edu/usgov/testimony.html
Tomasa, T. (n.d.). Chapter 4: Drafting Written Testimony and Presenting Oral Testimony. In M. K. N. Haia, M. C. Jarman, E. A. H. Martin, J. E. Mccarty (Eds.), E alu like mai i ka pono: Coming together for justice (pp. 25-30). Retrieved from http://www.hawaii.edu/ohelo/resources/AluLikeWorkbook/Chap4.pdf
Computer Crime Comparison Table
Statute Comparison
State Statute
Attributes Compared to CFAA
Attributes Contrasted to CFAA
Report on Effectiveness in Its State
Actual Use Case
Name of Case
Statute Reference
Judicial Opinion
Statute Success
Computer fraud and Abuse Act Analysis 2
The Computer Fraud and Abuse Act (CFAA) delineate specific illegal acts relating to computer crimes. The CFAA covers the following:
· Defines specific key terms used throughout the legislation.
· Outlines the components that do and do not constitute criminal acts.
· Specifies the consequences of those acts, as well as certain aggravating factors.
· Describes exceptions to the criminality of these acts in cases of law enforcement and similar contexts.
The essential stipulations said inside the content of the CFAA sanctioned administrative and managerial measures as to the assurance of legitimate contemplations and possibility of between PC get to.
Programmers are often characterized as people undertaking unlawful, unapproved section into work stations, databases, or virtual systems having a place with another with aim to perpetrate a wrong doing or cause devastation.
The principles and practice that are cited inside the computer fraud and abuse act are large num ...
Assignment 4 The Future of Digital Crimes and Digital Terrorism.docxrock73
Assignment 4: The Future of Digital Crimes and Digital Terrorism
Worth 250 points
In the United States, a number of law enforcement agencies, including the Secret Service, the Federal Bureau of Investigation (FBI), and the Department of Homeland Security among others have taken on roles to fight computer crimes and terrorism.
Use the Internet or library to research articles on the efforts of law enforcement agencies to combat digital crimes and digital terrorism, as well as the roles of such agencies in the future of the combat in question.
Write a four to five (4-5) page paper in which you:
1. Describe the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism.
2. Explain the existing challenges that result from the independent nature of the law enforcement agencies within the U.S. with regards to computer crimes and terrorism. Next, propose one (1) strategy that the U.S. could use in order to mitigate the challenges in question.
3. Explain the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorism.
4. Give your opinion of the key future trends in digital crime and digital terrorism. Next, provide one (1) overall strategy that the U.S. could use in order to combat digital crime and digital terrorism.
5. Use at least four (4) quality references for this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must:
· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.
The specific course learning outcomes associated with this assignment are:
· Describe future trends in digital crime and terrorism.
· Describe law enforcement roles and responses.
· Explain the procedures in the investigation of computer-related crime.
· Describe the technologies and processes involved in digital forensics.
· Explain the ethical concerns that information technologies raise in society and the impact of information technologies on crime, terrorism, or war.
· Use technology and information resources to research issues in information technology in criminal justice.
· Write clearly and concisely about information technology in criminal justice topics using proper writing mechanics and technical style convention.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric
Points: 250
Criteria
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Describe the overall impac ...
Socioeconomic drivers of injury compensation claims in NZJohn Wren
This presents the results of early work on the socio-economic drivers of injury compensation claims in NZ. The PPT presents explanatory models of the drivers of claims using a causal loop model, statistical evidence, and discusses the results in the international context. The implications of the analysis for injury prevention and claims management are discussed.
IT 659 Milestone Three Guidelines and Rubric In Milest.docxchristiandean12115
IT 659 Milestone Three Guidelines and Rubric
In Milestone Three you will submit the Recommendations and Global Considerations portion of the final project. The purpose of this assignment is to suggest
relevant changes to the organization itself and changes to the ethical guidelines that could have prevented the incident.
Prompt: Suggest relevant changes to the organization itself and changes to the ethical guidelines that could have prevented the incident. Standards external to
the organization that may have helped prevent the incident should also be proposed. This assignment will also address international compliance standards and
how they would have been relevant to the incident. The impact of the incident on global communication and commerce will be analyzed, as well as the impact on
the global technology environment.
Specifically the following critical elements must be addressed:
IV. Recommendations
a) Propose relevant changes to the organization that may have prevented the incident. How would these changes have helped to prevent the
occurrence?
b) Propose reasonable ethical guidelines that could have helped prevent the incident and that might help the organization prevent future incidents.
Propose changes to the standards external to the organization that might have helped prevent the incident. This can include changes to
regulations and regulatory and ethical standards that might exist today but did not exist or were not properly delivered at the time of the
incident. Be sure to support your conclusions.
V. Global Considerations
a) What international compliance standards (either at the time of the incident or today) would have been relevant to the incident, and how? If your
company is not global, imagine that is.
b) Analyze the impact of the incident on global communication and commerce (again, if your organization is not global, imagine otherwise). In
other words, what impact did (or would) the incident have on views and use of information technology and communication in global contexts?
c) Global Technology Environment: Based on your research and analysis of this case, determine the global legal and regulatory impacts this case
had on the information technology overall. In other words, determine the relationship between this case and the global regulatory standards
that are now in place, will be put in place shortly, or should be put in place as a result of this or related incident(s).
Rubric
Guidelines for Submission: The format for this assignment will be a three- to five-page Microsoft Word document with double spacing, 12-point Times New
Roman font, one-inch margins, and at least three sources cited in APA format.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,
review these instructions.
Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%).
Great Gatsby Theme Analysis Essay. Online assignment writing service.Leahona Lovato
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and select one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions to ensure satisfaction, with a refund option for plagiarized work.
Paper A Application of a decision making framework to an IT-related.docxdunnramage
Paper A: Application of a decision making framework to an IT-related ethical issue.
For this assignment, you are given an opportunity to explore and apply a decision making framework to an IT-related ethical issue.
A framework provides a methodical and systematic approach for decision making
.
UMUC
Module 2 - Methods of Ethical Analysis (see LEO Content – Readings for week 2)
describes three structured frameworks that may be used for ethical analysis, namely
Reynolds Seven-Step Approach, Kidder’s Nine Steps, and Spinello’s Seven-Step Process
.
There are several ways described in UMUC Module 2 to systematically approach an ethical dilemma
, and while each of the frameworks described has its merits, each will result in an ethical decision if straightforwardly and honestly applied.
In addition, you will want to consider the ethical theories described in
Module 1 – Introduction to Theoretical Ethical Frameworks (see LEO Content – Readings for week 1)
which help decision makers find the right balance concerning the acceptability of and justification for their actions. A separate write-up of the ethical theory that supports your decision is part of the following requirements.
