Need a 3-4 page paper APA style on Immigration reform, analyze the contemporary issue of immigration reform, which presents many public administrators with various ethical dilemmas.
More to follow:
Need a 3-4 page paper APA style on Immigration reform, analyze the contemporary issue of immigration reform, which presents many public administrators with various ethical dilemmas.
More to follow:
Need help with my writing homework on Security consultant. Write a 500 word paper answering; Network Risk Assessment Describe the purpose of a risk assessment, risk scope and identify critical areas for an assessment.
With the advent of computer networks and robust IT resources, the prevalence of malicious network activities such as hacking presents significant risks to the operational integrity of a company. A secured company network is that which has instituted a set of procedures to safeguard the fundamental networking infrastructure from misuse, disclosure of critical information, or simply access by unauthorized persons. Risk assessment is a proactive network security measure that serves to identify risks, threats, and vulnerabilities that could endanger the integrity of company’s operations. Secondly, this assessment forms the basis upon which these risks, threats, and vulnerabilities are prioritized in accordance with criticality. Remediation of the identified risks and vulnerabilities can then be effectively budgeted. Also, it is from this risk assessment that compliancy with new IT security laws and regulations can be achieved to avoid legal issues. Essentially, a properly conducted risk assessment offers a basis through which the company may roll out a set of procedures aimed at protecting company’s assets, which for this case include hardware, software, and critical information.
The scope describes what is covered and what is not covered in the assessment by identification of the needs to be protected, sensitivity of the information protected, and the extent of the protection. Defining the scope of network security assessment is important as it forms the basis of understanding the budget and level of security defined by the policies of the company. Understandably, the scope is a factor of criticality of information that a company has or seeks to protect from damage, manipulation, or malicious disclosure to the public. Areas covered include type of operating systems in used in the computers, access control permissions, port scanning, wireless leakage, firewall testing, intrusion detection testing, and service pack levels. A thorough assessment of these areas identifies the loopholes through which company’s critical information may be compromised. The aim is to proactively protect these areas from malicious attacks or access.
Select risk assessment methodology and give your rationale behind the one you chose.
OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a commonly used methodology for strategic assessment and planning of network security risks. The OCTAVE methodology is a technique used to analyze a company’s information security requirements. OCTAVE Allegro is the latest development and is widely used by the CERT Division. While older versions, which are OCTAVE and OCTAVE-S, are in operation, OCTAVE Allegro is the most preferred for the following reasons:
First, OCTAVE Allegro is a self-directed approach in the sense that it allows small teams of a company’s human resource across business units and IT to collaborate in addressing the security needs of the company. Generally, a successful business risk assessment methodology should allow for maximum collaboration. Secondly, the approach is flexible as it can be tailored to the company’s specific risk environment, security and resiliency goals, and skill level. Lastly, the evolved nature of OCTAVE transforms a company to an operational risk-based perception of security and addresses technology in business setup. OCTAVE can be modified easily and, in conjunction with the aforementioned benefits, can be employed as the fundamental risk-assessment component or rather process for the rest of the other approaches.
Violino, B. (2010). IT risks assessment frameworks: real-world experience. Retrieved from: http://www.csoonline.com/article/2125140/metrics-budgets/it-risk-assessment-frameworks–real-world-experience.
Need an research paper on mr. smiths case in an ethical, legal and moral perspective. Needs to be 10 pages. Please no plagiarism. From this paper, it is clear that the mental health act allows that the service provider can make decisions on behalf of the patient provided that it is proven that the patient is mentally incapable to make choices. For this reason, a discussion between the involved parties resulted to an agreed decision.
To conclude the task, it is clear that there are situations where the legal and ethical guidelines interact to help an individual to make a decision. At the same point, there are similarly clear variances between law and ethics that results to dilemmas. The practitioner, therefore, needs to be aware of the resemblances and the variances and in what way they affect the decisions made. It is necessary to remember the theories and moral principles that guide the moral obligations to be taken. Law is a key consideration when effecting any decision and must be considered in all ways. Law is different from the moral principles because it is enforceable in a law court while moral decisions are not backed by any enforcement authority (Benbassat&Baumal, 2012).
