Client uploads
Find an example of case study research work for critical analysis. The case study work may be a book, journal article, a dissertation, or technical report on a topic of interest.
Im studying and need help with a Business question to help me learn.
Assignment Details:
- Why is this classified as a case study? Is it a descriptive, explanatory, or exploratory study?
- Identify the four key components of the research design:
- What is the research question?
- What propositions are suggested?
- What is the unit of analysis?
- How is the data linked to the propositions?
- Identify the theoretical framework for the study and assess the quality of the study in terms of validity and reliability.
Models of Restorative Justice
Help me study for my Law class. Im stuck and dont understand.
You are a mediator working for a mediation center providing service in an urban area for residents, businesses, social service agencies, legal advocacy groups, and county courts. Your center helps communities develop models of restorative justice, including training programs for its clients.
You are considering adopting a restorative justice model from one of the countries that have been utilizing mediation. There are several countries from which to choose. You may select the Chinese model of people’s mediation committees (PMC) for settling disputes, the New Zealand model, the Norwegian model of restorative justice, or the Canadian model.
Prepare a 4- to 6-page Microsoft Word document and address the following:
- Examine one of the countries’ models and use data to evaluate whether such programs would be effective in the United States.
- Specify which crimes or situations such model would be appropriate for, and indicate any changes that would be required in order to work best in different situations.
- Specify the “players” involved and show how the offender’s social network and local community can help in resolving crimes or disputes.
In order to establish what you have learned about the other country’s system and to show how you think it could be modified to work in the United States, apply the model to the following scenario:
Charles is a sixteen-year-old high school student. He has a clean record and is a good student, but recently he got into trouble. He was with two other friends who vandalized a local 7-11. They spray-painted graffiti, overturned garbage cans, and drove through the landscaping. The other two students have prior records and are being dealt with separately. Because Charles has a clean record, he is offered the opportunity to participate in a restorative-justice process of offender/victim mediation.
Respond to the following:
- What would you propose in order to resolve this situation?
- What barriers would need to be overcome in order to enact your solution?
- How would your resolution be enforced? In other words, what if Charles doesn’t live up to his agreement?
- Why you think your resolution is a better alternative for all concerned than a traditional punishment?
Support your responses with examples.
Cite any sources in APA format.
Strategic Audit
I dont know how to handle this Business question and need guidance.
Strategic Audit
The strategic audit system is a diagnostic tool to pinpoint an organizations strengths and weaknesses. Use the Strategic Analysis Framework and other tools in order to conduct a strategic audit. You might consider using a SWOT analysis for both companies to analyze each of their situations.
For this assignment, a mini strategic audit will be conducted for two companies with an overall goal to compare how each company differs in the strategy management and implementation, while identifying the importance of strategic management.
- Conduct a Strategic Audit on two companies of your choice that are within the same industry. During this audit, you will be comparing each company, to do so be sure to create a SWOT analysis for each company.
- In addition, visit each companys website and conduct research to identify key strategies that each company has. List a brief introduction of each company, to include the Mission Statement and compare key aspects of each company.
- Be sure to include the concepts identified in the readings for this week’s topics.
The requirements below must be met for your paper to be accepted and graded:
- Write between 750 1,250 words (approximately 3 5 pages) using Microsoft Word in APA style, see example below.
- Use font size 12 and 1 margins.
- Include cover page and reference page.
- At least 80% of your paper must be original content/writing.
- No more than 20% of your content/information may come from references.
- Use at least three references from outside the course material, one reference must be from EBSCOhost. Text book, lectures, and other materials in the course may be used, but are not counted toward the three reference requirement.
- Cite all reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) in the paper and list on a reference page in APA style.
References must come from sources such as, scholarly journals found in EBSCOhost, CNN, online newspapers such as, The Wall Street Journal, government websites, etc. Sources such as, Wikis, Yahoo Answers, eHow, blogs, etc. are not acceptable for academic writing.
A detailed explanation of how to cite a source using APA can be found here (link).
Download an example here.
Improvements to the Correctional System
I dont know how to handle this Law question and need guidance.