For this paper, the following elements must be addressed:
Describe a current IT-related ethical issue
:
Since this is a paper exercise, not a real-time situation,
you may want to construct a brief scenario
where this issue comes into play, and thus causes an ethical dilemma. The dilemma may affect you, your family, your job, or your company; or it may be a matter of public policy or law that affects the general populace.
See the list below for a list of suggested issues, which may be a source of ethical dilemmas
.
Define a concise problem statement
that is
extracted
from the above description or scenario. It is best
if you define a specific problem caused by the dilemma, that needs a specific ethical decision to be made, that will solve the dilemma
. Be aware that if it is a matter of public policy or law, that it may require a regulatory body or congressional approval to take action to implement a solution.
Analyze your problem
using one of the structured decision-making frameworks chosen from Module 2.
Make sure that you identify the decision-making framework utilized. In addition, the steps in the decision-making framework selected must be used as major headings in the Analysis section.
Consider and state the impact of the decision that you made
on an individual, an organization, stakeholders, customers suppliers, and the environment, as applicable!
State and discuss the applicable ethical theory
from Module 1
that supports your decision.
Concerning your paper:
Prepare a minimum 3- 5 page, double-spaced paper and submit it to the LEO Assignments Module as an attached Microsoft Word file.
Provide appropriate American Psychological Association (APA) source citations for all sources you use
. In addition to critical thinking and analysis skills, you.
This document summarizes the results of a survey of standards and best practices used to ensure successful information resource projects. The survey examined practices in the public sector, including federal and state governments, and private sector organizations. Commonly used standards identified include the Capability Maturity Model, Project Management Body of Knowledge, software engineering standards, and ISO 9000 quality standards. State usage of these standards varies, with some states explicitly using standards more than others. Critical success factors for information resource projects identified in research include clear goals and support, detailed planning, stakeholder involvement, adequate resources and expertise, and monitoring progress. The survey findings can help organizations better apply standards and practices to deliver projects on time and on budget.
6/18/2019
1/5
Week 7
Corporate Compliance, Fraud, and Abuse
Fraud and abuse are a threat not only to individual healthcare organizations, but also to
the national healthcare system as a whole. In fiscal year 2016, the U.S. Department of
Justice (DOJ) recovered about $4.7 billion in settlements and judgments from civil cases
involving fraud and false claims. Over half of that amount, $2.5 billion, was from cases
related to the healthcare industry (DOJ, 2016). Throughout the last decade, the media has
often reported on major healthcare scandals. For example, in 2009, 60 Minutes had an
episode that described how Medicare was fraudulently billed $60 billion for services or
products that were never provided or delivered. The Centers for Medicare and Medicaid
are required to pay claims within a short time period, either 15 or 30 days. The payment
turnaround made it difficult to investigate false claims. However, the DOJ, the FBI, and
several state’s attorneys general have taken on investigating these claims. Medicare has
taken steps to make enrollment more stringent so that phony companies are less likely to
be able to commit fraud in the future (CBS News, 2009). Such cases of fraud cause great
harm to the taxpayers, whose dollars go into a public trust to administer two of the largest
direct health services programs in the world. However, it’s the smaller cases of fraud that
go almost unnoticed and not reported by the media that result in a similar degree of harm
to the U.S. healthcare system.
Abuse, providing unnecessary services, and overbilling for services are also detrimental to
the system of healthcare. As stated in Week 3, cases of fraud and abuse result in both
criminal and civil charges. In the face of such large-scale corruption in 1991, the U.S.
Sentencing Commission (USSC) adopted guidelines that provided rules and principles for
the sentencing of organizations that commit fraud and abuse. Moreover, the Thompson
Memorandum, otherwise known as Principles of Federal Prosecution of Business
Organizations, established guidelines that U.S. attorneys can use in determining whether
to bring an enforcement action against an organization (U.S. Sentencing Commission,
2015). These guidelines and principles have been updated in keeping with the changes in
the corporate climate, with the latest proposed changes announced in late 2018 (U.S.
Department of Justice, 2018). In response, leaders of healthcare organizations began to
establish corporate compliance programs to prevent and mitigate the effects of fraud and
abuse. The U.S. Department of Health and Human Services’ Office of the Inspector
https://ncuone.ncu.edu/d2l/home/143543
6/18/2019
2/5
Books and Resources for this Week
Mayer, C. M. (1995). Preventing fraud and
abuse fallout. Healthcare Financial
Management, 49(4), 40, 42, 44.
Link
General (OIG), is responsible for disseminating compliance guidance to
healthcare organizations.
As was discussed i ...
Week 8 Quantitative Research DesignPrevious Next Instructio.docxphilipnelson29183
The document outlines a proposed quantitative research study that will investigate the impact of disclosure of private information by private and governmental agencies on threats to individual privacy rights. The study will seek to answer three research questions through surveys and experiments/quasi-experiments. Statistical analyses like correlations, regressions, t-tests, and ANOVAs will be used to analyze the data and determine relationships between disclosure of information and privacy threat levels. It is hoped the study will provide empirical evidence to inform policies around protecting individual privacy rights in the context of increasing information sharing.
Similar to Project Deliverable 1This assignment consists of two (2) section.docx (18)
You have collected the following documents (unstructured) and pl.docxbriancrawford30935
You have collected the following documents (unstructured) and plan to apply an index technique to convert them into an inverted index.
Doc 1?Information retrieval is the activity of obtaining information resources relevant to an information need from a collection of information resources. Searches can be based on full-text or other content-based indexing.
Doc 2?Information retrieval is finding material of an unstructured nature that satisfies an information need from within large collections.
Doc 3?Information systems is the study of complementary networks of hardware and software that people and organizations use to collect, filter, process, create, and distribute data.
In the process of creating the inverted index, please complete the following steps:
Remove all stop words and punctuation, and then apply Porter’s stemming algorithm to the documents. Thelist of stop words for this task is provided as follows:
Is, The, Of, To, An, A, From, Can, Be, On, Or, That, Within, And, Use
Create a merged inverted list including the within-document frequencies for each term.
Use the index created in part (b) to create a dictionary and the related posting file.
You may like to test the inverted index by using the following keywords:information, system, index
.
You have been working as a technology associate the information .docxbriancrawford30935
You have been working as a technology associate the information systems department at Corporation Techs for a while now. You have discovered so far that all of Corporation Techs’ computer systems share the same Class C public IP address range, including workstations along with servers providing authentication, e-mail, and both secure and public Web sites.
Your next task in this project is to construct a basic network design. An important requirement for the network design is to reduce the number of public addresses needed as the subnet lease results in very high ISP costs.
