STAY SAFE
ONLINE
National Cyber
Awareness Poster
Contest Winner:
Sergio, Grade 11,
Virginia
2019 CIS Posters.indd 1 7/9/18 4:10 PM
BE A GOOD
DIGITAL CITIZEN
National Cyber
Awareness Poster
Contest Winner:
Stephanie, Grade 7,
North Carolina
2019 CIS Posters.indd 2 7/9/18 4:10 PM
BROWSE SAFELY
ONLINE
National Cyber
Awareness Poster
Contest Winner:
Danielle, Grade 11,
New York
2019 CIS Posters.indd 3 7/9/18 4:10 PM
DON’T TAKE
THE BAIT
National Cyber
Awareness Poster
Contest Winner:
Diya, Grade 7,
New Jersey
2019 CIS Posters.indd 4 7/9/18 4:10 PM
Running head: THE LEGALIZATION OF MARIJUANA
1
THE LEGALIZATION OF MARIJUANA
6
The Legalization of Marijuana
Northwest University Online
March 16, 2019
The Legalization of Marijuana
Marijuana, which has a scientific name of Cannabis Sativa, is a plant that has sparked mixed feelings not only in the United States but all over the world. Jamaica has been the oldest nation that has come out openly to legalize marijuana, and it has been preaching the same gospel to other parts of the world (Campbell, Twenge, & Carter, 2017). Different nations are now seeing the need
to legalize marijuana. However, irrespective of the fact that nations that advocate for marijuana legalization have provided facts that they believe should be followed,
there are opposing forces from different perspectives
, and they have sparked arguments
that continue to increase the heat on the debate of whether to legalize marijuana. The controversial debate on whether to legalize marijuana has been argued from two different perspectives and each of the perspectives will be focused on.
Argument for
In the United States, more than ten states have so far legalized marijuana. What is more fascinating is the fact that other states are following suit and there are headed in the same direction. The states that have legalized marijuana have legalized it based on recreation and medical use. It is therefore evident that the topic of legalizing marijuana has been medically
motivated (Campbell et al. 2017). Apart from the few states in the united states,
there are other countries that have come in the open to legalize marijuana. Some of the nations are Canada, Belize, Jamaica, Colombia, Ecuador, Peru, Uruguay, Cambodia, Laos, and Belgium.
The people who support the legalization of marijuana have given their reasons.
The first reason is the reduction of addiction and use of substandard marijuana. One of the reasons
why some people are affected by marijuana is because of the quality of the marijuana that they are exposed to. The fact that marijuana is illegal gives the peddlers an opportunity to sell substandard marijuana, and that affects the health of the smoker. If marijuana was legalized, there would
be an opportunity for the users to get information about the substance. As a result, the use of substandard substance would be frustrated. The legalization of marijuana would also pr.
IB Theory of Knowledge EA: Disagreement Between Experts in a DisciplineLaurel Ayuyao
Given access to the same facts, experts can still disagree due to various intrinsic and extrinsic factors. In ethics, disagreements arise from differences in personal backgrounds and political views, allowing issues to be understood from multiple perspectives. However, in natural science disagreements often create uncertainty, especially when not resolved. Motivations like gaining prestige or attention can influence experts' conclusions. While disagreements advance knowledge by disproving theories, they can confuse non-experts if leading to unresolved debates. Overall, disagreements among experts affect both the depth of knowledge in their discipline and how the public understands issues.
Invitational Conference on Behavioral Science WRR, Netspar (Network for Studies on Pensions, Aging and Retirement), TIBER (Tilburg Institute for Behavioral Economics Research) and the Ministry of Finance
Annotated Bibliography.A very heated discussion on whether to sa.docxfestockton
Annotated Bibliography.
A very heated discussion on whether to sanction cannabis has been going on in the U.S for quite a long time now; the arrangement will not be accomplished except if the bodies mindful arrive at an accord on the drug's social, health, and financial advantages. Marijuana is expended and got as medication from the cannabis plant. It is likewise an exceptional medication and should to be used as a restorative and recreational medication in North America. There have been a few attempts to legalize cannabis in various states, yet the procedure has been met with numerous moves neglecting to pass the arrangements into law. When fittingly utilized, cannabis has demonstrated to have progressively constructive outcomes on individuals. It helps individuals with ceaseless infection; it stops malignant growth cells and diminishes depression to patients with uneasiness; along these lines, marijuana ought to be legalized.
The following articles provide an insight on the issues of marijuana legalization and the challenges faced when advocating for these issues.
Hoover, D (2017, September 7th). 4 Reasons why legalizing Marijuana could be the solution to America’s Problems. Retrieved from https://www.huffpost.com/entry/4-reasons-why-legalizing-_b_11870030
In this article, Hoover, D talks about the four significant reasons why the legalization of marijuana could be the solution to America’s problems. The author of this article centers arguments on the benefits of marijuana on health, economy, and general happiness. Some of the reasons the author feels would lead to the legalization of marijuana include; the first reason is that Cannabis is medicine- the fact that 23 states in the U.S have legalized marijuana; many physicians still do not have the slightest idea on how to prescribe it. The second reason the author talks about is the contribution of marijuana to the economy-according to the article, cannabis can be a steady source of income to the economy when putting to proper use. The third reason the author talks about is that legalizing cannabis could lead to the collapse of the international drug trade-this is supported in the study conducted in 2012 by the Mexican Competitiveness Institute, the study suggested that legalizing cannabis would make cartels run out of business. The final reason discussed in this article is the general happiness of individuals-it is suggested that legalizing marijuana would lead to low depression rates in the U.S and help reduce the rates of suicide.
Ruggiero, V. R. (2012). Thinking critically about ethical issues (8th ed.). New York: Mc-Graw Hill.
Thinking Critically About Ethical Issues welcomes readers to apply moral standards to issues that represent the kinds of moral difficulties experienced in regular day to day life. It gives a review of the requirement for morals and afterward centers around systems for compelling basic leadership. Ruggiero underlines doing ethical examination instead of contrasti ...
GEN 499Ronald’s PostIdentify the global societal issue you ha.docxshericehewat
GEN 499
Ronald’s Post:
Identify the global societal issue you have chosen to research for your Final Paper, an argumentative essay, and explain why further research on this topic is important.
The global societal issue I have chosen to research for my final paper is Climate change. Further research is needed because many things can cause change to the climate, which is why it is essential to choose a subtopic of climate change. The subtopic that I have chosen is the oil industry’s problem between profits and CO2 emissions. The oil industry is trying to meet demand but also causing change to the climate through emissions. More research is needed to develop points and evidence, which are needed for both sides of the argument. Research is also necessary to create a possible solution.
Provide a clear and concise thesis statement that includes a solution to the global societal issue (see Writing a Thesis Statement (Links to an external site.) for assistance).
Carbon Dioxide emissions emitted by oil companies contribute to climate change, and a possible solution is providing oil companies bonuses or tax exemptions for exceeding emission regulations.
Explain how this global societal issue impacts a specific population.
The global societal issue of climate change impacts the entire world population. There are oil and natural gas companies all around the world meeting the growing demand of oil and gas. There is not one specific population that this global issue impacts.
Locate a peer-reviewed scholarly source and provide statistical data that you found surprising on the topic.
In the scholarly source, Krauss (2019) states, "Chevron and Occidental, which have each taken seats on Carbon Engineering's board, refused to disclose their investments. The company says it raised a total of $68 million in its most recent funding round to expand the pilot and develop its first commercial plant" (pg. 1). That is a lot of money, but to those companies, it is just a drop in the bucket, but that isn't what is most surprising. Most surprising is that there is no product, machine, or process outside of testing mode that works. What is Chevron (who is one of the leading oil companies) doing with the money invested since it has not found a way to remove carbon from the climate? There were no numbers to put with the dollar amount of what they were going to do by a certain time. I find that very surprising and a bit intriguing. It has nothing to do with availability or how possible it is to reduce emissions but a matter of who will do it. According to Krauss (2019), "A few companies, including Royal Dutch Shell and BP, are linking compensation to emissions reductions" (pg. 1). Even countries that are not as big of producers as chevron and other companies are doing what they can to increase spending to have clean energy. Krauss (2019) states, “Equinor, the Norwegian oil company, plans to increase spending on clean energy to 15 to 20 percent of it ...
This document discusses three cases involving issues in healthcare organizations that led to negative patient outcomes or violations of policies/laws. The first case involves a medication error and lack of patient monitoring at a hospital that led to a patient's disability. The second case involves potential insurance fraud at an insurance company where medical decisions were made without proper review of patient records. The third case discusses extremely long wait times at a veterans hospital that led to deaths, and an attempt to hide wait time data. The document provides these cases as options for an assignment analyzing organizational structures, policies, ethics, and laws to develop a risk management or compliance plan to address the issues and prevent future occurrences.
Teen Suicide Case Study Essay
Health Care Proposal Essay
Reserch Proposal Example
A Modest Proposal Summary
Research Proposal
Project Proposal Example
Project Proposal Essay
Sample Proposal Letter Essay
Crime Research Proposal
Investment Proposal Essay example
This document provides an overview of the debate around whether marijuana should be legalized in the United States. It outlines some of the key arguments on both sides of the issue, including potential benefits such as reduced drug costs and trafficking versus potential harms such as increased addiction and traffic accidents. The document also provides background on marijuana and its current legal status in different states.
Running head ANNOTATED BIBLIPOGRAPHY1ANNOTATED BIBLIOGRAPHY.docxjoellemurphey
Running head: ANNOTATED BIBLIPOGRAPHY 1
ANNOTATED BIBLIOGRAPHY 6
Annotated bibliography
Fai Alshammari
Joanne greenbaum
Read290
4/10/2015
Name
Fai
Source 1
“A Contentious Debate: Same-Sex Marriage in the U.S.” is a research paper submitted by the PEW research center on July 9, 2009.( Pew Research Center's Religion & Public Life Project, 2009)
Authors credentials purpose and audience
The author, David Masci, is a senior research fellow at Pew Research Center’s Forum on Religion & Public Life. The purpose of his paper is to give an overview of the current state of gay marriage in the U.S. the paper’s target audience is the general American population.
Content summary
The report seeks to address current and past efforts by members on both sides of the divide- those for and against same-sex marriage. As of 2009 10 states had legislation legalizing same-sex marriage while 29 states had legislation prohibiting the same. The big win for the proponents came as President’s Barack Obama grant of family medical leave and other benefits to the same-sex partners of federal workers. (Goldberg, 2008) The author deems the battle to have been won by the supporters of same-sex marriage. This is supported by California Supreme Court’s decision on May 2009 to uphold Proposition 8 constitutionality. (Masci, 2009)
Article evaluation
States passed the Defense of Marriage Act (DOMA) that defined marriage as union between one man and one woman. This was asserted in 1996 when Congress passed a federal DOMA that stated that no state should be compelled to recognize a same-sex union performed in another state. Same-sex marriage supporters argue on the basis of non-discrimination and equality while those who oppose cite the social impact of legalization (Masci, 2009).
Article reflection
As a reflection, public polls and surveys conducted in the past few years indicate that the majority of Americans oppose the legalization of gay marriage. The biggest opposing faction is religious groups. The ratios, however, have been shifting in favor of the supporters. This may represent an ideological change amongst Americans and a turning point for the nation.
discussion
The road ahead seems that the debate on same-sex marriage will remain a hotly contested issue. The best course of action is to have a committee review the stand on same-sex marriage objectively and inclusively to come up with a position that will be the position of the American people.
Name
Fai
Source 2
“Gay marriage showdown” is a scholarly article by Kenneth Jost published on the CQ Researcher on September 26, 2008.
Authors credentials purpose and audience
The author Kenneth Jost is an adjunct professor at Harvard College and Georgetown University Law Center. He has authored The Supreme Court Yearbook and is the editor of The Supreme Court from A to Z. the author wishes to discuss same-sex marriage legalization in different states with the residents and legislators in these states.
Content summary
The paper ...
IB Theory of Knowledge EA: Disagreement Between Experts in a DisciplineLaurel Ayuyao
Given access to the same facts, experts can still disagree due to various intrinsic and extrinsic factors. In ethics, disagreements arise from differences in personal backgrounds and political views, allowing issues to be understood from multiple perspectives. However, in natural science disagreements often create uncertainty, especially when not resolved. Motivations like gaining prestige or attention can influence experts' conclusions. While disagreements advance knowledge by disproving theories, they can confuse non-experts if leading to unresolved debates. Overall, disagreements among experts affect both the depth of knowledge in their discipline and how the public understands issues.
Invitational Conference on Behavioral Science WRR, Netspar (Network for Studies on Pensions, Aging and Retirement), TIBER (Tilburg Institute for Behavioral Economics Research) and the Ministry of Finance
Annotated Bibliography.A very heated discussion on whether to sa.docxfestockton
Annotated Bibliography.
A very heated discussion on whether to sanction cannabis has been going on in the U.S for quite a long time now; the arrangement will not be accomplished except if the bodies mindful arrive at an accord on the drug's social, health, and financial advantages. Marijuana is expended and got as medication from the cannabis plant. It is likewise an exceptional medication and should to be used as a restorative and recreational medication in North America. There have been a few attempts to legalize cannabis in various states, yet the procedure has been met with numerous moves neglecting to pass the arrangements into law. When fittingly utilized, cannabis has demonstrated to have progressively constructive outcomes on individuals. It helps individuals with ceaseless infection; it stops malignant growth cells and diminishes depression to patients with uneasiness; along these lines, marijuana ought to be legalized.
The following articles provide an insight on the issues of marijuana legalization and the challenges faced when advocating for these issues.
Hoover, D (2017, September 7th). 4 Reasons why legalizing Marijuana could be the solution to America’s Problems. Retrieved from https://www.huffpost.com/entry/4-reasons-why-legalizing-_b_11870030
In this article, Hoover, D talks about the four significant reasons why the legalization of marijuana could be the solution to America’s problems. The author of this article centers arguments on the benefits of marijuana on health, economy, and general happiness. Some of the reasons the author feels would lead to the legalization of marijuana include; the first reason is that Cannabis is medicine- the fact that 23 states in the U.S have legalized marijuana; many physicians still do not have the slightest idea on how to prescribe it. The second reason the author talks about is the contribution of marijuana to the economy-according to the article, cannabis can be a steady source of income to the economy when putting to proper use. The third reason the author talks about is that legalizing cannabis could lead to the collapse of the international drug trade-this is supported in the study conducted in 2012 by the Mexican Competitiveness Institute, the study suggested that legalizing cannabis would make cartels run out of business. The final reason discussed in this article is the general happiness of individuals-it is suggested that legalizing marijuana would lead to low depression rates in the U.S and help reduce the rates of suicide.
Ruggiero, V. R. (2012). Thinking critically about ethical issues (8th ed.). New York: Mc-Graw Hill.
Thinking Critically About Ethical Issues welcomes readers to apply moral standards to issues that represent the kinds of moral difficulties experienced in regular day to day life. It gives a review of the requirement for morals and afterward centers around systems for compelling basic leadership. Ruggiero underlines doing ethical examination instead of contrasti ...
GEN 499Ronald’s PostIdentify the global societal issue you ha.docxshericehewat
GEN 499
Ronald’s Post:
Identify the global societal issue you have chosen to research for your Final Paper, an argumentative essay, and explain why further research on this topic is important.