Imagine that you are a state legislator that heads a committee for the Department of Corrections. Your responsibilities include recommending improvements to the correctional system, both domestic and international, (e.g., Guantanamo Bay). Go to Cornell University Law Schools Website, located at http://www.law.cornell.edu/constitution/eighth_amendment, and review the Eighth Amendment to the U.S. Constitution
shanki replies
Can you help me understand this Computer Science question?
provide replies to student posts each in 150 words.
shank-Safeguarding the critical infrastructure of the nation from China is done with the advent of DHS and the main functions include the IT infrastructure, Government agencies, telephone connectivity, electric grid, and commercial establishments. Integrated Risk Management programs are planned and applied by the Director of the Office of Management Budget (OMB) as a part of providing Homeland security. These programs are used to mitigate the vulnerabilities as per Section 1 of Cybersecurity of Federal Networks as exploited by the national actors. According to the Framework for Improving Critical Infrastructure Cybersecurity as per the NIST, this plan is implemented to protect the Homeland security using the Chapter 35, Subchapter II of Title 44 of the United States Code (Young & Hall, 2015)
Risk like Botnets the automated distributed threats are mitigated by working with the agencies those head the Federal Trade Commissioners and this is the core responsibility of Director of OMB, Secretary of Homeland Security with Nations Critical Infrastructure as per sec 5195c(e) of title 42. Also, disruption of electricity infrastructure and building are also considered under Incident response capabilities along with the United States Cyber Incident Coordination Policy Directive. Industrial base protection is also considered under Section 2f and this will be handled by the agencies like Assistant President for Homeland Security and Counterterrorism and President of the National Security Affairs (Herrera & Maennel, 2019)
IT security aspects like theft, fraud, internet security, innovation, privacy protection, and reliability are considered as per section 3 of Cybersecurity. Following are some of the additional considerations taken
Subsection b for deterrence and protection speaks about the possible options to protect from adversaries and thus protect the people from threats
Subsection c speaks about the importance of International Cooperation and Workforce Development to achieve Cybersecurity using the cyber peers’ concept
Section 4 of Information Technology (IT) in the section 11101(6) the title 40, United States Code discusses the procedures to monitor and control the software and hardware systems via the agencies and thus control physical equipment (Theoharidou, Xidara & Gritzalis, 2008)
sat-The Department of Homeland Security (DHS) plays an important role in the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure assets and the Department of Defense and Federal agencies. Secretary Johnson has confirmed that DHS also takes a role and has taken it seriously in what is a fast-moving technical field. The measures to be implemented by DHS relate to cybersecurity vulnerabilities and controls within a significant portion of critical infrastructure sectors. These initiatives do not violate existing laws, regulations or administrative guidance. Instead, they require the use of current investigative, technical, and administrative authorities to detect, prevent, and respond to the adverse effects that may result from identified cybersecurity risks. DHS in this circumstance has a responsibility as part of its responsibilities under the Secretaries Order and its regulations. The Department of Homeland Security (DHS) plays a role in the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure. DHS in this circumstance has a responsibility as part of its responsibilities under the Secretaries Order and its regulations. (Kappeler, V. E. (2019))
The Department of Defense issued an interim directive that addresses the DHS Directive and explains the needs of the DHS, DOD, and the US industrial base to work together to identify specific, tailor-made cybersecurity projects to achieve risk and opportunity for collaboration. DHS measure increases the frequency and scope of cyber monitoring and reporting. DHS encourages and cooperates with U.S. Government and industry partners. DHS also worked with the Department of Defense (DOD) to coordinate the response to the recent ransomware attacks, an attack that impacted multiple systems and affected millions of customer information. A critical infrastructure is a group of activities, facilities, services, and assets that are essential to the nation’s security and that, as such, are protected from unauthorized access or use. While critical infrastructure cannot be entirely protected from cyber-attacks. (Sylves, R. T. (2019))
nag-Cyber-attacks increase every day due to the prevailing freedom of the cyber landscape. Today everyone can easily access internets everywhere. In contrast, hackers have established new methods of cyber-attacks such as social engineering techniques to manipulate people. Therefore, although various governments have enforced strict measures to reduce cybercrimes, the attacks seem endless. The organized cyber-attack by China is an issue of concern that appear to cause a dilemma to the department of Homeland Security. For decades, the primary purpose of Homeland security has focused on working tirelessly to ensure the wellbeing of US citizens is at stake. Nonetheless, although the issue causes a dilemma, DHS can formulate various strategies to handle the situation.
It is paramount for Homeland security to first asses the cybersecurity attack. The risk associated with cyber-attack keeps evolving. Homeland Security should work closely with specific agencies such as General Services Administration, Department of Defense and all cybersecurity firms to evaluate the attack and mitigate it (Bowerman, 2017). DHS should put extra efforts to communicate with these agencies through other back up techniques to ensure there is smooth coordination between them.
While assessing the attack with the help of other agencies identifies the intensity of the attack, Homeland Security should protect the information of the federal government systems. Protecting information reduces the overall vulnerability that the attackers may use to cause further damage (Lavanya, 2018). In the efforts to safeguard the crucial federal information, DHS should also triage the risks the government may face as a result of the attack.
DHS also should educate all stakeholders concerning all the latest cyber-attacks to prevent such as the scenario in future. The education should involve the use of unsecured websites and reckless sharing of confidential data to other parties. DHS can as well establish more backups of data to encrypt information with ransomware.