Tasks
Construct a basic network design, separating private and public services within the Corporation Techs’ network. To do so, you must:
Access the PCAP files using NetWitness Investigator, and browse the Nmap scan (XML format), topology fisheye chart (PDF format), and Nessus report (HTML format).
Identify vulnerabilities and clear-text information transfer.
Conduct research and determine the best network design to ensure security of internal access while retaining public Web site availability.
Identify any opportunities for reduced ISP costs through port redirection or address translation.
Design a network configuration, identifying network gateways, port or address redirection systems, and the location of hosts within private and protected network segments.
Create a professional report detailing the information above as supportive documentation for the network security plan.
Create a report that includes a basic network diagram and research results.
.
You have chosen to join WHO. They are particularly interested in.docxbriancrawford30935
You have chosen to join WHO. They are particularly interested in your microbiology skills since there have been many outbreaks of disease around the world. Now that you have reviewed your microbiology, you have been notified that you will be sent to one of two areas, West Africa, or the Middle East. In preparation, the Peace Corp would like you to choose one of these areas and complete a plan to deal with outbreaks or potential outbreaks in the area.
Choose an outbreak from those below to investigate.
Ebola or Middle East respiratory syndrome coronavirus (MERS-CoV)
Locate resources that will provide information about the infection, causing microbe, mode of infection, mode of spread, group or groups specifically susceptible, where outbreak occurred and when, clinical evaluation and diagnosis, infection control.
Find first person reports such as interviews or personal reports or journals on the outbreak. If you need help work with the librarian.
Design and submit an outline of the information you have uncovered. You will use this information to complete the project.
The outline should contain information and cited resources for:
Name of the disease chosen
Causing microbe
Mode of infection
Mode of spread
Group or groups specifically susceptible
Where outbreak occurred and when
Clinical evaluation and diagnosis
Infection control.
.
You have been tasked to present at a town hall meeting in your local.docxbriancrawford30935
You have been tasked to present at a town hall meeting in your local town or city to present the details about a new local policy that is being proposed. The presentation will need to define the problem, proposed solutions, risks, challenges, and funding opportunities/challenges. Topics may include local government changes to communities (for example, transportation, commercial enterprise effects on nearby townships, affordable housing construction, environmental effects of new/old business operations, addressing homelessness support, and others).
Using the
Policy Identification and Analysis Assignment Template [PPTX],
develop an 8–10 slide presentation in which you:
Analyze and define the problem to include possible political conflicts.
Identify risks and challenges.
Identify and construct policy alternatives and solutions.
Identify stakeholders and key roles.
Identify funding opportunities, challenges, and budget cost factors, to include saving measures.
Select supportive and evaluative criteria.
Identify incentives, subsidies, and potential benefits.
Draw conclusions in a thorough summary, including lessons learned.
Use the Internet or Strayer databases at the
Strayer Library
to locate at least three quality resources in this assignment.
Note
: Wikipedia and similar websites do not qualify as quality resources.
Use the
Policy Identification and Analysis Assignment Template [PPTX]
.
.
You have been tasked as the health care administrator of a major hos.docxbriancrawford30935
You have been tasked as the health care administrator of a major hospital to create a financial plan for your organization. What would you include in your financial plan? Compare an operating budget versus a capital budget? Include examples of each budget in a hypothetical department or unit of a hospital. Cite and reference your resources.
.
You have been tasked to devise a program to address the needs of.docxbriancrawford30935
You have been tasked to devise a program to address the needs of crime victims. To better understand what type of program to devise, you need to review some crime data. The crime data will help you to identify the various types of crimes being committed and how the various types of crime victims are impacted by their offenders. Select a source that compiles crime data. Describe why you selected that particular source and what type of data that source contains. Secondly, describe the basic goals of your proposed program and what types of services the program would provide to crime victims based on the various types of crimes. For example, what would be a program goal for a rape victim, and what type of program(s) or service(s) would be devised to address the victim’s needs (this could include gender, age, and group counseling sessions).
Assignment Guidelines
Select a source that compiles crime data.
Address the following in 750–1,000 words:
Why did you select that particular source? Explain in detail.
What type of data does that source contain? Describe in detail.
What are the basic goals of your proposed program? Explain in detail.
What types of services would the program provide to crime victims with regard to the various types of crime? Explain in detail.
Be sure to reference all sources using APA style.
.
You have been successful in your application for the position be.docxbriancrawford30935
You have been successful in your application for the position below and are invited to interview – time and date to be arranged.
Job Title: Social Care Worker – Residential services Panel
The social care worker will…
· work with children / young people, families and / or significant others, Social Work teams, other healthcare providers and agencies, schools, training agencies and community groups.
· care for, protect, and support vulnerable or dependent clients, individually or in groups, in conjunction with the wider multidisciplinary team and other relevant agencies. S/he will ensure the welfare of those under his / her care and will act as an advocate as appropriate.
· contribute to the planning and evaluation of individualised and group programmes of care, which are based on needs, identified in consultation with the client and others and delivered through day-to-day shared life experiences.
· work as part of a team to provide a safe, caring environment for resident clients/ children / young people with the primary aim of providing the intervention necessary to address the issues that are preventing them from fulfilling their outcomes.
· treat clients/ children/ young people and their families with dignity and respect, promoting a culture of unconditional positive regard at all times.
· recognise clients/ children / young people as expert through experience, promoting their participation in care planning, placement planning, decision-making and service delivery.
· contribute to the promotion of good links with neighbours, local community resources, i.e. schools, employment schemes and clubs, local Gardai and any other appropriate service.
· engage in reflective and evidence based practice
. That guideline to use to answer this question 1 to 3
1. Creative practice, reflective practice and team skills
It is important that the Social Care Worker can work independently as well as part of a wider healthcare team, building and maintaining relationships and understanding and valuing individuals and their respective professional roles. S/he should be able to identify the limits of their practice and know when to seek advice and additional expertise or refer to another professional. S/he should be able to give and receive feedback and to input their learning into their practice.
In the space below, please give an example of a situation where you were responsible for an individual piece of work with a service user/group of service users and which demonstrates your ability in the above areas
2
.
Flexibility, resilience and ability to deal with challenges.
An effective Social Care Worker demonstrates a commitment to providing a quality service. S/he is innovative and open to change in striving to ensure high standards in service delivery. Challenges can arise in many ways in the course of Social Care practice and an ability to manage adversity when it arises is an important professional skill.
In the space below, please give an.
