Client uploads
Discussion 1-Critique the discussion below-De
Im trying to learn for my Science class and Im stuck. Can you help?
The future is a bright one for smart devices like voice activated smart home controllers and smart thermostats. Including smart devices in our renovations keep us on the cutting edge and competitive with our competition. These devices enhance our customers lives by automating tasks and allowing them more free time to enjoy the things they would rather be doing. Unfortunately, our company may be liable for damages if our customers lose privacy due to the insecurity of these devices.
A simple hack could expose our customers data if the manufacturers do not build them with security in mind and continue to provide security updates throughout the life of the product. Concerning mobile health smart devices that transmit client health data to doctors, Arabo says that the manufacturers are not concerned with security and do not put effort into making them secure (Ararbo, Brown, & El-Moussa, 2012). Even when care is taken by the company providing the smart device to include better security features, it is still up to the consumer to activate or use them. Security features such as Two-Factor Authentication (2FA) which, besides a password, requires another medium such as a phone registered to the account in order to authenticate can help protect devices from being hacked. But, these require the consumers to set up or elect to opt in to that feature in the first place.
Due to the nature of most smart devices requiring access to and from the internet, they pose a risk that those devices will be accessed by someone other than the intended party. In a recent study of 34,686 controlled experiments, 72/81 smart devices were monitored talking to a destination that was not the manufacturer. This study also revealed that all of the devices that were tested exposed at least some information in plain text, allowing anyone listening to easily read the data. Information Exposure From Consumer IoT Devices:
There are many recent cases of consumers suing companies for negligence when installing smart devices that are not well protected or easily hacked to leak personal data. Toyota and Chrysler installed devices were claimed to be controlled remotely and exceedingly hackable by the plaintiffs. Even the home security company ADT has been taken to court with the plaintiff claiming that ADTs wireless security systems can be remotely turned off or used to spy on the owners (Gorman, n.d.). Baby monitors are even a target now too. Many wifi connected baby monitors are cloud enabled so that the parents can view their children from anywhere. This internet connectivity creates risk and several camera models have been hacked over the internet allowing the hacker to view, listen, and talk through the camera (Vaas, 2019). Beyond the financial impact associated with lawsuits, we risk our reputation and client trust if we knowingly install insecure equipment and we don’t take the time to ensure our customers know how to effectively secure them. A smart thermostat may record daily activities in order to save the owner money on energy costs. But if the device has not been updated from the default password the owner risks losing that data to a hacker using a simple password guess. The question then is who is liable for the damages?
If we decide to install a smart fridge that can order groceries when the customer is running low on milk, we need to inform the customer of the risk associated with their data and provide security measures the customer can take to protect their data. We should have a team or task force designated to research the security of the smart device products we install to make sure we provide our customers low risk options.
References
Arabo, A., Brown, I., & El-Moussa, F. (2012). Privacy in the Age of Mobility and Smart Devices in Smart Homes. 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing. doi:10.1109/socialcom-passat.2012.108
Gorman, L. (n.d.). The Era of the Internet of Things: Can Product Liability Laws Keep Up?, Defense Counsel Journal, 84(3). Retrieved from https://www.iadclaw.org/publications-news/defensecounseljournal/the-era-of-the-internet-of-things-can-product-liability-laws-keep-up/
Vaas, L. (2019, November 26). Parents say creep hacked their baby monitor to tell toddler they ‘love’ her. Retrieved from https://nakedsecurity.sophos.com/2019/11/26/parents-say-creep-hacked-their-baby-monitor-to-tell-toddler-they-love-her/
do the research paper on the topic:- computer wireless networking and communication
Need help with my Writing question – Im studying for my class.