The global societal issue I have chosen to research for my final paper is Climate change. Further research is needed because many things can cause change to the climate, which is why it is essential to choose a subtopic of climate change. The subtopic that I have chosen is the oil industry’s problem between profits and CO2 emissions. The oil industry is trying to meet demand but also causing change to the climate through emissions. More research is needed to develop points and evidence, which are needed for both sides of the argument. Research is also necessary to create a possible solution.
Provide a clear and concise thesis statement that includes a solution to the global societal issue (see Writing a Thesis Statement (Links to an external site.) for assistance).
Carbon Dioxide emissions emitted by oil companies contribute to climate change, and a possible solution is providing oil companies bonuses or tax exemptions for exceeding emission regulations.
Explain how this global societal issue impacts a specific population.
The global societal issue of climate change impacts the entire world population. There are oil and natural gas companies all around the world meeting the growing demand of oil and gas. There is not one specific population that this global issue impacts.
Locate a peer-reviewed scholarly source and provide statistical data that you found surprising on the topic.
In the scholarly source, Krauss (2019) states, "Chevron and Occidental, which have each taken seats on Carbon Engineering's board, refused to disclose their investments. The company says it raised a total of $68 million in its most recent funding round to expand the pilot and develop its first commercial plant" (pg. 1). That is a lot of money, but to those companies, it is just a drop in the bucket, but that isn't what is most surprising. Most surprising is that there is no product, machine, or process outside of testing mode that works. What is Chevron (who is one of the leading oil companies) doing with the money invested since it has not found a way to remove carbon from the climate? There were no numbers to put with the dollar amount of what they were going to do by a certain time. I find that very surprising and a bit intriguing. It has nothing to do with availability or how possible it is to reduce emissions but a matter of who will do it. According to Krauss (2019), "A few companies, including Royal Dutch Shell and BP, are linking compensation to emissions reductions" (pg. 1). Even countries that are not as big of producers as chevron and other companies are doing what they can to increase spending to have clean energy. Krauss (2019) states, “Equinor, the Norwegian oil company, plans to increase spending on clean energy to 15 to 20 percent of it ...
This document discusses three cases involving issues in healthcare organizations that led to negative patient outcomes or violations of policies/laws. The first case involves a medication error and lack of patient monitoring at a hospital that led to a patient's disability. The second case involves potential insurance fraud at an insurance company where medical decisions were made without proper review of patient records. The third case discusses extremely long wait times at a veterans hospital that led to deaths, and an attempt to hide wait time data. The document provides these cases as options for an assignment analyzing organizational structures, policies, ethics, and laws to develop a risk management or compliance plan to address the issues and prevent future occurrences.
Teen Suicide Case Study Essay
Health Care Proposal Essay
Reserch Proposal Example
A Modest Proposal Summary
Research Proposal
Project Proposal Example
Project Proposal Essay
Sample Proposal Letter Essay
Crime Research Proposal
Investment Proposal Essay example
This document provides an overview of the debate around whether marijuana should be legalized in the United States. It outlines some of the key arguments on both sides of the issue, including potential benefits such as reduced drug costs and trafficking versus potential harms such as increased addiction and traffic accidents. The document also provides background on marijuana and its current legal status in different states.
Running head ANNOTATED BIBLIPOGRAPHY1ANNOTATED BIBLIOGRAPHY.docxjoellemurphey
Running head: ANNOTATED BIBLIPOGRAPHY 1
ANNOTATED BIBLIOGRAPHY 6
Annotated bibliography
Fai Alshammari
Joanne greenbaum
Read290
4/10/2015
Name
Fai
Source 1
“A Contentious Debate: Same-Sex Marriage in the U.S.” is a research paper submitted by the PEW research center on July 9, 2009.( Pew Research Center's Religion & Public Life Project, 2009)
Authors credentials purpose and audience
The author, David Masci, is a senior research fellow at Pew Research Center’s Forum on Religion & Public Life. The purpose of his paper is to give an overview of the current state of gay marriage in the U.S. the paper’s target audience is the general American population.
Content summary
The report seeks to address current and past efforts by members on both sides of the divide- those for and against same-sex marriage. As of 2009 10 states had legislation legalizing same-sex marriage while 29 states had legislation prohibiting the same. The big win for the proponents came as President’s Barack Obama grant of family medical leave and other benefits to the same-sex partners of federal workers. (Goldberg, 2008) The author deems the battle to have been won by the supporters of same-sex marriage. This is supported by California Supreme Court’s decision on May 2009 to uphold Proposition 8 constitutionality. (Masci, 2009)
Article evaluation
States passed the Defense of Marriage Act (DOMA) that defined marriage as union between one man and one woman. This was asserted in 1996 when Congress passed a federal DOMA that stated that no state should be compelled to recognize a same-sex union performed in another state. Same-sex marriage supporters argue on the basis of non-discrimination and equality while those who oppose cite the social impact of legalization (Masci, 2009).
Article reflection
As a reflection, public polls and surveys conducted in the past few years indicate that the majority of Americans oppose the legalization of gay marriage. The biggest opposing faction is religious groups. The ratios, however, have been shifting in favor of the supporters. This may represent an ideological change amongst Americans and a turning point for the nation.
discussion
The road ahead seems that the debate on same-sex marriage will remain a hotly contested issue. The best course of action is to have a committee review the stand on same-sex marriage objectively and inclusively to come up with a position that will be the position of the American people.
Name
Fai
Source 2
“Gay marriage showdown” is a scholarly article by Kenneth Jost published on the CQ Researcher on September 26, 2008.
Authors credentials purpose and audience
The author Kenneth Jost is an adjunct professor at Harvard College and Georgetown University Law Center. He has authored The Supreme Court Yearbook and is the editor of The Supreme Court from A to Z. the author wishes to discuss same-sex marriage legalization in different states with the residents and legislators in these states.
Content summary
The paper ...
Statistica Sinica 16(2006), 847-860
PSEUDO-R
2
IN LOGISTIC REGRESSION MODEL
Bo Hu, Jun Shao and Mari Palta
University of Wisconsin-Madison
Abstract: Logistic regression with binary and multinomial outcomes is commonly
used, and researchers have long searched for an interpretable measure of the strength
of a particular logistic model. This article describes the large sample properties
of some pseudo-R2 statistics for assessing the predictive strength of the logistic
regression model. We present theoretical results regarding the convergence and
asymptotic normality of pseudo-R2s. Simulation results and an example are also
presented. The behavior of the pseudo-R2s is investigated numerically across a
range of conditions to aid in practical interpretation.
Key words and phrases: Entropy, logistic regression, pseudo-R2
1. Introduction
Logistic regression for binary and multinomial outcomes is commonly used
in health research. Researchers often desire a statistic ranging from zero to one
to summarize the overall strength of a given model, with zero indicating a model
with no predictive value and one indicating a perfect fit. The coefficient of deter-
mination R2 for the linear regression model serves as a standard for such measures
(Draper and Smith (1998)). Statisticians have searched for a corresponding in-
dicator for models with binary/multinomial outcome. Many different R2 statis-
tics have been proposed in the past three decades (see, e.g., McFadden (1973),
McKelvey and Zavoina (1975), Maddala (1983), Agresti (1986), Nagelkerke
(1991), Cox and Wermuch (1992), Ash and Shwartz (1999), Zheng and Agresti
(2000)). These statistics, which are usually identical to the standard R2 when
applied to a linear model, generally fall into categories of entropy-based and
variance-based (Mittlböck and Schemper (1996)). Entropy-based R2 statistics,
also called pseudo-R2s, have gained some popularity in the social sciences (Mad-
dala (1983), Laitila (1993) and Long (1997)). McKelvey and Zavoina (1975)
proposed a pseudo-R2 based on a latent model structure, where the binary/
multinomial outcome results from discretizing a continuous latent variable that
is related to the predictors through a linear model. Their pseudo-R2 is defined
as the proportion of the variance of the latent variable that is explained by the
848 BO HU, JUN SHAO AND MARI PALTA
covariate. McFadden (1973) suggested an alternative, known as “likelihood-
ratio index”, comparing a model without any predictor to a model including all
predictors. It is defined as one minus the ratio of the log likelihood with inter-
cepts only, and the log likelihood with all predictors. If the slope parameters
are all 0, McFadden’s R2 is 0, but it is never 1. Maddala (1983) developed
another pseudo-R2 that can be applied to any model estimated by the maximum
likelihood method. This popular and widely used measure is expressed as
R2M = 1 −
(
L(θ̃)
L(θ̂)
)
2
n
, (1)
.
Stations yourself somewhere (library, cafeteria, etc.) and observe.docxrafaelaj1
Stations yourself somewhere (library, cafeteria, etc.) and observe the nonverbal communication that occurs.
What do people say with their bodies?
What messages are implicit in vocal expressions, clothes, make-up and so on?
Take notes on five of the most eloquent messages sent nonverbally.
*one page.
*Read the instructions then write about 5 difeerent people
.
StatementState legislatures continue to advance policy proposals.docxrafaelaj1
Statement
State legislatures continue to advance policy proposals to address cyber threats directed at governments and private businesses. As threats continue to evolve and expand and as the pace of new technologies accelerates, legislatures are making cybersecurity measures a higher priority.
Assignment
You are to author a 2-page (maximum) paper about the “failed” amendments proposed by the Kentucky legislature in 2019 with respect to Cyber Policy. APA format – 1 cover page, 2 content pages, and 1 reference page.
You are to answer two questions in your individual papers.
Brief background of the proposed amendment and “researched” speculation as to why it failed?
What would you propose for them to pass in 2020?
Remember to cite your sources appropriately and turn in original work!
Section 54
KY S 14
Status: Failed - Adjourned
Provides definitions relating to personal information, provides certain personal information that shall be protected from disclosure by a public agency or third-party contractor through redaction or other means, provides a list of covered persons, provides guidelines for contracts between a public agency and a third-party contractor.
.
StatementState legislatures continue to advance policy propo.docxrafaelaj1
Statement
State legislatures continue to advance policy proposals to address cyber threats directed at governments and private businesses. As threats continue to evolve and expand and as the pace of new technologies accelerates, legislatures are making cybersecurity measures a higher priority.
Assignment
You are to author a 2-page (maximum) paper about the “failed” amendments proposed by the Kentucky legislature in 2019 with respect to Cyber Policy. APA format – 1 cover page, 2 content pages, and 1 reference page.
You are to answer two questions in your individual papers.
Brief background of the proposed amendment and “researched” speculation as to why it failed?
What would you propose for them to pass in 2020?
Remember to cite your sources appropriately and turn in original work!
KY S 14
Status: Failed - Adjourned
Provides definitions relating to personal information, provides certain personal information that shall be protected from disclosure by a public agency or third-party contractor through redaction or other means, provides a list of covered persons, provides guidelines for contracts between a public agency and a third-party contractor.
.
Statement of PurposeProvide a statement of your educational .docxrafaelaj1
Statement of Purpose
Provide a statement of your educational background, experience, and preparation relevant to a graduate program in computer science, and specify your research and career goals.
The statement of purpose is a short essay introducing the applicant and his or her
interests, goals, and reasons for pursuing graduate study in history. Applicants may wish
to share a draft of their statement with the individuals writing their letters of
recommendation. While every statement, like every prospective student, will be different,
applicants should devote special attention to the following items:
• Academic/Professional Background: Please give your academic credentials, with
degrees, dates, and relevant employment experience. You do not need to list every
job you have had, only those that bear directly on your desire to enter graduate
school.
• Motivations and Aims: Explain what motivates you to do graduate work in history
and what your goals are, both within the graduate program and after the
completion of your degree.
• Existing Expertise and Accomplishments in History: Discuss any areas of
expertise you may already have in your proposed area of interest. If you have
experience doing research, please describe the project and your work on it. If you
have any special talents or skills, such as a foreign language, please describe
them.
• Proposed Course of Study: Please identify planned major field and minor fields of
study.
• Other Relevant Experiences or Personal Qualities: Discuss any experiences or
personal attributes that may illuminate your commitment to the study of history
and to the successful completion of the graduate program.
Format: Your statement of purpose should be limited to no more than 750 words
(between 2 and 3 pages).
.
States and the federal government should not use private prisons for.docxrafaelaj1
States and the federal government should not use private prisons for various reasons. First, most of the private prisons are for-profit facilities. Therefore, they cut on expenses such as lacking enough staffing and resources, which is likely to affect inmates' safety and quality of life. Further, while pro-private prisons note that private prisons save taxpayers' money, studies indicate that they do not reduce costs. For instance, the day to day cost of housing an inmate in 2010 was $53.02 for private prisons compared to $48.42 for a medium-security public prison (Pedowitz, 2012). Also, prisoners do not receive similar kinds of treatment in private facilities. While they may be suitable for the local economy, such as offering job opportunities, lowering costs by private facilities leaves inmates sick and not well cared for (NPR Staff, 2011).
.
StatementState legislatures continue to advance policy proposa.docxrafaelaj1
The document discusses a 2-page paper assignment on failed cybersecurity amendments proposed by the Kentucky legislature in 2019. Students are asked to analyze why one amendment failed and propose a new amendment for 2020. The failed amendment, KY S 14, aimed to protect personal information from disclosure by public agencies or third-party contractors.
Statement of Interest (This is used to apply for Graduate Schoo.docxrafaelaj1
Statement of Interest: (This is used to apply for Graduate School, digital media program)
Length: 2 pages. (500-750 words)
Area of interest in digital media.
-computational arts.
I did a mix media group exhibition in Feb. 2018 called What Makes You You. Half of my show is a sculpture-based installation. The other half is an interactive digital programed art(using Processing software). The visual of human evolution ties these two park together. See details at https://dongpu.weebly.com/what-makes-you-you.html
-short videos (documentary production).
I love shooting short videos. I formed a Youtube team called 2037 Club last year. https://www.youtube.com/channel/UCmtUQfDMvL9iE8IOy9oshSA
The latest documentary I did is called Liang(Grain). Video Statement:This documentary discovers the Chinese planned economy history period, which starts at the 1950s. People were given a certain amount of coupons to buy food and daily needs because of the limitation of products. Since this is a historical theme, reference images are included to support the concept of buying food today and before 1990. Other than that, the visuals are mainly about common people’s daily routine nowadays. Along with the visual, the most artistic part in this video is Shanghainese dialogue, which explained food coupons in the way of storytelling. “I accidentally found many food coupons in my grandparents’ house this summer, so I went to ask them about the experiences they had with these coupons. My curiosity leads me to the theme.” said by the producer.
This particular video also has a different meaning to me. My Grandmother passed away one week before the video published at the film festival (at Scottsdale Museum of Commemoratory Art). This piece becomes memorable to me, sadly, my grandmother never had a chance to see the whole piece.
https://www.youtube.com/watch?v=fD0Y-BXDfnY
-3D animation for games
I learned Maya in an animation course. Like editing videos, I soon full in love with 3D modeling.
https://www.youtube.com/watch?v=nGIRxaUdYiY
Business idea, if an applicant has one. It is fine if an applicant is unsure when applying to the program. It is also fine if an applicant is interested in the artistic aspect of digital media and not the entrepreneurial aspect.