You have been hired as a project management consultant by compan.docxbriancrawford30935
You have been hired as a project management consultant by company XYZ to review the status of a CRM (Customer Relationship Management) implementation by their internal project manager. Project Manager has spent allot of time with stakeholders on request for additional features being added to the project, resulting in 7 CRs (total potential project impact of $400,000). You are to review and assess the available current data on the project and provide specific recommendations and prioritized next steps to the executive committee.
Start Date: March 2021
Planned Finish Date: September 2021
Current Phase: Implementation
Overall Percent Complete: 40%
Overall Approved budget: $1,000,000
Actual Cost to date: $650,000
Number of Change Requests submitted by stakeholders: 7
CPI = 0.45
SPI = 0.65
EV = $400,000
.
You have been hired to manage a particular aspect of the new ad.docxbriancrawford30935
You have been hired to manage a particular aspect of the new adult addictions center. It is your job to write a proposal to bring to the next board meeting so that funds can be allocated to initiate your plans. This is the brainstorming stage of the planning. Your proposal will need to be scrutinized by the board before it approves it. It is important to be as specific and detailed as possible to justify the needs of your department before going forward. It is also important to be realistic, but at the same time expand your ideas, goals, and aspirations into doable actions because this board wants you to think outside of the box.
MY ASSIGNED ROLE IS COMMUNITY RESOURCES
Community referrals and other needs (e.g., working with the justice system, local businesses, and nonprofit organizations)
Write a 900–1,200 word paper that addresses the following:
What is the department’s role within the organization, and what are its responsibilities?
What are the client needs or services that are addressed by this department?
What individuals and resources are needed to provide those services?
**** Paper must include ****
Abstract
Introduction
Conclusion
References for all of the sections, in APA style
.
You have been hired by Red Didgeridoo Technologies. They know th.docxbriancrawford30935
You have been hired by Red Didgeridoo Technologies. They know that they need to have network storage technologies, but their IT is a little lost. They want to have a scalable infrastructure to be able to expand and shrink the servers in their infrastructure when needed. In order to do this, they have purchased a license for VMware vSphere 6 Enterprise Plus.
NOTE:There must be at least 1 to 2 paragraphs per question.
1. Find and describe 2 distinct uses for a File Sharing Server which uses the sharing protocol named NFS (at least one of these must be a use specifically involving VMware vSphere 6 Enterprise Plus). List the advantages of using these implementations instead of using SMB or CIFS.
2. Find and describe 2 distinct uses (at least one of these must be a use which specifically involve VMware vSphere 6 Enterprise Plus) for iSCSI technology.
.
You have been hired by TMI to design an application using shell scri.docxbriancrawford30935
You have been hired by TMI to design an application using shell script programs. TMI
Case
Projects
needs you to design and create a new directory structure.
The company has several departments: accounting, sales, manufacturing, information tech-
nology, and headquarters. The accounting department has accounts receivable, accounts
payable, and payroll functions within it. The manufacturing department runs three shifts
and a weekend shift.The information technology department has five projects in progress.
The sales department has offices located in the West, East, North, and South.
First, design the Linux file system hierarchy on paper. Keep in mind that the depart-
ments, functions, shifts, regions, and projects need to translate into directories. Next, you
need to create this hierarchy on the Linux system. Create at least one empty file in each
directory. Use the department, function, shift, region, or project name as the filename
and include an extension of .dat.
.
You have been hired to evaluate the volcanic hazards associated .docxbriancrawford30935
You have been hired to evaluate the volcanic hazards of a dormant volcano showing signs of activity. To assess potential future eruptions, you would seek information about prehistoric eruptions by examining the volcano's field to understand eruption styles and magnitudes from similar past events to better predict future volcanic activity and hazards.
You have been hired as an assistant to the public health officer for.docxbriancrawford30935
You have been hired as an assistant to the public health officer for the state. The budget deficit has impacted your state, and with elections high on the list of worries, legislators are concerned about their public image and are contemplating reducing the public health budget for the state. You are being asked to prepare a presentation to persuade legislators not to cut public health spending.
Select a public health program/service that will be impacted by a recently proposed state budget cut.
Prepare a PowerPoint presentation to persuade legislators not to cut public health funding. Present the cost/benefit of the public health program/service, the expected impact of the proposed cut, and conclude with an alternative proposal.
The presentation should have a minimum of 15 slides (not including the reference slides).
Notes should be present with each slide describing the information on the slide.
Provide supporting information.
Use charts, graphs, and other visuals.
Please make sure to present some state and local data of the community that will be impacted by the cuts.
REQUIREMENTS:
- Length: Assignment should be at least 15 slides, not counting reference slides.
- Cite your sources and include reference slides.
.
You have been engaged to develop a special calculator program. T.docxbriancrawford30935
You have been engaged to develop a special calculator program. The requirements for this program are very specific, and are as follows:
Create a Windows Forms application in Visual Studio using C#. The interface should look similar to the following:
Create the following controls, as shown above:
Labels for “Enter Information,” “Name,” “Input 1,” and “Input 2”
3 textboxes, as shown in the picture above
Buttons for addition, subtraction, multiplication, and division
Buttons for calculating sine, cosine, and tangent (based on the first input textbox only)
A button that calculates modulus
A button that clears the textboxes
Write a method for each of these calculations that will accept the incoming numbers from the two input fields and return the calculated value.
This value should be displayed in a MessageBox window, which should also display the user’s name from the first textbox.
Please submit your zipped Visual Studio project.
.
You have now delivered the project to your customer ahead of schedul.docxbriancrawford30935
You have now delivered the project to your customer ahead of schedule, but slightly over budget. Now, it is time to reflect on what went well and what didn’t go so well. Based on feedback throughout the course, what would you have done differently in terms of scope, resources, and / or schedule, and why?
.
You have now delivered the project to your customer. The project was.docxbriancrawford30935
You have now delivered the project to your customer. The project was delivered ahead of schedule, as requested by your project sponsor, but over budget by 20 percent. Now, it is time to reflect on what went well and what didn’t go well. Based on feedback throughout the course, what would you have done differently in terms of scope, resources, and schedule, and why?
.
You have now experienced the work of various scholars, artists and m.docxbriancrawford30935
You have now experienced the work of various scholars, artists and musicians who have connected words to social justice.
Now, it is your turn. Write a poem, song, spoken word, lecture, or rap that captures the struggle, action or hope that exists in a social issue of black lives matter. Be creative; this is your opportunity to express your reflections and ideas in a personal and compelling way.
.
