2-1

 

I currently work as the Accounting Manager of a four star hotel in my town. One opportunity for data analysis in a hotel is the analysis of guest reviews and survey responses. While at my current job, past hotel jobs, and I am sure most other hotels, reviews are always read and responded to, I think much more analysis of reviews would be beneficial. If I were the director of research and analytics I would begin by collecting all of the data regarding our hotel reviews. This would included our internal surveys, and social media reviews that are public. We would want to read all of the reviews and begin to create a data sheet that included the date of stay, the room type, the rate, the problem the guest had and/or the positive feedback. From this data we would want to analyze any trends that occur. Sorting the data by problem type would show if the problem occurs over time or on a specific date range — maybe it only occurs on Thursdays, we can then see which employees always work on Thursdays. This type of detailed analysis would allow the hotel to dig deeper into the problems that cause them to loose future guests and revenue, and begin fixing the issues so that the problems don’t continue to happen. 

 

I currently work as the Accounting Manager of a four star hotel in my town. One opportunity for data analysis in a hotel is the analysis of guest reviews and survey responses. While at my current job, past hotel jobs, and I am sure most other hotels, reviews are always read and responded to, I think much more analysis of reviews would be beneficial. If I were the director of research and analytics I would begin by collecting all of the data regarding our hotel reviews. This would included our internal surveys, and social media reviews that are public. We would want to read all of the reviews and begin to create a data sheet that included the date of stay, the room type, the rate, the problem the guest had and/or the positive feedback. From this data we would want to analyze any trends that occur. Sorting the data by problem type would show if the problem occurs over time or on a specific date range — maybe it only occurs on Thursdays, we can then see which employees always work on Thursdays. This type of detailed analysis would allow the hotel to dig deeper into the problems that cause them to loose future guests and revenue, and begin fixing the issues so that the problems don’t continue to happen. 

Business Law

1) When statutes are passed only after considerable study, debate and public input, this is an example of which function of the law? 
A. Keeping the peace. 
B. Shaping moral standards. 
C. Maintaining the status quo. 
D. Facilitating orderly change. 

2) The Federal Trade Commission is an example of: 
A. A branch of the U.S. Supreme Court. 
B. A temporary commission created by executive order that has become permanent. 
C. A federal agency created by Congress. 
D. A corporation subsidized by the federal government. 

3) What was the U.S. Supreme Court’s reaction to a case where a business executive was found guilty of aiding and abetting in the bribery of an Internal Revenue Service Agent even though the Internal Revenue Service agent had been found not guilty of the bribery in a separate trial? 
A. Because of the inconsistent outcomes, a third combined trial was ordered to reconcile the different outcomes. 
B. This simply underscores the fact that there is always the possibility that different juries might reach different results in a given situation. 
C. Because one of the defendants had been found guilty, then both should have been found guilty. 
D. Because one of the defendants had been found not guilty, they both should have been found not guilty. 

4) Which of the following is not one of the Caux Round Table Principles for International Business? 
A. Promotion of Multiculturalism. 
B. Respect for the Environment. 
C. Avoidance of Illicit Operations. 
D. Support for Multilateral Trade. 

5) Which of the following statements is true regarding the relationship of law and ethics? 
A. In some cases the law will require a higher standard of conduct than ethics, but never vice versa. 
B. Depending on the circumstances, the law can require a higher, lower, or the same standard of conduct as ethics demands. 
C. The legal requirements will almost always be the same as the ethical requirement because the law is based on the ethical standards. 
D. In some cases ethics will require a higher standard of conduct than the law, but never vice versa. 

6) What did the appeals court rule when General Motors was sued in Ypsilanti, Michigan? 
A. General Motors had to reduce the wages of its employees contrary to a collective bargaining agreement so that the factory would remain profitable. 
B. The promises made by General Motors to maintain continuous employment at its Willow Run plant were merely expressions of hope and did not amount to an enforceable promise. 
C. General Motors could not outsource work currently being performed in its own factory. 
D. General Motors had to lay off a portion of the workforce at one of its other factories. 

7) In general, the courts in a civil law system play a much larger role in making law than in a common law system. 
A. True 
B. False 

8) Most federal circuits of the federal appellate court system are determined based on: 
A. Geography. 
B. The amount in controversy in the appeal. 
C. Whether the case is criminal or civil. 
D. The subject matter of the case being appealed. 