I would like to complete a mobile game project in my Graduate studies period and start a game company after graduation. Meanwhile, still active in the art field being an intermedia artist.
Goals or expectations upon completion of the digital media program.
-I want to learn more about computer technologies to create artistic works. Focusing on the field of game development.
-Do more social, get to know people in my field
-Get professional advices of my projects
Here is my cover letter, you can utilize this for the statement of interest.
As a creative and passionate professional with a rich history of developing creative materials, I am eager to submit my resume for consideration for the (Position Title) position .
StatementState legislatures continue to advance policy prop.docxrafaelaj1
Statement
State legislatures continue to advance policy proposals to address cyber threats directed at governments and private businesses. As threats continue to evolve and expand and as the pace of new technologies accelerates, legislatures are making cybersecurity measures a higher priority.
Assignment
You are page amendments to author a 2-page (maximum) paper about the “failed” amendments proposed by the Kentucky legislature in 2019 with respect to Cyber Policy. APA format – 1 cover page, 2 content pages, and 1 reference pageamendments proposed.
You are to answer two questions in your individual papers.
Brief background of the proposed amendment and “researched” speculation as to why it failed?
What would you propose for them to pass in 2020?
.
Statement of cash flows (indirect method) Cash flows from ope.docxrafaelaj1
Statement of cash flows (indirect method)
Cash flows from operating activities
Net income
72,600
adjustments to net income
depreciation
4,000
Gan on sale of investments
-7,000
Increase in AR
-36,000
Decrease in inventory
40,000
Increased in Accounts payable
13,000
Decrease in Accrued liabilities
-3,100
net cash provided by operating activities
83,500
Cash flows from investing activities
Purchase of Plant assets
-16,000
Sale of long-term investments
20,000
net cash provided by investing activities
4,000
Cash flows from financing activities
retiement of bonds
-31,000
payment of dividend
-32,500
sale of common stock
6,000
net cash provided by financing activities
-57,500
net increase in cash
30,000
Cash balance, beginning
230,000
cash balance, ending
260,000
Statement of Cash flows (direct method)
Cash flows from operating activities
cash received from customers
714,000
(sales - increase in AR)
cash paid for merchandise
477,000
(cogs - decrease in invnetory - increase in AP)
cash paid for other operating expenes
105,100
(selling & admin exp + decrease in accrued liab - depreciation)
cash paid for income taxes
48,400
net cash provided b oeprating activities
83,500
Cash flows from investing activities
Purchase of Plant assets
-16,000
Sale of long-term investments
20,000
net cash provided by investing activities
4,000
Cash flows from financing activities
retiement of bonds
-31,000
payment of dividend
-32,500
sale of common stock
6,000
net cash provided by financing activities
-57,500
net increase in cash
30,000
Cash balance, beginning
230,000
cash balance, ending
260,000
.
Stateline Shipping and Transport CompanyRachel Sundusky is the m.docxrafaelaj1
Stateline Shipping and Transport Company
Rachel Sundusky is the manager of the South-Atlantic office of the Stateline Shipping and Transport Company. She is in the process of negotiating a new shipping contract with Polychem, a company that manufactures chemicals for industrial use. Polychem want Stateline to pick up and transport waste products from its six plants to three waste disposal sites. Rachel is very concerned about this proposed arrangement. The chemical wastes that will be hauled can be hazardous to humans and the environment if they leak. In addition, a number of towns and communities in the region where the plants are located prohibit hazardous materials from being shipped through their municipal limits. Thus, not only will the shipments have to be handled carefully and transported at reduced speeds, they will also have to traverse circuitous routes in many cases. Rachel has estimated the cost of shipping a barrel of waste from each of the six plants to each of the three waste disposal sites as shown in the following table:
Waste Disposal Site
Plant
Whitewater
Los Canos
Duras
Kingsport
$12
$15
$17
Danville
14
9
10
Macon
13
20
11
Selma
17
16
19
Columbus
7
14
12
Allentown
22
16
18
The plants generate the following amounts of waste products each week:
Plant
Waste per Week (bbl)
Kingsport
35
Danville
26
Macon
42
Selma
53
Columbus
29
Allentown
38
The three waste disposal sites at Whitewater, Los Canos, and Duras can accommodate a maximum of 65, 80, and 105 barrels per week respectively. In addition to shipping directly from each of the six plants to one of the three waste disposal sites, Rachel is also considering using each of the plants and waste disposal sites as intermediate shipping points. Trucks would be able to drop a load at a plant or disposal site to be picked up and carried on to the final destination by another truck, and vice versa. Stateline would not incur any handling costs because Polychem has agreed to take care of all local handling of the waste materials at the plants and the waste disposal sites. In other words, the only cost Stateline incurs is the actual transportation cost. So Rachel wants to be able to consider the possibility that it may be cheaper to drop and pick up loads at intermediate points rather than ship them directly. Rachel estimates the shipping costs per barrel between each of the six plants to be as follows:
Plant
Plant
Kingsport
Danville
Macon
Selma
Columbus
Allentown
Kingsport
$ __
$6
$4
$9
$7
$8
Danville
6
__
11
10
12
7
Macon
5
11
__
3
7
15
Selma
9
10
3
__
3
16
Columbus
7
12
7
3
__
14
Allentown
8
7
15
16
14
__
The e.
State Two ways in which Neanderthals and Cro-Magnons differed. .docxrafaelaj1
State Two ways in which Neanderthals and Cro-Magnons differed.
List an important achievement for each of these scientist. Aristarchus, Euclid, Archimedes, and Herophilus
"Civilizations" is defined as the stage of development in which people have developed :
1. large, permanet communites.
2. a system of writing
3. divirsion
4. trade
5. a srtong central goverment
.
STAT 3300 Homework #6Due Thursday, 03282019Note Answe.docxrafaelaj1
This document outlines a homework assignment for a statistics course. It provides details on a multiple regression analysis examining the relationship between average student debt and various college metrics like admission rates, graduation rates, and in-state costs. The assignment asks students to conduct the multiple regression, analyze residuals, test hypotheses, and determine which variables are significant predictors of debt. It also provides learning objectives for a chapter on juvenile justice treatment and prevention programs.
State Standard by Content AreaLiteracy State Standard to Integra.docxrafaelaj1
State Standard by Content Area
Literacy State Standard to Integrate into Another Content Area
Use a different literacy standard for each content standard.
Standards-based Learning Objective
Aligned to content standards
Instructional Strategy to Integrate Literacy
Resources
Provide links to websites, PDFs, and any other documents used or referenced for strategy
Rationale
How the strategy will promote balanced literacy curriculum
State Content Standard 1:
State Content Standard 2:
State Content Standard 3:
.
STAT200: Assignment #2 - Descriptive Statistics Analysis and Writeup - Instructions
Page 1 of 3
STAT200 Introduction to Statistics
Assignment #2: Descriptive Statistics Analysis and Writeup
Assignment #2: Descriptive Statistics Analysis and Writeup
In the first assignment (Assignment #1: Descriptive Statistics Analysis Data Plan), you developed a
scenario about annual household expenditures and a plan for analyzing the data using descriptive
statistic methods. The purpose of this assignment is to carry out the descriptive statistics analysis plan
and write up the results. The expected outcome of this assignment is a two to three page write-up of
the findings from your analysis as well as a recommendation.
Assignment Steps:
Step #1: Review Feedback from Your Instructor
Before performing any analysis, please make sure to review your instructor’s feedback on Assignment
#1: Descriptive Statistics Data Analysis Plan. Based on the feedback, modify variables, tables, and
selected statistics, graphs, and tables, if needed.
Step #2: Perform Descriptive Statistic Analysis
Task 1: Look at the dataset.
• (Re)Familiarize yourself with the variables. Review Table 1: Variables Selected for the
Analysis you generated for the first assignment as well as your instructor’s feedback. In
addition, look at the data dictionary contained in the data set for information about the
variables.
• Select the variables you need for the analysis.
Task 2: Complete your data analysis, as outlined in your first assignment, with any needed
modifications, based on your instructor’s feedback.
• Calculate Measures of Central Tendency and Variability. Use the information from
Assignment #1 - Table 2. Numerical Summaries of the Selected Variables. Here again,
be sure to see your instructor’s feedback and incorporate into the analysis.
• Prepare Graphs and/or Tables. Use the information from Assignment #1 - Table 3.
Type of Graphs and/or Tables for Selected Variables. Here again, be sure to see your
instructor’s feedback and incorporate into the analysis.
STAT200: Assignment #2 - Descriptive Statistics Analysis and Writeup - Instructions
Page 2 of 3
Step #3: Write-up findings using the Provided Template
For this part of the assignment, write a short 2-3 page write-up of the process you followed and the
findings from your analysis. You will describe, in words, the statistical analysis used and present the
results in both statistical/text and graphic formats.
Here are the main sections for this assignment:
✓ Identifying Information. Fill in information on name, class, instructor, and date.
✓ Introduction. For this section, use the same scenario you submitted for the first assignment and
modified using your instructor’s feedback, if needed. Include Table 1 (Table 1: Variables
Selected for the Analysis) you used in Assignment #1 to show the variables you selected for the
analysis.
✓ Data .
STAT200: Assignment #2 - Descriptive Statistics Analysis Writeup - Template
Page 3 of 3
University of Maryland University College
STAT200 - Assignment #2: Descriptive Statistics Analysis and Writeup
Identifying Information
Student (Full Name):
Class:
Instructor:
Date:
Introduction:
Use the same scenario you submitted for the first assignment with modifications using your instructor’s feedback, if needed. Include Table 1: Variables Selected for the Analysis you used in Assignment #1 to show the variables you selected for analysis.
Table 1. Variables Selected for the Analysis
Variable Name in data set
Description
Type of Variable (Qualitative or Quantitative)
Variable 1: “Income”
Annual household income in USD.
Quantitative
Variable 2:
Variable 3:
Variable 4:
Variable 5:
Data Set Description and Method Used for Analysis:
Results:
Variable 1: Income
Numerical Summary.
Table 2. Descriptive Analysis for Variable 1
Variable
n
Measure(s) of Central Tendency
Measure(s) of Dispersion
Variable: Income
Median=
SD =
Graph and/or Table: Histogram of Income
(Place Histogram here)
Description of Findings.
Variable 2: (Fill in name of variable)
Numerical Summary.
Table 3. Descriptive Analysis for Variable 2
Variable
n
Measure(s) of Central Tendency
Measure(s) of Dispersion
Variable:
Graph and/or Table.
(Place Graph or Table Here)
Description of Findings.
Variable 3: (Fill in name of variable)
Numerical Summary.
Table 4. Descriptive Analysis for Variable 3
Variable
n
Measure(s) of Central Tendency
Measure(s) of Dispersion
Variable:
Graph and/or Table.
(Place Graph or Table Here)
Description of Findings.
Variable 4: (Fill in name of variable)
Numerical Summary.
Table 5. Descriptive Analysis for Variable 4
Variable
N
Mean/Median
St. Dev.
Variable 4:
Graph and/or Table.
(Place Graph or Table Here)
Description of Findings.
Variable 5: (Fill in name of variable)
Numerical Summary.
Table 6. Descriptive Analysis for Variable 5
Variable
n
Measure(s) of Central Tendency
Measure(s) of Dispersion
Variable:
Graph and/or Table.
(Place Graph or Table Here)
Description of Findings.
Discussion and Conclusion.
Briefly discuss each variable in the same sequence as presented in the results. What has the highest expenditure? What variable has the lowest expenditure? If you were to recommend a place to save money, which expenditure would it be and why? Note: The section should be no more than 2 paragraphs.
STAT200 Introduction to Statistics
Dataset for Written Assignments
Description of Dataset:
The data is a random sample from the US Department of Labor’s 2016 Consumer Expenditure Surveys (CE) and provides information about the composition of households and their annual expenditures (https://www.bls.gov/cex/). It contains information from 30 households, where a survey responder provided the requested information; it is all self-reported information. This dataset contains four socioeconomic variables (whose names.
State legislatures continue to advance policy proposals to address c.docxrafaelaj1
The document discusses a 2-page paper assignment on failed cybersecurity policy amendments proposed by the Kentucky legislature in 2019. Students are asked to answer two questions: 1) provide a brief background on a proposed amendment that failed and speculate on why it failed, and 2) propose an amendment for the legislature to pass in 2020. The assignment requires citing sources and original work, and is due by the specified date. It also provides background on one failed proposed amendment related to protecting personal information.
State FLORIDAInstructionsThis written assignment requ.docxrafaelaj1
State: FLORIDA
Instructions
This written assignment requires the student to investigate his/her local, state and federal legislators and explore their assigned committees and legislative commitments. The student is expected to investigate current and actual legislative initiatives that have either passed or pending approval by the house, senate or Governor’s office. The student will draft a letter to a specific legislator and offer support or constructive argument against pending policy or legislation. The letter must be supported with a minimum of 3 evidence based primary citations. (See Rubric)
Submission Details:
Support your responses with examples.
Cite any sources in APA format.
Submit your document to the
Submissions Area
by
the due date assigned.
.
State of the Science Quality ImprovementNameInst.docxrafaelaj1
State of the Science Quality ImprovementNameInstitutionsDate
Abstract
The condition of chronic heart failure sometimes is referred to as congestive heart failure (CHF), which is recognized as an acute life-threatening disease that majorly affects millions of American citizens annually. The condition of the chronic heart failure results when the heart is incapable of sufficient pump the blood throughout the body tissues due to the weak heart muscles (January et al., 2019). Certain conditions, such as narrowed arteries in the heart (CAD) or high blood pressure, gradually leave the heart too weak or stiff to fill and pump efficiently. Moreover, there are some of the several conditions such as coronary artery diseases and hypertension that leads to acute and chronic heart failure in the body system. More importantly, to avoid the possibility of this dangerous condition as well as the ever-increasing of the re-admitted hospital continue, collectively, the patient must be able to control the earlier stated conditions along with diabetes as well as obesity at home-based care and with their primary healthcare providers as well. According to Santesmases-Masana et al. (2019), "Primary health care planned care has been shown to reduce heart failure re-hospitalizations and maintain the patient quality of life." With this known knowledge, it is important to continue care at home and with their primary care provider to monitor and detect worsening of their condition sooner rather than later with evidence-based treatment practices. There are many evidence-based treatments for chronic heart failure that includes monitoring of vital signs, weight, and diet along with medications. In this paper, chronic heart failure, problem discussion, PICO question, and theoretical framework will be presented.
Problem Discussion
Chronic heart failure is a chief public health care concern linked with the high degree of mortality and morbidity in the U.S. Heart failure usually results in adverse outcomes, and the most costly is the issues of hospital readmissions. Currently, the heart failure management clinical procedures and pieces of evidence emphasizes the significance and the function of the care interventions a mid preventing the heart failure readmissions in the hospital set up. The current literature review is meant to evaluate and assess the effectiveness of transitional care interventions that intend to minimize hospital readmissions. Increase hospital readmission and worsening chronic heart failure complications are due to lack of following of a primary care provider and home monitoring of vital signs, weight, diet, energy level, and breathing patterns by the patient. There are many evidence-based practices and comprehensive guidelines for chronic heart failure treatment with side effects of some medications about individual races. For instance, losartan has little to adverse impact on blacks. Furthermore, according to Hadidi et al. (2018), "It has been.