You have learned that Mr. Moore does not drink alcohol in the mornin.docxbriancrawford30935
You have learned that Mr. Moore does not drink alcohol in the mornings. He does not binge drink, and he does not drink on Sundays. He does, however, drink the other 6 days of the week. Mrs. Moore explains his pattern of drinking Monday through Friday with his partners as stated in the scenario above, but he does not drink at home on those days. She also informs you that he does drink on Saturdays at home, often starting in the afternoon and passing out by dinnertime. He has a history of being loud, frightening, and angry when under the influence of alcohol. You also learn that Mr. Moore’s father was a winemaker from Italy.
Your supervisor, Officer Steve, suggests that you apply your knowledge of issues surrounding alcohol abuse and alcohol addiction to this case and write a memo to him. The memo should include the proper headings: "To," "From," "Date," and "Re:." The docket number and probation case file number should be included in the "Re:" section. You are beginning to determine whether Mr. Moore has an issue with alcohol that needs to be further addressed.
In the memo, do the following:
Submit the assignment in the format of a memo.
Include the proper headings: "To," "From," "Date," and "Re:." The docket number and probation case file number need to be included in the "Re:" section.
Apply the facts of Mr. Moore's case to the definitions of alcohol abuse and alcohol addiction.
Apply these facts to the differences between alcohol use and abuse.
Apply these facts to the DSM-IV criteria for a diagnosis of alcohol abuse.
Apply these facts to the disease model of alcohol abuse.
Apply these facts to the role genetics and heredity may play in the transmission of alcohol abuse from one generation to another
.
.
You have been hired by a large hospitality firm (e.g., Marriot.docxbriancrawford30935
You have been asked to speak to the HR staff of a large hospitality firm about managing the project to relocate the company's headquarters office. To ease their fears of project failure, given past experiences, you will explain key elements of project management to them by comparing it to human resources management, which the staff understands well. Your explanation will address how using project management practices can help ensure the project is delivered successfully.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Project Deliverable 1This assignment consists of two (2) section.docx
1. Project Deliverable 1
This assignment consists of two (2) sections: a project
introduction and a project plan. You must submit both sections
as separate files for the completion of this assignment.
Label each file name according to the section of the assignment
it is written for.
Additionally, you may create and/or assume all necessary
assumptions needed for the completion of this assignment.
-------------------------------------/
Section 1: Project Introduction
Write a four to six (4-6) page project introduction that
documents the current state of the organization, expands upon
the information given above, and includes the following:
Background information of the company.
Details regarding the type of business that the company is
engaged in.
A description of current outsourcing and off shoring activities.
Identification of current skilled information systems personnel
in position and responsibilities.
The specific types of data that the company collects.
A description of the information systems that the company
currently has to support the business. The description at a
minimum should include the following:
Operational Systems and Databases
Analytics and Interfaces
Infrastructure and Security
The use of at least two (2) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Use a title page, abstract, in-text citations and references
---------------------------------------------------------------------------
------------
Section 2: Project Plan
2. Use Microsoft Project to:
Create a project plan (summary and detailed) using Microsoft
Office Project. The project plan should:
Record all tasks, subtasks, resources, and time-related to the
project.
Outline the planning, analysis, design, and implementation
phases.
Develop in accordance with the systems
development lifecycle (SDLC).
---------------------------------------------------------------------------
------------------------------
See below on how to setup up your Project Plan using the
Project Management Phases
For this assignment, we will we use at least four of the PMI
Phases.
Initiating or Initiation, Planning, Executing and Closing
See the Video below on how to incorporate this requirement.
Reference
Microsoft Project for Software Developers Tutorial | Adding
The Phase And Section Headings. (2014, February 28).
Retrieved fromhttps://www.youtube.com/watch?v=6dr1LGJb1I4
---------------------------------------------------------------------------
---------------------------
See below the details on the SDLC
1. Planning
This is the first phase of the systems development process.
Identify whether or not there is the need for a new system to
achieve the business"s strategic objectives.
2. Systems Analysis and Requirements
The second phase is where businesses will work on the source
of their problem or the need for a change. In the event of a
3. problem, possible solutions are submitted and analyzed to
identify the best fit for the ultimate goal(s) of the project.
Systems analysis is vital in determining what a business"s needs
are, as well as how they can be met, who will be responsible for
individual pieces of the project, and what sort
of timeline should be expected
3. Systems Design
The third phase describes, in detail, the necessary
specifications, features, and operations that will satisfy the
functional requirements of the proposed system which will be in
place. It"s during this phase that they will consider the
essential components (hardware and/or software) structure
(networking capabilities), processing and procedures for the
system to accomplish its objectives.
4. Development
The fourth phase is when the real work begins particular, when
a programmer, network engineer and/or database developer are
brought on to do the major work on the project. This work
includes using a flow chart to ensure that the process of the
system is properly organized. The development stage is also
characterized by installation and change. Focusing on training
can be a huge benefit during this phase.
5. Integration and Testing
The fifth phase involves systems integration and system testing
(of programs and procedures)—normally carried out by a
Quality Assurance (QA) professional — to determine if the
proposed design meets the initial set of business goals. Testing
may be repeated, specifically to check for errors,
bugs, and interoperability. This testing will be performed until
the end user finds it acceptable. Another part of this phase is
verification and validation, both of which will help ensure the
program"s successful completion.
6. Implementation
The sixth phase is when the majority of the program is written.
Additionally, this phase involves the actual installation of the
newly-developed system. This step puts the project into
4. production by moving the data and components from the old
system and placing them in the new system via a direct cutover.
While this can be a risky (and complicated) move,
the cutover typically happens during off-peak hours, thus
minimizing the risk. Both system analysts and end-users should
now see the realization of the project that has implemented
changes.
7. Operations and Maintenance
The seventh and final phase involves maintenance and regular
required updates. This step is when end users can fine-tune the
system, if they wish, to boost performance, add new capabilities
or meet additional user requirements.
Comments: This is a proposal the topic is fine ( add 10 two
pages on this topic by choosing one state) you also may wish to
stay with one state to make the project more doable since policy
is different in every state. However, the topic is fine.
GUN CONTROL IN AMERICA
Gun control issue has attracted mixed reactions from the
American citizens and also legislatures. Stirred by a continuous
of mass killings by gunmen in civilian settings, the debate over
gun control in America has been waxing and waning over the
years (Lee, 2016). There have been increased deaths of innocent
people and the more they take place the high the issue intensity,
and on the evening news violence is frequently in the lead.
Attributing it variously to talk radio impacts, sole issue politics,
a loss of society, the faith erosion, or just plain bad manners,
many people today point to a general fall in the level of our
civil discourse. Its solution can be located in the middle of the
dilemma regardless of whatever its causes; the talks cannot stop
just because they are rude and pathetic in a way and such
translates motive. The issue of gun control is rich in content and
is connected to other disciplines.