9) An inferior trial court is one that: 
A. Can hear only matters involving relatively small dollar amounts. 
B. Can only hear certain kinds of cases. 
C. Has an appointed judge rather than an elected judge. 
D. Has had a larger than normal portion of its decisions overturned on appeal

active 8 rep 2

I need a response to the following

 

 

 

Andrew Cassidy Active Learning

 

 

Discussion Question 8

Andrew Cassidy 8/15/2014 1:51:10 PM
 

Theory of change is something that has building blocks in order to reach a long-term goal.  The inter-changing building blocks are outcomes, results, accomplishments or preconditions that help towards the pathway of change in building the framework.  Theory of change is based off inventions in the outcomes towards a specific pathway.  This pathway is often a complex design that is designed to bring about change.  Stakeholders in the Theory of Change discuss the changing process and the framework established as a result of change.  The results reveal assumptions that are evaluated through research which are strengthened through goals that are plausible.  Stakeholders understand the vision of long-term goals.  Measuring the progress along the way will help identify the likelihood of the pathway that they will travel down.  Theory of change refers to strategic planning, decision-making and evaluation.  Indicators will measure the success and generate action in order to reach goals.  Specific instructions are needed in order to achieve goals.  Articulating the decisions have to be tested and measured thoroughly.  Theory of change is map to get you from point A to point B. 

Some is that might prompt this dynamic are that the roadmap may be long and take several tries to get to the common goal in mind.  As outputs lead to outcomes, the social value desired should be met.  This map may contain small steps but might have many along the way in order achieve your designated goal in mind.  After a step, do a reflection on the achieved results desired.  As you progress in your theory of change model then make sure your illustrations visualize your end goal.  Your design is set against other people’s behaviors. 

As a chief, one must deal with the perception of the public as this theory of change progresses.  It almost seems as if there is a partnership between the public and police officers.  This concept directs how tasks are to be completed by the police instead of empowering them.  The chief needs to make sure there is a shared vision that sees the big picture and deal with issues that think strategically towards the public.  

 

Week 1 Exercise Please read and review the following article and video: Article: Read CREST “Cyber Security Incident Response Guide” Video(s): 2014 Cyber Security Session 24 – Cyber Security Incident Response Watch Video 2014 Cyber Security Session 24

  • Please read and review the following article and video:

    Watch Video

    2014 Cyber Security Session 24 – Cyber Security Incident Response
    Duration: (39:46)
    User: n/a – Added: 10/11/14
     

    Using what you have learned about Cyber Security Incident Response from the assigned reading, video, and report, thinkabout the following Lockheed-Martin’s Cyber Kill Chain:

    • Reconnaissance
    • Weaponization
    • Delivery
    • Exploitation
    • Installation
    • Command and Control (C2)
    • Actions on Objectives

    Your assignment is as follows:

    1. Define and discuss the three steps to Cyber Security Incident Response.
    2. Research recent cyber breaches and discuss the cyber “kill” chain for one of the breaches.
    3. For the company involved in step 2, make at least three (3) recommendations to senior leadership that could avoid breaches in the future.

    Feel free to use the Cyber Threat Intelligence and Incident Response Report template for your assignment.  Your assignment will be graded based on the rubric, which can be viewed when clicking on the assignment link.

Information Security Discussion

DUE IN 8 HRS!!!!!!

  

Please answer Each question, and cite any sources used. 

1. Review: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-18r1.pdf

How does the the approach of information security implementation, security objective, and potential impact influence the effectiveness and cost management of the task?

2. Question A: 

Describe threats and vulnerabilities and how to address them using a business impact analysis. Scenario: You are pen-testing a financial corporation and have found threats and vulnerabilities and need to explain to the business owner what they are. You must also provide an explanation on how a BIA can help the business secure their confidentiality, Integrity and Availability. 

Question B:

Research a unique news story or article related to Information Technology. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

3. Question A: 

Describe physical and logical access controls when and where would you implement them. Pick a type of physical and logical control i.e. Firewall or CCTV and explain how they work and what type of controls they provide.

Question B: 

Research a unique news story or article related to Access controls. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

4. Question A: 

Describe the risk management process and explain each step in detail. 

Question B: 

Research a unique article on https://www.infosecurity-magazine.com/risk-management/. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

5. Question A: 

Describe asymmetric, symmetric and public versus private keys. Also pick a type of encryption AES, DES some type and provide an explanation of how that encryption can be used to protect the CIA triad.

Question B: 

Research a unique article on encryption techniques. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please fully cite you source.

6. Question A: 

Describe the OSI model and break down each layer, explaining what functions they perform. 