State Data_1986-2015YearGross state product per capitaEducation sp.docxrafaelaj1
The document provides data on various metrics for a U.S. state from 1986 to 2016 including gross state product per capita, education spending per student, unemployment rates, and high school graduation rates. It shows trends over time, with generally increasing economic output and education spending, and decreasing unemployment and increasing graduation rates. The data could help inform policymaking and planning.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Statistica Sinica 16(2006), 847-860
PSEUDO-R
2
IN LOGISTIC REGRESSION MODEL
Bo Hu, Jun Shao and Mari Palta
University of Wisconsin-Madison
Abstract: Logistic regression with binary and multinomial outcomes is commonly
used, and researchers have long searched for an interpretable measure of the strength
of a particular logistic model. This article describes the large sample properties
of some pseudo-R2 statistics for assessing the predictive strength of the logistic
regression model. We present theoretical results regarding the convergence and
asymptotic normality of pseudo-R2s. Simulation results and an example are also
presented. The behavior of the pseudo-R2s is investigated numerically across a
range of conditions to aid in practical interpretation.
Key words and phrases: Entropy, logistic regression, pseudo-R2
1. Introduction
Logistic regression for binary and multinomial outcomes is commonly used
in health research. Researchers often desire a statistic ranging from zero to one
to summarize the overall strength of a given model, with zero indicating a model
with no predictive value and one indicating a perfect fit. The coefficient of deter-
mination R2 for the linear regression model serves as a standard for such measures
(Draper and Smith (1998)). Statisticians have searched for a corresponding in-
dicator for models with binary/multinomial outcome. Many different R2 statis-
tics have been proposed in the past three decades (see, e.g., McFadden (1973),
McKelvey and Zavoina (1975), Maddala (1983), Agresti (1986), Nagelkerke
(1991), Cox and Wermuch (1992), Ash and Shwartz (1999), Zheng and Agresti
(2000)). These statistics, which are usually identical to the standard R2 when
applied to a linear model, generally fall into categories of entropy-based and
variance-based (Mittlböck and Schemper (1996)). Entropy-based R2 statistics,
also called pseudo-R2s, have gained some popularity in the social sciences (Mad-
dala (1983), Laitila (1993) and Long (1997)). McKelvey and Zavoina (1975)
proposed a pseudo-R2 based on a latent model structure, where the binary/
multinomial outcome results from discretizing a continuous latent variable that
is related to the predictors through a linear model. Their pseudo-R2 is defined
as the proportion of the variance of the latent variable that is explained by the
848 BO HU, JUN SHAO AND MARI PALTA
covariate. McFadden (1973) suggested an alternative, known as “likelihood-
ratio index”, comparing a model without any predictor to a model including all
predictors. It is defined as one minus the ratio of the log likelihood with inter-
cepts only, and the log likelihood with all predictors. If the slope parameters
are all 0, McFadden’s R2 is 0, but it is never 1. Maddala (1983) developed
another pseudo-R2 that can be applied to any model estimated by the maximum
likelihood method. This popular and widely used measure is expressed as
R2M = 1 −
(
L(θ̃)
L(θ̂)
)
2
n
, (1)
.
Stations yourself somewhere (library, cafeteria, etc.) and observe.docxrafaelaj1
Stations yourself somewhere (library, cafeteria, etc.) and observe the nonverbal communication that occurs.
What do people say with their bodies?
What messages are implicit in vocal expressions, clothes, make-up and so on?
Take notes on five of the most eloquent messages sent nonverbally.
*one page.
*Read the instructions then write about 5 difeerent people
.
StatementState legislatures continue to advance policy proposals.docxrafaelaj1
Statement
State legislatures continue to advance policy proposals to address cyber threats directed at governments and private businesses. As threats continue to evolve and expand and as the pace of new technologies accelerates, legislatures are making cybersecurity measures a higher priority.
Assignment
You are to author a 2-page (maximum) paper about the “failed” amendments proposed by the Kentucky legislature in 2019 with respect to Cyber Policy. APA format – 1 cover page, 2 content pages, and 1 reference page.
You are to answer two questions in your individual papers.
Brief background of the proposed amendment and “researched” speculation as to why it failed?
What would you propose for them to pass in 2020?
Remember to cite your sources appropriately and turn in original work!
Section 54
KY S 14
Status: Failed - Adjourned
Provides definitions relating to personal information, provides certain personal information that shall be protected from disclosure by a public agency or third-party contractor through redaction or other means, provides a list of covered persons, provides guidelines for contracts between a public agency and a third-party contractor.
.
StatementState legislatures continue to advance policy propo.docxrafaelaj1
Statement
State legislatures continue to advance policy proposals to address cyber threats directed at governments and private businesses. As threats continue to evolve and expand and as the pace of new technologies accelerates, legislatures are making cybersecurity measures a higher priority.
Assignment
You are to author a 2-page (maximum) paper about the “failed” amendments proposed by the Kentucky legislature in 2019 with respect to Cyber Policy. APA format – 1 cover page, 2 content pages, and 1 reference page.
You are to answer two questions in your individual papers.
Brief background of the proposed amendment and “researched” speculation as to why it failed?
What would you propose for them to pass in 2020?
Remember to cite your sources appropriately and turn in original work!
KY S 14
Status: Failed - Adjourned
Provides definitions relating to personal information, provides certain personal information that shall be protected from disclosure by a public agency or third-party contractor through redaction or other means, provides a list of covered persons, provides guidelines for contracts between a public agency and a third-party contractor.
.
Statement of PurposeProvide a statement of your educational .docxrafaelaj1
Statement of Purpose
Provide a statement of your educational background, experience, and preparation relevant to a graduate program in computer science, and specify your research and career goals.
The statement of purpose is a short essay introducing the applicant and his or her
interests, goals, and reasons for pursuing graduate study in history. Applicants may wish
to share a draft of their statement with the individuals writing their letters of
recommendation. While every statement, like every prospective student, will be different,
applicants should devote special attention to the following items:
• Academic/Professional Background: Please give your academic credentials, with
degrees, dates, and relevant employment experience. You do not need to list every
job you have had, only those that bear directly on your desire to enter graduate
school.
• Motivations and Aims: Explain what motivates you to do graduate work in history
and what your goals are, both within the graduate program and after the
completion of your degree.
• Existing Expertise and Accomplishments in History: Discuss any areas of
expertise you may already have in your proposed area of interest. If you have
experience doing research, please describe the project and your work on it. If you
have any special talents or skills, such as a foreign language, please describe
them.
• Proposed Course of Study: Please identify planned major field and minor fields of
study.
• Other Relevant Experiences or Personal Qualities: Discuss any experiences or
personal attributes that may illuminate your commitment to the study of history
and to the successful completion of the graduate program.
Format: Your statement of purpose should be limited to no more than 750 words
(between 2 and 3 pages).
.
States and the federal government should not use private prisons for.docxrafaelaj1
States and the federal government should not use private prisons for various reasons. First, most of the private prisons are for-profit facilities. Therefore, they cut on expenses such as lacking enough staffing and resources, which is likely to affect inmates' safety and quality of life. Further, while pro-private prisons note that private prisons save taxpayers' money, studies indicate that they do not reduce costs. For instance, the day to day cost of housing an inmate in 2010 was $53.02 for private prisons compared to $48.42 for a medium-security public prison (Pedowitz, 2012). Also, prisoners do not receive similar kinds of treatment in private facilities. While they may be suitable for the local economy, such as offering job opportunities, lowering costs by private facilities leaves inmates sick and not well cared for (NPR Staff, 2011).
.
StatementState legislatures continue to advance policy proposa.docxrafaelaj1
The document discusses a 2-page paper assignment on failed cybersecurity amendments proposed by the Kentucky legislature in 2019. Students are asked to analyze why one amendment failed and propose a new amendment for 2020. The failed amendment, KY S 14, aimed to protect personal information from disclosure by public agencies or third-party contractors.
Statement of Interest (This is used to apply for Graduate Schoo.docxrafaelaj1
Statement of Interest: (This is used to apply for Graduate School, digital media program)
Length: 2 pages. (500-750 words)
Area of interest in digital media.
-computational arts.
I did a mix media group exhibition in Feb. 2018 called What Makes You You. Half of my show is a sculpture-based installation. The other half is an interactive digital programed art(using Processing software). The visual of human evolution ties these two park together. See details at https://dongpu.weebly.com/what-makes-you-you.html
-short videos (documentary production).
I love shooting short videos. I formed a Youtube team called 2037 Club last year. https://www.youtube.com/channel/UCmtUQfDMvL9iE8IOy9oshSA
The latest documentary I did is called Liang(Grain). Video Statement:This documentary discovers the Chinese planned economy history period, which starts at the 1950s. People were given a certain amount of coupons to buy food and daily needs because of the limitation of products. Since this is a historical theme, reference images are included to support the concept of buying food today and before 1990. Other than that, the visuals are mainly about common people’s daily routine nowadays. Along with the visual, the most artistic part in this video is Shanghainese dialogue, which explained food coupons in the way of storytelling. “I accidentally found many food coupons in my grandparents’ house this summer, so I went to ask them about the experiences they had with these coupons. My curiosity leads me to the theme.” said by the producer.
This particular video also has a different meaning to me. My Grandmother passed away one week before the video published at the film festival (at Scottsdale Museum of Commemoratory Art). This piece becomes memorable to me, sadly, my grandmother never had a chance to see the whole piece.
https://www.youtube.com/watch?v=fD0Y-BXDfnY
-3D animation for games
I learned Maya in an animation course. Like editing videos, I soon full in love with 3D modeling.
https://www.youtube.com/watch?v=nGIRxaUdYiY
Business idea, if an applicant has one. It is fine if an applicant is unsure when applying to the program. It is also fine if an applicant is interested in the artistic aspect of digital media and not the entrepreneurial aspect.
I would like to complete a mobile game project in my Graduate studies period and start a game company after graduation. Meanwhile, still active in the art field being an intermedia artist.
Goals or expectations upon completion of the digital media program.
-I want to learn more about computer technologies to create artistic works. Focusing on the field of game development.
-Do more social, get to know people in my field
-Get professional advices of my projects
Here is my cover letter, you can utilize this for the statement of interest.
As a creative and passionate professional with a rich history of developing creative materials, I am eager to submit my resume for consideration for the (Position Title) position .
StatementState legislatures continue to advance policy prop.docxrafaelaj1
Statement
State legislatures continue to advance policy proposals to address cyber threats directed at governments and private businesses. As threats continue to evolve and expand and as the pace of new technologies accelerates, legislatures are making cybersecurity measures a higher priority.
Assignment
You are page amendments to author a 2-page (maximum) paper about the “failed” amendments proposed by the Kentucky legislature in 2019 with respect to Cyber Policy. APA format – 1 cover page, 2 content pages, and 1 reference pageamendments proposed.
You are to answer two questions in your individual papers.
Brief background of the proposed amendment and “researched” speculation as to why it failed?
What would you propose for them to pass in 2020?
.
Statement of cash flows (indirect method) Cash flows from ope.docxrafaelaj1
Statement of cash flows (indirect method)
Cash flows from operating activities
Net income
72,600
adjustments to net income
depreciation
4,000
Gan on sale of investments
-7,000
Increase in AR
-36,000
Decrease in inventory
40,000
Increased in Accounts payable
13,000
Decrease in Accrued liabilities
-3,100
net cash provided by operating activities
83,500
Cash flows from investing activities
Purchase of Plant assets
-16,000
Sale of long-term investments
20,000
net cash provided by investing activities
4,000
Cash flows from financing activities
retiement of bonds
-31,000
payment of dividend
-32,500
sale of common stock
6,000
net cash provided by financing activities
-57,500
net increase in cash
30,000
Cash balance, beginning
230,000
cash balance, ending
260,000
Statement of Cash flows (direct method)
Cash flows from operating activities
cash received from customers
714,000
(sales - increase in AR)
cash paid for merchandise
477,000
(cogs - decrease in invnetory - increase in AP)
cash paid for other operating expenes
105,100
(selling & admin exp + decrease in accrued liab - depreciation)
cash paid for income taxes
48,400
net cash provided b oeprating activities
83,500
Cash flows from investing activities
Purchase of Plant assets
-16,000
Sale of long-term investments
20,000
net cash provided by investing activities
4,000
Cash flows from financing activities
retiement of bonds
-31,000
payment of dividend
-32,500
sale of common stock
6,000
net cash provided by financing activities
-57,500
net increase in cash
30,000
Cash balance, beginning
230,000
cash balance, ending
260,000
.
Stateline Shipping and Transport CompanyRachel Sundusky is the m.docxrafaelaj1
Stateline Shipping and Transport Company
Rachel Sundusky is the manager of the South-Atlantic office of the Stateline Shipping and Transport Company. She is in the process of negotiating a new shipping contract with Polychem, a company that manufactures chemicals for industrial use. Polychem want Stateline to pick up and transport waste products from its six plants to three waste disposal sites. Rachel is very concerned about this proposed arrangement. The chemical wastes that will be hauled can be hazardous to humans and the environment if they leak. In addition, a number of towns and communities in the region where the plants are located prohibit hazardous materials from being shipped through their municipal limits. Thus, not only will the shipments have to be handled carefully and transported at reduced speeds, they will also have to traverse circuitous routes in many cases. Rachel has estimated the cost of shipping a barrel of waste from each of the six plants to each of the three waste disposal sites as shown in the following table:
Waste Disposal Site
Plant
Whitewater
Los Canos
Duras
Kingsport
$12
$15
$17
Danville
14
9
10
Macon
13
20
11
Selma
17
16
19
Columbus
7
14
12
Allentown
22
16
18
The plants generate the following amounts of waste products each week:
Plant
Waste per Week (bbl)
Kingsport
35
Danville
26
Macon
42
Selma
53
Columbus
29
Allentown
38
The three waste disposal sites at Whitewater, Los Canos, and Duras can accommodate a maximum of 65, 80, and 105 barrels per week respectively. In addition to shipping directly from each of the six plants to one of the three waste disposal sites, Rachel is also considering using each of the plants and waste disposal sites as intermediate shipping points. Trucks would be able to drop a load at a plant or disposal site to be picked up and carried on to the final destination by another truck, and vice versa. Stateline would not incur any handling costs because Polychem has agreed to take care of all local handling of the waste materials at the plants and the waste disposal sites. In other words, the only cost Stateline incurs is the actual transportation cost. So Rachel wants to be able to consider the possibility that it may be cheaper to drop and pick up loads at intermediate points rather than ship them directly. Rachel estimates the shipping costs per barrel between each of the six plants to be as follows:
Plant
Plant
Kingsport
Danville
Macon
Selma
Columbus
Allentown
Kingsport
$ __
$6
$4
$9
$7
$8
Danville
6
__
11
10
12
7
Macon
5
11
__
3
7
15
Selma
9
10
3
__
3
16
Columbus
7
12
7
3
__
14
Allentown
8
7
15
16
14
__
The e.
State Two ways in which Neanderthals and Cro-Magnons differed. .docxrafaelaj1
State Two ways in which Neanderthals and Cro-Magnons differed.
List an important achievement for each of these scientist. Aristarchus, Euclid, Archimedes, and Herophilus
"Civilizations" is defined as the stage of development in which people have developed :
1. large, permanet communites.