All submissions are to be submitted through turn-it-in. Drop-boxes linked to turn-it-in will be set up in the Unit of Study Moodle account. Assignments not submitted through these dropboxes will not be considered. Submissions must be made by the due date and time. The turn-it-in similarity score will be used in determining the level if any of plagiarism. Turnit-in will check conference web-sites, Journal articles, the Web and your own class member submissions for plagiarism. You can see your turn-it-in similarity score when you submit your assignment to the appropriate drop-box. If this is a concern you will have a chance to change your assignment and re-submit. However, re-submission is only allowed prior to the submission due date and time. After the due date and time have elapsed you cannot make re-submissions and you will have to live with the similarity score as there will be no chance for changing. Thus, plan early and submit early to take advantage of this feature. You can make multiple submissions, but please remember we only see the last submission, and the date and time you submitted will be taken from that submission. Your document should be a single word or pdf document containing your report. This research study requires in-depth reading and analysis of a single specific topic. This one topic can be of your choice, but the topic must have been covered in this course. You require to take one research paper of that topic and make a small report on that research paper which should contain the following: Introduction to the topic Introduction to that paper, their main work. Detail description of the methodologies employed in that paper. Comparison of the results reported in that paper with others. Your comments on the advantages/disadvantages/superiority of that papers methodology. Suggest your changes/future-directions for that paper to improve it (if any). Conclusion. References. The research paper you need to choose should be published work in well-reputed Journ
Correspondence Case
Im working on a English exercise and need support.
Blake Glovers recent job performance needs to be addressed. You hired Blake over a year ago because he was highly qualified for the job, and in his first year, you and other managers were impressed by his excellent work and potential for leadership in the company. However, over the last three months, Blake has been regularly late to work, has called-in sick more than five times, and when he is at work, he has spent most of his time away from his desk, chatting with other employees and otherwise off-task. Upper management agrees that his personality fits well in the company, and you want to keep him; however, his recent behavior cannot be ignored.
As the manager of Blakes department, you have the task of disciplining him with a formal, written warning, which must include an assessment of Blakes performance to date and a specific improvement plan. Your plan should include measurable goals for Blake that will allow both Blake and the company to track his improvement within the timeframe you see fit. The warning should also articulate the consequences for Blake if he does not meet these goals.
look at the uploaded file
News Stories about Media and the First Amendment
I dont know how to handle this Law question and need guidance.
You need submit a 150-200-word summary [not a copy] of a news story from any reputable state or national news source in print, on radio, on TV, or online. Use Times New Roman, 12-pt. type, double-spaced. The story will be about the intersection of media and the First Amendment in the United Statesno stories from foreign countries. Not part of the 150-200 words will be a description of where you found this news item (N.Y. Times, CNN on TV, etc.), the title of the story, the date, and URL, if applicable, although I need to have this info. Just dont count these words toward you 150-200 range. The story must appear in the news media during the week you will be submitting it. In addition to the summary of the story, Im looking for any insights you might have on why this is an important case or issue and any implications for journalists, organizations, the media in general, corporations, etc. Be sure to include your contact info at upper left: name, date, which weeks summary, email address. Remember: If your story has nothing to do with the First Amendment or nothing to do with the media, it will count as a zero. The story must include BOTH.
The following documents are bad examples, so don’t make similar mistakes when you’re writing.
Question: T or F why 1- Assume that when $80,000 cash enter the banking system, the money supply ultimately increases by $320,000. Assume also that all banks do not hold excess reserves and that the entire money supply consists of demand deposits. Then t
I need help with a Economics question. All explanations and answers will be used to help me learn.
Question:
T or F why
1- Assume that when $80,000 cash enter the banking system, the money supply ultimately increases by $320,000. Assume also that all banks do not hold excess reserves and that the entire money supply consists of demand deposits. Then the total legal reserves for all banks will amount to $40,000, and total loans and investments for all banks will be equal to $ 280,000.
2- Banks cannot affect or contribute to changes in the money supply if they were required to hold all deposits in reserve.
3-Nowadays, a credit card is similar to a check, in money definition, according to macroeconomics.
discussion-reply to the post below-Ama
Im studying for my Science class and need an explanation.
Homeland security is a generic term which is used to describe a unified, organized and concerted approach to protecting our nation from terrorist attack. That means that Americas vulnerability to terrorism will be reduces and in the event of such an attack, it would cause minimized damage. The homeland security office was created in October 8, 2001 by the Bush administration, as a result of the horrible events of 9/11. (What is Homeland Security, n.d.)
National security is a term that covers both national defense and foreign relations of the U.S. National security refers to the protection of a nation from attack or other danger by holding adequate armed forces and guarding state secrets. (US Legal, n.d.)