It is also necessary to set up methods that guide the decision-making process to hasten the process and save time which is key when it comes to saving a life. Having mentioned all the above, I believe that if all health practitioners have diverse information concerning the different case they are faced with in their daily practice as a dilemma, they will be in a better position to deliver quality services to the patients at any time.
Need help with my writing homework on Contemporary recreation, sports, or tourism legal issue. Write a 1000 word paper answering; The amount of lawsuit and the diversity of cases in the sports fraternity have been on a surge as more people rely on the courts to solve disputes. The laws have the required expertise to enable the smooth running of the sports. There exists variation as to the way the law is defined, one school of thought hold the view that a law is a congregation of regulations and rules that govern a particular action.
Sport law refers to the application of existing laws to recreation and sports. Sports governing bodies operate almost similar to state administrative and federal institution. The governing structures of sports organization are based on the federal laws, regulations and rules. For example, the guideline adopted by the National Football League in the U.S resembles traditional state tort law principles. Thus when a dispute over the interpretation of a regulation or rule arises, lawyers represent the participants and the principal body to resolve the dispute via the administrative structures set up by the sport organization.
The Constitution of United States does not guarantee freedom from an invasion of privacy. To justify an action for invasion of privacy, a petitioner must show the cause why the invasion is significant and is in an area for which there is anticipation of privacy (Flannery, 1998 pp 9). In the sports business, such cases are not uncommon especially in drug testing programs. Consider the case involving (Acton v. Vernonia School District 1995). James Acton challenged the drug testing program initiated by Vernonia School District as an invasion of privacy. However the Supreme Court established that school children had a smaller expectation of privacy because athletics subjected one to a need for medical attention, physical examination and a locker room environment. The Court thus upheld the view that drug testing does not constitute an invasion of privacy (Lisa, 2008 pp87).
However the Vernonia ruling is not likely to be relevant to collegiate athletes. In the Acton v. Vernonia case, the judge further explained that the high school students had a lower expectation of privacy given their minor age and were under the care of the school in absence of their parents. Given the situation it was the sole responsibility of the teachers to ensure discipline is observed at school. On the other hand, collegiate athletes are considered adults under less supervision from the college and university administration. An example is the U.S Supreme Court decision not to grant a hearing of an appeal of the Supreme Court of Colorado’s verdict which found that drug testing program on football players at the Colorado University constituted an invasion of privacy.
During the Proceedings, (University of Colorado v. Derdeyn, 1993), the Supreme Court of Colorado ruled that despite the University’s concerns in protecting the student’s welfare, the argument is not sufficient enough to warrant the intrusion on privacy through random testing for drugs on the players (Lisa, 2008 pp 94).
Herbs, (1985) notes that constitutional challenges to drug testing have been unsuccessful in professional sport. For instance, in 1994, the federal district court of Pennsylvania ruled that the National Football League (NFL) drug testing program was not subject to a constitutional challenge because of the absence of state action. The court (NFL v.
Need an argumentative essay on Week 8 Intelligence Failures or Misperceptions. Needs to be 1 pages. Please no plagiarism.
available information concerning the plots that led to the attacks, analyze it appropriately and disseminate it effectively in time in order to protect the public. This failure led to the launching of an unprecedented Joint Inquiry by the Congressional intelligence committees, in order to investigate the records of the Intelligence Community regarding the 9/11 attacks and make recommendations for further legislative action (Week 8 Professor’s Wrap Up Note).
Another factor that supports the claim of intelligence failures is that, although the Intelligence Community provided sufficient warning of an imminent attack in mid-2001 against the United States by Osama Bin Laden, the Community never learned the plans for aircraft hijackings in advance, which occurred on September 11. In addition, inquiries arose on whether the Intelligence Community failed to provide precise information about the ability of Iraqi to develop and use weapons of mass destruction (WMD), or whether the Administration of Bush systematically misused intelligence to acquire support for launching Operation Iraqi Freedom in March 2003, as well as for continuing military operations in Iraq. As of today, the inquiry and research into both of the perceived major contemporary .intelligence failures continues.