2. a system of writing
3. divirsion
4. trade
5. a srtong central goverment
.
STAT 3300 Homework #6Due Thursday, 03282019Note Answe.docxrafaelaj1
This document outlines a homework assignment for a statistics course. It provides details on a multiple regression analysis examining the relationship between average student debt and various college metrics like admission rates, graduation rates, and in-state costs. The assignment asks students to conduct the multiple regression, analyze residuals, test hypotheses, and determine which variables are significant predictors of debt. It also provides learning objectives for a chapter on juvenile justice treatment and prevention programs.
State Standard by Content AreaLiteracy State Standard to Integra.docxrafaelaj1
State Standard by Content Area
Literacy State Standard to Integrate into Another Content Area
Use a different literacy standard for each content standard.
Standards-based Learning Objective
Aligned to content standards
Instructional Strategy to Integrate Literacy
Resources
Provide links to websites, PDFs, and any other documents used or referenced for strategy
Rationale
How the strategy will promote balanced literacy curriculum
State Content Standard 1:
State Content Standard 2:
State Content Standard 3:
.
STAT200: Assignment #2 - Descriptive Statistics Analysis and Writeup - Instructions
Page 1 of 3
STAT200 Introduction to Statistics
Assignment #2: Descriptive Statistics Analysis and Writeup
Assignment #2: Descriptive Statistics Analysis and Writeup
In the first assignment (Assignment #1: Descriptive Statistics Analysis Data Plan), you developed a
scenario about annual household expenditures and a plan for analyzing the data using descriptive
statistic methods. The purpose of this assignment is to carry out the descriptive statistics analysis plan
and write up the results. The expected outcome of this assignment is a two to three page write-up of
the findings from your analysis as well as a recommendation.
Assignment Steps:
Step #1: Review Feedback from Your Instructor
Before performing any analysis, please make sure to review your instructor’s feedback on Assignment
#1: Descriptive Statistics Data Analysis Plan. Based on the feedback, modify variables, tables, and
selected statistics, graphs, and tables, if needed.
Step #2: Perform Descriptive Statistic Analysis
Task 1: Look at the dataset.
• (Re)Familiarize yourself with the variables. Review Table 1: Variables Selected for the
Analysis you generated for the first assignment as well as your instructor’s feedback. In
addition, look at the data dictionary contained in the data set for information about the
variables.
• Select the variables you need for the analysis.
Task 2: Complete your data analysis, as outlined in your first assignment, with any needed
modifications, based on your instructor’s feedback.
• Calculate Measures of Central Tendency and Variability. Use the information from
Assignment #1 - Table 2. Numerical Summaries of the Selected Variables. Here again,
be sure to see your instructor’s feedback and incorporate into the analysis.
• Prepare Graphs and/or Tables. Use the information from Assignment #1 - Table 3.
Type of Graphs and/or Tables for Selected Variables. Here again, be sure to see your
instructor’s feedback and incorporate into the analysis.
STAT200: Assignment #2 - Descriptive Statistics Analysis and Writeup - Instructions
Page 2 of 3
Step #3: Write-up findings using the Provided Template
For this part of the assignment, write a short 2-3 page write-up of the process you followed and the
findings from your analysis. You will describe, in words, the statistical analysis used and present the
results in both statistical/text and graphic formats.
Here are the main sections for this assignment:
✓ Identifying Information. Fill in information on name, class, instructor, and date.
✓ Introduction. For this section, use the same scenario you submitted for the first assignment and
modified using your instructor’s feedback, if needed. Include Table 1 (Table 1: Variables
Selected for the Analysis) you used in Assignment #1 to show the variables you selected for the
analysis.
✓ Data .
STAT200: Assignment #2 - Descriptive Statistics Analysis Writeup - Template
Page 3 of 3
University of Maryland University College
STAT200 - Assignment #2: Descriptive Statistics Analysis and Writeup
Identifying Information
Student (Full Name):
Class:
Instructor:
Date:
Introduction:
Use the same scenario you submitted for the first assignment with modifications using your instructor’s feedback, if needed. Include Table 1: Variables Selected for the Analysis you used in Assignment #1 to show the variables you selected for analysis.
Table 1. Variables Selected for the Analysis
Variable Name in data set
Description
Type of Variable (Qualitative or Quantitative)
Variable 1: “Income”
Annual household income in USD.
Quantitative
Variable 2:
Variable 3:
Variable 4:
Variable 5:
Data Set Description and Method Used for Analysis:
Results:
Variable 1: Income
Numerical Summary.
Table 2. Descriptive Analysis for Variable 1
Variable
n
Measure(s) of Central Tendency
Measure(s) of Dispersion
Variable: Income
Median=
SD =
Graph and/or Table: Histogram of Income
(Place Histogram here)
Description of Findings.
Variable 2: (Fill in name of variable)
Numerical Summary.
Table 3. Descriptive Analysis for Variable 2
Variable
n
Measure(s) of Central Tendency
Measure(s) of Dispersion
Variable:
Graph and/or Table.
(Place Graph or Table Here)
Description of Findings.
Variable 3: (Fill in name of variable)
Numerical Summary.
Table 4. Descriptive Analysis for Variable 3
Variable
n
Measure(s) of Central Tendency
Measure(s) of Dispersion
Variable:
Graph and/or Table.
(Place Graph or Table Here)
Description of Findings.
Variable 4: (Fill in name of variable)
Numerical Summary.
Table 5. Descriptive Analysis for Variable 4
Variable
N
Mean/Median
St. Dev.
Variable 4:
Graph and/or Table.
(Place Graph or Table Here)
Description of Findings.
Variable 5: (Fill in name of variable)
Numerical Summary.
Table 6. Descriptive Analysis for Variable 5
Variable
n
Measure(s) of Central Tendency
Measure(s) of Dispersion
Variable:
Graph and/or Table.
(Place Graph or Table Here)
Description of Findings.
Discussion and Conclusion.
Briefly discuss each variable in the same sequence as presented in the results. What has the highest expenditure? What variable has the lowest expenditure? If you were to recommend a place to save money, which expenditure would it be and why? Note: The section should be no more than 2 paragraphs.
STAT200 Introduction to Statistics
Dataset for Written Assignments
Description of Dataset:
The data is a random sample from the US Department of Labor’s 2016 Consumer Expenditure Surveys (CE) and provides information about the composition of households and their annual expenditures (https://www.bls.gov/cex/). It contains information from 30 households, where a survey responder provided the requested information; it is all self-reported information. This dataset contains four socioeconomic variables (whose names.
State legislatures continue to advance policy proposals to address c.docxrafaelaj1
The document discusses a 2-page paper assignment on failed cybersecurity policy amendments proposed by the Kentucky legislature in 2019. Students are asked to answer two questions: 1) provide a brief background on a proposed amendment that failed and speculate on why it failed, and 2) propose an amendment for the legislature to pass in 2020. The assignment requires citing sources and original work, and is due by the specified date. It also provides background on one failed proposed amendment related to protecting personal information.
State FLORIDAInstructionsThis written assignment requ.docxrafaelaj1
State: FLORIDA
Instructions
This written assignment requires the student to investigate his/her local, state and federal legislators and explore their assigned committees and legislative commitments. The student is expected to investigate current and actual legislative initiatives that have either passed or pending approval by the house, senate or Governor’s office. The student will draft a letter to a specific legislator and offer support or constructive argument against pending policy or legislation. The letter must be supported with a minimum of 3 evidence based primary citations. (See Rubric)
Submission Details:
Support your responses with examples.
Cite any sources in APA format.
Submit your document to the
Submissions Area
by
the due date assigned.
.
State of the Science Quality ImprovementNameInst.docxrafaelaj1
State of the Science Quality ImprovementNameInstitutionsDate
Abstract
The condition of chronic heart failure sometimes is referred to as congestive heart failure (CHF), which is recognized as an acute life-threatening disease that majorly affects millions of American citizens annually. The condition of the chronic heart failure results when the heart is incapable of sufficient pump the blood throughout the body tissues due to the weak heart muscles (January et al., 2019). Certain conditions, such as narrowed arteries in the heart (CAD) or high blood pressure, gradually leave the heart too weak or stiff to fill and pump efficiently. Moreover, there are some of the several conditions such as coronary artery diseases and hypertension that leads to acute and chronic heart failure in the body system. More importantly, to avoid the possibility of this dangerous condition as well as the ever-increasing of the re-admitted hospital continue, collectively, the patient must be able to control the earlier stated conditions along with diabetes as well as obesity at home-based care and with their primary healthcare providers as well. According to Santesmases-Masana et al. (2019), "Primary health care planned care has been shown to reduce heart failure re-hospitalizations and maintain the patient quality of life." With this known knowledge, it is important to continue care at home and with their primary care provider to monitor and detect worsening of their condition sooner rather than later with evidence-based treatment practices. There are many evidence-based treatments for chronic heart failure that includes monitoring of vital signs, weight, and diet along with medications. In this paper, chronic heart failure, problem discussion, PICO question, and theoretical framework will be presented.
Problem Discussion
Chronic heart failure is a chief public health care concern linked with the high degree of mortality and morbidity in the U.S. Heart failure usually results in adverse outcomes, and the most costly is the issues of hospital readmissions. Currently, the heart failure management clinical procedures and pieces of evidence emphasizes the significance and the function of the care interventions a mid preventing the heart failure readmissions in the hospital set up. The current literature review is meant to evaluate and assess the effectiveness of transitional care interventions that intend to minimize hospital readmissions. Increase hospital readmission and worsening chronic heart failure complications are due to lack of following of a primary care provider and home monitoring of vital signs, weight, diet, energy level, and breathing patterns by the patient. There are many evidence-based practices and comprehensive guidelines for chronic heart failure treatment with side effects of some medications about individual races. For instance, losartan has little to adverse impact on blacks. Furthermore, according to Hadidi et al. (2018), "It has been.
State Data_1986-2015YearGross state product per capitaEducation sp.docxrafaelaj1
The document provides data on various metrics for a U.S. state from 1986 to 2016 including gross state product per capita, education spending per student, unemployment rates, and high school graduation rates. It shows trends over time, with generally increasing economic output and education spending, and decreasing unemployment and increasing graduation rates. The data could help inform policymaking and planning.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
1. STAY SAFE
ONLINE
National Cyber
Awareness Poster
Contest Winner:
Sergio, Grade 11,
Virginia
2019 CIS Posters.indd 1 7/9/18 4:10 PM
BE A GOOD
DIGITAL CITIZEN
National Cyber
Awareness Poster
Contest Winner:
Stephanie, Grade 7,
North Carolina
2019 CIS Posters.indd 2 7/9/18 4:10 PM
BROWSE SAFELY
ONLINE
National Cyber
2. Awareness Poster
Contest Winner:
Danielle, Grade 11,
New York
2019 CIS Posters.indd 3 7/9/18 4:10 PM
DON’T TAKE
THE BAIT
National Cyber
Awareness Poster
Contest Winner:
Diya, Grade 7,
New Jersey
2019 CIS Posters.indd 4 7/9/18 4:10 PM
Running head: THE LEGALIZATION OF MARIJUANA
1
THE LEGALIZATION OF MARIJUANA
6
The Legalization of Marijuana
Northwest University Online
March 16, 2019
The Legalization of Marijuana
3. Marijuana, which has a scientific name of Cannabis Sativa, is a
plant that has sparked mixed feelings not only in the United
States but all over the world. Jamaica has been the oldest nation
that has come out openly to legalize marijuana, and it has been
preaching the same gospel to other parts of the world
(Campbell, Twenge, & Carter, 2017). Different nations are now
seeing the need
to legalize marijuana. However, irrespective of the fact that
nations that advocate for marijuana legalization have provided
facts that they believe should be followed,
there are opposing forces from different perspectives
, and they have sparked arguments
that continue to increase the heat on the debate of whether to
legalize marijuana. The controversial debate on whether to
legalize marijuana has been argued from two different
perspectives and each of the perspectives will be focused on.
Argument for
In the United States, more than ten states have so far legalized
marijuana. What is more fascinating is the fact that other states
are following suit and there are headed in the same direction.
The states that have legalized marijuana have legalized it based
on recreation and medical use. It is therefore evident that the
topic of legalizing marijuana has been medically
motivated (Campbell et al. 2017). Apart from the few states in
the united states,
there are other countries that have come in the open to legalize
marijuana. Some of the nations are Canada, Belize, Jamaica,
Colombia, Ecuador, Peru, Uruguay, Cambodia, Laos, and
Belgium.
The people who support the legalization of marijuana have
given their reasons.
The first reason is the reduction of addiction and use of
4. substandard marijuana. One of the reasons
why some people are affected by marijuana is because of the
quality of the marijuana that they are exposed to. The fact that
marijuana is illegal gives the peddlers an opportunity to sell
substandard marijuana, and that affects the health of the
smoker. If marijuana was legalized, there would
be an opportunity for the users to get information about the
substance. As a result, the use of substandard substance would
be frustrated. The legalization of marijuana would also promote
the selling of high-quality marijuana because competitiveness
would be promoted (Paschall, Grube, & Biglan, 2017). When
there are different players in the industry who have been
allowed to compete against each other, they are likely to focus
on improving quality with the aim of winning more customers.
Addiction to marijuana is associated with the secrecy that is
promoted in its consumption. Human beings are naturally
curious, and that means that if they are restricted from engaging
in a specific act, they tend to engage in it more. Giving the
users the freedom would limit their consumption rate thus
affecting their addiction.
Argument against
Religious leaders and community leaders have been on the front
line when it comes to arguing against the legalization of
marijuana
. They argue from the basis of the effects that the substance has
on the users. Marijuana is addictive, and it also affects the
reasoning ability of the user. From a religious perspective, the
leader believes that a substance that affects the decision-making
process of a person should not be consumed (Monte, Zane, &
Heard, 2015). The abuse of marijuana has been evident in many
cases, and it increases the dependency cases. The argument
against the legalization of marijuana is based on facts as well,
and these facts have been seen through observations.
5. The bipartisan argument
Even though there are people who have taken a hard position on
whether marijuana should be legalized, there is a group of
people who believe that the whole issue should not take an
emotional turn and the argument should not be biased. The
bipartisan parties believe that if the implementation of any law
was to take place, it should take place not based on the
emotions but on scientific facts (Hall & Weier, 2017). It would,
therefore, be essential to call all stakeholders in this case and
try to investigate some of the effects that might come with the
legalization of marijuana (McGinty et al. 2016). The people
who take this perspective believe that the legalization of
marijuana should be based on the effects that it might have on
the members of the community.
It would not make sense to legalize a substance that can wipe
the whole young generation, and at the same time, it would be
unfair to stop the legalization of a substance that might have
more benefits than harm.
The sections of people who take the bipartisan position believe
that research would be essential in this case. The best way to
deal with an issue is by making sure that extensive research is
carried out with the primary aim of knowing the facts that are
associated with the issue at hand. The reason behind it is
because people who support the legalization have points which
they consider to be facts (Hall & Weier, 2017). The same case
applies to people who are against the legalization. When two
parties present two different arguments and provide points that
are factual to them, it becomes imperative to have a neutral
body that helps in knowing which side presents facts that cannot
be refuted, and which side presents mere assumptions.