5. Gun control is problem in the United States and as a result, it is
no longer about liking or not liking guns neither is it about
liking or not liking power (Gabor, 2016). It needs to be about
control effectiveness judgment and to be appropriate state
control as implemented and exercised through regulation. It is a
problem because in America gun ownership surpasses other
nations, and the current mass killings, particularly have
increased comparison with laws and regulations abroad. The
assassinations of prominent and famous individuals in America
led to the response and recent federal policy in this context is
marked by Gun Control Act of 1968. There are those people
who oppose gun control measures and present the argument that
there exist about twenty thousand gun regulations in America,
and that, as there is the passage of more laws, increased gun
violence takes place. But it is important to look at the issue
from a positive side since these are high state and domestic
legislation with limited effect, and that with their absence the
incidents level would even be greater.
The use of guns in self-defense is another area of dispute. It
means that gun control opponents relate to research that state
guns are in use up to 2.4 million times annually for protection
(Wilson, 2016). However, those who support the concept argue
that the number might be overrated. It is hard to implement the
gun control while the United States keeps on granting gun
ownership to the people. Homes get broken into, and when the
criminals get hold of the weapon, they will use it to benefit
themselves with no probable cause. It means that the gun
control need to start with gun regulation and control and this
will be achieved through banning ownership and reclaiming
already distributed back.
According to Swiss-based small army research report, America
with less than five percent of the global population bears about
thirty to fifty percent of the global citizens owned guns.
Analysts have argued that the statistics present do not primarily
take a cause-and-impact correlation; America tops the list of
countries with the greatest homicide-by-weapon rate among the
6. global developed countries (Karimu, 2015). Gun control issue is
of great significance because its discussion and focus will
determine the best way set targets can be met and how the
initiatives need to be developed and implemented. In that case,
gun control is a topic with relevance and requires in-depth
analysis to determine the strategies, recommendations, pros and
cons among others.
References
Karimu, O. O. (2015). The two sides of gun legislation and
control debate in United States of America. European Scientific
Journal, 400.
Gabor, T. (2016). Confronting Gun Violence in America.
Switzerland: Palgrave Macmillan.
Wilson, H. L. (2016). Gun Politics in America: Historical and
Modern Documents in Context [2 Volumes]: Historical and
Modern Documents in Context. Santa Barbara: ABC-CLIO.
Lee, M. A. (2016). Gun Control: Overview. Salem Press
Encyclopedia,
Response one pol-02
this week’s lesson was discussing the many categories scholars
and historians may use to classify the type of President or level
of successes a President may or may not have while in office.
The lesson presented Paul Quirk’s model for measuring
Presidential success which contain three categories; the self-
reliant, the minimalist, and the strategic competence model1.
The self-reliant president is described as one that owns the
majority of the responsibility solely, involved in almost every
decision, little to no delegation1. This model of presidency, in
my opinion, would be more likely to succeed in the early years
of our nation, when things were not as complicated and fast
paced as today. Today there are so many things in motion, from
domestic to foreign policy, national security and defense,
national economic and global economics, it would be impossible
to be successful if a President did not delegate these tasks out
7. and reserve the most sensitive and important topics to a more
“hands on approach”. To me this model would fit a Presidency
like FDR, as pointed out in our lesson. FDR was personally
invested in almost every major event during his Presidency,
from the War to the New Deal. The second model illustrated in
our lesson this week is the minimalist model; in contrast with
the self-reliant model, a more “hands off” and delegating role1.
This is an interesting model category because it makes it seem
as though the President has a care free attitude. In my opinion it
all depends on the maturity and capabilities of the team you
have around you if you can delegate a majority of the
responsibility. If you have a young, inexperienced team
delegating much of the work with no guidance or coaching
could spell a disaster. On the other hand, if you have a
seasoned, well credentialed and respected team, the
consequences of not delegating responsibility may lead to
morale issues as the President (or leader/boss) may be casted as
a micro-manager. So for me it all comes down to the makeup of
your team, the strengths and weaknesses. The lesson offers that
this model is reflective of Ronald Reagan and George W. Bush,
but I also think an argument could be made to place Barack
Obama in this model as well as the next the model, the strategic
competence model. This model is characterized as relying on a
team around you to be advisors and assisting with making
intelligent choices1. I also think this model applies to Barack
Obama since he was characterized as being a transactional
leader2 which helped him mitigate through the economic crisis
and the Wars in Iraq and Afghanistan. Obama clearly relied on
advisement and gathered information and data before making
informed decisions. After looking at all three models, I believe
to be a successful President the person must have a little bit of
all three and the ability to adapt to the situation and team
around you. The other factor that was mentioned in this week’s
lesson is the political atmosphere at the time of a Presidency;
which party has control of the Congress. That alone can make or
break a Presidency.
8. 1. Eric Grulke, “Week 2: Models of Presidential Leadership.”
American Military Uniiversity, Accessed January 8, 2018.
https://edge.apus.edu/portal/site/366584/tool/ac046166-37b2-
492d-8e6e-
b208146732e9/ShowPage?returnView=&studentItemId=0&back
Path=&errorMessage=&clearAttr=&source=&title=&sendingPag
e=1493983&newTopLevel=false&postedComment=false&addBe
fore=&itemId=4284550&path=push&addTool=-
1&recheck=&id=
2. Joseph S. Nye, Jr., "Presidential Leadership and U.S. Foreign
Policy," Brown Journal of World Affairs 20, no. 1 (November
2013): ,
http://ezproxy.apus.edu/login?url=https://search.proquest.com/d
ocview/1513212155?accountid=8289.
References
Grulke, Eric, “Week 2: Models of Presidential Leadership,”
American Military University, accessed January 8,
2018, https://edge.apus.edu/portal/site/366584/tool/ac046166-
37b2-492d-8e6e-
b208146732e9/ShowPage?returnView=&studentItemId=0&back
Path=&errorMessage=&clearAttr=&source=&title=&sendingPag
e=1493983&newTopLevel=false&postedComment=false&addBe
fore=&itemId=4284550&path=push&addTool=-
1&recheck=&id=
Response two-po2-02
The qualities and characteristics which determine the
effectiveness of presidential leadership have been evaluated by
a large number of scholars throughout history, yet there are still
no specific variables which indicate how effective a president
will be. Rating a president has become an extremely
complicated process, various scholars all presenting different
tools and criteria which they believe is the best measure of
judgment. Presidents bring a wide variety of experience and
9. intellect, making it incredibly important to understand the
evaluation process.
Quirk (1990) depicts three models which help to
determine presidential success: the self-reliant presidency, the
minimalist presidency, and the strategic competence model.