Need a PPT
Im studying and need help with a Computer Science question to help me learn.
Human factors are considered the weakest link to security, which makes it crucial to change user behavior. The changes primarily consist of workplace behavior, and work activities to stay compliant with standards, guidelines, and procedures of the security policy. Behavior modification involves some level of learning of the user.
You are the security trainer of a cloud service provider, research the threats, common workplace problems, issues, human errors, and others that relate to an employee working in the Information Technology field, then create a workplace security program.
A few ideas to get started are encrypting hard drives, no outside storage devices can be brought to work, awareness of threats internal and external. You will need to provide 20 slides and a video presenting the information to be used with the employee’s training and on boarding program.
Task:
- Provide a minimum of 20 slides
- Must include a reference page in APA
Proofreading Assignment
Can you help me understand this Business question?
Watch the presentations below on Proofreading and Improving mechanics in Business writing,
1. Improving Business Writing Through Proofreading
2. Improving Mechanics in Business Writing
Then print the attached file and circle or highlight the 20 mistakes in the letter. Attached your completed file to this assignment link.
need help in paper
I need support with this Computer Science question so I can learn better.
Threat modeling
A new medium-sized health care facility just opened, and you are hired as the CIO, the CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation as well to make sound decisions. The concern is user authentication and credentials with third-party applications which is common in the health care industry.
You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your document be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them).
The CEO has provided the attached article as a reference.
Task:
- Explain why the other threat models are not ideal (compare and contrast)
- Provide one recommendation with summary and UML diagram
- Must be in full APA
- 3-page minimum not including the title page, abstract and references
Wk3 d1 res3 danh orig
I need help with a Health & Medical question. All explanations and answers will be used to help me learn.
IMPORTANT NOTE REGARDING WORD LIMIT REQUIREMENTS:
Please note that each and every assignment has its own word limit.
Read “Sociocultural Influences on Diabetes Self-Management Behaviors in Older African Americans,” by Rovner, Casten, and Fields Harris, from Diabetes Spectrum (2013).
URL:
Respond to the READING ABOVE and highlight a key aspect of the article/website for review.
MUST have at least three citations with the page numbers and three references in APA format and all questions clearly answered in paragraphs.(The List of References should not be older than 2016 and should not be included in the word count.)
Be sure to support your postings and responses with specific references to the Learning Resources.
It is important that you cover all the topics identified in the assignment. Covering the topic does not mean mentioning the topic BUT presenting an explanation from the context of ethics and the readings for this class
To get maximum points you need to follow the requirements listed for this assignments 1) look at the word/page limits 2) review and follow APA rules 3) create subheadings to identify the key sections you are presenting and 4) Free from typographical and sentence construction errors.
REMEMBER IN APA FORMAT JOURNAL TITLES AND VOLUME NUMBERS ARE ITALICIZED.
Contract Law Agreements -CT6
Im trying to study for my Business Law course and I need some help to understand this question.
After reading the NOLO.com article, “Contracts 101: Make a Legally Valid Contract (Links to an external site.)” and visiting the Student Career Center where you will review Tips for Professional Success (Links to an external site.) focusing on the information under the Conflict Management section, you will create a contract.
In order to develop this contract, you will adopt the role of an employee at XYZ Manufacturing. The purpose of this contract is to resolve a conflict between you and one of your co-workers regarding a parking space. The conflict has become serious and has affected production and morale in the workplace. Your manager has asked you to settle this disagreement by creating a contract, which will be signed by you and your co-worker. Compose an agreement that does the following
- Present a summary of your contract in the form of an email communication cover letter to your manager for approvalkeeping in mind appropriate and professional email etiquette. (Please go to the Career Center and review “Drafting a Cover Letter” for information regarding the development of a cover letter to be sent via email: https://portal.csuglobal.edu/student/page/view/drafting-a-cover-letter (Links to an external site.).) In your email, explain to your manager how this contract would benefit both you and your co-worker. This will represent the first page of your paper (after your title page).
- Present your contract, which should include the factors of time, tasks, goals, potential clauses, assignments, and restrictions.
- Use and define legal concepts by incorporating the legal terminology from your textbook where appropriate and relevant.
- Use academic or legitimate news sources, such as The New York Times, the Los Angeles Times, The Washington Post, CNN, MSNBC, etc.
Your paper should be 3-4 pages in length, not including the title or references pages. Include at least 3 credible sources to support your findings. The MGT315 Business Law Library Guide (Links to an external site.) can help you with finding quality resources.
Reference
Beesley, C. (2016, September 23). Contract lawHow to create a legally binding contract [Blog post]. U.S. Small Business Administration. Retrieved from https://www.sba.gov/blogs/contract-law-how-create-…
Use Promo Code: FIRST15