6. Conclusion
The controversial topic of the legalization of marijuana
continues to attract attention internationally. However, nations
that feel it is right to legalize marijuana have done so. In some
nations, the arguments continue taking center stage, and it is not
clear on what will happen. Each side of the argument presents
points which are strong. Therefore, it means that there is still a
long way to go before all nations that want to legalize marijuana
can do so.
You have all your organizational pieces in place. Now you are
ready to build on the arguments/research and give us more
specifics. Consider revising and/or removing sentences that are
vague/repetitive, and replacing them with your own clear
analysis. One thing that will be helpful is including some direct
quotations. Great use of in-text citations as summaries – but
don’t be afraid to use direct quotation as well. Your empirical
studies will gives us numbers for the “facts” you briefly
mention.
Using a third side – the bipartisan argument – gives your essay
a unique/whole perspective that allows your argument to be
both global and local. Looking forward to your next draft!
References
Campbell, W., Twenge, J., & Carter, N. (2017). Support for
marijuana (cannabis) legalization:
untangling age, period, and cohort effects. Collabra:
Psychology, 3(1).
Hall, W., & Weier, M. (2017). Has marijuana legalization
increased marijuana use among US
youth? JAMA Pediatrics, 171(2), 116-118.
McGinty, E. E., Samples, H., Bandara, S. N., Saloner, B.,
Bachhuber, M. A., & Barry, C. L.
(2016). The emerging public discourse on state legalization of
7. marijuana for recreational
use in the US: Analysis of news media coverage, 2010–
2014. Preventive Medicine, 90,
114-120.
Monte, A. A., Zane, R. D., & Heard, K. J. (2015). The
implications of marijuana legalization in
Colorado. Jama, 313(3), 241-242.
Paschall, M. J., Grube, J. W., & Biglan, A. (2017). Medical
marijuana legalization and marijuana
use among youth in Oregon. The journal of primary
prevention, 38(3), 329-341.
�What sorts of needs? Consider giving an example here?
�What facts? Why should they be followed?
�And what are the opposing perspectives? Be specific.
�What are the arguments?
You don’t need to spell everything out in the introduction – that
is what you will be doing in the essay, after all. However,
allude to what you will be discussing.
Remember introductions and theses share in the job of serving
as a map for your readers. Intrigue and guide us.
�You just mentioned recreation, as well. Where does that play
in here?
8. �Capital.
�Analysis here – consider if there any connections between
these countries + the different states. Why these countries and
not others?
�Too vague.
Consider the job of a topic sentence.
� HYPERLINK
"https://owl.purdue.edu/engagement/ged_preparation/part_1_les
sons_1_4/index.html"
�https://owl.purdue.edu/engagement/ged_preparation/part_1_le
ssons_1_4/index.html�
�Repetition of “reason” – vary your language.
�As you are speaking to both sides of the argument – be careful
with language that deals in absolutes.
So, consider a statement with “could” or something similar.
�This feels like a new topic: addiction/consumption.
9. Engage with this further in a new paragraph. Doing this would
also be a good transition to where you are going next.
�Great topic sentence!
�What are the facts? What are the observations? Give us
specifics, and analyze why this is so.
�I like this additional side of the argument! Most are looking at
the users/addicts and the businesses/drug cartels. Instead you
are adding in the effect it has on the community at large. This
will be a true strength to your analysis.
�And what are those benefits?
Security Overview
CMGT/433 Cyber Security
Name
University of Phoenix
April 3, 2019
Dayton Soft Products
Executive Staff Presentation
Introduction
Good morning, and thank you for attending this important
presentation. We will begin momentarily. **PAUSE**
10. 1
Introduction
Introduction
Dayton Soft Products was established in 2001 and has recently
hired 55 new employees which brings our current onsite
employee count to 155. In addition to onsite employees, we also
employ over 743 offsite employees who reside in locations all
across the globe. The reason for our increased hiring trends is
as a direct result of our product line tripling over the last five
years. With this growth, our annual revenues have increased
from $73k in 2010 to over $3.3 million at the end of Financial
Year 2017. While this is exciting news, protecting our data and
information assets is paramount to long-term business
continuity. Therefore, this presentation represents an overview
of our new Cyber security Plan for Dayton Soft Products.
2
National Institute of Standards and Technology
cybersecurity makes reference to the protection of information
through detection, response and prevention of attacks (NIST,
2019).
National Initiative for Cyber Security Careers and Studies
ability, process, or activity through which communication and
information systems are protected against unauthorized use,
damage, exploitation or modification (NICCS, 2019).
Cybersecurity Defined
11. Cybersecurity Defined
In today’s society, data and information are considered valuable
assets. Protecting data is paramount to sustaining long-term
business continuity for most companies. Companies must
manage and control data to provide a secure environment that is
protected from cyber attack. Security goals are identified as
being accountability, integrity, availability, and confidentiality
of data and information assets. According to the “National
Institute of Standards and Technology” (NIST), cybersecurity
makes reference to the protection of information through
detection, response and prevention of attacks (Kahyaoglu &
Caliyurt, 2018). Another definition for Cybersecurity comes
from the “National Initiative for Cyber Security Careers and
Studies” (NICCS), who views Cybersecurity as an ability,
process, or activity through which communication and
information systems are protected against unauthorized use,
damage, exploitation or modification (NICCS, 2019). In simpler
terms cybersecurity can be viewed as the protection of data
from cyberspace.
3
Cybersecurity vs. Enterprise Security
Cyber security versus Enterprise Security – How do they differ?
Cyber security is different from Enterprise security in that it is
focused on protecting digital data from threats in cyberspace.
Enterprise security, on the other hand, protects all types of data
in general. Both cyber security and enterprise security work
together in protecting a company’s main asset, its data, from
12. destruction, modification, theft, recording, unauthorized use,
unauthorized access, inspection, and disclosure
(Secureworks.com, 2019). Cybersecurity can be seen as
protecting both enterprise and data from outside sources.
4
Dayton Soft Products
Cybersecurity Milestones Timeline
Timeline & Brief Explanation of Cyber Milestones
Timelines are very important when creating a solid Security
Plan. The Dayton Soft Products timeline, as shown on the
screen, illustrates individual milestones that describe elements
of a cybersecurity plan and identifies when and how these
elements will be implemented. According to Pfleeger &
Pfleeger (2015), the dates have been used to set milestones to
ensure the management keeps track of the implementation
progress (Timetable, p. 677). Milestones are an important part
of a timeline, within a Security plan, because it helps ensure
that security controls are implemented in a specific order,
usually, the critical threats take priority. (Excel
Spreadsheet/Chart attached).
5
Dayton Soft Products
Cybersecurity Milestones Brief Explanation
Brief Explanation of Cyber Milestones
The milestones identified on the screen represents an on-going
13. schedule to assist in remaining vigilant against cyber threats
and attacks. By reaching these milestones, Dayton Soft Products
can be assured they are protecting company data and
information assets. With the increase in the number of
employees on and off-site, these milestones are a critical part of
keeping our data secure. (Excel Spreadsheet/Chart attached).
6
Dayton Soft Products
Importance of Knowing Cyber Milestones
Importance of Knowing Cybersecurity Milestones
Understanding the difference between a project deadline and a
milestone is very important when managing a cybersecurity
project. A milestone shows that an important goal has been
reached and signals that the project can move forward. Many
times the project is stuck until a milestone is reached and can,
therefore, put a project behind, which can be detrimental to a
project, especially where cybersecurity is concerned. Cyber
milestones are very important for improving security for a
company because it signals the company is one step closer to
securing its digital data and protecting a viable asset.
Milestones do not make a project take longer, in and of
themselves, however not reaching one can impact the end date
of a cybersecurity project. For Dayton Soft Products current
environment, milestones let personnel know that there is still
work to do before the systems are secure. Milestones affect a
company's future environment because as each one is
accomplished, the company reaches a more secure threshold.
Additionally, milestones help enterprises determine client,
server, device, and network vulnerabilities coupled with
successful prediction of behavioral and human vulnerabilities.
14. 7
4 Strategies that Can Determine Current Security Environment
4 Strategies that could be Used to Determine Dayton Soft
Products Security Environment, the Impact of the Strategy, and
the Resources required.
Dayton Soft Products can use several strategies to determine the
status of their current security environment. The following
slides illustrate each strategy, along with the impact of the
strategy, and the resources required to implement the strategy.
The four strategies chosen for Dayton Soft Products include
Analysis and Assessment of Risk, Treatment for Risks, Risk
Mitigation, and Security Assurance and Auditing.
8
Current Security Environment
Risk Analysis
Risk Treatment
Security Awareness
Risk Management
15. Risk Analysis / Risk Assessment
Dayton Soft Products
Determine Current Security Environment – Strategy
#1LIKELIHOOD
Of
IMPACTSEVERITY OF IMPACTLow ImpactMinor
DamageModerate DamageMajor DamageCatastrophicHighly
UnlikelyUnlikelyPossibleProbableCertain
Dayton Soft Products Strategy #1 – Risk Assessment Impact
A Risk Analysis can be used to help determine Dayton Soft
Product’s current security environment. Potential scenarios are
examined and the likelihood of impact along with the severity
of impact are categorized to determine potential losses in the
event of a cyber attack. According to Pfleeger & Pfleeger
(2015), a Risk Analysis can be used by an organization to (1)
increase awareness, (2) create a linkage between management
objectives and security mission, (3) evaluate vulnerabilities,
assets, and controls, and (4) create a foundation for decision
making (“Arguments For and Against Risk Analysis”, p. 705).
Improved awareness occurs while discussing security issues
with peers or co-workers who have a general knowledge of
cyber attacks. Discussions help to educate them on ways that
security relates to individual job roles. Additionally, a Risk
Analysis can assist management in understanding the need to
spend money on security software and controls.
16. Resources Required
A Risk Analysis requires resources to identify and tag company
computers and equipment that the company may not be tracking.
Employee resources are necessary to go from machine to
machine to tag/document each piece of equipment. Tagging
equipment assists in putting a dollar value to the equipment that
can now be counted and tracked for depreciation purposes.
Vulnerabilities reside with unknown laptops or other equipment
that may be connected to the company network, that security
personnel may be unaware of existing on the network. Finally,
the most important part of a Risk Analysis, in my opinion, is the
betterment of decision making regarding upgrades and new
equipment purchases. A Risk Analysis can support this need and
assist in getting equipment purchase requests approved because
they support the request for approval. Risk Analysis’ should be
updated annually and serve as a living document.
Financial Impact
The only real downside to a Risk Analysis is that the financial
impact is only a guess.
9
Risk Treatment Plan
Dayton Soft Products
Determine Current Security Environment – Strategy #2
Communication with Stakeholders
Monitor and Review Risks and Controls
Dayton Soft Products Strategy #2 – Risk Treatment Impact
A Risk Treatment Plan is typically done once the Risk Analysis
is completed. Dayton Soft Products can utilize a Risk Treatment
Plan (RTP) to summarize risks identified in the Risk Analysis.
Also noted in the RTP are the risk responses and mitigation,
risk owners, and risk treatment target date. The RTP is a
17. document that describes employee roles and their
responsibilities as well as detailed actions that will need to be
done and the date to implement these actions in order to obtain
an acceptable level of risk for each occurrence. The impact that
the RTP will have on Dayton Soft Products is substantial since
they will now have a document to follow with detailed
instructions on how to respond to a cyber-related incident.
There are four main options in response to an attack including:
(1) tolerate/retain if the risk is too costly to treat or too small of
an impact to justify treating or modifying it, (2) terminate /
avoid if the decision to stop the cause of or activity that is
creating the risk, (3) transfer / share if the risk is something that
has been identified as a risk that a third party is contracted to
handle for the company, and (4) treat / modify the risk by
implementing specific controls to reduce impact to Dayton or
the likelihood that the incident will occur, if appropriate,
Resources Required
Resources required for a Risk Treatment Plan include security
personnel’s time and expertise. Financial impacts include
employee payroll, third-party fees, etc.
10
Establish Context
What are our objectives?
Identify Risks
Why, How, and When
19. Risk Management
Dayton Soft Products
Determine Current Security Environment – Strategy #3
Dayton Soft Products Strategy #3 – Risk Management Impact
Risk management encompasses the calculation of asset values in
relation to the potential harm that may be caused by risk. The
impact to Dayton Soft Products from a cyber attack includes the
amount of damage caused, cost of protecting data and systems,
countermeasures and controls, and loss of business if the risk
brings down the company's system. Financial impact in creating
a Risk Management Plan (RMP) includes costs of implementing
countermeasures to protect the company from potential threats.
The negative aspect of an RMP is the complexities involved in
attaching a value to an asset. Assets can be the time the network
is down, corrupted files, loss/leaking of data, and literally
thousands of other similar threats. It is best to gauge the
financial impact over a time period to get a more accurate
account of financial impacts to various threats. Risk infiltration
impacts Dayton Soft Products in many ways, including loss of
employee productivity, loss of sales, loss of customer trust, etc.
Resources Required
Professional security personnel is needed to calculate potential
losses. Also, the company will be impacted financially because
they will need the services of an Attorney due to legal liabilities
involved in some types of cyber attacks, such as identity theft
20. which may result from criminals stealing customer information.
11
Risk Management
Assess
Identify
Control
Review
Security Assurance & Auditing
Dayton Soft Products
Determine Current Security Environment – Strategy #4
CYBER
21. Dayton Soft Products Strategy #4 – Security Assurance &
Auditing Impact
Dayton Soft Products would greatly benefit by utilizing the
strategy of a Cybersecurity Assurance and Auditing Plan. This
plan is a great tool that assists in lowering risk potential by
putting into place standardized procedures, and testable criteria
for risks, weaknesses, and vulnerabilities. Dayton Soft Products
would benefit from a Security Assurance and Auditing Plan by
using it to identify and address known malware and viruses to
help in lowering exposure to exploitation. This plan can also
help enhance security awareness efforts and expand security
controls for the company.
12
Security
Technology
Intelligence
Training
22. Dayton Soft Products
Security Overview
REFERENCES
Reference Slide
CESG (2012). Assurance of ICT systems and services, Good
Practice Guide, No. 30, CESG Information Assurance Portal.
Retrieved from
www.ncsc.gov.uk/content/files/guidance_files/GPG%2030%20-
%20Assurance%20of%20ICT%20Systems%20and%20Services%
20-%20issue%202.1%20-%20Oct%2015%20-
%20NCSC%20Web.pdf
NIST.gov (2019). Glossary of key information security terms.
National Institute of Standards and Technology Interagency or
Internal Report, NISTIR 7298, Revision 2. Retrieved from
http://csrc.nist.gov/publications
NICCS.gov (2019). A Glossary of Common Cybersecurity
Terminology. Retrieved from https://niccs.us-cert.gov/about-
niccs/glossary
Pfleeger, C. P., Pfleeger, S. L., Margulies, J. (2015). Security in
computing (5th ed.). Saddle River, NJ: Pearson/Prentice Hall.