Question B:

Pick an article on https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html. Write a short summary of what you learned, please also provide a link to the original article. Source is your choice; however please full cite you source.

7. Question A: 

Pick two US compliance laws and provide a brief description. Then, provide your thoughts on if the laws need to be updated or changed in any way. Describe how these laws relate to the CIA triad. 

Question B: 

Research a unique article on compliance laws. Write a short summary of what you learned, and please also provide a link to the original article. The source is your choice; however, please fully cite your source.

8. What is the most practical and easily-applied lesson you learned after answering the previous questions? What was the hardest to grasp? Why?

Euthanasia and End of Life Issues/State Laws Research Summary Report Assignment

2: Euthanasia and End of Life Issues/State Laws.
Research Summary Report Assignment = 100 Points.
Each student will research a topic related to course content and submit a three (3) page research-based summary report written and referenced in correct APA format (6th ed.).** The title and reference pages Do Not count as content pages.
Summary Report (Only Word.doc or doc-x files) must be Posted in D2L Dropbox and each student’s LiveText account by July 1, 2015 no later than 11:00 p.m. A student’s failure to submit the assignment in Livetext by the due date will result in zero points for the assignment.
Information should be current (within the past 12 years (2002-2014) and all statistics must be the latest available data. References should include printed material as well as online publications. See the grading scale link (rubric) for the major content areas that must be addressed in the report. Go to Content Link to access the grading scale.Information should be current (within the past 12 years (2002-2014) and all statistics must be the latest available data. References should include printed material as well as online publications. See the grading scale link (rubric) for the major content areas that must be addressed in the report. Go to Content Link to access the grading scale.
Make a clear connection between your topic and the social/cultural influences affecting family life. All references should pertain to the United States ( not to foreign countries). Do Not Use social blogs, Wikipedia, the dictionary, foreign journals, other foreign publications, or any “no author” and n.d (no date) references.
Report Format
Title Page
Center of the Page Title Page
Center of the Page
Research topic
Student’s Name
Submission Date
Content =3 Pages. Write in Third Person Narrative Style. Do not use personal pronouns (I, you, we, our, etc.) or include any personal opinions, viewpoints, beliefs, or experiences. Be Objective. Cite references using correct APA format.
Reference List – Separate page. Give the correct title for a reference page which is centered at the top of the page.
All references cited in the content Must be cited in the reference list using correct APA format for constructing a reference list. The references in the content and the reference list must be identical. All online references must have a Direct URL link to access the article.

Can someone answer two disccusion qestions?

 

Aristotle and Aquinas – Ethical Philosophies

 

 What is the relationship between ethics and human behavior?

 

How can the criminal justice administrator use these relationships to improve professional behavior?

 

 Explain your responses with appropriate research (including from electronic readings).

 

Use information from at less one of the references below in the response.

 

Reference

 

Single-Authored Overviews

 

Broadie, Sarah. Ethics with Aristotle. New York: Oxford University Press, 1991.

 

Bostock, David. Aristotle’s Ethics. Oxford: Oxford University Press, 2000.

 

Burger, Ronna.  Aristotle’s Dialogue with Socrates: on the Nicomachean Ethics. Chicago: The University of Chicago Press, 2008.

 

Gauthier, R.A. & J.Y. Jolif. Aristote: L’Ethique à Nicomaque. 3 vols. Louvain: Publications Universitaires de Louvain, 1958–9.

 

Hardie. W.F.R. Aristotle’s Ethical Theory, 2nd edn. Oxford: Clarendon Press, 2nd edn., 1980.

 

Pakaluk, Michael. Aristotle’s Nicomachean Ethics: An Introduction . Cambridge: Cambridge University Press, 2005.

 

Price, A. W. Virtue and Reason in Plato and Aristotle. Oxford: Clarendon Press, 2011.

 

Reeve, C. D. C. Action, Contemplation, and Happiness: An Essay on Aristotle. Cambridge: Harvard University Press, 2012.

 

Urmson, J.O. Aristotle’s Ethics. Oxford: Basil Blackwell, 1987.

 

 

 

Anthologies

 

Anton, J.P. & A. Preus (eds.). Aristotle’s Ethics: Essays in Ancient Greek Philosophy, vol. 5. Albany: The State University of New York Press, 1991.

 

Barnes, Jonathan, Malcolm Schofield, Richard Sorabji (eds.). Articles on Aristotle, vol. 2, Ethics and Politics. London; Duckworth, 1977.

 

Bartlett, Robert C. & Susan D. Collins (eds.). Action and Contemplation. Albany: State University of New York Press, 1999.