Jimmy Carter was considered to be a self-reliant president, he
wanted to be thoroughly involved in every aspect of the
presidency, even going as far as to check the arithmetic in
budget documents (Quirk 1990, 166). Unfortunately Carter’s
attention to detail only contributed to the quality of his
administration at a very marginal level, taking his attention
away from much more essential tasks (Quirk 1990, 166). This
type of presidency “can lead to an obsessive narrowness, and it
is too far removed from reality to offer concrete guidance”
(Quirk 1990, 166).
Quirk’s (1990) minimalist presidency model depicts a
president which has very little understanding of political issues
or problems and relies heavily on subordinates, the most recent
president being Ronald Reagan (Quirk 1990, 167). Reagan’s
presidency was very similar to the chairman of the board, in
which he would develop overall guidelines which would be
accomplished by like-minded, elected individuals (Quirk 1990,
167). This model of presidency holds an exorbitant amount of
issues, the president’s cabinet can never make up for the
deficiencies of the president and the president is constantly
unable to meet the demands of a dynamic political system.
Quirk’s (1990, 170) third model, strategic
competence, lies between the two extremes of a self-reliant
presidency and a minimalist presidency. A president does not
need to know everything, yet must be able to make positive,
effective decisions and delegate efficiently (Quirk 1990, 170).
A president’s time and attention is a scarce resource which must
be allocated appropriately in order to create the best possible
outcome. George Bush was considered to be a president that
encompassed the strategic competence model, he was vastly
educated in political policy and was able to make important
10. decisions without the help of subordinates or cues (Quirk 1990,
181).
The three models presented by Quirk indicate a
variety of positive and negative qualities which can lead to a
successful presidency, yet there is no perfect model and
therefore no specific way of identifying the best form of
evaluation. “It must be acknowledged that judging the most
effective or successful presidents is a daunting task”, there are
no key variables which point to presidential success (Goethals
2005, 566). Success is different to various individuals or
political scholars and can be considered to be in the “eye of the
beholder”, each person judging different qualities or
characteristics and considering them to be most important or
holding the most weight (Goethals 2005, 566).
Individual presidents can be very influential, yet
much of what they do and how they approach the presidency
depends on the political climate during the historical time which
they are serving. A variety of strategies are at a president’s
disposal, some of which help to address specific issues and
others that are used to create a distraction from key issues.
Furthermore, “leaders may perceive the same structural
environment in very different ways and differ in their attitudes
towards risks and potential payoffs” (Keller and Foster 2012,
594). There is no perfect way to establish what makes a
president successful or how he/she will make decisions on
important issues, the best remedy seems to be evaluating past
presidents to create a better template for future candidates.
Works Cited
Goethals, George R. “Presidential Leadership”. Annual Review
of Psychology 56 (2005): 545-570. Accessed January 11,
2018. http://ezproxy.apus.edu/login?url=https://search.proquest.
com/docview/205849702?accountid=8289.
Keller, Jonathan and Dennis Foster. “Presidential Leadership
Style and the Political Use of Force”. Political Psychology 33,
no. 5 (2012): 581-598. Accessed January 11, 2018.
11. http://ezproxy.apus.edu/login?url=http://search.ebscohost.com/l
ogin.aspx?direct=true&db=tsh&AN=80125511 &site=ehost-
live&scope=site.
Quirk, Paul J. “Presidential Competence”. In The Presidency
and the Political System, edited by Michael Nelson, 163-187.
Washington, D.C.: Congressional Quarterly Inc., 1990.
Accessed January 11,
2018.https://archive.org/stream/presidencypoliti00nels#page/n3/
mode/2up.
Click the link above to submit your assignment.
Students, please view the "Submit a Clickable Rubric
Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor
Center.
Project Deliverable 1: Project Plan Inception
Due Week 2 and worth 110 points
This assignment consists of two (2) sections: a project
introduction and a project plan. You must submit both sections
as separate files for the completion of this assignment. Label
each file name according to the section of the assignment it is
written for. Additionally, you may create and / or assume all
necessary assumptions needed for the completion of this
assignment.
You are a newly appointed Chief Information Officer (CIO) of a
$25 million dollar data collection and analysis company that has
been operating less than two (2) years. It is expected to grow by
60% over the next eighteen (18) months. Your company
currently collects data using Web analytics and combines it with
operational systems data. Web analytics is an increasingly
important part of most business marketing plans. Your company
12. is looking for ways to leverage the collected data but wants to
ensure that the information technology infrastructure will
support the expected growth that the company is anticipating.
The Chief Executive Officer (CEO) has given you sixty (60)
days to deliver a comprehensive information systems project
plan to address the organizational growth that the company is
experiencing. The company will be expanding from one (1)
floor to three (3) floors within six (6) months. Since this is a
relatively new company, there is currently limited technology
infrastructure to support the business. All information
technology (hardware and software) must be redesigned to meet
organizational needs. The solution should be implemented in
either a hosted solution, on-site solution, or a hybrid model.
The CEO is expecting you to integrate different technologies
from different partners and incorporate industry best practices
and cost-effective solutions in connection with the development
of technological systems. In addition, the CEO is extremely
interested in cloud computing technologies and Software-as-a-
Service (SaaS) but is leery of security issues that may be
associated. However, he is sure that you will implement proper
security protocols. The company currently consists of twenty
(20) employees of which four (4), including yourself, are
dedicated to the IT organization.
Section 1: Project Introduction
1. Write a four to six (4-6) page project introduction that
documents the current state of the organization, expands upon
the information given above, and includes the following:
. Background information of the company.
. Details regarding the type of business that the company is
engaged in.
. A description of current outsourcing and offshoring activities.
. Identification of current skilled information systems personnel
in position and responsibilities.
. The specific types of data that the company collects.
. A description of the information systems that the company
13. currently has to support the business. The description at a
minimum should include the following:
. Operational Systems and Databases
. Analytics and Interfaces
. Infrastructure and Security
· The use of at least two (2) quality resources in this
assignment. Note: Wikipedia and similar Websites do not
qualify as quality resources.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
Section 2: Project Plan
Use Microsoft Project to:
2. Create a project plan (summary and detailed) using Microsoft
Office Project. The project plan should:
. Record all tasks, subtasks, resources, and time related to the
project.
. Outline the planning, analysis, design, and implementation
phases.
. Develop in accordance with the systems development life
cycle (SDLC).
The specific course learning outcomes associated with this
assignment are:
· Describe the various functions and activities within the
information systems area, including the role of IT management
and the CIO, structuring of IS management within an
organization, and managing IS professionals within the firm.
· Use technology and information resources to research issues in
information systems.
14. · Write clearly and concisely about strategic issues and
practices in the information systems domain using proper
writing mechanics and technical style conventions.