Secureworks.com (2019). Cybersecurity versus Network
23. Security versus Information Security. Retrieved from
https://www.secureworks.com/blog/cybersecurity-vs-network-
security-vs-information-security
Sezer Bozkus Kahyaoglu, Kiymet Caliyurt, (2018). Cyber
Security Assurance Process from the Internal Audit
Perspective. Managerial Auditing Journal, Vol. 33 Issue: 4,
pp.360-376. Retrieved from https://doi-
org.contentproxy.phoenix.edu/10.1108/MAJ-02-2018-1804
13
Dayton Soft Products
Project StartEstablish Cybersecurity TeamIdentify Critical
Digital Assets & SystemsImplement Communication
BarriersImplement Access Control for Portable and Mobile
Devices.Remote Access Testing for offsite employeesConduct
Training for Offsite EmployeesConduct Training for Onsite
EmployeesUpdate and document cyber security controls and
protocolsAssessment and Monitoring Full Cybersecurity Plan
ImplementationProject End1 Jan1 Feb1 Mar1 Apr1 May1 Jun1
Jul1 Aug1 Sep1 Oct1 Nov1 Dec
Project TimelineDayton Soft ProductsProject
MilestonesDateMilestoneDescriptionPositionBaseline1/1/19Proj
ect Start-2001/31/19Establish Cybersecurity TeamTeam
members chosen for the Cybersecurity Team may require
additional training to ensure adequate performance of
cybersecurity assessments and testing.1002/28/19Identify
Critical Digital Assets & SystemsThis includes offsite
communications, support systems, system components and
structures that if compromised would cause great harm to
Dayton Soft Products.-1003/31/19Implement Communication
BarriersThis protects critical systems from cyber attacks from
the Internet and company business systems by isolating them.
Prevents remote access to core business
systems.2504/30/19Implement Access Control for Portable and
Mobile Devices.Portable and mobile devices are used to transfer
24. digital data and can be used to spread malicious software to
company systems. This milestone includes updating firmware
and software on equipment.-1505/31/19Remote Access Testing
for offsite employeesThis protects business systems and the
company network by ensuring that appropriate access controls
are in place for offsite employees and vendors who are
accessing company systems from outside the
office.1506/30/19Conduct Training for Offsite
EmployeesTraining is paramount to provide cyber threat
awareness to offsite employees. -1507/31/19Conduct Training
for Onsite EmployeesTraining is paramount to provide cyber
threat awareness to onsite employees.1508/31/19Update and
document cyber security controls and protocolsKeeping Security
controls and protocols involved keeping procedures up-to-date,
which is a critical milestone, especially as new cyber threats are
identified and mitigation procedures are changed.-
2009/30/19Assessment and Monitoring Implementation of
ongoing assessment and monitoring activities.20012/1/19Full
Cybersecurity Plan ImplementationCybersecurity Plan is fully
implemented and all security controls and actions have been
completed.-15012/31/19Project End100
Position
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
25. [CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CATEGORY NAME]
Project Start Establish Cybersecurity Team Identify Critical
Digital Assets & Systems Implement Communication
Barriers Implement Access Control for Portable and Mobile
Devices. Remote Access Testing for offsite employees
Conduct Training for Offsite Employees Conduct Training
for Onsite Employees Update and document cyber security
controls and protocols Assessment and Monitoring Full
Cybersecurity Plan Implementation Project End -20 10 -
10 25 -15 15 -15 15 -20 20 -15 10 Date 43466
43496 43524 43555 43585 43616 43646
43677 43708 43738 43800 43830 0 0
0 0 0 0 0 0 0 0 0 0
Project Milestones
DateMilestoneDescriptionPosition
1/1/2019Project Start-20
1/31/2019Establish Cybersecurity Team
Team members chosen for the Cybersecurity Team may require
additional training to ensure adequate performance of
cybersecurity
assessments and testing.
26. 10
2/28/2019Identify Critical Digital Assets & Systems
This includes offsite communications, support systems, system
components and structures that if compromised would cause
great
harm to Dayton Soft Products.
-10
3/31/2019Implement Communication Barriers
This protects critical systems from cyber attacks from the
Internet and
company business systems by isolating them. Prevents remote
access
to core business systems.
25
4/30/2019
Implement Access Control for Portable and
Mobile Devices.
Portable and mobile devices are used to transfer digital data and
can
be used to spread malicious software to company systems. This
milestone includes updating firmware and software on
equipment.
-15
5/31/2019
Remote Access Testing for offsite
employees
This protects business systems and the company network by
ensuring
that appropriate access controls are in place for offsite
employees
and vendors who are accessing company systems from outside
the
office.
15
6/30/2019Conduct Training for Offsite Employees
Training is paramount to provide cyber threat awareness to
27. offsite
employees.
-15
7/31/2019Conduct Training for Onsite Employees
Training is paramount to provide cyber threat awareness to
onsite
employees.
15
8/31/2019
Update and document cyber security
controls and protocols
Keeping Security controls and protocols involved keeping
procedures
up-to-date, which is a critical milestone, especially as new
cyber
threats are identified and mitigation procedures are changed.
-20
9/30/2019Assessment and Monitoring Implementation of
ongoing assessment and monitoring activities.20
12/1/2019Full Cybersecurity Plan Implementation
Cybersecurity Plan is fully implemented and all security
controls and
actions have been completed.
-15
12/31/2019Project End10
Project TimelineDayton Soft ProductsProject
MilestonesDateMilestoneDescriptionPositionBaseline1/1/19Proj
ect Start-2001/31/19Establish Cybersecurity TeamTeam
members chosen for the Cybersecurity Team may require
additional training to ensure adequate performance of
cybersecurity assessments and testing.1002/28/19Identify
Critical Digital Assets & SystemsThis includes offsite
communications, support systems, system components and
structures that if compromised would cause great harm to
Dayton Soft Products.-1003/31/19Implement Communication
BarriersThis protects critical systems from cyber attacks from
28. the Internet and company business systems by isolating them.
Prevents remote access to core business
systems.2504/30/19Implement Access Control for Portable and
Mobile Devices.Portable and mobile devices are used to transfer
digital data and can be used to spread malicious software to
company systems. This milestone includes updating firmware
and software on equipment.-1505/31/19Remote Access Testing
for offsite employeesThis protects business systems and the
company network by ensuring that appropriate access controls
are in place for offsite employees and vendors who are
accessing company systems from outside the
office.1506/30/19Conduct Training for Offsite
EmployeesTraining is paramount to provide cyber threat
awareness to offsite employees. -1507/31/19Conduct Training
for Onsite EmployeesTraining is paramount to provide cyber
threat awareness to onsite employees.1508/31/19Update and
document cyber security controls and protocolsKeeping Security
controls and protocols involved keeping procedures up-to-date,
which is a critical milestone, especially as new cyber threats are
identified and mitigation procedures are changed.-
2009/30/19Assessment and Monitoring Implementation of
ongoing assessment and monitoring activities.20012/1/19Full
Cybersecurity Plan ImplementationCybersecurity Plan is fully
implemented and all security controls and actions have been
completed.-15012/31/19Project End100
Position
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
29. [CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CELLRANGE]
[CATEGORY NAME]
Project Start Establish Cybersecurity Team Identify Critical
Digital Assets & Systems Implement Communication
Barriers Implement Access Control for Portable and Mobile
Devices. Remote Access Testing for offsite employees
Conduct Training for Offsite Employees Conduct Training
for Onsite Employees Update and document cyber security
controls and protocols Assessment and Monitoring Full
Cybersecurity Plan Implementation Project End -20 10 -
10 25 -15 15 -15 15 -20 20 -15 10 Date 43466
43496 43524 43555 43585 43616 43646
43677 43708 43738 43800 43830 0 0
0 0 0 0 0 0 0 0 0 0
1
Prioritizing Threats
30. Prioritizing Threats 13
CMGT/433 Cyber Security
Prioritizing Threats – Dayton Soft Products
Name
University
April 3, 2019
Cyber Security Executive Summary
Introduction
The following Executive Summary illustrates items the team is
requesting additional information on, including types of
challenges and cybersecurity threats, how they impact the
organization, and how these threats should be addressed.
Prioritization of the top five risks is shown in table format
along with the impact these cyber threats could have on Dayton
Soft Products network and devices. Finally, the explanation of
the importance of detection and intrusion testing is reviewed,
along with challenges that mobile and cloud computing brings
to our organization.
Cyber Security Threat Categories
1. Mobile Device Security Threats
2. Web Application Security Threats
3. Internet of Things Security Risks
4. Cloud Security Risks
5. Network Security Threats
6. Email Security Threats
7. Social Media Security Risks
31. 8. Endpoint Security Risks
Common cybersecurity threats come from several categories,
including mobile threats, Internet of Things (IoT) risks, web
application threats, cloud threats, network threats, email
security threats, social media risks, and endpoint security risks
(Fortinet.com, 2019). Within these cyber threat categories,
some subcategories are identified below each main class. Below
is a table that lists the main cybersecurity threat categories and
common cyber threats for each main type, underneath them.
CATEGORIES
Mobile
Web Apps
Internet of Things (IoT)
Cloud
Network
Email
Social Media
Endpoint
Cyber Threat #1
Unsecured
Wi-Fi
Injection
Application Vulnerabilities
Data Loss
Virus/Trojan Horse
Malicious Links
Phishing Scams
Mobile threats (BYOD)
Cyber Threat #2
Data Leaks
Cross-Site Scripting
Unsecured wireless devices
Insider Threats
Rogue Software
Distributed Denial of Service (DDoS)
32. Malware
Compromised Routers
Cyber Threat #3
Broken Cryptography
Misconfigurations
BYOD unsecured devices
Denial of Service
Spyware and Adware
Ransom-ware
Malicious Links
Fax Machines & Printers
Table 1. Cyber Threat Categories and Sub-categories
The above challenges and their detailed impact statements are
prioritized below, beginning with Mobile Security threats.
Challenges
Impact on Dayton Soft Products
Mobile Security Threats
Unsecured Wi-Fi
Threats to the organization can occur when employees use
unsecured wi-fi in places such as airports, coffee shops, etc.
With 743 off-site employees place around the globe, training
and other security protocols must be rolled out to all employees.
Off-site employees are not the only ones at risk, onsite
employees travel and frequent coffee shops too.
Data Leaks
Applications downloaded to mobile phones can be the cause of
unintentional data leakage (Kaspersky.com, 2019). Some
applications contain risky-ware that sends data to servers
remotely that is used by cybercriminals for illegal actions.
Broken Cryptography
Broken cryptograph occurs when developers use poor
encryption algorithms containing vulnerabilities. This can lead
to hackers modifying the send/receive capabilities of the
application and send copies of text messages to other locations
33. without the users’ knowledge.
Web Application Threats
Injection
Hackers use this threat on a target interpreter to exploit its
syntax by attacking them through text (Owasp.org, 2019, Top 10
Injection). By understanding the syntax, the attackers can send
untrusted data to the target interpreter. This type of threat is
very common in legacy applications, such as SQL and XPath
queries.
Cross-Site Scripting
This type of threat involves hackers using scripts to hijack a
user’s session via the browser. It can redirect users, use
malware to hijack their browser, or even deface websites
(OWasp.org, 2019).
Misconfigurations
Misconfigurations can occur at all levels of the application
stack, from the web server to the application server. The hacker
exploits this threat by accessing unused pages, unpatched flaws,
default accounts, and unprotected files to obtain access to a
business system. This frequently occurs to machines that do not
have the latest security patches and the updates installed and
can result in the entire system being compromised.
Internet of Things (IoT) Security Threats
Application Vulnerabilities
The Internet of Things brings along with its massive
vulnerabilities and threats to Dayton Soft Product. Application
software is distributed for an exponential number of devices and
balancing security with flexibility can be a real challenge.
Unsecured Wireless Devices
The Internet of Things (IoT) apps can be installed on a wide
number of different device types, such as refrigerators,
automobiles, hospital equipment, and other business machines
and many of these device types do not have the capability of a
secure environment in which to monitor or scan for security
threats.
BYOD Unsecured Devices
34. BYOD is in this category because employees bringing personal
devices containing a multitude of unsecured applications is
normal in today's business environment. Often, companies do
not provide company-issued iPads, Smartphones, Tablets,
Laptops, etc., so the employee is expected to purchase and use
personal devices for business needs. Companies are making a
huge mistake by not providing secured devices for their
employees since the cost of infiltration can range in the millions
if the right hacker gets into the right app and steals company or
customer information.
Cloud Security Threats
Data Loss
This type of threat does not always come from an attack. Data
loss can occur when events such as an environmental or
weather-related issue occur, human error, or employees
accidentally deleting files. This threat can happen
unintentionally, and the best way for Dayton Soft Products to
mitigate damage is to keep up-to-date backups of all files in the
cloud environment.
Insider Threats
This type of attack comes from disgruntled employees or even
those who are just plain malicious. Insider threats can also
include employees of the hosted cloud server environment who
already has inside access to all data and information files.
Denial of Service (DoS) Attacks
DoS uses botnets usually purchased from the Dark Web using
cryptocurrency. When a DoS occurs in a cloud environment, it
gives the criminal(s) plenty of time to do major damage and
cover their tracks to avoid being caught.
Network Security Threats
Virus/Trojan Horse
According to Mello, (2014), the chances of a third of the
computers in the world being affected by a malicious ware are
very high. The impact to Dayton is that employees may not be
properly trained on how to identify email links that are
malicious code ready to take down the company's network. In
35. the case of the Trojan Horse, users willingly install software
from links by being tricked since the sender is most often
someone they know (the email is not really from that sender –
in fact, the sender more than likely has the virus and is unaware
that an email was sent out under their name).
Rogue Software
This type of threat comes in the form of a pop-up on an
employee's computer that alerts them in red letters that their
computer is infected, and they are offering software to save
their files, if they just click and install it. Unfortunately, this
still occurs today and the reason behind it is lack of company
training.
Spyware and Adware
Third-party software programs, usually free that contain some
spyware, adware, or bloatware that is meant to advertise
products and bog down an employee's computer, and
productivity for Dayton Soft Product. Adware track browsing
history and habits and give popups for things you may have
searched for previously. Users usually give authorization by not
unchecking a box during installation. This poses a serious threat
to employee productivity and employees should be prevented
from downloading any software by removing Admin privileges
from all company computers.
Email Security Threats
Malicious Links
Clicking on random links inside an email can be disastrous and
can cause the company’s entire network to crash. Some links
can install viruses on the computer and leak into the network
where it will replicate as a worm, continually destroying data,
files, or anything in its path.
Distributed Denial of Service (DDoS)
This type of attack occurs from many devices that are
compromised and many Internet connections to flood a target,
usually distributed via a botnet. The goal is to prevent a user
from utilizing critical services.
Ransomware
36. Ransomware can be distributed through software applications,
infected external storage devices, websites and are
compromised, remote desktop sessions, or even email
attachments. When this type of threat occurs, the ransomware
changed the user's login information and holds the computer and
the data therein, hostage, until the user pays a ransom using
cryptocurrency. The only way to get out of paying the ransom is
if the user has a good backup to restore the computer.
Social Media Threats
Phishing Scams
This type of threat involves trickery through fake websites, text
messages, email, phone calls, etc. The goal of the criminal is to
get the target to send them money, confidential information,
passwords/login information, or any other valuable commodity
by tricking them into thinking they are helping or being ordered
to do this by a superior.
Malware
Malware runs rampant on social media websites and works in
the background to take over social media profiles while the user
remains unaware that this is occurring. Dayton Soft Products
would do well to block employee access to social media
websites during working hours.