 

Engstrom, Stephen and Jennifer Whiting (eds.). Aristotle, Kant, and the Stoics. Cambridge: Cambridge University Press, 1996.

 

Arson unit 1 discussion board 1 7/22/14

 

The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.

 

At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Wednesday of each week. Two additional responses are required after Wednesday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.

 

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.

 

You are the lead investigator for a suspicious fire in the Novandon Fur Warehouse, which was cold storage for mink and sable fur coats. The fire scene investigative team tells you that the fire started in several points simultaneously, and it appears the telephone line that monitors the fire detection equipment has been cut. The fire was fully involved by the time the fire department arrived. The warehouse and the contents are a complete loss. You must consider the direction that your investigators must take to determine the possible motives for this fire. Direct them to look in at least 3 directions for a motive. Keep in mind the type of warehouse this was.

 

  • Concerning the owner of the warehouse, what documentation would you get to help you establish potential motives? Why?
  • When interviewing the owner of the warehouse, what specific threats might you ask about? Why?
    • How would the owner’s responses be helpful? Explain.

 

 

 

Business Requirements

 Business Requirements
Due Week 4 and worth 110 points

This assignment consists of two (2) sections: a business requirements document and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Procuring quality business requirements is an important step toward the design of quality information systems. Completion of a quality requirements document allows user needs and expectations to be captured, so that infrastructure and information systems can be designed properly. Your company, which is a data-collection and analysis company that has been operating less than two (2) years, is seeking to create a repository for collected data beyond standard relational databases. Your ten (10) terabyte data warehouse is expected to grow by 20% each year. You are mindful of data warehousing best practices which will aid you immensely in your requirements gathering effort. Using the requirements document provided in the course shell, you are to speculate on the needs of the company. You must consider current and future requirements; however, assumptions should be realistic and carefully considered.  

Section 1: Business Requirements Document

  1. Write a four to six (4-6) page original business requirements document for the project plan using the template provided. Note: The template is provided under the Additional Resources in the Student Center tab of the online course shell.
    • Describe the project including the following:
      • Describe and define the scope of the project.
      • Speculate as to how to control the scope.
      • Identify possible risks, constraints, and assumptions.
      • Describe the relationship and integration between systems and infrastructure. Note: Database and Data Warehousing, Analytics, Interfaces and Cloud Technology, and Infrastructure and Security should be considered.
      • Speculate upon potential outsourcing or offshoring needs.
      • Identify and justify the necessary resources including staffing that are necessary.
      • Define relevant terms that will be used throughout project.
    • Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2: Revised Project Plan

Use Microsoft Project to:

  1. Update the project plan from Project Deliverable 1: Project Plan Inception, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.

The specific course learning outcomes associated with this assignment are:

  • Evaluate an organization through the lens of non-IT senior management in deciding how information systems enable core and supportive business processes as well as those that interface with suppliers and customers.
  • Use technology and information resources to research issues in information systems.
  • Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.

Disaster Recovery and Business Continuity

 

Disaster Recovery and Business Continuity Scenario:
 

Part 1:
You are the IT lead for a small IT company in Florida that sells computers. The company just received one of the most massive orders from a high school on a government base to ship 500 desktop computers located in VA. A natural disaster occurred (hurricane) has left your location without power; however, you do have cellular service, “most of the roads are not travelable.” Due to the power outage in your area, the U.S. postal service and others will not be delivering. The CEO needs this transaction to occur as this could lead to a long-lasting relationship and will keep the company above water.
 

  1. What procedures would you take to fulfill the order?
  2. Create a short guide to keep business going if the power is disrupted again in the future due to a hurricane.   

Part 2:
The power has been restored, and hackers are attempting to take advantage of the opportunity and crisis, therefore, using Kali Linux (Metasploit) to gain access to company servers. Your company has a Windows-based server, which Windows is prone to attacks. You assume that your company is maybe next in a Ransomware attack as other IT companies are falling victim within your local area.

Q-1 What steps will you take to ensure that you do not become a victim of ransomware?                                         

Guide Information:

  1. Must be in APA
  • Each question does not have a page length requirement, and you will be graded on creativity and the solution quality. In hindsight papers that are longer than 3 pages usually have better creativity and detailed solutions. This assignment is based on your ability to solve a problem that may be a continuous issue.
     
  • By submitting this paper, you agree:   
  • (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy
  • (2) that your institution may use your paper in accordance with your institution’s policies; and 
  • (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Last date of submmission is 06/30/2019 on Sunday 2:00 Afternoon.