· Grading for this assignment will be based on answer quality,
logic / organization of the paper, and language and writing
skills, using the following rubric.
Points: 110
Project Deliverable 1: Project Plan Inception
Criteria
UnacceptableBelow 60% F
Meets Minimum Expectations60-69% D
Fair70-79% C
Proficient80-89% B
Exemplary90-100% A
Section 1: Project Introduction
1a. Include background information of the company.
Weight: 10%
Did not submit or incompletely included background
information of the company.
Insufficiently included background information of the company.
Partially included background information of the company.
Satisfactorily included background information of the company.
Thoroughly included background information of the company.
1b. Include details regarding the type of business that the
company is engaged in.
Weight: 10%
Did not submit or incompletely included details regarding the
type of business that the company is engaged in.
Insufficiently included details regarding the type of business
that the company is engaged in.
Partially included details regarding the type of business that the
company is engaged in.
15. Satisfactorily included details regarding the type of business
that the company is engaged in.
Thoroughly included details regarding the type of business that
the company is engaged in.
1c. Include a description of current outsourcing and offshoring
activities.
Weight: 5%
Did not submit or incompletely included a description of
current outsourcing and offshoring activities.
Insufficiently included a description of current outsourcing and
offshoring activities.
Partially included a description of current outsourcing and
offshoring activities.
Satisfactorily included a description of current outsourcing and
offshoring activities.
Thoroughly included a description of current outsourcing and
offshoring activities.
1d. Include identification of current skilled information systems
personnel in position and responsibilities.
Weight: 5%
Did not submit or incompletely included identification of
current skilled information systems personnel in position and
responsibilities.
Insufficiently included identification of current skilled
information systems personnel in position and responsibilities.
Partially included identification of current skilled information
systems personnel in position and responsibilities.
Satisfactorily included identification of current skilled
information systems personnel in position and responsibilities.
Thoroughly included identification of current skilled
information systems personnel in position and responsibilities.
1e. Include the specific types of data that the company collects.
Weight: 5%
Did not submit or incompletely included the specific types of
data that the company collects.
Insufficiently included the specific types of data that the
16. company collects.
Partially included the specific types of data that the company
collects.
Satisfactorily included the specific types of data that the
company collects.
Thoroughly included the specific types of data that the company
collects.
1fi. Include a description of the information systems that the
company currently has to support the business, including
operational systems and databases.
Weight: 10%
Did not submit or incompletely included a description of the
information systems that the company currently has to support
the business, including operational systems and databases.
Insufficiently included a description of the information systems
that the company currently has to support the business,
including operational systems and databases.
Partially included a description of the information systems that
the company currently has to support the business, including
operational systems and databases.
Satisfactorily included a description of the information systems
that the company currently has to support the business,
including operational systems and databases.
Thoroughly included a description of the information systems
that the company currently has to support the business,
including operational systems and databases.
1fii. Include a description of the information systems that the
company currently has to support the business, including
analytics and interfaces.
Weight: 5%
Did not submit or incompletely included a description of the
information systems that the company currently has to support
the business, including analytics and interfaces.
Insufficiently included a description of the information systems
that the company currently has to support the business,
including analytics and interfaces.
17. Partially included a description of the information systems that
the company currently has to support the business, including
analytics and interfaces.
Satisfactorily included a description of the information systems
that the company currently has to support the business,
including analytics and interfaces.
Thoroughly included a description of the information systems
that the company currently has to support the business,
including analytics and interfaces.
1fiii. Include a description of the information systems that the
company currently has to support the business, including
infrastructure and security.
Weight: 5%
Did not submit or incompletely included a description of the
information systems that the company currently has to support
the business, including infrastructure and security.
Insufficiently included a description of the information systems
that the company currently has to support the business,
including infrastructure and security.
Partially included a description of the information systems that
the company currently has to support the business, including
infrastructure and security.
Satisfactorily included a description of the information systems
that the company currently has to support the business,
including infrastructure and security.
Thoroughly included a description of the information systems
that the company currently has to support the business,
including infrastructure and security.
1g. 2 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
18. choices.
Exceeds number of required references; all references high
quality choices.
Section 2: Project Plan
2a. Create a project plan (summary and detailed) using
Microsoft Office Project, recording all tasks, subtasks,
resources, and time related to the project.
Weight: 10%
Did not submit or incompletely created a project plan (summary
and detailed) using Microsoft Office Project, recording all
tasks, subtasks, resources, and time related to the project.
Insufficiently created a project plan (summary and detailed)
using Microsoft Office Project, recording all tasks, subtasks,
resources, and time related to the project.
Partially created a project plan (summary and detailed) using
Microsoft Office Project, recording all tasks, subtasks,
resources, and time related to the project.
Satisfactorily created a project plan (summary and detailed)
using Microsoft Office Project, recording all tasks, subtasks,
resources, and time related to the project.
Thoroughly created a project plan (summary and detailed) using
Microsoft Office Project, recording all tasks, subtasks,
resources, and time related to the project.
2b. Create a project plan (summary and detailed) using
Microsoft Office Project, outlining the planning, analysis,
design, and implementation phases.
Weight: 10%
Did not submit or incompletely created a project plan (summary
and detailed) using Microsoft Office Project, outlining the
planning, analysis, design, and implementation phases.
Insufficiently created a project plan (summary and detailed)
using Microsoft Office Project, outlining the planning, analysis,
design, and implementation phases.
Partially created a project plan (summary and detailed) using
Microsoft Office Project, outlining the planning, analysis,
design, and implementation phases.
19. Satisfactorily created a project plan (summary and detailed)
using Microsoft Office Project, outlining the planning, analysis,
design, and implementation phases.
Thoroughly created a project plan (summary and detailed) using
Microsoft Office Project, outlining the planning, analysis,
design, and implementation phases.
2c. Create a project plan (summary and detailed) using
Microsoft Office Project developed in accordance with the
systems development life cycle (SDLC).
Weight: 10%
Did not submit or incompletely created a project plan (summary
and detailed) using Microsoft Office Project developed in
accordance with the systems development life cycle (SDLC).
Insufficiently created a project plan (summary and detailed)
using Microsoft Office Project developed in accordance with the
systems development life cycle (SDLC).
Partially created a project plan (summary and detailed) using
Microsoft Office Project developed in accordance with the
systems development life cycle (SDLC).
Satisfactorily created a project plan (summary and detailed)
using Microsoft Office Project developed in accordance with the
systems development life cycle (SDLC).
Thoroughly created a project plan (summary and detailed) using
Microsoft Office Project developed in accordance with the
systems development life cycle (SDLC).
3. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present