Malicious Links
Malicious links still work because people continue to click on
unknown links. This is risky because clicking on a malicious
link could download malware that hackers may use to take
control of the computer. This attack is vicious because the user
has no idea that they have opened the door to allow a hacker to
potentially control their machine and the company data on the
computer.
Endpoint Security Threats
Mobile threats (BYOD)
Endpoint security is usually controlled by installing software on
the endpoint, such as a gateway or server on a network. With
the rapid growth of employees at Dayton Soft Products, the
concern here is that the BYOD policies for employees do not
37. require personal devices to be submitted to IT to install
endpoint security software on them. Since employees will be
using these devices to connect to the company network, there is
a huge risk here.
Compromised Routers
Routers are also endpoints and are prone to attack by hackers
who attempt to compromise them to change settings. Once the
settings are changed, employees could easily be routed to
malicious websites that will steal company and personal data.
The hacker's goal is based on the financial gain if the attack is a
success. One of the main problems that create this vulnerability
is that Security personnel fail to change default passwords on
routers which give hackers an easier way in using web-based
scripts (TrendMicro.com, 2019).
Fax Machines & Printers
Fax machines and printers can easily be overlooked but are
endpoints. Since fax machines are rarely used in today's office,
they may be sitting in a corner gathering dust, but still
connected to the company network or unsecured Internet
connection, making them an ideal target for hackers.
Table 2. Cyberthreat categories and impact to Dayton soft
products
Top Five Threats
1. Mobile Device Security Threats
2. Web Application Security Threats
3. Cloud Security Risks
4. Network Security Threats
5. Endpoint Security Risks
Recommended Cybersecurity Category to Address for Dayton
Soft Products
The recommended category is network security threats. This is
because of the importance of securing all devices and avenues
that can lead to access to the company network.
Identify Challenges that Mobile and Cloud Computing Needs
bring to Dayton Soft Products
38. Challenges regarding mobile and cloud computing needs for our
organization are many. However, the benefits far outweigh the
risks. Some of these risks include geographic risks,
infrastructure risks, and platform risks. Geographically, the
company currently operates out of one data center, leaving all
types of challenges and risks for our organization. These risks
include Internet outages, fires, natural disasters, etc.
Additionally, having only one data center increases latency and
lag time resulting in poor performance of the network. By
moving to the cloud, we can experience a cost-effective way to
diversify geographically and have our data redundantly stored at
several data centers. Platform diversity includes cyber threats
that target our security protocols, applications, and operating
systems. Since cloud providers have their own sets of security
protocols, this decreased the likelihood that both our data center
and the cloud provider’s data center will succumb to the same
cyber-attack.
Security tools utilized by cloud providers can assist Dayton Soft
Products with email filtering, network monitoring, and DDoS
protection against cyber threats. Cloud providers can greatly
reduce our risk by getting malicious email links that our
employees cannot resist clicking on by filtering and removing
malicious attachments and spam. They can store these
attachments in a quarantined folder before deleting to give our
Cybersecurity Team a chance to review the attachments.
As discussed above, mobile challenges continue to be a threat as
new employees are hired and therefore use their unsecured
personal devices to access the company network. All devices
must be turned into the IT Department so that the Cybersecurity
Team can install the proper security tools.
Importance of Testing for Detection and Intrusion of Risks
Testing the vulnerability of a company's systems and network is
critical to securing our data, information, and overall systems.
Several specialized tests can be used including penetration tests,
intrusion tests, and vulnerability analysis. The penetration test
reveals a detailed analysis of system vulnerabilities that are
39. open to the hacker for exploitation. Ignoring results of any of
these tests can open our company up to severe harm and
financial liability. It is essential to detect and understand
threats before they occur to initiate maximum mitigation efforts
to lessen the impact to Dayton Soft Products. Finally,
conducting these tests is an IT Security best practice and
concludes that our systems are thoroughly resistance to
infiltration of cyber threats.
References
Eurotux.com (2019). Intrusion Tests and Vulnerability Analysis
Reduce IT Security Risks. Retrieved from
https://eurotux.com/intrusion-tests-and-vulnerability-analysis-
reduce-it-security-risks
Fortinet.com (2019). Web Application Security. Retrieved from
https://www.fortinet.com/solutions/enterprise-midsize-
business/webapplication-security.html
Mello, J.P. (2014). Report: Malware Poisons One-Third of
World's Computers. TechNewsWorld.com. Retrieved from
https://www.technewsworld.com/story/80707.html
OWasp.org (2019). Top 10 Cross-Site Scripting. Retrieved from
https://www.owasp.org/index.php/Top_10_2010-A2-Cross-
Site_Scripting_(XSS)
OWasp.org (2019). Top 10 Injection. Retrieved from
https://www.owasp.org/index.php/Top_10_2010-A1-Injection
TrendMicro.com (2019). 3 Overlooked Endpoints for Cyber
Attacks and How to Protect them. Retrieved from
https://blog.trendmicro.com/3-overlooked-endpoints-for-cyber-
attacks-and-how-to-protect-them/
Running head: ACTION PLAN 1
ACTION PLAN 2
40. Action Plan
Name
CMGT/433
Lecturer
University
Action Plan
Risk management is essential for an organization that aspires to
prevent losses resulting from the occurrence of a risk. It
involves risk management planning, identification, analysis,
monitoring, and control as well as having contingency plans.
Good risk management must be supported by a comprehensive
action plan that will aid in the prevention of risks from
occurring (Wang & Wang, 2018, p.712). The Dayton Soft
Products Company over the recent past has suffered losses
arising from attacks of its systems resulting in loss of vital
information. Adoption of two-factor authentication and
deployment of file integrity monitoring are the best risk
management strategies that the company should put in place to
secure its systems.
Two-factor Authentication
Ensuring that systems are accessed by an authorized party calls
for their configuration using different techniques. A two-factor
41. authentication technique aids in the confirming a user's claimed
identity by utilizing an aspect they know such as a password or
something they have such as a card (Pinheiro, Timoteo , de
Oliveira & Dias, 2016, p.125). The Dayton Soft Products
Company can utilize this technique in different ways through
the adoption of the factor components. The company should use
a knowledge factor such as the installation of passwords to all
its systems and letting the employees responsible with the
systems have the passwords which will grant them the
permission to access the systems’ data.
Secondly, the company should adopt the possession factor
component by issuing security tokens that must be inserted in
the systems before access is permitted. Thirdly, inherent factors
are personalized and very restrictive hence assuring the systems
of very high security. The company should get the fingerprints
or voice of the employees and integrate them into the system's
security options. This will allow the right individual to get
access to the secured data. Lastly, the company should adopt
location-based factor that incorporates the physical location of
the user in the security options. This factor allows users to
utilize a GPS signal to log into the systems and get access to the
required data (Wang & Wang, 2018, p.717).
The two-factor Authentication Action plan
Action item
Details
Persons responsible
Status
Due date
Prerequisites
Duration
Comments
Security education
Employees will be educated on ways of enhancing cybersecurity
Company security personnel
The security of the company is not stable
Start of April
42. -Cybersecurity articles
-Data on last incidences of insecurity
One month
The education will help the employees in upholding security at
a personal level
Installation of knowledge factor
All company systems and networks will be installed with
passwords
Company’s IT personnel
All systems do not have passwords increasing the risk of
unauthorized access.
Mid-April
Internet connectivity
One day
The passwords will allow access to the systems by the
authorized company employees.
Installation of the possession factor
All employees will have their fingerprints taken
Company’s communication and IT personnel
All system are neither configured with fingerprints nor with
other possession components
Mid-April
2019
Fingerprint capture devices
Three weeks
The fingerprints will allow access to the systems by the
authorized company employees.
Installation of inherent factors
Network signals will be installed with security apparatus
Communication and IT personnel
The network signals present but not configured with security
apparatus
May 2019
Network Signal cables
Two weeks
The signals will require passwords hence blocking unauthorized
43. access to data.
Evaluation of effectiveness
Assessment of the effectiveness of the 2FA in enhancing
security
Security and IT personnel
Will depend on the prevailing security level
Three months after installation of the security measures
Data on security issues reported
Two weeks
Evaluation will help in measuring the degree to which security
objectives have been met
Proposal for future actions
Assessing modifications to be done on the prevailing security
measures
All employees of the company
Will depend on the evaluation report
One week after evaluation
Evaluation report
One week
Will give more ideas on what should be done to enhance stable
security for the company
File Integrity monitoring action Plan
Setting policy
The regulations will be set to guide the FIM security strategy
Personnel in the records department
No proper mechanism set yet to control the transfer of files
Start of April
Data on the number of files in each department
One month
The policies will help in ensuring that authorized parties access
the data files.
Establishing a baseline
This will act as the reference point of controlling file transfer
Records and security personnel
No baseline used at the moment
Mid-April
44. 2019
-Data on the number of files in each department
-Data management skills
Two weeks
The baseline will act as the source of files and the absence of a
file will mean that file transfer has taken place.
Monitoring changes
Will check on the movement of files within the office
Record monitoring officers
Monitoring exists but not effective
Start of May 2019
Monitoring skills
One week
Monitoring will ensure that files are moved with authorized
persons for the right intentions.
Sending an alert
Vital in reporting incidences of improper data handling
Record officers
No warning signs available currently
Mid May 2019
Knowledge in warning systems
One week
Alerts will help in sensitizing employees of a possible data
security issue for an immediate action to be taken.
The two-factor Authentication Action plan
Education is aimed to impart employees with knowledge on
managing risks. In case of a problem, the training facilities
gather all the employees to give guidance on the immediate
actions to be taken. The training facilitators will set the
priorities in the education of employees from the HR
department. Every employee will be guided on individual
responsibilities during the training. To ensure the sustainability
of the education program, employees will be asked to attend
security training session’s ones in a month. Those who are
45. vulnerable to the risk such as the IT personnel will be guided
deeply on what is expected of them.
On the other hand, Knowledge, possession and inherent factor
are aimed at ensuring that all the people accessing the systems
have the passwords, fingerprints or security signal details. In
case of a problem, all the factors will be changed at the same
time. The IT personnel will set the priorities for the
management of the factors will be set by the IT personnel. A
contingency plan will involve having all the data within the
systems being backed up in other devices that will be stored in
locations away from the company’s premises. The systems
which are highly vulnerable like those with vital data will have
strong security configurations. The plan will be made
sustainable through regular changing of the security codes as
well as continued enlightenment of the employees on better
strategies of upholding the company's security. The strategy for
ongoing risk identification will entail establishing any
attempted entries using the wrong passwords and raising the
alarm. In the identification of the risk, employees will be
informed to be vigilant to a possible hacking followed by a
subsequent change of passwords, fingerprints and signal
security details. The steps for mitigating the risk will include
ensuring that the data is backed up and changing security
configurations. Lastly, the evaluation and proposal of future
actions will be aimed at establishing the degree to which the
security details installed are effective in meeting security needs
of the company as well as evaluating other possible mechanisms
that could be employed. In case of a problem, the evaluation
will be done to assess the ability of installed techniques in
securing the company's data.
File integrity monitoring Action Plan
The Dayton Soft Products Company should also employ File
integrity monitoring mechanism to secure its data. The strategy
involves examining files to establish when they change in
position, how they change, who changes them as well as what
can be done to restore them to their original locations (Wang,
46. He, Wang & Chu, 2015, p.433). FIM is appropriate in detecting
malware and also achieving security compliance within the
company. FIM involves five tasks that are aimed at attaining the
security of documents of an organization.
The first task involves setting policy by identifying the
documents that require close monitoring. A continue plan
should be made by having all records made in duplicate so that
files that require close monitoring have a stable backup. The
vulnerable files are selected based on the relevance of the
information they have. Risk should also be identified based on
the number of times the files are transferred. In making
policies, risk mitigation will be to allow only specific
individuals to be responsible for the movement of files as well
as reporting unwanted file transfer to the management.
Secondly, a baseline for the files should be established. A
reference point should be made to detect the transfer of files.
The strategy will be creating a warning system for any missing
file and taking steps of restoring the file to its position. The
plan upon identification of a problem is to change the baseline
criteria as it will prove irrelevant in detecting security issues
promptly. This means that other baseline strategies will be
proposed, evaluated and set up.
The third step will involve monitoring changes. This will
involve a comparison of the baseline data and the expected
targets. Negative variation will mean the change in policies as
well as the reference point of detecting the transfer of files. The
monitoring should be done regularly to ensure that all security
strategies set are followed and that any variation acted upon. To
enhance competency and continued monitoring, the employees
charged with the responsibility should be trained on appropriate
monitoring techniques as well as evaluating their monitoring
performance.
Furthermore, another task will involve sending an alert
concerning a missing file upon a claim of a missing file. To
ensure the reliability of this task, training is required on the
procedure for reporting any observed change in terms of file
47. location. Employees should be informed about who they should
report to as well as the data to be reported. Upon the
identification of such a risk, back up data should be well
secured as well as the security team taking the role of
investigating the whereabouts of the file. Interrogative
interviews should be conducted. For sustainability of the task,
all employees responsible should be fired to stop the vice from
spreading to other employees of the organization.
References
Pinheiro, A., Timoteo de Sousa, R., de Oliveira Albuquerque,
R., & Dias Canedo, E. (2016). Trust-based protocol for
permanent monitoring of file integrity in the cloud. Paper
presented at the 1-6. doi:10.1109/CISTI.2016.7521430
Wang, D., & Wang, P. (2018). Two birds with one stone: Two-
factor authentication with security beyond conventional bound.
IEEE Transactions on Dependable and Secure Computing,
15(4), 708-722. doi:10.1109/TDSC.2016.2605087
Wang, D., He, D., Wang, P., & Chu, C. (2015). Anonymous
two-factor authentication in distributed systems: Certain goals
are beyond attainment. IEEE Transactions on Dependable
and Secure Computing, 12(4), 428-442.
doi:10.1109/TDSC.2014.2355850
48. 05823 Topic: cyber security awareness campaign
Number of Pages: 2 (Double Spaced)
Number of sources: 1
Writing Style: APA
Type of document: Other (Not listed)
Academic Level:Undergraduate
Category: Computer Science
Language Style: English (U.S.)
Order Instructions: ATTACHED
As a final project requirement, the executive staff requested
recommendations to address the following:
Strategy for staff awareness
Strategy for ongoing security maintenance
The best way to get the message across is to have a solid
mission statement to share with the organization. You decide to
create an awareness campaign for the organization to address
the executive staff member's request. Your campaign consists of
the following three items:
Mission statement
Poster campaign
49. Message to organization via the intranet
Create an approximate 90-word security policy mission
statement for Dayton Soft Products.
Develop a poster campaign consisting of 3 posters for security
awareness to display in the workplace and to distribute
virtually. Each poster must include the security policy mission
statement. Highlight at least 5 legal and ethical issues across
the 3 posters. You may use any program to create your posters.
Write a message for the company's internal website to a diverse
workforce announcing the cybersecurity awareness material.
You will need to submit a draft of your announcement message
to the executive staff in the form of a Microsoft® Word
document.
Provide the following elements in your announcement message:
The reason the corporate security policy was established
Mission statement
Employees' role to meet the mission
Announce launch of the poster campaign
Large images of the three posters
Strategies and tools for ongoing monitoring and enforcement of
security policy