The difference between the national security and homeland security. After looking at the information about national security it covers national defense and foreign relations. Homeland security is generally associated with preparing and protecting the nation against terrorism and other hazards like natural disasters and public health emergencies.
The distinctions serve the interests of the citizens and institutions is a more focused manner. The security of the entities by government has to be an all-round one, rather holistic. This prerequisite is better fulfilled due to the above.
effective HRM strategic planning
Im studying for my Management class and need an explanation.
Using the text figure 1.7; The Chain of Relationships ) and at least two additional credible outside sources, make an initial post that does the following:
1) Summarize the critical role measurement and evaluation play in effective HRM strategic planning.
2) Next, provide examples of measurements and evaluations systems or methods currently being used by HRM professionals. You might consider using a specific employee job title with associated duties to demonstrate and frame your discussion.
All initial posts must be supported by credible sources and included in your posts. Examine the authors credentials to determine the quality of the source. You may choose sources from either academic or industry experience, but your sources will help you go beyond simply stating your opinion. After your initial posts, review two posts from your classmates. Reflect and comment on the examples your classmates provided and provide feedback to the author of each post. What did you learn from their posts? Be specific, clear, concise and complete.
Write down a weekly summary based on the requirements
I dont understand this Writing question and need help to study.
Before starting your assignment, make sure you have the basic knowledge of media law, and read the following requirements carefully before testing your work.
I need you to help me to complete a weekly summary of a news story. This summary can be from any reputable state or national news source in print, on video, on TV, or online. The detailed requirement has been uploaded below, please make sure you read all the requirements before you get this work!
This work must be an original work. And this work is very important for me, so High quality must be ensured. Looking forward to your high quality work! Thank you!
DB1 for Healthcare Emergency Mgmt.
Im stuck on a Management question and need an explanation.
- Please briefly introduce yourself to the class. This should include your background in emergency management.
- Based on your readings and experience, compare and contrast how health care emergency management evolved before 9/11 to its evolution after 9/11.
- Why has the scope of healthcare emergency management grown so dramatically? Will the growth continue?
Week 1 – Readings
- Reilly, M., &Markenson, D. S. (2010). Health Care Emergency Management: Principles and Practice
- Chapter 1: Principles of Emergency Management for Healthcare Facilities
- Barbera J.A., M. A. G., &Yeatts, D. J. (2009). Challenge of hospital emergency preparedness: Analysis and recommendations. Disaster Med Public Health Preparedness, 3(1), 74-82. http://journals.cambridge.org/download.php?file=%2FDMP%2FDMP3_S1%2FS193578930000207Xa.pdf&code=56632593c6e64cedbe3d4e84592ebdd3
- Sauer, L. M., McCarthy, M. L., Knebel, A., & Brewster, P. (2009). Major influences on hospital emergency management preparedness and disaster preparedness. Disaster Med Public Health Preparedness, 3(1), S68-S73.
http://journals.cambridge.org/download.php?file=%2FDMP%2FDMP3_S1%2FS1935789300002068a.pdf&code=d5c11b3d75cfe198f111c69b82140018
Instructions:
– Minimum 400 words, 4 paragraphs
– Use proper APA6 format
Project Management Project
Help me study for my Business class. Im stuck and dont understand.
Create your own example for a project. Follow the instructions, and submit a no less than four-page Word document answering the questions for the project.
Create a risk register for your example project. Categorize each risk, list potential causes, and list potential responses for each cause, as shown in Exhibit 10.9
Describe what each project success measure (from Exhibit 10.1) looks like on your example project. Identify at least three risks to each success measure, determine which are major risks, and for each major risk develop one or more contingency plans. Identify whether the contingency plan is an avoidance plan (reducing the probability of the risk), a mitigation plan (reducing the impact of the event), or both.
Facilitate a discussion with the sponsor and other key stakeholders of your project. Have them determine the relative importance of their priorities and document them, as shown in Exhibit 10.2.
Perform a risk review for your example project. Use at least three (3) types of review, as shown in Exhibit 10.8. Which of these types gave you the most useful information? Why?
Be sure to use APA format and cite your work. When you get to the facilitating a discussion with the sponsor, use your imagination to create a discussion with a fictitious sponsor.
Use Promo Code: FIRST15