According to Paul Pillar argument, the intelligence community was aware prior to 9/11 of the threats and received many from al-Qaeda that they will attack America on American soil. Along with the high amount of threats received in the summer of 2001, Americans had several chances of taking out Bin Ladin. However, the president and the intelligence community failed to act aggressively on the threats. And in 1993 America was attacked with the bombing of the World Trade Center.  .This is an evidence of failed community intelligence and a weakness or inexperience of leadership. Other similar examples include the decision to go to war with Iraq, which was pure weakness and failures in presidential
Need an research paper on teaching and learning strategies for schools. Needs to be 8 pages. Please no plagiarism. Any decision is based on a body of knowledge. This body of knowledge is produced through research. By applying the appropriate methodologies and the research method, the body of knowledge can be established and advanced with confidence. While research is considered important there is no consensus on how it should be defined because research means differently to different people. Research is basically a systematic method of investigation which increases knowledge. Research relies on facts and experience, data, concepts and constructs, hypotheses and conjectures, and principles and laws (Amaratunga, Baldry, Sarshar, & Newton, 2002). The research methodology is the procedural framework within which the research is conducted. The methodology would depend upon the topic to be researched and the specific research questions are the primary drivers.
Research philosophy highlights two different schools of thought on how to conduct research. Arguments should be evaluated in different ways because primarily arguments have different roles and purposes and people assess according to the purpose in their mind. At times arguments provide useful information depending on one’s knowledge of how the world works. In a different setting, one can take an abstract approach and ask what follows from a given set of information and then decide on the outcome. Arguments can be evaluated in two qualitatively different ways – in terms of their deductive correctness or in terms of inductive strength (Rips, 2001). Research can either be quantitative (deductive) or qualitative (inductive). The inductive method concentrates on words and observations to describe people in natural situations. The quantitative approach places great stress on numbers that represent opinions or concepts. Both the methods have strengths and weaknesses and hence the selection of the methodology is difficult.
Need an argumentative essay on Explain the four major cultural dimensions identified by hofsted. Needs to be 3 pages. Please no plagiarism.
The four dimensions will be focused upon with respect to USA and other three countries from Europe, Asia and Latin America. Determining a culture of any given country is essential for any business. International business depends upon cultures of different countries in designing their policies. barriers within these cultures are worked upon in an effort to formulate a harmonized culture.
In profiling countries based on Hofstede’s cultural dimension, the research will focus on data and indexes provide for in the Hofstede Centre website. Each country will be profiled based on given scores. The score will be done on three countries. These countries are the USA, Mexico, Japan and Germany. The scores will be used to identify suitable environments for setting up a business. The barriers from the chosen country will be focused upon thus allowing an analysis of these barriers and identifying models that will overcome the barriers. The four countries where identified due to their uniqueness in terms of geographical location, government policies and cultural differences. Recommendations will be made based on the suitable country to set up a business (The Hofstede Centre, 2010).
The United States of America has a higher score in individualism compared to other cultural dimensions. Individualism had a score of 91, power distance had a score of 40, and masculinity scored 62 while Uncertainty avoidance scored 46. In the case of Mexico, uncertainty avoidance scored highly compared to other dimensions. Individualism scored lowly compared to the three dimensions (The Hofstede Centre, 2010). The scores for this country where. individualism at 30, masculinity at 69, uncertainty avoidance at 82 while Power distance at 81. Japan on the other hand had a high score on Masculinity at 95 and a lower score of 46 on individualism. Power Distance scored an average score of 54 while Uncertainty had an averagely high score of 92. In Germany,
Need an argumentative essay on What extent can we speak of a uniform impact of the cold war on western europe in the period from 1950 to 1980. Needs to be 3 pages. Please no plagiarism.
The discussion here will focus on Western Europe, more specifically Britain, Spain, and Italy.
After WWII, Europe was divided by Western Europe, allies of the United States, and Eastern Europe, which was controlled by puppet Russian communist regimes. The United States wanted an independent Western Europe. However, the United States only wanted an independent Europe, if the countries were capitalist. Whereas the Western Europe countries did not like having Russia control half of Europe, with America influencing the other half, they accepted it to the alternative. Brogi (2001, 76) quotes John Gaddis following statement:
the hard reality was that Britain, France, and their smaller neighbors preferred the known risks of influence to the imponderables of a unified third force that could conceivably fall under German or even Russian control.
Thus for the avoidance of a third world war, Western Europe tolerated the United States influence. “Indeed the Europeans proved incapable of overcoming their ancient rivalries, but were able to adapt and even promote dependence on the United States” (Borgi, 2001, 76). By depending on the United States, Britain, Spain, and Italy could transfer the responsibility of protecting their nations from Russia to the United States. The United States became the protector of Britain, Spain, and Italy during the Cold War. When before the Cold War, these countries were more dependent on European and self preservation against Russia and Germany.
Great Britain and the United States have been allies before and since both world wars. However, the United States, during the Cold War, proved to Great Britain where the true power lay. For example, when the Suez Canal crisis arose, Great Britain and France wanted to resolve the issue militarily (Fraser, 2002, 74). The United States did not want to provoke the Russian backed Egyptian president, Nassar for fear of another world war. To stop France and
Thanks in advanced, my career plan is Project Management
N 53′!“ For this discussion, you will need to address align! the questions below and besure to participate fully by responding to your classmates as well. Citations shouldbe used to support your analysis and references should be included in APAformat. Be sure to review the Discussion Question Guidelines before you begin!This week, you will be creating a small research paper based upon a career thatyou wish to pursue This assignment will help you do research on this topic and toparaphrase your information which means to put it in your own words. This alsobuilds upon research you did in UVC10IJO in Weeks 4 and 5. Use the skills youhave and try new research techniques. Document (write down and share} whatyou tried and how successful you were. Part I . Using a search engine like httpﬂgooglecom and the SUO Online Library, conduct a basic Internet search to ﬁnd resumes and articles from your degreeﬁeld and information about the ﬁeld. If you cannot ﬁnd an article about yourdegree ﬁeld, perhaps you could ﬁnd an article by someone in the ﬁeld. Post a discussion below that includes the following components: Identiﬁes the career you chose and explains why you chose it. Shares two references from the Internet and two references from the SUO Onlinelibrary that you looked at. Include the URL and the publication, title, author, anddate published if available. In the library, you can use the Cite or Citation buttonsto give you APA formatted references, just do not include the last line: ‘Retrievedfrom: hflprtherevenmm’ information because resource URLs do not work to linkback to the library. If you need help with locating material, please contact theOnline Librarian (Ask a Librarian] or your instructor. Explain what search terms you used and the cn’ten’a you used to determine if theinformation was credible. Compare your experience searching on the Internet and searching in the OnlineLibrary. Please try advanced search opﬁons and report on them. This can be veryeye opening. Note that from this week on throughout your college career, the grading criteriathat mentions information literacy includes the requirement of providingreferences in APA format to support your ideas. Part II Using one of the articles you identiﬁed in your Internet or library search, do thefollowing . Copy and paste an example of a paragraph from one of your resources. Any directly copied information needs to be in quotation marks Include an inflextcitation for this paragraph—see the example below. [n.d. stands for no date} One recruiter’s advice is simple: Don’t obsess over the skills secﬁon to the pointof embellishment. ‘In adding a skills section to their resume, a lot of people have a tendency to exaggerate their level of expertise in various technologies,‘ saysScott tlﬂlﬂ. senior corporate recruiterfor Software Architeds. lllﬂlEL continues,"They ﬁgure the more keywords, the more exposure“ (Hoffman, n.d., para. 3). "Although many people think that the more keywords in their résumé, the better, it isn’t good to exaggerate your technology skills so only include keywords for skillsthat you already have" (Hoffman, n.d.). . Include the full reference at the bottom of your posting. _|r|__r§:_a!i_ty,_yog would only have either a quotation or paraphrased information, not both. Paraphrasing iswhat you strive for in college with an in—text citation which will lead you to the fullreference on the References page. You might have several of the same in-textcitations for an artide in your paper but only one full reference for that article onthe References page. See the example below for the full reference for the quoteabove. Hoffman, A. (n.d.i. Tips to show your IT skills on your technology resume. Retlieyed from http:ﬂcareer—advicemonster.corru‘resumes-coyer—Iettersl‘Resume-Writinq-Tlpslshow-Your—SkiIIs—on-Your-IT—Resumel‘artide aspx. 3. Describe any dtallenges you had paraphrasing and citing the information.
Hawkessays.com, a very inexpensive custom writing service, is a perfect option if you need a custom written term, thesis, or research paper, as well as an essay or dissertation example. Get any writing aid you require at a price that is affordable to the typical student.
+1 928 857 4025